Publication Type:
Conference Paper
Source:
People and Computers XV - Interaction without frontiers - Joint Proceedings of HCI2001 and ICM2001, Springer, Lille, p.49-64 (0)
Keywords:
privacy;
multimedia communications;
grounded theory;
trust;
user centred design;
Privacy - Anne Adams
Abstract:
As the use of ubiquitous multimedia communication increases so do the
privacy risks associated with widespread accessibility and utilisation of
data generated by such applications. Most invasions of privacy are not
intentional but due to designers inability to anticipate how this data
could be used, by whom, and how this might affect users. This paper
addresses the problem by providing a model of user perceptions of privacy
in multimedia environments. The model has been derived from an analysis
of empirical studies conducted by the authors and other researchers and
aids designers to determine which information users regard as private,
and in which context. It also identifies trade-offs that users are willing
to make rendering some privacy risks acceptable. To demonstrate how
this model can be used to assess the privacy implications of multimedia
communications in a specific context, an example of the models application
for a specific usage scenario is provided.
Notes:
Influences of what users are prepared to reveal about themselves:
· Organizational culture
· Perceptions of the situation
Model of how user perceives privacy:
· Which info users regard as private
· From whom
· In which context
· Trade-off between potential risks and benefits
Privacy model factors and assumptions:
· Information Sensitivity
· Information Receiver
· Information Usage
Privacy Invasion Cycle
· Trust: users don’t go into every situation ready to assess the privacy benefits and risks.
· Assumptions: based on
o User previous knowledge and experiences and their role in the interaction
o Perceived Information Sensitivity
§ Primary (core data being broadcasting; topic of the discussion) and Secondary (social psychological interpretation; body language) Level Information. What context the info was viewed in, how it was used and who viewed it.
§ Situation: user’s notion of place
o Perceived Information Receiver
o Perceived Information Usage
§ Task
§ Recording awareness
§ Repeated viewing
§ Context
§ Editing
§ Risk/benefits trade-offs
o Perceived Context of Interaction
§ Technology
§ Social, organizational and national context
· Realization and Response
· Decreasing Cycle
Recommendations:
· Briefing Session
o Systems details
o Interaction details
§ When they can be viewed and heard
§ Who the IR is
o Recoding details
· Interface changes: Information Broadcaster
o Data transmission
o Interaction Feedback
o Recording Feedback
· Interface changes: Information Receiver
o Contextual feedback
o Edited data
o Information handling/usage
· Policy procedures
o Recording permission
o Changed usage
o Editing
o Continued privacy evaluation
References:
· Adams, A. (1999) Users’ Perception of Privacy in Multimedia Communication, in M.W. Altom & M.G.Williams (eds.), Companion Proceedings of CHI’99, ACM Press, 53-4
· Belloti, V. (1996). What you don’t know can hurt you: privacy in collaborative computing, in A. Sasse, R.J. Cunningham & R. Winder (eds.), People and Computers XI (Proceedings HCI’96), 241-61
· Davies, S. (1997), Re-Engineering in Right to Privacy, in P. Agre & M. Rotenberg (eds.), Technology and Privacy: The New Landscape, MIT Press, 143-65
Goffman, E. (1969), The Presentation of Self in Everyday Life, sec edition, Penguin