Abstract
With increased innovation and adoption of digital technologies in our everyday life for various purposes, media, privacy experts, advocates, scholars and researchers have noted and raised privacy and security concerns associated with the misuse of personal information from digital technologies. These technologies enable collection, processing and re-purposing of personal information for various purposes by commercial and interested entities. This paper presents a privacy awareness perspective in an attempt to understand how people respond to privacy concerns while using activity tracking devices and applications, loyalty cards and related data sharing within various information ecologies. The research used a constructivist paradigm; we interviewed twenty-one users of activity trackers and loyalty cards to understand their privacy practices. Results show that privacy is a flexible concept which is a result of users’ negotiation between the benefits and the harms of disclosing personal information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Solove, D.J., Schwartz, P.M.: Consumer Privacy and Data Protection. Wolters Kluwer, New York (2014)
Christl, W., Kopp, K., Riechert, P.U.: Corporate Surveillance in Everyday Life. Crackedlabs (2017)
Rosenblat, A., Kneese, T., Boyd, D.: Networked employment discrimination. Open Society Foundations’ Future of Work Commissioned Research Papers (2014). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2543507
Solove, D.J.: A taxonomy of privacy. Univ. Pennsylvania Law Rev. 154, 477–564 (2006)
Kitchin, R.: The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Sage, Los Angeles (2014)
Haynes, D., Robinson, L.: Defining user risk in social networking services. Aslib J. Inf. Manag. 67, 94–115 (2015)
Lyon, D.: Surveillance, power and everyday life. In: Kalantzis-Cope, P., Gherab-Martín, K. (eds.) Emerging Digital Spaces in Contemporary Society, pp. 107–120. Palgrave Macmillan, London (2010)
Clarke, R.: Introduction to dataveillance and information privacy, and definitions of terms (1999). http://www.rogerclarke.com/DV/Intro.html
Lambiotte, R., Kosinski, M.: Tracking the digital footprints of personality. Proc. IEEE 102, 1934–1939 (2014)
Pariser, E.: The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think. Penguin, New York (2011)
Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347, 509–514 (2015)
Christl, W., Kopp, K., Riechert, P.U.: How companies use personal information against people: automated disadvantage, personalized persuasion, and the societal ramifications of the commercial use of personal information. Cracked Labs (2017)
Correia, J., Compeau, D.: Information Privacy Awareness (IPA): a review of the use, definition and measurement of IPA. In: Proceedings of the 50th Hawaii International Conference on System Sciences, Hawaii (2017)
Svantesson, D., Clarke, R.: A best practice model for e-consumer protection. Comput. Law Secur. Rev. 26, 31–37 (2010)
Torre, I., Sanchez, O.R., Koceva, F., Adorni, G.: Supporting users to take informed decisions on privacy settings of personal devices. Pers. Ubiquit. Comput. 22, 1–20 (2017)
Rotman, D.: Are you looking at me? Social media and privacy literacy. In: 4th iSchool Conference, Chapel Hill, USA (2009). http://hdl.handle.net/2142/15339
Givens, C.L.: Information Privacy Fundamentals for Librarians and Information Professionals. Rowman & Littlefield, Lanham (2015)
Fereidooni, H., Frassetto, T., Miettinen, M., Sadeghi, A.-R., Conti, M.: Fitness trackers: fit for health but unfit for security and privacy. In: 2017 IEEE/ACM Connected Health Applications, Systems and Engineering Technologies (CHASE), pp. 19–24. IEEE, Philadelphia (2017). https://ieeexplore.ieee.org/document/8010569/
Clausing, E., Schiefer, M., Morgenstern, U.: Internet of Things: Security Evaluation of nine Fitness Trackers. AV TEST, The Independent IT-Security institute, Magdeburg (2015). https://www.av-test.org/fileadmin/pdf/avtest_2015-06_fitness_tracker_english.pdf
Ajunwa, I., Crawford, K., Ford, J.S.: Health and big data: an ethical framework for health information collection by corporate wellness programs. J. Law Med. Ethics 44, 474–480 (2016)
Flybys: Small Steps, Big Impact. The Path to a Healthier Lifestyle Starts with Just One Step (2016). https://www.flybuys.com.au/collect#/partners/fitbit
Crawford, K., Schultz, J.: Big data and due process: toward a framework to redress predictive privacy harms. Boston Coll. Law Rev. 55, 39–92 (2014)
Floridi, L.: Four challenges for a theory of informational privacy. Ethics Inf. Technol. 8, 109–119 (2006)
Barnes, S.B.: A privacy paradox: social networking in the United States. First Mon. 11(9) (2006)
Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136 (2003). https://dl.acm.org/citation.cfm?id=642635
Nissenbaum, H.: Privacy in Context. Stanford University Press, Stanford (2009)
Nissenbaum, H.: Privacy as contextual integrity. Washington Law Rev. 79, 119 (2004)
Barocas, S., Nissenbaum, H.: Big data’s end run around anonymity and consent. In: Julia, L., Victoria, S., Stefan, B., Helen, N. (eds.) Privacy, Big Data, and the Public Good: Frameworks for Engagement, vol. 1, pp. 44–75. Cambridge University Press, New York (2014)
Sellen, A.J., Whittaker, S.: Beyond total capture: a constructive critique of lifelogging. Commun. ACM 53, 70–77 (2010). https://dl.acm.org/citation.cfm?id=1735243
Hoy, M.B.: Personal activity trackers and the quantified self. Med. Ref. Serv. Q. 35, 94–100 (2016)
Barcena, M.B., Wueest, C., Lau, H.: How Safe is Your Quantified Self? Symantec, Mountain View (2014)
Christovich, M.M.: Why should we care what fitbit shares-a proposed statutory solution to protect sensative personal fitness information. Hast. Commun. Entertain. Law J. 38, 91 (2016)
Rawassizadeh, R.: Towards sharing life-log information with society. Behav. Inf. Technol. 31, 1057–1067 (2012)
Wolf, G.: Know thyself: tracking every facet of life, from sleep to mood to pain. Wired (2009). https://www.wired.com/2009/06/lbnp-knowthyself/
Lupton, D.: The Quantified Self. Polity Press, Malden (2016)
Lupton, D.: Digital Sociology. Routledge, London (2015)
Neff, G., Nafus, D.: The Self-tracking. MIT Press, Cambridge (2016)
Lupton, D.: You are your data: self-tracking practices and concepts of data. In: Selke, S. (ed.) Lifelogging, pp. 61–79. Springer, Wiesbaden (2014). https://doi.org/10.1007/978-3-658-13137-1_4
Lo, B.P., Ip, H., Yang, G.-Z.: Transforming health care: body sensor networks, wearables, and the Internet of Things. IEEE Pulse 7, 4–8 (2016). https://ieeexplore.ieee.org/document/7387856/
United States Federal Trade Commission: Internet of things: privacy and security in a connected world (2015). https://www.hsdl.org/?view&did=805589
Foucault, M.: Discipline and Punishment: The Birth of the Prison. Vintage, New York (1977). (Ed. by Alan Scheridan)
Doherty, A.R., et al.: Passively recognising human activities through lifelogging. Comput. Hum. Behav. 27, 1948–1958 (2011)
Lewis, S.J.: Assessment of the privacy and security of smart toys marketed to children. Top10VPN (2017). https://www.top10vpn.com/wp-content/uploads/2018/02/Top10VPN-smart-toys-safety-report.pdf
Rahman, M., Carbunar, B., Banik, M.: Fit and vulnerable: attacks and defenses for a health monitoring device. https://www.ieee-security.org/TC/SP2013/posters/Mahmudur_Rahman.pdf
Zhou, W., Piramuthu, S.: Security/privacy of wearable fitness tracking IoT devices. In: 9th Iberian Conference on Information Systems and Technologies (CISTI): IEEE, pp. 1–5. IEEE (2014). https://ieeexplore.ieee.org/document/6877073/
Boam, E., Webb, J.: Qualified self going beyond quantification. Designmind (2014). https://designmind.frogdesign.com/2014/05/qualified-self-going-beyond-quantification/
Michael, K.: Implantable medical device tells all: uberveillance gets to the heart of the matter. IEEE Consum. Electron. Mag. 6, 107–115 (2017). ieeexplore.ieee.org/document/8048728/
Campos, H.: Fighting for the right to open his heart data: Hugo Campos at TEDxCambridge 2011 (2011). https://youtu.be/oro19-l5M8k
Hinckley, D.: This big brother/big data business goes way beyond apple and the FBI. Huffpost (2016). https://www.huffingtonpost.com/david-hinckley/this-big-brotherbig-data_b_9292744.html
World Economic Forum: Rethinking Personal Data: Strengthening Trust (2012). http://www3.weforum.org/docs/WEF_RethinkingPersonalData_ANewLens_Report_2014.pdf
Pingo, Z., Narayan, B.: When personal data becomes open data: an exploration of lifelogging, user privacy, and implications for privacy literacy. In: Morishima, A., Rauber, A., Liew, C.L. (eds.) ICADL 2016. LNCS, vol. 10075, pp. 3–9. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49304-6_1
Bryman, A.: Social Research Methods. Oxford University Press, Oxford (2015)
Bazeley, P.: Qualitative Analysis with NVivo. Sage, London (2007)
Rainie, L., Duggan, M.: Privacy and Information Sharing. Pew Research Center (2015). http://www.pewinternet.org/2016/01/14/2016/Privacy-and-Information-Sharing/
Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 21–29. ACM (2004). https://dl.acm.org/citation.cfm?id=988777
Bandara, R., Fernando, M., Akter, S.: Is the privacy paradox a matter of psychological distance? An exploratory study of the privacy paradox from a construal level theory perspective. In: Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii (2018). https://scholars.uow.edu.au/display/publication116721
Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18, 163–175 (2014)
Case, D.O., Given, L.M.: Looking for Information: A Survey of Research on Information Seeking, Needs, and Behavior. Academic Press, San Diego (2017)
Briedis, M., Webb, J., Fraser, M.: Improving the Communication of Privacy Information for Consumers. Australian Communications Consumer Action Network (2016)
Terms of Service Didnt Read: “I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that (2017). https://tosdr.org/blog/tosdr-in-action-i-have-read-and-agree.html
Tailor, N., He, Y., Wagner, I.: POSTER: design ideas for privacy-aware user interfaces for mobile devices. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 219–220. ACM, Darmstadt (2016). https://doi.org/10.1145/2939918.2942420
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Pingo, Z., Narayan, B. (2018). Users’ Responses to Privacy Issues with the Connected Information Ecologies Created by Fitness Trackers. In: Dobreva, M., Hinze, A., Žumer, M. (eds) Maturity and Innovation in Digital Libraries. ICADL 2018. Lecture Notes in Computer Science(), vol 11279. Springer, Cham. https://doi.org/10.1007/978-3-030-04257-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-04257-8_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-04256-1
Online ISBN: 978-3-030-04257-8
eBook Packages: Computer ScienceComputer Science (R0)