Repacking ‘Privacy’ for a Networked World

dc.contributor.authorCrabtree, Andy
dc.contributor.authorTolmie, Peter
dc.contributor.authorKnight, Will
dc.date.accessioned2017-05-30T12:02:09Z
dc.date.available2017-05-30T12:02:09Z
dc.date.issued2017
dc.description.abstractIn this paper we examine the notion of privacy as promoted in the digital economy and how it has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous Computing. Against these prevalent views we present an ethnomethodological study of digital privacy practices in 20 homes in the UK and France, concentrating in particular upon people’s use of passwords, their management of digital content, and the controls they exercise over the extent to which the online world at large can penetrate their everyday lives. In explicating digital privacy practices in the home we find an abiding methodological concern amongst members to manage the potential ‘attack surface’ of the digital on everyday life occasioned by interaction in and with the networked world. We also find, as a feature of this methodological preoccupation, that privacy dissolves into a heterogeneous array of relationship management practices. Accordingly we propose that ‘privacy’ has little utility as a focus for design, and suggest instead that a more productive way forward would be to concentrate on supporting people’s evident interest in managing their relationships in and with the networked world.
dc.identifier.doi10.1007/s10606-017-9276-y
dc.identifier.pissnISSN 0925-9724
dc.language.isoen
dc.publisherSpringer, London
dc.relation.ispartofComputer Supported Cooperative Work 26(4-5)- ECSCW 2017: Proceedings of the 15th European Conference on Computer Supported Cooperative Work
dc.relation.ispartofseriesECSCW
dc.subjectPrivacy
dc.subjectDigital economy
dc.subjectCrisis in trust
dc.subjectDomestic digital privacy practices
dc.subjectEthnomethodology
dc.titleRepacking ‘Privacy’ for a Networked World
dc.typeText/Conference Paper
gi.citations.count52
gi.citations.elementMartin J Kraemer, Ivan Flechais, Helena Webb (2019): Exploring Communal Technology Use in the Home, In: Proceedings of the Halfway to the Future Symposium 2019, doi:10.1145/3363384.3363389
gi.citations.elementMahdi Nasrullah Al-Ameen, Huzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna (2021): “We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online Accounts, In: Proceedings on Privacy Enhancing Technologies 4(2021), doi:10.2478/popets-2021-0067
gi.citations.elementErlend Berger, Torjus H. Sæthre, Monica Divitini (2019): PrivaCity, In: Lecture Notes in Computer Science, doi:10.1007/978-3-030-33759-9_23
gi.citations.elementThomas Deacon, Mark D. Plumbley (2024): Working with AI Sound: Exploring the Future of Workplace AI Sound Technologies, In: Proceedings of the 3rd Annual Meeting of the Symposium on Human-Computer Interaction for Work, doi:10.1145/3663384.3663391
gi.citations.elementAlejandra Gómez Ortega, Jacky Bourgeois, Gerd Kortuem (2024): Sensitive Data Donation: A Feminist Reframing of Data Practices for Intimate Research Contexts, In: Designing Interactive Systems Conference, doi:10.1145/3643834.3661524
gi.citations.elementDamla Kilic, Andy Crabtree, Glenn McGarry, Murray Goulden (2021): The cardboard box study: understanding collaborative data management in the connected home, In: Personal and Ubiquitous Computing 1(26), doi:10.1007/s00779-021-01655-9
gi.citations.elementAnkit Shrestha, Tanusree Sharma, Pratyasha Saha, Syed Ishtiaque Ahmed, Mahdi Nasrullah Al-Ameen (2023): A First Look into Software Security Practices in Bangladesh, In: ACM Journal on Computing and Sustainable Societies 1(1), doi:10.1145/3616383
gi.citations.elementJohn S Seberger, Sameer Patil (2021): Post-COVID Public Health Surveillance and Privacy Expectations in the United States: Scenario-Based Interview Study (Preprint), doi:10.2196/preprints.30871
gi.citations.elementTrenton Schulz, Jo Herstad, Harald Holone (2018): Privacy at Home: An Inquiry into Sensors and Robots for the Stay at Home Elderly, In: Lecture Notes in Computer Science, doi:10.1007/978-3-319-92037-5_28
gi.citations.elementAnnika Pinch, Jeremy Birnholtz, Shruta Rawat, Aakanksha Bhatter, Dicky Baruah, Alpana Dange (2022): “Someone Else Is Behind The Screen”: Visibility, Privacy, and Trust on Geosocial Networking Apps in India, In: Social Media + Society 3(8), doi:10.1177/20563051221126076
gi.citations.elementIsabel Schwaninger, Florian Güldenpfennig, Astrid Weiss, Geraldine Fitzpatrick (2021): What Do You Mean by Trust? Establishing Shared Meaning in Interdisciplinary Design for Assistive Technology, In: International Journal of Social Robotics 8(13), doi:10.1007/s12369-020-00742-w
gi.citations.elementOshrat Ayalon, Eran Toch (2021): User-Centered Privacy-by-Design: Evaluating the Appropriateness of Design Prototypes, In: International Journal of Human-Computer Studies, doi:10.1016/j.ijhcs.2021.102641
gi.citations.elementWilliam Seymour, Martin J. Kraemer, Reuben Binns, Max Van Kleek (2020): Informing the Design of Privacy-Empowering Tools for the Connected Home, In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3313831.3376264
gi.citations.elementAlejandra Gómez Ortega, Jacky Bourgeois, Gerd Kortuem (2023): What is Sensitive About (Sensitive) Data? Characterizing Sensitivity and Intimacy with Google Assistant Users, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3544548.3581164
gi.citations.elementTimo Jakobi, Gunnar Stevens, Nico Castelli, Corinna Ogonowski, Florian Schaub, Nils Vindice, Dave Randall, Peter Tolmie, Volker Wulf (2018): Evolving Needs in IoT Control and Accountability, In: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 4(2), doi:10.1145/3287049
gi.citations.elementS. M. Taiabul Haque, Md Romael Haque, Swapnil Nandy, Priyank Chandra, Mahdi Nasrullah Al-Ameen, Shion Guha, Syed Ishtiaque Ahmed (2020): Privacy Vulnerabilities in Public Digital Service Centers in Dhaka, Bangladesh, In: Proceedings of the 2020 International Conference on Information and Communication Technologies and Development, doi:10.1145/3392561.3394642
gi.citations.elementLewis Hyland, Andy Crabtree, Joel Fischer, James Colley, Carolina Fuentes (2018): “What do you want for dinner?” – need anticipation and the design of proactive technologies for the home, In: Computer Supported Cooperative Work (CSCW) 3-6(27), doi:10.1007/s10606-018-9314-4
gi.citations.elementNeilly H. Tan, Richmond Y. Wong, Audrey Desjardins, Sean A. Munson, James Pierce (2022): Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras, In: CHI Conference on Human Factors in Computing Systems, doi:10.1145/3491102.3517617
gi.citations.elementJohn S. Seberger, Irina Shklovski, Emily Swiatek, Sameer Patil (2022): Still Creepy After All These Years:The Normalization of Affective Discomfort in App Use, In: CHI Conference on Human Factors in Computing Systems, doi:10.1145/3491102.3502112
gi.citations.elementGuillaume Nadon, Marcus Feilberg, Mathias Johansen, Irina Shklovski (2018): In the User We Trust, In: Proceedings of the 9th International Conference on Social Media and Society, doi:10.1145/3217804.3217906
gi.citations.elementIda Christine Karlsen, Ricardo Colomo-Palacios, Harald Holone (2021): The Medical Use of Smartwatches, In: Ninth International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM'21), doi:10.1145/3486011.3486470
gi.citations.elementNandita Pattnaik, Shujun Li, Jason R. C. Nurse (2023): A Survey of User Perspectives on Security and Privacy in a Home Networking Environment, In: ACM Computing Surveys 9(55), doi:10.1145/3558095
gi.citations.elementAndy Crabtree, Glenn McGarry, Lachlan Urquhart (2024): AI and the iterable epistopics of risk, In: AI & SOCIETY 3(40), doi:10.1007/s00146-024-02021-y
gi.citations.elementVelvet Spors, Hanne Gesine Wagner, Martin Flintham, Pat Brundell, David Murphy (2021): Selling Glossy, Easy Futures: A Feminist Exploration of Commercial Mental-Health-focused Self-Care Apps’ Descriptions in the Google Play Store, In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3411764.3445500
gi.citations.elementAnne-Marie S. Hansen (2020): The App Is Not Where the Action Is, In: Proceedings of the 7th International Conference on ICT for Sustainability, doi:10.1145/3401335.3401824
gi.citations.elementTimo Jakobi, Max von Grafenstein, Thomas Schildhauer (2021): Data Privacy: A Driver for Competitive Advantage, In: The Machine Age of Customer Insight, doi:10.1108/978-1-83909-694-520211014
gi.citations.elementAndy Crabtree, Lewis Hyland, James Colley, Martin Flintham, Joel E. Fischer, Hyosun Kwon (2019): Probing IoT-based consumer services: ‘insights’ from the connected shower, In: Personal and Ubiquitous Computing 5(24), doi:10.1007/s00779-019-01303-3
gi.citations.elementLachlan Urquhart, Holger Schnädelbach, Nils Jäger (2019): Adaptive Architecture: regulating human building interaction, In: International Review of Law, Computers & Technology 1(33), doi:10.1080/13600869.2019.1562605
gi.citations.elementBen Collier, James Stewart (2021): Privacy Worlds: Exploring Values and Design in the Development of the Tor Anonymity Network, In: Science, Technology, & Human Values 5(47), doi:10.1177/01622439211039019
gi.citations.elementMartin J. Kraemer, George Chalhoub, Helena Webb, Ivan Flechais (2023): “It becomes more of an abstract idea, this privacy”—Informing the design for communal privacy experiences in smart homes, In: International Journal of Human-Computer Studies, doi:10.1016/j.ijhcs.2023.103138
gi.citations.elementIrina Shklovski, Erik Grönvall (2020): CreepyLeaks: Participatory Speculation Through Demos, In: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, doi:10.1145/3419249.3420168
gi.citations.elementHolger Schnädelbach, Nils Jäger, Lachlan Urquhart (2019): Adaptive Architecture and Personal Data, In: ACM Transactions on Computer-Human Interaction 2(26), doi:10.1145/3301426
gi.citations.elementTimo Jakobi, Sameer Patil, Dave Randall, Gunnar Stevens, Volker Wulf (2019): It Is About What They Could Do with the Data, In: ACM Transactions on Computer-Human Interaction 1(26), doi:10.1145/3281444
gi.citations.elementJohn S Seberger, Sameer Patil (2021): Post-COVID Public Health Surveillance and Privacy Expectations in the United States: Scenario-Based Interview Study, In: JMIR mHealth and uHealth 10(9), doi:10.2196/30871
gi.citations.elementNaomi Yamashita, Hideaki Kuzuoka, Takashi Kudo, Keiji Hirata, Eiji Aramaki, Kazuki Hattori (2018): How Information Sharing about Care Recipients by Family Caregivers Impacts Family Communication, In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3173574.3173796
gi.citations.elementSyed Ishtiaque Ahmed, Md. Romael Haque, Jay Chen, Nicola Dell (2017): Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh, In: Proceedings of the ACM on Human-Computer Interaction CSCW(1), doi:10.1145/3134652
gi.citations.elementIsabel Schwaninger (2020): Robots in Older People's Living Spaces, In: Companion of the 2020 ACM/IEEE International Conference on Human-Robot Interaction, doi:10.1145/3371382.3377449
gi.citations.elementVolker Wulf, Dave Randall, Konstantin Aal, Markus Rohde (2022): The Personal is the Political: Internet Filtering and Counter Appropriation in the Islamic Republic of Iran, In: Computer Supported Cooperative Work (CSCW) 2(31), doi:10.1007/s10606-022-09426-7
gi.citations.elementJohn S. Seberger, Marissel Llavore, Nicholas Nye Wyant, Irina Shklovski, Sameer Patil (2021): Empowering Resignation, In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3411764.3445293
gi.citations.elementBran Knowles, Stacey Conchie (2023): Un-Paradoxing Privacy: Considering Hopeful Trust, In: ACM Transactions on Computer-Human Interaction 6(30), doi:10.1145/3609329
gi.citations.elementWilliam Seymour, Reuben Binns, Petr Slovak, Max Van Kleek, Nigel Shadbolt (2020): Strangers in the Room, In: Proceedings of the 2020 ACM Designing Interactive Systems Conference, doi:10.1145/3357236.3395501
gi.citations.elementJiahong Chen, Lilian Edwards, Lachlan Urquhart, Derek McAuley (2019): Who Is Responsible for Data Processing in Smart Homes? Reconsidering Joint Controllership and the Household Exemption, In: SSRN Electronic Journal, doi:10.2139/ssrn.3483511
gi.citations.elementCasey Swezey, Janet Vertesi (2019): Working Apart, Together: The Challenges of Co-Work, In: Proceedings of the ACM on Human-Computer Interaction CSCW(3), doi:10.1145/3359306
gi.citations.elementMahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, Huzeyfe Kocabas (2021): Understanding User Behavior, Information Exposure, and Privacy Risks in Managing Old Devices, In: Lecture Notes in Computer Science, doi:10.1007/978-3-030-77392-2_18
gi.citations.elementАлександр Суходолов (2020): Факторная модель оценки состояния цифровой экономики, doi:10.24108/preprints-3111996
gi.citations.elementIuliia Avgustis, Samira Ibnelkaïd, Netta Iivari (2024): Occupying Another’s Digital Space: Privacy of Smartphone Users as a Situated Practice, In: Computer Supported Cooperative Work (CSCW) 4(33), doi:10.1007/s10606-024-09492-z
gi.citations.elementDing Wang, Santosh D. Kale, Jacki O'Neill (2020): Please Call the Specialism: Using WeChat to Support Patient Care in China, In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3313831.3376274
gi.citations.elementAndy Crabtree, Glenn McGarry, Lachlan Urquhart (2024): Trust & AI? The Incalculable Calculus of Risk, In: SSRN Electronic Journal, doi:10.2139/ssrn.4744387
gi.citations.elementMahdi Nasrullah Al-Ameen, Tanjina Tamanna, Swapnil Nandy, M. A. Manazir Ahsan, Priyank Chandra, Syed Ishtiaque Ahmed (2020): We Don't Give a Second Thought Before Providing Our Information, In: Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, doi:10.1145/3378393.3402244
gi.citations.elementHuzeyfe Kocabas, Swapnil Nandy, Tanjina Tamanna, Mahdi Nasrullah Al-Ameen (2021): Understanding User’s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account, In: Lecture Notes in Computer Science, doi:10.1007/978-3-030-77392-2_20
gi.citations.elementErlend Bergen, Dag F. Solberg, Torjus H. Sæthre, Monica Divitini (2019): Supporting the Co-design of Games for Privacy Awareness, In: Advances in Intelligent Systems and Computing, doi:10.1007/978-3-030-11932-4_82
gi.citations.elementYuntao Wang, Zirui Cheng, Xin Yi, Yan Kong, Xueyang Wang, Xuhai Xu, Yukang Yan, Chun Yu, Shwetak Patel, Yuanchun Shi (2023): Modeling the Trade-off of Privacy Preservation and Activity Recognition on Low-Resolution Images, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3544548.3581425
gi.conference.date28 August - 1 September 2017
gi.conference.locationSheffield, UK
gi.conference.sessiontitleLong Papers

Files

License bundle

1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
0 B
Format:
Item-specific license agreed upon to submission
Description: