skip to main content
10.1145/3025453.3025907acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders

Published:02 May 2017Publication History

ABSTRACT

Drones pose privacy concerns such as surveillance and stalking. Many technology-based or policy-based mechanisms have been proposed to mitigate these concerns. However, it is unclear how drone controllers and bystanders perceive these mechanisms and whether people intend to adopt them. In this paper, we report results from two rounds of online survey with 169 drone controllers and 717 bystanders in the U.S. We identified respondents' perceived pros and cons of eight privacy mechanisms. We found that owner registration and automatic face blurring individually received most support from both controllers and bystanders. Our respondents also suggested using varied combinations of mechanisms under different drone usage scenarios, highlighting their context-dependent preferences. We outline a set of important questions for future privacy designs and public policies of drones.

Skip Supplemental Material Section

Supplemental Material

pn3551p.mp4

mp4

1.5 MB

References

  1. Lisa C. Abrams, Rob Cross, Eric Lesser, and Daniel Z. Levin. 2003. Nurturing interpersonal trust in knowledge-sharing networks. The Academy of Management Executive 17, 4 (Nov. 2003), 64--77.Google ScholarGoogle Scholar
  2. Rebecca Angeles. 2007. An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems 107, 4 (2007), 461--483.Google ScholarGoogle ScholarCross RefCross Ref
  3. Anirudha Majumdar and Russ Tedrake. 2016. Funnel Libraries for Real-Time Robust Feedback Motion Planning. Technical Report. Massachusetts Institute of Technology. http://groups.csail.mit.edu/ robotics-center/public_papers/Majumdar16.pdfGoogle ScholarGoogle Scholar
  4. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (Jan. 2006), 77--101.Google ScholarGoogle ScholarCross RefCross Ref
  5. Rupert Brown and Sam Gaertner (Eds.). 2002. Blackwell Handbook of Social Psychology: Intergroup Processes. Wiley-Blackwell, Malden, MA etc.Google ScholarGoogle Scholar
  6. Daniel J. Butler, Justin Huang, Franziska Roesner, and Maya Cakmak. 2015. The Privacy-Utility Tradeoff for Remotely Teleoperated Robots. In Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction (HRI '15). ACM, NY, NY, USA, 27--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jessica R. Cauchard, Jane L. E, Kevin Y. Zhai, and James A. Landay. 2015. Drone & Me: An Exploration into Natural Human-drone Interaction. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp '15). ACM, NY, NY, USA, 361--365. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Reece A Clothier, Dominique A Greer, Duncan G Greer, and Amisha M Mehta. 2015. Risk perception and the public acceptance of drones. Risk analysis 35, 6 (2015), 1167--1183.Google ScholarGoogle Scholar
  9. Mary J. Culnan and Pamela K. Armstrong. 1999. Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science 10, 1 (Jan. 1999), 104--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2377--2386. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. DJI. 2015. DJI Introduces New Geofencing System for its Drones. (2015). http://www.dji.com/newsroom/news/dji-fly-safe-systemGoogle ScholarGoogle Scholar
  12. Travis Dunlap. 2009. We've got our eyes on you: When surveillance by unmanned aircraft systems constitutes a Fourth Amendment search. S. Tex. L. Rev. 51 (2009), 173.Google ScholarGoogle Scholar
  13. Mary Ann Eastlick, Sherry L. Lotz, and Patricia Warrington. 2006. Understanding online B-to-C relationships: An integrated model of privacy concerns, trust, and commitment. Journal of Business Research 59, 8 (Aug. 2006), 877--886.Google ScholarGoogle ScholarCross RefCross Ref
  14. Electronic Privacy Information Center (EPIC). 2016. EPIC Domestic Unmanned Aerial Vehicles (UAVs) and Drones. (2016). https://epic.org/privacy/drones/Google ScholarGoogle Scholar
  15. Federal Aviation Administration (FAA). 2015a. B4UFLY Smartphone App. (2015). https://www.faa.gov/uas/b4ufly/Google ScholarGoogle Scholar
  16. Federal Aviation Administration (FAA). 2015b. Unmanned Aircraft Systems. (2015). https://www.faa.gov/uas/Google ScholarGoogle Scholar
  17. Federal Aviation Administration (FAA). 2016. Summary of the Small UAS Rule. Technical Report. https://www.faa.gov/uas/media/Part_107_Summary.pdfGoogle ScholarGoogle Scholar
  18. Andrea Frome, German Cheung, Ahmad Abdulkader, Marco Zennaro, Bo Wu, Alessandro Bissacco, Hartwig Adam, Hartmut Neven, and Luc Vincent. 2009. Large-scale privacy protection in Google Street View. In 2009 IEEE 12th International Conference on Computer Vision. 2373--2380.Google ScholarGoogle ScholarCross RefCross Ref
  19. Future of Privacy Forum, Intel, and PrecisionHawk. 2016. Drones and Privacy by Design: Embedding Privacy Enhancing Technology in Unmanned Aircraft. Technical Report. https://fpf.org/wp-content/uploads/2016/08/Drones_and_ Privacy_by_Design_FPF_Intel_PrecisionHawk.pdfGoogle ScholarGoogle Scholar
  20. Steve Hodges, Emma Berry, and Ken Wood. 2011. SenseCam: a wearable camera that stimulates and rehabilitates autobiographical memory. Memory (Hove, England) 19, 7 (Oct. 2011), 685--696.Google ScholarGoogle Scholar
  21. Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 571--582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yoohwan Kim, Juyeon Jo, and Sanjeeb Shrestha. 2014. A server-based real-time privacy protection scheme against video surveillance by Unmanned Aerial Systems. In Unmanned Aircraft Systems (ICUAS), 2014 International Conference on. IEEE, 684--691.Google ScholarGoogle ScholarCross RefCross Ref
  23. Bastian Könings, Sebastian Thoma, Florian Schaub, and Michael Weber. 2014. Pripref broadcaster: Enabling users to broadcast privacy preferences in their physical proximity. In Proceedings of the 13th International Conference on Mobile and Ubiquitous Multimedia. ACM, 133--142. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Marc Langheinrich. 2002. A privacy awareness system for ubiquitous computing environments. In international conference on Ubiquitous Computing. Springer, 237--245. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. LightCense. 2016. LightCense. (2016). http://www.lightcense.co/Google ScholarGoogle Scholar
  26. National Telecommunications and Information Administration. 2016. Voluntary Best Practices for UAS Privacy, Transparency, and Accountability. Technical Report. https://www.ntia.doc.gov/files/ntia/ publications/voluntary_best_practices_for_uas_privacy_ transparency_and_accountability_0.pdfGoogle ScholarGoogle Scholar
  27. David H. Nguyen and Gillian R. Hayes. 2010. Information Privacy in Institutional and End-user Tracking and Recording Technologies. Personal Ubiquitous Comput. 14, 1 (Jan. 2010), 53--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. NoFlyZone. 2016. NoFlyZone. (2016). https://www.noflyzone.org/Google ScholarGoogle Scholar
  29. Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J Wang. 2014. World-driven access control for continuous sensing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1169--1181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. H Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: an interdisciplinary review. MIS quarterly 35, 4 (2011), 989--1016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2Nd Generation E-commerce: Privacy Preferences Versus Actual Behavior. In Proceedings of the 3rd ACM Conference on Electronic Commerce (EC '01). ACM, NY, NY, USA, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sijun Wang, Sharon E. Beatty, and William Foxx. 2004. Signaling the trustworthiness of small online retailers. Journal of Interactive Marketing 18, 1 (2004), 53--69.Google ScholarGoogle ScholarCross RefCross Ref
  33. David Wright, Rachel Finn, Raphael Gellert, Serge Gutwirth, Philip Schütz, Michael Friedewald, Silvia Venier, and Emilio Mordini. 2014. Ethical dilemma scenarios and emerging technologies. Technological Forecasting and Social Change 87 (2014), 325--336.Google ScholarGoogle ScholarCross RefCross Ref
  34. Yang Wang, Huichuan Xia, Yaxing Yao, and Yun Huang. 2016. Flying Eyes and Hidden Controllers: A Qualitative Study of People's Privacy Perceptions of Civilian Drones in the US. Proceedings on Privacy Enhancing Technologies (PoPETS) 3 (2016), 172--190.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy Mechanisms for Drones: Perceptions of Drone Controllers and Bystanders

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
      May 2017
      7138 pages
      ISBN:9781450346559
      DOI:10.1145/3025453

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 May 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '17 Paper Acceptance Rate600of2,400submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader