ABSTRACT
While privacy is often treated as an information centric issue, privacy issues in ubiquitous and mobile computing also encompass physical or territorial aspects, i.e., the right to be left alone or undisturbed. Disturbances that affect privacy often stem from persons nearby and their mobile devices, e.g., ringing phones, loud phone calls, or sounds of mobile games. We propose PriPref Broadcaster, a smartphone-based approach for communicating personal privacy preferences to persons in physical proximity. Our approach further supports automatic adaptation of mobile device settings based on the dominating preferences in the current environment. Results from a usability study and a five-day field trial with 28 participants show that broadcasting privacy preferences is perceived as meaningful and has the potential to support privacy signaling in many everyday situations.
- I. Altman. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, USA, 1975.Google Scholar
- D. Avrahami, D. Gergle, S. E. Hudson, and S. Kiesler. Improving the match between callers and receivers: A study on the effect of contextual information on cell phone interruptions. Behaviour & Information Technology, 26(3):247--259, 2007. Google ScholarDigital Library
- J. P. Birnholtz, C. Gutwin, and K. Hawkey. Privacy in the open: how attention mediates awareness and privacy in open-plan offices. In Proc. Intl. Conf. Supporting Group Work, pages 51--60. ACM, 2007. Google ScholarDigital Library
- S. Bok. Secrets: On the Ethics of Concealment and Revelation. Pantheon Books, 1982.Google Scholar
- M. Boyle and S. Greenberg. The language of privacy: Learning from video media space analysis and design. ACM TOCHI, 12(2):328--370, June 2005. Google ScholarDigital Library
- M. Boyle, C. Neustaedter, and S. Greenberg. Privacy factors in video-based media spaces. In S. Harrision, editor, Media Space 20 + Years of Mediated Life, pages 97--122. Springer, 2009.Google Scholar
- P. Brey. The importance of privacy in the workplace. In S. O. Hansson and E. Palm, editors, Privacy in the Workplace, page 119. European Interuniversity Press, Brussels, 2005.Google Scholar
- M. Brill, S. T. Margulis, and E. Konar. Using Office Design to Increase Productivity, volume 1. Workplace Design and Productivity, 1984.Google Scholar
- A. Cammozzo. TagMeNot -- opt-out for pictures taken in public, Aug. 2014. http://tagmenot.info/ accessed: 2014-08-07.Google Scholar
- R. Chandra, J. Padhye, L. Ravindranath, and A. Wolman. Beacon-stuffing: Wi-fi without associations. In Workshop on Mobile Computing Systems and Applications, pages 53--57. IEEE, 2007. Google ScholarDigital Library
- N. Davies, A. Friday, P. Newman, S. Rutlidge, and O. Storz. Using bluetooth device names to support interaction in smart environments. In Proc. MobiSys '09, pages 151--164. ACM, 2009. Google ScholarDigital Library
- E. De Croon, J. Sluiter, P. P. Kuijer, and M. Frings-Dresen. The effect of office concepts on worker health and performance: a systematic review of the literature. Ergonomics, 48(2):119--134, 2005.Google ScholarCross Ref
- S. Ding. Users' privacy preferences in open plan offices. Facilities, 26(9/10):401--417, July 2008.Google ScholarCross Ref
- L. L. Emberson, G. Lupyan, M. H. Goldstein, and M. J. Spivey. Overheard cell-phone conversations when less speech is more distracting. Psychological Science, Sept. 2010.Google Scholar
- J. Forma and S. A. Kaplowitz. The perceived rudeness of public cell phone behaviour. Behaviour & Information Technology, 31(10):947--952, 2012. Google ScholarDigital Library
- S. Grandhi and Q. Jones. Technology-mediated interruption management. International Journal of Human-Computer Studies, 68(5):288--306, May 2010. Google ScholarDigital Library
- S. A. Grandhi, R. Schuler, and Q. G. Jones. Telling calls: Facilitating mobile phone conversation grounding and management. In Proc. CHI '11, pages 2153--2162. ACM, 2011. Google ScholarDigital Library
- T. Heimann, L. Jaume-Palasi, M. Köbele, M. R. Ulbricht, F. Pallas, J. Schallaböck, M. Senges, and G. Süß. Offlinetags website, Aug. 2014. http://www.offlinetags.net/en/ accessed: 2014-08-07.Google Scholar
- J. Ho and S. S. Intille. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In Proc. CHI '05, pages 909--918. ACM, 2005. Google ScholarDigital Library
- S. E. Hudson and I. Smith. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proc. CSCW '96, pages 248--257. ACM, 1996. Google ScholarDigital Library
- IEEE. 802.11 standard for LAN/MAN, 2012.Google Scholar
- IntelPR. Intel survey finds 'digital over-sharing' is leading mobile etiquette faux pas, May 2012. http://newsroom.intel.com/community/intel_newsroom/blog/2012/05/08/intel-survey-finds-digital-over-sharing-is-leading-mobile-etiquette-faux-pas.Google Scholar
- N. Kern, S. Antifakos, B. Schiele, and A. Schwaninger. A model for human interruptability: Experimental evaluation and automatic estimation from wearable sensors. In Proc. ISWC '04, pages 158--165. IEEE, 2004. Google ScholarDigital Library
- A. Khalil and K. Connelly. Improving cell phone awareness by using calendar information. In M. Costabile and F. Paternò, editors, Proc. of the Intl. Conference on Human-Computer Interaction, volume 3585, pages 588--600. Springer, 2005. Google ScholarDigital Library
- A. Khalil and K. Connelly. Context-aware telephony: Privacy preferences and sharing patterns. In Proc. CSCW '06, pages 469--478. ACM, 2006. Google ScholarDigital Library
- J. Knittel, A. Sahami Shirazi, N. Henze, and A. Schmidt. Utilizing contextual information for mobile communication. In CHI '13 Extended Abstracts, pages 1371--1376. ACM, 2013. Google ScholarDigital Library
- U. König and J. Schallaboeck. Privacy preferences for E-Mail messages. Internet-Draft "draft koenig privicons 04", IETF Network Working Group, 2012.Google Scholar
- B. Könings, D. Piendl, F. Schaub, and M. Weber. PrivacyJudge: effective privacy controls for online published information. In Proc. PASSAT '11, pages 935--941. IEEE, 2011.Google ScholarCross Ref
- B. Könings and F. Schaub. Territorial privacy in ubiquitous computing. In Proc. WONS '11, pages 104--108. IEEE, 2011.Google ScholarCross Ref
- B. Könings, F. Schaub, and M. Weber. PriFi beacons: Piggybacking privacy implications on WiFi beacons. In UbiComp '13 Adjunct, pages 83--86. ACM, 2013. Google ScholarDigital Library
- M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In Proc. UbiComp '02, pages 237--245. Springer, 2002. Google ScholarDigital Library
- C. Laroche, B. Rochon, S. Pelletier, and J. Sasseville. Shoji: Communicating privacy. In CHi '12 Extended Abstracts, pages 1285--1290. ACM, 2012. Google ScholarDigital Library
- J. R. Lewis. IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction, 7(1):57--78, 1995. Google ScholarDigital Library
- C. R. Long and J. R. Averill. Solitude: An exploration of benefits of being alone. Journal for the Theory of Social Behaviour, 33(1):21--44, Mar. 2003.Google ScholarCross Ref
- S. Marti and C. Schmandt. Giving the caller the finger: Collaborative responsibility for cellphone interruptions. In CHI '05 Extended Abstracts, pages 1633--1636. ACM, 2005. Google ScholarDigital Library
- J. Mayer and A. Narayanan. Do not track -- universal web tracking opt out, 2014. http://donottrack.us/, accessed: March 2014.Google Scholar
- A. Monk, J. Carroll, S. Parker, and M. Blythe. Why are mobile phones annoying? Behaviour & Information Technology, 23(1):33--41, 2004. Google ScholarDigital Library
- K. Nagel, C. D. Kidd, T. O'Connell, A. Dey, and G. D. Abowd. The family intercom: Developing a context-aware audio communication system. In Proc. UbiComp '01, pages 176--183. Springer, 2001. Google ScholarDigital Library
- P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux. Secure vehicular communication systems: design and architecture. IEEE Communications Magazine, 46(11):100--109, 2008. Google ScholarDigital Library
- F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H. J. Wang. World-driven access control for continuous sensing. Technical Report MSR-TR-2014-67, Microsoft Research, 2014.Google ScholarDigital Library
- J. I. Rosenbaum. Privacy on the internet: Whose information is it anyway. Jurimetrics, 38:565, 1998.Google Scholar
- S. Rosenthal, A. Dey, and M. Veloso. Using decision-theoretic experience sampling to build personalized mobile phone interruption models. In Proc. Pervasive '11, pages 170--187. Springer, 2011. Google ScholarDigital Library
- R. E. Smith. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Privacy Journal, 2000.Google Scholar
- S. D. Warren and L. D. Brandeis. Right to privacy. Harvard Law Review, 4:193--220, 1890.Google ScholarCross Ref
- A. F. Westin. Privacy and freedom. New York: Atheneum, 1967.Google Scholar
- S. Zulkernain, P. Madiraju, S. I. Ahamed, and K. Stamm. A mobile intelligent interruption management system. Journal of Universal Computer Science, 16(15):2060--2080, 2010.Google Scholar
Index Terms
- PriPref broadcaster: enabling users to broadcast privacy preferences in their physical proximity
Recommendations
A survey of major data privacy laws, languages and approaches in smart cities environments
SCA '19: Proceedings of the 4th International Conference on Smart City ApplicationsNowadays, the adoption of smart cities worldwide is accelerating the digital transformation of urban environments. Besides, a huge amount of data is being exchanged through the smart devices, networks, cloud infrastructure, big data analysis and ...
A Privacy Framework for Personal Self-Improving Smart Spaces
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03There are various critical privacy issues that need to be addressed in the majority of smart space environments. This paper elaborates on the design of a privacy protection framework for Personal Self-Improving Smart Spaces (PSSs), a concept introduced ...
Consistent privacy preferences (CPP): model, semantics, and properties
SAC '08: Proceedings of the 2008 ACM symposium on Applied computingThe Platform for Privacy Preferences (P3P) is a W3C specification that can be used to build useful protocols and services for protecting user privacy on the semantic Web. An outstanding issue is the need for a simple and efficient representation and ...
Comments