skip to main content
10.1145/2632048.2632079acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Privacy behaviors of lifeloggers using wearable cameras

Authors Info & Claims
Published:13 September 2014Publication History

ABSTRACT

A number of wearable 'lifelogging' camera devices have been released recently, allowing consumers to capture images and other sensor data continuously from a first-person perspective. Unlike traditional cameras that are used deliberately and sporadically, lifelogging devices are always 'on' and automatically capturing images. Such features may challenge users' (and bystanders') expectations about privacy and control of image gathering and dissemination. While lifelogging cameras are growing in popularity, little is known about privacy perceptions of these devices or what kinds of privacy challenges they are likely to create.

To explore how people manage privacy in the context of lifelogging cameras, as well as which kinds of first-person images people consider 'sensitive,' we conducted an in situ user study (N = 36) in which participants wore a lifelogging device for a week, answered questionnaires about the collected images, and participated in an exit interview. Our findings indicate that: 1) some people may prefer to manage privacy through in situ physical control of image collection in order to avoid later burdensome review of all collected images; 2) a combination of factors including time, location, and the objects and people appearing in the photo determines its 'sensitivity;' and 3) people are concerned about the privacy of bystanders, despite reporting almost no opposition or concerns expressed by bystanders over the course of the study.

Skip Supplemental Material Section

Supplemental Material

p571-hoyle.mov

mov

110.6 MB

References

  1. Al-Muhtadi, J., Ranganathan, A., Campbell, R., and Mickunas, M. Cerberus: a context-aware security scheme for smart spaces. In Proceedings of the First IEEE Conference on Pervasive Computing and Communications (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Allen, A. Dredging up the past: Lifelogging, memory, and surveillance. The University of Chicago Law Review (2008), 47--74.Google ScholarGoogle Scholar
  3. Anthony, D., Henderson, T., and Kotz, D. Privacy in location-aware computing environments. IEEE Pervasive Computing 6, 4 (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Boutell, M., and Luo, J. Beyond pixels: Exploiting camera metadata for photo classification. Pattern Recognition 38, 6 (June 2005), 935--946. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Caine, K. Exploring everyday privacy behaviors and misclosures. PhD thesis, Georgia Institute of Technology, 2009.Google ScholarGoogle Scholar
  6. Chen, Y., and Jones, G. Augmenting human memory using personal lifelogs. In Proceedings of the 1st Augmented Human International Conference (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cheng, W., Golubchik, L., and Kay, D. Total recall: are privacy changes inevitable? In Proceedings of the the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences (2004). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Crete-Nishihata, M., Baecker, R., Massimi, M., Ptak, D., Campigotto, R., Kaufman, L., Brickman, A., Turner, G., Steinerman, J., and Black, S. Reconstructing the past: personal memory technologies are not just personal and not just for memory. Human--Computer Interaction 27, 1--2 (2012).Google ScholarGoogle Scholar
  10. Denning, T., Dehlawi, Z., and Kohno, T. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In International Conference on Human Factors in Computing Systems (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Duan, K., Batra, D., and Crandall, D. A Multi-layer Composite Model for Human Pose Estimation. In Proceedings of the British Machine Vision Conference (BMVC) (2012).Google ScholarGoogle ScholarCross RefCross Ref
  12. Financial Times - A candid camera that stalked me in the bathroom, Jan. 2014. http://www.ft.com/cms/s/0/d44fc9d6-8756-11e3-ba87-00144feab7de.html (Accessed June 6, 2014).Google ScholarGoogle Scholar
  13. Iachello, G., Smith, I., Consolvo, S., Chen, M., and Abowd, G. D. Developing privacy guidelines for social location disclosure applications and services. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2005), 65--76. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jana, S., Narayanan, A., and Shmatikov, V. A Scanner Darkly: Protecting user privacy from perceptual applications. In Proceedings of the 34th IEEE Symposium on Security & Privacy (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kientz, J., Arriaga, R., and Abowd, G. Baby steps: Evaluation of a system to support record-keeping for parents of young children. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Lee, M., and Dey, A. Lifelogging memory appliance for people with episodic memory impairment. In Proceedings of the 10th International Conference on Ubiquitous Computing (UbiComp) (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Mann, S., Nolan, J., and Wellman, B. Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society 1, 3 (2003).Google ScholarGoogle Scholar
  18. Miluzzo, E., Lane, N., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S., Zheng, X., and Campbell, A. Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys) (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. New York Times - Shine Starts to Wear Off a Little for Google Glass, May 2013. http://bits.blogs.nytimes.com/2013/05/03/the-shine-starts-wears-off-google-glass/ (Accessed June 6, 2014).Google ScholarGoogle Scholar
  20. Nguyen, D., Marcu, G., Hayes, G., Truong, K., Scott, J., Langheinrich, M., and Roduner, C. Encountering SenseCam: Personal recording technologies in everyday life. In Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp) (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. NPR All Tech Considered - Cool Or Creepy? A Clip-On Camera Can Capture Every Moment, Feb. 2014. http://www.npr.org/blogs/alltechconsidered/2014/02/24/280733721/cool-or-creepy-a-clip-on-camera-can-capture-every-moment (Accessed June 6, 2014).Google ScholarGoogle Scholar
  22. O'Hara, K., Tuffield, M., and Shadbolt, N. Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society 1, 1 (2008), 155--172.Google ScholarGoogle ScholarCross RefCross Ref
  23. Patil, S., Gall, Y. L., Lee, A. J., and Kapadia, A. My privacy policy: Exploring end-user specification of free-form location access rules. In Proceedings of the Workshop on Usable Security (USEC), vol. 7398 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg (Feb. 2012), 86--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Patil, S., Norcie, G., Kapadia, A., and Lee, A. Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS) (2012). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Reilly, D., Dearman, D., Ha, V., Smith, I., and Inkpen, K. "Need to know:" examining information need in location discourse. In Proceedings of the 4th International Conference on Pervasive Computing (PERVASIVE) (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Taigman, Y., Yang, M., Ranzato, M., and Wolf, L. Deepface: Closing the gap to human-level performance in face verification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2014).Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In 21st Annual Network and Distributed System Security Symposium (NDSS) (2014).Google ScholarGoogle ScholarCross RefCross Ref
  28. Templeman, R., Rahman, Z., Crandall, D., and Kapadia, A. PlaceRaider: Virtual theft in physical spaces with smartphones. In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS) (2013).Google ScholarGoogle Scholar
  29. Teraoka, T. Organization and exploration of heterogeneous personal data collected in daily life. Human-centric Computing and Information Sciences 2, 1 (2012).Google ScholarGoogle ScholarCross RefCross Ref
  30. Thomaz, E., Parnami, A., Bidwell, J., Essa, I., and Abowd, G. Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitious Computing (UbiComp) (2013), 739--748. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L., Hong, J., and Sadeh, N. Locaccino: A privacy-centric location sharing application. In Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, UbiComp '10 Adjunct (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Wang, Y., Leon, P., Scott, K., Chen, X., Acquisti, A., and Cranor, L. Privacy nudges for social media: An exploratory facebook study. In Proceedings of the International Conference on World Wide Web (WWW) (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy behaviors of lifeloggers using wearable cameras

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        UbiComp '14: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing
        September 2014
        973 pages
        ISBN:9781450329682
        DOI:10.1145/2632048

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 September 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate764of2,912submissions,26%

        Upcoming Conference

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader