Geomedia and privacy in context. Paradoxical behavior or the unwitting sharing of geodata with digital platforms?

. the increasing pervasiveness of media in society implies the ubiquitous processes of geoda-ta-capture and real-time feedback. the concept of Geomedia considers these developments and raises the questions of geoprivacy and corporate surveillance. the aim of this study was to investigate what kinds of geolocation data are shared wittingly or unwittingly, and in what contexts. Beyond that, we ask how much individuals know about the data-sharing processes and the underlying commercial logic, and how they act upon this knowledge (whether paradoxically or not). our study was theoretically framed by contextual privacy (nissenbaum 2011), because we assumed that a violation of privacy is perceived differently according to the context. the quasi-experimental design (using a WiFi-capture device) combined with a questionnaire revealed the participants’ attitudes to, and awareness of, data sharing, and their understanding of geoprivacy and geomedia use. the main results show that people are aware of the underlying commercial logic, have privacy concerns and, strongly depending on contextual factors, their knowledge and capabilities, act upon this awareness. Finally, we show that smartphones covertly share a huge amount of meta and trafic data.


Introduction
Privacy concerns about online third-party tracking and monitoring as well as digital network behavior have received much attention in recent years due to the ubiquitous use of smartphones, the rise of the so-called "Big Five" (Google, Amazon, Microsot, Facebook, and Apple -large platforms that permanently collect and monetize user data), and ongoing discussions about political and legal regulation strategies in the light of General Data Protection Regulation (GDPR).Among the whole range of collected sensor and usage data, geolocation is of particular interest as it reveals spatio-relational and spatio-temporal information about individuals (Wilken 2018).Location has gained importance across diferent disciplines and industries, and has become core to many business processes.Tech companies derive added value by combining, in unprecedented ways, the collection, aggregation, iltering and re-organization of networked personal data with geolocational data for even more precisely targeted marketing strategies and predictions, such as content customization and delivery (Estes 2016).In formulating new critical perspectives, including potential advantages and risks, several scholars use the term "geomedia" (Fast et al. 2018;McQuire 2016) to articulate the new societal conditions that arise through ubiquitous geodata capture, emphasizing the huge importance of media in the 21 st century.Geomedia are indicative of dichotomies that appear to be inherent in internet technologies as a whole: they can be the "media of surveillance and control, of intrusion into intimacy" (Jekel et al. 2014, p. ix), media that inluence political decision making and voting behavior, and the media of empowerment, democratization and engagement.
Given the omnipresent and widespread use of geomedia, we have to pose questions about their possible impacts on individuals and society, against the background of the shit from surveillance and intrusion into privacy exclusively realized by states and governments in the past to now the same by companies.his shit forms part of the economics of advanced capitalism (Murdock 2017), a driving force for technological development that shapes the possibilities of data-sharing.In this study, we focus on usage, privacy concerns and privacy management related to geolocational data at the level of the individual user, endeavoring to discover what types of geolocation data they unwittingly or deliberately share, and in what contexts.How much do individuals know about the data-sharing processes and the underlying commercial logic, and how do they act upon this knowledge?Although privacy concerns, behavior and attitudes are discussed widely in various disciplines, we are not aware of any study that evaluates the speciic roles of geolocation and geomedia from a media and communication studies perspective.To theoretically frame the complex conditions under which people share or do not share data, we refer to Nissenbaum's contextual privacy approach (Nissenbaum 2010, p. 147), as she dismisses the public/private dichotomy and interprets privacy in relation to an appropriate low of personal information (Nis-Pobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58:14 U M C S senbaum 2010).Based on a combination of a questionnaire and a quasi-experimental setup, we show people's ideas about (locational) privacy in contrast to the data they actually, (un)wittingly, share by mobile device.

Living in Geomedia
he concept of mediatization is used to characterize media as one of the forces contributing to the constitution of societies nowadays.Mediatization is described as a "metaprocess" (Krotz 2007(Krotz , 2017)), from an institutional perspective (Altheide, Snow 1979;Hjarvard 2008Hjarvard , 2013)), or as part of a social-constructivist tradition that recently introduced the term "deep mediatization" (Couldry, Hepp 2017;Hepp 2017).hese approaches share the fact that they indicate that "modernity encompasses social and cultural changes in which more and more areas and forms of practice become saturated with and adapted to media technologies and institutions" (Jansson 2018, p. 2) 1 .Media (especially mass media) have always played an important role in structuring the fabric of society and public discourses.Currently, we have reached a point where ubiquitous smartphone use, dataication and artiicial intelligence (especially machine learning algorithms) have penetrated people's inal decision-making and action processes.Classical causal-linear models of mass communication no longer apply to these phenomena, and media and communication science theories that diferentiated between producer/consumer, channel/content, interpersonal/mediated communication, real world/cyberspace, private/public no longer seem to it, as these binary oppositions become blurred.An "almost complete mediatization of society seems a somewhat self-evident observation" (Deuze 2012, p. x), meaning that we do not live with, but in media."Media are to us as water is to ish.his does not mean life is determined by media -it just suggests that whether we like it or not, every aspect of our lives takes place in media" (ibid.).For this reason, we suggest adhering to Deuze's deinition of media, which captures them interchangeably as "information and communication technologies" and as "machines"; "[media] thus broadly conceived are any (symbolic or technological) systems that enable, structure or amplify communication between people" (Deuze 2012, p. xii). he shit from living with to living in media has some far-reaching consequences: media have become a necessary and unavoidable part of our lives; they are ubiquitous, pervasive (they cannot be switched of) and indeterminate (not inished or static); they act as platforms for communication to constitute and reproduce the world we live in (Deuze 2012, p. xi).
One aspect that made this densiication of media possible is the "birth" of location-aware mobile devices.As they incorporate time and locational accuracy, they set the stage not only for a broad range of new applications but also for a whole range of new 1 An extensive discussion of diferent approaches to mediatisation cannot be given here due to the focus on results.
Pobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58:14 U M C S possibilities for interaction."he integration of the one-way GPS signal transmission into a two-way mobile communication system" (Abernathy 2017, p. 24) seems a small technological advance, but in fact it heralds a new era of mapping, connectivity, navigation, seeking of friends in places nearby, "checking in", observation and communication.Location-awareness has iniltrated a broad range of sectors and industries (healthcare, automobile, transport, education, banking, entertainment, tourism, government, etc.), and according to Wilken (2018) we now experience the seamless integration (if one unintended by users) of location with services, and (social) networks.his "ubiquitous geodata capture" (Wilken 2018, p. 26) marks the "third generation" (ibid.) of geodata services and platforms, where location has become vital for operation and service at all levels.his analysis not only applies to "native" third-generation services (like Uber), but also to established search and social media companies (such as Google and Facebook) that have efectively become "third-generation" location-based service platforms, insofar as they have reshaped their operations by ubiquitous geodata capture (Wilken 2018, p. 26).hese services and platforms capture and circulate "geodata at a scale, speed and level of complexity that is markedly diferent from earlier incarnations of similar services" (Wilken 2018, p. 29).
In addressing these new conditions, several scholars introduced the term "geomedia" (Fast et al. 2018;McQuire 2016), which takes into consideration technological 2 and social change, critically addressing this permanent spatial connectivity. 3Following a broader deinition, geomedia "includes all representations of space, covering a wide range of outputs from verbal description to visualization.Both theoretical and empirical work suggests that media in general and geomedia in particular set the stage for the appropriation of space by contextualizing communication" (Gryl, Jekel 2012, p. 22).In his critical analysis, Lapenta (2011) argues that geomedia "regulate social behaviour and interpersonal communications, coordinate social interactions and organise the production and exchange of the founding immaterial commodities constitutive of these immaterial spaces" (Lapenta 2011, p. 22).
As Lapenta refers only to the technological aspects of geomedia, McQuire (2016) develops a much broader understanding of geomedia, placing far greater emphasis on urban conditions and including social change."Geomedia is a concept that crystallizes at the intersection of four related trajectories: convergence, ubiquity, location-awareness and real-time feedback" (McQuire 2016, p. 2).Ubiquity refers to the omnipresence of mobile, embedded and connected media devices, available anywhere, anytime, even on the move; these devices converge increasingly with each other through the fusion of technologies, genres and institutions.Location-awareness means that information is adapted to the user's location and mobility, while real-time feedback refers to the many-to-many lows of (locational) information in which the time between an event and its media presence is shrunk almost to zero, "supporting novel experiences of social simultaneity" (McQuire 2016, p. 4).
he possible implications of geomedia range from potential empowerment, activism (for example "smart mobs" (Rheingold 2002) and civic engagement (Gryl, Jekel 2012;Gryl, Jekel, Donert 2010;Haklay 2017) to intrusion into privacy and surveillance (Klauser, Widmer 2017;Leszczynski 2017;Murakami Wood 2017).If we want to analyze the impacts and importance of these "third-generation data-driven social, search, and analytics platforms" (Wilken 2018, p. 35) and formulate new critical perspectives, then the concept of geomedia, as presented in this chapter, can be seen as a "robust and productive framework" (ibid.)!

Geomedia and corporate surveillance
Geolocation has become not only an integral part of everyday smartphone experience and of changing appropriations and perceptions of space (hielmann et al. 2012), but also "a necessary part of the technological developments and the corporate arrangements that underpin them (business deals, monetization strategies, platform-speciic data extraction methods, algorithmic sorting, etc.)" (Wilken 2018, p. 21). he need to take into consideration these economic and socio-technical transformation processes underlines the necessity for academic debates on geomedia usage, behavioral patterns and privacy management.Geomedia structure communication spatially, but oten in an unpredicted way, or in one that is unforeseeable and invisible to the user.Besides police and secret service work, it is applied most oten in a commercial context.For example, pausing in front of a shoe-shop window, say, with your location-enabled smartphone in your pocket, without even actively using the phone, could reveal things of commercial interest to the Big Five (or others), even if you have never actively searched for shoes on shopping platforms.
he rising interest in geocoded data and their use in the mainstream market is relected in the growth of the geospatial industry, which is projected to increase by a further 13.6% by the year 2020 (Geospatial Media and Communications 2018, p. 4).Using geocoded data is proitable for businesses in two ways: selling the geocoded data and creating new services out of the data to collect even more geocoded data.his has led to a change in the geoinformation market from one of corporate clients to a demand-driven mass market (Fischer 2010, p. 30).It is not only the world's leading sotware producer for GIS, Esri, 4 that stands to beneit from location intelli-4 Whitepaper on how to use location intelligence to maximize the Value of BI: https://www.esri.com/~/media/iles/pdfs/library/whitepapers/pdfs/using-location-intelligence.pdfPobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58:14 U M C S gence;5 even the core areas of popular internet use, dominated by "the Big Five" "Google in search; Facebook in social media; Amazon in online retailing; and Apple and Microsot in personal computing;" (Murdock 2017, p. 123) are being reshaped by ubiquitous geodata capture.hey "are at the heart of the emerging general economy of advanced capitalism" (Murdock 2017, p. 123), and collecting and trading users' personal data is the core of their business model.Murdock (2017, p. 130) suggests that one should analyze the dynamics of "deep capitalism" rather than those of "deep mediatization".hese processes widely determine our everyday habits within the framework of mobile-network-technologies through (machine learning) algorithms and make corporate surveillance more precise.On an individual level, "new performances of self and re-inscriptions of the body in place and space" (Schwartz, Halegoua 2014, p. 1656), called the "spatial self " (Schwartz & Halegoua, 2014) arise; so too do new forms of identity-management (Saker 2016), self-surveillance, competition with others, and "watching one another", called "lateral surveillance"; (Andrejevic 2005).Individuals "[look] at [their] own content through other people's eyes" -social surveillance (Marwick, 2012), or "[control] one another" -interveillance (Jansson 2015), deined as the "social embeddedness of contemporary surveillance processes, typically governed by commercial forces, while at the same time recognizing the non-hierarchical and non-systematic nature of most social monitoring processes occurring in everyday life" (Christensen, Jansson, 2015;Jansson 2015, p. 81).
We assume that big platforms derive beneits from these developments in three ways: (1) information is collected regarding individual preferences, location and behavior, and (2) can be connected to individual networks of the (control-)relationships that emerge from interveillance; and (3) the collected data can be merged with data for virtual groups worldwide (i.e.groups of people with similar proiles).Subjects and their social and spatial behavior become controllable and predictable.Geomedia can therefore be seen as "progressing" as a close web of surveillance.Corporate surveillance is no longer just about targeted marketing.Furthermore, the creation of ever-more precise virtual groups can be used for risk-evaluation of citizens.hese evaluations can be sold, for example to inancial institutions to support decisions for awarding loans (O'Neil 2016), to health insurance companies to determine insurance premiums, to employers' associations to inform decisions regarding employment (such as salary and working hours), or to predict ex-criminals' reofending rates.Most importantly of all, political decisions and knowledge of political opinions, which can be revealed easily, could, depending on the type of state, be misused.Geomedia therefore raise questions of "inclusion and exclusion, empowerment and exploitation, justice and injustice, equality and inequality" as the "' empowering' potentials of mobile connectivity might be hampered by existent power structures that determine what technology is being used, when, where, how and by whom" (Fast et al. 2018).

Geomedia privacy
Concepts of privacy that clearly distinguish between the private (associated with family, private households, intimacy) and the public sphere (communicative networks to foster the formation of public opinion), as found in ancient Greek literature (Aristotle) and later in the works of Habermas (1962) or Arendt (1958), must be revised as these two spheres become blurred and distorted by processes of advanced geodigitalization. he extensive use of geomedia challenges these two-sphere-concepts.Individual spatial information (especially connected to a time stamp) is particularly sensitive with respect to the possible disclosure of personally identifying information (PII).Explained briely, geolocation data are "(1) distributed (occur across multiple devices, applications and services), (2) platform-independent (data low easily across platforms, services and devices) and ( 3) indiscriminate (involve potentially all individuals)" (Leszczynski 2017, p. 237).In this context, the need for a new understanding of privacy is raised by the "commercialization of all things 'geo' [represented and fostered by the] ubiquity and ordinariness of locationally enabled devices, mapping platforms, spatial interfaces, geosocial applications and myriad location-based services in the spaces and practices of the everyday" (Leszczynski 2017, p. 235).
While the historical and cultural notions of privacy vary widely and do not consistently estimate privacy desirable6 , we want to use it as a meaningful and valuable concept -as a major element of functioning democracies.Democracies "(or governance for the people by their elected representatives) innately value privacy because it promotes free development of the self, nonconformity, diversity of views, new ideas and opportunities to enjoy intimacy without unwanted scrutiny" (McStay 2017, p. 15), against negative accounts of privacy, based on seclusion and hiding, we want to condense it as autonomy, self-determination, voluntariness, free choice and responsibility for these choices (McStay 2017, p. 20).his follows Kant's understanding of these conditions, together with freedom being the basis of a social and moral life (Kant 1996).Based on Kant's notions of privacy, Fried (1970) characterizes privacy as the necessary condition for love, friendship and trust that "allows one the freedom to deine one's relations with others and to deine oneself.In this way, privacy is also closely connected with respect and self-respect" (DeCew 2018).Concerning digital network technologies, we also make privacy-decisions on behalf of others (p.e.sharing pictures and information about others or tagging a person).herefore, U M C S privacy has a collective character that is based on interactions with others (McStay 2017, p. 21).As Nissenbaum (2010) points out, privacy is more than the control of how much about ourselves we reveal to others, as stated by (Westin 1984).Moreover, the privacy and identity management strategies are dependent on contextual aspects. he normative concept of contextual integrity proposed by Nissenbaum (2010) looks at various information processes in various contexts.In an economic framework, a violation of privacy is caused diferently in friendship-like relationships than in professional ones."Given the power of companies in the capitalist economy, economic privacy needs to be contextualized in a way that protects consumers and workers from capitalist control and at the same time makes corporate interests and corporate power transparent" (Fuchs 2011, p. 232).From the perspective of the individual, the right to privacy "is neither a right to secrecy nor a right to control but a right to the appropriate low of personal information" (Nissenbaum 2010, p. 127), and what is seen as appropriate is a normative distinction that involves the intersection of three aspects: actors, realm/space and information.When these norms are contravened, we experience a violation of privacy, here labelled a "violation of contextual integrity" (Nissenbaum 2010, p. 127)."At the level of politics, this requires governments to treat people with respect and dignity […]. he importance of liberal philosophy becomes clearer when we recognise that this holds sway over comprehension of human rights and the ethics that drive western law" (McStay 2017, p. 20).From a legal perspective, there are two diferent aspects (Zwick, Dholakia, 2001): 1) Privacy as a basic human need, and as a civil and human right (Debatin 2011), vs. privacy as a commodity or private property (discussed from a critical angle by (Fuchs 2011)); 2) privacy regulation by Government vs. Self-regulation.Diferent countries have developed diferent strategies.Whereas the EU legislation deines privacy as a basic human right and has established stronger legal regulation, in the US, privacy is equal to private property and seen as a commodity (Zwick, Dholakia 2001, p. 120).Companies with a transnational reach challenge these two concepts, and the eicacy of the recent attempt by the EU to reinforce legal regulation through the GDPR has still to be proved.

Self-disclosure, hidden data-sharing processes and privacy management
On the individual level, strategies for managing privacy and identity, according to Zwick and Dholakia (2004), are dependent on the accuracy and amount of personal Information revealed.
his model (Figure 1) gives the impression that the amount and accuracy of personal information is visible, controllable and manageable by the users themselves.It doesn't consider the hidden layers of the data-sharing processes.2011) identiies several privacy risks that users agree to when posting on sites, and plots them in two dimensions: a horizontal axis for social interaction among users (including cyberstalking, harassment, reputation damage, but also representation through proiles), exempliied metaphorically as the visible tip of the iceberg, and a vertical axis for data collected (systematic collection, aggregation and use of data by the networking company, data miners and government agencies, third-party tracking and monitoring), represented by the much larger submerged, invisible part of the iceberg (Debatin 2011, p. 4).Several other authors have investigated that many users are not even aware of the excessive data-sharing processes and pervasive monitoring of online and mobile platforms (Christensen 2014;Christensen, Jansson 2015).
here are numerous studies concerning the role of knowledge of data-sharing processes, privacy concerns and self-disclosure.boyd (2014) and Marwick and boyd (2014) showed that teenagers do not act carelessly on public networked spaces, but they cannot, despite privacy strategies, suiciently control the information lows, an outcome that reveals how their technical skills are inadequate for the protection of privacy.A study on Facebook and other social network sites conducted by Acquisti and Gross (2006, p. 21) documented signiicant dichotomies between speciic privacy concerns and actual information-revelation behavior.Although this study only examines student behavior, it provides evidence for the "privacy paradox" (Barnes 2006).Several other studies have demonstrated the existence of this paradox, lagging a gap between privacy concerns and action (for an overview see Dienlin and Trepte (2014, p. 294)), and a few studies indicate privacy paradoxes that can be explained to a certain degree (Debatin et al. 2009).An in-depth social-psychological analysis of privacy attitudes and privacy behavior by Dienlin and Trepte (2014) ofers a more complex picture.hey distinguish between privacy concerns and privacy attitudes, and diferentiate various privacy dimensions (informational, social and psychological), showing that "privacy behaviors are not paradoxical in nature but […] based on distinct privacy attitudes" (Dienlin & Trepte 2014, p. 295).
To bring the discussion back to everyday geomedia practices that are "characterised by extensive, real-time geosurveillance and the networked data and device ecologies" (Leszczynski 2017, p. 242), the link between privacy concerns (including knowledge on data-sharing processes and of the underlying commercial logic) and behavior cannot be described in a straightforward fashion.Quite the contrary: the contexts of data-sharing processes, economics and socio-technical transformation processes as well as the user's sociodemographic status all inluence the appropriation of geomedia.he aim of this study was to investigate the speciic roles of geomedia within this complex ield.

Approach
In the irst part of the paper we laid out the multifaceted nature of geomedia privacy management.It is with this aim in view that we posed the following research questions: 1. What kinds of traic and metadata are shared unwittingly if the smartphone is connected to a WiFi spot?a.Of these, which are georeferenced?b.What are the speciic contexts in which people would normally share or refuse to share these data?here are diferent types of geodata (absolute location, relative location, (un)structured geodata) (Abernathy, 2017) that are received/gathered diferently.Most commonly the receiving/gathering is carried out via an A-GPS -a GPS sensor assisted by WiFi positioning aand the triangulation of mobile radio cells, or it comes as data that is shared as part of the Exif data.Sharing (by the user with third parties) takes place actively (for example via WhatsApp, or by giving certain apps location access), or inadvertently (by having switched on location access, so Google's location API extracts information in the background on a continuous basis to push geo-targeted content -known as "geofencing" (Barreneche, Wilken 2015)).
As far as possible, we tried to determine the "precise nature" of this sharing of geodata.
1. How much do individuals know about data-sharing processes and the underlying commercial logic? 2. How do people act in light of this knowledge?
Pobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58:14 U M C S Our hypotheses were as follow: Hypothesis 1 (H1): he majority of people do care about the protection and control of geolocation data lows (even if in a loose and generally imprecise manner), but nevertheless share data using geomedia.
Hypothesis 2 (H2): he amount and precise nature of the geodata shared depends on contextual factors.We tested the following contexts and reasons for using geomedia and sharing geodata despite privacy concerns: • Peer pressure • Work pressure • Fear of missing out • Lack of knowledge • "Careless" use (because "everybody uses the technology"; because of "not having anything to hide") • Trade-of: convenience (service) vs. tracing Hypothesis 3 (H3): he majority of people are aware of commercial data-sharing processes behind geomedia use, but not of their full extent.

Methods
he entire study was carried out in the context of the Austrian "Long Night of Research" ("Lange Nacht der Forschung") at the University of Salzburg on 13 April 2018, during which our project maintained a stand informing interested people about geolocation data-sharing processes.
Using a combination of online questionnaire and quasi-experimental design (due to the lack of a control group / comparison group) (Bailey, 1994, p. 236), we examined people's knowledge concerning how their geolocation data is shared, wittingly or unwittingly, enquired about their day-to-day behavior regarding shared data, and examined their concepts of privacy. he particular nature of this project was, irstly, that it has a clear educational and informative aim, and that, secondly, it is used to foster academic knowledge.
he whole study was pre-tested in a university context.According to the indings of the pretest, questionnaire and quasi-experimental setup were improved in an iterative process.he procedure itself began with welcoming the visitors, typically families and groups of friends and/or students.In order to achieve maximum anonymity, no personal details were taken without consent, and the utmost care was taken to eliminate personally identifying information (PII).he participants were divided into groups of 2-6 people to guarantee anonymity, and led through the whole quasi-experimental Pobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58:14 U M C S process.In the irst step, they were asked to connect their smartphones to a randomly generated SSID (service set identiier) and were given a twelve digit passcode and a randomly generated four-digit Visitor ID. were given a four-digit passcode, which in turn randomly generated a Visitor ID.As soon as all the smartphones of a group were connected to our WiFi research device (to capture meta and traic data), the participants were asked to take a selie and to "share" (i.e.upload) it to a web service (operated by us).With this step, we were able to demonstrate the richness of the meta-information (metadata) included as Exif (Exchangeable Image File Format), such as GNSS-coordinates, type of mobile device, and manufacturer speciications, that are shared when a photo is uploaded onto a platform.he next task was for participants to use their devices to search for the nearest Italian restaurant.his search allowed the collection of the domains the smartphones targeted (both the visible and invisible ones from a users' perspective) and data about the search engine, navigation tool or browser being used.
At the end of their visit, each participant received information about the amount of data sent to/received from the various platforms during their stay, which was presented statistically (i.e.visualized) in the form of various diagrams intended to help motivate them to reconsider their default settings, apps and internet usage. he visitors were then asked whether they would support our research further by completing an online questionnaire (see appendix).
he quasi-experimental setup provided people with evidence that their personal data could be tracked easily by third parties, while the online questionnaire collected data regarding behavior, contexts and awareness of data-sharing processes.Visitors who were willing to participate were required to sign an agreement that their data would be kept and linked to the VisitorID.If they declined, the linkage between Visitor ID and recorded data was deleted.
Several limitations to the current study should be pointed out.First, the data was captured using a quasi-experimental design and cannot therefore be evaluated against a control group.he behavior captured only shows tendencies in an artiicial context ("he Long Night of Research"), which may have encouraged people to give away data more freely.As the study was carried out in the context of a particular event, it cannot be repeated.
Second, the results of the questionnaire rely on interpretations of assumed behavior based on the respondents' self-reports: their actual day-to-day actions could not be monitored in this setup.We should also point out that answers regarding the importance of privacy may have been given in what was perceived to be a socially desirable way.
Finally, participation in our study was self-selecting and voluntary, and resulted in a voluntary sample with an unpredictable "n" (number of participants).Visitors to "he Long Night of Research" may in general be more highly educated, and more interested and critical than the average citizen.

Results
Quantitative online survey he online survey respondents (n= 102) were predominantly female (73.8%); 46.1% had a higher school certiicate or held a university degree (32.4%). he mean age of participants was 29.38 (percentiles: 25 => 21 years; 75 => 32 years).For the general question of app-usage behavior, we would like to draw attention to the following points (from Figure 2): 88.2% said they used Google maps; 96.7% of this group gave their reason as inding it useful, whereas 60% of the non-users did not use it for privacy protection reasons. he second most frequently used type of app were "apps for public transport" (83.3%), followed by social network apps (78.4%). he most common reasons for using social network apps were "to stay informed" (65%), "because friends use them" (63.8%) and "usefulness" (56.3%).Only 7.8% of the respondents said that they used dating apps.
On a scale of 1 (fully agree) to 5 (completely disagree), 44.9% of respondents chose 1 or 2, meaning that they didn't feel able to protect their user-data from being shared and used.

Hypothesis tests
H1 predicted that the majority of people cared about the protection and control of geolocation data lows, but nevertheless shared data using geomedia.he hypothesis was tested by calculating an index for "care about the protection and control of geolocation data lows" and one for "share data using geomedia".his hypothesis was partially supported.A weak to moderate correlation between the two indices occurred (p=0.13;r0.268), though the hypothesis ("people would care about data protection but despite shared geodata") had no signiicant result (p=0.161)within the given sample (58%).We can state that the more people care about data protection and control of geolocation data lows, the less they share data using geomedia.45% of the respondents said that they took measures to protect their privacy on the internet.Of this group, 93.5% said that they intentionally changed the privacy settings on certain apps and made full use of "opt-out" options.65.2% said that they never used certain apps/platforms for privacy reasons.26.1% used an encrypted email service.Only 17.4% used a search engine that did not track search behavior.50% stated that the locating function on their smartphone was generally disabled.48% stated that they disabled location access for their smartphone camera, whereas 27.5% stated that their smartphone camera was amongst those services that had permanent access to their location (18.6% didn't know about their settings).25.5% said that they usually shared their location history with Google or Apple, 52.9% that they did not, and 15.7% did not know.
H2 predicted that the amount and precise nature of the geodata shared depended on contextual factors.Location is shared diferently in diferent contexts.22.5% generally shared their location with family and friends; 20.2% shared it with family, friends and partners when they were travelling; and 52.8% responded that they did not share their location in any of the given situations.
Yes (%) I normally share my location with my family/partner so that they know exactly who is where.

22.5
I usually share my location with friends (e.g. to arrange an exact meeting place) 19.1 When sharing pictures, I usually share my location intentionally (using GPS) 19.1 Within my professional network, I am required to share my current location 1.1 I share my location with my family/friends/partner when I'm away travelling 20.2I share my current routes and performance when doing sports (e.g.running, hiking, etc.) 12.4 In none of the given situations 52.8 he results of the online questionnaire indicated that there was a weak to moderate correlation between the indices "care about protection and control of geolocation data lows" and "share of data using geomedia" (with a statistically non-signiicant result).herefore, the hypothesis that people care about privacy but nevertheless share data using geomedia could not be supported.We did not ind a dichotomy between caring about data protection and usage behavior.45% of the respondents said that they took measures to protect their privacy on the internet.Of this group, 93.5% stated that they deliberately change the privacy settings on certain apps.From the results of the quasi experiment, however, we could visualize the massive amount of data that is shared by a smartphone as soon as it is connected to WiFi, while users perform "simple" search queries or share a selie and do not realize the hidden data-sharing processes.We agree with and emphasize Debatin's theory of a submerged part of network behavior.While the visible part (1/8 of the whole) (Debatin et al., 2009, p. 88) is seen as social networking and fun from the users' perspective (in our study the fun element is complemented by the assumed usefulness of apps), the invisible part (7/8 of the whole) (ibid.) is "constantly fed by the data that trickle down from the interactions and self-descriptions of the users in the visible part" (Debatin et al., 2009, p. 88).
According to our results, users do try to protect their privacy, but only manage to do so within what is visibly accessible to them (by changing the privacy settings, holding back certain contents, etc.). he hidden part of the data-sharing processes is non-transparent and uncontrollable.Participants said they had a vague idea of the hidden data-sharing processes but were shocked by how much our quasi-experiment revealed.his casts new light on the privacy paradox insofar as we have to consider the virtual impossibility of fully controlling data mining and marketing, aggregation, iltering and re-organization of data for purposes of targeted marketing and risk-evaluation.It seems that only the non-use of geomedia or the strict use of geomedia that resist the trend can one protect one's privacy: the AP (Associated Press) reported in August 2018 that Google saves your location history even if you have paused "location history" on your mobile device. 7But the non-use of geomedia is not the kind of usage pattern we observed.Amongst the participants, Google Maps is the most frequently used app and the number-one tool for navigation, being used by 88.2%.96.7% of these users utilize it for practical reasons, while 60% of the non-users don't use it because of privacy concerns.If we connect these indings with the outcome of the data collected by our research web service, we can demonstrate the enormous role that Google plays.Google can clearly be identiied as one of the dominant players of the actual transformation of everyday life as Google services were the top ive second-level domains to mutually exchange information.As geomedia are "contextualizing communication" (Gryl, Jekel 2012, p. 22), regulating "social behavior and interpersonal communications" (Lapenta 2011) and changing the appropriation of space, the dominance of one big player is to be criticized as it leads to restricted diversity in favor of (Google's own) commercial beneits.
Participants in our study showed a high degree of awareness of the commercial aims behind data-sharing processes; 50% of them were even aware of the full extent of these aims (all items selected).We may argue that general awareness of problems with data collection as part of business models has increased recently due to the GDPR, which came into force on 25 May 2018, and the controversy around Cambridge Analytica.he case of Cambridge Analytica, a company that provided targeted marketing services to corporate but also political clients, and used Facebook data to inluence the 2016 U.S. election, points to the political dimensions of media practices and data-sharing processes.
It could be argued that our study was self-selecting and voluntary, and that the visitors to "he Long Night of Research" were in general highly educated and more aware of the problems with data-sharing processes.his argument is supported by the fact that 46.1% of the participants had a higher school certiicate, and 32.4% held a university degree.Furthermore, one could argue that only people with a certain critical approach to privacy came to our research corner.We think that these arguments are relected in the online questionnaire, but despite our participants having a raised problem awareness, they were still not capable of controlling the hidden data-sharing processes.With this in mind, it can be stated that there is a gap between the ability to determine an appropriate low of geodata and the actual low of data, which is shaped by the platforms business-models and privacy policies.his gap could be seen as an expression of power imbalances between corporations and users.
Examining the geodata shared in diferent contexts, we discovered that contextual factors matter: the contextual usage patterns within the app categories vary signiicantly.Although the majority of people (52.8%) preferred not to share their location in any of the given situations, they did in some cases share a lot of information inadvertently.Depending on contextual factors, people accepted a trade-of between an intrusion into privacy and convenience.Participants were most likely to share their location with their family/partner (22.5%) and when away (20.2%). he contextual privacy approach (Nissenbaum, 2010) can be applied to geomedia and geolocation data.
GDPR may have inluenced the outcome of our study as well, on the one hand by a raised general awareness of privacy as a basic human right, and on the other in a technical way.We found that although the smartphone camera was enabled to access the current location, the GPS data was not included in the Exif (which would normally be the case).Only older (non-updated) versions of sotware provided GPS location when the camera was location-enabled.It appears that recent sotware updates now restrict locational data lows.
Information about the smartphone brands, and therefore of the operating systems running and browsers used, and consequently diferences in data shared, reveals the "socio-material relations" (Jansson, 2018) of smartphone usage patterns.
Pobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58:14 U M C S he relation between awareness of shared geolocation data, the usefulness of apps, the data-sharing processes that result in inadvertent sharing, and subsequent actions are complex.We hope that more research will be done to shed light on these complexities.Due to the limitations of our study, we suggest further, more generalizable, investigation of the ield of (un)wittingly-shared geolocation data in the framework of economics (geomedia business models).Any recommendation for further action to advance privacy-protection mechanisms should be based on three pillars (Debatin 2011): legal regulation, ethical self-regulation (Steinmaurer & Atteneder, 2018), and privacy-enhancing technology.
We may ask whether technological design (or privacy-by-design) could foster privacy capabilities among geomedia users and whether GDPR, despite all the criticism of it, is an important step to regulate data lows.Ethical self-regulation can range from unconsidered and full adoption of geomedia to an absolute refusal to use them.Shaping the world where we live in geomedia requires not only technical knowledge, but also raised awareness and educational eforts in universities and schools, and for company employees.

Fig. 3 :
Fig.3: "contextual factors" (multiple choice) g.I don't have the time to deal with that topic 18.In which of the following situations do you share your location (multiple choice)?a. Normally, I share my location with my family/my partner so that they know exactly who is where.b.I usually share my location with friends (e.g. to arrange an exact meeting place) Pobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58sharing pictures, I usually share my location consciously (GPS) d.Within my professional network, I have to share my current location e.I share my location with my family/my friends/my partner when I'm away f.I share my current routes and performance when doing sports g.In none of the given situations 19.Did you participate in the experiment at the "Long Night of Science 2018"?a. Yes i.Before the experiment, were you aware of sharing data with (hidden) domains when doing a simple search query?you actively protect your personal data on the internet?a. Yes i.Which of the following measures do you take? 1.I consciously change the privacy settings of certain apps 2. I refuse to use certain apps/platforms for privacy reasons 3. I use an encrypted E-Mail service 4. I use a search engine that doesn't track my search behaviour 5. Location services are generally disabled on my smartphone b.No Pobrane z czasopisma Mediatizations Studies http://mediatization.umcs.plData: 15/09/2023 05:58

Mediatizations Studies http://mediatization.umcs.pl
To get relevant information and to stay informed 4. Because otherwise I'm afraid of missing something 5.Because some/most of my friends use these apps 6.Because some/most of my family members use these apps b.No i.For what reasons do you never use these apps? 1.I'm not interested in them 2. I don't know these kinds of apps 3.For privacy reasons (I don't want to share my data) 10.Do you use apps for delivery services (food, etc.)? a. Yes i.For what reasons do you use these apps? 1.Because I ind them useful 2. I use them for my work 3. To get relevant information and to stay informed 4. Because otherwise I'm afraid of missing something 5.Because some/most of my friends use these apps 6.Because some/most of my family members use these apps b.No i.For what reasons do you never use these apps? 1.I'm not interested in them 2. I don't know these kinds of apps 3.For privacy reasons (I don't want to share my Data) 11.Do you know how to share your location on your smartphone (positioning services) a. Yes b.No 12.In your opinion, which of the following apps uses user-data for commercial purposes?Is the camera on your smartphone enabled to access your location?a. Yes b.No c.I don't know 15.Are there apps on your smartphone that you always prevent from accessing your location?a. Yes i.Which ones?b. no 16.Which of the following apps do you allow to access to your location?Please rate the following statements (Scale: 1= totally agree; 5= totally disagree) a.It bothers me that my app-usage behaviour is traceable b.I don't care much about the usage of my data online c.It bothers me that my user-data is shared with "third parties" d.In general, I am fairly concerned about data protection and privacy on the internet e.I don't feel capable of protecting my data online f.I don't have time to be bothered about the topic of privacy