Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems

Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous computing — invisibility. Dangers of invisible computing are interfaces that do not give people the needed tools of awareness and control to understand and shape the behavior of the system. By definition, ubiquitous computing systems are socio-technical, encompassing three environments: social, technical, andphysical. We argue that addressing or presenting solutions in any one environment alone cannot solve the privacy issue in ubiquitous computing. Privacy is addressed best by giving users methods, mechanisms, and interfaces to understand and then shape the system in all three environments. We introduce Privacy Mirrors, a framework for designing socio-technical ubiquitous computing systems that will integrate into people’s on-going needs, practices, values, and aesthetic sensibilities.

[1]  Ben Shneiderman,et al.  The eyes have it: a task by data type taxonomy for information visualizations , 1996, Proceedings 1996 IEEE Symposium on Visual Languages.

[2]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[3]  Paul Dourish,et al.  Culture and Control in a Media Space , 1993, ECSCW.

[4]  Wendy A. Kellogg,et al.  Social translucence: an approach to designing systems that support social processes , 2000, TCHI.

[5]  John Seely Brown,et al.  The coming age of calm technolgy , 1997 .

[6]  Stephen Lau The Hong Kong personal data (privacy) ordinance , 2000, CFP '00.

[7]  Paul H. Dietz,et al.  Real-time audio buffering for telephone applications , 2001, UIST '01.

[8]  Bradley J. Rhodes,et al.  Margin notes: building a contextually aware associative memory , 2000, IUI '00.

[9]  Austin Henderson,et al.  Your place or mine? Learning from long-term use of Audio-Video communication , 1996, Computer Supported Cooperative Work (CSCW).

[10]  Yitao Duan,et al.  Designing for Privacy in Ubiquitous Computing Environments , 2004 .

[11]  Colin Potts,et al.  Design of Everyday Things , 1988 .

[12]  Hiroshi Ishii,et al.  Tangible bits: towards seamless interfaces between people, bits and atoms , 1997, CHI.

[13]  Wendy A. Kellogg,et al.  The adoption and use of BABBLE: A field study of chat in the workplace , 1999, ECSCW.

[14]  Gregory D. Abowd,et al.  Integrating Meeting Capture within a Collaborative Team Environment , 2001, UbiComp.

[15]  Lars Erik Holmquist,et al.  WebAware: continuous visualization of web site activity in a public space , 2000, CHI Extended Abstracts.

[16]  Clifford Grobstein,et al.  New World New Mind: Moving toward Conscious Evolution , 1990 .

[17]  Gregory D. Abowd,et al.  Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment , 1999, IBM Syst. J..

[18]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[19]  Joe Tullio,et al.  Augmenting shared personal calendars , 2002, UIST '02.

[20]  Thomas P. Moran,et al.  Tivoli: an electronic whiteboard for informal workgroup meetings , 1993, INTERCHI.

[21]  M. Weiser,et al.  THE COMING AGE OF CALM TECHNOLOGY[1] , 1996 .

[22]  Ben Shneiderman,et al.  Tree-maps: a space-filling approach to the visualization of hierarchical information structures , 1991, Proceeding Visualization '91.

[23]  C. Holahan Cognition and Environment: Functioning in an Uncertain World. , 1984 .

[24]  Debby Hindus,et al.  Ubiquitous audio: capturing spontaneous collaboration , 1992, CSCW '92.

[25]  Jeffrey Rosen,et al.  The Unwanted Gaze: The Destruction of Privacy in America , 2000 .

[26]  Leysia Palen,et al.  Social, individual and technological issues for groupware calendar systems , 1999, CHI '99.

[27]  Jonathan Grudin,et al.  Groupware and social dynamics: eight challenges for developers , 1994, CACM.