skip to main content
10.1145/1124772.1124923acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world

Published:22 April 2006Publication History

ABSTRACT

We developed an inquiry technique, which we called "paratype," based on experience prototyping and event-contingent experience sampling, to survey people in real-life situations about ubiquitous computing (ubicomp) technology. We used this tool to probe the opinions of the conversation partners of users of the Personal Audio Loop, a memory aid that can have a strong impact on their privacy. We present the findings of this study and their implications, specifically the need to broaden public awareness of ubicomp applications and the unfitness of traditional data protection guidelines for tackling the privacy issues of many ubicomp applications. We also point out benefits and methodological issues of paratypes and discuss why they are particularly fit for studying certain classes of mobile and ubicomp applications.

References

  1. Abowd G.D., Mynatt E.D. Charting Past, Present and Future Research in Ubiquitous Computing. ACM ToCHI 7, 1 (2000), 29--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ackerman, M., Cranor, L., Reagle, J. Privacy in E-Commerce: Examining User Scenarios and Privacy Preferences. Proc. E-Commerce 99, ACM Press (1999), 1--8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Acquisti, A., Großklags, J. Privacy and Rationality in Individual Decision Making, IEEE Security and Privacy 3, 1 (2005), 26--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Altman, I. The Environment and Social Behavior-Privacy, Personal Space, Territory, Crowding. Brooks/Cole Publishing Company, Monterey, CA, 1975. ISBN 0818501685.Google ScholarGoogle Scholar
  5. Berendt, B., Günther, O., Spiekermann, S. Privacy in e-commerce: stated preferences vs. actual behavior. Commun. ACM 48, 4 (2005), 101--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Buchenau, M., Suri, J.F. Experience Prototyping. Proc. DIS 2000, ACM Press (2000), 424--433. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Christensen, C.M., Anthony, S.D. Roth, E.A. Seeing What's Next: Using Theories of Innovation to Predict Industry Change, Harvard Business School Press: Boston, MA, USA, 2004, p.xi+312. ISBN 1591391857.Google ScholarGoogle Scholar
  8. Citro, C.F., Iglen D.R., Marrett C.B. (eds.) Protecting Participants and Facilitating Social and Behavioral Sciences Research. National Academies Press, 2003.Google ScholarGoogle Scholar
  9. Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., Powledge, P. Location Disclosure to Social Relations: Why, When, & What People Want to Share. Proc. CHI 2005, ACM Press (2005), 82--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dey, A.K., Salber D., Abowd G.D. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Human-Computer Interaction Journal 16, 2--4 (2001), 97--166. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dow S., Lee, J., Oezbek, C., MacIntyre, B., Bolter J.D, Gandy, M. Exploring Spatial Narratives and Mixed Reality Experiences in Oakland Cemetery. Proc. ACE'05, ACM Press (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. European Union Official Journal L281 (1995), 31--50.Google ScholarGoogle Scholar
  13. Flanagan, J.C. The Critical Incident Technique. Psychological Bulletin 51, 4 (1954), 327--359.Google ScholarGoogle ScholarCross RefCross Ref
  14. Garfinkel, S. Adopting Fair Information Practices to Low Cost RFID Systems. Proc. Ubicomp 2002 Privacy Workshop (2002).Google ScholarGoogle Scholar
  15. Gaver, B., Dunne, T., Pacenti, E. Cultural probes. Interactions: New Visions of Human-Computer Interaction 6, 1, ACM Press (1999), 21--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Gemmell, J., Williams, L., Wood, K., Lueder, R., Bell, G. Passive Capture and Ensuing Issues for a Personal Lifetime Store. Proc. CARPE'04, ACM Press (2004), 48--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Goffman, E. Behavior in Public Places. Free Press, 1966. ISBN 0029119405.Google ScholarGoogle Scholar
  18. Goffman, E. The Presentation of Self in Everyday Life. Anchor Books, 1959. ISBN 0385094027.Google ScholarGoogle Scholar
  19. GVU Center, 10th WWW User Survey -- Online Privacy and Security, 1999. http://www.gvu.gatech.edu/user_ surveys/survey-1998-10/graphs/graphs.html#privacy.Google ScholarGoogle Scholar
  20. Hayes, G.R., Patel, S.N., Truong, K.N., Iachello, G., Kientz, J.A., Farmer, R. Abowd, G.D. The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid. Proc. Mobile HCI 2004, LNCS 3160, Springer Verlag (2004), 168--179.Google ScholarGoogle ScholarCross RefCross Ref
  21. Hill, R.A., Dunbar, R.I.M. Social Network Size In Humans. Human Nature 14, 1 (2003), 53--72.Google ScholarGoogle Scholar
  22. Hong, J., Landay, J. An Architecture for Privacy-Sensitive Ubiquitous Computing. Proc. MobiSys 2004, ACM Press (2004), 177--189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Houde, S., Hill, C. "What do prototypes prototype?" Handbook of Human-Computer Interaction (2nd Ed.), Helander M., Landauer T., Prabhu P. (eds.). Elsevier Science B. V. Amsterdam, 1997.Google ScholarGoogle Scholar
  24. Hudson J.M., Bruckman, A. Using empirical data to reason about Internet research ethics. Proc. ECSCW '05, Springer Verlag (2005), ISBN 1-4020-4022-9. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Iachello, G., Abowd, G.D. Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design in Ubiquitous Computing. Proc. CHI 2005, ACM Press (2005), 91--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Jiang, X., Hong, J.I., Landay, J.A. Approximate Infor-mation Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing. Proc. Ubicomp 2002, LNCS 2498, Springer Verlag (2002), 176--193. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Proc. Ubicomp 2001, LNCS 2201, Springer Verlag (2001), 273--291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Larson, R., Csikszentmihalyi, M. The experience sampling method. New Directions for Methodology of Social and Behavioral Science 15 (1983), 41--56.Google ScholarGoogle Scholar
  29. Li, Y., Hong, J., Landay, J. Topiary: A Tool for Prototyping Location-Enhanced Applications. Proc. UIST 2004, ACM Press (2004), 217--226. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Milardo, R. M. Comparative methods for delineating social networks. Journal of Social and Personal Relationships 9 (1992), 447--461.Google ScholarGoogle ScholarCross RefCross Ref
  31. Nagel, K., Hudson, J., Abowd, G.D. Predictors of availability in home life context-mediated communication, Proc. CSCW'04, ACM Press (2004), 497--506. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Nielsen, J. Usability Engineering. Academic Press, Boston, MA, 1993, p.xiv+358. ISBN 0125184050. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Norman, D. The Invisible Computer. MIT Press, Cambridge, MA, USA, 1999, p.320. ISBN 0262640414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Palen, L., Dourish, P. Unpacking "Privacy" for a Networked World. Proc. CHI 2003, ACM Press (2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Suchman, L.A. Plans and Situated Actions: The Problem of Human-Machine Communication. Cambridge University Press (1987) ISBN 0521337399. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Sung-jin, K. Camera Phone to Require Shutter Sound From Next Yr. Korea Times, 11/11/2003.Google ScholarGoogle Scholar
  37. Terrell, T., Jacobs A. Privacy, technology, and terrorism: Bartnicki, Kyllo, and the normative struggle behind competing claims to solitude and security. Emory Law Journal 51, 4 (2002), 1469--1511.Google ScholarGoogle Scholar
  38. United States Department of Health, Education and Welfare. Records, Computers and the Rights of Citizens, Report of the Secretary's Advisory Committee on Automated Personal Data Systems. 1973.Google ScholarGoogle Scholar
  39. United States Video Voyeurism Prevention Act of 2004. 18 USC §1801 et seq.Google ScholarGoogle Scholar
  40. Weiser, M. Some Computer Science Problems in Ubiquitous Computing. Commun. ACM 36, 7 ACM Press (1993), 75--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Wheeler, L., Rois, H.T. Self-Recording of Everyday Life Events: Origins, Types, and Uses. Journal of Personality 59, 3 (1991), 339--355.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
            April 2006
            1353 pages
            ISBN:1595933727
            DOI:10.1145/1124772

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 April 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate6,199of26,314submissions,24%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader