Privacy in Multimedia Communications: Protecting Users, Not Just Data

  • Conference paper
People and Computers XV—Interaction without Frontiers

Abstract

As the use of ubiquitous multimedia communication increases so do the privacy risks associated with widespread accessibility and utilisation of data generated by such applications. Most invasions of privacy are not intentional but due to designers inability to anticipate how this data could be used, by whom, and how this might affect users. This paper addresses the problem by providing a model of user perceptions of privacy in multimedia environments. The model has been derived from an analysis of empirical studies conducted by the authors and other researchers and aids designers to determine which information users regard as private, and in which context It also identifies trade-offs that users are willing to make rendering some privacy risks acceptable. To demonstrate how this model can be used to assess the privacy implications of multimedia communications in a specific context, an example of the models application for a specific usage scenario is provided.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Adams, A. (1999), Users’ Perception of Privacy in Multimedia Communication, in M. W. Altom & M. G. Williams (eds.), Companion Proceedings of CHI’99: Human Factors in Computing Systems (CHI’99 Conference Companion), ACM Press, pp.53–4.

    Google Scholar 

  • Adams, A. (2001), Users’ Perception of Privacy in Multimedia Communication, PhD thesis, School of Psychology, University College London.

    Google Scholar 

  • Adams, A. & Sasse, M. (1999a), Privacy Issues in Ubiquitous Multimedia Environments: Wake Slee** Dogs or Let Them Lie?, in A. Sasse & C. Johnson (eds.), Human-Computer InteractionINTERACT’ 99: Proceedings of the Seventh IFIP Conference on Human-Computer Interaction, Vol. 1, IOS Press, pp.214–21.

    Google Scholar 

  • Adams, A. & Sasse, M. (1999b), Taming the Wolfin Sheep’s Clothing: Privacy in Multimedia Communications, in Proceedings of Multimedia’99, ACM Press, pp. 101–7.

    Google Scholar 

  • Adams, A. & Sasse, M. (1999c), “The User is Not the Enemy”, Communications of the ACM 42(12), 40–6.

    Article  Google Scholar 

  • Agre, P. (1997), Beyond the Mirror World: Privacy and the Representational Practices of Computing, in P. Agre & M. Rotenberg (eds.), Technology and Privacy: The New Landscape, MIT Press, pp.29–62.

    Google Scholar 

  • Bellotti, V. (1996), What You Don’t Know Can Hurt You: Privacy in Collaborative Computing, in A. Sasse, R. J. Cunningham & R. Winder (eds.), People and Computers XI (Proceedings of HCI’96), Springer-Verlag, pp.241–61.

    Google Scholar 

  • Bellotti, V. & Seilen, A. (1993), Designing for Privacy in Ubiquitous Computing Environments, in G. de Michelis, C. Simone & K. Schmidt (eds.), Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work, Kluwer, pp.77–92.

    Google Scholar 

  • Bennett, C. (1992), Regulating Privacy, Cornell University Press.

    Google Scholar 

  • Davies, S. (1997), Re-Engineering the Right to Privacy, in P. Agre & M. Rotenberg (eds.), Technology and Privacy: The New Landscape, MIT Press, pp. 143–65.

    Google Scholar 

  • Dix, A. (1990), Information Processing, Context and Privacy, in D. Diaper, D. Gilmore, G. Cockton & B. Shackel (eds.), Proceedings of INTERACT’ 90—Third IFIP Conference on Human-Computer Interaction, Elsevier Science, pp. 15–20.

    Google Scholar 

  • Dourish, P. (1993), Culture and Control in a MediaSpace, in G. de Michelis, C. Simone & K. Schmidt (eds.), Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work, Kluwer, pp. 125–137.

    Google Scholar 

  • Friedman, B. & Thomas, J. C. (1999), Trust me, I’m Accountable: Trust and Accountability Online, in M. W. Altom & M. G. Williams (eds.), Companion Proceedings of CHI’ 99: Human Factors in Computing Systems (CHI’99 Conference Companion), ACM Press, pp.79–80.

    Google Scholar 

  • Goffman, E. (1969), The Presentation of Self in Everyday Life, second edition, Penguin.

    Google Scholar 

  • Harrison, R. & Dourish, P. (1996), Re-Place-ing Space: The Roles of Place and Space in Collaborative Systems, in M. S. Ackerman (ed.), Proceedings of CSCW’96: ACM Conference on Computer Supported Cooperative Work, ACM Press, pp.67–76.

    Google Scholar 

  • Lee, A., Girgensohn, A. & Schlueter, K. (1997), NYNEX Portholes: Initial User Reactions and Redesign Implications, in S. C. Hayne & W. Prinz (eds.), Proceedings of International ACM SIGGROUP Conference on Supporting Group Work, Group’97, ACM Press, pp.385–94.

    Google Scholar 

  • Mackay, W. (1995), Ethics, Lies and Videotape…, in I. Katz, R. Mack, L. Marks, M. B. Rosson & J. Nielsen (eds.), Proceedings of CHI’95: Human Factors in Computing Systems, ACM Press, pp.138–45.

    Google Scholar 

  • Norman, D. A. (1986), Cognitive Engineering, in D. A. Norman & S. W. Draper (eds.), User Centered System Design: New Perspectives on Human-Computer Interaction, Lawrence Erlbaum Associates, pp.31–62.

    Google Scholar 

  • Raab, C. D. & Bennet, C. J. (1998), “The Distribution of Privacy Risks: Who Needs Protection?”, Information Society 14(4), 253–62.

    Article  Google Scholar 

  • Reeves, B. & Nass, C. (1996), The Media Equation: How People Treat Computers, Television and New Media Like Real People and Places, Cambridge University Press.

    Google Scholar 

  • Smith, I. & Hudson, S. (1995), Low Disturbance Audio for Awareness and Privacy in Media Space Applications, in R. Heller (ed.), Proceedings of Multimedia’95, ACM Press, pp.91–7.

    Google Scholar 

  • Smith, J. (1993), “Privacy Policies and Practices: Inside the Organizational Maze”, Communications of the ACM 36(12), 105–22.

    Article  Google Scholar 

  • Stevenson, C. & Cooper, N. (1997), “Qualitative and Quantitative Research”, The Psychologist: Bulletin of the British Psychological Society 10(4), 159–60.

    Google Scholar 

  • Strauss, A. & Corbin, J. (1990), Basics of Qualitative Research: Grounded Theory Procedures and Techniques, Sage Publications.

    Google Scholar 

  • Thomas, J. C. (1996), The long term social implications of new information technology, in R. Dholakia, N. Mundorf & N. Dholakia (eds.), New Infotainments Technologies in the Home: Demand Side Perspectives, Lawrence Erlbaum Associates.

    Google Scholar 

  • Wacks, R. (1989), Personal Information: Privacy and the Law, Clarendon Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag London

About this paper

Cite this paper

Adams, A., Angela Sasse, M. (2001). Privacy in Multimedia Communications: Protecting Users, Not Just Data. In: Blandford, A., Vanderdonckt, J., Gray, P. (eds) People and Computers XV—Interaction without Frontiers. Springer, London. https://doi.org/10.1007/978-1-4471-0353-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-0353-0_4

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-85233-515-1

  • Online ISBN: 978-1-4471-0353-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics

Navigation