skip to main content
10.1145/1409635.1409661acmotherconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

An empirical investigation of concerns of everyday tracking and recording technologies

Published:21 September 2008Publication History

ABSTRACT

This paper presents an exploration and analysis of attitudes towards everyday tracking and recording technologies (e. g., credit cards, store loyalty cards, store video cameras). Interview participants reported being highly concerned with information privacy. At the same time, however, they also reported being significantly less concerned regarding the use of everyday technologies that have the capabilities to collect, process, and disseminate personal information. We present results from this study that both identify and begin to explain this discrepancy.

References

  1. Beckmann, C., Consolvo, S. and LaMarca, A. Some Assembly Required: Supporting End-User Sensor Installation in Domestic Ubiquitous Computing Environments. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 107--124.Google ScholarGoogle Scholar
  2. Beckwith, R. Designing for Ubiquity: The Perception of Privacy IEEE Pervasive Computing 2(2), 2003, 40--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Boslau, M. and Lietke, B. C. RFID is in the Eye of the Consumer - Survey Results and Implications. Marketing from the Trenches: Perspectives on the road ahead. 2006, 1--19.Google ScholarGoogle Scholar
  4. Brotherton, J. A. and Abowd, G. D. Lessons Learned from eClass: Assessing Automated Capture and Access in the Classroom. ACM Transactions on Computer-Human Interaction 11 (2), 121--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J. and Eardley, R. Locating Family Values: A Field Trial of the Whereabouts Clock. UbiComp 2007: Ubiquitous Computing, Seoul, South Korea, 2007, 354--371. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Capgemini. RFID and Consumers: Understanding Their Mindset, 2004.Google ScholarGoogle Scholar
  7. Consolvo, S., Rode, J. A., McDonald, D. and Riley, C. Developing Privacy Personas: Handling Inconsistencies in Attitudes & Behaviors, Intel Research Seattle Tech Report, 2005.Google ScholarGoogle Scholar
  8. Hayes, G. R., Kientz, J. A., Truong, K. N., White, D. R., Abowd, G. D. and Pering, T. Designing Capture Applications to Support the Education of Children with Autism. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 161--178.Google ScholarGoogle Scholar
  9. Hayes, G. R., Poole, E. S., Iachello, G., Patel, S. N., Grimes, A., Abowd, G. D. and Truong, K. N. Physical, Social, and Experiential Knowledge in Pervasive Computing Environments. IEEE Pervasive Computing, 2007, 56--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Honess, T. & Charman, E. Closed Circuit Television in Public Places. Police Research Group Crime Prevention Series Paper 35, HMSO, 1992.Google ScholarGoogle Scholar
  11. Iachello, G. Privacy and Proportionality. College of Computing, Georgia Institute of Technology, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. I-Newswire. Grocery Store Loyalty Card Use is Strong Despite Privacy Concerns, 2004.Google ScholarGoogle Scholar
  13. Jensen, C., Potts, C. and Jensen, C. Privacy Practices of Internet Users: Self-reports Versus Observed Behavior. International Journal of Human-Computer Studies, 63 (1--2). 203--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Karas, S. Enhancing the Privacy Discourse: Consumer Information Gathering as Surveillance. Journal of Technology Law and Policy, 7 (1).Google ScholarGoogle Scholar
  15. Levine, M. SIDE and Closed Circuit Television (CCTV): Exploring Surveillance in Public Space. Chapter in T. Postmes, R. Spears, M. Lea & S. Reicher (eds): SIDE Issues Centre-Stage: Recent Developments in Studies of Deindividuation in Groups. Royal Netherlands Academy of Arts and Sciences: Amsterdam, 2000.Google ScholarGoogle Scholar
  16. Lyon, D. Surveillance Society: Monitoring everyday life. Open University Press, 2001.Google ScholarGoogle Scholar
  17. McCarthy, J. F. and Anagnost, T. D. MusicFX: An Arbiter of Group Preferences for Computer Supported Collaborative Workouts. ACM Conference on Computer-Supported Cooperative Work, Seattle, WA, 1998, 363--372. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mynatt, E. D., Rowan, J., Craighill, S. and Jacobs, A. Digital Family Portraits: Supporting Peace of Mind for Extended Family Members. SIGCHI Conference on Human Factors in Computing Systems, Seattle, WA, 2001, 333--340. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. SIGCHI Conference on Human Factors in Computing Systems, Fort Lauderdale, FL, 2003, 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Patterson, D. J., Liao, L., Gajos, K., Collier, M., Livic, N., Olson, K., Wang, S., Fox, D. and Kautz, H. Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 433--450.Google ScholarGoogle Scholar
  21. Schilit, B., Adams, N. and Want, R., Context-Aware Computing Applications. IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, 1994, 85--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Smith, H. J., Milberg, S. J. and Burke, S. J. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly, 20 (2). 167--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Solove, D. J. The Digital Person: Technology and Privacy in the Information Age. NYU Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Solove, D. J. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy. San Diego Law Review, 2007, 44.Google ScholarGoogle Scholar
  25. Spiekermann, S. Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation. UbiComp 2007: Ubiquitous Computing, Innsbruck, Austria, 2007, 56--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Truong, K., Abowd, G. and Brotherton, J. Who, What, When, Where, How: Design Issues of Capture & Access Applications Ubicomp 2001: Ubiquitous Computing, 2001, Atlanta, GA, 209--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. van de Garde-Perik, E., Markopoulos, P., de Ruyter, B., Eggen, B. and Ijsselsteijn, W. Investigating Privacy Attitudes and Behavior in Relation to Personalization. Social Science Computer Review, 26 (1). 20--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Want, R. "RFID: A Key to Automating Everything." Scientific American, Jan. 2004, 56--65.Google ScholarGoogle ScholarCross RefCross Ref
  29. Wild, C. J. and Seber, G. A. F. Chance Encounters: A First Course in Data Analysis and Inference. Wiley, 2000.Google ScholarGoogle Scholar
  30. Zureik, E., Harling-Stalker, L., Smith, E., Lyon, D. and Chan, Y. E. Privacy, Surveillance and the Globalization of Personal Information: International Comparisons. McGill-Queen's University Press, Kingston, ON, Canada, Forthcoming 2008.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing
    September 2008
    404 pages
    ISBN:9781605581361
    DOI:10.1145/1409635

    Copyright © 2008 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 21 September 2008

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate764of2,912submissions,26%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader