Abstract
Jeremy Bentham is known for designing an institutional building, a prison named a panopticon and some alternatives to this concept. One of the alternatives are the inverted or constitutional panopticon in which the purpose is to let the governed, the citizens’ see and monitor the governors. Hence, the concept of inverted panopticon can be used to describe an analyze privacy protecting devices. In this paper we report on a national study on citizens’ opinion and attitudes to devices that can protect the user from being seen and listened to, with 1289 participants. At this stage of the work, we have not done statistical analysis of factors that might reveal differences between citizens, but as an exploratory study, we provide an overview of how the two privacy protecting devices were received by Norwegian citizens, based on survey responses. Our aim is to build a foundation for future studies that will investigate the inverted panopticon concept in a society in which personal data has become a currency.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Augusto, J., Nakashima, H., Aghajan, H.: Ambient intelligence and smart environments: a state of the art. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 3–31. Springer, Boston (2010). https://doi.org/10.1007/978-0-387-93808-0_1
Ben-Akiva, M., et al.: Combining revealed and stated preferences data. Market. Lett. 5(4), 335–349 (1994). https://doi.org/10.1007/BF00999209
Cyphers, B., Gebhart, G.: Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance. A Publication of the Electronic Frontier Foundation, 2019 Released Under a Creative Commons Attribution 4.0 International License (CC BY 4.0) (2019)
Elvy, S.A.: Paying for privacy and the personal data economy. Columbia Law Rev. 117(6), 1369–1459 (2017)
Elvy, S.A.: Commodifying consumer data in the era of the Internet of Things. B.C. L. Rev. 59, 423, 446 (2018)
Barth, S., de Jong, M.: The privacy paradox – investigating discrepancies between expressed privacy concerns and actual online behavior – a systematic literature review. Telematics Inform. 34(7), 1038–1058 (2017)
Bentham, J.: Constitutional code, vol. 1. Rosen, F. (ed.) Clarendon Press, Oxford, 1983 (1830)
Brunon-Ernst, A.: Beyond Foucault: New Perspectives on Bentham’s Panopticon. Ashgate, London (2013)
Chen, Y., et al.: Understanding the Effectiveness of Ultrasonic Microphone Jammer, vol. 1, no. 1, April 2019 (2019). 17 pages
DeMoranville, C.W., Bienstock, C.C.: Question order effects in measuring service quality. Int. J. Res. Mark. 20(3), 217–231 (2003)
Galič, M., Timan, T., Koops, B.-J.: Bentham, Deleuze and beyond: an overview of surveillance theories from the panopticon to participation. Philos. Technol. 30(1), 9–37 (2017). https://doi.org/10.1007/s13347-016-0219-1
Gao, C., Fawaz, K., Sur, S., Banerjee, S.: Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries (2019). https://doi.org/10.2478/popets-2019-0024
Grice, H.P.: Logic and conversation. In: Cole, P., Morgan, J.L. (eds.) Syntax and Semantics 3: Speech Acts, pp. 41–58. Academic Press, New York (1975)
Li, Z., Rathore, A.S., Chen, B., Song, C., Yang, Z., Xu, W.: SpecEye: towards pervasive and privacy-preserving screen exposure detection in daily life. In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys 2019), 17–21 June 2019 (2019)
Malkin, N., Deatrick, J., Tong, A., Wijesekera, P., Egelman, S., Wagner, D.: Privacy Attitudes of Smart Speaker Users (2019). https://doi.org/10.2478/popets-2019-0068
Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. Surveill. Soc. 1(3), 331–355 (2003)
Mann, S.: ‘Sousveillance’: inverse surveillance in multimedia imaging. In: 12th Annual ACM International Conference on Multimedia. ACM, New York (2004)
New York Times (2020). https://www.nytimes.com/2020/02/14/technology/alexa-jamming-bracelet-privacy-armor.html. Accessed 24 Feb 2020
Preibusch, S.: The value of privacy in web search. In: Proceedings of the Twelfth Workshop on the Economics of Information Security (WEIS) (2013)
Strack, F.: “Order effects” in survey research: activation and information functions of preceding questions. In: Schwarz, N., Sudman, S. (eds.) Context Effects in Social and Psychological Research, pp. 23–34. Springer, New York (1992). https://doi.org/10.1007/978-1-4612-2848-6_3
Streitz, N., Charitos, D., Kaptein, M., Böhlen, M.: Grand challenges for ambient intelligence and implications for design contexts and smart societies. J. Ambient Intell. Smart Environ. 11(1), 87–107 (2019). Tenth Anniversary Issue
Tjostheim, I., Waterworth, J.A.: Predicting personal susceptibility to phishing. In: Rocha, Á., Ferrás, C., Montenegro Marin, C.E., Medina García, V.H. (eds.) ICITS 2020. AISC, vol. 1137, pp. 564–575. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-40690-5_54
LNCS Homepage. http://www.springer.com/lncs. Accessed 21 Nov 2016
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Tjostheim, I., Waterworth, J.A. (2020). Inverting the Panopticon to Safeguard Privacy in Ambient Environments: An Exploratory Study. In: Streitz, N., Konomi, S. (eds) Distributed, Ambient and Pervasive Interactions. HCII 2020. Lecture Notes in Computer Science(), vol 12203. Springer, Cham. https://doi.org/10.1007/978-3-030-50344-4_25
Download citation
DOI: https://doi.org/10.1007/978-3-030-50344-4_25
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50343-7
Online ISBN: 978-3-030-50344-4
eBook Packages: Computer ScienceComputer Science (R0)