Multimedia information changes the whole privacy ballgame

Global multimedia communications is advancing the freedom of information and knowledge. However, as the amount and variety of multimedia data generated through these applications increases, so do risks associated with widespread accessibility and utilization of such data. Specifically, data may be used in a manner which users regard as an invasion of their privacy. The relationship between multimedia data and privacy invasion has not yet been clearly described. The main problem is that current approaches to privacy define characteristics of the data and thus information, rather than how it is perceived by the users (Davies, 1997). Three years of research within this field have, however, identified that previous approaches to privacy protection are not addressing the real problems in this field. Most multimedia invasions of privacy are not intentional or malicious; rather, the designers failed to anticipate how the data could be used, by whom, and how this might affect users (Adams, 1999a & b; Adams & Sasse, 1999a & b). Seeking to address this problem a model of the user perspective on privacy in multimedia environments has been identified. The model helps to determine which information users regard as private, from whom, and in which context. Trade-offs users make, thus rendering some privacy risks acceptable are also identified. The model can assist designers and organizations utilizing multimedia communications to assess privacy implications, and thus develop mechanisms for acceptable use of the technology.

[1]  Colin J. Bennett Convergence revisited: toward a global policy for the protection of personal data? , 1997 .

[2]  M. Angela Sasse,et al.  Making Passwords Secure and Usable , 1997, BCS HCI.

[3]  P. Agre,et al.  Technology and privacy: The new landscape , 1998 .

[4]  Anne Adams,et al.  Users' perception of privacy in multimedia communication , 1999, CHI Extended Abstracts.

[5]  M. Angela Sasse,et al.  Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? , 1999, INTERACT.

[6]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[7]  Susan Davies,et al.  Re-Engineering the Right to Privacy , 1997 .

[8]  Harold C. Releya Technology and privacy: The new landscape , 1998 .

[9]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[10]  Jean Hitchings,et al.  Deficiencies of the traditional approach to information security and the requirements for a new methodology , 1995, Comput. Secur..

[11]  Charles Cresson Wood,et al.  Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.

[12]  M. Angela Sasse,et al.  Taming the wolf in sheep's clothing: privacy in multimedia communications , 1999, MULTIMEDIA '99.

[13]  Paul Dourish,et al.  Re-place-ing space: the roles of place and space in collaborative systems , 1996, CSCW '96.

[14]  Paul Dourish,et al.  Culture and Control in a Media Space , 1993, ECSCW.

[15]  Wendy E. Mackay,et al.  Ethics, lies and videotape… , 1995, CHI '95.