skip to main content
10.1145/2702123.2702183acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
note

Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras

Published:18 April 2015Publication History

ABSTRACT

While media reports about wearable cameras have focused on the privacy concerns of bystanders, the perspectives of the `lifeloggers' themselves have not been adequately studied. We report on additional analysis of our previous in-situ lifelogging study in which 36 participants wore a camera for a week and then reviewed the images to specify privacy and sharing preferences. In this Note, we analyze the photos themselves, seeking to understand what makes a photo private, what participants said about their images, and what we can learn about privacy in this new and very different context where photos are captured automatically by one's wearable camera. We find that these devices record many moments that may not be captured by traditional (deliberate) photography, with camera owners concerned about impression management and protecting private information of both themselves and bystanders.

References

  1. Allen, A. Dredging up the past: Lifelogging, memory, and surveillance. University of Chicago Law Review (2008).Google ScholarGoogle Scholar
  2. Goffman, E. The presentation of self in everyday life. Doubleday, Garden City, NY, 1959.Google ScholarGoogle Scholar
  3. Hoyle, R., Templeman, R., Armes, S., Anthony, D., Crandall, D., and Kapadia, A. Privacy behaviors of lifeloggers using wearable cameras. In ACM Int'l Joint Conference on Pervasive and Ubiquitous Computing (2014), 571--582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jana, S., Narayanan, A., and Shmatikov, V. A Scanner Darkly: Protecting User Privacy from Perceptual Applications. IEEE Symposium on Security and Privacy (2013), 349--363. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Korayem, M., Templeman, R., Chen, D., Crandall, D., and Kapadia, A. Screenavoider: Protecting computer screens from ubiquitous cameras. In CoRR arXiv Technical Report arXiv:1412.0008 (2014).Google ScholarGoogle Scholar
  6. O'Hara, K., Tuffield, M. M., and Shadbolt, N. Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society 1, 1 (Dec. 2008), 155--172.Google ScholarGoogle ScholarCross RefCross Ref
  7. Rawassizadeh, R. Towards sharing life-log information with society. Behaviour & Information Technology 31, 11 (Nov. 2012), 1057--1067. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Templeman, R., Korayem, M., Crandall, D., and Kapadia, A. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces. In 21st Annual Network and Distributed System Security Symposium (NDSS) (2014).Google ScholarGoogle ScholarCross RefCross Ref
  9. Thomaz, E., Parnami, A., Bidwell, J., Essa, I., and Abowd, G. Technological approaches for addressing privacy concerns when recognizing eating behaviors with wearable cameras. In ACM Int'l Joint Conference on Pervasive and Ubiquitous Computing (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
        April 2015
        4290 pages
        ISBN:9781450331456
        DOI:10.1145/2702123

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 April 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • note

        Acceptance Rates

        CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader