skip to main content
10.1145/2677972.2677978acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmumConference Proceedingsconference-collections
research-article

PriPref broadcaster: enabling users to broadcast privacy preferences in their physical proximity

Published:25 November 2014Publication History

ABSTRACT

While privacy is often treated as an information centric issue, privacy issues in ubiquitous and mobile computing also encompass physical or territorial aspects, i.e., the right to be left alone or undisturbed. Disturbances that affect privacy often stem from persons nearby and their mobile devices, e.g., ringing phones, loud phone calls, or sounds of mobile games. We propose PriPref Broadcaster, a smartphone-based approach for communicating personal privacy preferences to persons in physical proximity. Our approach further supports automatic adaptation of mobile device settings based on the dominating preferences in the current environment. Results from a usability study and a five-day field trial with 28 participants show that broadcasting privacy preferences is perceived as meaningful and has the potential to support privacy signaling in many everyday situations.

References

  1. I. Altman. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, USA, 1975.Google ScholarGoogle Scholar
  2. D. Avrahami, D. Gergle, S. E. Hudson, and S. Kiesler. Improving the match between callers and receivers: A study on the effect of contextual information on cell phone interruptions. Behaviour & Information Technology, 26(3):247--259, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. P. Birnholtz, C. Gutwin, and K. Hawkey. Privacy in the open: how attention mediates awareness and privacy in open-plan offices. In Proc. Intl. Conf. Supporting Group Work, pages 51--60. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Bok. Secrets: On the Ethics of Concealment and Revelation. Pantheon Books, 1982.Google ScholarGoogle Scholar
  5. M. Boyle and S. Greenberg. The language of privacy: Learning from video media space analysis and design. ACM TOCHI, 12(2):328--370, June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Boyle, C. Neustaedter, and S. Greenberg. Privacy factors in video-based media spaces. In S. Harrision, editor, Media Space 20 + Years of Mediated Life, pages 97--122. Springer, 2009.Google ScholarGoogle Scholar
  7. P. Brey. The importance of privacy in the workplace. In S. O. Hansson and E. Palm, editors, Privacy in the Workplace, page 119. European Interuniversity Press, Brussels, 2005.Google ScholarGoogle Scholar
  8. M. Brill, S. T. Margulis, and E. Konar. Using Office Design to Increase Productivity, volume 1. Workplace Design and Productivity, 1984.Google ScholarGoogle Scholar
  9. A. Cammozzo. TagMeNot -- opt-out for pictures taken in public, Aug. 2014. http://tagmenot.info/ accessed: 2014-08-07.Google ScholarGoogle Scholar
  10. R. Chandra, J. Padhye, L. Ravindranath, and A. Wolman. Beacon-stuffing: Wi-fi without associations. In Workshop on Mobile Computing Systems and Applications, pages 53--57. IEEE, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. N. Davies, A. Friday, P. Newman, S. Rutlidge, and O. Storz. Using bluetooth device names to support interaction in smart environments. In Proc. MobiSys '09, pages 151--164. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. De Croon, J. Sluiter, P. P. Kuijer, and M. Frings-Dresen. The effect of office concepts on worker health and performance: a systematic review of the literature. Ergonomics, 48(2):119--134, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  13. S. Ding. Users' privacy preferences in open plan offices. Facilities, 26(9/10):401--417, July 2008.Google ScholarGoogle ScholarCross RefCross Ref
  14. L. L. Emberson, G. Lupyan, M. H. Goldstein, and M. J. Spivey. Overheard cell-phone conversations when less speech is more distracting. Psychological Science, Sept. 2010.Google ScholarGoogle Scholar
  15. J. Forma and S. A. Kaplowitz. The perceived rudeness of public cell phone behaviour. Behaviour & Information Technology, 31(10):947--952, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Grandhi and Q. Jones. Technology-mediated interruption management. International Journal of Human-Computer Studies, 68(5):288--306, May 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. A. Grandhi, R. Schuler, and Q. G. Jones. Telling calls: Facilitating mobile phone conversation grounding and management. In Proc. CHI '11, pages 2153--2162. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Heimann, L. Jaume-Palasi, M. Köbele, M. R. Ulbricht, F. Pallas, J. Schallaböck, M. Senges, and G. Süß. Offlinetags website, Aug. 2014. http://www.offlinetags.net/en/ accessed: 2014-08-07.Google ScholarGoogle Scholar
  19. J. Ho and S. S. Intille. Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In Proc. CHI '05, pages 909--918. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. E. Hudson and I. Smith. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proc. CSCW '96, pages 248--257. ACM, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. IEEE. 802.11 standard for LAN/MAN, 2012.Google ScholarGoogle Scholar
  22. IntelPR. Intel survey finds 'digital over-sharing' is leading mobile etiquette faux pas, May 2012. http://newsroom.intel.com/community/intel_newsroom/blog/2012/05/08/intel-survey-finds-digital-over-sharing-is-leading-mobile-etiquette-faux-pas.Google ScholarGoogle Scholar
  23. N. Kern, S. Antifakos, B. Schiele, and A. Schwaninger. A model for human interruptability: Experimental evaluation and automatic estimation from wearable sensors. In Proc. ISWC '04, pages 158--165. IEEE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. A. Khalil and K. Connelly. Improving cell phone awareness by using calendar information. In M. Costabile and F. Paternò, editors, Proc. of the Intl. Conference on Human-Computer Interaction, volume 3585, pages 588--600. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Khalil and K. Connelly. Context-aware telephony: Privacy preferences and sharing patterns. In Proc. CSCW '06, pages 469--478. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. J. Knittel, A. Sahami Shirazi, N. Henze, and A. Schmidt. Utilizing contextual information for mobile communication. In CHI '13 Extended Abstracts, pages 1371--1376. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. U. König and J. Schallaboeck. Privacy preferences for E-Mail messages. Internet-Draft "draft koenig privicons 04", IETF Network Working Group, 2012.Google ScholarGoogle Scholar
  28. B. Könings, D. Piendl, F. Schaub, and M. Weber. PrivacyJudge: effective privacy controls for online published information. In Proc. PASSAT '11, pages 935--941. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  29. B. Könings and F. Schaub. Territorial privacy in ubiquitous computing. In Proc. WONS '11, pages 104--108. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  30. B. Könings, F. Schaub, and M. Weber. PriFi beacons: Piggybacking privacy implications on WiFi beacons. In UbiComp '13 Adjunct, pages 83--86. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. M. Langheinrich. A privacy awareness system for ubiquitous computing environments. In Proc. UbiComp '02, pages 237--245. Springer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. C. Laroche, B. Rochon, S. Pelletier, and J. Sasseville. Shoji: Communicating privacy. In CHi '12 Extended Abstracts, pages 1285--1290. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. J. R. Lewis. IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction, 7(1):57--78, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. C. R. Long and J. R. Averill. Solitude: An exploration of benefits of being alone. Journal for the Theory of Social Behaviour, 33(1):21--44, Mar. 2003.Google ScholarGoogle ScholarCross RefCross Ref
  35. S. Marti and C. Schmandt. Giving the caller the finger: Collaborative responsibility for cellphone interruptions. In CHI '05 Extended Abstracts, pages 1633--1636. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. J. Mayer and A. Narayanan. Do not track -- universal web tracking opt out, 2014. http://donottrack.us/, accessed: March 2014.Google ScholarGoogle Scholar
  37. A. Monk, J. Carroll, S. Parker, and M. Blythe. Why are mobile phones annoying? Behaviour & Information Technology, 23(1):33--41, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. K. Nagel, C. D. Kidd, T. O'Connell, A. Dey, and G. D. Abowd. The family intercom: Developing a context-aware audio communication system. In Proc. UbiComp '01, pages 176--183. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. P. Papadimitratos, L. Buttyan, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P. Hubaux. Secure vehicular communication systems: design and architecture. IEEE Communications Magazine, 46(11):100--109, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H. J. Wang. World-driven access control for continuous sensing. Technical Report MSR-TR-2014-67, Microsoft Research, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. J. I. Rosenbaum. Privacy on the internet: Whose information is it anyway. Jurimetrics, 38:565, 1998.Google ScholarGoogle Scholar
  42. S. Rosenthal, A. Dey, and M. Veloso. Using decision-theoretic experience sampling to build personalized mobile phone interruption models. In Proc. Pervasive '11, pages 170--187. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. R. E. Smith. Ben Franklin's Web Site: Privacy and Curiosity from Plymouth Rock to the Internet. Privacy Journal, 2000.Google ScholarGoogle Scholar
  44. S. D. Warren and L. D. Brandeis. Right to privacy. Harvard Law Review, 4:193--220, 1890.Google ScholarGoogle ScholarCross RefCross Ref
  45. A. F. Westin. Privacy and freedom. New York: Atheneum, 1967.Google ScholarGoogle Scholar
  46. S. Zulkernain, P. Madiraju, S. I. Ahamed, and K. Stamm. A mobile intelligent interruption management system. Journal of Universal Computer Science, 16(15):2060--2080, 2010.Google ScholarGoogle Scholar

Index Terms

  1. PriPref broadcaster: enabling users to broadcast privacy preferences in their physical proximity

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        MUM '14: Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia
        November 2014
        275 pages
        ISBN:9781450333047
        DOI:10.1145/2677972

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 November 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate190of465submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader