Abstract
Wearables have become popular in several application domains, including healthcare, entertainment and security. Their pervasiveness, small size and autonomy, enlarges the potential of these devices to be employed in different activities and scenarios. Wearable devices collect data ubiquitously and continuously, about the individual user and also her surroundings, which can pose many privacy challenges that neither users nor stakeholders are ready to deal with. Before designing effective solutions for developing privacy-enhanced wearables, we need first to identify and understand what are the potential privacy concerns that users have and how they are perceived. To contribute to that purpose, in this paper we present findings from a qualitative content analysis of online comments regarding privacy concerns of wearable device users. We also discuss how form factors, sensors employed, and the type of data collected impact the users’ perception of privacy. Our results show that users have different levels and types of privacy concerns depending on the type of wearable they use. By better understanding the users’ perspectives about wearable privacy, we aim at helping designers and researchers to develop effective solutions to create privacy-enhanced wearables.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Warren, S.D., Brandeis, L.D.: Right to privacy. Harv. Law Rev. 4, 193–220 (1890)
Mancini, C., Thomas, K., Rogers, Y., Price, B.A., Jedrzejczyk, L., Bandara, A.K., Joinson, A.N., Nuseibeh, B.: From spaces to places: emerging contexts in mobile privacy. In: Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp 2009), pp. 1–10. ACM, New York (2009). doi:10.1145/1620545.1620547, http://doi.acm.org/10.1145/1620545.1620547
Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI 2014), pp. 2647–2656. ACM, New York (2014). doi:10.1145/2556288.2557421, http://doi.acm.org/10.1145/2556288.2557421
Ur, B., Wang, Y.: A cross-cultural framework for protecting user privacy in online social media. In: Proceedings of the 22nd International Conference on World Wide Web Companion (WWW 2013 Companion), pp. 755–762. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva (2013)
Gürses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Secur. Priv. 11(3), 29–37 (2013). doi:10.1109/MSP.2013.47, http://dx.doi.org/10.1109/MSP.2013.47
Reidenberg, J.R. et al.: Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding, 15 August 2014. Fordham Law Legal Studies. At: http://ssrn.com/abstract=2418297
Shay, R., Ion, I., Reeder, R.W., Consolvo, S.: My religious aunt asked why I was trying to sell her viagra: experiences with account hijacking. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), pp. 2657–2666. ACM, New York (2014). doi:10.1145/2556288.2557330, http://doi.acm.org/10.1145/2556288.2557330
Troshynski, E., Lee, C., Dourish, P.: Accountabilities of presence: reframing location-based systems. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2008), pp. 487–496. ACM, New York (2008). doi:10.1145/1357054.1357133, http://doi.acm.org/10.1145/1357054.1357133
Hoyle, R., Templeman, R., Armes, S., Anthony, D., Crandall, D., Kapadia, A.: Privacy behaviors of lifeloggers using wearable cameras. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 571–582. ACM, New York (2014). doi:10.1145/2632048.2632079, http://doi.acm.org/10.1145/2632048.2632079
Caine, K.: Exploring everyday privacy behaviors and misclosures. Ph.D. thesis. Georgia Institute of Technology (2009)
Schaub, F.M.: Dynamic privacy adaptation in ubiquitous computing. Ph.D. thesis. Universität Ulm (2014)
Könings, B., Schaub, F., Weber, M.: Who, how, and why? Enhancing privacy awareness in ubiquitous computing. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 364–367 (2013). doi:10.1109/PerComW.2013.6529517
Starner, T.: The challenges of wearable computing: part 1. In: IEEE Micro 21(4), 44–52 (2001). doi:10.1109/40.946681
Starner, T.: The challenges of wearable computing: part 2. In: IEEE Micro 21(4), 54–67 (2001). doi:10.1109/40.946683
Raij, A., Ghosh, A., Kumar, S., Srivastava, M.: Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2011), pp. 11–20. ACM, New York (2011). doi:10.1145/1978942.1978945, http://doi.acm.org/10.1145/1978942.1978945
Motti, V.G., Caine, K.: Understanding the wearability of head-mounted devices from a human-centered perspective. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers (ISWC 2014), pp. 83–86. ACM, New York (2014). doi:10.1145/2634317.2634340, http://doi.acm.org/10.1145/2634317.2634340
Thomaz, E., Parnami, A., Bidwell, J., Essa, I., Abowd, G.D.: Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), pp. 739–748. ACM, New York (2013). doi:10.1145/2493432.2493509, http://doi.acm.org/10.1145/2493432.2493509
Jacob, C., Dumas, B.: Designing for intimacy: how fashion design can address privacy issues in wearable computing. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers: Adjunct Program (ISWC 2014 Adjunct), pp. 185–192. ACM, New York (2014). doi:10.1145/2641248.2641353, http://doi.acm.org/10.1145/2641248.2641353
Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM, 57(4), 88–96 (2014). doi:10.1145/2580723.2580730, http://doi.acm.org/10.1145/2580723.2580730
Mcnaney, R., Vines, J., Roggen, D., Balaam, M., Zhang, P., Poliakov, I., Olivier, P.: Exploring the acceptability of google glass as an everyday assistive device for people with parkinson. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), pp. 2551–2554. ACM, New York (2014). doi:10.1145/2556288.2557092, http://doi.acm.org/10.1145/2556288.2557092
Berendt, B., Günther, O., Spiekermann, S.: Privacy in e-commerce: stated preferences vs. actual behavior. In: Commun. ACM 48(4), 101–106 (2005). doi:10.1145/1053291.1053295
Nguyen, D., Mynatt, E.: Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Georgia Institute of Technology GVU Technical Report (GIT-GVU-02-16) (2002)
Solove, D.J.: Understanding Privacy. Harvard University Press, May 2008. GWU Legal Studies Research Paper No. 420, GWU Law School Public Law Research Paper No. 420. SSRN: http://ssrn.com/abstract=1127888 (2008)
Hedegaard, S., Simonsen, J.: Extracting usability and user experience information from online user reviews. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2013), pp. 2089–2098. ACM, New York (2013). doi:10.1145/2470654.2481286, http://doi.acm.org/10.1145/2470654.2481286
Iacob, C., Veerappa, V., Harrison, R.: What are you complaining about?: a study of online reviews of mobile applications. In: Proceedings of the 27th International BCS Human Computer Interaction Conference (BCS-HCI 2013). British Computer Society, Swinton, p. 6 (2013). Article 29
Fu, B., Lin, J., Li, L., Faloutsos, C.: Why people hate your app: making sense of user feedback in a mobile app store. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013), pp. 1276–1284. ACM, New York (2013). doi:10.1145/2487575.2488202, http://doi.acm.org/10.1145/2487575.2488202
Khalid, H., Shihab, E., Nagappan, M., Hassan, A.: What do mobile app users complain about? a study on free iOS apps. In: IEEE Softw. 32(3), 70–77 (2015). doi:10.1109/MS.2014.50
Acquisti, A., Gross, R., Stutzman, F.: Faces of facebook: privacy in the age of augmented reality. In: BlackHat Webcast Series USA (2011)
Acknowledgments
This material is based upon work supported by the National Science Foundation under Grant No. 1314342. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 International Financial Cryptography Association
About this paper
Cite this paper
Motti, V.G., Caine, K. (2015). Users’ Privacy Concerns About Wearables. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science(), vol 8976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48051-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-662-48051-9_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48050-2
Online ISBN: 978-3-662-48051-9
eBook Packages: Computer ScienceComputer Science (R0)