Abstract
More and more personal devices such as mobile phones and multimedia players use embedded sensing. This means that people are wearing and carrying devices capable of sensing details about them such as their activity, location, and environment. In this paper, we explore privacy concerns about such personal sensing through interviews with 24 participants who took part in a three month study that used personal sensing to detect their physical activities. Our results show that concerns often depended on what was being recorded, the context in which participants worked and lived and thus would be sensed, and the value they perceived would be provided. We suggest ways in which personal sensing can be made more privacy-sensitive to address these concerns.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Beckwith, R., Mainwaring, S.: Privacy: Personal information, threats, and technologies. In: Proc. ISTAS 2005, pp. 9–16. IEEE, Los Alamitos (2005)
Consolvo, S., Klasnja, P., McDonald, D.W., Avrahami, D., Froehlich, J., LeGrand, L., Libby, R., Mosher, K., Landay, J.: Flowers or robot armies? Encouraging awareness & activity with personal, mobile displays. In: Proc. UbiComp 2008, pp. 54–63. ACM Press, New York (2008)
Hayes, G.R., Patel, S.N., Truong, K.N., Iachello, G., Kientz, J.A., Farmer, R., Abowd, G.D.: The Personal Audio Loop: Designing a Ubiquitous Audio-Based Memory Aid. In: Dunlop, M.D. (ed.) Mobile HCI 2004. LNCS, vol. 3160, pp. 168–179. Springer, Heidelberg (2004)
Hayes, G.R., Poole, E.S., Iachello, G., Patel, S.N., Grimes, A., Abowd, G., Truong, K.N.: Physical, social, and experiential knowledge in pervasive computing environments. IEEE Pervasive Computing 6(4), 56–63 (2007)
Iachello, G., Truong, K.N., Abowd, G.D., Hayes, G.R., Stevens, M.: Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In: Proc. CHI 2006, pp. 1009–1018. ACM Press, New York (2006)
Iachello, G., Abowd, G.: From privacy methods to a privacy toolbox: Evaluation shows that heuristics are complementary. In: ACM Transactions of CHI, vol. 15(2), pp. 8:1–8:30 (2008)
Nguyen, D., Kobsa, A., Hayes, G.: An Empirical Investigation of Concerns of Everyday Tracking and Recording Technologies. In: Proc. UbiComp 2008, pp. 182–191. ACM Press, New York (2008)
Warren, S.D., Brandeis, L.D.: The right to privacy. Harvard Law Review 4, 5 (1890)
Wyatt, D., Choudhury, T., Kautz, H.: Capturing spontaneous conversation and social dynamics: A privacy sensitive data collection effort. In: Proc. ICASSP (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Klasnja, P., Consolvo, S., Choudhury, T., Beckwith, R., Hightower, J. (2009). Exploring Privacy Concerns about Personal Sensing. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds) Pervasive Computing. Pervasive 2009. Lecture Notes in Computer Science, vol 5538. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01516-8_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-01516-8_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01515-1
Online ISBN: 978-3-642-01516-8
eBook Packages: Computer ScienceComputer Science (R0)