Abstract
As the use of ubiquitous multimedia communication increases so do the privacy risks associated with widespread accessibility and utilisation of data generated by such applications. Most invasions of privacy are not intentional but due to designers inability to anticipate how this data could be used, by whom, and how this might affect users. This paper addresses the problem by providing a model of user perceptions of privacy in multimedia environments. The model has been derived from an analysis of empirical studies conducted by the authors and other researchers and aids designers to determine which information users regard as private, and in which context It also identifies trade-offs that users are willing to make rendering some privacy risks acceptable. To demonstrate how this model can be used to assess the privacy implications of multimedia communications in a specific context, an example of the models application for a specific usage scenario is provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adams, A. (1999), Users’ Perception of Privacy in Multimedia Communication, in M. W. Altom & M. G. Williams (eds.), Companion Proceedings of CHI’99: Human Factors in Computing Systems (CHI’99 Conference Companion), ACM Press, pp.53–4.
Adams, A. (2001), Users’ Perception of Privacy in Multimedia Communication, PhD thesis, School of Psychology, University College London.
Adams, A. & Sasse, M. (1999a), Privacy Issues in Ubiquitous Multimedia Environments: Wake Slee** Dogs or Let Them Lie?, in A. Sasse & C. Johnson (eds.), Human-Computer Interaction—INTERACT’ 99: Proceedings of the Seventh IFIP Conference on Human-Computer Interaction, Vol. 1, IOS Press, pp.214–21.
Adams, A. & Sasse, M. (1999b), Taming the Wolfin Sheep’s Clothing: Privacy in Multimedia Communications, in Proceedings of Multimedia’99, ACM Press, pp. 101–7.
Adams, A. & Sasse, M. (1999c), “The User is Not the Enemy”, Communications of the ACM 42(12), 40–6.
Agre, P. (1997), Beyond the Mirror World: Privacy and the Representational Practices of Computing, in P. Agre & M. Rotenberg (eds.), Technology and Privacy: The New Landscape, MIT Press, pp.29–62.
Bellotti, V. (1996), What You Don’t Know Can Hurt You: Privacy in Collaborative Computing, in A. Sasse, R. J. Cunningham & R. Winder (eds.), People and Computers XI (Proceedings of HCI’96), Springer-Verlag, pp.241–61.
Bellotti, V. & Seilen, A. (1993), Designing for Privacy in Ubiquitous Computing Environments, in G. de Michelis, C. Simone & K. Schmidt (eds.), Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work, Kluwer, pp.77–92.
Bennett, C. (1992), Regulating Privacy, Cornell University Press.
Davies, S. (1997), Re-Engineering the Right to Privacy, in P. Agre & M. Rotenberg (eds.), Technology and Privacy: The New Landscape, MIT Press, pp. 143–65.
Dix, A. (1990), Information Processing, Context and Privacy, in D. Diaper, D. Gilmore, G. Cockton & B. Shackel (eds.), Proceedings of INTERACT’ 90—Third IFIP Conference on Human-Computer Interaction, Elsevier Science, pp. 15–20.
Dourish, P. (1993), Culture and Control in a MediaSpace, in G. de Michelis, C. Simone & K. Schmidt (eds.), Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work, Kluwer, pp. 125–137.
Friedman, B. & Thomas, J. C. (1999), Trust me, I’m Accountable: Trust and Accountability Online, in M. W. Altom & M. G. Williams (eds.), Companion Proceedings of CHI’ 99: Human Factors in Computing Systems (CHI’99 Conference Companion), ACM Press, pp.79–80.
Goffman, E. (1969), The Presentation of Self in Everyday Life, second edition, Penguin.
Harrison, R. & Dourish, P. (1996), Re-Place-ing Space: The Roles of Place and Space in Collaborative Systems, in M. S. Ackerman (ed.), Proceedings of CSCW’96: ACM Conference on Computer Supported Cooperative Work, ACM Press, pp.67–76.
Lee, A., Girgensohn, A. & Schlueter, K. (1997), NYNEX Portholes: Initial User Reactions and Redesign Implications, in S. C. Hayne & W. Prinz (eds.), Proceedings of International ACM SIGGROUP Conference on Supporting Group Work, Group’97, ACM Press, pp.385–94.
Mackay, W. (1995), Ethics, Lies and Videotape…, in I. Katz, R. Mack, L. Marks, M. B. Rosson & J. Nielsen (eds.), Proceedings of CHI’95: Human Factors in Computing Systems, ACM Press, pp.138–45.
Norman, D. A. (1986), Cognitive Engineering, in D. A. Norman & S. W. Draper (eds.), User Centered System Design: New Perspectives on Human-Computer Interaction, Lawrence Erlbaum Associates, pp.31–62.
Raab, C. D. & Bennet, C. J. (1998), “The Distribution of Privacy Risks: Who Needs Protection?”, Information Society 14(4), 253–62.
Reeves, B. & Nass, C. (1996), The Media Equation: How People Treat Computers, Television and New Media Like Real People and Places, Cambridge University Press.
Smith, I. & Hudson, S. (1995), Low Disturbance Audio for Awareness and Privacy in Media Space Applications, in R. Heller (ed.), Proceedings of Multimedia’95, ACM Press, pp.91–7.
Smith, J. (1993), “Privacy Policies and Practices: Inside the Organizational Maze”, Communications of the ACM 36(12), 105–22.
Stevenson, C. & Cooper, N. (1997), “Qualitative and Quantitative Research”, The Psychologist: Bulletin of the British Psychological Society 10(4), 159–60.
Strauss, A. & Corbin, J. (1990), Basics of Qualitative Research: Grounded Theory Procedures and Techniques, Sage Publications.
Thomas, J. C. (1996), The long term social implications of new information technology, in R. Dholakia, N. Mundorf & N. Dholakia (eds.), New Infotainments Technologies in the Home: Demand Side Perspectives, Lawrence Erlbaum Associates.
Wacks, R. (1989), Personal Information: Privacy and the Law, Clarendon Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag London
About this paper
Cite this paper
Adams, A., Angela Sasse, M. (2001). Privacy in Multimedia Communications: Protecting Users, Not Just Data. In: Blandford, A., Vanderdonckt, J., Gray, P. (eds) People and Computers XV—Interaction without Frontiers. Springer, London. https://doi.org/10.1007/978-1-4471-0353-0_4
Download citation
DOI: https://doi.org/10.1007/978-1-4471-0353-0_4
Publisher Name: Springer, London
Print ISBN: 978-1-85233-515-1
Online ISBN: 978-1-4471-0353-0
eBook Packages: Springer Book Archive