skip to main content
10.1145/2702613.2732726acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Work in Progress

Somebody Is Peeking!: A Proximity and Privacy Aware Tablet Interface

Authors Info & Claims
Published:18 April 2015Publication History

ABSTRACT

As smartphones and tablets are now widespread, accessing or even sharing sensitive content in public areas has become commonplace. This applies to both personal contexts (e.g. checking banking information in a coffee shop) and professional contexts (e.g. sharing patient information in a hospital ward). It is important to explore ways to support visual privacy that are appropriate for mobile device use in public settings and in dynamic workflows. In this paper we present the design, prototype implementation, and ongoing evaluation of a range of privacy notifications and privacy control mechanisms for tablets. Preliminary results show that: 1) spatial information such as distance and orientation can be used to mediate privacy management for tablet interfaces. 2) Privacy notifications and control mechanisms should be designed to complement our existing physical awareness and protection mechanisms. 3) Selecting a specific design is highly context-dependent.

References

  1. Boyle, M., Neustaedter, C., & Greenberg, S. (2009). Privacy factors in video-based media spaces. In Media Space 20+ Years of Mediated Life, 97--122.Google ScholarGoogle ScholarCross RefCross Ref
  2. Brudy, F., Ledo, D., Greenberg, S., & Butz, A. (2014). Is Anyone Looking? Mitigating Shoulder Surfing on Public Displays through Awareness and Protection. In Proc. International Symposium on Pervasive Displays. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Brunk, B. (2002). Understanding the privacy space. First Monday, 7(10).Google ScholarGoogle Scholar
  4. Dourish, P., Grinter, R. E., De La Flor, J. D., & Joseph, M. (2004). Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8(6), 391--401. Google ScholarGoogle ScholarCross RefCross Ref
  5. Greenberg, S., Marquardt, N., Ballendat, T., DiazMarino, R., & Wang, M. (2011). Proxemic interactions: the new ubicomp. interactions, 18(1), 42--50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Iachello, G., & Hong, J. (2007). End-user privacy in human-computer interaction. Foundations and Trends in Human-Computer Interaction, 1(1), 1--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Lian, S., Hu, W., Song, X., & Liu, Z. (2013). Smart privacy-preserving screen based on multiple sensor fusion. Consumer Electronics, IEEE Transactions on, 59(1), 136--143.Google ScholarGoogle ScholarCross RefCross Ref
  8. Murphy, A., Reddy, M, & Xu, H. (2014). Privacy practices in collaborative environments: a study of emergency department staff. In Proc. 17th ACM conference on Computer supported cooperative work & social computing, 269--282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Probst, G. (2000). Analysis of the Effects of Privacy Filter Use on Horizontal Deviations in Posture of VDT Operators (Doctoral dissertation, Virginia Polytechnic Institute and State University).Google ScholarGoogle Scholar
  10. Regus. (2014). Business people globally describe their ideal work environment. Retrieved from: press.regus.com/unitedkingdom/download/60669/gbs11theidealworkplaceenvironmentreport_final.pdf.Google ScholarGoogle Scholar
  11. Tarasewich, P., Gong, J., & Conlan, R. (2006, April). Protecting private data in public. In CHI'06 Extended Abstracts on Human Factors in Computing Systems, 1409--1414. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wiedenbeck, S., Waters, J., Sobrado, L., & Birget, J. C. (2006, May). Design and evaluation of a shoulder-surfing resistant graphical password scheme. In Proc. Working conference on Advanced visual interfaces, 177--184. ACM Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Somebody Is Peeking!: A Proximity and Privacy Aware Tablet Interface

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '15: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
      April 2015
      2546 pages
      ISBN:9781450331463
      DOI:10.1145/2702613

      Copyright © 2015 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 April 2015

      Check for updates

      Qualifiers

      • Work in Progress

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader