Beyond LED Status Lights - Design Requirements of Privacy Notices for Body-worn Cameras

Privacy notices aim to make users aware of personal data gathered and processed by a system. Body-worn cameras currently lack suitable design strategies for privacy notices that announce themselves and their actions tosecondary andincidental users, such as bystanders, when they are being used in public. Hypothesizing that the commonly used status LED is not optimal for this use case, due to being not sufficiently understandable, noticeable, secure and trustworthy, we explore design requirements of privacy notices for body-worn cameras. Following a two-step approach, we contribute incentives for design alternatives to status LEDs: Starting from 8 design sessions with experts, we discuss 8 physical design artifacts, as well as design strategies and key motives. Finally, we derive design recommendations of the proposed solutions, which we back based on an evaluation with 12 UX & HCI experts.

[1]  Chris Harrison,et al.  Unlocking the expressivity of point lights , 2012, CHI.

[2]  Rami Albatal,et al.  A privacy by design approach to lifelogging , 2014 .

[3]  Ivo Flammer Genteel Wearables: Bystander-Centered Design , 2016, IEEE Security & Privacy.

[4]  Colin Boyd,et al.  "Who decides?": security and privacy in the wild , 2013, OZCHI.

[5]  Gerald F. Smith Idea‐Generation Techniques: A Formulary of Active Ingredients , 1998 .

[6]  Sriram Subramanian,et al.  Would you do that?: understanding social acceptance of gestural interfaces , 2010, Mobile HCI.

[7]  Tim Marsh,et al.  Using Cinematography Conventions to Inform Guidelines For the Design and Evaluation of Virtual Off-Screen Space , 2000 .

[8]  Ardalan Amiri Sani,et al.  Viola: Trustworthy Sensor Notifications for Enhanced Privacy on Mobile Systems , 2018, IEEE Trans. Mob. Comput..

[9]  Anthony Dunne,et al.  Design Noir: The Secret Life of Electronic Objects , 2001 .

[10]  Lorrie Faith Cranor,et al.  What do they "indicate?": evaluating security and privacy indicators , 2006, INTR.

[11]  Jiro Tanaka,et al.  Ensuring Privacy during Pervasive Logging by a Passerby , 2014, J. Inf. Process..

[12]  Roderick Murray-Smith,et al.  The GAIME project: gestural and auditory interactions for mobile environments , 2009 .

[13]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[14]  Albrecht Schmidt,et al.  Lifelogging: You're Wearing a Camera? , 2014, IEEE Pervasive Comput..

[15]  James M. Higgins 101 Creative Problem Solving Techniques: The Handbook of New Ideas for Business , 1994 .

[16]  P. Mayring Qualitative content analysis: theoretical foundation, basic procedures and software solution , 2014 .

[17]  Joemon M. Jose,et al.  Analysing privacy in visual lifelogging , 2017, Pervasive Mob. Comput..

[18]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[19]  Katharina Krombholz,et al.  Exploring Design Directions for Wearable Privacy , 2017 .

[20]  U. Hengartner,et al.  NotiSense : An Urban Sensing Notification System To Improve Bystander Privacy , 2011 .

[21]  Rainer Böhme,et al.  Users Protect Their Privacy If They Can: Determinants of Webcam Covering Behavior , 2016 .

[22]  Thomas A. Schwandt Constructivist, interpretivist approaches to human inquiry. , 1994 .

[23]  Serge Egelman,et al.  Is This Thing On?: Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms , 2015, CHI.

[24]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[25]  Jakob Nielsen,et al.  Finding usability problems through heuristic evaluation , 1992, CHI.

[26]  Joemon M. Jose,et al.  Bystander Privacy in Lifelogging , 2016, BCS HCI.

[27]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[28]  John Zimmerman,et al.  Research through design as a method for interaction design research in HCI , 2007, CHI.

[29]  Gerhard Fischer,et al.  Transcending the individual human mind—creating shared understanding through collaborative design , 2000, TCHI.

[30]  Lassi A. Liikkanen,et al.  The preference effect in design concept evaluation , 2014 .

[31]  Barry Werth,et al.  How short is too short? , 1991, The New York times magazine.

[32]  David J. Crandall,et al.  Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.

[33]  Lorrie Faith Cranor,et al.  How Short Is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices , 2016, SOUPS.

[34]  Oussama Khatib,et al.  The haptic display of complex graphical environments , 1997, SIGGRAPH.

[35]  Gregory D. Abowd,et al.  Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world , 2006, CHI.

[36]  James M. Higgins Innovate or evaporate: Creative techniques for strategists , 1996 .

[37]  Meera Blattner,et al.  Earcons and Icons: Their Structure and Common Design Principles , 1989, Hum. Comput. Interact..

[38]  Seong Joon Oh,et al.  I-Pic: A Platform for Privacy-Compliant Image Capture , 2016, MobiSys.

[39]  E. Guba,et al.  Competing paradigms in qualitative research. , 1994 .

[40]  T. Brown,et al.  Change by Design , 2011 .

[41]  Gregory Kramer,et al.  Auditory Display: Sonification, Audification, And Auditory Interfaces , 1994 .

[42]  Sheridan Tatsuno,et al.  Created in Japan: From Imitators to World-Class Innovators , 1991, The Journal of Asian Studies.

[43]  Elizabeth B.-N. Sanders,et al.  Virtuosos of the Experience Domain , 2001 .

[44]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[45]  Alexander De Luca,et al.  Shining Chrome: Using Web Browser Personas to Enhance SSL Certificate Visualization , 2011, INTERACT.

[46]  David A. Wagner,et al.  Somebody's Watching Me?: Assessing the Effectiveness of Webcam Indicator Lights , 2015, CHI.

[47]  Halley Profita,et al.  The AT Effect: How Disability Affects the Perceived Social Acceptability of Head-Mounted Display Use , 2016, CHI.

[48]  Tim Brown,et al.  Design Thinking for Social Innovation , 2010 .

[49]  Marion Koelle,et al.  Don't look at me that way!: Understanding User Attitudes Towards Data Glasses Usage , 2015, MobileHCI.

[50]  Tadayoshi Kohno,et al.  In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.

[51]  Lorrie Faith Cranor,et al.  A Design Space for Effective Privacy Notices , 2015, SOUPS.

[52]  Tovi Grossman,et al.  Candid Interaction: Revealing Hidden Mobile and Wearable Computing Activities , 2015, UIST.

[53]  Carl Gutwin,et al.  Wedge: clutter-free visualization of off-screen locations , 2008, CHI.

[54]  JOCELYN WYATT,et al.  Design Thinking for Social Innovation IDEO , 2010 .

[55]  Stephen Checkoway,et al.  iSeeYou: Disabling the MacBook Webcam Indicator LED , 2014, USENIX Security Symposium.