Abstract
Privacy is a popular subject in the CSCW literature but has largely been addressed as an issue of security by systems designers. With the growth of networked, multimedia CSCW systems comes an increasing need for better control over how people gain access to one another and to potentially shareable information. This paper poses some challenges for CSCW developers and provides some examples of systems which are beginning to meet such challenges.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ackerman, M. & Starr, B. (1995), Social Activity Indicators: Interface Components for CSCW Systems, in G. Robinson (ed.), “Proceedings of the ACM Symposium on User Interface Software and Technology, UIST’95”, ACM Press, pp. 159–168.
Agre, P. & Rotenberg, M. (eds.) (in press), Technology and Privacy: The New Landscape,MIT Press.
Bellotti, V. & Dourish, P. (in press), Rant and RAVE: Experimental and Experiential Accounts of a Media Space, in K. Finn, A. Seilen and S. Wilbur (eds.), “Video-mediated Communication”, Lawrence Erlbaum Associates.
Bellotti, V. & Seilen, A. (1993), Design for Privacy in Ubiquitous Computing Environments, in G. de Michelis, C. Simone and K. Schmidt (eds.), “Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 77–92.
Bly, S., Harrison, S. & Irwin, S. (1993), “Media Spaces: Bringing People Together in a Video, Audio and Computing Environment”, Communications of the ACM 36 (1), 28–47.
Clarke, R. (1988), “Information Technology and Dataveillance”, Communications of the ACM 31 (5), 498–512.
Clement, A. (1994), “Considering Privacy in the Development of Multi-Media Communications”, Computer Supported Cooperative Work 2 (1/2), 67–88.
Clement, A. & Wagner, I. (1995), Fragmented Exchange: Disarticulation and the Need for Regionalized Communication Spaces, in H. Marmolin, Y. Sundblad and K. Schmidt (eds.), “Proceedings of ECSCW’95, the 4th European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 33–49.
Cohen, J. (1993), `Kirk Here:’ Using Genre Sounds to Monitor Background Activity, in S. Ashlund, K. Mullet, A. Henderson, E. Hollnagel and T. White (eds.), “Proceedings of INTERCHI’93”, ACM Press, pp.63–64.
Denning, D. & Branstad, D. (1996), “A Taxonomy for Key Escrow Encryption Systems”, Communications of the ACM 39(3), 31–40.
Donath, J. (1995), Visual Who: Animating the Affinities and Activities of an Electronic Community, in “Proceedings of Multimedia’95”, ACM Press, pp. 99–107.
Dourish, P. (1993), Culture and Control in a Media Space, in G. de Michelis, C. Simone and K. Schmidt (eds.), “Proceedings of ECSCW’93, the 3rd European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 125–137.
Dourish, P. & Bellotti, V. (1992), Awareness and Coordination in Shared Workspaces, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 107–114.
Dourish, P. & Bly, S. (1992), Portholes: Supporting Awareness in Distributed Work Groups, in P. Bauersfeld, J. Bennett and G. Lynch (eds.), “Proceedings of CHI’92: Human Factors in Computing Systems”, ACM Press, pp. 541–547.
Dourish, P., Adler, A., Bellotti, V. & Henderson, A. (in press), “Your Place or Mine? Learning from Long-term Use of Video Communication”, Computer Supported Cooperative Work.
Dunlop, C. & Kling, R. (eds.) (1991), Computerization and Controversy: Value Conflicts and Social Choices,Academic Press.
Eldridge, M., Lamming, M. and Flynn, M. (1992), Does a Video Diary Help Recall?, in A. Monk, D. Diaper and M. Harrison (eds.), “People and Computers VII (Proceedings of HCI’92)”, Cambridge University Press, pp. 257–269.
Ellis, S., Gibbs, S. & Rein, G. (1991), “Groupware: Some Issues and Experiences”, Communications of the ACM 34 (1), 39–58.
Forester, T. & Morrison, R. (1990), Computer Ethics,MIT Press.
Gaver, W., Moran, T., MacLean, A., Lövstrand, L., Dourish, R, Carter, K. & Buxton, W. (1992), Realizing a Video Environment: EuroPARC’s RAVE System, in R. Bauersfeld, J. Bennett and G. Lynch (eds.), “Proceedings of CHI’92: Human Factors in Computing Systems”, ACM Press, pp. 27–35.
Giddens, A. (1990), The Consequences of Modernity,Stanford University Press. Goffman, E. (1963), Behaviour in Public Places,Free Press.
Greenhalgh, C. & Benford, S. (1995), Virtual Reality Tele-conferencing: Implementation and Experience, in H. Marmolin, Y. Sundblad and K. Schmidt (eds.), “Proceedings of ECSCW’95, the 4th European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 165–180.
Harper, R. (1992), Looking at Ourselves: An Examination of the Social Organization of Two Research Laboratories, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 330–337.
Heath, C. & Luff, P. (1991), Disembodied Conduct: Communication through Video in a Multi-Media Office Environment, in S. R. Robertson, G. M. Olson and J. S. Olson (eds.), “Proceedings of CHI’91: Human Factors in Computing Systems ( Reaching through Technology)”, ACM Press, pp. 99–103.
Heath, C. & Luff, P. (1993), Disembodied Conduct: Interactional Asymmetries in Video-mediated Communication, in G. Button (ed.), “Technology in Working Order”, Routledge, pp. 35–54.
Hennessy, R (1991), Information Domains in CSCW, in J. Bowers and S. Benford (eds.), “Studies in Computer Supported Cooperative Work”, Elsevier Science, pp. 299–311.
Herring, T. (1996), “The Global Positioning System”, Scientific American 274 (2), 44–50.
Hindus, D. & Schmandt, C. (1992), Ubiquitous Audio: Capturing Spontaneous Collaboration, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 210–217.
Ishii, H. & Kobayashi, M. (1992), ClearBoard: A Seamless Medium for Shared Drawing and Conversation With Eye Contact, in P. Bauersfeld, J. Bennett and G. Lynch (eds.), “Proceedings of CHI’92: Human Factors in Computing Systems”, ACM Press, pp. 525–532.
Mantei, M., Becker, R., Seilen, A., Buxton, W., Milligan, T. & Wellman, B. (1991), Experiences in the Use of a Media Space, in S. P. Robertson, G. M. Olson and J. S. Olson (eds.), “Proceedings of CHI’91: Human Factors in Computing Systems ( Reaching through Technology)”, ACM Press, pp. 203–208.
McClurg, A. (1995), “Bringing Privacy Law Out of the Closet: A Tort Theory of Liability for Intrusions in Public Places”, North Carolina Law Review 73 (3), 989–1088.
Mullender, S. (1989), Protection, in S. Mullender (ed.), “Distributed Systems”, ACM Press, pp. 117–132.
Milberg, S., Burke, S., Smith, H. & Kallman, E. (1995), “Values, Personal Information, Privacy and Regulatory Approaches”, Communications of the ACM 38 (12), 65–74.
Minneman, S., Harrison, S., Jansson, W., Kurtenbach, G., Moran, T., Smith, I. & van Melle, W. (1995), A Confederation of Tools for Capturing and Accessing Collaborative Activity, in “Proceedings of Multimedia’95”, ACM Press, pp. 523–534.
Neumann, P. (1995), Computer Related Risks,Addison—Wesley.
Neuwirth, C., Chandok, R., Kaufer, D., Erion, P., Morris, J. & Miller, D. (1992), Flexible Diff-ing in a Collaborative Writing System, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 147–154.
Neuwirth, C., Kaufer, D., Chandhok, R. & Morris, J. (1990), Issues in the Design of Computer Support for Co-authoring and Commenting, in D. G. Tatar (ed.), “Proceedings of CSCW’90: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 183–196.
Newman, W., Eldridge, M. & Lamming, M. (1991), PEPYS: Generating Autobiographies by Automatic Tracking, in M. Robinson, L. Bannon and K. Schmidt (eds.), “Proceedings of ECSCW’91, the 2nd European Conference on Computer-Supported Cooperative Work”, Kluwer (Academic Press), pp. 75–188.
Pentland, A. (1996), “Smart Rooms”, Scientific American 274 (4), 68–76.
Privacy Protection Study Commission (1991), Excerpts from Personal Privacy in an Information Society, in Dunlop and Kling (1991), pp.453–468.
Reidenberg, J. (1992), “Privacy in the Information Economy: A Fortress or Frontier for Individual Rights?”, Federal Communications Law Journal 44 (2), 195–243.
Reiman, J. (1995), “Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future”, Santa Clara Computer and High Technology Law Journal 11(1), 27–44.
Rule, J. (1980), The Politics of Privacy: Planning for Data Systems as Powerful Technologies,Elsevier Science.
Samarajiva, R. (in press), Interactivity as Though Privacy Mattered, in Agre and Rotenberg (in press).
Sandhu, S., Coyne, E., Feinstein, H. & Youman, C. (1996), “Role-based Access Control Models”, IEEE Computer 29 (2), 38–47.
Shen, H. and Dewan, P. (1992), Access Control for Collaborative Environments, in J. Turner and R. Kraut (eds.), “Proceedings of CSCW’92: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 51–58.
Smith, I. & Hudson, S. (1995), Low Disturbance Audio for Awareness and Privacy in Media Space Applications, in “Proceedings of Multimedia’95”, ACM Press, pp. 91–97.
Stone, E., Gardner, D., Gueutal, H. & McClure, S. (1983), “A Field Experiment Comparing Information-Privacy Values, Beliefs and Attitudes Across Several Types of Organizations”, Journal of Applied Psychology 68 (3), 459–468.
Tang, J., Isaacs, E. & Rua, M. (1994), Supporting Distributed Groups With a Montage of Lightweight Interactions, in R. Furuta and C. Neuwirth (eds.), “Proceedings of CSCW’94: Conference on Computer Supported Cooperative Work”, ACM Press, pp. 13–34.
Vetter, R. (1995), “ATM Concepts, Architectures and Protocols”, Communications of the ACM 38 (2), 30–38.
Want, R., Hopper, A., Falcao, V. & Gibbons, J. (1992), “The Active Badge Location System”, ACM Transactions on Office Information Systems 10 (1), 91–102.
Weisband, S. & Reinig, B. (1995), “Managing User Perceptions of Email Privacy”, Communications of the ACM 38 (12), 40–47.
Weiser, M. (1991), “The Computer for the 21st Century”, Scientific American 265 (3), 94–104.
Wilcox, L., Kimber, D. & Chen, F. (1994), Audio Indexing using Speaker Identification in Automatic Systems for the Identification and Inspection of Humans, in “Proceedings of the International Society for Optical Engineering SPIE 2277”, IEEE, pp. 149–157.
Zhang, H., Low, C., Smoliar, S. & Wu, J. (1995), Video Parsing, Retrieval and Browsing: An Integrated and Content-based Solution, in “Proceedings of Multimedia’95”, ACM Press, pp. 15–24.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 Springer-Verlag London
About this paper
Cite this paper
Bellotti, V. (1996). What You Don’t Know Can Hurt You: Privacy in Collaborative Computing. In: Sasse, M.A., Cunningham, R.J., Winder, R.L. (eds) People and Computers XI. Springer, London. https://doi.org/10.1007/978-1-4471-3588-3_16
Download citation
DOI: https://doi.org/10.1007/978-1-4471-3588-3_16
Publisher Name: Springer, London
Print ISBN: 978-3-540-76069-6
Online ISBN: 978-1-4471-3588-3
eBook Packages: Springer Book Archive