Skip to main content

Users’ Responses to Privacy Issues with the Connected Information Ecologies Created by Fitness Trackers

  • Conference paper
  • First Online:
Book cover Maturity and Innovation in Digital Libraries (ICADL 2018)

Abstract

With increased innovation and adoption of digital technologies in our everyday life for various purposes, media, privacy experts, advocates, scholars and researchers have noted and raised privacy and security concerns associated with the misuse of personal information from digital technologies. These technologies enable collection, processing and re-purposing of personal information for various purposes by commercial and interested entities. This paper presents a privacy awareness perspective in an attempt to understand how people respond to privacy concerns while using activity tracking devices and applications, loyalty cards and related data sharing within various information ecologies. The research used a constructivist paradigm; we interviewed twenty-one users of activity trackers and loyalty cards to understand their privacy practices. Results show that privacy is a flexible concept which is a result of users’ negotiation between the benefits and the harms of disclosing personal information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Solove, D.J., Schwartz, P.M.: Consumer Privacy and Data Protection. Wolters Kluwer, New York (2014)

    Google Scholar 

  2. Christl, W., Kopp, K., Riechert, P.U.: Corporate Surveillance in Everyday Life. Crackedlabs (2017)

    Google Scholar 

  3. Rosenblat, A., Kneese, T., Boyd, D.: Networked employment discrimination. Open Society Foundations’ Future of Work Commissioned Research Papers (2014). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2543507

  4. Solove, D.J.: A taxonomy of privacy. Univ. Pennsylvania Law Rev. 154, 477–564 (2006)

    Article  Google Scholar 

  5. Kitchin, R.: The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Sage, Los Angeles (2014)

    Google Scholar 

  6. Haynes, D., Robinson, L.: Defining user risk in social networking services. Aslib J. Inf. Manag. 67, 94–115 (2015)

    Article  Google Scholar 

  7. Lyon, D.: Surveillance, power and everyday life. In: Kalantzis-Cope, P., Gherab-Martín, K. (eds.) Emerging Digital Spaces in Contemporary Society, pp. 107–120. Palgrave Macmillan, London (2010)

    Chapter  Google Scholar 

  8. Clarke, R.: Introduction to dataveillance and information privacy, and definitions of terms (1999). http://www.rogerclarke.com/DV/Intro.html

  9. Lambiotte, R., Kosinski, M.: Tracking the digital footprints of personality. Proc. IEEE 102, 1934–1939 (2014)

    Article  Google Scholar 

  10. Pariser, E.: The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think. Penguin, New York (2011)

    Google Scholar 

  11. Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347, 509–514 (2015)

    Article  Google Scholar 

  12. Christl, W., Kopp, K., Riechert, P.U.: How companies use personal information against people: automated disadvantage, personalized persuasion, and the societal ramifications of the commercial use of personal information. Cracked Labs (2017)

    Google Scholar 

  13. Correia, J., Compeau, D.: Information Privacy Awareness (IPA): a review of the use, definition and measurement of IPA. In: Proceedings of the 50th Hawaii International Conference on System Sciences, Hawaii (2017)

    Google Scholar 

  14. Svantesson, D., Clarke, R.: A best practice model for e-consumer protection. Comput. Law Secur. Rev. 26, 31–37 (2010)

    Article  Google Scholar 

  15. Torre, I., Sanchez, O.R., Koceva, F., Adorni, G.: Supporting users to take informed decisions on privacy settings of personal devices. Pers. Ubiquit. Comput. 22, 1–20 (2017)

    Google Scholar 

  16. Rotman, D.: Are you looking at me? Social media and privacy literacy. In: 4th iSchool Conference, Chapel Hill, USA (2009). http://hdl.handle.net/2142/15339

  17. Givens, C.L.: Information Privacy Fundamentals for Librarians and Information Professionals. Rowman & Littlefield, Lanham (2015)

    Google Scholar 

  18. Fereidooni, H., Frassetto, T., Miettinen, M., Sadeghi, A.-R., Conti, M.: Fitness trackers: fit for health but unfit for security and privacy. In: 2017 IEEE/ACM Connected Health Applications, Systems and Engineering Technologies (CHASE), pp. 19–24. IEEE, Philadelphia (2017). https://ieeexplore.ieee.org/document/8010569/

  19. Clausing, E., Schiefer, M., Morgenstern, U.: Internet of Things: Security Evaluation of nine Fitness Trackers. AV TEST, The Independent IT-Security institute, Magdeburg (2015). https://www.av-test.org/fileadmin/pdf/avtest_2015-06_fitness_tracker_english.pdf

  20. Ajunwa, I., Crawford, K., Ford, J.S.: Health and big data: an ethical framework for health information collection by corporate wellness programs. J. Law Med. Ethics 44, 474–480 (2016)

    Article  Google Scholar 

  21. Flybys: Small Steps, Big Impact. The Path to a Healthier Lifestyle Starts with Just One Step (2016). https://www.flybuys.com.au/collect#/partners/fitbit

  22. Crawford, K., Schultz, J.: Big data and due process: toward a framework to redress predictive privacy harms. Boston Coll. Law Rev. 55, 39–92 (2014)

    Google Scholar 

  23. Floridi, L.: Four challenges for a theory of informational privacy. Ethics Inf. Technol. 8, 109–119 (2006)

    Article  Google Scholar 

  24. Barnes, S.B.: A privacy paradox: social networking in the United States. First Mon. 11(9) (2006)

    Google Scholar 

  25. Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136 (2003). https://dl.acm.org/citation.cfm?id=642635

  26. Nissenbaum, H.: Privacy in Context. Stanford University Press, Stanford (2009)

    Google Scholar 

  27. Nissenbaum, H.: Privacy as contextual integrity. Washington Law Rev. 79, 119 (2004)

    Google Scholar 

  28. Barocas, S., Nissenbaum, H.: Big data’s end run around anonymity and consent. In: Julia, L., Victoria, S., Stefan, B., Helen, N. (eds.) Privacy, Big Data, and the Public Good: Frameworks for Engagement, vol. 1, pp. 44–75. Cambridge University Press, New York (2014)

    Chapter  Google Scholar 

  29. Sellen, A.J., Whittaker, S.: Beyond total capture: a constructive critique of lifelogging. Commun. ACM 53, 70–77 (2010). https://dl.acm.org/citation.cfm?id=1735243

    Article  Google Scholar 

  30. Hoy, M.B.: Personal activity trackers and the quantified self. Med. Ref. Serv. Q. 35, 94–100 (2016)

    Article  Google Scholar 

  31. Barcena, M.B., Wueest, C., Lau, H.: How Safe is Your Quantified Self? Symantec, Mountain View (2014)

    Google Scholar 

  32. Christovich, M.M.: Why should we care what fitbit shares-a proposed statutory solution to protect sensative personal fitness information. Hast. Commun. Entertain. Law J. 38, 91 (2016)

    Google Scholar 

  33. Rawassizadeh, R.: Towards sharing life-log information with society. Behav. Inf. Technol. 31, 1057–1067 (2012)

    Article  Google Scholar 

  34. Wolf, G.: Know thyself: tracking every facet of life, from sleep to mood to pain. Wired (2009). https://www.wired.com/2009/06/lbnp-knowthyself/

  35. Lupton, D.: The Quantified Self. Polity Press, Malden (2016)

    Google Scholar 

  36. Lupton, D.: Digital Sociology. Routledge, London (2015)

    Google Scholar 

  37. Neff, G., Nafus, D.: The Self-tracking. MIT Press, Cambridge (2016)

    Google Scholar 

  38. Lupton, D.: You are your data: self-tracking practices and concepts of data. In: Selke, S. (ed.) Lifelogging, pp. 61–79. Springer, Wiesbaden (2014). https://doi.org/10.1007/978-3-658-13137-1_4

    Chapter  Google Scholar 

  39. Lo, B.P., Ip, H., Yang, G.-Z.: Transforming health care: body sensor networks, wearables, and the Internet of Things. IEEE Pulse 7, 4–8 (2016). https://ieeexplore.ieee.org/document/7387856/

    Article  Google Scholar 

  40. United States Federal Trade Commission: Internet of things: privacy and security in a connected world (2015). https://www.hsdl.org/?view&did=805589

  41. Foucault, M.: Discipline and Punishment: The Birth of the Prison. Vintage, New York (1977). (Ed. by Alan Scheridan)

    Google Scholar 

  42. Doherty, A.R., et al.: Passively recognising human activities through lifelogging. Comput. Hum. Behav. 27, 1948–1958 (2011)

    Article  Google Scholar 

  43. Lewis, S.J.: Assessment of the privacy and security of smart toys marketed to children. Top10VPN (2017). https://www.top10vpn.com/wp-content/uploads/2018/02/Top10VPN-smart-toys-safety-report.pdf

  44. Rahman, M., Carbunar, B., Banik, M.: Fit and vulnerable: attacks and defenses for a health monitoring device. https://www.ieee-security.org/TC/SP2013/posters/Mahmudur_Rahman.pdf

  45. Zhou, W., Piramuthu, S.: Security/privacy of wearable fitness tracking IoT devices. In: 9th Iberian Conference on Information Systems and Technologies (CISTI): IEEE, pp. 1–5. IEEE (2014). https://ieeexplore.ieee.org/document/6877073/

  46. Boam, E., Webb, J.: Qualified self going beyond quantification. Designmind (2014). https://designmind.frogdesign.com/2014/05/qualified-self-going-beyond-quantification/

  47. Michael, K.: Implantable medical device tells all: uberveillance gets to the heart of the matter. IEEE Consum. Electron. Mag. 6, 107–115 (2017). ieeexplore.ieee.org/document/8048728/

    Article  Google Scholar 

  48. Campos, H.: Fighting for the right to open his heart data: Hugo Campos at TEDxCambridge 2011 (2011). https://youtu.be/oro19-l5M8k

  49. Hinckley, D.: This big brother/big data business goes way beyond apple and the FBI. Huffpost (2016). https://www.huffingtonpost.com/david-hinckley/this-big-brotherbig-data_b_9292744.html

  50. World Economic Forum: Rethinking Personal Data: Strengthening Trust (2012). http://www3.weforum.org/docs/WEF_RethinkingPersonalData_ANewLens_Report_2014.pdf

  51. Pingo, Z., Narayan, B.: When personal data becomes open data: an exploration of lifelogging, user privacy, and implications for privacy literacy. In: Morishima, A., Rauber, A., Liew, C.L. (eds.) ICADL 2016. LNCS, vol. 10075, pp. 3–9. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49304-6_1

    Chapter  Google Scholar 

  52. Bryman, A.: Social Research Methods. Oxford University Press, Oxford (2015)

    Google Scholar 

  53. Bazeley, P.: Qualitative Analysis with NVivo. Sage, London (2007)

    Google Scholar 

  54. Rainie, L., Duggan, M.: Privacy and Information Sharing. Pew Research Center (2015). http://www.pewinternet.org/2016/01/14/2016/Privacy-and-Information-Sharing/

  55. Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 21–29. ACM (2004). https://dl.acm.org/citation.cfm?id=988777

  56. Bandara, R., Fernando, M., Akter, S.: Is the privacy paradox a matter of psychological distance? An exploratory study of the privacy paradox from a construal level theory perspective. In: Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii (2018). https://scholars.uow.edu.au/display/publication116721

  57. Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18, 163–175 (2014)

    Article  Google Scholar 

  58. Case, D.O., Given, L.M.: Looking for Information: A Survey of Research on Information Seeking, Needs, and Behavior. Academic Press, San Diego (2017)

    Google Scholar 

  59. Briedis, M., Webb, J., Fraser, M.: Improving the Communication of Privacy Information for Consumers. Australian Communications Consumer Action Network (2016)

    Google Scholar 

  60. Terms of Service Didnt Read: “I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that (2017). https://tosdr.org/blog/tosdr-in-action-i-have-read-and-agree.html

  61. Tailor, N., He, Y., Wagner, I.: POSTER: design ideas for privacy-aware user interfaces for mobile devices. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 219–220. ACM, Darmstadt (2016). https://doi.org/10.1145/2939918.2942420

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zablon Pingo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pingo, Z., Narayan, B. (2018). Users’ Responses to Privacy Issues with the Connected Information Ecologies Created by Fitness Trackers. In: Dobreva, M., Hinze, A., Žumer, M. (eds) Maturity and Innovation in Digital Libraries. ICADL 2018. Lecture Notes in Computer Science(), vol 11279. Springer, Cham. https://doi.org/10.1007/978-3-030-04257-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-04257-8_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-04256-1

  • Online ISBN: 978-3-030-04257-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics