skip to main content
10.1145/1409635.1409661acmotherconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

An empirical investigation of concerns of everyday tracking and recording technologies

Published: 21 September 2008 Publication History

Abstract

This paper presents an exploration and analysis of attitudes towards everyday tracking and recording technologies (e. g., credit cards, store loyalty cards, store video cameras). Interview participants reported being highly concerned with information privacy. At the same time, however, they also reported being significantly less concerned regarding the use of everyday technologies that have the capabilities to collect, process, and disseminate personal information. We present results from this study that both identify and begin to explain this discrepancy.

References

[1]
Beckmann, C., Consolvo, S. and LaMarca, A. Some Assembly Required: Supporting End-User Sensor Installation in Domestic Ubiquitous Computing Environments. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 107--124.
[2]
Beckwith, R. Designing for Ubiquity: The Perception of Privacy IEEE Pervasive Computing 2(2), 2003, 40--46.
[3]
Boslau, M. and Lietke, B. C. RFID is in the Eye of the Consumer - Survey Results and Implications. Marketing from the Trenches: Perspectives on the road ahead. 2006, 1--19.
[4]
Brotherton, J. A. and Abowd, G. D. Lessons Learned from eClass: Assessing Automated Capture and Access in the Classroom. ACM Transactions on Computer-Human Interaction 11 (2), 121--155.
[5]
Brown, B., Taylor, A., Izadi, S., Sellen, A., Kaye, J. and Eardley, R. Locating Family Values: A Field Trial of the Whereabouts Clock. UbiComp 2007: Ubiquitous Computing, Seoul, South Korea, 2007, 354--371.
[6]
Capgemini. RFID and Consumers: Understanding Their Mindset, 2004.
[7]
Consolvo, S., Rode, J. A., McDonald, D. and Riley, C. Developing Privacy Personas: Handling Inconsistencies in Attitudes & Behaviors, Intel Research Seattle Tech Report, 2005.
[8]
Hayes, G. R., Kientz, J. A., Truong, K. N., White, D. R., Abowd, G. D. and Pering, T. Designing Capture Applications to Support the Education of Children with Autism. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 161--178.
[9]
Hayes, G. R., Poole, E. S., Iachello, G., Patel, S. N., Grimes, A., Abowd, G. D. and Truong, K. N. Physical, Social, and Experiential Knowledge in Pervasive Computing Environments. IEEE Pervasive Computing, 2007, 56--63.
[10]
Honess, T. & Charman, E. Closed Circuit Television in Public Places. Police Research Group Crime Prevention Series Paper 35, HMSO, 1992.
[11]
Iachello, G. Privacy and Proportionality. College of Computing, Georgia Institute of Technology, 2006.
[12]
I-Newswire. Grocery Store Loyalty Card Use is Strong Despite Privacy Concerns, 2004.
[13]
Jensen, C., Potts, C. and Jensen, C. Privacy Practices of Internet Users: Self-reports Versus Observed Behavior. International Journal of Human-Computer Studies, 63 (1--2). 203--227.
[14]
Karas, S. Enhancing the Privacy Discourse: Consumer Information Gathering as Surveillance. Journal of Technology Law and Policy, 7 (1).
[15]
Levine, M. SIDE and Closed Circuit Television (CCTV): Exploring Surveillance in Public Space. Chapter in T. Postmes, R. Spears, M. Lea & S. Reicher (eds): SIDE Issues Centre-Stage: Recent Developments in Studies of Deindividuation in Groups. Royal Netherlands Academy of Arts and Sciences: Amsterdam, 2000.
[16]
Lyon, D. Surveillance Society: Monitoring everyday life. Open University Press, 2001.
[17]
McCarthy, J. F. and Anagnost, T. D. MusicFX: An Arbiter of Group Preferences for Computer Supported Collaborative Workouts. ACM Conference on Computer-Supported Cooperative Work, Seattle, WA, 1998, 363--372.
[18]
Mynatt, E. D., Rowan, J., Craighill, S. and Jacobs, A. Digital Family Portraits: Supporting Peace of Mind for Extended Family Members. SIGCHI Conference on Human Factors in Computing Systems, Seattle, WA, 2001, 333--340.
[19]
Palen, L. and Dourish, P. Unpacking "Privacy" for a Networked World. SIGCHI Conference on Human Factors in Computing Systems, Fort Lauderdale, FL, 2003, 129--136.
[20]
Patterson, D. J., Liao, L., Gajos, K., Collier, M., Livic, N., Olson, K., Wang, S., Fox, D. and Kautz, H. Opportunity Knocks: A System to Provide Cognitive Assistance with Transportation Services. UbiComp 2004: Ubiquitous Computing, Nottingham, England, 2004, 433--450.
[21]
Schilit, B., Adams, N. and Want, R., Context-Aware Computing Applications. IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, 1994, 85--90.
[22]
Smith, H. J., Milberg, S. J. and Burke, S. J. Information Privacy: Measuring Individuals' Concerns about Organizational Practices. MIS Quarterly, 20 (2). 167--196.
[23]
Solove, D. J. The Digital Person: Technology and Privacy in the Information Age. NYU Press, 2004.
[24]
Solove, D. J. 'I've Got Nothing to Hide' and Other Misunderstandings of Privacy. San Diego Law Review, 2007, 44.
[25]
Spiekermann, S. Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation. UbiComp 2007: Ubiquitous Computing, Innsbruck, Austria, 2007, 56--72.
[26]
Truong, K., Abowd, G. and Brotherton, J. Who, What, When, Where, How: Design Issues of Capture & Access Applications Ubicomp 2001: Ubiquitous Computing, 2001, Atlanta, GA, 209--224.
[27]
van de Garde-Perik, E., Markopoulos, P., de Ruyter, B., Eggen, B. and Ijsselsteijn, W. Investigating Privacy Attitudes and Behavior in Relation to Personalization. Social Science Computer Review, 26 (1). 20--43.
[28]
Want, R. "RFID: A Key to Automating Everything." Scientific American, Jan. 2004, 56--65.
[29]
Wild, C. J. and Seber, G. A. F. Chance Encounters: A First Course in Data Analysis and Inference. Wiley, 2000.
[30]
Zureik, E., Harling-Stalker, L., Smith, E., Lyon, D. and Chan, Y. E. Privacy, Surveillance and the Globalization of Personal Information: International Comparisons. McGill-Queen's University Press, Kingston, ON, Canada, Forthcoming 2008.

Cited By

View all
  • (2024)Exploring Users' Mental Models and Privacy Concerns During Interconnected InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765048:MHCI(1-23)Online publication date: 24-Sep-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • (2024)Towards a Harmonised Approach for Security and Privacy Management in Smart Home ContextsHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61379-1_12(170-187)Online publication date: 1-Jun-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
UbiComp '08: Proceedings of the 10th international conference on Ubiquitous computing
September 2008
404 pages
ISBN:9781605581361
DOI:10.1145/1409635
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. everyday technologies
  2. privacy
  3. recording
  4. retail
  5. tracking
  6. user study

Qualifiers

  • Research-article

Conference

UbiComp08

Acceptance Rates

Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)6
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Exploring Users' Mental Models and Privacy Concerns During Interconnected InteractionsProceedings of the ACM on Human-Computer Interaction10.1145/36765048:MHCI(1-23)Online publication date: 24-Sep-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • (2024)Towards a Harmonised Approach for Security and Privacy Management in Smart Home ContextsHCI for Cybersecurity, Privacy and Trust10.1007/978-3-031-61379-1_12(170-187)Online publication date: 1-Jun-2024
  • (2023)Investigating Tangible Privacy-Preserving Mechanisms for Future Smart HomesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581167(1-16)Online publication date: 19-Apr-2023
  • (2023)The Role of Consumers’ Privacy Awareness in the Privacy Calculus for IoT ServicesInternational Journal of Human–Computer Interaction10.1080/10447318.2023.218410240:12(3173-3184)Online publication date: 10-Mar-2023
  • (2022)SaferHome: Interactive Physical and Digital Smart Home Dashboards for Communicating Privacy Assessments to Owners and BystandersProceedings of the ACM on Human-Computer Interaction10.1145/35677396:ISS(680-699)Online publication date: 14-Nov-2022
  • (2022)Passive social sensing with smartphones: a systematic reviewComputing10.1007/s00607-022-01112-2105:1(29-51)Online publication date: 12-Aug-2022
  • (2021)Factors that influence user perception of ubiquitous monitoring environmentsJournal of Ambient Intelligence and Smart Environments10.3233/AIS-21059213:2(117-131)Online publication date: 1-Jan-2021
  • (2021)Roles Matter! Understanding Differences in the Privacy Mental Models of Smart Home Visitors and ResidentsProceedings of the 20th International Conference on Mobile and Ubiquitous Multimedia10.1145/3490632.3490664(108-122)Online publication date: 5-Dec-2021
  • (2021)“It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home ProductsProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445691(1-16)Online publication date: 6-May-2021
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media