Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2702123.2702251acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms

Published: 18 April 2015 Publication History

Abstract

We are approaching an environment where ubiquitous computing devices will constantly accept input via audio and video channels: kiosks that determine demographic information of passersby, gesture controlled home entertainment systems and audio controlled wearable devices are just a few examples. To enforce the principle of least privilege, recent proposals have suggested technical approaches to limit third-party applications to receiving only the data they need, rather than entire audio or video streams. For users to make informed privacy decisions, applications will still need to communicate what data they are accessing and indicators will be needed to communicate this information. We performed several crowdsourcing experiments to examine how potential users might conceptualize and understand privacy indicators on ubiquitous sensing platforms.

References

[1]
G. D. Abowd, G. R. Hayes, G. Iachello, J. A. Kientz, S. N. Patel, M. M. Stevens, and K. N. Truong. Prototypes and paratypes: Designing mobile and ubiquitous computing applications. IEEE Pervasive Computing, 4(4):67--73, Oct. 2005.
[2]
G. D. Abowd and E. D. Mynatt. Charting past, present, and future research in ubiquitous computing. ACM Trans. Comput.-Hum. Interact., 7(1):29--58, Mar. 2000.
[3]
V. Bellotti and A. Sellen. Design for privacy in ubiquitous computing environments. In Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work, pages 77--92, Norwell, MA, USA, 1993. Kluwer Academic Publishers.
[4]
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. Mockdroid: Trading privacy for application functionality on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, pages 49--54, New York, NY, USA, 2011. ACM.
[5]
M. S. Bernstein, G. Little, R. C. Miller, B. Hartmann, M. S. Ackerman, D. R. Karger, D. Crowell, and K. Panovich. Soylent: A word processor with a crowd inside. In Proceedings of the 23Nd Annual ACM Symposium on User Interface Software and Technology, UIST '10, pages 313--322, New York, NY, USA, 2010. ACM.
[6]
M. B. Curry, S. J. McDougall, and O. de Bruijn. The effects of the visual metaphor in determining icon efficacy. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, volume 42, pages 1590--1594. SAGE Publications, 1998.
[7]
L. D'Antoni, A. Dunn, S. Jana, T. Kohno, B. Livshits, D. Molnar, A. MoshchUnited Kingdom, E. Ofek, F. Roesner, S. Saponas, M. Veanes, and H. J. Wang. Operating system support for augmented reality applications. In Proceedings of the 14th USENIX Conference on Hot Topics in Operating Systems, HotOS'13, pages 21--21, Berkeley, CA, USA, 2013. USENIX Association.
[8]
S. P. Dow, A. Glassco, J. Kass, M. Schwarz, D. L. Schwartz, and S. R. Klemmer. Parallel prototyping leads to better design results, more divergence, and increased self-efficacy. ACM Trans. Comput.-Hum. Interact., 17(4):18:1--18:24, Dec. 2010.
[9]
W. K. Edwards and R. E. Grinter. At home with ubiquitous computing: Seven challenges. In Proceedings of the 3rd International Conference on Ubiquitous Computing, UbiComp '01, pages 256--272, London, United Kingdom, United Kingdom, 2001. Springer-Verlag.
[10]
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association.
[11]
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS '12, New York, NY, USA, 2012. ACM.
[12]
S. Guha, M. Jain, and V. N. Padmanabhan. Koi: A location-privacy platform for smartphone apps. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pages 14--14, Berkeley, CA, USA, 2012. USENIX Association.
[13]
J. I. Hong, J. D. Ng, S. Lederer, and J. A. Landay. Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, DIS '04, pages 91--100, New York, NY, USA, 2004. ACM.
[14]
P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pages 639--652, New York, NY, USA, 2011. ACM.
[15]
G. Iachello and G. D. Abowd. Privacy and proportionality: Adapting legal evaluation techniques to inform design in ubiquitous computing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '05, pages 91--100, New York, NY, USA, 2005. ACM.
[16]
Intel Corporation. Intel RealSense Technology, 2014. http://www.intel.com/content/www/us/en/ architecture-and-technology/ realsense-overview.html.
[17]
R. Kang, S. Brown, L. Dabbish, and S. Kiesler. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. pages 37--49. USENIX Association, Submitted.
[18]
R. Kannavara and K. Shippy. Topics in Biometric Human-Machine Interaction Security. Potentials, IEEE, 32(6):18--25, 2013.
[19]
P. G. Kelley. Conducting Usable Privacy & Security Studies with Amazon's Mechanical Turk. In Proceedings of the 6th Symposium on Usable Privacy and Security (SOUPS), SOUPS 2010. USENIX Association, 2010.
[20]
T. Kindberg and A. Fox. System software for ubiquitous computing. IEEE Pervasive Computing, 1(1):70--81, Jan. 2002.
[21]
A. Kittur, E. H. Chi, and B. Suh. Crowdsourcing User Studies with Mechanical Turk. In CHI '08: Proceeding of The Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems, pages 453--456, New York, NY, USA, 2008. ACM.
[22]
R. Kumar, J. O. Talton, S. Ahmad, and S. R. Klemmer. Bricolage: Example-based retargeting for web design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 2197--2206, New York, NY, USA, 2011. ACM.
[23]
M. Langheinrich. Privacy by design - principles of privacy-aware ubiquitous systems. In Proceedings of the 3rd international conference on Ubiquitous Computing, UbiComp '01, pages 273--291, London, United Kingdom, United Kingdom, 2001. Springer-Verlag.
[24]
S. Lederer, J. I. Hong, A. K. Dey, and J. A. Landay. Personal privacy through understanding and action: Five pitfalls for designers. Personal Ubiquitous Comput., 8(6):440--454, Nov. 2004.
[25]
J. Lin, N. Sadeh, S. Amini, J. Lindqvist, J. I. Hong, and J. Zhang. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, UbiComp '12, pages 501--510, New York, NY, USA, 2012. ACM.
[26]
Microsoft Corporation. Xbox One, 2014. http://www.xbox.com/en-US/xbox-one/innovation.
[27]
J. Moyes and P. W. Jordan. Icon design and its effect on guessability, learnability, and experienced user performance. People and computers, (8):49--60, 1993.
[28]
J. Newman. Pebble smartwatch pre-orders are sold out, $10+ million pledged. Time, May 10 2012. http://techland.time.com/2012/05/10/ pebble-smartwatch-pre-orders-sold-out/.
[29]
L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM New York, NY, USA, April 5--10 2003.
[30]
A. Raij, A. Ghosh, S. Kumar, and M. Srivastava. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '11, pages 11--20, New York, NY, USA, 2011. ACM.
[31]
F. Roesner, T. Kohno, and D. Molnar. Security and privacy for augmented reality systems. Communications of The ACM, 2014. http://www.franziroesner.com/ pdf/arsec-cacm2014-preprint.pdf.
[32]
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, 1975.
[33]
J. Stern. Google glass explorer edition to ship this month. ABC News, April 10 2013. http://abcnews.go.com/blogs/technology/2013/04/ google-glass-explorer-edition-to-ship-this-month/.
[34]
C. Thompson, M. Johnson, S. Egelman, D. Wagner, and J. King. When it's better to ask forgiveness than get permission: Designing usable audit mechanisms for mobile permissions. In Proceedings of the 2013 Symposium on Usable Privacy and Security (SOUPS), 2013.
[35]
L. von Ahn and L. Dabbish. Labeling images with a computer game. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '04, pages 319--326, New York, NY, USA, 2004. ACM.
[36]
M. Weiser. The computer for the 21st century. Scientific American, pages 94--104, 1991.

Cited By

View all
  • (2024)Regaining Trust: Impact of Transparent User Interface Design on Acceptance of Camera-Based In-Car Health Monitoring SystemsAdjunct Proceedings of the 16th International Conference on Automotive User Interfaces and Interactive Vehicular Applications10.1145/3641308.3685048(203-208)Online publication date: 22-Sep-2024
  • (2024)"Why is Everything in the Cloud?": Co-Designing Visual Cues Representing Data Processes with ChildrenProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655819(517-532)Online publication date: 17-Jun-2024
  • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
      April 2015
      4290 pages
      ISBN:9781450331456
      DOI:10.1145/2702123
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 April 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. crowdsourcing
      2. privacy
      3. ubiquitous computing

      Qualifiers

      • Research-article

      Funding Sources

      • Intel

      Conference

      CHI '15
      Sponsor:
      CHI '15: CHI Conference on Human Factors in Computing Systems
      April 18 - 23, 2015
      Seoul, Republic of Korea

      Acceptance Rates

      CHI '15 Paper Acceptance Rate 486 of 2,120 submissions, 23%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI '25
      CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)37
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Regaining Trust: Impact of Transparent User Interface Design on Acceptance of Camera-Based In-Car Health Monitoring SystemsAdjunct Proceedings of the 16th International Conference on Automotive User Interfaces and Interactive Vehicular Applications10.1145/3641308.3685048(203-208)Online publication date: 22-Sep-2024
      • (2024)"Why is Everything in the Cloud?": Co-Designing Visual Cues Representing Data Processes with ChildrenProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655819(517-532)Online publication date: 17-Jun-2024
      • (2024)In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera GlassesProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642242(1-18)Online publication date: 11-May-2024
      • (2023)"My privacy for their security"Proceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620438(3583-3600)Online publication date: 9-Aug-2023
      • (2023)Empirical Research Methods in Usable Privacy and SecurityHuman Factors in Privacy Research10.1007/978-3-031-28643-8_3(29-53)Online publication date: 10-Mar-2023
      • (2022)Understanding Online Privacy—A Systematic Review of Privacy Visualizations and Privacy by Design GuidelinesACM Computing Surveys10.1145/350228855:3(1-37)Online publication date: 3-Feb-2022
      • (2021)"How i know for sure"Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563581(159-180)Online publication date: 9-Aug-2021
      • (2021)Personal information inference from voice recordings: User awareness and privacy concernsProceedings on Privacy Enhancing Technologies10.2478/popets-2022-00022022:1(6-27)Online publication date: 20-Nov-2021
      • (2021)Seeing is Believing?Proceedings of the 29th ACM International Conference on Multimedia10.1145/3474085.3475552(4183-4192)Online publication date: 17-Oct-2021
      • (2021)A Systematic Literature Review of Empirical Methods and Risk Representation in Usable Privacy and Security ResearchACM Transactions on Computer-Human Interaction10.1145/346984528:6(1-50)Online publication date: 23-Dec-2021
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media