Abstract
Privacy is a major concern for the design and user acceptance of pervasive technology. Investigating privacy poses several methodological challenges. A popular approach involves surveying reactions of people to scenarios that highlight privacy issues. This paper examines the validity of this approach. It reports an experiment that compared people’s ability to correctly judge compliance to privacy principles when scenarios are presented in video versus textual form. It was found that such privacy-related concepts are hard to understand, leading to a large number of erroneous judgments regardless of medium and that interpretation varied across media. Comprehension in such studies can be improved, if a text scenario is preceded by a video-based version.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce. Examining user scenarios and privacy preferences. In: ACM Conf. on Electronic Commerce, ACM Press, New York (1999)
Acquisti, A., Grossklags, J.: Losses, Gains and Hyperbolic Discounting: An Experimental Approach to Information Security Attitudes and Behaviors. In: 2nd Annual Workshop of on Economics and Information Security (2003)
Adams, A., Sasse, M.A.: Privacy in multimedia communications. Protecting users, not just data. In: Blandford, A., Vanderdonckt, J., Gray, P. (eds.) People and Computers XV. Interaction without frontiers. Joint Proceedings of HCI2001 and IHM2001, pp. 49–64. Springer, London (2001)
Ajzen, I., Fishbein, M.: The Influence of Attitudes on Behavior. In: Albarracín, D., Johnson, B.T., Zanna, M.P. (eds.) The Handbook of Attitudes, pp. 173–221. Erlbaum, Mahwah (2005)
Berendt, B., Günther, O., Spiekermann, S.: Privacy in E-commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48, 101–106 (2005)
Boyle, M., Greenberg, S.: The Language of Privacy: Learning from Video Media Space Analysis and Design. ACM Transactions 12, 2 (2005)
Carroll, J.M.: Scenario-Based Design. Wiley, New York (1995)
Chung, E., Hong, J., Lin, J., Prabaker, M., Landay, J.A., Liu, A.: Development and Evaluation of Emerging Design Patterns for Ubiquitous Computing. In: Proceedings DIS 2004, pp. 233–242. ACM Press, New York (2004)
Culnan, M.J., Armstrong, P.K.: Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science 10, 104–115 (1999)
Garde - Perik, E., van de Markopoulos, P., de Ruyter, B.: On the relative importance of privacy guidelines for ambient health care. In: The fourth Nordic Conference on Human-Computer Interaction NordiCHI 2006, pp. 377–380. ACM Press, New York (2006)
Garde-Perik, E., van de Markopoulos, P., de Ruyter, B.: Privacy Policies and Text-Based Empirical Research: Methodological Issues. In: CHI 2006 Workshop on Privacy and HCI. Methodologies for Studying Privacy Issues. (2006)
Garde-Perik, E.M., van de Markopoulos, P., de Ruyter, B.E.R., Eggen, J.H., IJsselsteijn,W. Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review 26,1 (in press; 2008)
Günther, O., Spiekermann, S.: RFID and the Perception of Control. The Consumer’s View. Communications of the ACM 48, 73–76 (2005)
Iachello, G., Abowd, G.D.: Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing. In: Proc. CHI 2005, pp. 91–100. ACM Press, New York (2005)
Jensen, C., Potts, C.: Privacy Policies as Decision-Making Tools. An Evaluation of Online Privacy Notices. CHI Letters 6, 471–478 (2004)
Jiang, X., Hong, J.I., Landay, J., A.L.: Approximate Information flows. Socially-Based Modeling of Privacy in Ubiquitous Computing. In: Miesenberger, K., Klaus, J., Zagler, W. (eds.) ICCHP 2002. LNCS, vol. 2398, pp. 176–193. Springer, Heidelberg (2002)
Kobsa, A., Teltzrow, M.: Contextualized Communication of Privacy Practices and Personalization Benefits. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, Springer, Heidelberg (2005)
Langheinrich, M.: Privacy by Design. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)
Milne, G.R., Culnan, M.J.: Strategies for reducing online privacy risks: Why consumers read (or don’t read) online privacy notices. Journal of Interactive Marketing 18, 15–29 (2004)
OECD: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)
Palen, L., Dourish, P.: Unpacking “Privacy” in a Networked World. In: Proceedings of CHI 2003, pp. 129–146. ACM Press, New York (2003)
Patil, S., Romero, N.A., Karat, J.: Privacy and CHI. Methodologies for studying privacy issues. In: CHI’06 Extended Abstracts on Human Factors in Computing Systems, pp. 1719–1722. ACM Press, New York (2006)
Romero, N.A., Perik, E.M., Patil, S.: Appropriate methodology for empirical studies of privacy. In: Costabile, M.F., Paternó, F. (eds.) INTERACT 2005. LNCS, vol. 3585, pp. 87–89. Springer, Heidelberg (2005)
Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd Generation E-commerce. Privacy Preferences Versus Actual Behavior. In: Proc. ACM conference on Electronic Commerce, pp. 38–47. ACM Press, New York (2001)
Wright, D. (ed.) Safeguards in a World of Ambient Intelligence. Final Report, SWAMI Deliverable D4. A report of the SWAMI consortium to the European Commission under contract 006507 August 2006 (2006), http://swami.jrc.es
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Al Mahmud, A., Kaptein, M., Moran, O., van de Garde-Perik, E., Markopoulos, P. (2007). Understanding Compliance to Privacy Guidelines Using Text-and Video-Based Scenarios. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa, S.D.J. (eds) Human-Computer Interaction – INTERACT 2007. INTERACT 2007. Lecture Notes in Computer Science, vol 4663. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74800-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-74800-7_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74799-4
Online ISBN: 978-3-540-74800-7
eBook Packages: Computer ScienceComputer Science (R0)