Repacking ‘Privacy’ for a Networked World
Fulltext URI
Document type
Additional Information
Date
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
In this paper we examine the notion of privacy as promoted in the digital economy and how it has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous Computing. Against these prevalent views we present an ethnomethodological study of digital privacy practices in 20 homes in the UK and France, concentrating in particular upon people’s use of passwords, their management of digital content, and the controls they exercise over the extent to which the online world at large can penetrate their everyday lives. In explicating digital privacy practices in the home we find an abiding methodological concern amongst members to manage the potential ‘attack surface’ of the digital on everyday life occasioned by interaction in and with the networked world. We also find, as a feature of this methodological preoccupation, that privacy dissolves into a heterogeneous array of relationship management practices. Accordingly we propose that ‘privacy’ has little utility as a focus for design, and suggest instead that a more productive way forward would be to concentrate on supporting people’s evident interest in managing their relationships in and with the networked world.
Description
Keywords
Citation
URI
URI
Collections
Endorsement
Review
Supplemented By
Referenced By
Number of citations to item: 52
- S. M. Taiabul Haque, Md Romael Haque, Swapnil Nandy, Priyank Chandra, Mahdi Nasrullah Al-Ameen, Shion Guha, Syed Ishtiaque Ahmed (2020): Privacy Vulnerabilities in Public Digital Service Centers in Dhaka, Bangladesh, In: Proceedings of the 2020 International Conference on Information and Communication Technologies and Development, doi:10.1145/3392561.3394642
- Oshrat Ayalon, Eran Toch (2021): User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes, In: International Journal of Human-Computer Studies, doi:10.1016/j.ijhcs.2021.102641
- Timo Jakobi, Gunnar Stevens, Nico Castelli, Corinna Ogonowski, Florian Schaub, Nils Vindice, Dave Randall, Peter Tolmie, Volker Wulf (2018): Evolving Needs in IoT Control and Accountability, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4(2), doi:10.1145/3287049
- Andy Crabtree, Glenn McGarry, Lachlan Urquhart (2024): Trust & AI? The Incalculable Calculus of Risk, In: SSRN Electronic Journal, doi:10.2139/ssrn.4744387
- Trenton Schulz, Jo Herstad, Harald Holone (2018): Privacy at Home: An Inquiry into Sensors and Robots for the Stay at Home Elderly, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-92037-5_28
- Jiahong Chen, Lilian Edwards, Lachlan Urquhart, Derek McAuley (2019): Who Is Responsible for Data Processing in Smart Homes? Reconsidering Joint Controllership and the Household Exemption, In: SSRN Electronic Journal, doi:10.2139/ssrn.3483511
- Annika Pinch, Jeremy Birnholtz, Shruta Rawat, Aakanksha Bhatter, Dicky Baruah, Alpana Dange (2022): “Someone Else Is Behind The Screen”: Visibility, Privacy, and Trust on Geosocial Networking Apps in India, In: Social Media + Society 3(8), doi:10.1177/20563051221126076
- Erlend Berger, Torjus H. Sæthre, Monica Divitini (2019): PrivaCity, In: Lecture Notes in Computer Science, doi:10.1007/978-3-030-33759-9_23
- Ding Wang, Santosh D. Kale, Jacki O'Neill (2020): Please Call the Specialism: Using WeChat to Support Patient Care in China, In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3313831.3376274
- Alejandra Gómez Ortega, Jacky Bourgeois, Gerd Kortuem (2023): What is Sensitive About (Sensitive) Data? Characterizing Sensitivity and Intimacy with Google Assistant Users, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3544548.3581164
- Irina Shklovski, Erik Grönvall (2020): CreepyLeaks: Participatory Speculation Through Demos, In: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, doi:10.1145/3419249.3420168
- Bran Knowles, Stacey Conchie (2023): Un-Paradoxing Privacy: Considering Hopeful Trust, In: ACM Transactions on Computer-Human Interaction 6(30), doi:10.1145/3609329
- Ankit Shrestha, Tanusree Sharma, Pratyasha Saha, Syed Ishtiaque Ahmed, Mahdi Nasrullah Al-Ameen (2023): A First Look into Software Security Practices in Bangladesh, In: ACM Journal on Computing and Sustainable Societies 1(1), doi:10.1145/3616383
- John S. Seberger, Irina Shklovski, Emily Swiatek, Sameer Patil (2022): Still Creepy After All These Years:The Normalization of Affective Discomfort in App Use, In: CHI Conference on Human Factors in Computing Systems, doi:10.1145/3491102.3502112
- Lachlan Urquhart, Holger Schnädelbach, Nils Jäger (2019): Adaptive Architecture: regulating human building interaction, In: International Review of Law, Computers & Technology 1(33), doi:10.1080/13600869.2019.1562605
- Syed Ishtiaque Ahmed, Md. Romael Haque, Jay Chen, Nicola Dell (2017): Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh, In: Proceedings of the ACM on Human-Computer Interaction CSCW(1), doi:10.1145/3134652
- Martin J Kraemer, Ivan Flechais, Helena Webb (2019): Exploring Communal Technology Use in the Home, In: Proceedings of the Halfway to the Future Symposium 2019, doi:10.1145/3363384.3363389
- Volker Wulf, Dave Randall, Konstantin Aal, Markus Rohde (2022): The Personal is the Political: Internet Filtering and Counter Appropriation in the Islamic Republic of Iran, In: Computer Supported Cooperative Work (CSCW) 2(31), doi:10.1007/s10606-022-09426-7
- Александр Суходолов (2020): Факторная модель оценки состояния цифровой экономики, doi:10.24108/preprints-3111996
- Holger Schnädelbach, Nils Jäger, Lachlan Urquhart (2019): Adaptive Architecture and Personal Data, In: ACM Transactions on Computer-Human Interaction 2(26), doi:10.1145/3301426
- Ben Collier, James Stewart (2021): Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network, In: Science, Technology, & Human Values 5(47), doi:10.1177/01622439211039019
- Isabel Schwaninger (2020): Robots in Older People's Living Spaces, In: Companion of the 2020 ACM/IEEE International Conference on Human-Robot Interaction, doi:10.1145/3371382.3377449
- Andy Crabtree, Lewis Hyland, James Colley, Martin Flintham, Joel E. Fischer, Hyosun Kwon (2019): Probing IoT-based consumer services: ‘insights’ from the connected shower, In: Personal and Ubiquitous Computing 5(24), doi:10.1007/s00779-019-01303-3
- Nandita Pattnaik, Shujun Li, Jason R. C. Nurse (2023): A Survey of User Perspectives on Security and Privacy in a Home Networking Environment, In: ACM Computing Surveys 9(55), doi:10.1145/3558095
- Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas (2021): Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices, In: Lecture Notes in Computer Science, doi:10.1007/978-3-030-77392-2_18
- Andy Crabtree, Glenn McGarry, Lachlan Urquhart (2024): AI and the iterable epistopics of risk, In: AI & SOCIETY 3(40), doi:10.1007/s00146-024-02021-y
- William Seymour, Martin J. Kraemer, Reuben Binns, Max Van Kleek (2020): Informing the Design of Privacy-Empowering Tools for the Connected Home, In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3313831.3376264
- Martin J. Kraemer, George Chalhoub, Helena Webb, Ivan Flechais (2023): “It becomes more of an abstract idea, this privacy”—Informing the design for communal privacy experiences in smart homes, In: International Journal of Human-Computer Studies, doi:10.1016/j.ijhcs.2023.103138
- Alejandra Gómez Ortega, Jacky Bourgeois, Gerd Kortuem (2024): Sensitive Data Donation: A Feminist Reframing of Data Practices for Intimate Research Contexts, In: Designing Interactive Systems Conference, doi:10.1145/3643834.3661524
- Ida Christine Karlsen, Ricardo Colomo-Palacios, Harald Holone (2021): The Medical Use of Smartwatches, In: Ninth International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM'21), doi:10.1145/3486011.3486470
- Mahdi Nasrullah Al-Ameen, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna (2021): “We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online Accounts, In: Proceedings on Privacy Enhancing Technologies 4(2021), doi:10.2478/popets-2021-0067
- Anne-Marie S. Hansen (2020): The App Is Not Where the Action Is, In: Proceedings of the 7th International Conference on ICT for Sustainability, doi:10.1145/3401335.3401824
- Timo Jakobi, Sameer Patil, Dave Randall, Gunnar Stevens, Volker Wulf (2019): It Is About What They Could Do with the Data, In: ACM Transactions on Computer-Human Interaction 1(26), doi:10.1145/3281444
- Thomas Deacon, Mark D. Plumbley (2024): Working with AI Sound: Exploring the Future of Workplace AI Sound Technologies, In: Proceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work, doi:10.1145/3663384.3663391
- Lewis Hyland, Andy Crabtree, Joel Fischer, James Colley, Carolina Fuentes (2018): “What do you want for dinner?” – need anticipation and the design of proactive technologies for the home, In: Computer Supported Cooperative Work (CSCW) 3-6(27), doi:10.1007/s10606-018-9314-4
- John S. Seberger, Marissel Llavore, Nicholas Nye Wyant, Irina Shklovski, Sameer Patil (2021): Empowering Resignation, In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3411764.3445293
- Iuliia Avgustis, Samira Ibnelkaïd, Netta Iivari (2024): Occupying Another’s Digital Space: Privacy of Smartphone Users as a Situated Practice, In: Computer Supported Cooperative Work (CSCW) 4(33), doi:10.1007/s10606-024-09492-z
- Timo Jakobi, Max von Grafenstein, Thomas Schildhauer (2021): Data Privacy: A Driver for Competitive Advantage, In: The Machine Age of Customer Insight, doi:10.1108/978-1-83909-694-520211014
- John S Seberger, Sameer Patil (2021): Post-COVID Public Health Surveillance and Privacy Expectations in the United States: Scenario-Based Interview Study (Preprint), doi:10.2196/preprints.30871
- Yuntao Wang, Zirui Cheng, Xin Yi, Yan Kong, Xueyang Wang, Xuhai Xu, Yukang Yan, Chun Yu, Shwetak Patel, Yuanchun Shi (2023): Modeling the Trade-off of Privacy Preservation and Activity Recognition on Low-Resolution Images, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3544548.3581425
- Neilly H. Tan, Richmond Y. Wong, Audrey Desjardins, Sean A. Munson, James Pierce (2022): Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras, In: CHI Conference on Human Factors in Computing Systems, doi:10.1145/3491102.3517617
- Guillaume Nadon, Marcus Feilberg, Mathias Johansen, Irina Shklovski (2018): In the User We Trust, In: Proceedings of the 9th International Conference on Social Media and Society, doi:10.1145/3217804.3217906
- Mahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, M. A. Manazir Ahsan, Priyank Chandra, Syed Ishtiaque Ahmed (2020): We Don't Give a Second Thought Before Providing Our Information, In: Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, doi:10.1145/3378393.3402244
- Erlend Bergen, Dag F. Solberg, Torjus H. Sæthre, Monica Divitini (2019): Supporting the Co-design of Games for Privacy Awareness, In: Advances in Intelligent Systems and Computing, doi:10.1007/978-3-030-11932-4_82
- John S Seberger, Sameer Patil (2021): Post-COVID Public Health Surveillance and Privacy Expectations in the United States: Scenario-Based Interview Study, In: JMIR mHealth and uHealth 10(9), doi:10.2196/30871
- Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen (2021): Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account, In: Lecture Notes in Computer Science, doi:10.1007/978-3-030-77392-2_20
- Casey Swezey, Janet Vertesi (2019): Working Apart, Together: The Challenges of Co-Work, In: Proceedings of the ACM on Human-Computer Interaction CSCW(3), doi:10.1145/3359306
- Isabel Schwaninger, Florian Güldenpfennig, Astrid Weiss, Geraldine Fitzpatrick (2021): What Do You Mean by Trust? Establishing Shared Meaning in Interdisciplinary Design for Assistive Technology, In: International Journal of Social Robotics 8(13), doi:10.1007/s12369-020-00742-w
- Damla Kilic, Andy Crabtree, Glenn McGarry, Murray Goulden (2021): The cardboard box study: understanding collaborative data management in the connected home, In: Personal and Ubiquitous Computing 1(26), doi:10.1007/s00779-021-01655-9
- Naomi Yamashita, Hideaki Kuzuoka, Takashi Kudo, Keiji Hirata, Eiji Aramaki, Kazuki Hattori (2018): How Information Sharing about Care Recipients by Family Caregivers Impacts Family Communication, In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3173574.3173796
- Velvet Spors, Hanne Gesine Wagner, Martin Flintham, Pat Brundell, David Murphy (2021): Selling Glossy, Easy Futures: A Feminist Exploration of Commercial Mental-Health-focused Self-Care Apps’ Descriptions in the Google Play Store, In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3411764.3445500
- William Seymour, Reuben Binns, Petr Slovak, Max Van Kleek, Nigel Shadbolt (2020): Strangers in the Room, In: Proceedings of the 2020 ACM Designing Interactive Systems Conference, doi:10.1145/3357236.3395501