Ethical Use of Lifelogging Data for Research: Perceived Value and Privacy Concerns of Wearable Camera Users

Video data generated from wearable cameras is now available online, as the concept of “lifelogging” has been introduced to many citizens due to the spread of wearable camera equipment. Usually, these wearable cameras automatically capture images or record videos from a first-person point of view; they collect a new form of information that cannot be captured through other means. Citizen data Harvest in Motion Everywhere (CHIME) project pays close attention to the value of this new type of resource, particularly regarding the video data that cyclists record using wearable cameras over a long period of time. These contextually rich data capture community members’ infrastructure experiences and interactions with other transit modes, as well as environmental changes. If curated and made publicly accessible, there is great potential for various stakeholders, including public historians, researchers, city planners, and citizens, to use the data. However, making these videos open to the public and to researchers raises ethics issues, as the data include sensitive, location-based information that may intrude into private lives. Additionally, the videos include the accidental collection of data from secondary participants (bystanders). In this paper, we will describe the potential value of citizen-generated video data using the CHIME project example and discuss the privacy and ethical considerations related to the use of this type of data for scientific and citizen research.

[1]  David G. Kay,et al.  Total recall: are privacy changes inevitable? , 2004, CARPE'04.

[2]  S. Marshall,et al.  An ethical framework for automated, wearable cameras in health behavior research. , 2013, American journal of preventive medicine.

[3]  STEVE WHITTAKER,et al.  The character, value, and management of personal paper archives , 2001, TCHI.

[4]  H. Russell Bernard,et al.  Social Research Methods: Qualitative and Quantitative Approaches , 2000 .

[5]  Roy H. Campbell,et al.  Cerberus: a context-aware security scheme for smart spaces , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[6]  Kaisa Väänänen,et al.  I don't mind being logged, but want to remain in control: a field study of mobile activity and context logging , 2010, CHI.

[7]  Joseph Kupfer,et al.  PRIVACY, AUTONOMY, AND SELF-CONCEPT , 2016 .

[8]  Reza Rawassizadeh,et al.  Towards sharing life-log information with society , 2012, Behav. Inf. Technol..

[9]  Lorrie Faith Cranor,et al.  Locaccino: a privacy-centric location sharing application , 2010, UbiComp '10 Adjunct.

[10]  J. Pucher,et al.  Bicycling renaissance in North America? An update and re-appraisal of cycling trends and policies , 2011 .

[11]  A. Zwitter Big Data ethics , 2014, Big Data Soc..

[12]  A. Pentland,et al.  Eigenbehaviors: identifying structure in routine , 2009, Behavioral Ecology and Sociobiology.

[13]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[14]  Daniel J. Solove,et al.  Introduction: Privacy Self-Management and the Consent Dilemma , 2013 .

[15]  M. Vijay Venkatesh,et al.  Privacy Protection for Life-log Video , 2007 .

[16]  Brian L. Sullivan,et al.  eBird: A citizen-based bird observation network in the biological sciences , 2009 .

[17]  Tadayoshi Kohno,et al.  In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies , 2014, CHI.

[18]  Min Y. Mun,et al.  Designing the Personal Data Stream: Enabling Participatory Privacy in Mobile Personal Sensing , 2009 .

[19]  Vitaly Shmatikov,et al.  A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.

[20]  David J. Crandall,et al.  PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.

[21]  David J. Crandall,et al.  Privacy behaviors of lifeloggers using wearable cameras , 2014, UbiComp.

[22]  Anne Bowser,et al.  Privacy in Participatory Research: Advancing Policy to support Human Computation , 2015, Hum. Comput..

[23]  Steve Mann,et al.  Wearable Computing: A First Step Toward Personal Imaging , 1997, Computer.

[24]  Albrecht Schmidt,et al.  Lifelogging: You're Wearing a Camera? , 2014, IEEE Pervasive Comput..

[25]  John L. Renne,et al.  Socioeconomics of Urban Travel: Evidence from the 2001 NHTS , 2003 .

[26]  Omer Tene Jules Polonetsky,et al.  Privacy in the Age of Big Data: A Time for Big Decisions , 2012 .

[27]  Ayoung Yoon Defining What Matters When Preserving Web-Based Personal Digital Collections: Listening to Bloggers , 2013, Int. J. Digit. Curation.

[28]  Janet Vertesi,et al.  To have and to hold: exploring the personal archive , 2006, CHI.

[29]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[30]  Stuart S. Shapiro,et al.  Privacy by design , 2010, Commun. ACM.

[31]  Neil Savage,et al.  Gaining wisdom from crowds , 2012, Commun. ACM.

[32]  E. Curr Archives and Manuscripts , 2013 .

[33]  Christian Zimmermann,et al.  Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy , 2014, 2014 Ninth International Conference on Availability, Reliability and Security.

[34]  Yang Wang,et al.  Privacy nudges for social media: an exploratory Facebook study , 2013, WWW.