Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3491102.3517617acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Open access

Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras

Published: 29 April 2022 Publication History

Abstract

The increased adoption of smart home cameras (SHCs) foregrounds issues of surveillance, power, and privacy in homes and neighborhoods. However, questions remain about how people are currently using these devices to monitor and surveil, what the benefits and limitations are for users, and what privacy and security tensions arise between primary users and other stakeholders. We present an empirical study with 14 SHC users to understand how these devices are used and integrated within everyday life. Based on semi-structured qualitative interviews, we investigate users’ motivations, practices, privacy concerns, and social negotiations. Our findings highlight the SHC as a perceptually powerful and spatially sensitive device that enables a variety of surveillant uses outside of basic home security—from formally surveilling domestic workers, to casually spying on neighbors, to capturing memories. We categorize surveillant SHC uses, clarify distinctions between primary and non-primary users, and highlight under-considered design directions for addressing power imbalances among primary and non-primary users.

References

[1]
William Ablondi. 2018. Smart Home Reports. Strategy Analytics. Retrieved from https://www.strategyanalytics.com/access-services/devices/connected-home/smart-home/reports/report-detail/global-smart-home-surveillance-camera-market-forecast-2012-to-2023?slid=918459&spg=4
[2]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, and others. 2017. Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Comput. Surv. CSUR 50, 3 (2017), 1–41.
[3]
Shane Ahern, Dean Eckles, Nathaniel S Good, Simon King, Mor Naaman, and Rahul Nair. 2007. Over-exposed? Privacy patterns and considerations in online and mobile photo sharing. In Proceedings of the SIGCHI conference on Human factors in computing systems, 357–366.
[4]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J Lee. 2020. Tangible privacy: Towards user-centric sensor designs for bystander privacy. Proc. ACM Hum.-Comput. Interact. 4, CSCW2 (2020), 1–28.
[5]
Ryan Aipperspach, Ben Hooker, and Allison Woodruff. 2008. The heterogeneous home. In Proceedings of the 10th international conference on Ubiquitous computing, 222–231.
[6]
Tawfiq Ammari, Jofish Kaye, Janice Y. Tsai, and Frank Bentley. 2019. Music, Search, and IoT: How People (Really) Use Voice Assistants. ACM Trans. Comput.-Hum. Interact. 26, 3 (June 2019), 1–28.
[7]
Louise Amoore. 2020. Cloud ethics. Duke University Press.
[8]
Mike Ananny and Kate Crawford. 2018. Seeing without knowing: Limitations of the transparency ideal and its application to algorithmic accountability. New Media Soc. 20, 3 (2018), 973–989.
[9]
Solon Barocas and Karen Levy. 2020. Privacy Dependencies. Wash. Law Rev. 95, 2 (June 2020), 555.
[10]
Eric PS Baumer. 2015. Reflective informatics: conceptual dimensions for designing technologies of reflection. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 585–594.
[11]
Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, Seoul Republic of Korea, 3295–3298.
[12]
Eric PS Baumer, Phil Adams, Vera D Khovanskaya, Tony C Liao, Madeline E Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, leaving, and (re) lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI conference on human factors in computing systems, 3257–3266.
[13]
Rosanna Bellini, Angelika Strohmayer, Patrick Olivier, and Clara Crivellaro. 2019. Mapping the Margins: Navigating the Ecologies of Domestic Violence Service Provision. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1–13.
[14]
Erin Beneteau, Yini Guan, Olivia K. Richards, Mingrui Ray Zhang, Julie A. Kientz, Jason Yip, and Alexis Hiniker. 2020. Assumptions Checked: How Families Learn About and Use the Echo Dot. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4, 1 (March 2020), 1–23.
[15]
Jesse Josua Benjamin, Arne Berger, Nick Merrill, and James Pierce. 2021. Machine Learning Uncertainty as a Design Material: A Post-Phenomenological Inquiry. Proc. 2021 CHI Conf. Hum. Factors Comput. Syst. (May 2021), 1–14.
[16]
Frank Bentley, Chris Luvogt, Max Silverman, Rushani Wirasinghe, Brooke White, and Danielle Lottridge. 2018. Understanding the Long-Term Use of Smart Speaker Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 3 (September 2018), 1–24.
[17]
Francine Berman and Vinton G. Cerf. 2017. Social and ethical behavior in the internet of things. Commun. ACM 60, 2 (January 2017), 6–7.
[18]
Clara Berridge, Jodi Halpern, and Karen Levy. 2019. Cameras on beds: The ethics of surveillance in nursing home rooms. AJOB Empir. Bioeth. 10, 1 (January 2019), 55–62.
[19]
Susanne Bødker. 2006. When second wave HCI meets third wave challenges. In Proceedings of the 4th Nordic conference on Human-computer interaction: changing roles, 1–8.
[20]
Nellie Bowles. 2018. Thermostats, Locks and Lights: Digital Tools of Domestic Abuse. The New York Times. Retrieved from https://www.nytimes.com/2018/06/23/technology/smart-home-devices-domestic-abuse.html
[21]
Phoebe Braithwaite. 2018. Smart home tech is being turned into a tool for domestic abuse. Wired UK. Retrieved from https://www.wired.co.uk/article/internet-of-things-smart-home-domestic-abuse
[22]
Simone Browne. 2015. Dark Matters: On the Surveillance of Blackness. Duke University Press.
[23]
Jed R. Brubaker, Gina Venolia, and John C. Tang. 2012. Focusing on shared experiences: moving beyond the camera in video communication. In Proceedings of the Designing Interactive Systems Conference on - DIS ’12, ACM Press, Newcastle Upon Tyne, United Kingdom, 96.
[24]
AJ Bernheim Brush, Jaeyeon Jung, Ratul Mahajan, and Frank Martinez. 2013. Digital neighborhood watch: Investigating the sharing of camera data amongst neighbors. In Proceedings of the 2013 conference on Computer supported cooperative work, 693–700.
[25]
A.J. Bernheim Brush, Bongshin Lee, Ratul Mahajan, Sharad Agarwal, Stefan Saroiu, and Colin Dixon. 2011. Home automation in the wild: challenges and opportunities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Vancouver BC Canada, 2115–2124.
[26]
Taina Bucher. 2012. Want to be on the top? Algorithmic power and the threat of invisibility on Facebook. New Media Soc. 14, 7 (2012), 1164–1180.
[27]
Will Burns. 2018. The “Nestie Awards” From Nest Is A Content Idea Firing On All Cylinders. Forbes. Retrieved from https://www.forbes.com/sites/willburns/2018/03/02/the-nestie-awards-from-nest-is-a-content-idea-firing-on-all-cylinders/
[28]
George Chalhoub, Ivan Flechais, Norbert Nthala, and Ruba Abu-Salma. 2020. Innovation inaction or in action? the role of user experience in the security and privacy design of smart home cameras. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 185–204.
[29]
George Chalhoub, Martin J Kraemer, Norbert Nthala, and Ivan Flechais. 2021. “It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, Yokohama Japan, 1–16.
[30]
Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y Zhao, and Haitao Zheng. 2020. Wearable microphone jamming. In Proceedings of the 2020 chi conference on human factors in computing systems, 1–12.
[31]
Yu-Ting Cheng, Mathias Funk, Wenn-Chieh Tsai, and Lin-Lin Chen. 2019. Peekaboo Cam: Designing an Observational Camera for Home Ecologies Concerning Privacy. In Proceedings of the 2019 on Designing Interactive Systems Conference, ACM, San Diego CA USA, 823–836.
[32]
Marshini Chetty, Ja-Young Sung, and Rebecca E. Grinter. 2007. How Smart Homes Learn: The Evolution of the Networked Home and Household. In UbiComp 2007: Ubiquitous Computing, John Krumm, Gregory D. Abowd, Aruna Seneviratne and Thomas Strang (eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 127–144.
[33]
Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, and Julie A. Kientz. 2011. Living in a glass house: a survey of private moments in the home. In Proceedings of the 13th international conference on Ubiquitous computing - UbiComp ’11, ACM Press, Beijing, China, 41.
[34]
Danielle Keats Citron. 2014. Hate crimes in cyberspace. Harvard University Press.
[35]
Andy Crabtree, Peter Tolmie, and Will Knight. 2017. Repacking ‘Privacy’ for a Networked World. Comput. Support. Coop. Work CSCW 26, 4 (December 2017), 453–488.
[36]
Kate Crawford. 2021. Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence. Yale University Press.
[37]
Christopher Dandeker. 2006. Surveillance and Military Transformation: Organizational Trends in Twenty First Century Armed Services. New Polit. Surveill. Visibility (2006), 225–249.
[38]
Dries De Roeck, Karin Slegers, Johan Criel, Marc Godon, Laurence Claeys, Katriina Kilpi, and An Jacobs. 2012. I would DiYSE for it! A manifesto for do-it-yourself internet-of-things creation. In NordiCHI ’12 Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design, AMC, 170–179.
[39]
Gilles Deleuze. 1992. Postscript on the Societies of Control. October 59, (1992), 3–7.
[40]
George Demiris, Brian K Hensel, Marjorie Skubic, and Marilyn Rantz. 2008. Senior residents’ perceived need of and preferences for “smart home” sensor technologies. Int. J. Technol. Assess. Health Care 24, 1 (2008), 120–124.
[41]
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Toronto Ontario Canada, 2377–2386.
[42]
Audrey Desjardins, Jeremy E. Viny, Cayla Key, and Nouela Johnston. 2019. Alternative Avenues for IoT: Designing with Non-Stereotypical Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI ’19, ACM Press, Glasgow, Scotland Uk, 1–13.
[43]
Paul Dourish and Genevieve Bell. 2011. Divining a digital future: Mess and mythology in ubiquitous computing. Mit Press.
[44]
Serge Egelman and Eyal Peer. 2015. The Myth of the Average User: Improving Privacy and Security Systems through Individualization. In Proceedings of the 2015 New Security Paradigms Workshop, ACM, Twente Netherlands, 16–28.
[45]
Daniel Fallman. 2011. The new good: exploring the potential of philosophy of technology to contribute to human-computer interaction. In Proceedings of the SIGCHI conference on human factors in computing systems, 1051–1060.
[46]
Michel Foucault. 2012. Discipline and punish: The birth of the prison. Vintage.
[47]
Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. “A Stalker's Paradise”: How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, Montreal QC Canada, 1–13.
[48]
Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 21–40.
[49]
Ester Fritsch, Irina Shklovski, and Rachel Douglas-Jones. 2018. Calling for a Revolution: An Analysis of IoT Manifestos. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, Montreal QC Canada, 1–13.
[50]
Christian Fuchs. 2010. How Can Surveillance Be Defined? Remarks on Theoretical Foundations of Surveillance Studies. The Internet (2010), 24.
[51]
Kit Galloway and Sherrie Rabinowitz. A Hole-In-Space, 1980. Retrieved from http://www.ecafe.com/getty/HIS/index.html
[52]
William W Gaver. 2006. The video window: my life with a ludic system. Pers. Ubiquitous Comput. 10, 2–3 (2006), 60–65.
[53]
William W. Gaver, John Bowers, Kirsten Boehner, Andy Boucher, David W.T. Cameron, Mark Hauenstein, Nadine Jarvis, and Sarah Pennington. 2013. Indoor weather stations: investigating a ludic approach to environmental HCI through batch prototyping. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, Paris France, 3451–3460.
[54]
Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daumé III, and Kate Crawford. 2018. Datasheets for datasets. ArXiv Prepr. ArXiv180309010 (2018).
[55]
Christine Geeng and Franziska Roesner. 2019. Who's In Control?: Interactions In Multi-User Smart Homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1–13.
[56]
Chris Gilliard and David Golumbia. 2021. Luxury Surveillance. Real Life. Retrieved from https://reallifemag.com/luxury-surveillance/
[57]
Barney G Glaser and Anselm L Strauss. 2017. Discovery of grounded theory: Strategies for qualitative research. Routledge.
[58]
Jake Goldenfein, Deirdre K Mulligan, Helen Nissenbaum, and Wendy Ju. 2020. Through the Handoff Lens: Competing Visions of Autonomous Futures. Berkeley Tech LJ 35, (2020), 835.
[59]
Ellen P Goodman and Julia Powles. 2019. Urbanism under Google: Lessons from Sidewalk Toronto. Fordham Rev 88, (2019), 457.
[60]
Stephen Graham and David Wood. 2003. Digitizing Surveillance: Categorization, Space, Inequality. Crit. Soc. Policy 23, 2 (May 2003), 227–248.
[61]
Colin M Gray, Cristiana Santos, Nataliia Bielova, Michael Toth, and Damian Clifford. 2021. Dark patterns and the legal requirements of consent banners: An interaction criticism perspective. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–18.
[62]
Byung-Chul Han. 2017. In the swarm: Digital prospects. MIT Press.
[63]
Jenny Hansson. Fearless feline chases coyote in Portland neighborhood. KOIN.com. Retrieved from https://www.koin.com/news/animals/fearless-feline-chases-coyote-in-portland-neighborhood/
[64]
Woodrow Hartzog. 2018. Privacy's blueprint. Harvard University Press.
[65]
Adam Harvey. 2020. CV Dazzle: Computer Vision Dazzle Camouflage. Retrieved from https://cvdazzle.com/
[66]
Harry Hochheiser, Jinjuan Feng, and Jonathan Lazar. 2008. Challenges in universally usable privacy and security. In Symposium On Usable Privacy and Security (SOUPS).
[67]
Sun-ha Hong. 2020. Technologies of Speculation. New York University Press.
[68]
Heather A Horst, Cherry Baylosis, and Sheba Mohammid. 2021. Looking professional: How women decide what to wear with and through automated technologies. Convergence 27, 5 (October 2021), 1250–1263.
[69]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Cr, and All Apu Kapadia. Privacy Behaviors of Lifeloggers using Wearable Cameras. UbiComp, 571–582.
[70]
Tung-Hui Hu. 2015. A Prehistory of the Cloud. MIT press.
[71]
Don Ihde. 1990. Technology and the lifeworld: From garden to earth. (1990).
[72]
Alan Jacobs. Attending to Technology: Theses for Disputation. The New Atlantis. Retrieved from https://www.thenewatlantis.com/publications/attending-to-technology-theses-for-disputation
[73]
Steven Johnson, Irene Rae, Bilge Mutlu, and Leila Takayama. 2015. Can You See Me Now?: How Field of View Affects Collaboration in Robotic Telepresence. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, Seoul Republic of Korea, 2397–2406.
[74]
Daniel Kahneman. 2011. Thinking, Fast and Slow. Macmillan.
[75]
Evangelos Karapanos, Rúben Gouveia, Marc Hassenzahl, and Jodi Forlizzi. 2016. Wellbeing in the making: peoples’ experiences with wearable activity trackers. Psychol. Well-Being 6, 1 (2016), 1–17.
[76]
Lauren Kilgour. 2020. The ethics of aesthetics: Stigma, information, and the politics of electronic ankle monitor design. Inf. Soc. 36, 3 (May 2020), 131–146.
[77]
Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, and Karrie Karahalios. 2021. “We Just Use What They Give Us”: Understanding Passenger User Perspectives in Smart Homes. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, Yokohama Japan, 1–14.
[78]
Sandjar Kozubaev, Fernando Rochaix, Carl DiSalvo, and Christopher A. Le Dantec. 2019. Spaces and Traces: Implications of Smart Technology in Public Housing. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1–13.
[79]
Joshua A Kroll, Joanna Huey, Solon Barocas, Edward W Felten, Joel R Reidenberg, David G Robinson, and Harlan Yu. Accountable Algorithms. Univ. Pa. Law Rev. 165, 74.
[80]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proc. ACM Hum.-Comput. Interact. 2, CSCW (November 2018), 1–31.
[81]
Roxanne Leitão. 2018. Digital Technologies and their Role in Intimate Partner Violence. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, Montreal QC Canada, 1–6.
[82]
Melissa Lemieux. 2019. Watch the Viral Video of a Small Boy Filling an Empty Trick-or-Treat Bowl With His Halloween Candy. Newsweek. Retrieved from https://www.newsweek.com/watch-viral-video-small-boy-filling-empty-trick-treat-bowl-his-halloween-candy-1469331
[83]
Karen E C Levy. 2014. Intimate Surveillance. Ida. Law Rev. 51, (2014), 679.
[84]
Yanni Alexander Loukissas. 2019. All data are local: Thinking critically in a data-driven society. MIT Press.
[85]
Dominique Machuletz, Henrik Sendt, Stefan Laube, and Rainer Böhme. 2016. Users protect their privacy if they can: Determinants of webcam covering behavior. In Proceedings of the European Workshop on Usable Security at the Privacy Enhaning Technologies Symposium (EuroSEC’16)(EuroUSEC’16). Internet Society, Reston, VA.
[86]
Nathan Malkin, Joe Deatrick, Allen Tong, Primal Wijesekera, Serge Egelman, and David Wagner. 2019. Privacy Attitudes of Smart Speaker Users. Proc. Priv. Enhancing Technol. 2019, 4 (October 2019), 250–271.
[87]
Shrirang Mare, Franziska Roesner, and Tadayoshi Kohno. 2020. Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts. Proc. Priv. Enhancing Technol. 2020, 2 (April 2020), 436–458.
[88]
Tara Matthews, Kathleen O'Leary, Anna Turner, Manya Sleeper, Jill Palzkill Woelfer, Martin Shelton, Cori Manthorne, Elizabeth F. Churchill, and Sunny Consolvo. 2017. Stories from Survivors: Privacy & Security Practices when Coping with Intimate Partner Abuse. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, Denver Colorado USA, 2189–2201.
[89]
Emily McReynolds, Sarah Hubbard, Timothy Lau, Aditya Saraf, Maya Cakmak, and Franziska Roesner. 2017. Toys that Listen: A Study of Parents, Children, and Internet-Connected Toys. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, Denver Colorado USA, 5197–5207.
[90]
Sarah Mennicken and Elaine M Huang. 2012. Hacking the natural habitat: an in-the-wild study of smart homes, their development, and the people who live in them. In International conference on pervasive computing, Springer, 143–160.
[91]
Jochen Meyer, Jochen Schnauber, Wilko Heuten, Harm Wienbergen, Rainer Hambrecht, Hans-Jürgen Appelrath, and Susanne Boll. 2016. Exploring Longitudinal Use of Activity Trackers. In 2016 IEEE International Conference on Healthcare Informatics (ICHI), IEEE, 198–206.
[92]
Matthew B Miles and A Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. sage.
[93]
Elizabeth C Nelson, Tibert Verhagen, and Matthijs L Noordzij. 2016. Health empowerment through activity trackers: An empirical smart wristband study. Comput. Hum. Behav. 62, (2016), 364–374.
[94]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash Rev 79, (2004), 119.
[95]
William Odom. 2015. Understanding Long-Term Interactions with a Slow Technology: an Investigation of Experiences with FutureMe. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, ACM, Seoul Republic of Korea, 575–584.
[96]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-term effects of ubiquitous surveillance in the home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 41–50.
[97]
Kentrell Owens, Camille Cobb, and Lorrie Cranor. 2021. “You Gotta Watch What You Say”: Surveillance of Communication with Incarcerated People. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, Yokohama Japan, 1–18.
[98]
Seung-min Park, Daeyoun D Won, Brian J Lee, Diego Escobedo, Andre Esteva, Amin Aalipour, T Jessie Ge, Jung Ha Kim, Susie Suh, Elliot H Choi, and others. 2020. A mountable toilet system for personalized health monitoring via the analysis of excreta. Nat. Biomed. Eng. 4, 6 (2020), 624–635.
[99]
S Tejaswi Peesapati, Victoria Schwanda, Johnathon Schultz, Matt Lepage, So-yae Jeong, and Dan Cosley. 2010. Pensieve: supporting everyday reminiscence. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2027–2036.
[100]
James Pierce. 2012. Undesigning technology: considering the negation of design by design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 957–966.
[101]
James Pierce. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI ’19), Association for Computing Machinery, New York, NY, USA, 1–14.
[102]
James Pierce, Richmond Y. Wong, and Nick Merrill. 2020. Sensor Illumination: Exploring Design Qualities and Ethical Implications of Smart Cameras and Image/Video Analytics. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, Honolulu HI USA, 1–19.
[103]
Irene Rae, Gina Venolia, John C. Tang, and David Molnar. 2015. A Framework for Understanding and Designing Telepresence. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, ACM, Vancouver BC Canada, 1552–1566.
[104]
Horst WJ Rittel and Melvin M Webber. 1974. Wicked Problems. Man-Made Futur. 26, 1 (1974), 272–280.
[105]
Gilad Rosner and Erin Kenneally. 2018. Clearly opaque: Privacy risks of the internet of things. In Rosner, Gilad and Kenneally, Erin, Clearly Opaque: Privacy Risks of the Internet of Things (May 1, 2018). IoT Privacy Forum.
[106]
James B Rule. 2007. Privacy in peril: How we are sacrificing a fundamental right in exchange for security and convenience. Oxford University Press.
[107]
Pedro Sanches, Vasiliki Tsaknaki, Asreen Rostami, and Barry Brown. 2020. Under Surveillance: Technology Practices of those Monitored by the State. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, Honolulu HI USA, 1–13.
[108]
Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. In Proceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design: Open 24/7, 9–16.
[109]
Johann Schrammel, Christina Köffel, and Manfred Tscheligi. 2009. Personality traits, usage patterns and information disclosure in online communities. In In BCS HCI ’09: Proceedings of the 2009 British Computer Society Conference on Human-Computer Interaction, 169–174.
[110]
Phoebe Sengers, Kirsten Boehner, Shay David, and Joseph'Jofish’ Kaye. 2005. Reflective Design. In Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility, 49–58.
[111]
William Seymour, Reuben Binns, Petr Slovak, Max Van Kleek, and Nigel Shadbolt. 2020. Strangers in the Room: Unpacking Perceptions of “Smartness” and Related Ethical Concerns in the Home. In Proceedings of the 2020 ACM Designing Interactive Systems Conference, ACM, Eindhoven Netherlands, 841–854.
[112]
Mark Shepard. Sentient City Survival Kit. Retrieved March 9, 2022 from http://survival.sentientcity.net/umbrella.html
[113]
Samarth Singhal, Carman Neustaedter, Thecla Schiphorst, Anthony Tang, Abhisekh Patra, and Rui Pan. 2016. You are Being Watched: Bystanders’ Perspective on the Use of Camera Devices in Public Spaces. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, ACM, San Jose California USA, 3197–3203.
[114]
Robert H Sloan and Richard Warner. 2014. Beyond notice and choice: Privacy, norms, and consent. J High Tech L 14, (2014), 370.
[115]
Daniel J Solove. 2012. Introduction: Privacy self-management and the consent dilemma. Harv Rev 126, (2012), 1880.
[116]
Anne Spaa, Abigail Durrant, Chris Elsden, and John Vines. 2019. Understanding the Boundaries between Policymaking and HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1–15.
[117]
Luke Stark and Karen Levy. 2018. The surveillant consumer. Media Cult. Soc. 40, 8 (November 2018), 1202–1220.
[118]
Yolande Strengers, Jenny Kennedy, Paula Arcari, Larissa Nicholls, and Melissa Gregg. 2019. Protection, Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights from Australian Early Adopters. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, Glasgow Scotland Uk, 1–13.
[119]
Tactical Tech. The Glass Room – Looking into your online life. Retrieved from https://www.theglassroom.org/en/home/
[120]
Marc Teyssier, Marion Koelle, Paul Strohmeier, Bruno Fruchard, and Jürgen Steimle. 2021. Eyecam: Revealing Relations between Humans and Sensing Devices through an Anthropomorphic Webcam. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, ACM, Yokohama Japan, 1–13.
[121]
Emily Troshynski, Charlotte Lee, and Paul Dourish. 2011. Accountabilities of presence: reframing location-based systems. Droit Cult. Rev. Int. Interdiscip. 61 (2011), 171–193.
[122]
Khai Truong, Shwetak Patel, Jay Summet, and Gregory Abowd. 2005. Preventing Camera Recording by Designing a Capture-Resistant Environment.
[123]
Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders versus intrusiveness: teens’ and parents’ perspectives on home-entryway surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, ACM, Seattle Washington, 129–139.
[124]
Peter-Paul Verbeek. 2005. What Things Do: Philosophical Reflections on Technology, Agency, and Design. Penn State University Press.
[125]
Ron Wakkary. 2021. Things We Could Design: For More Than Human-Centered Worlds. MIT Press, Cambridge, MA, USA.
[126]
Ron Wakkary and Leah Maestri. 2007. The resourcefulness of everyday design. In Proceedings of the 6th ACM SIGCHI conference on Creativity & Cognition (C&C ’07), Association for Computing Machinery, New York, NY, USA, 163–172.
[127]
Jayne Wallace, Jon Rogers, Michael Shorter, Pete Thomas, Martin Skelly, and Richard Cook. 2018. The SelfReflector: Design, IoT and the High Street. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ACM, Montreal QC Canada, 1–12.
[128]
Yang Wang. 2017. The Third Wave?: Inclusive Privacy and Security. In Proceedings of the 2017 New Security Paradigms Workshop, ACM, Santa Cruz CA USA, 122–130.
[129]
Kelly Widdicks, Tina Ringenson, Daniel Pargman, Vishnupriya Kuppusamy, and Patricia Lago. 2018. Undesigning the Internet: An Exploratory Study of Reducing Everyday Internet Connectivity. In EPiC Series in Computing, EasyChair, 384–397.
[130]
Oscar Williams. 2017. Nestie Awards 2017: Hilarious Moments Caught On Home Security Cameras. HuffPost UK. Retrieved from https://www.huffingtonpost.co.uk/entry/nestie-awards-2017-hilarious-moments-caught-on-home-security-cameras_uk_58c6a2d6e4b0d1078ca806f4
[131]
Richmond Y. Wong and Deirdre K. Mulligan. 2019. Bringing Design to the Privacy Table: Broadening “Design” in “Privacy by Design” Through the Lens of HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI ’19), Association for Computing Machinery, New York, NY, USA, 1–17.
[132]
Allison Woodruff, Sally Augustin, and Brooke Foucault. 2007. Sabbath Day Home Automation: “It's Like Mixing Technology and Religion". In In Proceedings of the 2007 Conference on Human Factors in Computing Systems (CHI 2007), ACM Press.
[133]
Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact. 3, CSCW (November 2019), 1–24.
[134]
Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, Denver Colorado USA, 6777–6788.
[135]
MinYoung Yoo, William Odom, and Arne Berger. 2021. Understanding Everyday Experiences of Reminiscence for People with Blindness: Practices, Tensions and Probing New Design Possibilities. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (CHI ’21), Association for Computing Machinery, New York, NY, USA, 1–15.
[136]
Eric Zeng, Shrirang Mare, and Franziska Roesner. End User Security & Privacy Concerns with Smart Homes. 17.
[137]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proc. ACM Hum.-Comput. Interact. 2, CSCW (November 2018), 200:1-200:20.
[138]
Shoshana Zuboff. 2018. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (1st ed.).
[139]
2016. 61% Of Smart-Home Revenue Came From Security Cameras In The Last Year. TWICE. Retrieved from https://www.twice.com/news/61-smart-home-revenue-came-security-cameras-last-year-62631

Cited By

View all
  • (2024)Privacy Barriers in Health Monitoring: Scoping ReviewJMIR Nursing10.2196/535927(e53592)Online publication date: 9-May-2024
  • (2024)Household Wattch: Exploring opportunities for surveillance and consent through families’ household energy use dataACM Transactions on Computer-Human Interaction10.1145/3673228Online publication date: 18-Jun-2024
  • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
  • Show More Cited By

Index Terms

  1. Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems
    April 2022
    10459 pages
    ISBN:9781450391573
    DOI:10.1145/3491102
    This work is licensed under a Creative Commons Attribution International 4.0 License.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 29 April 2022

    Check for updates

    Author Tags

    1. Internet of Things (IoT)
    2. design
    3. personal data
    4. privacy
    5. smart cameras
    6. surveillance
    7. tracking

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    Conference

    CHI '22
    Sponsor:
    CHI '22: CHI Conference on Human Factors in Computing Systems
    April 29 - May 5, 2022
    LA, New Orleans, USA

    Acceptance Rates

    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,098
    • Downloads (Last 6 weeks)80
    Reflects downloads up to 18 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Privacy Barriers in Health Monitoring: Scoping ReviewJMIR Nursing10.2196/535927(e53592)Online publication date: 9-May-2024
    • (2024)Household Wattch: Exploring opportunities for surveillance and consent through families’ household energy use dataACM Transactions on Computer-Human Interaction10.1145/3673228Online publication date: 18-Jun-2024
    • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
    • (2024)Porous by Design: How Childcare Platforms Impact Worker Personhood, Safety, and ConnectionProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661552(1336-1349)Online publication date: 1-Jul-2024
    • (2024)Unfulfilled Promises of Child Safety and Privacy: Portrayals and Use of Children in Smart Home MarketingProceedings of the ACM on Human-Computer Interaction10.1145/36374228:CSCW1(1-29)Online publication date: 26-Apr-2024
    • (2024)Wi-MoID: Human and Nonhuman Motion Discrimination Using WiFi With Edge ComputingIEEE Internet of Things Journal10.1109/JIOT.2023.333954411:8(13900-13912)Online publication date: 15-Apr-2024
    • (2023)"Nobody's happy"Proceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632216(543-558)Online publication date: 7-Aug-2023
    • (2023)"You Shouldn't Need to Share Your Data": Perceived Privacy Risks and Mitigation Strategies Among Privacy-Conscious Smart Home Power UsersProceedings of the ACM on Human-Computer Interaction10.1145/36100387:CSCW2(1-34)Online publication date: 4-Oct-2023
    • (2023)Location, Location, Security? Exploring Location-Based Smart Device Security Concerns and Mitigations within Low-Rent HomesProceedings of the 2023 ACM Designing Interactive Systems Conference10.1145/3563657.3596077(1060-1077)Online publication date: 10-Jul-2023
    • (2023)Getting the Residents’ Attention: The Perception of Warning Channels in Smart Home Warning SystemsProceedings of the 2023 ACM Designing Interactive Systems Conference10.1145/3563657.3596076(1114-1127)Online publication date: 10-Jul-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media