skip to main content
research-article
Open Access

Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers

Authors Info & Claims
Published:30 June 2017Publication History
Skip Abstract Section

Abstract

Low cost digital cameras in smartphones and wearable devices make it easy for people to automatically capture and share images as a visual lifelog. Having been inspired by a US campus based study that explored individual privacy behaviours of visual lifeloggers, we conducted a similar study on a UK campus, however we also focussed on the privacy behaviours of groups of lifeloggers. We argue for the importance of replicability and therefore we built a publicly available toolkit, which includes camera design, study guidelines and source code. Our results show some similar sharing behaviour to the US based study: people tried to preserve the privacy of strangers, but we found fewer bystander reactions despite using a more obvious camera. In contrast, we did not find a reluctance to share images of screens but we did find that images of vices were shared less. Regarding privacy behaviours in groups of lifeloggers, we found that people were more willing to share images of people they were interacting with than of strangers, that lifelogging in groups could change what defines a private space, and that lifelogging groups establish different rules to manage privacy for those inside and outside the group.

References

  1. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International workshop on privacy enhancing technologies. Springer, 36--58. http://link.springer.com/10.1007/11957454_3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Irwin Altman. 1975. The environment and social behavior: privacy, personal space, territory, crowding. Brooks/Cole Pub. Co., Monterey, Calif.Google ScholarGoogle Scholar
  3. Barak Ariel, Alex Sutherland, Darren Henstock, Josh Young, Paul Drover, Jayne Sykes, Simon Megicks, and Ryan Henderson. 2016. “Contagious Accountability” A Global Multisite Randomized Controlled Trial on the Effect of Police Body-Worn Cameras on CitizensâĂŹ Complaints Against the Police. Criminal Justice and Behavior (2016), 0093854816668218. http://cjb.sagepub.com/content/early/2016/09/21/0093854816668218.abstractGoogle ScholarGoogle Scholar
  4. Richard A Armstrong. 2014. When to use the Bonferroni correction. Ophthalmic and Physiological Optics 34, 5 (2014), 502--508.Google ScholarGoogle ScholarCross RefCross Ref
  5. Lemi Baruh and Zeynep Cemalcilar. 2014. It is more than personal: Development and validation of a multidimensional privacy orientation scale. Personality and Individual Differences 70 (Nov. 2014), 165--170.Google ScholarGoogle Scholar
  6. danah boyd. 2010. Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications. In Networked Self: Identity, Community, and Culture on Social Network Sites, Zizi Papacharissi (Ed.). 39--58. http://www.danah.org/papers/2010/SNSasNetworkedPublicsGoogle ScholarGoogle Scholar
  7. Kelly Erinn Caine. 2009. Exploring everyday privacy behaviors and misclosures. PhD. Georgia Institute of Technology. https://smartech.gatech.edu/handle/1853/31665Google ScholarGoogle Scholar
  8. Jennifer L. Carlson, Mike Paget, and Tim McCollum. 2013. Replicating Two TelePresence Camera Depth-of-Field Settings in One User Experience Study. (2013). http://ceur-ws.org/Vol-976/spaper6.pdfGoogle ScholarGoogle Scholar
  9. Soumyadeb Chowdhury, Md Sadek Ferdous, and Joemon M. Jose. 2016. Lifelogging User Study: Bystander Privacy. In Proceedings of British HCI - Fusion. BCS, pp. 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Soumyadeb Chowdhury, Md Sadek Ferdous, and Joemon M. Jose. 2016. Understanding Lifelog Sharing Preferences of Lifeloggers. In Proceedings of the 28th Australian Conference on Computer-Human Interaction (OzCHI ’16). ACM, New York, NY, USA, 649--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sarah Clinch, Nigel Davies, Mateusz Mikusz, Paul Metzger, Marc Langheinrich, Albrecht Schmidt, and Geoff Ward. 2016. Collecting Shared Experiences through Lifelogging: Lessons Learned. Pervasive Computing, IEEE 15, 1 (2016), 58--67. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7389256 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Alex Fitzpatrick. 2014. Why Google Glass Isn’t the Future. TIME.com (Nov. 2014). http://time.com/3588143/google-glass/Google ScholarGoogle Scholar
  13. Ruth Gavison. 1980. Privacy and the Limits of Law. The Yale Law Journal 89, 3 (Jan. 1980), 421.Google ScholarGoogle ScholarCross RefCross Ref
  14. Erving Goffman. 1959. The Presentation of Self in Everyday Life. Doubleday, New York.Google ScholarGoogle Scholar
  15. Cathal Gurrin, Rami Albatal, Hideo Joho, and Kaori Ishii. 2014. A privacy by design approach to lifelogging. Digital Enlightenment Yearbook (2014), 49--73.Google ScholarGoogle Scholar
  16. Andrew F Hayes and Klaus Krippendorff. 2007. Answering the call for a standard reliability measure for coding data. Communication methods and measures 1, 1 (2007), 77--89.Google ScholarGoogle Scholar
  17. S. Hodges, L. Williams, E. Berry, S. Izadi, J. Srinivasan, A. Butler, G. Smyth, N. Kapur, and K. Wood. 2006. SenseCam: A retrospective memory aid. UbiComp 2006: Ubiquitous Computing (2006), 177--193. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. David Houghton, Adam Joinson, Nigel Caldwell, and Ben Marder. 2013. Tagger’s delight? Disclosure and liking in Facebook: the effects of sharing photographs amongst multiple known social circles. Technical Report. http://epapers.bham.ac.uk/1723Google ScholarGoogle Scholar
  19. Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM Press, 1645--1648. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. Proceedings of the 16th International Conference on Ubiquitous Computing (2014), 571--582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Carlos Jensen, Colin Potts, and Christian Jensen. 2005. Privacy Practices of Internet Users: Self-reports Versus Observed Behavior. Int. J. Hum.-Comput. Stud. 63, 1-2 (July 2005), 203--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Paul Kelly, Simon J. Marshall, Hannah Badland, Jacqueline Kerr, Melody Oliver, Aiden R. Doherty, and Charlie Foster. 2013. An Ethical Framework for Automated, Wearable Cameras in Health Behavior Research. American Journal of Preventive Medicine 44, 3 (March 2013), 314--319.Google ScholarGoogle ScholarCross RefCross Ref
  23. Marion Koelle, Matthias Kranz, and Andreas MÃũller. 2015. Don’t look at me that way!: Understanding User Attitudes Towards Data Glasses Usage. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM Press, 362--372. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2014. Screenavoider: Protecting computer screens from ubiquitous cameras. arXiv preprint arXiv:1412.0008 (2014). http://arxiv.org/abs/1412.0008Google ScholarGoogle Scholar
  25. David Kushner. 2011. The Making of Arduino. IEEE Spectrum (26 Oct. 2011). http://spectrum.ieee.org/geek-life/hands-on/the-making-of-arduinoGoogle ScholarGoogle Scholar
  26. Carine Lallemand, Vincent Koenig, and Guillaume Gronier. 2013. Replicating an international survey on user experience: challenges, successes and limitations. In Proceedings of RepliCHI - CHI ’13 Extended Abstracts on Human Factors in Computing Systems (CHIEA ’13). 5.Google ScholarGoogle Scholar
  27. Clara Mancini, K. Thomas, Y Rogers, Blaine A. Price, L. Jedrzejczyk, A. K Bandara, A. N Joinson, and B. Nuseibeh. 2009. From spaces to places: emerging contexts in mobile privacy. In Proc. of UbiComp2009. 1--10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Steve Mann. 1998. ‘WearCam’ (The Wearable Camera): Personal Imaging Systems for long--term use in wearable tetherless computer-mediated reality and personal Photo/Videographic Memory Prosthesis. In Proceedings of the 2nd IEEE International Symposium on Wearable Computers. IEEE Computer Society, 124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Gary T. Marx. 2003. A Tack in the Shoe: Neutralizing and Resisting the New Surveillance. Journal of Social Issues 59, 2 (June 2003), 369--390.Google ScholarGoogle ScholarCross RefCross Ref
  30. Miguel A. Nacenta, Yemliha Kamber, Yizhou Qiang, and Per Ola Kristensson. 2013. Memorability of Pre-designed and User-defined Gesture Sets. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). ACM, New York, NY, USA, 1099--1108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Narrative. 2017. Narrative Clip. (2017). http://getnarrative.comGoogle ScholarGoogle Scholar
  32. Helen Nissenbaum. 2010. Privacy in Context: Technology, Policy and the Integrity of Social Life. Standford University Press, Standford, California. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Patricia A. Norberg and Daniel R. Horne. 2007. Privacy attitudes and privacy-related behavior. Psychology and Marketing 24, 10 (2007), 829--847.Google ScholarGoogle ScholarCross RefCross Ref
  34. Open Science Collaboration. 2015. Estimating the reproducibility of psychological science. Science 349, 6251 (Aug. 2015), aac4716--aac4716.Google ScholarGoogle Scholar
  35. Sandra S. Petronio. 2002. Boundaries of privacy: dialectics of disclosure. State University of New York Press.Google ScholarGoogle Scholar
  36. Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody’s Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM Press, 1649--1658. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. S. D. Reicher, R. Spears, and T. Postmes. 1995. A Social Identity Model of Deindividuation Phenomena. European Review of Social Psychology 6, 1 (Jan. 1995), 161--198.Google ScholarGoogle ScholarCross RefCross Ref
  38. Luis Sanchez, José Antonio Galache, Veronica Gutierrez, Jose Manuel Hernandez, Jesús Bernat, Alex Gluhak, and Tomás Garcia. 2011. Smartsantander: The meeting point between future internet research and experimentation and the smart cities. In Future Network 8 Mobile Summit (FutureNetw), 2011. IEEE, 1--8.Google ScholarGoogle Scholar
  39. Inc. Snap. 2017. Snapchat Spectacles. (2017). https://www.spectacles.com/Google ScholarGoogle Scholar
  40. Flávio Souza, Diego de Las Casas, Vinícius Flores, SunBum Youn, Meeyoung Cha, Daniele Quercia, and Virgílio Almeida. 2015. Dawn of the Selfie Era: The Whos, Wheres, and Hows of Selfies on Instagram. In Proceedings of the 2015 ACM on Conference on Online Social Networks (COSN ’15). ACM, New York, NY, USA, 221--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Iuliu Vasilescu, Keith Kotay, Daniela Rus, Matthew Dunbabin, and Peter Corke. 2005. Data collection, storage, and retrieval with an underwater sensor network. In Proceedings of the 3rd international conference on Embedded networked sensor systems. ACM, 154--165. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. A.F. Westin. 1967. Privacy and Freedom. Atheneum. https://books.google.ae/books?id=ydMlnQEACAAJGoogle ScholarGoogle Scholar
  43. Alan F. Westin. 2003. Social and Political Dimensions of Privacy. Journal of Social Issues 59, 2 (2003), 431--453.Google ScholarGoogle ScholarCross RefCross Ref
  44. Max L. Wilson, Ed H. Chi, Stuart Reeves, and David Coyle. 2014. RepliCHI: The Workshop II. In CHI’14 Extended Abstracts on Human Factors in Computing Systems (CHIEA ’14). ACM, New York, NY, USA, 33--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Max L. L. Wilson, Paul Resnick, David Coyle, and Ed H. Chi. 2013. RepliCHI: The Workshop. In CHI ’13 Extended Abstracts on Human Factors in Computing Systems (CHIEA ’13). ACM, New York, NY, USA, 3159--3162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Mu Yang, Yijun Yu, Arosha K. Bandara, and Bashar Nuseibeh. 2014. Adaptive sharing for online social networks: a trade-off between privacy risk and social benefit. In Proceedings of 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 45--52. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Logging you, Logging me: A Replicable Study of Privacy and Sharing Behaviour in Groups of Visual Lifeloggers

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
          Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 1, Issue 2
          June 2017
          665 pages
          EISSN:2474-9567
          DOI:10.1145/3120957
          Issue’s Table of Contents

          Copyright © 2017 Owner/Author

          This work is licensed under a Creative Commons Attribution International 4.0 License.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 30 June 2017
          • Revised: 1 April 2017
          • Accepted: 1 April 2017
          • Received: 1 February 2017
          Published in imwut Volume 1, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader