A first look into users' perceptions of facial recognition in the physical world

Abstract Facial recognition (FR) technology is being adopted in both private and public spheres for a wide range of reasons, from ensuring physical safety to providing personalized shopping experiences. It is not clear yet, though, how users perceive this emerging technology in terms of usefulness, risks, and comfort. We begin to address these questions in this paper. In particular, we conducted a vignette-based study with 314 participants on Amazon Mechanical Turk to investigate their perceptions of facial recognition in the physical world, based on thirty-five scenarios across eight different contexts of FR use. We found that users do not have a binary answer towards FR adoption. Rather, their perceptions are grounded in the specific contexts in which FR will be applied. The participants considered a broad range of factors, including control over facial data, the utility of FR, the trustworthiness of organizations using FR, and the location and surroundings of FR use to place the corresponding privacy risks in context. They weighed the privacy risks with the usability, security, and economic gain of FR use as they reported their perceptions. Participants also noted the reasons and rationals behind their perceptions of facial recognition, which let us conduct an in-depth analysis of their perceived benefits, concerns, and comfort with using this technology in various scenarios. Through this first systematic look into users’ perceptions of facial recognition in the physical world, we shed light on the tension between FR adoption and users’ concerns. Taken together, our findings have broad implications that advance the Privacy and Security community’s understanding of FR through the lens of users, where we presented guidelines for future research in these directions.

[1]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[2]  Jonathan Michelson,et al.  Auto-tagging The Facebook , 2006 .

[3]  E. Renold,et al.  'I wanna tell you a story': Exploring the application of vignettes in qualitative research with children and young people , 2000 .

[4]  Timnit Gebru,et al.  Gender Shades: Intersectional Accuracy Disparities in Commercial Gender Classification , 2018, FAT.

[5]  A. Moore Privacy: Its Meaning and Value , 2003 .

[6]  Eran Toch,et al.  Evaluating Users' Perceptions about a System's Privacy: Differentiating Social and Institutional Aspects , 2019, SOUPS @ USENIX Security Symposium.

[7]  Mahdi N. Al-Ameen,et al.  Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study , 2019, CCS.

[8]  V. Braun,et al.  Using thematic analysis in psychology , 2006 .

[9]  Navio Kwok,et al.  Are Attention Check Questions a Threat to Scale Validity? , 2018 .

[10]  Lujo Bauer,et al.  Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements , 2020, CCS.

[11]  Xiaoou Tang,et al.  Surpassing Human-Level Face Verification Performance on LFW with GaussianFace , 2014, AAAI.

[12]  Kirsten E. Martin Diminished or Just Different? A Factorial Vignette Study of Privacy as a Social Contract , 2012 .

[13]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[14]  V. Kshirsagar,et al.  Face recognition using Eigenfaces , 2011, 2011 3rd International Conference on Computer Research and Development.

[15]  Blase Ur,et al.  Do Users' Perceptions of Password Security Match Reality? , 2016, CHI.

[16]  Kelly Gates,et al.  The past perfect promise of facial recognition technology , 2004 .

[17]  A. Acquisti,et al.  Reputation as a sufficient condition for data quality on Amazon Mechanical Turk , 2013, Behavior Research Methods.

[18]  Lujo Bauer,et al.  User Behaviors and Attitudes Under Password Expiration Policies , 2018, SOUPS @ USENIX Security Symposium.

[19]  Elissa M. Redmiles,et al.  How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior , 2016, CCS.

[20]  Elissa M. Redmiles,et al.  How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[21]  Verena Zimmermann,et al.  "If It Wasn't Secure, They Would Not Use It in the Movies" - Security Perceptions and User Acceptance of Authentication Technologies , 2017, HCI.

[22]  Siddharth Suri,et al.  Conducting behavioral research on Amazon’s Mechanical Turk , 2010, Behavior research methods.

[23]  Alessandro Acquisti,et al.  Expecting the Unexpected: Understanding Mismatched Privacy Expectations Online , 2016, SOUPS.

[24]  Anil K. Jain,et al.  Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.

[25]  Lorrie Faith Cranor,et al.  A Design Space for Effective Privacy Notices , 2015, SOUPS.

[26]  J. Rubenfeld The Right of Privacy , 1989 .

[27]  Curtis R. Taylor,et al.  The Economics of Privacy , 2016 .

[28]  Kevin W. Bowyer,et al.  Face recognition technology: security versus privacy , 2004, IEEE Technology and Society Magazine.

[29]  Adam D. Moore,et al.  Employee Monitoring and Computer Technology: Evaluative Surveillance V. Privacy , 2000, Business Ethics Quarterly.

[30]  Panagiotis G. Ipeirotis,et al.  Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.

[31]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[32]  T. Ramayah,et al.  Trust in Internet Banking in Malaysia and the Moderating Influence of Perceived Effectiveness of Biometrics Technology on Perceived Privacy and Security , 2017 .

[33]  Sitalakshmi Venkatraman,et al.  Biometrics in banking security: a case study , 2008, Inf. Manag. Comput. Secur..

[34]  Laura A. Dabbish,et al.  "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.

[35]  J. Rachels Why privacy is important , 1985 .

[36]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.

[37]  Reza Mehmood,et al.  Fingerprint Biometric Template Security Schemes: Attacks and Countermeasures , 2019 .

[38]  Daniel M. Oppenheimer,et al.  Instructional Manipulation Checks: Detecting Satisficing to Increase Statistical Power , 2009 .

[39]  Karoline Mortensen,et al.  Comparing Amazon’s Mechanical Turk Platform to Conventional Data Collection Methods in the Health and Medical Research Literature , 2018, Journal of General Internal Medicine.

[40]  Lujo Bauer,et al.  Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.

[41]  Swami Sankaranarayanan,et al.  Face recognition accuracy of forensic examiners, superrecognizers, and face recognition algorithms , 2018, Proceedings of the National Academy of Sciences.

[42]  L. D. Harmon,et al.  Identification of human faces , 1971 .

[43]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[44]  J. Finch The Vignette Technique in Survey Research , 1987 .

[45]  Panagiotis G. Ipeirotis Analyzing the Amazon Mechanical Turk marketplace , 2010, XRDS.

[46]  Richard E. Boyatzis,et al.  Transforming Qualitative Information: Thematic Analysis and Code Development , 1998 .

[47]  Anthony L. Ambrosio,et al.  Multicultural Vignettes for Teacher Preparation , 2002 .

[48]  Edward J. Bloustein,et al.  Privacy as an Aspect of Human Dignity : An Answer to Dean Prosser , 1984 .

[49]  Helen Nissenbaum,et al.  Measuring Privacy: An Empirical Test Using Context To Expose Confounding Variables , 2015 .

[50]  A. Moore Privacy Rights: Moral and Legal Foundations , 2010 .

[51]  Robert S. Boyer,et al.  Woody Bledsoe - His Life and Legacy , 1996, AI Mag..

[52]  Lorrie Faith Cranor,et al.  How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices , 2016, SOUPS.

[53]  Laura A. Dabbish,et al.  Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.

[54]  Trevor Darrell,et al.  Autotagging Facebook: Social network context improves photo annotation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[55]  Jesse Chandler,et al.  Using Mechanical Turk to Study Clinical Populations , 2013 .

[56]  Linda Little,et al.  Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors , 2015, SOUPS.

[57]  L. D. Harmon,et al.  Man-machine interaction in human-face identification , 1972 .

[58]  Patrick Gage Kelley Conducting Usable Privacy & Security Studies with Amazon ’ s Mechanical Turk , 2010 .

[59]  Adam D. Moore,et al.  INTANGIBLE PROPERTY: PRIVACY, POWER, AND INFORMATION CONTROL , 1998 .

[60]  G. Nagarajan,et al.  Improving ATM security via face recognition , 2011, 2011 3rd International Conference on Electronics Computer Technology.