skip to main content
10.1145/3290605.3300275acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry

Authors Info & Claims
Published:02 May 2019Publication History

ABSTRACT

Through a design-led inquiry focused on smart home security cameras, this research develops three key concepts for research and design pertaining to new and emerging digital consumer technologies. Digital leakage names the propensity for digital information to be shared, stolen, and misused in ways unbeknownst or even harmful to those to whom the data pertains or belongs. Hole-and-corner applications are those functions connected to users' data, devices, and interactions yet concealed from or downplayed to them, often because they are non-beneficial or harmful to them. Foot-in-the-door devices are product and services with functional offerings and affordances that work to normalize and integrate a technology, thus laying groundwork for future adoption of features that might have earlier been rejected as unacceptable or unnecessary. Developed and illustrated through a set of design studies and explorations, this paper shows how these concepts may be used analytically to investigate issues such as privacy and security, anticipatorily to speculate about the future of technology development and use, and generatively to synthesize design concepts and solutions.

References

  1. Akrich, Madeleine. "The De-Scription of Technical Objects," 1992.Google ScholarGoogle Scholar
  2. Ahmed, Nova, Sadd Azmeen Ur Rahman, Rahat Jahangir Rony, Tanvir Mushfique, and Vikram Mehta. "Protibadinext: Sensor Support to Handle Sexual Harassment." In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, 918--921. UbiComp '16. New York, NY, USA: ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Aipperspach, Ryan, Ben Hooker, and Allison Woodruff. "The Heterogeneous Home." In Proceedings of the 10th International Conference on Ubiquitous Computing, 222--231. UbiComp '08. New York, NY, USA: ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., and Feamster, N. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. Arxiv, 2017. https://arxiv.org/abs/1708.05044Google ScholarGoogle Scholar
  5. Astor, Maggie. "Your Roomba May Be Mapping Your Home, Collecting Data That Could Be Shared." The New York Times, January 20, 2018, sec. Technology. https://www.nytimes.com/2017/07/25/technology/roomba-irobot-data-privacy.html.Google ScholarGoogle Scholar
  6. Baumer, Eric PS. "Usees." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 3295--3298. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Beattie, Scott, Carolyn Woodley, and Kay Souter. "Creepy Analytics and Learner Data Rights." Rhetoric and Reality: Critical Perspectives on Educational Technology. Proceedings Ascilite, 2014, 421--425.Google ScholarGoogle Scholar
  8. Biddle, Sam. "Troubling Study Says Artificial Intelligence Can Predict Who Will Be Criminals Based on Facial Features." The Intercept (blog), November 18, 2016. https://theintercept.com/2016/11/18/troubling-study-says-artificial-intelligence-can-predict-who-will-be-criminals-based-on-facial-features/.Google ScholarGoogle Scholar
  9. Blackwell, Lindsay, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. "LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure During Shifting Social Movements." In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 610--622. CHI '16. New York, NY, USA: ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Boing Boing."Chinese Jaywalkers Are Identified and Shamed by Facial Recognition, and Now They'll Get Warnings over Text Message." Boing Boing. Accessed September 17, 2018. https://boingboing.net/2018/03/28/chinese-jaywalkers-are-identif.html.Google ScholarGoogle Scholar
  11. Boucher, Andy, David Cameron, and Nadine Jarvis. "Power to the People: Dynamic Energy Management through Communal Cooperation." In Proceedings of the Designing Interactive Systems Conference, 612--620. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Blythe, Mark, Jamie Steane, Jenny Roe, and Caroline Oliver. "Solutionism, the Game: Design Fictions for Positive Aging." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 3849--3858. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Brunton, Finn, and Helen Nissenbaum. Obfuscation: A User's Guide for Privacy and Protest. Mit Press, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Brunton, Finn, and Helen Nissenbaum. "Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation." First Monday 16, no. 5 (2011).Google ScholarGoogle Scholar
  15. Chesney, Robert and Danielle Citron. "Deep Fakes: A Looming Crisis for National Security, Democracy and Privacy? - Lawfare." Accessed September 19, 2018. https://www.lawfareblog.com/deep-fakes-looming-crisis-national-security-democracy-and-privacy.Google ScholarGoogle Scholar
  16. Cialdini, R.B.; Vincent, J.E.; Lewis, S.K.; Catalan, J.; Wheeler, D.; Darby, B. L. (1975). "Reciprocal concessions procedure for inducing compliance: the door-in-the-face technique". Journal of Personality and Social Psychology. 31: 206--215.Google ScholarGoogle Scholar
  17. Cila, Nazli, Iskander Smit, Elisa Giaccardi, and Ben Kröse. "Products As Agents: Metaphors for Designing the Products of the IoT Age." In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 448--459. CHI '17. New York, NY, USA: ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Citron, Danielle Keats. Hate Crimes in Cyberspace. Harvard University Press, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Cole, Robert. Google Eric Schmidt - The Creepy Line (Edited). Accessed September 17, 2018. https://www.youtube.com/watch?v=mpmOL-MT5lQ.Google ScholarGoogle Scholar
  20. Clifford, Stephanie and Quenin Hardy. "Attention, Shoppers: Store Is Tracking Your Cell - The New York Times." Accessed September 17, 2018. https://www.nytimes.com/2013/07/15/business/attention-shopper-stores-are-tracking-your-cell.htmlGoogle ScholarGoogle Scholar
  21. Cumbley, Richard, and Peter Church. "Is 'Big Data' Creepy?" Computer Law & Security Review 29, no. 5 (2013): 601--609.Google ScholarGoogle ScholarCross RefCross Ref
  22. Diamond, Jared. Collapse: How Societies Choose to Fail or Succeed. Penguin, 2005.Google ScholarGoogle Scholar
  23. Das, Sauvik, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1416--1426. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Egelman. Serge, Lorrie Faith Cranor, and Jason Hong. 2008. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '08), 1065--1074.: Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Dourish, Paul and Ken Anderson. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction 21, 3: 319--342. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Ferguson, Andrew Guthrie. The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement. NYU Press, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  27. Sarah E. Fox, Rafael M.L. Silva, and Daniela K. Rosner. 2018. Beyond the Prototype: Maintenance, Collective Responsibility, and Public IoT. In Proceedings of the 2018 Designing Interactive Systems Conference (DIS '18). ACM, New York, NY, USA, 21--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Freedman, J. L.; Fraser, S. C. (1966). "Compliance without pressure: The foot-in-the-door technique". Journal of Personality and Social Psychology. 4 (2): 195--202.Google ScholarGoogle Scholar
  29. Gaver, William. "What Should We Expect from Research through Design?" In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 937--946. ACM, 2012 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Gaver, William. "Making Spaces: How Design Workbooks Work." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1551--1560. CHI '11. New York, NY, USA: ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Giaccardi, Elisa, Nazli Cila, Chris Speed, and Melissa Caldwell. "Thing Ethnography: Doing Design Research with Non-Humans." In Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 377--387. DIS '16. New York, NY, USA: ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Goldschmidt, Gabriela, Hagay Hochman, and Itay Dafni. "The Design Studio 'Crit': Teacher--Student Communication." AI EDAM 24, no. 3 (August 2010): 285--302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Haiyan Jia, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing - CSCW '15, 583--599. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Hauser, Sabrina, Doenja Oogjes, Ron Wakkary, and Peter-Paul Verbeek. "An Annotated Portfolio on Doing Postphenomenology Through Research Products." In Proceedings of the 2018 on Designing Interactive Systems Conference 2018, 459--471. ACM, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Harvey, Adam. "CV Dazzle: Camouflage from Face Detection." Accessed September 17, 2018. https://cvdazzle.com/.Google ScholarGoogle Scholar
  36. Healy, John. "The Components of the" Crit" in Art and Design Education." Irish Journal of Academic Practice 5, no. 1 (2016): 7.Google ScholarGoogle Scholar
  37. Hu, Tung-Hui. A Prehistory of the Cloud, 2015. Cambridge MA, MIT Press, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Jenkins, Tom. "Cohousing IoT: Design Prototyping for Community Life." In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction, 667--673. ACM, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Jones, Rhett. "Roomba's Next Big Step Is Selling Maps of Your Home to the Highest Bidder." Accessed September 17, 2018. https://gizmodo.com/roombas-next-big-step-is-selling-maps-of-your-home-to-t-1797187829.Google ScholarGoogle Scholar
  40. Kopytoff, Verne. "The Real Reason Google Paid $3.2 Billion For Nest." Time. Accessed September 18, 2018. http://business.time.com/2014/01/14/the-real-reason-google-paid-3--2-billion-for-nest/Google ScholarGoogle Scholar
  41. Krishnamurthy, Balachander, and Craig E. Wills. "Generating a Privacy Footprint on the Internet." In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 65--70. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Lentricchia, Frank, and Andrew DuBois. Close Reading: The Reader. Duke University Press Durham, NC, 2003.Google ScholarGoogle Scholar
  43. Liu, Jen, Daragh Byrne, and Laura Devendorf. "Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 40. ACM, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Lin, Jialiu, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. "Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy through Crowdsourcing." In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 501--510. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Lindley, Joseph, Paul Coulton and Rachel Cooper. Why the Internet of Things needs Object Orientated Ontology, The Design Journal, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  46. Ma, Alexandra. "These Are the Things That Can Get You Punished under China's Creepy "social Credit' System - from Fake News to Jaywalking." Business Insider. Accessed September 17, 2018. https://www.businessinsider.com/china-social-credit-system-things-you-can-do-wrong-and-punishments-2018--4.Google ScholarGoogle Scholar
  47. Neurospeculative afro-feminism. "Nsaf." Accessed September 17, 2018. http://www.hyphen-labs.com/nsaf.html.Google ScholarGoogle Scholar
  48. Nest.com."Privacy Statement for Nest Products and Services." Nest. Accessed January 6, 2018. https://www.nest.com/legal/privacy-statement-for-nest-products-and-services/Google ScholarGoogle Scholar
  49. Nest.com."The Nestie Awards, Year Two | Nest." Accessed December 22, 2017. https://nest.com/blog/2017/03/08/the-nestie-awards-year-two/.Google ScholarGoogle Scholar
  50. Nest.com. "Video | Nest." Accessed December 22, 2017. https://nest.com/video/category/security/Google ScholarGoogle Scholar
  51. Nest. "Support." Nest. Accessed September 19, 2018. https://www.nest.com/support/article/.Google ScholarGoogle Scholar
  52. Nissenbaum, Helen. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. NMSBA. "NMSBA - What Is Neuromarketing." Accessed September 17, 2018. http://www.nmsba.com/what-is-neuromarketing.Google ScholarGoogle Scholar
  54. Oxford dictionary, "Creepy | Definition of Creepy in US English by Oxford Dictionaries." Oxford Dictionaries | English. Accessed September 17, 2018. https://en.oxforddictionaries.com/definition/us/creepy.Google ScholarGoogle Scholar
  55. Pater, Jessica A., Moon K. Kim, Elizabeth D. Mynatt, and Casey Fiesler. "Characterizations of Online Harassment: Comparing Policies across Social Media Platforms." In Proceedings of the 19th International Conference on Supporting Group Work, 369--374. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Pierce, James. "On the Presentation and Production of Design Research Artifacts in HCI." In Proceedings of the 2014 Conference on Designing Interactive Systems, 735--744. ACM, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Pierce, James, and Carl DiSalvo. "Addressing Network Anxieties with Alternative Design Metaphors." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 549. ACM, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Pierce, James, and Carl DiSalvo. "Dark Clouds, Io&#!+, and {Crystal Ball Emoji}: Projecting Network Anxieties with Alternative Design Metaphors." In Proceedings of the 2017 Conference on Designing Interactive Systems, 1383--1393. ACM, 2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Rosner, Daniela K., Miwa Ikemiya, Diana Kim, and Kristin Koch. "Designing with Traces." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1649--1658. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Schön, Donald A. "The Architectural Studio as an Exemplar of Education for Reflection-in-Action." Journal of Architectural Education 38, no. 1 (1984): 2--9.Google ScholarGoogle ScholarCross RefCross Ref
  61. Schüll, Natasha Dow. Addiction by Design: Machine Gambling in Las Vegas. Princeton University Press, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Sheperd, Mark. "Sentient City Survival Kit." Accessed September 17, 2018. http://survival.sentientcity.net/umbrella.html.Google ScholarGoogle Scholar
  63. Shklovski, Irina, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. "Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use." In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, 2347--2356. ACM, 2014. http://dl.acm.org/citation.cfm?id=2557421. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Shove, Elizabeth. "Comfort, Cleanliness and Convenience: The Social Organization of Normality (New Technologies/New Cultures)," 2004.Google ScholarGoogle Scholar
  65. Skirpan, Michael Warren, Jacqueline Cameron, and Tom Yeh. "More Than a Show: Using Personalized Immersive Theater to Educate and Engage the Public in Technology Ethics." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 464. ACM, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Tene, Omer, and Jules Polonetsky. "A Theory of Creepy: Technology, Privacy and Shifting Social Norms." Yale JL & Tech. 16 (2013): 59.Google ScholarGoogle Scholar
  67. Vaghefi, Isaac, and Liette Lapointe. "When Too Much Usage Is Too Much: Exploring the Process of It Addiction." In System Sciences (HICSS), 2014 47th Hawaii International Conference On, 4494--4503. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Verbeek, P. P., and Slob, A., 2006, User Behavior and Technology Development: Shaping Sustainable Relations between Consumers and Technologies, vol. 20 of Eco-Efficiency in Industry and Science, Springer, Dordrecht.Google ScholarGoogle Scholar
  69. Verbeek, Peter-Paul. "Obstetric Ultrasound and the Technological Mediation of Morality: A Postphenomenological Analysis." Human Studies 31, no. 1 (2008): 11--26.Google ScholarGoogle ScholarCross RefCross Ref
  70. Wakkary, Ron, Doenja Oogjes, Henry WJ Lin, and Sabrina Hauser. "Philosophers Living with the Tilting Bowl." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 94. ACM, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Wallace, Jayne, Jon Rogers, Michael Shorter, Pete Thomas, Martin Skelly, and Richard Cook. "The SelfReflector: Design, IoT and the High Street." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 423. ACM, 2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Weizman, Eyal. "Introduction: Forensis." Forensis: The Architecture of Public Truth, 2014, 9--32.Google ScholarGoogle Scholar
  73. Wikipedia. "Targeted Advertising." Wikipedia, September 5, 2018. https://en.wikipedia.org/w/index.php?title=Targeted_advertising&oldid=858248415.Google ScholarGoogle Scholar
  74. Wisniewski, Pamela, Haiyan Jia, Na Wang, Saijing Zheng, Heng Xu, Mary Beth Rosson, and John M. Carroll. "Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 4029--4038. ACM, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Wong, Richmond Y., and Deirdre K. Mulligan. "When a Product Is Still Fictional: Anticipating and Speculating Futures through Concept Videos." In Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 121--133. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  76. Wu, Xiaolin, and Xi Zhang. "Automated Inference on Criminality Using Face Images." ArXiv Preprint arXiv:1611.04135, 2016.Google ScholarGoogle Scholar
  77. Zimmerman, John, Jodi Forlizzi, and Shelley Evenson. "Research through Design as a Method for Interaction Design Research in HCI." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 493--502. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Zuboff, Shoshana. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. (In Press: January 2019). Public Affairs.Google ScholarGoogle Scholar
  79. Zuboff, Shoshana. "Big Other: Surveillance Capitalism and the Prospects of an Information Civilization." Journal of Information Technology 30, no. 1 (2015): 75--89.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
          May 2019
          9077 pages
          ISBN:9781450359702
          DOI:10.1145/3290605

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 May 2019

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CHI '19 Paper Acceptance Rate703of2,958submissions,24%Overall Acceptance Rate6,199of26,314submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format