Advertisement

Users’ Responses to Privacy Issues with the Connected Information Ecologies Created by Fitness Trackers

  • Zablon PingoEmail author
  • Bhuva Narayan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11279)

Abstract

With increased innovation and adoption of digital technologies in our everyday life for various purposes, media, privacy experts, advocates, scholars and researchers have noted and raised privacy and security concerns associated with the misuse of personal information from digital technologies. These technologies enable collection, processing and re-purposing of personal information for various purposes by commercial and interested entities. This paper presents a privacy awareness perspective in an attempt to understand how people respond to privacy concerns while using activity tracking devices and applications, loyalty cards and related data sharing within various information ecologies. The research used a constructivist paradigm; we interviewed twenty-one users of activity trackers and loyalty cards to understand their privacy practices. Results show that privacy is a flexible concept which is a result of users’ negotiation between the benefits and the harms of disclosing personal information.

Keywords

Activity trackers Fitness trackers Privacy Privacy awareness Informational privacy Contextual integrity 

References

  1. 1.
    Solove, D.J., Schwartz, P.M.: Consumer Privacy and Data Protection. Wolters Kluwer, New York (2014)Google Scholar
  2. 2.
    Christl, W., Kopp, K., Riechert, P.U.: Corporate Surveillance in Everyday Life. Crackedlabs (2017)Google Scholar
  3. 3.
    Rosenblat, A., Kneese, T., Boyd, D.: Networked employment discrimination. Open Society Foundations’ Future of Work Commissioned Research Papers (2014). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2543507
  4. 4.
    Solove, D.J.: A taxonomy of privacy. Univ. Pennsylvania Law Rev. 154, 477–564 (2006)CrossRefGoogle Scholar
  5. 5.
    Kitchin, R.: The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Sage, Los Angeles (2014)Google Scholar
  6. 6.
    Haynes, D., Robinson, L.: Defining user risk in social networking services. Aslib J. Inf. Manag. 67, 94–115 (2015)CrossRefGoogle Scholar
  7. 7.
    Lyon, D.: Surveillance, power and everyday life. In: Kalantzis-Cope, P., Gherab-Martín, K. (eds.) Emerging Digital Spaces in Contemporary Society, pp. 107–120. Palgrave Macmillan, London (2010)CrossRefGoogle Scholar
  8. 8.
    Clarke, R.: Introduction to dataveillance and information privacy, and definitions of terms (1999). http://www.rogerclarke.com/DV/Intro.html
  9. 9.
    Lambiotte, R., Kosinski, M.: Tracking the digital footprints of personality. Proc. IEEE 102, 1934–1939 (2014)CrossRefGoogle Scholar
  10. 10.
    Pariser, E.: The Filter Bubble: How the New Personalized Web is Changing What We Read and How We Think. Penguin, New York (2011)Google Scholar
  11. 11.
    Acquisti, A., Brandimarte, L., Loewenstein, G.: Privacy and human behavior in the age of information. Science 347, 509–514 (2015)CrossRefGoogle Scholar
  12. 12.
    Christl, W., Kopp, K., Riechert, P.U.: How companies use personal information against people: automated disadvantage, personalized persuasion, and the societal ramifications of the commercial use of personal information. Cracked Labs (2017)Google Scholar
  13. 13.
    Correia, J., Compeau, D.: Information Privacy Awareness (IPA): a review of the use, definition and measurement of IPA. In: Proceedings of the 50th Hawaii International Conference on System Sciences, Hawaii (2017)Google Scholar
  14. 14.
    Svantesson, D., Clarke, R.: A best practice model for e-consumer protection. Comput. Law Secur. Rev. 26, 31–37 (2010)CrossRefGoogle Scholar
  15. 15.
    Torre, I., Sanchez, O.R., Koceva, F., Adorni, G.: Supporting users to take informed decisions on privacy settings of personal devices. Pers. Ubiquit. Comput. 22, 1–20 (2017)Google Scholar
  16. 16.
    Rotman, D.: Are you looking at me? Social media and privacy literacy. In: 4th iSchool Conference, Chapel Hill, USA (2009). http://hdl.handle.net/2142/15339
  17. 17.
    Givens, C.L.: Information Privacy Fundamentals for Librarians and Information Professionals. Rowman & Littlefield, Lanham (2015)Google Scholar
  18. 18.
    Fereidooni, H., Frassetto, T., Miettinen, M., Sadeghi, A.-R., Conti, M.: Fitness trackers: fit for health but unfit for security and privacy. In: 2017 IEEE/ACM Connected Health Applications, Systems and Engineering Technologies (CHASE), pp. 19–24. IEEE, Philadelphia (2017). https://ieeexplore.ieee.org/document/8010569/
  19. 19.
    Clausing, E., Schiefer, M., Morgenstern, U.: Internet of Things: Security Evaluation of nine Fitness Trackers. AV TEST, The Independent IT-Security institute, Magdeburg (2015). https://www.av-test.org/fileadmin/pdf/avtest_2015-06_fitness_tracker_english.pdf
  20. 20.
    Ajunwa, I., Crawford, K., Ford, J.S.: Health and big data: an ethical framework for health information collection by corporate wellness programs. J. Law Med. Ethics 44, 474–480 (2016)CrossRefGoogle Scholar
  21. 21.
    Flybys: Small Steps, Big Impact. The Path to a Healthier Lifestyle Starts with Just One Step (2016). https://www.flybuys.com.au/collect#/partners/fitbit
  22. 22.
    Crawford, K., Schultz, J.: Big data and due process: toward a framework to redress predictive privacy harms. Boston Coll. Law Rev. 55, 39–92 (2014)Google Scholar
  23. 23.
    Floridi, L.: Four challenges for a theory of informational privacy. Ethics Inf. Technol. 8, 109–119 (2006)CrossRefGoogle Scholar
  24. 24.
    Barnes, S.B.: A privacy paradox: social networking in the United States. First Mon. 11(9) (2006)Google Scholar
  25. 25.
    Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136 (2003). https://dl.acm.org/citation.cfm?id=642635
  26. 26.
    Nissenbaum, H.: Privacy in Context. Stanford University Press, Stanford (2009)Google Scholar
  27. 27.
    Nissenbaum, H.: Privacy as contextual integrity. Washington Law Rev. 79, 119 (2004)Google Scholar
  28. 28.
    Barocas, S., Nissenbaum, H.: Big data’s end run around anonymity and consent. In: Julia, L., Victoria, S., Stefan, B., Helen, N. (eds.) Privacy, Big Data, and the Public Good: Frameworks for Engagement, vol. 1, pp. 44–75. Cambridge University Press, New York (2014)CrossRefGoogle Scholar
  29. 29.
    Sellen, A.J., Whittaker, S.: Beyond total capture: a constructive critique of lifelogging. Commun. ACM 53, 70–77 (2010). https://dl.acm.org/citation.cfm?id=1735243CrossRefGoogle Scholar
  30. 30.
    Hoy, M.B.: Personal activity trackers and the quantified self. Med. Ref. Serv. Q. 35, 94–100 (2016)CrossRefGoogle Scholar
  31. 31.
    Barcena, M.B., Wueest, C., Lau, H.: How Safe is Your Quantified Self? Symantec, Mountain View (2014)Google Scholar
  32. 32.
    Christovich, M.M.: Why should we care what fitbit shares-a proposed statutory solution to protect sensative personal fitness information. Hast. Commun. Entertain. Law J. 38, 91 (2016)Google Scholar
  33. 33.
    Rawassizadeh, R.: Towards sharing life-log information with society. Behav. Inf. Technol. 31, 1057–1067 (2012)CrossRefGoogle Scholar
  34. 34.
    Wolf, G.: Know thyself: tracking every facet of life, from sleep to mood to pain. Wired (2009). https://www.wired.com/2009/06/lbnp-knowthyself/
  35. 35.
    Lupton, D.: The Quantified Self. Polity Press, Malden (2016)Google Scholar
  36. 36.
    Lupton, D.: Digital Sociology. Routledge, London (2015)Google Scholar
  37. 37.
    Neff, G., Nafus, D.: The Self-tracking. MIT Press, Cambridge (2016)Google Scholar
  38. 38.
    Lupton, D.: You are your data: self-tracking practices and concepts of data. In: Selke, S. (ed.) Lifelogging, pp. 61–79. Springer, Wiesbaden (2014).  https://doi.org/10.1007/978-3-658-13137-1_4CrossRefGoogle Scholar
  39. 39.
    Lo, B.P., Ip, H., Yang, G.-Z.: Transforming health care: body sensor networks, wearables, and the Internet of Things. IEEE Pulse 7, 4–8 (2016). https://ieeexplore.ieee.org/document/7387856/CrossRefGoogle Scholar
  40. 40.
    United States Federal Trade Commission: Internet of things: privacy and security in a connected world (2015). https://www.hsdl.org/?view&did=805589
  41. 41.
    Foucault, M.: Discipline and Punishment: The Birth of the Prison. Vintage, New York (1977). (Ed. by Alan Scheridan)Google Scholar
  42. 42.
    Doherty, A.R., et al.: Passively recognising human activities through lifelogging. Comput. Hum. Behav. 27, 1948–1958 (2011)CrossRefGoogle Scholar
  43. 43.
    Lewis, S.J.: Assessment of the privacy and security of smart toys marketed to children. Top10VPN (2017). https://www.top10vpn.com/wp-content/uploads/2018/02/Top10VPN-smart-toys-safety-report.pdf
  44. 44.
    Rahman, M., Carbunar, B., Banik, M.: Fit and vulnerable: attacks and defenses for a health monitoring device. https://www.ieee-security.org/TC/SP2013/posters/Mahmudur_Rahman.pdf
  45. 45.
    Zhou, W., Piramuthu, S.: Security/privacy of wearable fitness tracking IoT devices. In: 9th Iberian Conference on Information Systems and Technologies (CISTI): IEEE, pp. 1–5. IEEE (2014). https://ieeexplore.ieee.org/document/6877073/
  46. 46.
    Boam, E., Webb, J.: Qualified self going beyond quantification. Designmind (2014). https://designmind.frogdesign.com/2014/05/qualified-self-going-beyond-quantification/
  47. 47.
    Michael, K.: Implantable medical device tells all: uberveillance gets to the heart of the matter. IEEE Consum. Electron. Mag. 6, 107–115 (2017). ieeexplore.ieee.org/document/8048728/CrossRefGoogle Scholar
  48. 48.
    Campos, H.: Fighting for the right to open his heart data: Hugo Campos at TEDxCambridge 2011 (2011). https://youtu.be/oro19-l5M8k
  49. 49.
    Hinckley, D.: This big brother/big data business goes way beyond apple and the FBI. Huffpost (2016). https://www.huffingtonpost.com/david-hinckley/this-big-brotherbig-data_b_9292744.html
  50. 50.
    World Economic Forum: Rethinking Personal Data: Strengthening Trust (2012). http://www3.weforum.org/docs/WEF_RethinkingPersonalData_ANewLens_Report_2014.pdf
  51. 51.
    Pingo, Z., Narayan, B.: When personal data becomes open data: an exploration of lifelogging, user privacy, and implications for privacy literacy. In: Morishima, A., Rauber, A., Liew, C.L. (eds.) ICADL 2016. LNCS, vol. 10075, pp. 3–9. Springer, Cham (2016).  https://doi.org/10.1007/978-3-319-49304-6_1CrossRefGoogle Scholar
  52. 52.
    Bryman, A.: Social Research Methods. Oxford University Press, Oxford (2015)Google Scholar
  53. 53.
    Bazeley, P.: Qualitative Analysis with NVivo. Sage, London (2007)Google Scholar
  54. 54.
    Rainie, L., Duggan, M.: Privacy and Information Sharing. Pew Research Center (2015). http://www.pewinternet.org/2016/01/14/2016/Privacy-and-Information-Sharing/
  55. 55.
    Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 21–29. ACM (2004). https://dl.acm.org/citation.cfm?id=988777
  56. 56.
    Bandara, R., Fernando, M., Akter, S.: Is the privacy paradox a matter of psychological distance? An exploratory study of the privacy paradox from a construal level theory perspective. In: Proceedings of the 51st Hawaii International Conference on System Sciences, Hawaii (2018). https://scholars.uow.edu.au/display/publication116721
  57. 57.
    Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18, 163–175 (2014)CrossRefGoogle Scholar
  58. 58.
    Case, D.O., Given, L.M.: Looking for Information: A Survey of Research on Information Seeking, Needs, and Behavior. Academic Press, San Diego (2017)Google Scholar
  59. 59.
    Briedis, M., Webb, J., Fraser, M.: Improving the Communication of Privacy Information for Consumers. Australian Communications Consumer Action Network (2016)Google Scholar
  60. 60.
    Terms of Service Didnt Read: “I have read and agree to the Terms” is the biggest lie on the web. We aim to fix that (2017). https://tosdr.org/blog/tosdr-in-action-i-have-read-and-agree.html
  61. 61.
    Tailor, N., He, Y., Wagner, I.: POSTER: design ideas for privacy-aware user interfaces for mobile devices. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 219–220. ACM, Darmstadt (2016).  https://doi.org/10.1145/2939918.2942420

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.University of Technology SydneySydneyAustralia

Personalised recommendations