Skip to main content

What You Don’t Know Can Hurt You: Privacy in Collaborative Computing

  • Conference paper
People and Computers XI

Abstract

Privacy is a popular subject in the CSCW literature but has largely been addressed as an issue of security by systems designers. With the growth of networked, multimedia CSCW systems comes an increasing need for better control over how people gain access to one another and to potentially shareable information. This paper poses some challenges for CSCW developers and provides some examples of systems which are beginning to meet such challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Ackerman, M. & Starr, B. (1995), Social Activity Indicators: Interface Components for CSCW Systems, in G. Robinson (ed.), “Proceedings of the ACM Symposium on User Interface Software and Technology, UIST’95”, ACM Press, pp. 159–168.

    Google Scholar 

  • Agre, P. & Rotenberg, M. (eds.) (in press), Technology and Privacy: The New Landscape,MIT Press.

    Google Scholar 

  • Bellotti, V. & Dourish, P. (in press), Rant and RAVE: Experimental and Experiential Accounts of a Media Space, in K. Finn, A. Seilen and S. Wilbur (eds.), “Video-mediated Communication”, Lawrence Erlbaum Associates.

    Google Scholar 

  • Bellotti, V. & Seilen, A. (1993), Design for Privacy in Ubiquitous Computing Environments, in G. de Michelis, C. Simone and K. Schmidt (eds.), “Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 77–92.

    Google Scholar 

  • Bly, S., Harrison, S. & Irwin, S. (1993), “Media Spaces: Bringing People Together in a Video, Audio and Computing Environment”, Communications of the ACM 36 (1), 28–47.

    Article  Google Scholar 

  • Clarke, R. (1988), “Information Technology and Dataveillance”, Communications of the ACM 31 (5), 498–512.

    Article  Google Scholar 

  • Clement, A. (1994), “Considering Privacy in the Development of Multi-Media Communications”, Computer Supported Cooperative Work 2 (1/2), 67–88.

    Article  Google Scholar 

  • Clement, A. & Wagner, I. (1995), Fragmented Exchange: Disarticulation and the Need for Regionalized Communication Spaces, in H. Marmolin, Y. Sundblad and K. Schmidt (eds.), “Proceedings of ECSCW’95, the 4th European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 33–49.

    Chapter  Google Scholar 

  • Cohen, J. (1993), `Kirk Here:’ Using Genre Sounds to Monitor Background Activity, in S. Ashlund, K. Mullet, A. Henderson, E. Hollnagel and T. White (eds.), “Proceedings of INTERCHI’93”, ACM Press, pp.63–64.

    Google Scholar 

  • Denning, D. & Branstad, D. (1996), “A Taxonomy for Key Escrow Encryption Systems”, Communications of the ACM 39(3), 31–40.

    Google Scholar 

  • Donath, J. (1995), Visual Who: Animating the Affinities and Activities of an Electronic Community, in “Proceedings of Multimedia’95”, ACM Press, pp. 99–107.

    Google Scholar 

  • Dourish, P. (1993), Culture and Control in a Media Space, in G. de Michelis, C. Simone and K. Schmidt (eds.), “Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 125–137.

    Google Scholar 

  • Dourish, P. & Bellotti, V. (1992), Awareness and Coordination in Shared Workspaces, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 107–114.

    Google Scholar 

  • Dourish, P. & Bly, S. (1992), Portholes: Supporting Awareness in Distributed Work Groups, in P. Bauersfeld, J. Bennett and G. Lynch (eds.), “Proceedings of CHI’92: Human Factors in Computing Systems”, ACM Press, pp. 541–547.

    Google Scholar 

  • Dourish, P., Adler, A., Bellotti, V. & Henderson, A. (in press), “Your Place or Mine? Learning from Long-term Use of Video Communication”, Computer Supported Cooperative Work.

    Google Scholar 

  • Dunlop, C. & Kling, R. (eds.) (1991), Computerization and Controversy: Value Conflicts and Social Choices,Academic Press.

    Google Scholar 

  • Eldridge, M., Lamming, M. and Flynn, M. (1992), Does a Video Diary Help Recall?, in A. Monk, D. Diaper and M. Harrison (eds.), “People and Computers VII (Proceedings of HCI’92)”, Cambridge University Press, pp. 257–269.

    Google Scholar 

  • Ellis, S., Gibbs, S. & Rein, G. (1991), “Groupware: Some Issues and Experiences”, Communications of the ACM 34 (1), 39–58.

    Article  Google Scholar 

  • Forester, T. & Morrison, R. (1990), Computer Ethics,MIT Press.

    Google Scholar 

  • Gaver, W., Moran, T., MacLean, A., Lövstrand, L., Dourish, R, Carter, K. & Buxton, W. (1992), Realizing a Video Environment: EuroPARC’s RAVE System, in R. Bauersfeld, J. Bennett and G. Lynch (eds.), “Proceedings of CHI’92: Human Factors in Computing Systems”, ACM Press, pp. 27–35.

    Google Scholar 

  • Giddens, A. (1990), The Consequences of Modernity,Stanford University Press. Goffman, E. (1963), Behaviour in Public Places,Free Press.

    Google Scholar 

  • Greenhalgh, C. & Benford, S. (1995), Virtual Reality Tele-conferencing: Implementation and Experience, in H. Marmolin, Y. Sundblad and K. Schmidt (eds.), “Proceedings of ECSCW’95, the 4th European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 165–180.

    Chapter  Google Scholar 

  • Harper, R. (1992), Looking at Ourselves: An Examination of the Social Organization of Two Research Laboratories, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 330–337.

    Google Scholar 

  • Heath, C. & Luff, P. (1991), Disembodied Conduct: Communication through Video in a Multi-Media Office Environment, in S. R. Robertson, G. M. Olson and J. S. Olson (eds.), “Proceedings of CHI’91: Human Factors in Computing Systems ( Reaching through Technology)”, ACM Press, pp. 99–103.

    Google Scholar 

  • Heath, C. & Luff, P. (1993), Disembodied Conduct: Interactional Asymmetries in Video-mediated Communication, in G. Button (ed.), “Technology in Working Order”, Routledge, pp. 35–54.

    Google Scholar 

  • Hennessy, R (1991), Information Domains in CSCW, in J. Bowers and S. Benford (eds.), “Studies in Computer Supported Cooperative Work”, Elsevier Science, pp. 299–311.

    Google Scholar 

  • Herring, T. (1996), “The Global Positioning System”, Scientific American 274 (2), 44–50.

    Article  MathSciNet  Google Scholar 

  • Hindus, D. & Schmandt, C. (1992), Ubiquitous Audio: Capturing Spontaneous Collaboration, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 210–217.

    Google Scholar 

  • Ishii, H. & Kobayashi, M. (1992), ClearBoard: A Seamless Medium for Shared Drawing and Conversation With Eye Contact, in P. Bauersfeld, J. Bennett and G. Lynch (eds.), “Proceedings of CHI’92: Human Factors in Computing Systems”, ACM Press, pp. 525–532.

    Google Scholar 

  • Mantei, M., Becker, R., Seilen, A., Buxton, W., Milligan, T. & Wellman, B. (1991), Experiences in the Use of a Media Space, in S. P. Robertson, G. M. Olson and J. S. Olson (eds.), “Proceedings of CHI’91: Human Factors in Computing Systems ( Reaching through Technology)”, ACM Press, pp. 203–208.

    Google Scholar 

  • McClurg, A. (1995), “Bringing Privacy Law Out of the Closet: A Tort Theory of Liability for Intrusions in Public Places”, North Carolina Law Review 73 (3), 989–1088.

    Google Scholar 

  • Mullender, S. (1989), Protection, in S. Mullender (ed.), “Distributed Systems”, ACM Press, pp. 117–132.

    Google Scholar 

  • Milberg, S., Burke, S., Smith, H. & Kallman, E. (1995), “Values, Personal Information, Privacy and Regulatory Approaches”, Communications of the ACM 38 (12), 65–74.

    Article  Google Scholar 

  • Minneman, S., Harrison, S., Jansson, W., Kurtenbach, G., Moran, T., Smith, I. & van Melle, W. (1995), A Confederation of Tools for Capturing and Accessing Collaborative Activity, in “Proceedings of Multimedia’95”, ACM Press, pp. 523–534.

    Google Scholar 

  • Neumann, P. (1995), Computer Related Risks,Addison—Wesley.

    Google Scholar 

  • Neuwirth, C., Chandok, R., Kaufer, D., Erion, P., Morris, J. & Miller, D. (1992), Flexible Diff-ing in a Collaborative Writing System, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 147–154.

    Google Scholar 

  • Neuwirth, C., Kaufer, D., Chandhok, R. & Morris, J. (1990), Issues in the Design of Computer Support for Co-authoring and Commenting, in D. G. Tatar (ed.), “Proceedings of CSCW’90: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 183–196.

    Google Scholar 

  • Newman, W., Eldridge, M. & Lamming, M. (1991), PEPYS: Generating Autobiographies by Automatic Tracking, in M. Robinson, L. Bannon and K. Schmidt (eds.), “Proceedings of ECSCW’91, the 2nd European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 75–188.

    Google Scholar 

  • Pentland, A. (1996), “Smart Rooms”, Scientific American 274 (4), 68–76.

    Article  Google Scholar 

  • Privacy Protection Study Commission (1991), Excerpts from Personal Privacy in an Information Society, in Dunlop and Kling (1991), pp.453–468.

    Google Scholar 

  • Reidenberg, J. (1992), “Privacy in the Information Economy: A Fortress or Frontier for Individual Rights?”, Federal Communications Law Journal 44 (2), 195–243.

    Google Scholar 

  • Reiman, J. (1995), “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future”, Santa Clara Computer and High Technology Law Journal 11(1), 27–44.

    Google Scholar 

  • Rule, J. (1980), The Politics of Privacy: Planning for Data Systems as Powerful Technologies,Elsevier Science.

    Google Scholar 

  • Samarajiva, R. (in press), Interactivity as Though Privacy Mattered, in Agre and Rotenberg (in press).

    Google Scholar 

  • Sandhu, S., Coyne, E., Feinstein, H. & Youman, C. (1996), “Role-based Access Control Models”, IEEE Computer 29 (2), 38–47.

    Article  Google Scholar 

  • Shen, H. and Dewan, P. (1992), Access Control for Collaborative Environments, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 51–58.

    Google Scholar 

  • Smith, I. & Hudson, S. (1995), Low Disturbance Audio for Awareness and Privacy in Media Space Applications, in “Proceedings of Multimedia’95”, ACM Press, pp. 91–97.

    Google Scholar 

  • Stone, E., Gardner, D., Gueutal, H. & McClure, S. (1983), “A Field Experiment Comparing Information-Privacy Values, Beliefs and Attitudes Across Several Types of Organizations”, Journal of Applied Psychology 68 (3), 459–468.

    Article  Google Scholar 

  • Tang, J., Isaacs, E. & Rua, M. (1994), Supporting Distributed Groups With a Montage of Lightweight Interactions, in R. Furuta and C. Neuwirth (eds.), “Proceedings of CSCW’94: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 13–34.

    Google Scholar 

  • Vetter, R. (1995), “ATM Concepts, Architectures and Protocols”, Communications of the ACM 38 (2), 30–38.

    Article  Google Scholar 

  • Want, R., Hopper, A., Falcao, V. & Gibbons, J. (1992), “The Active Badge Location System”, ACM Transactions on Office Information Systems 10 (1), 91–102.

    Article  Google Scholar 

  • Weisband, S. & Reinig, B. (1995), “Managing User Perceptions of Email Privacy”, Communications of the ACM 38 (12), 40–47.

    Article  Google Scholar 

  • Weiser, M. (1991), “The Computer for the 21st Century”, Scientific American 265 (3), 94–104.

    Article  Google Scholar 

  • Wilcox, L., Kimber, D. & Chen, F. (1994), Audio Indexing using Speaker Identification in Automatic Systems for the Identification and Inspection of Humans, in “Proceedings of the International Society for Optical Engineering SPIE 2277”, IEEE, pp. 149–157.

    Google Scholar 

  • Zhang, H., Low, C., Smoliar, S. & Wu, J. (1995), Video Parsing, Retrieval and Browsing: An Integrated and Content-based Solution, in “Proceedings of Multimedia’95”, ACM Press, pp. 15–24.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag London

About this paper

Cite this paper

Bellotti, V. (1996). What You Don’t Know Can Hurt You: Privacy in Collaborative Computing. In: Sasse, M.A., Cunningham, R.J., Winder, R.L. (eds) People and Computers XI. Springer, London. https://doi.org/10.1007/978-1-4471-3588-3_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-3588-3_16

  • Publisher Name: Springer, London

  • Print ISBN: 978-3-540-76069-6

  • Online ISBN: 978-1-4471-3588-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics