skip to main content
10.1145/2370216.2370224acmconferencesArticle/Chapter ViewAbstractPublication PagesubicompConference Proceedingsconference-collections
research-article

Long-term effects of ubiquitous surveillance in the home

Published: 05 September 2012 Publication History

Abstract

The Helsinki Privacy Experiment is a study of the long-term effects of ubiquitous surveillance in homes. Ten volunteering households were instrumented with video cameras with microphones, and computer, wireless network, smartphone, TV, DVD, and customer card use was logged. We report on stress, anxiety, concerns, and privacy-seeking behavior after six months. The data provide first insight into the privacy-invading character of ubiquitous surveillance in the home and explain how people can gradually become accustomed to surveillance even if they oppose it.

References

[1]
Acquisti, A., and Grossklags, J. Privacy and rationality in individual decision making. IEEE Security & Privacy 3, 1 (2005), 26--33.
[2]
Altman, I. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing Company, Monterey, CA, 1975.
[3]
Barkhuus, L., and Dey, A. Is context-aware technology taking control away from the user? Three levels of interactivity examined. Proc. UbiComp, Springer-Verlag (2003), 149--156.
[4]
Barkhuus, L. The mismeasurement of privacy: Using contextual integrity to reconsider privacy in HCI. Proc. CHI'12, ACM (2012), 367--376.
[5]
Beaudin, J., Intille, S., and Morris, M. To track or not to track: User reactions to concepts in longitudinal health monitoring. Journal of Medical Internet Research 8, 4 (2006).
[6]
Berendt, B., Günther, O., and Spiekermann, S. Privacy in e-commerce: Stated preferences vs. actual behavior. Communications of the ACM 48, 4 (2005), 101--106.
[7]
Caplan, B. Rational ignorance versus rational irrationality. Kyklos 54, 1 (2001), 3--26.
[8]
Choe, E. K., Consolvo, S., Jung, J., Harrison, B., and Kientz, J. A. Living in a glass house: A survey of private moments in the home. Proc. UbiComp'11, ACM (2011), 41--44.
[9]
Consolvo, S. et al. Location disclosure to social relations: Why, when, & what people want to share. Proc. CHI'05, ACM (2005), 81--90.
[10]
Fox, C., and Tversky, A. Ambiguity aversion and comparative ignorance. The Quarterly Journal of Economics 110, 3 (1995), 585--603.
[11]
Gefen, D., Karahanna, E., and Straub, D. Trust and TAM in online shopping: An integrated model. MIS Quarterly 27, 1 (2003), 51--90.
[12]
Gill, M., Bryan, J., and Allen, J. Public perceptions of CCTV in residential areas: "It Is Not As Good As We Thought It Would Be." International Criminal Justice Review 17, (2007), 304--324.
[13]
Goldberg, D., and Williams, P. A user's guide to the General Health Questionnaire. Windsor, UK: NFER-Nelson, 1998.
[14]
Holi, M., Marttunen, M., and Aalberg, V. Comparison of the GHQ-36, the GHQ-12 and the SCL-90 as psychiatric screening instruments in the Finnish population Nordic Journal of Psychiatry 57, 3 (2003), 233--238.
[15]
Iachello, G., and Hong, J. End-user privacy in human--computer interaction. Foundations and Trends in Human--Computer Interaction 1, 1 (2007), 1--137.
[16]
Klasnja, P. et al. Exploring privacy concerns about personal sensing. Proc. Pervasive'09, Springer-Verlag (2009), 176--183.
[17]
Mancini, C. et al. In the best families: Tracking and relationships. Proc. CHI'11, ACM (2011), 2419--2428.
[18]
Marshall, N. Privacy and environment. Human Ecology 1, 2 (1972), 93--110.
[19]
Massimi, M., Truong, K., Dearman, D., and Hayes, G. Understanding recording technologies in everyday life. IEEE Pervasive Computing 9, 3 (2010), 64--71.
[20]
Nguyen, D., and Hayes, G. Information privacy in institutional and end-user tracking and recording technologies. Personal and Ubiquitous Computing 14, 1 (2010), 53--72.
[21]
Nguyen, D., Bedford, A., Bretana, A., and Hayes, G. Situating the concern for information privacy through an empirical study of responses to video recording. Proc. CHI'11, ACM (2011), 3207--3216.
[22]
O'Donnell, A., Jetten, J., and Ryan, M. Who is watching over you? The role of shared identity in perceptions of surveillance. European Journal of Social Psychology 40, 1 (2010), 135--147.
[23]
Oulasvirta, A., Perkio, J., Hietanen, H., & Tamminen, S. Rethinking ethical practices for the Helsinki Privacy Experiment. A paper presented at the Ethics Workshop of CHI 2011, Vancouver, Canada.
[24]
Palen, L., and Dourish, P. Unpacking privacy for a networked world. Proc. CHI'03, ACM (2003), 129--136.
[25]
Partonen, T., and Pandi-Perumal, S. Seasonal Affective Disorder: Practice and Research. Oxford University Press, 2010.
[26]
Pedersen, D. Psychological functions of privacy. Journal of Environmental Psychology 17, 2 (1997), 147--156.
[27]
Pevalin, D. J. Multiple applications of the GHQ-12 in a general population sample: An investigation of long-term retest effects. Social Psychiatry and Psychiatric Epidemiology 35, 11 (2000), 508--512.
[28]
Raij, A., Ghosh, A., Kumar, S., and Srivastava, M. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. Proc. CHI'11, ACM (2011), 11--20.
[29]
Ray, D. Data Gathering in Digital Homes. An unpublished master's thesis submitted to the Department of Computer Science at the University of Helsinki (2012).
[30]
Smith, H., Milberg, S., and Burke, S. Information privacy: Measuring individuals' concerns about organizational practices. MIS Quarterly 20, 2 (1996), 167--196.
[31]
Troshynski, E., Lee, C., and Dourish, P. Accountabilities of presence: Reframing location-based systems. Proc. CHI'08, ACM (2008), 487--496.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
UbiComp '12: Proceedings of the 2012 ACM Conference on Ubiquitous Computing
September 2012
1268 pages
ISBN:9781450312240
DOI:10.1145/2370216
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 September 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. longitudinal study
  2. privacy
  3. smartphone logging
  4. ubiquitous surveillance

Qualifiers

  • Research-article

Funding Sources

Conference

Ubicomp '12
Ubicomp '12: The 2012 ACM Conference on Ubiquitous Computing
September 5 - 8, 2012
Pennsylvania, Pittsburgh

Acceptance Rates

UbiComp '12 Paper Acceptance Rate 58 of 301 submissions, 19%;
Overall Acceptance Rate 764 of 2,912 submissions, 26%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)92
  • Downloads (Last 6 weeks)15
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media