skip to main content
research-article

Friends Don't Need Receipts: The Curious Case of Social Awareness Streams in the Mobile Payment App Venmo

Published:06 December 2017Publication History
Skip Abstract Section

Abstract

We study the inclusion of a social awareness stream (SAS) in the peer-to-peer payment app Venmo. While SASs are prominent in many social network sites, such as Facebook and Twitter, Venmo's use offers an illustrative example of how SASs can be used in task-oriented apps, particularly in a domain, finance, which people often view as sensitive. Through interviews with 14 Venmo users and surveys of 164 peer-to-peer payment app users and 80 Venmo users, we find uses consistent with other SASs and uncover novel uses that reflect the unusual inclusion of an SAS within a utilitarian app for personal finance. For many users, the SAS is a flexible feature that creates an experience that blends their task-driven use with social benefits. People write purely functional transaction descriptions with strangers, while in transactions with friends, they sometimes craft playful descriptions that enhance their experience or perform their social relationships. The SAS provides opportunities for learning about how to use the application and for keeping up with friends. The results of this study extend the CSCW community's knowledge of SASs and offer guidance to designers considering use of SAS in a variety of applications.

References

  1. Albert Bandura. (1977). Social learning theory. New York: General Learning Press. http://doi.org/d7b266Google ScholarGoogle Scholar
  2. Louise Barkhuus and Anind Dey. (2003). Location-Based Services for Mobile Telephony: A Study of Users' Privacy Concerns. Proceedings of the IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2003), 207--212.Google ScholarGoogle Scholar
  3. Eric P. S. Baumer, Sherri Jean Katz, Jill E. Freeman, Phil Adams, Amy L. Gonzales, JP Pollak, Daniela Retelny, Jeff Niederdeppe, Christine M. Olson, and Geri K. Gay. (2012). Prescriptive Persuasion and Open-Ended Social Awareness: Expanding the Design Space of Mobile Health. Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW 2012), 475--484. http://doi.org/bbkm Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Virginia Braun and Victoria Clarke. (2006). Using Thematic Analysis in Psychology. Qualitative Research in Psychology, 3(2), 77--101. http://doi.org/fswdcxGoogle ScholarGoogle ScholarCross RefCross Ref
  5. Moira Burke, Robert Kraut, and Cameron Marlow. (2011). Social Capital on Facebook: Differentiating Uses and Users. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2011), 571--580. http://doi.org/c67j5w Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Moira Burke, Cameron Marlow, and Thomas Lento. (2009). Feed Me: Motivating Newcomer Contribution in Social Network Sites. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2009), 945--954. http://doi.org/c68cxq Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gina Masullo Chen. (2011). Tweet This: A Uses and Gratifications Perspective on How Active Twitter Use Gratifies a Need to Connect with Others. Computers in Human Behavior, 27, 755--762. http://doi.org/chb3x2 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chia-Fang Chung, Elena Agapie, Jessica Schroeder, Sonali Mishra, James Fogarty, and Sean A. Munson. (2017). When Personal Tracking Becomes Social: Examining the Use of Instagram for Healthy Eating. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2017), 1674--1687. http://doi.org/ccq4 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sunny Consolvo, Katherine Everitt, Ian Smith, and James A. Landay. (2006). Design Requirements for Technologies that Encourage Physical Activity. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2006), 457--466. http://doi.org/b2wmz3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Laura Dabbish, Colleen Stuart, Jason Tsay, and Jim Herbsleb. (2012). Social Coding in GitHub: Transparency and Collaboration in an Open Software Repository. Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW 2012), 1277--1286. http://doi.org/ccq5 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Caitlin Dewey. (2015). Why Would Anyone in Her Right Mind Use Venmo? The Washington Post. https://www.washingtonpost.com/news/the-intersect/wp/2015/02/26/why-would-anyone-in-her-right-mind-use-venmoGoogle ScholarGoogle Scholar
  12. Nicole B. Ellison, Charles Steinfield, and Cliff Lampe. (2007). The Benefits of Facebook "Friends:" Social Capital and College Students' Use of Online Social Network Sites. Journal of Computer-Mediated Communication, 12(4), 1143--1168. http://doi.org/cqv79rGoogle ScholarGoogle ScholarCross RefCross Ref
  13. Daniel A. Epstein, Alan Borning, and James Fogarty. (2013). Fine-Grained Sharing of Sensed Physical Activity: A Value Sensitive Approach. Proceedings of the ACM International Joint Conference on Perasive and Ubiquitous Computing (UbiComp 2013), 489--498. http://doi.org/bdsq Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Daniel A. Epstein, Bradley H. Jacobson, Elizabeth Bales, David W. McDonald, and Sean A. Munson. (2015). From "nobody cares" to "way to go"! A Design Framework for Social Sharing in Personal Informatics. Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2015), 1622--1636. http://doi.org/bbks Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Thomas Erickson and Wendy A. Kellogg. (2000). Social Translucence: an Approach to Designing Systems that Support Social Processes. ACM Transactions on Computer-Human Interaction, 7(1), 59--83. http://doi.org/fc74qk Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Eric Gilbert and Karrie Karahalios. (2009). Predicting Tie Strength with Social Media. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2009), 211--220. http://doi.org/fc65mk Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mark S. Granovetter. (1973). The Strength of Weak Ties. American Journal of Sociology, 8(6), 1360--1380. http://doi.org/bxwqdnGoogle ScholarGoogle ScholarCross RefCross Ref
  18. Alexis Hiniker, Shwetak N. Patel, Tadayoshi Kohno, and Julie A. Kientz. (2016). Why Would You Do That? Predicting the Uses and Gratifications Behind Smartphone-Usage Behaviors. Proceedings of the ACM International Joint Conference on Perasive and Ubiquitous Computing (UbiComp 2016), 634--645. http://doi.org/bqvt Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Giovanni Iachello, Ian Smith, Sunny Consolvo, Gregory D. Abowd, James Howard, Fred Potter, James Scott, Timothy Sohn, Jeffrey Hightower, and Anthony LaMarca. (2005). Control, Deception, and Communication: Evaluating the Deployment of a Location-Enhanced Messaging Service. Proceedings of the International Conference on Ubiquitious Computing (UbiComp 2005), 213--231. http://doi.org/c388m3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Maritza Johnson, Serge Egelman, and Steven M. Bellovin. (2012). Facebook and Privacy: It's Complicated. Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2012), 1--15. http://doi.org/bqvv Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Joseph J. Kaye, Mary McCuistion, Rebecca Gulotta, and David A. Shamma. (2014). Money Talks: Tracking Personal Finances. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), 521--530. http://doi.org/bbdx Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Cliff Lampe, Nicole B. Ellison, and Charles Steinfield. (2008). Changes in Use and Perception of Facebook. Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW 2008), 721--730. http://doi.org/b3zs9h Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Niina Mallat. (2007). Exploring Consumer Adopting of Mobile Payments: A Qualitative Study. Journal of Strategic Information Systems, 16(4), 413--432. http://doi.org/djzzbr Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. JP Mangalindan. (2014). The Payments App Millenials Swear By. Fortune. http://fortune.com/2014/11/04/venmo-makes-payments-easy/Google ScholarGoogle Scholar
  25. Sean A. Munson and Sunny Consolvo. (2012). Exploring Goal-Setting, Rewards, Self-Monitoring, and Sharing to Motivate Physical Activity. Proceedings of the International Conference on Pervasive Computing Technologies for Healthcare (Pervasive Health 2012), 25--32. http://doi.org/bbn8Google ScholarGoogle Scholar
  26. Sean A. Munson, Erin Krupka, Caroline Richardson, and Paul Resnick. (2015). Effects of Public Commitments and Accountability in a Technology-Supported Physical Activity Intervention. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2015), 1135--1144. http://doi.org/bbkw Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Noah Nelson. (2015). The Risky Boom in Carefree Social Payment Apps. http://www.npr.org/sections/alltechconsidered/2015/04/07/398038742/the-risky-boom-in-carefree-social-payment-appsGoogle ScholarGoogle Scholar
  28. H. Nissenbaum. (2004). Privacy as contextual integrity. Washington Law Review, 101--139. http://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/washlr79section=16Google ScholarGoogle Scholar
  29. John Raacke and Jennifer Bonds-Raacke. (2008). MySpace and Facebook: Applying the Uses and Gratifications Theory to Exploring Friend-Networking Sites. CyberPsychology & Behavior, 11(2), 169--74. http://doi.org/ddvwttGoogle ScholarGoogle Scholar
  30. Leena Rao. Venmo Is On Track to Process $20 Billion in Payments Per Year. Fortune.Google ScholarGoogle Scholar
  31. Alan M. Rubin. (1984). Ritualized and Instrumental Television Viewing. Journal of Communication, 34(3), 67--77. http://doi.org/fkmpb4Google ScholarGoogle ScholarCross RefCross Ref
  32. Norman Sadeh, Jason Hong, Lorrie Cranor, Ian Fette, Patrick Kelley, Madhu Prabaker, and Jinghai Rao. (2008). Understanding and Capturing People's Privacy Policies in a Mobile Social Networking Application. Personal and Ubiquitous Computing, 13(6), 401--412. http://doi.org/fkjkwt Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Amit Sharma and Dan Cosley. (2011). Network-Centric Recommendation: Personalization with and in Social Networks. Proceedings of the IEEE Conference on Social Computing (SocialCom 2011). http://doi.org/fzv46sGoogle ScholarGoogle ScholarCross RefCross Ref
  34. Suvi Silfverberg, Lassi A Liikkanen, Airi Lampinen, and South Hall. (2011). "I'll press Play, but I won't listen": Profile Work in a Music-focused Social Network Service. Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW 2014), 207--216. http://doi.org/c6xqvd Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Karen P. Tang, Jialiu Lin, Jason I. Hong, Daniel P. Siewiorek, and Norman Sadeh. (2010). Rethinking Location Sharing: Exploring the Implications of Social-Driven vs. Purpose-Driven Location Sharing. Proceedings of the ACM International Conference on Ubiquitous Computing (UbiComp 2010), 85--94. http://doi.org/chh22s Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Rannie Teodoro and Mor Naaman. (2013). Fitter with Twitter?: Understanding Personal Health and Fitness Activity in Social Media. Proceedings of the International AAAI Conference on Weblogs and Social Media (ICWSM 2013), 611--620. http://sm.rutgers.edu/pubs/Teodoro-FitterTwitter-ICWSM2013.pdfGoogle ScholarGoogle Scholar
  37. Venmo Blog. (2016). Venmo Unveils Most Emoji-Loving Cities in Honor of #WorldEmojiDay. http://blog.venmo.com/2016/7/14/venmo-unveils-most-emoji-loving-cities-in-celebration-of-worldemojidayGoogle ScholarGoogle Scholar
  38. John Vines, Mark Blythe, Paul Dunphy, Vasilis Vlachokyriakos, Isaac Teece, Andrew Monk, and Patrick Oliver. (2012). Cheque Mates: Participatory Design of Digital Payments with Eighty Somethings. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2012), 1189--1198. http://doi.org/bqvx Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. John Vines, Paul Dunphy, Mark Blythe, Stephen Lindsay, Andrew Monk, and Patrick Olivier. (2012). The Joy of Cheques: Trust, Paper and Eighty Somethings. Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW 2012), 147--156. http://doi.org/bqvw Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Yang Wang, Saranga Komanduri, Pedro Giovanni Leon, Gregory Norcie, Alessandro Acquisti, and Lorrie Faith Cranor. (2011). "I regretted the minute I pressed share": A Qualitative Study of Regrets on Facebook. Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2011). http://doi.org/fzz5cq Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Viviana A. Rotman Zelizer. (1997). The Social Meaning of Money. Princeton University Press. http://doi.org/cmtkhwGoogle ScholarGoogle Scholar
  42. Xinyi Zhang, Shiliang Tang, Yun Zhao, Gang Wang, Haitao Zheng, and Ben Y. Zhao. (2017). Cold Hard E-Cash: Friends and Vendors in the Venmo Digital Payments System. Proceedings of the International AAAI Conference on Web and Social Media (ICWSM 2017). http://cs.ucsb.edu/~xyzhang/venmo-icwsm17.pdfGoogle ScholarGoogle Scholar
  43. Xuan Zhao, Niloufar Salehi, Sasha Naranjit, Sara Alwaalan, Stephen Voida, and Dan Cosley. (2013). The Many Faces of Facebook: Experiencing Social Media as Performance, Exhibition, and Personal Archive. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2013), 1--10. http://doi.org/bjjp Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Friends Don't Need Receipts: The Curious Case of Social Awareness Streams in the Mobile Payment App Venmo

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!