skip to main content
10.1145/3311957.3359430acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
abstract
Public Access

Ubiquitous Privacy: Research and Design for Mobile and IoT Platforms

Published: 09 November 2019 Publication History

Abstract

This one-day workshop aims to explore ubiquitous privacy research and design in the context of mobile and IoT by facilitating discourse among scholars from the networked privacy and design communities. The complexity in modern socio-technical systems points to the potential of utilizing various design techniques (e.g., speculative design, design fiction, and research through design practices) in surfacing the potential consequences of novel technologies, particularly those that traditional user studies may not reveal. The results will shed light on future privacy designs for mobile and IoT technologies from both empirical and design perspectives.

References

[1]
Zaina Aljallad, Wentao Guo, Chhaya Chouhan, et al. 2019. Designing a Mobile Application to Support Social Processes for Privacy Decisions. Proceedings 2019 Workshop on Usable Security, Internet Society.
[2]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, et al. 2015. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15, ACM Press, 787--796.
[3]
Pam Briggs and Lisa Thomas. 2015. An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies. ACM Trans. Comput.-Hum. Interact. 22, 5: 23:1--23:28.
[4]
Barry Brown, Julian Bleecker, Marco D'Adamo, et al. 2016. The IKEA Catalogue: Design Fiction in Academic and Industrial Collaborations. Proceedings of the 19th International Conference on Supporting Group Work, ACM, 335--344.
[5]
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. Proceedings of the 32nd annual ACM conference on Human factors in computing systems, ACM, 2377--2386.
[6]
Anthony Dunne and Fiona Raby. 2013. Speculative Everything: Design, Fiction, and Social Dreaming. MIT Press.
[7]
Pardis Emami-Naeini, Henry Dixon, Yuvraj Agarwal, and Lorrie Faith Cranor. 2019. Exploring How Privacy and Security Factor into IoT Device Purchase Behavior. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, 534.
[8]
Sarah Fox, Noura Howell, Richmond Y. Wong, and Franchesca Spektor. 2019. Vivewell: Speculating Near-Future Menstrual Tracking through Current Data Practices.
[9]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, ACM, 571--582.
[10]
Corey Brian Jackson and Yang Wang. 2018. Addressing The Privacy Paradox Through Personalized Privacy Notifications. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 2: 68:1--68:25.
[11]
Abhiditya Jha, Jess Kropczynski, Heather Richter Lipford, and Pamela Wisniewski. An Exploration on Sharing Smart Home Devices Beyond the Home. Extended Abstract presented at the Workshop on Page 10 of 29 Intelligent User Interfaces for Internet of Things in the proceedings of the ACM conference on Intelligent User Interfaces (IUI 2019), Los Angeles, CA.
[12]
Patrick Gage Kelley, Lorrie Faith Cranor, and Norman Sadeh. 2013. Privacy As Part of the App Decision-making Process. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 3393--3402.
[13]
Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, are you listening? privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Pro. ACM Human-Computer Interaction CSCW, ACM.
[14]
Jialiu Lin, Norman Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I. Hong, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12, ACM Press, 501.
[15]
Joseph Lindley and Paul Coulton. 2015. Game of Drones. Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play, ACM, 613--618.
[16]
Xinru Page, Paritosh Bahirat, Muhammad I. Safi, Bart P. Knijnenburg, and Pamela Wisniewski. 2018. The Internet of What?: Understanding Differences in Perceptions and Adoption for the Internet of Things. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 4: 183:1--183:22.
[17]
James Pierce. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, 45:1--45:14.
[18]
James Pierce, Sarah Fox, Nick Merrill, and Richmond Wong. 2018. Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us About Cybersecurity. Proc. ACM Hum.-Comput. Interact. 2, CSCW: 139:1--139:24.
[19]
Muhammad Irtaza Safi, Abhiditya Jha, Makak Eihab PAly, Xinru Page, Sameer Patil, and Pamela Wisniewski. 2019. Will They Share? Predicting Location Sharing Behaviors of Smartphone Users through Self-Reflection on Past Privacy Behaviors. Proceedings 2019 Workshop on Usable Security, Internet Society.
[20]
Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in The US. Proceedings on Privacy Enhancing Technologies 2016, 3: 172--190.
[21]
Richmond Y Wong and Deirdre K Mulligan. 2019. Bringing Design to the Privacy Table: Broadening. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, ACM, 262.
[22]
Richmond Y Wong, Deirdre K Mulligan, Ellen Van Wyk, James Pierce, and John Chuang. 2017. Eliciting values reflections by engaging privacy futures using design workbooks. Proceedings of the ACM on Human-Computer Interaction 1, CSCW: 111.
[23]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending My Castle: A Co-Design Study of Privacy Mechanisms for Smart Homes. ACM Press, 1--12.
[24]
Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Free to Fly in Public Spaces: Drone Controllers' Privacy Perceptions and Practices. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, ACM, 6789--6793.
[25]
Yaxing Yao, Huichuan Xia, Yun Huang, and Yang Wang. 2017. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders. ACM Press, 6777--6788.

Cited By

View all
  • (2024)Generative AI Going Awry: Enabling Designers to Proactively Avoid It in CSCW ApplicationsCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3689133(125-127)Online publication date: 11-Nov-2024
  • (2023)Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies' Investment Risk DisclosuresProceedings of the ACM on Human-Computer Interaction10.1145/35795157:CSCW1(1-26)Online publication date: 16-Apr-2023
  • (2023)Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home EmergenciesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581239(1-16)Online publication date: 19-Apr-2023
  • Show More Cited By

Index Terms

  1. Ubiquitous Privacy: Research and Design for Mobile and IoT Platforms

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CSCW '19 Companion: Companion Publication of the 2019 Conference on Computer Supported Cooperative Work and Social Computing
    November 2019
    562 pages
    ISBN:9781450366922
    DOI:10.1145/3311957
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 November 2019

    Check for updates

    Author Tags

    1. design
    2. iot
    3. mobile
    4. privacy
    5. research

    Qualifiers

    • Abstract

    Funding Sources

    Conference

    CSCW '19
    Sponsor:

    Acceptance Rates

    CSCW '19 Companion Paper Acceptance Rate 703 of 2,958 submissions, 24%;
    Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

    Upcoming Conference

    CSCW '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)92
    • Downloads (Last 6 weeks)23
    Reflects downloads up to 21 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Generative AI Going Awry: Enabling Designers to Proactively Avoid It in CSCW ApplicationsCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3689133(125-127)Online publication date: 11-Nov-2024
    • (2023)Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies' Investment Risk DisclosuresProceedings of the ACM on Human-Computer Interaction10.1145/35795157:CSCW1(1-26)Online publication date: 16-Apr-2023
    • (2023)Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home EmergenciesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581239(1-16)Online publication date: 19-Apr-2023
    • (2022)Exploring Deceptive Design Patterns in Voice InterfacesProceedings of the 2022 European Symposium on Usable Security10.1145/3549015.3554213(64-78)Online publication date: 29-Sep-2022
    • (2021)Tactics of Soft Resistance in User Experience Professionals' Values WorkProceedings of the ACM on Human-Computer Interaction10.1145/34794995:CSCW2(1-28)Online publication date: 18-Oct-2021

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media