ABSTRACT
A number of wearable 'lifelogging' camera devices have been released recently, allowing consumers to capture images and other sensor data continuously from a first-person perspective. Unlike traditional cameras that are used deliberately and sporadically, lifelogging devices are always 'on' and automatically capturing images. Such features may challenge users' (and bystanders') expectations about privacy and control of image gathering and dissemination. While lifelogging cameras are growing in popularity, little is known about privacy perceptions of these devices or what kinds of privacy challenges they are likely to create.
To explore how people manage privacy in the context of lifelogging cameras, as well as which kinds of first-person images people consider 'sensitive,' we conducted an in situ user study (N = 36) in which participants wore a lifelogging device for a week, answered questionnaires about the collected images, and participated in an exit interview. Our findings indicate that: 1) some people may prefer to manage privacy through in situ physical control of image collection in order to avoid later burdensome review of all collected images; 2) a combination of factors including time, location, and the objects and people appearing in the photo determines its 'sensitivity;' and 3) people are concerned about the privacy of bystanders, despite reporting almost no opposition or concerns expressed by bystanders over the course of the study.
Supplemental Material
Available for Download
Supplemental material.
- Al-Muhtadi, J., Ranganathan, A., Campbell, R., and Mickunas, M. Cerberus: a context-aware security scheme for smart spaces. In Proceedings of the First IEEE Conference on Pervasive Computing and Communications (2003). Google ScholarDigital Library
- Allen, A. Dredging up the past: Lifelogging, memory, and surveillance. The University of Chicago Law Review (2008), 47--74.Google Scholar
- Anthony, D., Henderson, T., and Kotz, D. Privacy in location-aware computing environments. IEEE Pervasive Computing 6, 4 (2007). Google ScholarDigital Library
- Boutell, M., and Luo, J. Beyond pixels: Exploiting camera metadata for photo classification. Pattern Recognition 38, 6 (June 2005), 935--946. Google ScholarDigital Library
- Caine, K. Exploring everyday privacy behaviors and misclosures. PhD thesis, Georgia Institute of Technology, 2009.Google Scholar
- Chen, Y., and Jones, G. Augmenting human memory using personal lifelogs. In Proceedings of the 1st Augmented Human International Conference (2010). Google ScholarDigital Library
- Cheng, W., Golubchik, L., and Kay, D. Total recall: are privacy changes inevitable? In Proceedings of the the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences (2004). Google ScholarDigital Library
- Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., and Powledge, P. Location disclosure to social relations: Why, when, & what people want to share. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2005). Google ScholarDigital Library
- Crete-Nishihata, M., Baecker, R., Massimi, M., Ptak, D., Campigotto, R., Kaufman, L., Brickman, A., Turner, G., Steinerman, J., and Black, S. Reconstructing the past: personal memory technologies are not just personal and not just for memory. Human--Computer Interaction 27, 1--2 (2012).Google Scholar
- Denning, T., Dehlawi, Z., and Kohno, T. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In International Conference on Human Factors in Computing Systems (2014). Google ScholarDigital Library
- Duan, K., Batra, D., and Crandall, D. A Multi-layer Composite Model for Human Pose Estimation. In Proceedings of the British Machine Vision Conference (BMVC) (2012).Google ScholarCross Ref
- Financial Times - A candid camera that stalked me in the bathroom, Jan. 2014. http://www.ft.com/cms/s/0/d44fc9d6-8756-11e3-ba87-00144feab7de.html (Accessed June 6, 2014).Google Scholar
- Iachello, G., Smith, I., Consolvo, S., Chen, M., and Abowd, G. D. Developing privacy guidelines for social location disclosure applications and services. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (2005), 65--76. Google ScholarDigital Library
- Jana, S., Narayanan, A., and Shmatikov, V. A Scanner Darkly: Protecting user privacy from perceptual applications. In Proceedings of the 34th IEEE Symposium on Security & Privacy (2013). Google ScholarDigital Library
- Kientz, J., Arriaga, R., and Abowd, G. Baby steps: Evaluation of a system to support record-keeping for parents of young children. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2009). Google ScholarDigital Library
- Lee, M., and Dey, A. Lifelogging memory appliance for people with episodic memory impairment. In Proceedings of the 10th International Conference on Ubiquitous Computing (UbiComp) (2008). Google ScholarDigital Library
- Mann, S., Nolan, J., and Wellman, B. Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society 1, 3 (2003).Google Scholar
- Miluzzo, E., Lane, N., Fodor, K., Peterson, R., Lu, H., Musolesi, M., Eisenman, S., Zheng, X., and Campbell, A. Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys) (2008). Google ScholarDigital Library
- New York Times - Shine Starts to Wear Off a Little for Google Glass, May 2013. http://bits.blogs.nytimes.com/2013/05/03/the-shine-starts-wears-off-google-glass/ (Accessed June 6, 2014).Google Scholar
- Nguyen, D., Marcu, G., Hayes, G., Truong, K., Scott, J., Langheinrich, M., and Roduner, C. Encountering SenseCam: Personal recording technologies in everyday life. In Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp) (2009). Google ScholarDigital Library
- NPR All Tech Considered - Cool Or Creepy? A Clip-On Camera Can Capture Every Moment, Feb. 2014. http://www.npr.org/blogs/alltechconsidered/2014/02/24/280733721/cool-or-creepy-a-clip-on-camera-can-capture-every-moment (Accessed June 6, 2014).Google Scholar
- O'Hara, K., Tuffield, M., and Shadbolt, N. Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society 1, 1 (2008), 155--172.Google ScholarCross Ref
- Patil, S., Gall, Y. L., Lee, A. J., and Kapadia, A. My privacy policy: Exploring end-user specification of free-form location access rules. In Proceedings of the Workshop on Usable Security (USEC), vol. 7398 of Lecture Notes in Computer Science, Springer Berlin/Heidelberg (Feb. 2012), 86--97. Google ScholarDigital Library
- Patil, S., Norcie, G., Kapadia, A., and Lee, A. Reasons, rewards, regrets: Privacy considerations in location sharing as an interactive practice. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS) (2012). Google ScholarDigital Library
- Reilly, D., Dearman, D., Ha, V., Smith, I., and Inkpen, K. "Need to know:" examining information need in location discourse. In Proceedings of the 4th International Conference on Pervasive Computing (PERVASIVE) (2006). Google ScholarDigital Library
- Taigman, Y., Yang, M., Ranzato, M., and Wolf, L. Deepface: Closing the gap to human-level performance in face verification. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR) (2014).Google ScholarDigital Library
- Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In 21st Annual Network and Distributed System Security Symposium (NDSS) (2014).Google ScholarCross Ref
- Templeman, R., Rahman, Z., Crandall, D., and Kapadia, A. PlaceRaider: Virtual theft in physical spaces with smartphones. In Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS) (2013).Google Scholar
- Teraoka, T. Organization and exploration of heterogeneous personal data collected in daily life. Human-centric Computing and Information Sciences 2, 1 (2012).Google ScholarCross Ref
- Thomaz, E., Parnami, A., Bidwell, J., Essa, I., and Abowd, G. Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitious Computing (UbiComp) (2013), 739--748. Google ScholarDigital Library
- Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L., Hong, J., and Sadeh, N. Locaccino: A privacy-centric location sharing application. In Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing, UbiComp '10 Adjunct (2010). Google ScholarDigital Library
- Wang, Y., Leon, P., Scott, K., Chen, X., Acquisti, A., and Cranor, L. Privacy nudges for social media: An exploratory facebook study. In Proceedings of the International Conference on World Wide Web (WWW) (2013). Google ScholarDigital Library
Index Terms
- Privacy behaviors of lifeloggers using wearable cameras
Recommendations
Understanding lifelog sharing preferences of lifeloggers
OzCHI '16: Proceedings of the 28th Australian Conference on Computer-Human InteractionThe lifelogging activity enables users, the lifeloggers, to passively capture images using wearable cameras from a first person perspective and ultimately create a visual diary encoding every possible aspect of their life with unprecedented details. ...
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsWhile media reports about wearable cameras have focused on the privacy concerns of bystanders, the perspectives of the `lifeloggers' themselves have not been adequately studied. We report on additional analysis of our previous in-situ lifelogging study ...
Enhancing Lifelogging Privacy by Detecting Screens
CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing SystemsLow-cost, lightweight wearable cameras let us record (or 'lifelog') our lives from a 'first-person' perspective for purposes ranging from fun to therapy. But they also capture private information that people may not want to be recorded, especially if ...
Comments