ABSTRACT
As smartphones and tablets are now widespread, accessing or even sharing sensitive content in public areas has become commonplace. This applies to both personal contexts (e.g. checking banking information in a coffee shop) and professional contexts (e.g. sharing patient information in a hospital ward). It is important to explore ways to support visual privacy that are appropriate for mobile device use in public settings and in dynamic workflows. In this paper we present the design, prototype implementation, and ongoing evaluation of a range of privacy notifications and privacy control mechanisms for tablets. Preliminary results show that: 1) spatial information such as distance and orientation can be used to mediate privacy management for tablet interfaces. 2) Privacy notifications and control mechanisms should be designed to complement our existing physical awareness and protection mechanisms. 3) Selecting a specific design is highly context-dependent.
- Boyle, M., Neustaedter, C., & Greenberg, S. (2009). Privacy factors in video-based media spaces. In Media Space 20+ Years of Mediated Life, 97--122.Google ScholarCross Ref
- Brudy, F., Ledo, D., Greenberg, S., & Butz, A. (2014). Is Anyone Looking? Mitigating Shoulder Surfing on Public Displays through Awareness and Protection. In Proc. International Symposium on Pervasive Displays. Google ScholarDigital Library
- Brunk, B. (2002). Understanding the privacy space. First Monday, 7(10).Google Scholar
- Dourish, P., Grinter, R. E., De La Flor, J. D., & Joseph, M. (2004). Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6), 391--401. Google ScholarCross Ref
- Greenberg, S., Marquardt, N., Ballendat, T., DiazMarino, R., & Wang, M. (2011). Proxemic interactions: the new ubicomp. interactions, 18(1), 42--50. Google ScholarDigital Library
- Iachello, G., & Hong, J. (2007). End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction, 1(1), 1--137. Google ScholarDigital Library
- Lian, S., Hu, W., Song, X., & Liu, Z. (2013). Smart privacy-preserving screen based on multiple sensor fusion. Consumer Electronics, IEEE Transactions on, 59(1), 136--143.Google ScholarCross Ref
- Murphy, A., Reddy, M, & Xu, H. (2014). Privacy practices in collaborative environments: a study of emergency department staff. In Proc. 17th ACM conference on Computer supported cooperative work & social computing, 269--282. Google ScholarDigital Library
- Probst, G. (2000). Analysis of the Effects of Privacy Filter Use on Horizontal Deviations in Posture of VDT Operators (Doctoral dissertation, Virginia Polytechnic Institute and State University).Google Scholar
- Regus. (2014). Business people globally describe their ideal work environment. Retrieved from: press.regus.com/unitedkingdom/download/60669/gbs11theidealworkplaceenvironmentreport_final.pdf.Google Scholar
- Tarasewich, P., Gong, J., & Conlan, R. (2006, April). Protecting private data in public. In CHI'06 Extended Abstracts on Human Factors in Computing Systems, 1409--1414. Google ScholarDigital Library
- Wiedenbeck, S., Waters, J., Sobrado, L., & Birget, J. C. (2006, May). Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proc. Working conference on Advanced visual interfaces, 177--184. ACM Google ScholarDigital Library
Index Terms
- Somebody Is Peeking!: A Proximity and Privacy Aware Tablet Interface
Recommendations
CamForensics: Understanding Visual Privacy Leaks in the Wild
SenSys '17: Proceedings of the 15th ACM Conference on Embedded Network Sensor SystemsMany mobile apps, including augmented-reality games, bar-code readers, and document scanners, digitize information from the physical world by applying computer-vision algorithms to live camera data. However, because camera permissions for existing ...
Privacy protection vs. utility in visual data
Ubiquitous and networked sensors impose a huge challenge for privacy protection which has become an emerging problem of modern society. Protecting the privacy of visual data is particularly important due to the omnipresence of cameras, and various ...
No peeking: privacy-preserving demand response system in smart grids
Cyber-Physical SystemsDemand response DR programs are widely used to balance the supply and demand of electricity in a smart grid. This results in a reliable electric power system. Unfortunately, privacy violation becomes a pressing challenge that drastically affects the DR ...
Comments