Skip to main content

Inverting the Panopticon to Safeguard Privacy in Ambient Environments: An Exploratory Study

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12203))

Abstract

Jeremy Bentham is known for designing an institutional building, a prison named a panopticon and some alternatives to this concept. One of the alternatives are the inverted or constitutional panopticon in which the purpose is to let the governed, the citizens’ see and monitor the governors. Hence, the concept of inverted panopticon can be used to describe an analyze privacy protecting devices. In this paper we report on a national study on citizens’ opinion and attitudes to devices that can protect the user from being seen and listened to, with 1289 participants. At this stage of the work, we have not done statistical analysis of factors that might reveal differences between citizens, but as an exploratory study, we provide an overview of how the two privacy protecting devices were received by Norwegian citizens, based on survey responses. Our aim is to build a foundation for future studies that will investigate the inverted panopticon concept in a society in which personal data has become a currency.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Augusto, J., Nakashima, H., Aghajan, H.: Ambient intelligence and smart environments: a state of the art. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 3–31. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-93808-0_1

    Chapter  Google Scholar 

  • Ben-Akiva, M., et al.: Combining revealed and stated preferences data. Market. Lett. 5(4), 335–349 (1994). https://doi.org/10.1007/BF00999209

    Article  Google Scholar 

  • Cyphers, B., Gebhart, G.: Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance. A Publication of the Electronic Frontier Foundation, 2019 Released Under a Creative Commons Attribution 4.0 International License (CC BY 4.0) (2019)

    Google Scholar 

  • Elvy, S.A.: Paying for privacy and the personal data economy. Columbia Law Rev. 117(6), 1369–1459 (2017)

    Google Scholar 

  • Elvy, S.A.: Commodifying consumer data in the era of the Internet of Things. B.C. L. Rev. 59, 423, 446 (2018)

    Google Scholar 

  • Barth, S., de Jong, M.: The privacy paradox – investigating discrepancies between expressed privacy concerns and actual online behavior – a systematic literature review. Telematics Inform. 34(7), 1038–1058 (2017)

    Article  Google Scholar 

  • Bentham, J.: Constitutional code, vol. 1. Rosen, F. (ed.) Clarendon Press, Oxford, 1983 (1830)

    Google Scholar 

  • Brunon-Ernst, A.: Beyond Foucault: New Perspectives on Bentham’s Panopticon. Ashgate, London (2013)

    Google Scholar 

  • Chen, Y., et al.: Understanding the Effectiveness of Ultrasonic Microphone Jammer, vol. 1, no. 1, April 2019 (2019). 17 pages

    Google Scholar 

  • DeMoranville, C.W., Bienstock, C.C.: Question order effects in measuring service quality. Int. J. Res. Mark. 20(3), 217–231 (2003)

    Article  Google Scholar 

  • Galič, M., Timan, T., Koops, B.-J.: Bentham, Deleuze and beyond: an overview of surveillance theories from the panopticon to participation. Philos. Technol. 30(1), 9–37 (2017). https://doi.org/10.1007/s13347-016-0219-1

    Article  Google Scholar 

  • Gao, C., Fawaz, K., Sur, S., Banerjee, S.: Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries (2019). https://doi.org/10.2478/popets-2019-0024

  • Grice, H.P.: Logic and conversation. In: Cole, P., Morgan, J.L. (eds.) Syntax and Semantics 3: Speech Acts, pp. 41–58. Academic Press, New York (1975)

    Google Scholar 

  • Li, Z., Rathore, A.S., Chen, B., Song, C., Yang, Z., Xu, W.: SpecEye: towards pervasive and privacy-preserving screen exposure detection in daily life. In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys 2019), 17–21 June 2019 (2019)

    Google Scholar 

  • Malkin, N., Deatrick, J., Tong, A., Wijesekera, P., Egelman, S., Wagner, D.: Privacy Attitudes of Smart Speaker Users (2019). https://doi.org/10.2478/popets-2019-0068

  • Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. Surveill. Soc. 1(3), 331–355 (2003)

    Article  Google Scholar 

  • Mann, S.: ‘Sousveillance’: inverse surveillance in multimedia imaging. In: 12th Annual ACM International Conference on Multimedia. ACM, New York (2004)

    Google Scholar 

  • New York Times (2020). https://www.nytimes.com/2020/02/14/technology/alexa-jamming-bracelet-privacy-armor.html. Accessed 24 Feb 2020

  • Preibusch, S.: The value of privacy in web search. In: Proceedings of the Twelfth Workshop on the Economics of Information Security (WEIS) (2013)

    Google Scholar 

  • Strack, F.: “Order effects” in survey research: activation and information functions of preceding questions. In: Schwarz, N., Sudman, S. (eds.) Context Effects in Social and Psychological Research, pp. 23–34. Springer, New York (1992). https://doi.org/10.1007/978-1-4612-2848-6_3

    Chapter  Google Scholar 

  • Streitz, N., Charitos, D., Kaptein, M., Böhlen, M.: Grand challenges for ambient intelligence and implications for design contexts and smart societies. J. Ambient Intell. Smart Environ. 11(1), 87–107 (2019). Tenth Anniversary Issue

    Article  Google Scholar 

  • Tjostheim, I., Waterworth, J.A.: Predicting personal susceptibility to phishing. In: Rocha, Á., Ferrás, C., Montenegro Marin, C.E., Medina García, V.H. (eds.) ICITS 2020. AISC, vol. 1137, pp. 564–575. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40690-5_54

    Chapter  Google Scholar 

  • LNCS Homepage. http://www.springer.com/lncs. Accessed 21 Nov 2016

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John A. Waterworth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tjostheim, I., Waterworth, J.A. (2020). Inverting the Panopticon to Safeguard Privacy in Ambient Environments: An Exploratory Study. In: Streitz, N., Konomi, S. (eds) Distributed, Ambient and Pervasive Interactions. HCII 2020. Lecture Notes in Computer Science(), vol 12203. Springer, Cham. https://doi.org/10.1007/978-3-030-50344-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-50344-4_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-50343-7

  • Online ISBN: 978-3-030-50344-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics