Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Users’ Privacy Concerns About Wearables

Impact of Form Factor, Sensors and Type of Data Collected

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8976))

Included in the following conference series:

Abstract

Wearables have become popular in several application domains, including healthcare, entertainment and security. Their pervasiveness, small size and autonomy, enlarges the potential of these devices to be employed in different activities and scenarios. Wearable devices collect data ubiquitously and continuously, about the individual user and also her surroundings, which can pose many privacy challenges that neither users nor stakeholders are ready to deal with. Before designing effective solutions for developing privacy-enhanced wearables, we need first to identify and understand what are the potential privacy concerns that users have and how they are perceived. To contribute to that purpose, in this paper we present findings from a qualitative content analysis of online comments regarding privacy concerns of wearable device users. We also discuss how form factors, sensors employed, and the type of data collected impact the users’ perception of privacy. Our results show that users have different levels and types of privacy concerns depending on the type of wearable they use. By better understanding the users’ perspectives about wearable privacy, we aim at helping designers and researchers to develop effective solutions to create privacy-enhanced wearables.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Warren, S.D., Brandeis, L.D.: Right to privacy. Harv. Law Rev. 4, 193–220 (1890)

    Article  Google Scholar 

  2. Mancini, C., Thomas, K., Rogers, Y., Price, B.A., Jedrzejczyk, L., Bandara, A.K., Joinson, A.N., Nuseibeh, B.: From spaces to places: emerging contexts in mobile privacy. In: Proceedings of the 11th International Conference on Ubiquitous Computing (UbiComp 2009), pp. 1–10. ACM, New York (2009). doi:10.1145/1620545.1620547, http://doi.acm.org/10.1145/1620545.1620547

  3. Shklovski, I., Mainwaring, S.D., Skúladóttir, H.H., Borgthorsson, H.: Leakiness and creepiness in app space: perceptions of privacy and mobile app use. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems (CHI 2014), pp. 2647–2656. ACM, New York (2014). doi:10.1145/2556288.2557421, http://doi.acm.org/10.1145/2556288.2557421

  4. Ur, B., Wang, Y.: A cross-cultural framework for protecting user privacy in online social media. In: Proceedings of the 22nd International Conference on World Wide Web Companion (WWW 2013 Companion), pp. 755–762. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva (2013)

    Google Scholar 

  5. Gürses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Secur. Priv. 11(3), 29–37 (2013). doi:10.1109/MSP.2013.47, http://dx.doi.org/10.1109/MSP.2013.47

    Article  Google Scholar 

  6. Reidenberg, J.R. et al.: Disagreeable Privacy Policies: Mismatches between Meaning and Users’ Understanding, 15 August 2014. Fordham Law Legal Studies. At: http://ssrn.com/abstract=2418297

  7. Shay, R., Ion, I., Reeder, R.W., Consolvo, S.: My religious aunt asked why I was trying to sell her viagra: experiences with account hijacking. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), pp. 2657–2666. ACM, New York (2014). doi:10.1145/2556288.2557330, http://doi.acm.org/10.1145/2556288.2557330

  8. Troshynski, E., Lee, C., Dourish, P.: Accountabilities of presence: reframing location-based systems. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2008), pp. 487–496. ACM, New York (2008). doi:10.1145/1357054.1357133, http://doi.acm.org/10.1145/1357054.1357133

  9. Hoyle, R., Templeman, R., Armes, S., Anthony, D., Crandall, D., Kapadia, A.: Privacy behaviors of lifeloggers using wearable cameras. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2014), pp. 571–582. ACM, New York (2014). doi:10.1145/2632048.2632079, http://doi.acm.org/10.1145/2632048.2632079

  10. Caine, K.: Exploring everyday privacy behaviors and misclosures. Ph.D. thesis. Georgia Institute of Technology (2009)

    Google Scholar 

  11. Schaub, F.M.: Dynamic privacy adaptation in ubiquitous computing. Ph.D. thesis. Universität Ulm (2014)

    Google Scholar 

  12. Könings, B., Schaub, F., Weber, M.: Who, how, and why? Enhancing privacy awareness in ubiquitous computing. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 364–367 (2013). doi:10.1109/PerComW.2013.6529517

  13. Starner, T.: The challenges of wearable computing: part 1. In: IEEE Micro 21(4), 44–52 (2001). doi:10.1109/40.946681

    Article  Google Scholar 

  14. Starner, T.: The challenges of wearable computing: part 2. In: IEEE Micro 21(4), 54–67 (2001). doi:10.1109/40.946683

    Article  Google Scholar 

  15. Raij, A., Ghosh, A., Kumar, S., Srivastava, M.: Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2011), pp. 11–20. ACM, New York (2011). doi:10.1145/1978942.1978945, http://doi.acm.org/10.1145/1978942.1978945

  16. Motti, V.G., Caine, K.: Understanding the wearability of head-mounted devices from a human-centered perspective. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers (ISWC 2014), pp. 83–86. ACM, New York (2014). doi:10.1145/2634317.2634340, http://doi.acm.org/10.1145/2634317.2634340

  17. Thomaz, E., Parnami, A., Bidwell, J., Essa, I., Abowd, G.D.: Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In: Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), pp. 739–748. ACM, New York (2013). doi:10.1145/2493432.2493509, http://doi.acm.org/10.1145/2493432.2493509

  18. Jacob, C., Dumas, B.: Designing for intimacy: how fashion design can address privacy issues in wearable computing. In: Proceedings of the 2014 ACM International Symposium on Wearable Computers: Adjunct Program (ISWC 2014 Adjunct), pp. 185–192. ACM, New York (2014). doi:10.1145/2641248.2641353, http://doi.acm.org/10.1145/2641248.2641353

  19. Roesner, F., Kohno, T., Molnar, D.: Security and privacy for augmented reality systems. Commun. ACM, 57(4), 88–96 (2014). doi:10.1145/2580723.2580730, http://doi.acm.org/10.1145/2580723.2580730

    Article  Google Scholar 

  20. Mcnaney, R., Vines, J., Roggen, D., Balaam, M., Zhang, P., Poliakov, I., Olivier, P.: Exploring the acceptability of google glass as an everyday assistive device for people with parkinson. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2014), pp. 2551–2554. ACM, New York (2014). doi:10.1145/2556288.2557092, http://doi.acm.org/10.1145/2556288.2557092

  21. Berendt, B., Günther, O., Spiekermann, S.: Privacy in e-commerce: stated preferences vs. actual behavior. In: Commun. ACM 48(4), 101–106 (2005). doi:10.1145/1053291.1053295

    Article  Google Scholar 

  22. Nguyen, D., Mynatt, E.: Privacy mirrors: understanding and shaping socio-technical ubiquitous computing systems. Georgia Institute of Technology GVU Technical Report (GIT-GVU-02-16) (2002)

    Google Scholar 

  23. Solove, D.J.: Understanding Privacy. Harvard University Press, May 2008. GWU Legal Studies Research Paper No. 420, GWU Law School Public Law Research Paper No. 420. SSRN: http://ssrn.com/abstract=1127888 (2008)

  24. Hedegaard, S., Simonsen, J.: Extracting usability and user experience information from online user reviews. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2013), pp. 2089–2098. ACM, New York (2013). doi:10.1145/2470654.2481286, http://doi.acm.org/10.1145/2470654.2481286

  25. Iacob, C., Veerappa, V., Harrison, R.: What are you complaining about?: a study of online reviews of mobile applications. In: Proceedings of the 27th International BCS Human Computer Interaction Conference (BCS-HCI 2013). British Computer Society, Swinton, p. 6 (2013). Article 29

    Google Scholar 

  26. Fu, B., Lin, J., Li, L., Faloutsos, C.: Why people hate your app: making sense of user feedback in a mobile app store. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2013), pp. 1276–1284. ACM, New York (2013). doi:10.1145/2487575.2488202, http://doi.acm.org/10.1145/2487575.2488202

  27. Khalid, H., Shihab, E., Nagappan, M., Hassan, A.: What do mobile app users complain about? a study on free iOS apps. In: IEEE Softw. 32(3), 70–77 (2015). doi:10.1109/MS.2014.50

    Google Scholar 

  28. Acquisti, A., Gross, R., Stutzman, F.: Faces of facebook: privacy in the age of augmented reality. In: BlackHat Webcast Series USA (2011)

    Google Scholar 

Download references

Acknowledgments

This material is based upon work supported by the National Science Foundation under Grant No. 1314342. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vivian Genaro Motti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 International Financial Cryptography Association

About this paper

Cite this paper

Motti, V.G., Caine, K. (2015). Users’ Privacy Concerns About Wearables. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds) Financial Cryptography and Data Security. FC 2015. Lecture Notes in Computer Science(), vol 8976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48051-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48051-9_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48050-2

  • Online ISBN: 978-3-662-48051-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics