Taming the wolf in sheep's clothing: privacy in multimedia communications

When ubiquitous multimedia technology is introduced in an organization, the privacy implications of that technology are rarely addressed. Users usually extend the trust they have in an organization to the technology it employs. This paper reports results from interviews with 24 Internet Engineering Task Force (IETF) attendees whose presentations or contributions to IETF sessions were transmitted on the multicast backbone (Mbone). Due to a high level of trust in the organization, these users had few initial concerns about the privacy implications of this technology. However, interviewees' trust relied on inaccurate assumptions, since the interviews revealed a number of potential and actual invasions of privacy in transmission, recording and editing of multicast data. Previous research found that users who experience an unexpected invasion of their privacy are not only likely to reject the technology that afforded the invasion, but lose trust in the organization that introduced it [2,3]. We discuss a number of mechanisms and policies for protecting users' privacy in this particular application, and propose a strategy for introducing networked multimedia technology in general.

[1]  Victoria Bellotti,et al.  Design for privacy in multimedia computing and communications environments , 1997 .

[2]  Colin Perkins,et al.  Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.

[3]  R. Brown,et al.  Social Psychology, 2nd Ed , 1965 .

[4]  A. Strauss,et al.  The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .

[5]  A. Strauss,et al.  Basics of qualitative research: Grounded theory procedures and techniques. , 1992 .

[6]  Susan Davies,et al.  Re-Engineering the Right to Privacy , 1997 .

[7]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[8]  Anne Adams,et al.  Users' perception of privacy in multimedia communication , 1999, CHI Extended Abstracts.

[9]  Steven McCanne,et al.  vic: a flexible framework for packet video , 1995, MULTIMEDIA '95.

[10]  Andreas Girgensohn,et al.  NYNEX portholes: initial user reactions and redesign implications , 1997, GROUP.

[11]  J. H. Davis,et al.  An integrative model of organizational trust, Academy of Management Review, : . , 1995 .

[12]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, RFC.

[13]  Wendy E. Mackay,et al.  Ethics, lies and videotape… , 1995, CHI '95.

[14]  Steven McCanne,et al.  Receiver-driven layered multicast , 2001 .

[15]  M. Angela Sasse,et al.  Successful multiparty audio communication over the Internet , 1998, CACM.

[16]  Nasir D. Memon,et al.  Protecting digital media content , 1998, CACM.

[17]  M. Angela Sasse,et al.  Making Passwords Secure and Usable , 1997, BCS HCI.

[18]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[19]  Boon-Lock Yeo,et al.  Technical trials and legal tribulations , 1998, CACM.

[20]  M. Angela Sasse,et al.  Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie? , 1999, INTERACT.

[21]  Paul Dourish,et al.  Culture and Control in a Media Space , 1993, ECSCW.

[22]  M. Angela Sasse,et al.  Users are not the enemy , 1999, CACM.

[23]  Alan J. Dix,et al.  Information processing, context and privacy , 1990, INTERACT.

[24]  Michael R. Macedonia,et al.  MBone provides audio and video across the Internet , 1994, Computer.

[25]  Andreas Girgensohn,et al.  Initial User Reactions and Redesign Implications , 1997 .