The Watcher and the Watched: Social Judgments About Privacy in a Public Place

Digitally capturing and displaying real-time images of people in public places raises concerns for individual privacy. Applying principles of Value Sensitive DeHUMAN–COMPUTER INTERACTION, 2006, Volume 21, pp. 233–274 Copyright © 2006, Lawrence Erlbaum Associates, Inc. Batya Friedman is a computer scientist and designer with an interest in Value Sensitive Design; she is a Professor in the Information School and Adjunct Professor in the Department of Computer Science and Engineering at the University of Washington. Peter H. Kahn Jr. is a developmental psychologist with interests that lie at the intersection of technology, nature, and social and moral development; he is an Associate Professor in the Department of Psychology and Adjunct Associate Professor in the Information School at the University of Washington. Jennifer Hagman is an information scientist with an interest in the role of informed consent in human computer interactions; she was a Research Analyst in the Information School at the University of Washington at the time of this research. Rachel L. Severson is a developmental psychologist with an interest in subject-other relations; she is a PhD student in the Department of Psychology at the University of Washington. Brian Gill is a statistician with an interest in applications of statistics in social and health sciences; he is an Associate Professor in the Department of Mathematics at Seattle Pacific University. sign, we conducted two studies of people’s social judgments about this topic. In Study I, 750 people were surveyed as they walked through a public plaza that was being captured by a HDTV camera and displayed in real-time in the office of a building overlooking the plaza. In Study II, 120 individuals were interviewed about the same topic. Moreover, Study II controlled for whether the participant was a direct stakeholder of the technology (inside the office watching people on the HDTV large-plasma display window) or an indirect stakeholder (being watched in the public venue). Taking both studies together, results showed the following: (a) the majority of participants upheld some modicum of privacy in public; (b) people’s privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological wellbeing, and informed consent; and (c) more women than men expressed concerns about the installation, and, unlike the men, equally brought forward their concerns whether they were The Watcher or The Watched. 234 FRIEDMAN ET AL.

[1]  Anne Colby,et al.  A Longitudinal Study of Moral Judgment. , 1983 .

[2]  Robert,et al.  The VideoWindow System in Informal Communications , 1990 .

[3]  E. Turiel,et al.  Judging social issues: difficulties, inconsistencies, and consistencies. , 1991, Monographs of the Society for Research in Child Development.

[4]  Patricia Brierley Newell A cross-cultural comparison of privacy definitions and functions: a systems approach , 1998 .

[5]  Larry Nucci,et al.  Conceptions of Personal Issues: A Domain Distinct from Moral or Societal Concepts. , 1981 .

[6]  M. Šitum,et al.  Value of life. , 2002, Croatian medical journal.

[7]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[8]  H. Nissenbaum Protecting Privacy in an Information Age: The Problem of Privacy in Public , 1998, The Ethics of Information Technologies.

[9]  Philip Davidson,et al.  The effect of stimulus familiarity on the use of criteria and justifications in children's social reasoning. , 1983 .

[10]  S. Milgram BEHAVIORAL STUDY OF OBEDIENCE. , 1963, Journal of abnormal psychology.

[11]  David R. Krathwohl,et al.  Methods of Educational and Social Science Research: An Integrated Approach , 1992 .

[12]  S. Margulis On the Status and Contribution of Westin's and Altman's Theories of Privacy , 2003 .

[13]  Virgilio Pinera,et al.  Culture and Morality , 2002 .

[14]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[15]  William Damon,et al.  The social world of the child , 1977 .

[16]  E. Turiel,et al.  The Development of Social Knowledge: Morality and Convention , 1983 .

[17]  James A. Landay,et al.  Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing , 2002, UbiComp.

[18]  Sara A. Bly,et al.  The Portland Experience: A Report on a Distributed Research Group , 1991, Int. J. Man Mach. Stud..

[19]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[20]  M. Killen,et al.  Children's evaluations of morality in the context of peer, teacher-child, and familial relations. , 1990, The Journal of genetic psychology.

[21]  Jonathan Karro,et al.  Patient perceptions of privacy infringements in an emergency department , 2005, Emergency medicine Australasia : EMA.

[22]  Austin Henderson,et al.  Methods in search of methodology—combining HCI and object orientation , 1994, CHI '94.

[23]  Marilyn Tremaine,et al.  Experiences in the use of a media space , 1991, CHI.

[24]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[25]  Trevor Darrell,et al.  Privacy in Context , 2001, Hum. Comput. Interact..

[26]  Anoop Gupta,et al.  Linking public spaces: technical and social issues , 2001, CHI.

[27]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[28]  FriedmanBatya,et al.  Office window of the future?-Field-based analyses of a new use of a large display , 2008 .

[29]  Barrington Moore,et al.  Privacy: Studies in Social and Cultural History. , 1986 .

[30]  Elliot Turiel,et al.  The development of social knowledge , 1983 .

[31]  J. Rubenfeld The Right of Privacy , 1989 .

[32]  Rónán O'Beirne,et al.  Berkshire Encyclopedia of Human‐Computer Interaction , 2006 .

[33]  C. Geertz "From the Native's Point of View": On the Nature of Anthropological Understanding , 1974 .

[34]  Shuk Ying Ho,et al.  Human-computer interaction and management information systems: Foundations , 2008, J. Assoc. Inf. Sci. Technol..

[35]  P. H. Kahn,et al.  Children's obligatory and discretionary moral judgments. , 1992, Child development.

[36]  Lauriston Sharp,et al.  Steel Axes for Stone-Age Australians , 1952 .

[37]  P. Pelto The snowmobile revolution : technology and social change in the Arctic , 1976 .

[38]  Batya Friedman,et al.  Human values and the design of computer technology , 1997 .

[39]  Batya Friedman,et al.  The Watcher and the Watched: Social Judgments About Privacy in a Public Place , 2005, Hum. Comput. Interact..

[40]  Elliot Turiel,et al.  Dominance, subordination, and concepts of personal entitlements in cultural contexts , 1994 .

[41]  Christopher Edwards,et al.  The effects of filtered video on awareness and privacy , 2000, CSCW '00.

[42]  John C. Tang,et al.  Montage: providing teleproximity for distributed groups , 1994, CHI '94.

[43]  Batya Friedman,et al.  Social Judgments and Technological Innovation: Adolescents' Understanding of Property, Privacy, and Electronic Information. , 1997 .

[44]  Austin Henderson,et al.  Your place or mine? Learning from long-term use of Audio-Video communication , 1996, Computer Supported Cooperative Work (CSCW).

[45]  DourishPaul,et al.  Your place or mine? Learning from long-term use of audio-video communication , 1996 .

[46]  Michael A. Menlowe,et al.  Philosophical Dimensions of Privacy: An Anthology , 2009 .

[47]  N. J. Marshall DIMENSIONS OF PRIVACY PREFERENCES. , 1974, Multivariate behavioral research.

[48]  J. W. DeCew,et al.  Uneasy Access: Privacy for Women in a Free Society , 1988 .

[49]  J. Burger Obedience to Authority , 2011 .

[50]  J. Spradley You Owe Yourself a Drunk: An Ethnography of Urban Nomads , 1972 .

[51]  L. Kohlberg Stage and sequence: The cognitive-developmental approach to socialization , 1969 .

[52]  Konrad Tollmar,et al.  Private and public spaces: the use of video mediated communication in a future home environment , 2000, CHI Extended Abstracts.

[53]  G. Holton Sociobiology: the new synthesis? , 1977, Newsletter on science, technology & human values.

[54]  Darhl M. Pedersen,et al.  Sex Differences in Privacy Preferences , 1987 .

[55]  P. H. Kahn,et al.  Human values, ethics, and design , 2002 .

[56]  Jean L. Briggs,et al.  Never in Anger: Portrait of an Eskimo Family , 1970 .

[57]  S. Pinker,et al.  Natural language and natural selection , 1990, Behavioral and Brain Sciences.

[58]  Herbert A. Simon,et al.  The Sciences of the Artificial , 1970 .

[59]  Peter H. Kahn,et al.  The Human Relationship with Nature: Development and Culture , 1999 .

[60]  L. Cosmides,et al.  The Adapted mind : evolutionary psychology and the generation of culture , 1992 .

[61]  Batya Friedman,et al.  Value-sensitive design , 1996, INTR.

[62]  Paul Dourish,et al.  Portholes: supporting awareness in a distributed work group , 1992, CHI.

[63]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[64]  Allison Druin,et al.  Technology probes: inspiring design for and with families , 2003, CHI '03.

[65]  A. Rüstemli,et al.  Privacy Dimensions and Preferences Among Turkish Students , 1993 .

[66]  F. Schoeman,et al.  Philosophical Dimensions of Privacy: Privacy: philosophical dimensions of the literature , 1984 .

[67]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[68]  Robert W. Root,et al.  Design of a multi-media vehicle for social browsing , 1988, CSCW '88.

[69]  Unni Wikan,et al.  Generous Betrayal: Politics of Culture in the New Europe , 2001 .

[70]  J. Reiman,et al.  Privacy, Intimacy, and Personhood , 1984 .

[71]  R. J. B. The Child's Conception of the World , 1929, Nature.

[72]  Jonathan Grudin,et al.  Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..

[73]  C. C. Helwig,et al.  Adolescents' and young adults' conceptions of civil liberties: freedom of speech and religion. , 1995, Child development.

[74]  Darhl M. Pedersen,et al.  MODEL FOR TYPES OF PRIVACY BY PRIVACY FUNCTIONS , 1999 .