Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs

  title={Capturing location-privacy preferences: quantifying accuracy and user-burden tradeoffs},
  author={Michael Benisch and Patrick Gage Kelley and Norman M. Sadeh and Lorrie Faith Cranor},
  journal={Personal and Ubiquitous Computing},
We present a 3-week user study in which we tracked the locations of 27 subjects and asked them to rate when, where, and with whom they would have been comfortable sharing their locations. The results of analysis conducted on over 7,500 h of data suggest that the user population represented by our subjects has rich location-privacy preferences, with a number of critical dimensions, including time of day, day of week, and location. We describe a methodology for quantifying the effects, in terms… CONTINUE READING
Highly Cited
This paper has 179 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 107 extracted citations

Crowdsourcing privacy preferences in context-aware applications

Personal and Ubiquitous Computing • 2012
View 5 Excerpts
Highly Influenced

Low-latency privacy-enabled Context Distribution Architecture

2012 IEEE International Conference on Communications (ICC) • 2012
View 7 Excerpts
Highly Influenced

Super-Ego: a framework for privacy-sensitive bounded context-awareness

CASEMANS '11 • 2011
View 5 Excerpts
Highly Influenced

An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance

2018 12th International Conference on Research Challenges in Information Science (RCIS) • 2018
View 1 Excerpt

Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?

2018 IEEE Symposium on Privacy-Aware Computing (PAC) • 2018
View 2 Excerpts

180 Citations

Citations per Year
Semantic Scholar estimates that this publication has 180 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 30 references


N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley
Prab aker, and J. Rao. Understanding and capturing people’s privacy policies in a mobile social networking application . The Journal of Personal and Ubiquitous Computing , 13(6):401–412 • 2009
View 4 Excerpts
Highly Influenced

Acce ss control for home data sharing: Attitudes

M. Mazurek, J. Arsenault, +13 authors M. Reiter
needs and practices. In CHI • 2010
View 1 Excerpt

BIA’s The Kelsey Group Forecasts U.S. Mobile L ocal Search Advertising Revenues to reach $1.3B in 2013

K. Group
View 1 Excerpt

Location-sh aring technologies: Privacy risks and controls

J. Tsai, P. Kelley, L. Cranor, N. Sadeh
Research Conference on Communication, Information and Int erne Policy (TPRC) • 2009
View 2 Excerpts

and N

J. Tsai, P. Kelley, P. H. Drielsma, L. F. Cranor, J. Hong
Sadeh. Who’s viewed you? the impact of feedback in a mobile-location system. In CHI • 2009
View 2 Excerpts

Similar Papers

Loading similar papers…