ABSTRACT
In this paper, we present the results of an empirical study of perceptions towards pervasive video recording. We describe a commonly used model for understanding information privacy, the Concern for Information Privacy (CFIP) model, and present the ways that this model and its associated questionnaire can shed light on information privacy concerns about pervasive and ubiquitous computing technologies. Specifically, the CFIP model encourages analysis of data across four facets of experience: the collection of personal data, the risk of improper access, the potential for unauthorized secondary use, and the challenge of preventing or correcting errors in the data. We further identify areas not well handled by this model of information privacy and suggest avenues for future work, including research on how and when to notify people about recording technologies, awareness of data provenance and leakage, and understanding of and access to the data assemblage being created about individuals.
- Andrews, S. Privacy and Human Rights in 2002: An International Survey of Privacy Laws and Developments. Electronic Privacy Information Center (2002).Google Scholar
- Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J. and Eardley, R. Locating Family Values: A Field Trial of the Whereabouts Clock. In Proc UbiComp 2007, Springer (2007), 354--371. Google ScholarDigital Library
- Cespedes, F.V. and Smith, H.J. Database Marketing: New Rules for Policy and Practice. Sloan Management Review 34, 4 (1993),, 7--22.Google Scholar
- Clarke, R. Information Technology and Dataveillance. Communications of the ACM 31, 5 (1988), 498--512. Google ScholarDigital Library
- Connelly, K., Khalil, A., and Liu, Y. Do I Do What I Say?: Observed Versus Stated Privacy Preferences. In Proc. INTERACT 2007, Springer (2007), 620--623. Google ScholarDigital Library
- Consolvo, S., Smith, I.E., Matthews, T., LaMarca, A., Tabert, J. and Powledge, P. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In Proc CHI 2005. ACM Press (2005), 81--90. Google ScholarDigital Library
- Dixon, J.A., Levine, M. and McAuley, R. Street Drinking Legislation, CCTV and Public Space: Exploring Attitudes Towards Public Order Measures. Home Office On-Line Report, London, 2003.Google Scholar
- Equifax Inc. Harris-Equifax Consumer Privacy Survey 1992. Equifax Inc., Atlanta, GA, 1992.Google Scholar
- Fox, S. Privacy Implications of Fast, Mobile Internet Access., Pew Research Center, Washington, DC, 2008.Google Scholar
- Goffman, E. The Presentation of Self in Everyday Life. Doubleday (1959).Google Scholar
- Goodwin, C. Professional Vision. American Anthropologist 96, 3 (1994), 606--633.Google ScholarCross Ref
- Honess, T. and Charman, E. Closed Circuit Television in Public Places: Its Acceptability and Perceived Effectiveness. Home Office On-Line Report, London, 1992.Google Scholar
- Hong, J.I. and Landay, J.A. An Architecture for Privacy-Sensitive Ubiquitous Computing. In Proc. MobiSys 2004. ACM Press (2004), 177--189. Google ScholarDigital Library
- Hong, J.I., Ng, J.D., Lederer, S. and Landay, J.A. Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. In Proc DIS 2004. ACM Press (2004), 91--100. Google ScholarDigital Library
- Iachello, G. Privacy and Proportionality. Doctoral Dissertation, Georgia Institute of Technology, Atlanta, GA, 2006. Google ScholarDigital Library
- Iachello, G. and Hong, J. End-User Privacy in Human-Computer Interaction. Foundations and Trends® in Human-Computer Interaction 1, 1 (2007). Google ScholarDigital Library
- Kahneman, D., Krueger, A.B., Schkade, D.A., Schwarz, N. and Stone, A.A. A Survey Method for Characterizing Daily Life Experience: The Day Reconstruction Method. Science 306, 5702 (2004), 1776--1780.Google Scholar
- Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. In Proc. UbiComp 2001, Springer (2001) 273--291. Google ScholarDigital Library
- Laudon, K.C. Dossier Society: Value Choices in the Design of National lnformation Systems, Columbia University Press, New York, 1986. Google ScholarDigital Library
- Lehikoinen, J.T., Lehikoinen, J., and Huuskonen, P. Understanding Privacy Regulation in Ubicomp Interactions. Personal and Ubiquitous Computing 12, 8 (2008), 543--553. Google ScholarDigital Library
- Linowes, D.F. Privacy in America: Is Your Private Life in the Public Eye? University of Illinois Press, Champaign, IL, 1989. Google ScholarDigital Library
- Lyon, D. Surveillance Society: Monitoring Everyday Life. Open University Press, Buckingham, UK, 2001.Google Scholar
- Malhotra, N.K., Kim, S.S. and Agarwal, J. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4 (2004), 336--355. Google ScholarDigital Library
- Massimi, M., Truong, K.N., Dearman, D. and Hayes, G.R. Understanding Recording Technologies in Everyday Life. IEEE Pervasive Computing 9, 3 (2010), 64--71. Google ScholarDigital Library
- Miller, A. Computers and Privacy. In W.M. Hoffman and J.M. Moore (Eds.), Ethics and the Management of Computer Technology. Oelgeschlager, Gunn, and Hain, Cambridge, MA (1982), 93--108.Google Scholar
- Nguyen, D.H., Kobsa, A. and Hayes, G.R. An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies. In Proc. Ubicomp 2008, ACM Press (2008), 182--191. Google ScholarDigital Library
- Nguyen, D.H., Marcu, G., Hayes, G.R., Truong, K.N., Scott, J., Langheinrich, M. and Roduner, C. Encountering SenseCam: Personal Recording Technologies in Everyday Life. In Proc. UbiComp 2009, ACM Press (2009), 165--174. Google ScholarDigital Library
- Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. In Proc. CHI 2003. ACM Press (2003), 129--136. Google ScholarDigital Library
- Privacy Protection Study Commission. Personal Privacy in an lnformation Society: Report of the Privacy Protection Study Commission, U.S. Government Printing Office, Washington, D.C., 1977.Google Scholar
- Smith, H.J. Managing Privacy: lnformation Technology and Organizational America, University of North Carolina Press, Chapel Hill, NC, 1994. Google ScholarDigital Library
- Smith, H.J., Milberg, S.J. and Burke, S.J. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly 20, 2 (1996), 167--196. Google ScholarDigital Library
- Stone, E.F., Gardner, D.G., Gueutal, H.G. and McClure, S. A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations, Journal of Applied Psychology 68, 3 (1983), 459--468.Google ScholarCross Ref
- Tolchinsky, P.D., McCuddy, M.K., Adams, J., Ganster, D.C., Woodman, R.W. and Fromkin, H.L. Employee Perceptions of Invasion of Privacy: A Field Simulation Experiment, Journal of Applied Psychology 66, 3 (1981), 308--313.Google ScholarCross Ref
- Truong, K.N. and Hayes, G.R. Ubiquitous Computing for Capture and Access. Foundations and Trends® in Human-Computer Interaction 2, 2 (2009). Google ScholarDigital Library
- Westin, A.F. Social and Political Dimensions of Privacy. Journal of Social Issues 59, 2 (2003), 431--453.Google ScholarCross Ref
Index Terms
- Situating the concern for information privacy through an empirical study of responses to video recording
Recommendations
The effects of different personal data categories on information privacy concern and disclosure
AbstractThe potential threats of exposing personal data associated with online services have been a reason for concern, and individuals as customers may decline to disclose their data due to trust issues. Literature has shown evidence that ...
A Study on Developing Framework for Information Privacy Protection
ICEC '15: Proceedings of the 17th International Conference on Electronic Commerce 2015Although Information privacy is one of the biggest issues in the enterprises, privacy incidents are relatively increasing because most companies concern privacy protection as a short term project not like an essential factor which needs to be considered ...
The Role of Risk Perceptions in Privacy Concerns Evaluation
TRUSTCOM '15: Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01The collection of information on individual persons for personal data intensive systems and services poses the risk of privacy violations and raises privacy concerns. Individuals' privacy concerns and risk perceptions affect their decision-making on ...
Comments