ABSTRACT
Most of today's laptops come with an integrated webcam placed above the screen to enable video conferencing. Due to the risk of webcam spying attacks, some laptop users seem to be concerned about their privacy and seek protection by covering the webcam. This paper is the first to investigate personal characteristics and beliefs of users with and without webcam covers by applying the Theory of Planned Behavior. We record the privacy behavior of 180 users, develop a path model, and analyze it by applying Partial Least Squares. The analysis indicates that privacy concerns do not significantly influence users' decision to use a webcam cover. Rather, this behavior is influenced by users' attitudes, social environment, and perceived control over protecting privacy. Developers should take this as a lesson to design privacy enhancing technologies which are convenient, verifiably effective and endorsed by peers.
Supplemental Material
- Alessandro Acquisti. 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Conference on Electronic Commerce (EC '04). ACM, New York, NY, USA, 21--29. Google ScholarDigital Library
- Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International Workshop on Privacy Enhancing Technologies (PETS '06). Springer, Berlin, Germany, 36--58. Google ScholarDigital Library
- Icek Ajzen. 1985. Action control: From cognitions to behaviors. Springer, Berlin, Germany, Chapter From intentions to actions: A Theory of Planned Behavior, 11--39.Google Scholar
- Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes 50, 2 (1991), 179--211.Google ScholarCross Ref
- Icek Ajzen. 2002. Constructing a TPB questionnaire: Conceptual and methodological considerations. (2002). http://www unix.oit.umass.edu/~aizen/pdf/tpb.measurement.pdf.Google Scholar
- Susan B. Barnes. 2006. A privacy paradox: Social networking in the United States. First Monday 11, 9 (2006).Google Scholar
- Steven Bellman, Eric J. Johnson, Stephen J. Kobrin, and Gerald L. Lohse. 2004. International differences in information privacy concerns: A global survey of consumers. The Information Society 20, 5 (2004), 313--324.Google ScholarCross Ref
- Brett Bilbrey. 2010. Embedded camera with privacy filter. U.S. Patent 7,728,906. (1 June 2010). Filed January 4, 2006.Google Scholar
- Rainer Böhme and Stefanie Pötzsch. 2011. Collective exposure: Peer effects in voluntary disclosure of personal data. In Financial Cryptography (FC '11). Springer, Berlin, Germany, 1--15. Google ScholarDigital Library
- Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences privacy and the control paradox. Social Psychological and Personality Science 4, 3 (2013), 340--347.Google ScholarCross Ref
- Matthew Brocker and Stephen Checkoway. 2014. ISeeYou: Disabling the MacBook webcam indicator LED. In Proceedings of the USENIX Security Symposium (USENIX Security '14). USENIX Association, Berkeley, CA, USA, 337--352. https://www.usenix.org/conference/usenixsecurity14/tec hnical-sessions/presentation/brocker Google ScholarDigital Library
- Barry Brown. 2001. Studying the Internet experience. (2001). http://www.hpl.hp.com/techreports/2001/HPL 2001--49.pdf.Google Scholar
- Wynne W. Chin. 1998. Modern methods for business research (8th ed.). Lawrence Erlbaum Associates, Mahwah, NJ, USA, Chapter The partial least squares approach to structural equation modeling, 295--336.Google Scholar
- Wynne W. Chin. 2010. Handbook of partial least squares: Concepts, methods and applications. Springer, Berlin, Germany, Chapter How to write up and report PLS analyses, 655--690.Google Scholar
- James DeLong. 2011. Computer webcam privacy cover. U.S. Patent D643,457. (16 August 2011). Filed June 21, 2010.Google Scholar
- Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, and William H Maisel. 2010. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 917--926. Google ScholarDigital Library
- Lothar Determann and Robert Sprague. 2011. Intrusive monitoring: Employee privacy expectations are reasonable in Europe, destroyed in the United States. Berkeley Technology Law Journal 26, 2 (2011), 979--1036.Google Scholar
- Alex Dobuzinskis. 2013. California man agrees to plead guilty to extortion of Miss Teen USA. (2013). https://www.reuters.com/article/us-usa-missteen extortion/california-man-agrees-to-plead-guilty-to extortion-of-miss-teen-usa-idUSBRE99U1G520131031.Google Scholar
- Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, and Kirill Levchenko. 2017. To catch a ratter: Monitoring the behavior of amateur DarkComet RAT operators in the wild. In IEEE Symposium on Security and Privacy (SP '17). IEEE, 770--787.Google ScholarCross Ref
- FBI. 2014. International Blackshades malware takedown. (2014). https://www.fbi.gov/news/stories/international blackshades-malware-takedown-1.Google Scholar
- Martin Fishbein and Icek Ajzen. 1975. Belief, attitude, intention and behavior: An introduction to theory and research. Addison-Wesley, Reading, MA, USA.Google Scholar
- Jason Fitzpatrick. 2016. How to disable your webcam (and why you should). (2016). https://www.howtogeek.com/210921/how-to-disable-your webcam,-and-why-you-should/.Google Scholar
- Jens Fortmann. 2013. Closure device for an image capture facility. U.S. Patent 8,471,956. (25 June 2013). Filed October 29, 2010.Google Scholar
- Seymour Geisser. 1974. A predictive approach to the random effect model. Social Science Computer Review 61, 1 (1974), 101--107.Google Scholar
- Joey F. George. 2004. The Theory of Planned Behavior and Internet purchasing. Internet Research 14, 3 (2004), 198--212.Google ScholarCross Ref
- Oliver Götz, Kerstin Liehr-Gobbers, and Manfred Krafft. 2010. Handbook of partial least squares: Concepts, methods and applications. Springer, Berlin, Germany, Chapter Evaluation of structural equation models using the partial least squares (PLS) approach, 691--711.Google Scholar
- Ron G. Gustaveson. 2012. Webcam cover. U.S. Patent D669,112. (16 October 2012). Filed February 22, 2011.Google Scholar
- Joseph F. Hair Jr., G. Tomas M. Hult, Christian Ringle, and Marko Sarstedt. 2016. A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications, Thousand Oaks, CA, USA.Google Scholar
- Joseph F. Hair Jr., Christian M. Ringle, and Marko Sarstedt. 2011. PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice 19, 2 (2011), 139--152.Google ScholarCross Ref
- Horizont. 2014. Usage of consumer electronics in Germany, by age and device type. (2014). https://www.statista.com/statistics/448268/consumer electronics-usage-by-device-type-and-age-germany/.Google Scholar
- Chih-Min Huang, Yi-Ting Chen, and Li-Yen Wang. 2012. Laptop computer with hardware security protection. U.S. Patent 8,242,924. (14 August 2012). Filed September 16, 2009.Google Scholar
- Thomas Hughes-Roberts and Elahe Kani-Zabihi. 2014. On-line privacy behavior: Using user interfaces for salient factors. Journal of Computer and Communications 2, 4 (2014), 220--231.Google ScholarCross Ref
- Ming-Chi Lee. 2009. Factors influencing the adoption of Internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications 8, 3 (2009), 130--141. Google ScholarDigital Library
- Younghwa Lee and Kenneth A. Kozar. 2005. Investigating factors affecting the adoption of anti-spyware systems. Commun. ACM 48, 8 (2005), 72--77. Google ScholarDigital Library
- Sonia Livingstone. 2008. Taking risky opportunities in youthful content creation: Teenagers' use of social networking sites for intimacy, privacy and self-expression. New Media & Society 10, 3 (2008), 393--411.Google ScholarCross Ref
- May O. Lwin and Jerome D. Williams. 2003. A model integrating the multidimensional developmental Theory of Privacy and Theory of Planned Behavior to examine fabrication of information online. Marketing Letters 14, 4 (2003), 257--272.Google ScholarCross Ref
- Dominique Machuletz, Henrik Sendt, Stefan Laube, and Rainer Böhme. 2016. Users protect their privacy if they can: Determinants of webcam covering behavior. In Proceedings of the European Workshop on Usable Security (EuroUSEC '16). Internet Society, Reston, VA, USA.Google ScholarCross Ref
- Saeed Mirzamohammadi and Ardalan Amiri Sani. 2016. Viola: Trustworthy sensor notifications for enhanced privacy on mobile systems. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys '16). ACM, New York, NY, USA, 263--276. Google ScholarDigital Library
- Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41, 1 (2007), 100--126.Google ScholarCross Ref
- Paul A. Pavlou and Lin Chai. 2002. What drives electronic commerce across cultures? Across-cultural empirical investigation of the Theory of Planned Behavior. Journal of Electronic Commerce Research 3, 4 (2002), 240--253.Google Scholar
- Paul A. Pavlou and Mendel Fygenson. 2006. Understanding and predicting electronic commerce adoption: An extension of the Theory of Planned Behavior. MIS quarterly 30, 1 (2006), 115--143. Google ScholarDigital Library
- Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's watching me?: Assessing the effectiveness of webcam indicator lights. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 1649--1658. Google ScholarDigital Library
- Peter Prüfer and Margrit Rexroth. 2005. Kognitive Interviews. (2005). http://nbn-resolving.de/urn:nbn:de:0168-ssoar-201470.Google Scholar
- Andrew Raij, Animikh Ghosh, Santosh Kumar, and Mani Srivastava. 2011. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 11--20. Google ScholarDigital Library
- Ruby A. Rouse. 2012. Is someone watching you through your webcam? (2012). http: //campatch.com/wpcontent/uploads/2012/05/CamPatch AcademyStudy-on-Webcam-Hacking-Awareness-May2012.pdf.Google Scholar
- Gaston Sanchez. 2013. PLS path modeling with R. (2013). https://pdfs.semanticscholar.org/3713/89101516 16de6f122d0e757b55c81c8737e5.pdf.Google Scholar
- Ashkan Soltani and Timothy B. Lee. 2013. Research shows how MacBook webcams can spy on their users without warning. (2013). https://www.washingtonpost.com/news/the switch/wp/2013/12/18/research-shows-how-macbook webcams-can-spy-on-their-users-without warning/?utm_term=.9d68526f643c.Google Scholar
- Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In Proceedings of the ACM conference on Electronic Commerce (EC '01). ACM, New York, NY, USA, 38--47. Google ScholarDigital Library
- Mervyn Stone. 1974. Cross-validatory choice and assessment of statistical predictions. Journal of the Royal Statistical Society 36, 2 (1974), 111--147.Google Scholar
- Alan F. Westin. 1967. Privacy and freedom. Atheneum, New York, NY, USA.Google Scholar
- Kuang-Wen Wu, Shaio Yan Huang, David C. Yen, and Irina Popova. 2012. The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior 28, 3 (2012), 889--897. Google ScholarDigital Library
- Mike Z Yao and Daniel G Linz. 2008. Predicting self-protections of online privacy. CyberPsychology & Behavior 11, 5 (2008), 615--617.Google ScholarCross Ref
Index Terms
- Webcam Covering as Planned Behavior
Recommendations
Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust
Laptop webcams can be covertly activated by malware and law enforcement agencies. Consequently, 59% percent of Americans manually cover their webcams to avoid being surveilled. However, manual covers are prone to human error---through a survey with 200 ...
Privacy as a Planned Behavior: Effects of Situational Factors on Privacy Perceptions and Plans
UMAP '21: Proceedings of the 29th ACM Conference on User Modeling, Adaptation and PersonalizationTo account for privacy perceptions and preferences in user models and develop personalized privacy systems, we need to understand how users make privacy decisions in various contexts. Existing studies of privacy perceptions and behavior focus on ...
Collaborative privacy management
The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Unfortunately, the growing amount of personal data collected by service providers poses a significant privacy threat for ...
Comments