skip to main content
article

The language of privacy: Learning from video media space analysis and design

Published:01 June 2005Publication History
Skip Abstract Section

Abstract

Video media spaces are an excellent crucible for the study of privacy. Their design affords opportunities for misuse, prompts ethical questions, and engenders grave concerns from both users and nonusers. Despite considerable discussion of the privacy problems uncovered in prior work, questions remain as to how to design a privacy-preserving video media space and how to evaluate its effect on privacy. The problem is more deeply rooted than this, however. Privacy is an enormous concept from which a large vocabulary of terms emerges. Disambiguating the meanings of and relationships between these terms facilitates understanding of the link between privacy and design. In this article, we draw from resources in environmental psychology and computer-supported cooperative work (CSCW) to build a broadly and deeply rooted vocabulary for privacy. We relate the vocabulary back to the real and hard problem of designing privacy-preserving video media spaces. In doing so, we facilitate analysis of the privacy-design relationship.

References

  1. Acquisti, A. 2002. Protecting privacy with economics: Economic incentives for preventive technologies in ubiquitous computing environments. In Workshop on Socially-Informed Design of Privacy-Enhancing Solutions in Ubiquitous Computing at Ubicomp.]]Google ScholarGoogle Scholar
  2. Adams, A. 2000. Multimedia information changes the whole privacy ballgame. In Proceedings of Computers, Freedom, and Privacy (CFP 2000) (Toronto, Ont., Canada). ACM, New York, 25--32.]] Google ScholarGoogle Scholar
  3. Adler, P. and Adler, P. 1991. Backboards and Blackboards. Columbia University Press, New York.]]Google ScholarGoogle Scholar
  4. Altman, I. 1975. The Environment and Social Behavior. Brooks/Cole Publishing, Monteray, CA.]]Google ScholarGoogle Scholar
  5. Altman, I. and Chemers, M. 1980. Culture and Environment. Wadsworth Publishing Company, Stanford, CT.]]Google ScholarGoogle Scholar
  6. Angiolillo, J. S., Blanchard, H. E., Israelski, E. W., and Mané, A. 1997. Technology constraints of video-mediated communication. In Video-Mediated Communication, K. Finn, A. Sellen, and S. Wilbur, Eds. Lawrence Erlbaum Associates Publishers, Mahwah, NJ, 51--74.]]Google ScholarGoogle Scholar
  7. Arendt, M. 1958. The Human Condition, University of Chicago Press, Chicago, IL.]]Google ScholarGoogle Scholar
  8. Balfanz, D. and Simon, D. 2000. WindowBox: A simple security model for the connected desktop. In Proceedings of the 4th USENIX Windows Systems Symposium (Seattle, WA), Advanced Computing Systems Association, 37--48.]] Google ScholarGoogle Scholar
  9. Bellotti, V. 1998. Design for privacy in multimedia computing and communication environments. In Technology and Privacy: The New Landscape, P. Agre and M. Rottenberg, Eds. MIT Press, Cambridge, MA, 63--98.]] Google ScholarGoogle Scholar
  10. Benford, S., Greenhalgh, C., Bowers, J., Snowdon, D., and Fahlén, L. E. 1995. User embodiment in collaborative virtual environments. In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI'95) (Denver, CO). ACM, New York, 242--249.]] Google ScholarGoogle Scholar
  11. Boyle, M., Edwards, C., and Greenberg, S. 2000. The effects of filtered video on awareness and privacy. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'00 Philadelphia, PA). ACM Press, New York, NY, 1--10.]] Google ScholarGoogle Scholar
  12. Boyle, M. and Greenberg, S. 2002. GroupLab Collabrary: A Toolkit for Multimedia Groupware. In ACM CSCW 2002 Workshop on Network Services for Groupware, J. Patterson Ed. ACM, New York.]]Google ScholarGoogle Scholar
  13. Brierley-Newell, P. 1995. Perspectives on privacy. J. Environ. Psych. 15, 87--104.]]Google ScholarGoogle Scholar
  14. Brierley-Newell, P. 1998. A cross-cultural comparison of privacy definitions and functions: A systems approach. J. Environ. Psych. 18, 357--371.]]Google ScholarGoogle Scholar
  15. Burkert, H. 1998. Privacy-enhancing technologies: Typology, critique, vision. In Technology and Privacy: The New Landscape, P. Agre and M. Rottenberg, Eds. MIT Press, Cambridge, MA, 125--142.]] Google ScholarGoogle Scholar
  16. Buxton, W. A. S. 1997. Living in augmented reality: Ubiquitous media and reactive environments. In Video-Mediated Communication, K. Finn, A. Sellen, and S. Wilbur, Eds. Lawrence Erlbaum Associates Publishers, Mahwah, NJ, 363--385.]]Google ScholarGoogle Scholar
  17. Clarke, R. 1994. The digital persona and its application to data surveillance. The Inf. Soc. 10, 2, 77--92.]]Google ScholarGoogle Scholar
  18. Cool, C., Fish, R. S., Kraut, R. E., and Lowery, C. M. 1992. Iterative design of video communication systems. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'92) (Toronto, Ont., Canada). ACM, New York, 25--32.]] Google ScholarGoogle Scholar
  19. Coutaz, J., Bérard, F., Carraux, E., and Crowley, J. 1998. Early experience with the mediaspace CoMedi. In Proceedings of the IFIP Working Conference on Engineering for Human-Computer Interaction (EHCI98) (Heraklion). Kluwer Academic Publishers, Dordrecht, 57--72.]] Google ScholarGoogle Scholar
  20. Crowley, J. L., Coutaz, J., and Bérard, F. 2000. Things that see. Commun. ACM, 42, 3 (Mar.), 54--64.]] Google ScholarGoogle Scholar
  21. Dennet, D. 1995. Elbow Room: The Varieties of Free Will Worth Wanting. MIT Press, Cambridge, MA.]]Google ScholarGoogle Scholar
  22. Dourish, P. 1993. Culture and control in a media space. In Proceedings of the 3rd European Conference on Computer-Supported Cooperative Work (ECSCW'93) (Milan, Italy). Kluwer Academic Publishers, Dordrecht, 125--138.]] Google ScholarGoogle Scholar
  23. Dourish, P., Adler, A., Bellotti, V., and Henderson, A. 1996. Your place or mine? Learning from long-term use of audio-video communication. In Computer Supported Cooperative Work: J. Collab. Comput. 5, 1, 33--62.]] Google ScholarGoogle Scholar
  24. Dourish, P. and Bellotti, V. 1992. Awareness and coordination in shared workspaces. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'92) (Toronto, Ont., Canada). ACM, New York, 107--114.]] Google ScholarGoogle Scholar
  25. Dourish, P. and Bly, S. 1992. Portholes: Supporting awareness in a distributed work group. In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI'92) (Monteray). ACM, New York, 541--547.]] Google ScholarGoogle Scholar
  26. Duval, S. and Wicklund, R. 1972. A Theory of Objective Self-Awareness. Academic Press, New York.]]Google ScholarGoogle Scholar
  27. Egido, C. 1990. Teleconferencing as a technology to support cooperative works: Its possibilities and limitations. In Intellectual Teamwork: Social and Technological Foundations of Cooperative Work, J. Galegher, R. Kraut, and C. Egido, Eds. Lawrence Erlbaum Associates Publishers, Hillsdale, NJ, 351--371.]] Google ScholarGoogle Scholar
  28. Fish, R. S., Kraut, R. E., and Chalfonte, B. L. 1990. The VideoWindow system in informal communications. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'90) (Los Angeles, CA). ACM, New York, 1--11.]] Google ScholarGoogle Scholar
  29. Fish, R. S., Kraut, R. E., Rice, R. E., and Root, R. W. 1992. Evaluating video as a technology for informal communication. In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI'92) (Monteray). ACM, New York, 37--48.]] Google ScholarGoogle Scholar
  30. Fitzpatrick, G. 1998. The locales framework: Understanding and designing for co-operative work. Ph.D. dissertation. The University of Queensland.]] Google ScholarGoogle Scholar
  31. Gaver, W. 1992. The affordances of media spaces for collaboration. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'92) (Toronto, Ont., Canada). ACM, New York, 17--24.]] Google ScholarGoogle Scholar
  32. Gaver, W., Moran, T., MacLean, A., Lövstrand, L., Dourish, P., Carter, K., and Buxton, W. 1992. realizing a video environment: EuroPARC's RAVE System. In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI'92) (Monteray). ACM, New York, 27--34.]] Google ScholarGoogle Scholar
  33. Gavison, R. 1980. Privacy and the limits of law. In Yale Law Journal 89, 3 (Jan.), 421--471.]]Google ScholarGoogle Scholar
  34. Goffman, E. 1959. The Presentation of Self in Everyday Life. Doubleday Publishers, Garden City, NY.]]Google ScholarGoogle Scholar
  35. Greenberg S. and Kuzuoka, H. 2000. Using digital but physical surrogates to mediate awareness, communication and privacy in media spaces. Pers. Tech. 4, 1 (Jan.).]]Google ScholarGoogle Scholar
  36. Greenberg, S. and Roseman, M. 2003. Using a room metaphor to ease transitions in groupware. In Sharing Expertise: Beyond Knowledge Management. M. Ackerman, V. Pipek, and V. Wulf, Eds. MIT Press, Cambridge, MA, 203--256.]]Google ScholarGoogle Scholar
  37. Greenberg, S. and Rounding, M. 2001. The Notification collage: Posting information to public and personal displays. In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI 2001) (Seattle, WA). ACM, New York, 515--521.]] Google ScholarGoogle Scholar
  38. Grudin, J. 2001. Desituating action: Digital representation of context. Hum.-Comput. Interact. 16, 2--4, 269--286.]] Google ScholarGoogle Scholar
  39. Grudin, J. 1992. Groupware and cooperative work: Problems and prospects. In Readings in Computer Supported Cooperative Work, R. Baecker Ed. Morgan Kaufmann Publishers, 97--106.]]Google ScholarGoogle Scholar
  40. Hall, E. T. 1966. Distances in Man: The Hidden Dimension. Double day, Garden City, NY.]]Google ScholarGoogle Scholar
  41. Harper, R. H. R. 1996. Why people do and don't wear active badges: A case study. Computer Supported Coop. Work: J. Collab. Comput. 4, 4, 297--318.]] Google ScholarGoogle Scholar
  42. Harrison, S. and Dourish, P. 1996. Re-place-ing space: The roles of place and space and collaborative systems. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'96) (Cambridge, MA). ACM, New York, 67--76.]] Google ScholarGoogle Scholar
  43. Hixon, R. 1987. Privacy in a Public Society: Human Rights in Conflict. Oxford University Press, New York.]]Google ScholarGoogle Scholar
  44. Hochheiser, H. 2002. The platform for privacy preference as a social protocol: An examination within the U.S. policy context. ACM Trans. Internet Tech. 2, 4, 276--306.]] Google ScholarGoogle Scholar
  45. Hudson, S. E. and Smith, I. 1996. Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'96) (Cambridge, MA). ACM, New York, 248--247.]] Google ScholarGoogle Scholar
  46. Jancke, G., Venolia, G. D., Grudin, J., Cadiz, J. J., and Gupta, A. 2001. Linking public spaces: Technical and social issues. In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI 2001) (Seattle, WA). ACM, New York, 530--537.]] Google ScholarGoogle Scholar
  47. Junestrand, S., Keijer, U., and Tollmar, K. 2001. Private and public digital domestic spaces. Internat. J. Human-Comput. Stud. 54, 5 (May), 753--778.]] Google ScholarGoogle Scholar
  48. Kelvin, P. 1973. A social psychological examination of privacy. Brit. J. Soc. Clin. Psych. 12, 284--251.]]Google ScholarGoogle Scholar
  49. Kraut, R., Egidio, C., and Galegher, J. 1990. Patterns of contact and communication in scientific research collaboration. In Intellectual Teamwork: Social and Technological Foundations of Cooperative Work, J. Galegher, R. Kraut, and C. Egido, Eds. Lawrence Erlbaum Associates Publishers, Hillsdale, NJ, 149--171.]] Google ScholarGoogle Scholar
  50. Langheinrich, M. 2001. Privacy by design---Principles of privacy-aware ubiquitous systems. In Proceedings of UbiComp 2001 (Atlanta, CA). Springer, New York, 273--297.]] Google ScholarGoogle Scholar
  51. Lee, A., Girgensohn, A., and Schlueter, K. 1997. NYNEX Portholes: Initial user reactions and redesign implications. In Proceedings of the ACM/SIGGROUP Conference on Groupware (GROUP'97) (Phoenix, AZ). ACM, New York, 385--394.]] Google ScholarGoogle Scholar
  52. Luff. P. and Heath, C. 1998. Mobility in collaboration. In Proceedings of CSCW'98. ACM, New York, 305--314.]] Google ScholarGoogle Scholar
  53. Mantei, M. M., Baecker, R. M., Sellen, A. J., Buxton, W. A. S., Milligan, T., and Wellman, B. 1991. Experiences in the use of a media space. In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI'91, New Orleans). ACM Press, New York, NY, 203--208.]] Google ScholarGoogle Scholar
  54. Moore, G. 1997. Sharing faces, places, and spaces: The ontario telepresence project field studies. In Video-Mediated Communication, K. Finn, A. Sellen, and S. Wilbur, Eds. Lawrence Erlbaum Associates Publishers, Mahwah, NJ, 301--322.]]Google ScholarGoogle Scholar
  55. Nardi, B. A., Kuchinsky, A., Whittaker, S., Leichner, R., and Schwarz, H. 1997. Video-as-data: Technical and social aspects of a collaborative multimedia application. In Video-Mediated Communication, K. Finn, A. Sellen, and S. Wilbur, Eds. Lawrence Erlbaum Associates Publishers, Mahwah, NJ, 487--517.]]Google ScholarGoogle Scholar
  56. Nardi, B., Whittaker, S., and Bradner, E. 2000. Interaction and outeraction: Instant messaging in action. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW 2000) (Philadelphia, PA). ACM Press, New York, 91--97.]] Google ScholarGoogle Scholar
  57. Neustaedter, C. and Greenberg, S. 2003. The design of a context-aware home media space for balancing privacy and awareness. Report 2003-722-25, Department of Computer Science, University of Calgary.]]Google ScholarGoogle Scholar
  58. Neustaedter, C., Greenberg, S., and Boyle, M. 2003. Balancing privacy and awareness for telecommuters using blur filtration. Report 2003-719-22, Department of Computer Science, University of Calgary.]]Google ScholarGoogle Scholar
  59. Olson, M. H. and Bly, S. A. 1991. The Portland experience: A report on a distributed research group. In Computer-Supported Cooperative Work and Groupware, S. Greenberg, Ed., Academic Press, New York, 81--98.]] Google ScholarGoogle Scholar
  60. Palen, L. and Dourish, P. 2003. Unpacking privacy for a networked world. In Proceedings of the Conference on Human Factors in Computing Systems (CHI 2003) (Ft. Lauderdale, FL). ACM, New York, 129--137.]] Google ScholarGoogle Scholar
  61. Posner, R. A. 1981. The economics of privacy. The Amer. Econom. Rev. 71, 2, 405--409.]]Google ScholarGoogle Scholar
  62. Reason, J. 1990. Human Error. Cambridge University Press, New York.]]Google ScholarGoogle Scholar
  63. Rodden, T. 1996. Populating the application: A model of awareness for cooperative applications. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'96) (Cambridge, MA.). ACM, New York, 87--96.]] Google ScholarGoogle Scholar
  64. Root, R. W. 1988. Design of a multi-media vehicle for social browsing. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'88) (Portland, OR). ACM, New York, 25--38.]] Google ScholarGoogle Scholar
  65. Samarajiva, R. 1998. Interactivity as though privacy matters. In Technology and Privacy: The New Landscape, P. Agre and M. Rottenberg, Eds. MIT Press, Cambridge, MA.]] Google ScholarGoogle Scholar
  66. Samuelson, P. 2000. Privacy as intellectual property? In Stanford Law Review, vol. 52. Stanford Univ. School of Law, Stanford CA, 1125--1174.]]Google ScholarGoogle Scholar
  67. Schwartz, B. 1968. The social psychology of privacy. In Amer. J. Soc. 73, 6, 741--752.]]Google ScholarGoogle Scholar
  68. Simmel, G. 1964. The secret and the secret society. In The Sociology of Georg Simmel, K. Wolff Ed. Free Press, New York, 334.]]Google ScholarGoogle Scholar
  69. Simon, H. A. 1996. The Sciences of the Artificial (3rd Ed.). MIT Press, Cambridge, MA.]] Google ScholarGoogle Scholar
  70. Smith, I. and Hudson, S. E. 1995. Low disturbance audio for awareness and privacy in media space applications. In Proceedings of the 3rd ACM International Conference on Multimedia (Multimedia 95) (San Francisco, CA). ACM, New York, 91--97.]] Google ScholarGoogle Scholar
  71. Spiekermann, S., Grossklags, J., and Berendt, B. 2001. E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior. In Proceedings of the 3rd ACM Conference on Electronic Commerce (EC'01) (Tampa, FL). ACM, New York, 38--47.]] Google ScholarGoogle Scholar
  72. Suchman, L. 1987. Plans and situated actions: The problem of human-machine communication. Cambridge University Press, Cambridge, MA.]] Google ScholarGoogle Scholar
  73. Tang, J. C., Isaacs, E. A., and Rua, M. 1994. Supporting distributed groups with a montage of lightweight interactions. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'94) (Chapel Hill, NC). ACM, New York, 23--34.]] Google ScholarGoogle Scholar
  74. Tang, C., McEwan, G., and Greenberg, S. 2003. A taxonomy of tasks and visualisations for casual interaction of multimedia histories. In Proceedings of the Graphics Interface 2003 (GI 2003) (Halifax). Canadian Information Processing Society Mississauga, ON, and A K Peters Limited, Natick, MA.]]Google ScholarGoogle Scholar
  75. Westin, A. 1967. Privacy and Freedom. Atheneum, New York, NY.]]Google ScholarGoogle Scholar
  76. Whittaker, S. 1995. Rethinking video as a technology for interpersonal communications: Theory and design implications. Int. J. Human-Comput. Stud. 42, 5 (May), 501--530.]] Google ScholarGoogle Scholar
  77. Whittaker, S., Frohlich, D., and Daly-Jones, O. 1994. Informal workplace communication: What is it like and how might we support it? In Proceedings of the ACM/SIGCHI Conference on Human Factors in Computing Systems (CHI'94) (Boston, MA). ACM, New York, 131--137.]] Google ScholarGoogle Scholar
  78. Zhao, Q. A. and Stasko, J. T. 1998. Evaluating image filtering based techniques in media space applications. In Proceedings of the Conference on Computer Supported Cooperative Work (CSCW'98) (Seattle, WA). ACM, New York, 11--18.]] Google ScholarGoogle Scholar

Index Terms

  1. The language of privacy: Learning from video media space analysis and design

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader