Skip to main content
Log in

Human aspects of ubiquitous computing: a study addressing willingness to use it and privacy issues

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Identifying the human aspects related to ubiquitous systems focused on people’s willingness to use them and privacy concerns was our goal. We selected two ubiquitous systems: a wearable system (Google Glass) and an embedded in context system (Smart Environments). An online survey, with more than 400 participants, which included questions about how people perceive privacy issues related to the use of these two different ubiquitous systems, was conducted. Results show that privacy is not the only factor defining predisposition or aversion towards using ubiquitous systems. Financial, risk, and convenience factors are the others. We discovered that the importance of these factors on the decision to use them or not depends on the system. Regarding privacy, Google Glass generates a higher degree of concern than the Smart Environments alternative. Female participants tend to be more worried than male participants, independently of the ubiquitous system considered. Finally, the youngest participants (16–25 years old) are the most concerned about privacy threats, which was unexpected.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  • Abascal J, Barbosa S, Fetter M et al (2015) Towards deeper understanding of user experience with ubiquitous computing systems: systematic literature review and design framework. In: Human–computer interaction. Springer International Publishing, Switzerland, pp 384–401

    Google Scholar 

  • Avizienis A, Laprie J, Randell B (2001) Fundamental concepts of dependability. Technical Report, University of Newcastle upon Tyne, Computing Science

  • Baraldi L, Paci F, Serra G et al (2015) Gesture recognition using wearable vision sensors to enhance visitors’ museum experiences. IEEE Sens J 15:2705–2714. doi:10.1109/JSEN.2015.2411994

    Google Scholar 

  • Clarke R (2006) What’s privacy? In: Australian law reform commission workshop.

  • De Silva LC, Morikawa C, Petra IM (2012) State of the art of smart homes. Eng Appl Artif Intell 25:1313–1321. doi:10.1016/j.engappai.2012.05.002

    Article  Google Scholar 

  • Dowd M (2011) Contextualised concerns: the online privacy attitudes of young adults. In: Privacy and identity management for life. Springer Berlin Heidelberg, Helsingborg, pp 78–89

    Chapter  Google Scholar 

  • eVida (2016) Youtube—How a smart office functions. https://www.youtube.com/watch?v=5V3gjfVB4aw.

  • Fantana NL, Riedel T, Schlick J et al (2014) IoT applications—value creation for industry. In: Vermesan O, Friess P (eds) Internet of things applications—from research and innovation to market deployment. River Publishers, San Francisco

    Google Scholar 

  • Finn RL, Wright D, Friedewald M (2013) Seven types of privacy. In: European data protection: coming of age. Springer Netherlands, Dordrecht, pp 3–32

    Chapter  Google Scholar 

  • Google (2012) Youtube—project glass: one day. https://www.youtube.com/watch?v=9c6W4CCU9M4.

  • Google (2016) Glass. https://developers.google.com/glass/.

  • Hallinan D, Schütz P, Friedewald M, de Hert P (2014) Neurodata and neuroprivacy: data protection outdated? Surveill Soc 12:55–72

    Google Scholar 

  • Haynes J-D, Rees G (2006) Decoding mental states from brain activity in humans. Nat Rev Neurosci 7:523–534

    Article  Google Scholar 

  • Hilty LM (2015) Ethical issues in ubiquitous computing—three technology assessment studies revisited. In: Ubiquitous computing in the workplace: what ethical issues? An interdisciplinary perspective. Springer International Publishing, Switzerland, pp 45–60

    Google Scholar 

  • Hoy MG, Milne G (2010) Gender differences in privacy-related measures for young adult facebook users. J Interact Advertising 10(2):28-45

    Article  Google Scholar 

  • Jain A, Hong L, Pankanti S (2000) Biometric Identification. Commun ACM 43:90–98. doi:10.1145/328236.328110

    Article  Google Scholar 

  • Karyda M, Gritzalis S, Park J (2007) A critical approach to privacy research in ubiquitous environments—issues and underlying assumptions. In: Emerging directions in embedded and ubiquitous computing. Springer Berlin Heidelberg, Taipei, pp 12–21

    Chapter  Google Scholar 

  • Le Gal C, Martin J, Lux A, Crowley JL (2001) SmartOffice: design of an intelligent environment. IEEE Intell Syst 16:60–66. doi:10.1109/5254.941359

    Article  Google Scholar 

  • Leif Bloch R, Beardon C, Munari S (eds) (2001) Computers and networks in the age of globalization. Springer US, Geneva

    Google Scholar 

  • Lorenzen-Huber L, Boutain M, Camp LJ et al (2010) Privacy, technology, and aging: a proposed framework. Ageing Int 36:232–252. doi:10.1007/s12126-010-9083-y

    Article  Google Scholar 

  • Lv Z, Feng S, Feng L, Li H (2015) Extending touch-less interaction on vision based wearable device. In: IEEE Virtual Reality (VR). pp 231–232

  • Mayol-Cuevas WW, Tordoff BJ, Murray DW (2009) On the choice and placement of wearable vision sensors. IEEE Trans Syst Man Cybern Part A Syst Hum 39:414–425. doi:10.1109/TSMCA.2008.2010848

    Article  Google Scholar 

  • Nissenbaum H (2009) Privacy in context: technology, policy, and the integrity of social life. Stanford University Press, California

    Google Scholar 

  • Poslad S (2009) Ubiquitous computing: smart devices, environments and interactions, 1st edn. Wiley, Hoboken

    Book  Google Scholar 

  • Solove DJ (2006) A taxonomy of privacy. University of Pennsylvania Law Review, vol 154, no. 3, pp 477–560

  • Vermesan O, Friess P, Guillemin P, et al (2014) Internet of things strategic research and innovation agenda. In: Vermesan O, Friess P (eds) Internet of things applications—from research and innovation to market deployment. River Publishers, Aalborg

    Google Scholar 

  • Wang Y, Norice G, Cranor L (2011) Who is concerned about what? A study of American, Chinese and Indian users’ privacy concerns on social network sites. In: Trust and trustworthy computing. Springer Berlin Heidelberg, Pittsburgh, pp 146–153

    Chapter  Google Scholar 

  • Warren S, Brandeis L (1890) The right to privacy. Harward Law Rev 4:193–220.

    Article  Google Scholar 

  • Weiser M (1991) The computer for the 21st century. Mob Comput Commun Rev 3:66–75. doi:10.1145/329124.329126

    Google Scholar 

  • Westin A (1970) Privacy and freedom. Bodley Head, London

    Google Scholar 

  • Wexler Y, Shashua A, Tadmor O, Ehrlich I (2013) User wearable visual assistance device.

  • Zukowski T, Brown I (2007) Examining the influence of demographic factors on internet users’ information privacy concerns. In: Annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries. ACM, Port Elizabeth, pp 197–204

    Google Scholar 

Download references

Acknowledgements

Authors would like to thank all questionnaire participants, and those who provided insight during our research. This work was partially supported by Research Center for Communication and Information Technologies (CITIC) at University of Costa Rica.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gustavo López.

Appendix

Appendix

1.1 Questionnaire

1.2 General information (section)

Sex (woman/man)

Age (numeric input)

Last achieved degree (radio only choice)

Marital status (radio only choice)

Employment status (radio only choice)

1.3 Google Glass introduction (section)

Do you know what they are and how Google Glass work? (Yes/No question)

Would you be willing to use Google Glass? (Yes/No and comment question)

1.4 Google Glass privacy (section)

Five points (Likert) matrix, horizontal options (Not at all, Slightly, Moderately, Very much, Extremely)

How concerned are you about the possibility of the system copying your body information that could be used to hurt you or steal your identity (fingerprint, iris or vital signs)?

How concerned are you about the presence of the system (used by you or someone else)? Could it affect your behavior?

How concerned are you about the possibility of the system facilitating the interception of your communications without your authorization?

How concerned are you about the possibility of the system facilitating pictures or videos of you to be taken without your permission?

How concerned are you about the possibility of the system capturing and/or publishing somehow your thoughts?

How concerned are you about the possibility of your location being known when using the system?

How concerned are you about the possibility of the system publishing the people you are with?

How concerned are you about a hacker taking control over the system’s information or functionality without you noticing it?

1.5 Smart Office introduction (section) and Smart Office privacy (section)

Same as Google Glass.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

López, G., Marín, G. & Calderón, M. Human aspects of ubiquitous computing: a study addressing willingness to use it and privacy issues. J Ambient Intell Human Comput 8, 497–511 (2017). https://doi.org/10.1007/s12652-016-0438-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-016-0438-4

Keywords

Navigation