Logging you, Logging me

Low cost digital cameras in smartphones and wearable devices make it easy for people to automatically capture and share images as a visual lifelog. Having been inspired by a US campus based study that explored individual privacy behaviours of visual lifeloggers, we conducted a similar study on a UK campus, however we also focussed on the privacy behaviours of groups of lifeloggers. We argue for the importance of replicability and therefore we built a publicly available toolkit, which includes camera design, study guidelines and source code. Our results show some similar sharing behaviour to the US based study: people tried to preserve the privacy of strangers, but we found fewer bystander reactions despite using a more obvious camera. In contrast, we did not find a reluctance to share images of screens but we did find that images of vices were shared less. Regarding privacy behaviours in groups of lifeloggers, we found that people were more willing to share images of people they were interacting with than of strangers, that lifelogging in groups could change what defines a private space, and that lifelogging groups establish different rules to manage privacy for those inside and outside the group.

[1]  Michael C. Frank,et al.  Estimating the reproducibility of psychological science , 2015, Science.

[2]  Peter I. Corke,et al.  Data collection, storage, and retrieval with an underwater sensor network , 2005, SenSys '05.

[3]  Stuart Reeves,et al.  RepliCHI: the workshop II , 2014, CHI Extended Abstracts.

[4]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[5]  Marion Koelle,et al.  Don't look at me that way!: Understanding User Attitudes Towards Data Glasses Usage , 2015, MobileHCI.

[6]  Vincent Koenig,et al.  Replicating an International Survey on User Experience: Challenges, Successes and Limitations , 2013, RepliCHI.

[7]  Alex Sutherland,et al.  “Contagious Accountability” , 2017 .

[8]  Rami Albatal,et al.  A privacy by design approach to lifelogging , 2014 .

[9]  Klaus Krippendorff,et al.  Answering the Call for a Standard Reliability Measure for Coding Data , 2007 .

[10]  D. Boyd Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications , 2010 .

[11]  David A. Wagner,et al.  Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights , 2015, CHI.

[12]  Joemon M. Jose,et al.  Lifelogging User Study: Bystander Privacy , 2016, BCS HCI.

[13]  S. Petronio Boundaries of Privacy: Dialectics of Disclosure , 2002 .

[14]  Yvonne Rogers,et al.  From spaces to places: emerging contexts in mobile privacy , 2009, UbiComp.

[15]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[16]  Max L. Wilson,et al.  RepliCHI: the workshop , 2013, CHI Extended Abstracts.

[17]  Joemon M. Jose,et al.  Understanding lifelog sharing preferences of lifeloggers , 2016, OZCHI.

[18]  David J. Crandall,et al.  Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.

[19]  Alexander Gluhak,et al.  SmartSantander: The meeting point between Future Internet research and experimentation and the smart cities , 2011, 2011 Future Network & Mobile Summit.

[20]  Albrecht Schmidt,et al.  Collecting Shared Experiences through Lifelogging: Lessons Learned , 2016, IEEE Pervasive Computing.

[21]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[22]  Daniel R. Horne,et al.  Privacy attitudes and privacy-related behavior. , 2007 .

[23]  J. Freedman,et al.  Conceptions of Crowding. (Book Reviews: Crowding and Behavior; The Environment and Social Behavior. Privacy, Personal Space. Territory, Crowding) , 1975 .

[24]  Tim McCollum,et al.  Replicating Two TelePresence Camera Depth-of-Field Settings in One User Experience Study , 2013, RepliCHI.

[25]  Richard A Armstrong,et al.  When to use the Bonferroni correction , 2014, Ophthalmic & physiological optics : the journal of the British College of Ophthalmic Opticians.

[26]  Kelly E. Caine,et al.  Exploring everyday privacy behaviors and misclosures , 2009 .

[27]  Colin Potts,et al.  Privacy practices of Internet users: Self-reports versus observed behavior , 2005, Int. J. Hum. Comput. Stud..

[28]  Shahram Izadi,et al.  SenseCam: A Retrospective Memory Aid , 2006, UbiComp.

[29]  Ben L. Marder,et al.  Tagger’s Delight? Disclosure and liking in Facebook: The effects of sharing photographs amongst multiple known social circles. , 2013 .

[30]  David J. Crandall,et al.  Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras , 2015, CHI.

[31]  R. Gavison Privacy and the Limits of Law , 1980 .

[32]  Virgílio A. F. Almeida,et al.  Dawn of the Selfie Era: The Whos, Wheres, and Hows of Selfies on Instagram , 2015, COSN.

[33]  Steve Mann,et al.  'WearCam' (The wearable camera): personal imaging systems for long-term use in wearable tetherless computer-mediated reality and personal photo/videographic memory prosthesis , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).

[34]  Bashar Nuseibeh,et al.  Adaptive Sharing for Online Social Networks: A Trade-off Between Privacy Risk and Social Benefit , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[35]  S. Marshall,et al.  An ethical framework for automated, wearable cameras in health behavior research. , 2013, American journal of preventive medicine.

[36]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[37]  Zeynep Cemalcilar,et al.  It is more than personal: Development and validation of a multidimensional privacy orientation scale , 2014 .

[38]  T. Postmes,et al.  A Social Identity Model of Deindividuation Phenomena , 1995 .

[39]  Per Ola Kristensson,et al.  Memorability of pre-designed and user-defined gesture sets , 2013, CHI.

[40]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[41]  Gary T. Marx,et al.  A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .

[42]  David J. Crandall,et al.  ScreenAvoider: Protecting Computer Screens from Ubiquitous Cameras , 2014, ArXiv.