Privacy in Multimedia Communications: Protecting Users, Not Just Data

Publication Type:

Conference Paper

Source:

People and Computers XV - Interaction without frontiers - Joint Proceedings of HCI2001 and ICM2001, Springer, Lille, p.49-64 (0)

Keywords:

privacy; multimedia communications; grounded theory; trust; user centred design; Privacy - Anne Adams

Abstract:

As the use of ubiquitous multimedia communication increases so do the privacy risks associated with widespread accessibility and utilisation of data generated by such applications. Most invasions of privacy are not intentional but due to designers inability to anticipate how this data could be used, by whom, and how this might affect users. This paper addresses the problem by providing a model of user perceptions of privacy in multimedia environments. The model has been derived from an analysis of empirical studies conducted by the authors and other researchers and aids designers to determine which information users regard as private, and in which context. It also identifies trade-offs that users are willing to make rendering some privacy risks acceptable. To demonstrate how this model can be used to assess the privacy implications of multimedia communications in a specific context, an example of the models application for a specific usage scenario is provided.

Notes:

Influences of what users are prepared to reveal about themselves: · Organizational culture · Perceptions of the situation Model of how user perceives privacy: · Which info users regard as private · From whom · In which context · Trade-off between potential risks and benefits Privacy model factors and assumptions: · Information Sensitivity · Information Receiver · Information Usage Privacy Invasion Cycle · Trust: users don’t go into every situation ready to assess the privacy benefits and risks. · Assumptions: based on o User previous knowledge and experiences and their role in the interaction o Perceived Information Sensitivity § Primary (core data being broadcasting; topic of the discussion) and Secondary (social psychological interpretation; body language) Level Information. What context the info was viewed in, how it was used and who viewed it. § Situation: user’s notion of place o Perceived Information Receiver o Perceived Information Usage § Task § Recording awareness § Repeated viewing § Context § Editing § Risk/benefits trade-offs o Perceived Context of Interaction § Technology § Social, organizational and national context · Realization and Response · Decreasing Cycle Recommendations: · Briefing Session o Systems details o Interaction details § When they can be viewed and heard § Who the IR is o Recoding details · Interface changes: Information Broadcaster o Data transmission o Interaction Feedback o Recording Feedback · Interface changes: Information Receiver o Contextual feedback o Edited data o Information handling/usage · Policy procedures o Recording permission o Changed usage o Editing o Continued privacy evaluation References: · Adams, A. (1999) Users’ Perception of Privacy in Multimedia Communication, in M.W. Altom & M.G.Williams (eds.), Companion Proceedings of CHI’99, ACM Press, 53-4 · Belloti, V. (1996). What you don’t know can hurt you: privacy in collaborative computing, in A. Sasse, R.J. Cunningham & R. Winder (eds.), People and Computers XI (Proceedings HCI’96), 241-61 · Davies, S. (1997), Re-Engineering in Right to Privacy, in P. Agre & M. Rotenberg (eds.), Technology and Privacy: The New Landscape, MIT Press, 143-65 Goffman, E. (1969), The Presentation of Self in Everyday Life, sec edition, Penguin