ABSTRACT
This paper presents an exploration and analysis of attitudes towards everyday tracking and recording technologies (e. g., credit cards, store loyalty cards, store video cameras). Interview participants reported being highly concerned with information privacy. At the same time, however, they also reported being significantly less concerned regarding the use of everyday technologies that have the capabilities to collect, process, and disseminate personal information. We present results from this study that both identify and begin to explain this discrepancy.
- Beckmann, C., Consolvo, S. and LaMarca, A. Some Assembly Required: Supporting End-User Sensor Installation in Domestic Ubiquitous Computing Environments. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 107--124.Google Scholar
- Beckwith, R. Designing for Ubiquity: The Perception of Privacy IEEE Pervasive Computing 2(2), 2003, 40--46. Google ScholarDigital Library
- Boslau, M. and Lietke, B. C. RFID is in the Eye of the Consumer - Survey Results and Implications. Marketing from the Trenches: Perspectives on the road ahead. 2006, 1--19.Google Scholar
- Brotherton, J. A. and Abowd, G. D. Lessons Learned from eClass: Assessing Automated Capture and Access in the Classroom. ACM Transactions on Computer-Human Interaction 11 (2), 121--155. Google ScholarDigital Library
- Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J. and Eardley, R. Locating Family Values: A Field Trial of the Whereabouts Clock. UbiComp 2007: Ubiquitous Computing, Seoul, South Korea, 2007, 354--371. Google ScholarDigital Library
- Capgemini. RFID and Consumers: Understanding Their Mindset, 2004.Google Scholar
- Consolvo, S., Rode, J. A., McDonald, D. and Riley, C. Developing Privacy Personas: Handling Inconsistencies in Attitudes & Behaviors, Intel Research Seattle Tech Report, 2005.Google Scholar
- Hayes, G. R., Kientz, J. A., Truong, K. N., White, D. R., Abowd, G. D. and Pering, T. Designing Capture Applications to Support the Education of Children with Autism. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 161--178.Google Scholar
- Hayes, G. R., Poole, E. S., Iachello, G., Patel, S. N., Grimes, A., Abowd, G. D. and Truong, K. N. Physical, Social, and Experiential Knowledge in Pervasive Computing Environments. IEEE Pervasive Computing, 2007, 56--63. Google ScholarDigital Library
- Honess, T. & Charman, E. Closed Circuit Television in Public Places. Police Research Group Crime Prevention Series Paper 35, HMSO, 1992.Google Scholar
- Iachello, G. Privacy and Proportionality. College of Computing, Georgia Institute of Technology, 2006. Google ScholarDigital Library
- I-Newswire. Grocery Store Loyalty Card Use is Strong Despite Privacy Concerns, 2004.Google Scholar
- Jensen, C., Potts, C. and Jensen, C. Privacy Practices of Internet Users: Self-reports Versus Observed Behavior. International Journal of Human-Computer Studies, 63 (1--2). 203--227. Google ScholarDigital Library
- Karas, S. Enhancing the Privacy Discourse: Consumer Information Gathering as Surveillance. Journal of Technology Law and Policy, 7 (1).Google Scholar
- Levine, M. SIDE and Closed Circuit Television (CCTV): Exploring Surveillance in Public Space. Chapter in T. Postmes, R. Spears, M. Lea & S. Reicher (eds): SIDE Issues Centre-Stage: Recent Developments in Studies of Deindividuation in Groups. Royal Netherlands Academy of Arts and Sciences: Amsterdam, 2000.Google Scholar
- Lyon, D. Surveillance Society: Monitoring everyday life. Open University Press, 2001.Google Scholar
- McCarthy, J. F. and Anagnost, T. D. MusicFX: An Arbiter of Group Preferences for Computer Supported Collaborative Workouts. ACM Conference on Computer-Supported Cooperative Work, Seattle, WA, 1998, 363--372. Google ScholarDigital Library
- Mynatt, E. D., Rowan, J., Craighill, S. and Jacobs, A. Digital Family Portraits: Supporting Peace of Mind for Extended Family Members. SIGCHI Conference on Human Factors in Computing Systems, Seattle, WA, 2001, 333--340. Google ScholarDigital Library
- Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. SIGCHI Conference on Human Factors in Computing Systems, Fort Lauderdale, FL, 2003, 129--136. Google ScholarDigital Library
- Patterson, D. J., Liao, L., Gajos, K., Collier, M., Livic, N., Olson, K., Wang, S., Fox, D. and Kautz, H. Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 433--450.Google Scholar
- Schilit, B., Adams, N. and Want, R., Context-Aware Computing Applications. IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, 1994, 85--90. Google ScholarDigital Library
- Smith, H. J., Milberg, S. J. and Burke, S. J. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly, 20 (2). 167--196. Google ScholarDigital Library
- Solove, D. J. The Digital Person: Technology and Privacy in the Information Age. NYU Press, 2004. Google ScholarDigital Library
- Solove, D. J. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy. San Diego Law Review, 2007, 44.Google Scholar
- Spiekermann, S. Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation. UbiComp 2007: Ubiquitous Computing, Innsbruck, Austria, 2007, 56--72. Google ScholarDigital Library
- Truong, K., Abowd, G. and Brotherton, J. Who, What, When, Where, How: Design Issues of Capture & Access Applications Ubicomp 2001: Ubiquitous Computing, 2001, Atlanta, GA, 209--224. Google ScholarDigital Library
- van de Garde-Perik, E., Markopoulos, P., de Ruyter, B., Eggen, B. and Ijsselsteijn, W. Investigating Privacy Attitudes and Behavior in Relation to Personalization. Social Science Computer Review, 26 (1). 20--43. Google ScholarDigital Library
- Want, R. "RFID: A Key to Automating Everything." Scientific American, Jan. 2004, 56--65.Google ScholarCross Ref
- Wild, C. J. and Seber, G. A. F. Chance Encounters: A First Course in Data Analysis and Inference. Wiley, 2000.Google Scholar
- Zureik, E., Harling-Stalker, L., Smith, E., Lyon, D. and Chan, Y. E. Privacy, Surveillance and the Globalization of Personal Information: International Comparisons. McGill-Queen's University Press, Kingston, ON, Canada, Forthcoming 2008.Google Scholar
Recommendations
“It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products
CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing SystemsSmart home products aren’t living up to their promise. They claim to transform the way we live, providing convenience, energy efficiency, and safety. However, the reality is significantly less profound and often frustrating. This is particularly ...
User Perceptions of Smart Home IoT Privacy
Smart home Internet of Things (IoT) devices are rapidly increasing in popularity, with more households including Internet-connected devices that continuously monitor user activities. In this study, we conduct eleven semi-structured interviews with smart ...
Exploring How Privacy and Security Factor into IoT Device Purchase Behavior
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsDespite growing concerns about security and privacy of Internet of Things (IoT) devices, consumers generally do not have access to security and privacy information when purchasing these devices. We interviewed 24 participants about IoT devices they ...
Comments