Skip to main content

The Watcher and the Watched: Social Judgments about Privacy in a Public Place

  • Chapter
Media Space 20 + Years of Mediated Life

Digitally capturing and displaying real-time images of people in public places raises concerns for individual privacy. Applying the principles of Value Sensitive Design, we conducted two studies of people's social judgments about this topic. In Study I, 750 people were surveyed as they walked through a public plaza that was being captured by a HDTV camera and displayed in real-time in the office of a building overlooking the plaza. In Study II, 120 individuals were interviewed about the same topic. Moreover, Study II controlled for whether the participant was a direct stakeholder of the technology (inside the office watching people on the HDTV large-plasma display window) or an indirect stakeholder (being watched in the public venue). Taking both studies together, results (showed the following): (a) the majority of participants upheld some modicum of privacy in public; (b) people's privacy judgments were not a one-dimensional construct, but often involved considerations based on physical harm, psychological well-being, and informed consent; and (c) more women than men expressed concerns about the installation, and, unlike the men, equally brought forward their concerns, whether they were The Watcher or The Watched.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abowd, G. A. and Mynatt, E. D. (2000). Charting past, present, and future research in ubiquitous computing. ACM Transactions on Computer-Human Interaction, 7(1), 29–58.

    Article  Google Scholar 

  • Ackerman, M., Darrell, T., and Weitzner, D. J. (2001). Privacy in context. Human-Computer Interaction, 16, 167–176.

    Article  Google Scholar 

  • Adler, A. and Henderson, A. (1994). A room of our own: Experiences from a direct office-share. Proceedings of the CHI 94. New York: ACM Press.

    Google Scholar 

  • Allen, A. L. (1988). Uneasy access: Privacy for women in a free society. Totowa, NJ: Rowman & Littlefield.

    Google Scholar 

  • Arendt, H. (1998). The human condition. Chicago: University of Chicago Press. (Original work published 1958).

    Google Scholar 

  • Barkow, J. H., Cosmides, L., and Tooby, J. (Eds.). (1992). The adapted mind: Evolutionary psychology and the generation of culture. New York: Oxford University Press.

    Google Scholar 

  • Boyle, M., Edwards, C., and Greenberg, S. (2000). The effects of filtered video on awareness and privacy. Proceedings of CSCW 2000. New York: ACM Press.

    Google Scholar 

  • Briggs, J. L. (1970). Never in anger: Portrait of an Eskimo family. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Colby, A., Kohlberg, L., Gibbs, J., and Lieberman, M. (1983). A longitudinal study of moral judgment. Monographs of the Society for Research in Child Development 48(Serial No. 200), 1–124.

    Article  Google Scholar 

  • Cranor, L. F., Reagle, J., and Ackerman, M. S. (1999). Beyond concern: Understanding net users' attitudes about online privacy. AT'T Labs-Research Technical Report TR 99.4.3. Retrieved from http://www.research.att.com/library/trs/TRs/99/99.4/99.4.3

  • Damon, W. (1977). The social world of the child. San Francisco: Jossey-Bass.

    Google Scholar 

  • Davidson, P., Turiel, E., and Black, A. (1983). The effect of stimulus familiarity on the use of criteria and justifications in children's social reasoning. British Journal of Developmental Psychology, 1, 49–65.

    Google Scholar 

  • Dourish, P., Adler, A., Bellotti, V., and Henderson, A. (1996). Your place or mine? Learning from long-term use of audio-video communication. Computer-Supported Cooperative Work, 51, 33–62.

    Google Scholar 

  • Dourish, P. and Bly, S. (1992). Portholes: Supporting awareness in a distributed work group. Proceedings of the CHI 1992 (pp. 541–547). New York: ACM Press.

    Google Scholar 

  • Dourish, P., Grinter, R. E., Delgado de la Flor, J., and Joseph, M. (2004). Security in the wild: User strategies for managing security as an everyday, practical problem. Pers Ubiquit Comput, 8, 391–401.

    Article  Google Scholar 

  • Fish, R. S., Kraut, R. E., and Chalfonte, B. L. (1990). The VideoWindow system in informal communications. Proceedings of the CSCW 1990. New York: ACM Press.

    Google Scholar 

  • Fried, C. (1968). Privacy: A moral analysis. Yale Law Journal, 77, 475–493.

    Article  Google Scholar 

  • Friedman, B. (Ed.). (1997a). Human values and the design of computer technology. New York: Cambridge University Press.

    Google Scholar 

  • Friedman, B. (1997b). Social judgments and technological innovation: Adolescents' understanding of property, privacy, and electronic information. Computers in Human Behavior, 13, 327–351.

    Article  Google Scholar 

  • Friedman, B. (2004). Value sensitive design. In W. S. Bainbridge (Ed.), Berkshire encyclopedia of human-computer interaction (pp. 769–774). Great Barrington, MA: Berkshire.

    Google Scholar 

  • Friedman, B., Freier, N. G., Kahn, P. H., Jr., Lin, P., and Sodeman, R. (2008). Office window of the future? Field-based analyses of a new use of a large display. International Journal of Human Computer Studies, 66, 452–465.

    Article  Google Scholar 

  • Friedman, B. and Kahn, P. H., Jr. (2003). Human values, ethics, and design. In J. Jacko and A. Sears (Eds.), Handbook of human-computer interaction (pp. 1177–1201). Mahwah, NJ: Lawrence Erlbaum.

    Google Scholar 

  • Friedman, B., Kahn, P. H., Jr., and Borning, A. (2006). Value sensitive design and information systems. In P. Zhang and D. Galletta (Eds.), Human-computer interaction in management information systems: Foundations (pp. 348–372). Armonk, NY: M. E. Sharpe.

    Google Scholar 

  • Friedman, B., Kahn, P. H., Jr., Hagman, J., and Severson, R. L. (2005). Coding manual for “The watcher and the watched: Social judgments about privacy in a public place” (University of Washington Information School Technical Report IS-TR-2005-07-01). Seattle: Information School, University of Washington.

    Google Scholar 

  • Geertz, C. (1984). “From the native's point of view”: On the nature of anthropological understanding. In R. A. Shweder and R. A. LeVine (Eds.), Culture theory: Essays on mind, self, and emotion (pp. 123–136). Cambridge: Cambridge University Press.

    Google Scholar 

  • Goldberg, K. (2005). Demonstrate project. Retrieved from http://demonstrate.berkeley.edu.

  • Gotlieb, C. C. (1996). Privacy: A concept whose time has come and gone. In D. Lyon and E. Zureik (Eds.), Computers, surveillance, and privacy (pp. 156–171). Minneapolis: University of Minnesota Press.

    Google Scholar 

  • Grudin, J. (2001). Desituating action: Digital representation of context. Human-Computer Interaction, 16, 269–286.

    Article  Google Scholar 

  • Hatch, E. (1983). Culture and morality. New York: Columbia University Press.

    Google Scholar 

  • Helwig, C. C. (1995). Adolescents' and young adults' conceptions of civil liberties: Freedom of speech and religion. Child Development, 66, 152–166.

    Article  Google Scholar 

  • Hudson, S. E. and Smith, I. (1996). Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems. Proceedings of the CSCW 1996. New York: ACM Press.

    Google Scholar 

  • Hutchinson, H., Mackay, W., Westerlund, B., Bederson, B. B., Druin, A., Plaisant, C., et al. (2003). Technology probes: Inspiring design for and with families. Extended Abstracts of CHI 2003. New York: ACM Press.

    Google Scholar 

  • Idehen, E. E. (1997). The influence of gender and space sharing history on the conceptions of privacy by undergraduates. IFE Pscyhologia, 5(1), 59–75.

    Google Scholar 

  • Jancke, G., Venolia, G. D., Grudin, J., Cadiz, J. J., and Gupta, A. (2001). Linking public spaces: Technical and social issues. Proceedings of the CHI 2001. New York: ACM Press.

    Google Scholar 

  • Jiang, X., Hong, J. I., and Landay, J. A. (2002). Approximate information flows: Socially-based modeling of privacy in ubiquitous computing. Proceedings of Ubicomp 2002. Berlin: Springer-Verlag.

    Google Scholar 

  • Junestrand, S., Tollmar, K., Lenman, S., and Thuresson, B. (2000). Private and public spaces— The use of video mediated communication in a future home environment. Extended Abstracts of the CHI 2000. New York: ACM Press.

    Google Scholar 

  • Kahn, P. H., Jr. (1992). Children's obligatory and discretionary moral judgments. Child Development, 63, 416–430.

    Article  Google Scholar 

  • Kahn, P. H., Jr. (1999). The human relationship with nature: Development and culture. Cambridge, MA: MIT Press.

    Google Scholar 

  • Kahn, P. H., Jr., Friedman, B., Freier, N., and Severson, R. (2003). Coding manual for children's interactions with AIBO, the robotic dog—The preschool study (UW CSE Technical Report 03-04-03). Seattle: Department of Computer Science and Engineering, University of Washington.

    Google Scholar 

  • Karro, J., Dent, A. W., and Farish, S. (2005). Patient perceptions of privacy infringements in an emergency department. Emergency Medicine Australasia, 17, 117–123.

    Article  Google Scholar 

  • Kellert, S. R. (1996). The value of life. Washington, DC: Island Press.

    Google Scholar 

  • Killen, M. (1990). Children's evaluations of morality in the context of peer, teacher-child and familial relations. Journal of Genetic Psychology, 151, 395–410.

    Google Scholar 

  • Kohlberg, L. (1969). Stage and sequence: The cognitive-developmental approach to socialization. In D. A. Goslin (Ed.), Handbook of socialization theory and research (pp. 347–480). New York: Rand McNally.

    Google Scholar 

  • Kohlberg, L. (1984). Essays on moral development: The psychology of moral development: Vol. 2. San Francisco: Harper & Row.

    Google Scholar 

  • Krathwohl, D. R. (1998). Methods of educational and social science research: An integrated approach. Reading, MA: Addison-Wesley.

    Google Scholar 

  • Langheinrich, M. (2001). Privacy by design—Principles of privacy-aware ubiquitous systems. Proceedings of Ubicomp 2001. Berlin: Springer-Verlag.

    Google Scholar 

  • Mantei, M., Baecker, R., Sellen, A., Buxton, W., Milligan, T., and Wellman, B. (1991). Experiences in the use of a media space. Proceedings of CHI 1991. New York: ACM Press.

    Google Scholar 

  • Margulis, S. T. (2003). On the status and contribution of Westin's and Altman's theories of privacy. Journal of Social Issues, 59, 429–441.

    Google Scholar 

  • Marshall, N. J. (1974). Dimensions of privacy preferences. Multivariate Behavioral Research, 9(3), 255–271.

    Article  Google Scholar 

  • Milgram, S. (1963). Behavioral study of obedience. Journal of Abnormal and Social Psychology, 67, 371–378.

    Article  Google Scholar 

  • Milgram, S. (1974). Obedience to authority. New York: Harper & Row.

    Google Scholar 

  • Moore, B., Jr. (1984). Privacy: Studies in social and cultural history. Armonk, NY: M. E. Sharpe.

    Google Scholar 

  • Newell, P. B. (1998). A cross-cultural comparison of privacy definitions and functions: A systems approach. Journal of Environmental Psychology, 18, 357–371.

    Article  Google Scholar 

  • Nissenbaum, H. (1998). Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy, 17, 559–596.

    Google Scholar 

  • Nucci, L. P. (1981). The development of personal concepts: A domain distinct from moral and societal concepts. Child Development, 52, 114–121.

    Article  Google Scholar 

  • Olson, M. and Bly, S. (1991). The Portland experience: A report on a distributed research group. International Journal of Man-Machine Studies, 34, 211–228.

    Article  Google Scholar 

  • Palen, L. and Dourish, P. (2003). Unpacking “privacy” for a networked world. Proceedings of the CHI 2003. New York: ACM Press.

    Google Scholar 

  • Pedersen, D. M. (1987). Sex differences in privacy preferences. Perceptual & Motor Skills, 64, 1239–1242.

    Google Scholar 

  • Pedersen, D. M. (1999). Model for types of privacy by privacy functions. Journal of Environmental Psychology, 19, 397–405.

    Article  Google Scholar 

  • Pelto, P. J. (1973). The snowmobile revolution: Technology and social change in the Arctic. Menlo Park, CA: Cummings.

    Google Scholar 

  • Piaget, J. (1960). The child's conception of the world. London: Routledge & Kegan Paul. (Original work published 1929).

    Google Scholar 

  • Privacy and American Business. (1997, April). Commerce, communication, and privacy online. Retrieved July 24, 2003, from http://www.pandab.org/compsurv.html

  • Privacy and America Business. (1998, December). Executive summary. Retrieved July 24, 2003, from http://www.pandab.org/1298execsum.html

  • Power, C. (1991). Democratic schools and the problem of moral authority. In W. Kurtines and J. Gewirtz (Eds.), Handbook of moral behavior and development: Vol. 3 (pp. 317–333). Hillsdale, NJ: Lawrence Erlbaum.

    Google Scholar 

  • Reiman, J. H. (1976). Privacy, intimacy, and personhood. Philosophy & Public Affairs, 6, 26–44.

    Google Scholar 

  • Root, R. W. (1988). Design of a multi-media vehicle for social browsing. Proceedings of the CSCW 1988 (pp. 25–28). New York: ACM Press.

    Google Scholar 

  • Rustemi, A. and Kokdemir, D. (1993). Privacy dimensions and preferences among Turkish students. Journal of Social Psychology, 133(6), 807–808.

    Google Scholar 

  • Schoeman, F. D. (Ed.). (1984). Philosophical dimensions of privacy: An anthology. London: Cambridge University Press.

    Google Scholar 

  • Sharp, L. (1980). Steel axes for stone-age Australians. In J. P. Spradley and D. W. McCurdy (Eds.), Conformity and conflict (pp. 345–359). Boston: Little, Brown, & Company. (Reprinted from Human Organization, 1952, 11, 17–22).

    Google Scholar 

  • Spradley, J. P. (2000). You owe yourself a drunk: An ethnography of urban nomads. Prospect Heights, IL: Waveland Press (Originally published 1970).

    Google Scholar 

  • Tang, J. C., & Rua, M. (1994). Montage: Providing teleproximity for distributed groups. Proceedings of the CHI 94. New York: ACM Press.

    Google Scholar 

  • Taylor, H. (2003). Most people are “Privacy Pragmatists” who, while concerned about privacy, will sometimes trade it off for other benefits. The Harris Poll #17. Retrieved August 28, 2003, from http://www.harrisinteractive.com/harris_poll/ index.asp?PID=365

  • Turiel, E. (1983). The development of social knowledge. Cambridge: Cambridge University Press.

    Google Scholar 

  • Turiel, E. (2002). The culture of morality: Social development and social opposition. Cambridge: Cambridge University Press.

    Google Scholar 

  • Turiel, E., Hildebrandt, C., & Wainryb, C. (1991). Judging social issues: Difficulties, inconsistencies, and consistencies. Monographs of the Society for Research in Child Development, 56(2, Serial No. 224), 1–103.

    Article  Google Scholar 

  • Wainryb, C. and Turiel, E. (1994). Dominance, subordination, and concepts of personal entitlements in cultural contexts. Child Development, 65, 1701–1722.

    Article  Google Scholar 

  • Warren, S. D. and Brandeis, L. D. (1985). The right to privacy. In D. G. Johnson and J. W. Snapper (Eds.), Ethical issues in the use of computers (pp. 172–183). Belmont, CA: Wadsworth (Originally published in Harvard Educational Review 4, December 5, 1890, 193–220).

    Google Scholar 

  • Westin, A. (1967). Privacy and freedom. New York: Antheneum.

    Google Scholar 

  • Wilson, E. O. (1975). Sociobiology: The new synthesis. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Wilson, E. O. (1998). Consilience. New York: Knopf.

    Google Scholar 

  • Wikan, U. (2002). Generous betrayal: Politics of culture in the new Europe. Chicago: University of Chicago Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag London Limited

About this chapter

Cite this chapter

Friedman, B., Kahn, P.H., Hagman, J., Severson, R.L., Gill, B. (2009). The Watcher and the Watched: Social Judgments about Privacy in a Public Place. In: Harrison, S. (eds) Media Space 20 + Years of Mediated Life. Computer Supported Cooperative Work. Springer, London. https://doi.org/10.1007/978-1-84882-483-6_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-84882-483-6_9

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84882-482-9

  • Online ISBN: 978-1-84882-483-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics