skip to main content
10.1145/2702123.2702164acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights

Authors Info & Claims
Published:18 April 2015Publication History

ABSTRACT

Most laptops and personal computers have webcams with LED indicators to notify users when they are recording. Because hackers use surreptitiously captured webcam recordings to extort users, we explored the effectiveness of these indicators under varying circumstances and how they could be improved. We observed that, on average, fewer than half of our participants (45%) noticed the existing indicator during computer-based tasks. When seated in front of the computer performing a paper-based task, only 5% noticed the indicator. We performed a followup experiment to evaluate a new indicator and observed that adding onscreen glyphs had a significant impact on both computer-based and non-computer-based tasks (93% and 59% noticed the new indicator, respectively). We discuss how our results can be integrated into current systems, as well as future ubiquitous computing systems.

References

  1. Abowd, G. D., and Mynatt, E. D. Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human Interaction (TOCHI) 7, 1 (2000), 29--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amer, T., and Maris, J.-M. B. Signal Words and Signal Icons in Application Control and Information Technology Exception Messages-Hazard Matching and Habituation Effects. Journal of Information Systems 21, 2 (2007), 1--25.Google ScholarGoogle Scholar
  3. Anderson, N. How an Omniscient Internet "Sextortionist" Ruined the Lives of Teen girls. http://arstechnica.com/tech-policy/2011/09/howan-omniscient-internet-sextortionist-ruinedlives/, September 7 2011. Accessed: September 6, 2014.Google ScholarGoogle Scholar
  4. Anderson, N. Meet the Men Who Spy on Women through Their Webcams. http://arstechnica.com/tech-policy/2013/03/ratbreeders-meet-the-men-who-spy-on-womenthrough-their-webcams/, March 10 2013. Accessed: September 5, 2014.Google ScholarGoogle Scholar
  5. Anliker, U., LUnited Kingdomowicz, P., Troester, G., Schwartz, S. J., and DeVaul, R. W. The WearARM: Modular, High Performance, Low Power Computing Platform Designed for Integration into Everyday Clothing. In Wearable Computers, 2001. Proceedings. Fifth International Symposium on, IEEE (2001), 167--168. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Azuma, R., Baillot, Y., Behringer, R., Feiner, S., Julier, S., and MacIntyre, B. Recent Advances in Augmented Reality. Computer Graphics and Applications, IEEE 21, 6 (2001), 34--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Azuma, R. T., et al. A Survey of Augmented Reality. Presence 6, 4 (1997), 355--385.Google ScholarGoogle Scholar
  8. Bellotti, V., and Sellen, A. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW'93, Springer (1993), 77--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Brocker, M., and Checkoway, S. iSeeYou: Disabling the MacBook Webcam Indicator LED. In Proceedings of the 23rd USENIX Security Symposium, USENIX Association (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Cannella, S., Polivy, D. J., Shin, M., Straub, C., and Tamassia, R. Secure Visualization of Authentication Information: A Case Study. In Visual Languages and Human Centric Computing, 2004 IEEE Symposium on, IEEE (2004), 35--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Chan, M., Campo, E., Est'eve, D., and Fourniols, J.-Y. Smart Homes-Current Features and Future Perspectives. Maturitas 64, 2 (2009), 90--97.Google ScholarGoogle ScholarCross RefCross Ref
  12. Chan, M., Est'eve, D., Escriba, C., and Campo, E. A Review of Smart Homes-Present State and Future Challenges. Computer methods and programs in biomedicine 91, 1 (2008), 55--81. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Check Point Software Technologies Ltd. Are You Being Watched Through Your Webcam? http://www.zonealarm.com/blog/2013/10/are-youbeing-watched-through-your-webcam/, October 2 2013. Accessed: September 6, 2014.Google ScholarGoogle Scholar
  14. Chen, Y., and Jones, G. J. Augmenting Human Memory Using Personal Lifelogs. In Proceedings of the 1st Augmented Human International Conference, ACM (2010), 24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Costanza, E., Inverso, S. A., Pavlov, E., Allen, R., and Maes, P. Eye-q: Eyeglass Peripheral Display for Subtle Intimate Notifications. In Proceedings of the 8th conference on Human-computer interaction with mobile devices and services, ACM (2006), 211--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Cranor, L. F. What Do They Indicate?: Evaluating Security and Privacy Indicators. Interactions 13, 3 (2006), 45--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. DeVaul, R. W., Corey, V. R., et al. The Memory Glasses: Subliminal vs. Overt Memory Support with Imperfect Information. In 2012 16th International Symposium on Wearable Computers, IEEE Computer Society (2003), 146--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Dickie, C., Vertegaal, R., Fono, D., Sohn, C., Chen, D., Cheng, D., Shell, J. S., and Aoudeh, O. Augmenting and Sharing Memory with eyeBlog. In Proceedings of the the 1st ACM workshop on Continuous archival and retrieval of personal experiences, ACM (2004), 105--109. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Dobuzinskis, A. California Man Agrees to Plead Guilty to Extortion of Miss Teen USA. http://www.reuters.com/article/2013/10/31/ususa-missteen-extortion-idUSBRE99U1G520131031, October 31 2013. Accessed: September 5, 2014.Google ScholarGoogle Scholar
  20. Dourish, P., Grinter, R. E., De La Flor, J. D., and Joseph, M. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing 8, 6 (2004), 391--401.Google ScholarGoogle ScholarCross RefCross Ref
  21. Eddy, N. Notebook sales outpace desktop sales. http://www.eweek.com/c/a/Midmarket/NotebookSales-Outpace-Desktop-Sales/, December 24 2008. Accessed: September 9, 2014.Google ScholarGoogle Scholar
  22. Edwards, W. K., and Grinter, R. E. At Home with Ubiquitous Computing: Seven Challenges. In Ubicomp 2001: Ubiquitous Computing, Springer (2001), 256--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Egelman, S., Cranor, L. F., and Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM (2008), 1065--1074. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Egelman, S., Tsai, J., Cranor, L. F., and Acquisti, A. Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM (2009), 319--328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Electronic Frontier Foundation. Laptop Camera Cover Set. https://supporters.eff.org/shop/laptopcamera-cover-set. Accessed: September 6, 2014.Google ScholarGoogle Scholar
  26. Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D. Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, ACM (New York, NY, USA, 2011), 627--638. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Filkins, D. What we left behind. The New Yorker (AprilGoogle ScholarGoogle Scholar
  28. 2014). 28. Frederick, S. Cognitive reflection and decision making. Journal of Economic perspectives (2005), 25--42.Google ScholarGoogle Scholar
  29. Friedman, B., Hurley, D., Howe, D. C., Felten, E., and Nissenbaum, H. Users' conceptions of web security: A comparative study. In CHI '02 Extended Abstracts on Human Factors in Computing Systems, CHI EA '02, ACM (New York, NY, USA, 2002), 746--747. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Hill, K. Lower Merion School District and Blake Robbins Reach a Settlement in Spycamgate. http://www.forbes.com/sites/kashmirhill/2010/ 10/11/lower-merion-school-district-and-blakerobbins-reach-a-settlement-in-spycamgate/, October 11 2010. Accessed: September 9, 2014.Google ScholarGoogle Scholar
  31. Hoyle, R., Templeman, R., Armes, S., Anthony, D., Crandall, D., and Kapadia, A. Privacy Behaviors of Lifeloggers Using Wearable Cameras. In Ubicomp 2014: Ubiquitous Computing (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Kalnikaite, V., Sellen, A., Whittaker, S., and Kirk, D. Now Let Me See Where I Was: Understanding How Lifelogs Mediate Memory. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM (2010), 2045--2054. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Langheinrich, M. Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001: Ubiquitous Computing, Springer (2001), 273--291. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Logitech Forum: Can I Turn off the Red LED? http://forums.logitech.com/t5/Webcams/Can-Iturn-off-red-LED/m-p/277305#M52816. Accessed: 2014-09-06.Google ScholarGoogle Scholar
  35. Palen, L., and Dourish, P. Unpacking Privacy for a Networked World. In Proceedings of the SIGCHI conference on Human factors in computing systems, ACM (2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Patton, J. H., Stanford, M. S., et al. Factor structure of the barratt impulsiveness scale. Journal of clinical psychology 51, 6 (1995), 768--774.Google ScholarGoogle ScholarCross RefCross Ref
  37. Rouse, R. A. Is someone watching you through your webcam? http://campatch.com/wpcontent/uploads/2012/05/CamPatch-AcademyStudy-on-Webcam-Hacking-Awareness-May2012.pdf, May 2012.Google ScholarGoogle Scholar
  38. Schechter, S. E., Dhamija, R., Ozment, A., and Fischer, I. The Emperor's New Security Indicators. In IEEE Symposium on Security and Privacy (2007), 51--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Stewart, D. W., and Martin, I. M. Intended and Unintended consequences of Warning Messages: A Review and Synthesis of Empirical Research. Journal of Public Policy & Marketing (1994), 1--19.Google ScholarGoogle Scholar
  40. Whalen, T., and Inkpen, K. M. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of Graphics Interface 2005, Canadian Human-Computer Communications Society (2005), 137--144. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
          April 2015
          4290 pages
          ISBN:9781450331456
          DOI:10.1145/2702123

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 18 April 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader