Digitally capturing and displaying real-time images of people in public places raises concerns for individual privacy. Applying the principles of Value Sensitive Design, we conducted two studies of people's social judgments about this topic. In Study I, 750 people were surveyed as they walked through a public plaza that was being captured by a HDTV camera and displayed in real-time in the office of a building overlooking the plaza. In Study II, 120 individuals were interviewed about the same topic. Moreover, Study II controlled for whether the participant was a direct stakeholder of the technology (inside the office watching people on the HDTV large-plasma display window) or an indirect stakeholder (being watched in the public venue). Taking both studies together, results (showed the following): (a) the majority of participants upheld some modicum of privacy in public; (b) people's privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological well-being, and informed consent; and (c) more women than men expressed concerns about the installation, and, unlike the men, equally brought forward their concerns, whether they were The Watcher or The Watched.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abowd, G. A. and Mynatt, E. D. (2000). Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human Interaction, 7(1), 29–58.
Ackerman, M., Darrell, T., and Weitzner, D. J. (2001). Privacy in context. Human-Computer Interaction, 16, 167–176.
Adler, A. and Henderson, A. (1994). A room of our own: Experiences from a direct office-share. Proceedings of the CHI 94. New York: ACM Press.
Allen, A. L. (1988). Uneasy access: Privacy for women in a free society. Totowa, NJ: Rowman & Littlefield.
Arendt, H. (1998). The human condition. Chicago: University of Chicago Press. (Original work published 1958).
Barkow, J. H., Cosmides, L., and Tooby, J. (Eds.). (1992). The adapted mind: Evolutionary psychology and the generation of culture. New York: Oxford University Press.
Boyle, M., Edwards, C., and Greenberg, S. (2000). The effects of filtered video on awareness and privacy. Proceedings of CSCW 2000. New York: ACM Press.
Briggs, J. L. (1970). Never in anger: Portrait of an Eskimo family. Cambridge, MA: Harvard University Press.
Colby, A., Kohlberg, L., Gibbs, J., and Lieberman, M. (1983). A longitudinal study of moral judgment. Monographs of the Society for Research in Child Development 48(Serial No. 200), 1–124.
Cranor, L. F., Reagle, J., and Ackerman, M. S. (1999). Beyond concern: Understanding net users' attitudes about online privacy. AT'T Labs-Research Technical Report TR 99.4.3. Retrieved from http://www.research.att.com/library/trs/TRs/99/99.4/99.4.3
Damon, W. (1977). The social world of the child. San Francisco: Jossey-Bass.
Davidson, P., Turiel, E., and Black, A. (1983). The effect of stimulus familiarity on the use of criteria and justifications in children's social reasoning. British Journal of Developmental Psychology, 1, 49–65.
Dourish, P., Adler, A., Bellotti, V., and Henderson, A. (1996). Your place or mine? Learning from long-term use of audio-video communication. Computer-Supported Cooperative Work, 51, 33–62.
Dourish, P. and Bly, S. (1992). Portholes: Supporting awareness in a distributed work group. Proceedings of the CHI 1992 (pp. 541–547). New York: ACM Press.
Dourish, P., Grinter, R. E., Delgado de la Flor, J., and Joseph, M. (2004). Security in the wild: User strategies for managing security as an everyday, practical problem. Pers Ubiquit Comput, 8, 391–401.
Fish, R. S., Kraut, R. E., and Chalfonte, B. L. (1990). The VideoWindow system in informal communications. Proceedings of the CSCW 1990. New York: ACM Press.
Fried, C. (1968). Privacy: A moral analysis. Yale Law Journal, 77, 475–493.
Friedman, B. (Ed.). (1997a). Human values and the design of computer technology. New York: Cambridge University Press.
Friedman, B. (1997b). Social judgments and technological innovation: Adolescents' understanding of property, privacy, and electronic information. Computers in Human Behavior, 13, 327–351.
Friedman, B. (2004). Value sensitive design. In W. S. Bainbridge (Ed.), Berkshire encyclopedia of human-computer interaction (pp. 769–774). Great Barrington, MA: Berkshire.
Friedman, B., Freier, N. G., Kahn, P. H., Jr., Lin, P., and Sodeman, R. (2008). Office window of the future? Field-based analyses of a new use of a large display. International Journal of Human Computer Studies, 66, 452–465.
Friedman, B. and Kahn, P. H., Jr. (2003). Human values, ethics, and design. In J. Jacko and A. Sears (Eds.), Handbook of human-computer interaction (pp. 1177–1201). Mahwah, NJ: Lawrence Erlbaum.
Friedman, B., Kahn, P. H., Jr., and Borning, A. (2006). Value sensitive design and information systems. In P. Zhang and D. Galletta (Eds.), Human-computer interaction in management information systems: Foundations (pp. 348–372). Armonk, NY: M. E. Sharpe.
Friedman, B., Kahn, P. H., Jr., Hagman, J., and Severson, R. L. (2005). Coding manual for “The watcher and the watched: Social judgments about privacy in a public place” (University of Washington Information School Technical Report IS-TR-2005-07-01). Seattle: Information School, University of Washington.
Geertz, C. (1984). “From the native's point of view”: On the nature of anthropological understanding. In R. A. Shweder and R. A. LeVine (Eds.), Culture theory: Essays on mind, self, and emotion (pp. 123–136). Cambridge: Cambridge University Press.
Goldberg, K. (2005). Demonstrate project. Retrieved from http://demonstrate.berkeley.edu.
Gotlieb, C. C. (1996). Privacy: A concept whose time has come and gone. In D. Lyon and E. Zureik (Eds.), Computers, surveillance, and privacy (pp. 156–171). Minneapolis: University of Minnesota Press.
Grudin, J. (2001). Desituating action: Digital representation of context. Human-Computer Interaction, 16, 269–286.
Hatch, E. (1983). Culture and morality. New York: Columbia University Press.
Helwig, C. C. (1995). Adolescents' and young adults' conceptions of civil liberties: Freedom of speech and religion. Child Development, 66, 152–166.
Hudson, S. E. and Smith, I. (1996). Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. Proceedings of the CSCW 1996. New York: ACM Press.
Hutchinson, H., Mackay, W., Westerlund, B., Bederson, B. B., Druin, A., Plaisant, C., et al. (2003). Technology probes: Inspiring design for and with families. Extended Abstracts of CHI 2003. New York: ACM Press.
Idehen, E. E. (1997). The influence of gender and space sharing history on the conceptions of privacy by undergraduates. IFE Pscyhologia, 5(1), 59–75.
Jancke, G., Venolia, G. D., Grudin, J., Cadiz, J. J., and Gupta, A. (2001). Linking public spaces: Technical and social issues. Proceedings of the CHI 2001. New York: ACM Press.
Jiang, X., Hong, J. I., and Landay, J. A. (2002). Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. Proceedings of Ubicomp 2002. Berlin: Springer-Verlag.
Junestrand, S., Tollmar, K., Lenman, S., and Thuresson, B. (2000). Private and public spaces— The use of video mediated communication in a future home environment. Extended Abstracts of the CHI 2000. New York: ACM Press.
Kahn, P. H., Jr. (1992). Children's obligatory and discretionary moral judgments. Child Development, 63, 416–430.
Kahn, P. H., Jr. (1999). The human relationship with nature: Development and culture. Cambridge, MA: MIT Press.
Kahn, P. H., Jr., Friedman, B., Freier, N., and Severson, R. (2003). Coding manual for children's interactions with AIBO, the robotic dog—The preschool study (UW CSE Technical Report 03-04-03). Seattle: Department of Computer Science and Engineering, University of Washington.
Karro, J., Dent, A. W., and Farish, S. (2005). Patient perceptions of privacy infringements in an emergency department. Emergency Medicine Australasia, 17, 117–123.
Kellert, S. R. (1996). The value of life. Washington, DC: Island Press.
Killen, M. (1990). Children's evaluations of morality in the context of peer, teacher-child and familial relations. Journal of Genetic Psychology, 151, 395–410.
Kohlberg, L. (1969). Stage and sequence: The cognitive-developmental approach to socialization. In D. A. Goslin (Ed.), Handbook of socialization theory and research (pp. 347–480). New York: Rand McNally.
Kohlberg, L. (1984). Essays on moral development: The psychology of moral development: Vol. 2. San Francisco: Harper & Row.
Krathwohl, D. R. (1998). Methods of educational and social science research: An integrated approach. Reading, MA: Addison-Wesley.
Langheinrich, M. (2001). Privacy by design—Principles of privacy-aware ubiquitous systems. Proceedings of Ubicomp 2001. Berlin: Springer-Verlag.
Mantei, M., Baecker, R., Sellen, A., Buxton, W., Milligan, T., and Wellman, B. (1991). Experiences in the use of a media space. Proceedings of CHI 1991. New York: ACM Press.
Margulis, S. T. (2003). On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues, 59, 429–441.
Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3), 255–271.
Milgram, S. (1963). Behavioral study of obedience. Journal of Abnormal and Social Psychology, 67, 371–378.
Milgram, S. (1974). Obedience to authority. New York: Harper & Row.
Moore, B., Jr. (1984). Privacy: Studies in social and cultural history. Armonk, NY: M. E. Sharpe.
Newell, P. B. (1998). A cross-cultural comparison of privacy definitions and functions: A systems approach. Journal of Environmental Psychology, 18, 357–371.
Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17, 559–596.
Nucci, L. P. (1981). The development of personal concepts: A domain distinct from moral and societal concepts. Child Development, 52, 114–121.
Olson, M. and Bly, S. (1991). The Portland experience: A report on a distributed research group. International Journal of Man-Machine Studies, 34, 211–228.
Palen, L. and Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of the CHI 2003. New York: ACM Press.
Pedersen, D. M. (1987). Sex differences in privacy preferences. Perceptual & Motor Skills, 64, 1239–1242.
Pedersen, D. M. (1999). Model for types of privacy by privacy functions. Journal of Environmental Psychology, 19, 397–405.
Pelto, P. J. (1973). The snowmobile revolution: Technology and social change in the Arctic. Menlo Park, CA: Cummings.
Piaget, J. (1960). The child's conception of the world. London: Routledge & Kegan Paul. (Original work published 1929).
Privacy and American Business. (1997, April). Commerce, communication, and privacy online. Retrieved July 24, 2003, from http://www.pandab.org/compsurv.html
Privacy and America Business. (1998, December). Executive summary. Retrieved July 24, 2003, from http://www.pandab.org/1298execsum.html
Power, C. (1991). Democratic schools and the problem of moral authority. In W. Kurtines and J. Gewirtz (Eds.), Handbook of moral behavior and development: Vol. 3 (pp. 317–333). Hillsdale, NJ: Lawrence Erlbaum.
Reiman, J. H. (1976). Privacy, intimacy, and personhood. Philosophy & Public Affairs, 6, 26–44.
Root, R. W. (1988). Design of a multi-media vehicle for social browsing. Proceedings of the CSCW 1988 (pp. 25–28). New York: ACM Press.
Rustemi, A. and Kokdemir, D. (1993). Privacy dimensions and preferences among Turkish students. Journal of Social Psychology, 133(6), 807–808.
Schoeman, F. D. (Ed.). (1984). Philosophical dimensions of privacy: An anthology. London: Cambridge University Press.
Sharp, L. (1980). Steel axes for stone-age Australians. In J. P. Spradley and D. W. McCurdy (Eds.), Conformity and conflict (pp. 345–359). Boston: Little, Brown, & Company. (Reprinted from Human Organization, 1952, 11, 17–22).
Spradley, J. P. (2000). You owe yourself a drunk: An ethnography of urban nomads. Prospect Heights, IL: Waveland Press (Originally published 1970).
Tang, J. C., & Rua, M. (1994). Montage: Providing teleproximity for distributed groups. Proceedings of the CHI 94. New York: ACM Press.
Taylor, H. (2003). Most people are “Privacy Pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll #17. Retrieved August 28, 2003, from http://www.harrisinteractive.com/harris_poll/ index.asp?PID=365
Turiel, E. (1983). The development of social knowledge. Cambridge: Cambridge University Press.
Turiel, E. (2002). The culture of morality: Social development and social opposition. Cambridge: Cambridge University Press.
Turiel, E., Hildebrandt, C., & Wainryb, C. (1991). Judging social issues: Difficulties, inconsistencies, and consistencies. Monographs of the Society for Research in Child Development, 56(2, Serial No. 224), 1–103.
Wainryb, C. and Turiel, E. (1994). Dominance, subordination, and concepts of personal entitlements in cultural contexts. Child Development, 65, 1701–1722.
Warren, S. D. and Brandeis, L. D. (1985). The right to privacy. In D. G. Johnson and J. W. Snapper (Eds.), Ethical issues in the use of computers (pp. 172–183). Belmont, CA: Wadsworth (Originally published in Harvard Educational Review 4, December 5, 1890, 193–220).
Westin, A. (1967). Privacy and freedom. New York: Antheneum.
Wilson, E. O. (1975). Sociobiology: The new synthesis. Cambridge, MA: Harvard University Press.
Wilson, E. O. (1998). Consilience. New York: Knopf.
Wikan, U. (2002). Generous betrayal: Politics of culture in the new Europe. Chicago: University of Chicago Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag London Limited
About this chapter
Cite this chapter
Friedman, B., Kahn, P.H., Hagman, J., Severson, R.L., Gill, B. (2009). The Watcher and the Watched: Social Judgments about Privacy in a Public Place. In: Harrison, S. (eds) Media Space 20 + Years of Mediated Life. Computer Supported Cooperative Work. Springer, London. https://doi.org/10.1007/978-1-84882-483-6_9
Download citation
DOI: https://doi.org/10.1007/978-1-84882-483-6_9
Publisher Name: Springer, London
Print ISBN: 978-1-84882-482-9
Online ISBN: 978-1-84882-483-6
eBook Packages: Computer ScienceComputer Science (R0)