ABSTRACT
We developed an inquiry technique, which we called "paratype," based on experience prototyping and event-contingent experience sampling, to survey people in real-life situations about ubiquitous computing (ubicomp) technology. We used this tool to probe the opinions of the conversation partners of users of the Personal Audio Loop, a memory aid that can have a strong impact on their privacy. We present the findings of this study and their implications, specifically the need to broaden public awareness of ubicomp applications and the unfitness of traditional data protection guidelines for tackling the privacy issues of many ubicomp applications. We also point out benefits and methodological issues of paratypes and discuss why they are particularly fit for studying certain classes of mobile and ubicomp applications.
- Abowd G.D., Mynatt E.D. Charting Past, Present and Future Research in Ubiquitous Computing. ACM ToCHI 7, 1 (2000), 29--58. Google ScholarDigital Library
- Ackerman, M., Cranor, L., Reagle, J. Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. Proc. E-Commerce 99, ACM Press (1999), 1--8. Google ScholarDigital Library
- Acquisti, A., Großklags, J. Privacy and Rationality in Individual Decision Making, IEEE Security and Privacy 3, 1 (2005), 26--33. Google ScholarDigital Library
- Altman, I. The Environment and Social Behavior-Privacy, Personal Space, Territory, Crowding. Brooks/Cole Publishing Company, Monterey, CA, 1975. ISBN 0818501685.Google Scholar
- Berendt, B., Günther, O., Spiekermann, S. Privacy in e-commerce: stated preferences vs. actual behavior. Commun. ACM 48, 4 (2005), 101--106. Google ScholarDigital Library
- Buchenau, M., Suri, J.F. Experience Prototyping. Proc. DIS 2000, ACM Press (2000), 424--433. Google ScholarDigital Library
- Christensen, C.M., Anthony, S.D. Roth, E.A. Seeing What's Next: Using Theories of Innovation to Predict Industry Change, Harvard Business School Press: Boston, MA, USA, 2004, p.xi+312. ISBN 1591391857.Google Scholar
- Citro, C.F., Iglen D.R., Marrett C.B. (eds.) Protecting Participants and Facilitating Social and Behavioral Sciences Research. National Academies Press, 2003.Google Scholar
- Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., Powledge, P. Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proc. CHI 2005, ACM Press (2005), 82--90. Google ScholarDigital Library
- Dey, A.K., Salber D., Abowd G.D. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction Journal 16, 2--4 (2001), 97--166. Google ScholarDigital Library
- Dow S., Lee, J., Oezbek, C., MacIntyre, B., Bolter J.D, Gandy, M. Exploring Spatial Narratives and Mixed Reality Experiences in Oakland Cemetery. Proc. ACE'05, ACM Press (2005). Google ScholarDigital Library
- European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Union Official Journal L281 (1995), 31--50.Google Scholar
- Flanagan, J.C. The Critical Incident Technique. Psychological Bulletin 51, 4 (1954), 327--359.Google ScholarCross Ref
- Garfinkel, S. Adopting Fair Information Practices to Low Cost RFID Systems. Proc. Ubicomp 2002 Privacy Workshop (2002).Google Scholar
- Gaver, B., Dunne, T., Pacenti, E. Cultural probes. Interactions: New Visions of Human-Computer Interaction 6, 1, ACM Press (1999), 21--29. Google ScholarDigital Library
- Gemmell, J., Williams, L., Wood, K., Lueder, R., Bell, G. Passive Capture and Ensuing Issues for a Personal Lifetime Store. Proc. CARPE'04, ACM Press (2004), 48--55. Google ScholarDigital Library
- Goffman, E. Behavior in Public Places. Free Press, 1966. ISBN 0029119405.Google Scholar
- Goffman, E. The Presentation of Self in Everyday Life. Anchor Books, 1959. ISBN 0385094027.Google Scholar
- GVU Center, 10th WWW User Survey -- Online Privacy and Security, 1999. http://www.gvu.gatech.edu/user_ surveys/survey-1998-10/graphs/graphs.html#privacy.Google Scholar
- Hayes, G.R., Patel, S.N., Truong, K.N., Iachello, G., Kientz, J.A., Farmer, R. Abowd, G.D. The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid. Proc. Mobile HCI 2004, LNCS 3160, Springer Verlag (2004), 168--179.Google ScholarCross Ref
- Hill, R.A., Dunbar, R.I.M. Social Network Size In Humans. Human Nature 14, 1 (2003), 53--72.Google Scholar
- Hong, J., Landay, J. An Architecture for Privacy-Sensitive Ubiquitous Computing. Proc. MobiSys 2004, ACM Press (2004), 177--189. Google ScholarDigital Library
- Houde, S., Hill, C. "What do prototypes prototype?" Handbook of Human-Computer Interaction (2nd Ed.), Helander M., Landauer T., Prabhu P. (eds.). Elsevier Science B. V. Amsterdam, 1997.Google Scholar
- Hudson J.M., Bruckman, A. Using empirical data to reason about Internet research ethics. Proc. ECSCW '05, Springer Verlag (2005), ISBN 1-4020-4022-9. Google ScholarDigital Library
- Iachello, G., Abowd, G.D. Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing. Proc. CHI 2005, ACM Press (2005), 91--100. Google ScholarDigital Library
- Jiang, X., Hong, J.I., Landay, J.A. Approximate Infor-mation Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. Proc. Ubicomp 2002, LNCS 2498, Springer Verlag (2002), 176--193. Google ScholarDigital Library
- Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Proc. Ubicomp 2001, LNCS 2201, Springer Verlag (2001), 273--291. Google ScholarDigital Library
- Larson, R., Csikszentmihalyi, M. The experience sampling method. New Directions for Methodology of Social and Behavioral Science 15 (1983), 41--56.Google Scholar
- Li, Y., Hong, J., Landay, J. Topiary: A Tool for Prototyping Location-Enhanced Applications. Proc. UIST 2004, ACM Press (2004), 217--226. Google ScholarDigital Library
- Milardo, R. M. Comparative methods for delineating social networks. Journal of Social and Personal Relationships 9 (1992), 447--461.Google ScholarCross Ref
- Nagel, K., Hudson, J., Abowd, G.D. Predictors of availability in home life context-mediated communication, Proc. CSCW'04, ACM Press (2004), 497--506. Google ScholarDigital Library
- Nielsen, J. Usability Engineering. Academic Press, Boston, MA, 1993, p.xiv+358. ISBN 0125184050. Google ScholarDigital Library
- Norman, D. The Invisible Computer. MIT Press, Cambridge, MA, USA, 1999, p.320. ISBN 0262640414. Google ScholarDigital Library
- Palen, L., Dourish, P. Unpacking "Privacy" for a Networked World. Proc. CHI 2003, ACM Press (2003), 129--136. Google ScholarDigital Library
- Suchman, L.A. Plans and Situated Actions: The Problem of Human-Machine Communication. Cambridge University Press (1987) ISBN 0521337399. Google ScholarDigital Library
- Sung-jin, K. Camera Phone to Require Shutter Sound From Next Yr. Korea Times, 11/11/2003.Google Scholar
- Terrell, T., Jacobs A. Privacy, technology, and terrorism: Bartnicki, Kyllo, and the normative struggle behind competing claims to solitude and security. Emory Law Journal 51, 4 (2002), 1469--1511.Google Scholar
- United States Department of Health, Education and Welfare. Records, Computers and the Rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems. 1973.Google Scholar
- United States Video Voyeurism Prevention Act of 2004. 18 USC §1801 et seq.Google Scholar
- Weiser, M. Some Computer Science Problems in Ubiquitous Computing. Commun. ACM 36, 7 ACM Press (1993), 75--84. Google ScholarDigital Library
- Wheeler, L., Rois, H.T. Self-Recording of Everyday Life Events: Origins, Types, and Uses. Journal of Personality 59, 3 (1991), 339--355.Google ScholarCross Ref
Index Terms
- Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world
Recommendations
Learning in Ubiquitous Computing Environments
The application of ubiquitous technologies in the improvement of education strategies is called Ubiquitous Learning. GlobalEdu is a model created to support ubiquitous learning. The model has the necessary support to implement learning-related ...
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04: Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniquesPrivacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on designing for privacy, there are few practical methods for helping ...
Ubiquitous Computing: Are We There Yet?
The widespread deployment of technologies like mobile phones continues to drive new applications and to open research opportunities.
Comments