Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2702123.2702164acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights

Published: 18 April 2015 Publication History

Abstract

Most laptops and personal computers have webcams with LED indicators to notify users when they are recording. Because hackers use surreptitiously captured webcam recordings to extort users, we explored the effectiveness of these indicators under varying circumstances and how they could be improved. We observed that, on average, fewer than half of our participants (45%) noticed the existing indicator during computer-based tasks. When seated in front of the computer performing a paper-based task, only 5% noticed the indicator. We performed a followup experiment to evaluate a new indicator and observed that adding onscreen glyphs had a significant impact on both computer-based and non-computer-based tasks (93% and 59% noticed the new indicator, respectively). We discuss how our results can be integrated into current systems, as well as future ubiquitous computing systems.

References

[1]
Abowd, G. D., and Mynatt, E. D. Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human Interaction (TOCHI) 7, 1 (2000), 29--58.
[2]
Amer, T., and Maris, J.-M. B. Signal Words and Signal Icons in Application Control and Information Technology Exception Messages-Hazard Matching and Habituation Effects. Journal of Information Systems 21, 2 (2007), 1--25.
[3]
Anderson, N. How an Omniscient Internet "Sextortionist" Ruined the Lives of Teen girls. http://arstechnica.com/tech-policy/2011/09/howan-omniscient-internet-sextortionist-ruinedlives/, September 7 2011. Accessed: September 6, 2014.
[4]
Anderson, N. Meet the Men Who Spy on Women through Their Webcams. http://arstechnica.com/tech-policy/2013/03/ratbreeders-meet-the-men-who-spy-on-womenthrough-their-webcams/, March 10 2013. Accessed: September 5, 2014.
[5]
Anliker, U., LUnited Kingdomowicz, P., Troester, G., Schwartz, S. J., and DeVaul, R. W. The WearARM: Modular, High Performance, Low Power Computing Platform Designed for Integration into Everyday Clothing. In Wearable Computers, 2001. Proceedings. Fifth International Symposium on, IEEE (2001), 167--168.
[6]
Azuma, R., Baillot, Y., Behringer, R., Feiner, S., Julier, S., and MacIntyre, B. Recent Advances in Augmented Reality. Computer Graphics and Applications, IEEE 21, 6 (2001), 34--47.
[7]
Azuma, R. T., et al. A Survey of Augmented Reality. Presence 6, 4 (1997), 355--385.
[8]
Bellotti, V., and Sellen, A. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of the Third European Conference on Computer-Supported Cooperative Work 13-17 September 1993, Milan, Italy ECSCW'93, Springer (1993), 77--92.
[9]
Brocker, M., and Checkoway, S. iSeeYou: Disabling the MacBook Webcam Indicator LED. In Proceedings of the 23rd USENIX Security Symposium, USENIX Association (2014).
[10]
Cannella, S., Polivy, D. J., Shin, M., Straub, C., and Tamassia, R. Secure Visualization of Authentication Information: A Case Study. In Visual Languages and Human Centric Computing, 2004 IEEE Symposium on, IEEE (2004), 35--37.
[11]
Chan, M., Campo, E., Est'eve, D., and Fourniols, J.-Y. Smart Homes-Current Features and Future Perspectives. Maturitas 64, 2 (2009), 90--97.
[12]
Chan, M., Est'eve, D., Escriba, C., and Campo, E. A Review of Smart Homes-Present State and Future Challenges. Computer methods and programs in biomedicine 91, 1 (2008), 55--81.
[13]
Check Point Software Technologies Ltd. Are You Being Watched Through Your Webcam? http://www.zonealarm.com/blog/2013/10/are-youbeing-watched-through-your-webcam/, October 2 2013. Accessed: September 6, 2014.
[14]
Chen, Y., and Jones, G. J. Augmenting Human Memory Using Personal Lifelogs. In Proceedings of the 1st Augmented Human International Conference, ACM (2010), 24.
[15]
Costanza, E., Inverso, S. A., Pavlov, E., Allen, R., and Maes, P. Eye-q: Eyeglass Peripheral Display for Subtle Intimate Notifications. In Proceedings of the 8th conference on Human-computer interaction with mobile devices and services, ACM (2006), 211--218.
[16]
Cranor, L. F. What Do They Indicate?: Evaluating Security and Privacy Indicators. Interactions 13, 3 (2006), 45--47.
[17]
DeVaul, R. W., Corey, V. R., et al. The Memory Glasses: Subliminal vs. Overt Memory Support with Imperfect Information. In 2012 16th International Symposium on Wearable Computers, IEEE Computer Society (2003), 146--146.
[18]
Dickie, C., Vertegaal, R., Fono, D., Sohn, C., Chen, D., Cheng, D., Shell, J. S., and Aoudeh, O. Augmenting and Sharing Memory with eyeBlog. In Proceedings of the the 1st ACM workshop on Continuous archival and retrieval of personal experiences, ACM (2004), 105--109.
[19]
Dobuzinskis, A. California Man Agrees to Plead Guilty to Extortion of Miss Teen USA. http://www.reuters.com/article/2013/10/31/ususa-missteen-extortion-idUSBRE99U1G520131031, October 31 2013. Accessed: September 5, 2014.
[20]
Dourish, P., Grinter, R. E., De La Flor, J. D., and Joseph, M. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing 8, 6 (2004), 391--401.
[21]
Eddy, N. Notebook sales outpace desktop sales. http://www.eweek.com/c/a/Midmarket/NotebookSales-Outpace-Desktop-Sales/, December 24 2008. Accessed: September 9, 2014.
[22]
Edwards, W. K., and Grinter, R. E. At Home with Ubiquitous Computing: Seven Challenges. In Ubicomp 2001: Ubiquitous Computing, Springer (2001), 256--272.
[23]
Egelman, S., Cranor, L. F., and Hong, J. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM (2008), 1065--1074.
[24]
Egelman, S., Tsai, J., Cranor, L. F., and Acquisti, A. Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM (2009), 319--328.
[25]
Electronic Frontier Foundation. Laptop Camera Cover Set. https://supporters.eff.org/shop/laptopcamera-cover-set. Accessed: September 6, 2014.
[26]
Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D. Android permissions demystified. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, ACM (New York, NY, USA, 2011), 627--638.
[27]
Filkins, D. What we left behind. The New Yorker (April
[28]
2014). 28. Frederick, S. Cognitive reflection and decision making. Journal of Economic perspectives (2005), 25--42.
[29]
Friedman, B., Hurley, D., Howe, D. C., Felten, E., and Nissenbaum, H. Users' conceptions of web security: A comparative study. In CHI '02 Extended Abstracts on Human Factors in Computing Systems, CHI EA '02, ACM (New York, NY, USA, 2002), 746--747.
[30]
Hill, K. Lower Merion School District and Blake Robbins Reach a Settlement in Spycamgate. http://www.forbes.com/sites/kashmirhill/2010/ 10/11/lower-merion-school-district-and-blakerobbins-reach-a-settlement-in-spycamgate/, October 11 2010. Accessed: September 9, 2014.
[31]
Hoyle, R., Templeman, R., Armes, S., Anthony, D., Crandall, D., and Kapadia, A. Privacy Behaviors of Lifeloggers Using Wearable Cameras. In Ubicomp 2014: Ubiquitous Computing (2014).
[32]
Kalnikaite, V., Sellen, A., Whittaker, S., and Kirk, D. Now Let Me See Where I Was: Understanding How Lifelogs Mediate Memory. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM (2010), 2045--2054.
[33]
Langheinrich, M. Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems. In Ubicomp 2001: Ubiquitous Computing, Springer (2001), 273--291.
[34]
Logitech Forum: Can I Turn off the Red LED? http://forums.logitech.com/t5/Webcams/Can-Iturn-off-red-LED/m-p/277305#M52816. Accessed: 2014-09-06.
[35]
Palen, L., and Dourish, P. Unpacking Privacy for a Networked World. In Proceedings of the SIGCHI conference on Human factors in computing systems, ACM (2003), 129--136.
[36]
Patton, J. H., Stanford, M. S., et al. Factor structure of the barratt impulsiveness scale. Journal of clinical psychology 51, 6 (1995), 768--774.
[37]
Rouse, R. A. Is someone watching you through your webcam? http://campatch.com/wpcontent/uploads/2012/05/CamPatch-AcademyStudy-on-Webcam-Hacking-Awareness-May2012.pdf, May 2012.
[38]
Schechter, S. E., Dhamija, R., Ozment, A., and Fischer, I. The Emperor's New Security Indicators. In IEEE Symposium on Security and Privacy (2007), 51--65.
[39]
Stewart, D. W., and Martin, I. M. Intended and Unintended consequences of Warning Messages: A Review and Synthesis of Empirical Research. Journal of Public Policy & Marketing (1994), 1--19.
[40]
Whalen, T., and Inkpen, K. M. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of Graphics Interface 2005, Canadian Human-Computer Communications Society (2005), 137--144.

Cited By

View all
  • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
  • (2024)Exploring the Design Space of Optical See-through AR Head-Mounted Displays to Support First Responders in the FieldProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642195(1-19)Online publication date: 11-May-2024
  • (2024)Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)2024 IEEE 32nd International Requirements Engineering Conference (RE)10.1109/RE59067.2024.00042(354-362)Online publication date: 24-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
April 2015
4290 pages
ISBN:9781450331456
DOI:10.1145/2702123
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 April 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. privacy indicators
  2. ubiquitous computing
  3. usable security

Qualifiers

  • Research-article

Funding Sources

Conference

CHI '15
Sponsor:
CHI '15: CHI Conference on Human Factors in Computing Systems
April 18 - 23, 2015
Seoul, Republic of Korea

Acceptance Rates

CHI '15 Paper Acceptance Rate 486 of 2,120 submissions, 23%;
Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)5
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
  • (2024)Exploring the Design Space of Optical See-through AR Head-Mounted Displays to Support First Responders in the FieldProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642195(1-19)Online publication date: 11-May-2024
  • (2024)Explainability as a Requirement for Hardware: Introducing Explainable Hardware (XHW)2024 IEEE 32nd International Requirements Engineering Conference (RE)10.1109/RE59067.2024.00042(354-362)Online publication date: 24-Jun-2024
  • (2023)"If sighted people know, i should be able to know"Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620498(4661-4678)Online publication date: 9-Aug-2023
  • (2023)"My privacy for their security"Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620438(3583-3600)Online publication date: 9-Aug-2023
  • (2023)Powering for privacyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620376(2473-2490)Online publication date: 9-Aug-2023
  • (2023)Abuse vectorsProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620242(69-86)Online publication date: 9-Aug-2023
  • (2023)Low-Voltage Haze Tuning with Cellulose-Network Liquid Crystal GelsACS Nano10.1021/acsnano.3c0369317:20(19767-19778)Online publication date: 19-Sep-2023
  • (2023)Increasing Users’ Privacy Awareness in the Internet of Things: Design Space and Sample ScenariosHuman Factors in Privacy Research10.1007/978-3-031-28643-8_16(321-336)Online publication date: 10-Mar-2023
  • (2022)“I saw your partner naked”: Exploring Privacy Challenges During Video-based Online MeetingsProceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia10.1145/3568444.3568468(71-82)Online publication date: 27-Nov-2022
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media