The importance of visibility for folk theories of sensor data

Sensor-enabled wearable devices and smartphones collect data about users' movements, location, and private spaces and activities. As with many ubiquitous computing technologies, this data collection happens in the background and appears "seamless" or invisible to the user. Despite this, users are still expected to make informed choices regarding consent to data collection. Folk theories are sets of beliefs and understandings that arise informally and guide decision-making. To investigate folk theories regarding sensor data collection that might guide privacy self-management decisions, we conducted qualitative free list activities with 30 activity tracker users in which we asked them to list "information that an activity tracker knows". We found that folk theories regarding the data that activity trackers collect depend on interactions between the users and their trackers that provide visibility into dependencies among data types, evidence about what trackers are able to record, and feedback that inspires speculation about how trackers work. Our findings suggest opportunities for designing interfaces that intentionally support the development of folk theories about how sensor data are produced and how they might be used, which may enable users to make more informed privacy self-management decisions.

[1]  Judith E. Sturges,et al.  Comparing Telephone and Face-to-Face Qualitative Interviewing: a Research Note , 2004 .

[2]  Mark Weiser,et al.  The world is not a desktop , 1994, INTR.

[3]  Mary Beth Rosson,et al.  Use and Adoption Challenges of Wearable Activity Trackers , 2015 .

[4]  Matthew Chalmers,et al.  Seamful design: showing the seams in wearable computing , 2003 .

[5]  Thomas R. Lindlof Qualitative Communication Research Methods , 1994 .

[6]  H. Russell Bernard,et al.  Analyzing Qualitative Data: Systematic Approaches , 2009 .

[7]  Willett Kempton,et al.  Two Theories of Home Heat Control , 1986, Cogn. Sci..

[8]  Vivian Genaro Motti,et al.  Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data Collected , 2015, Financial Cryptography Workshops.

[9]  Paul Dourish,et al.  The value of data: considering the context of production in data economies , 2011, CSCW.

[10]  Sebastian Günther Folk Models of Home Computer Security , 2012 .

[11]  S. Gosling,et al.  Should we trust web-based studies? A comparative analysis of six preconceptions about internet questionnaires. , 2004, The American psychologist.

[12]  L. Jean Camp,et al.  Mental Models of Security Risks , 2007, Financial Cryptography.

[13]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[14]  W. Batchelder,et al.  Predicting Clustering From Semantic Structure , 1993 .

[15]  Sean A. Munson,et al.  Exploring the design space of glanceable feedback for physical activity trackers , 2016, UbiComp.

[16]  A. Kimball Romney,et al.  Systematic Data Collection , 1988 .

[17]  Ilaria Liccardi,et al.  Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.

[18]  Philip N Johnson-Laird,et al.  INAUGURAL ARTICLE by a Recently Elected Academy Member:Mental models and human reasoning , 2010 .

[19]  James R. Eagan,et al.  Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing , 2008, UbiComp.

[20]  Mani B. Srivastava,et al.  Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment , 2011, CHI.

[21]  Federica Cena,et al.  Personal informatics for everyday life: How users without prior self-tracking experience engage with personal data , 2016, Int. J. Hum. Comput. Stud..

[22]  W. Keith Edwards,et al.  More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.

[23]  Rebecca Gray,et al.  Understanding User Beliefs About Algorithmic Curation in the Facebook News Feed , 2015, CHI.

[24]  Marsha B. Quinlan Considerations for Collecting Freelists in the Field: Examples from Ethobotany , 2005 .

[25]  Cristine H Legare,et al.  Concepts and folk theories. , 2011, Annual review of anthropology.

[26]  Predrag V. Klasnja,et al.  Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.

[27]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[28]  可児 潤也 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .

[29]  Yang Wang,et al.  Folk Models of Online Behavioral Advertising , 2017, CSCW.

[30]  Irina Shklovski,et al.  Steps, Choices and Moral Accounting: Observations from a Step-Counting Campaign in the Workplace , 2016, CSCW.

[31]  Paul P. Maglio,et al.  Spatial Metaphors of Web Use , 2014, Spatial Cogn. Comput..

[32]  Frank C. Keil,et al.  The Feasibility of Folk Science , 2010, Cogn. Sci..

[33]  Devon D. Brewer,et al.  Supplementary Interviewing Techniques to Maximize Output in Free Listing Tasks , 2002 .

[34]  A. Anonymous,et al.  Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy , 2013, J. Priv. Confidentiality.

[35]  S. Borgatti Elicitation techniques for cultural domain analysis , 1999 .

[36]  Lorrie Faith Cranor,et al.  Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.

[37]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[38]  Tom Rodden,et al.  “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems , 2016, CSCW.

[39]  David W. McDonald,et al.  Designing for Healthy Lifestyles: Design Considerations for Mobile Technologies to Encourage Consumer Health and Wellness , 2014, Found. Trends Hum. Comput. Interact..

[40]  Karrie Karahalios,et al.  First I "like" it, then I hide it: Folk Theories of Social Feeds , 2016, CHI.

[41]  Richard E. Mayer,et al.  Instructional Manipulation of Users' Mental Models for Electronic Calculators , 1984, Int. J. Man Mach. Stud..

[42]  Panagiotis G. Ipeirotis,et al.  Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.

[43]  Joseph A. Maxwell,et al.  Qualitative Research Design: An Interactive Approach , 1996 .

[44]  Irina Shklovski,et al.  Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.

[45]  Mark W. Newman,et al.  When fitness trackers don't 'fit': end-user difficulties in the assessment of personal tracking device accuracy , 2015, UbiComp.

[46]  Daniel J. Solove,et al.  Privacy Self-Management and the Consent Dilemma , 2012 .

[47]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[48]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[49]  Thomas A. Schwandt Qualitative Inquiry: A Dictionary of Terms , 1997 .

[50]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[51]  Laura A. Dabbish,et al.  "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.

[52]  Gina Novick Is there a bias against telephone interviews in qualitative research? , 2008, Research in nursing & health.

[53]  E. C. Thompson,et al.  Comparative Cultural Salience: Measures Using Free-List Data , 2006 .

[54]  Records, Computers and the Rights of Citizens , 1973 .

[55]  Judy Kay,et al.  Creating personalized systems that people can scrutinize and control: Drivers, principles and experience , 2012, TIIS.