skip to main content
10.1145/3173574.3173754acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Webcam Covering as Planned Behavior

Published:19 April 2018Publication History

ABSTRACT

Most of today's laptops come with an integrated webcam placed above the screen to enable video conferencing. Due to the risk of webcam spying attacks, some laptop users seem to be concerned about their privacy and seek protection by covering the webcam. This paper is the first to investigate personal characteristics and beliefs of users with and without webcam covers by applying the Theory of Planned Behavior. We record the privacy behavior of 180 users, develop a path model, and analyze it by applying Partial Least Squares. The analysis indicates that privacy concerns do not significantly influence users' decision to use a webcam cover. Rather, this behavior is influenced by users' attitudes, social environment, and perceived control over protecting privacy. Developers should take this as a lesson to design privacy enhancing technologies which are convenient, verifiably effective and endorsed by peers.

Skip Supplemental Material Section

Supplemental Material

pn2165-file5.mp4

mp4

3.2 MB

pn2165.mp4

mp4

185.8 MB

References

  1. Alessandro Acquisti. 2004. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the ACM Conference on Electronic Commerce (EC '04). ACM, New York, NY, USA, 21--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Alessandro Acquisti and Ralph Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In International Workshop on Privacy Enhancing Technologies (PETS '06). Springer, Berlin, Germany, 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Icek Ajzen. 1985. Action control: From cognitions to behaviors. Springer, Berlin, Germany, Chapter From intentions to actions: A Theory of Planned Behavior, 11--39.Google ScholarGoogle Scholar
  4. Icek Ajzen. 1991. The theory of planned behavior. Organizational Behavior and Human Decision Processes 50, 2 (1991), 179--211.Google ScholarGoogle ScholarCross RefCross Ref
  5. Icek Ajzen. 2002. Constructing a TPB questionnaire: Conceptual and methodological considerations. (2002). http://www­ unix.oit.umass.edu/~aizen/pdf/tpb.measurement.pdf.Google ScholarGoogle Scholar
  6. Susan B. Barnes. 2006. A privacy paradox: Social networking in the United States. First Monday 11, 9 (2006).Google ScholarGoogle Scholar
  7. Steven Bellman, Eric J. Johnson, Stephen J. Kobrin, and Gerald L. Lohse. 2004. International differences in information privacy concerns: A global survey of consumers. The Information Society 20, 5 (2004), 313--324.Google ScholarGoogle ScholarCross RefCross Ref
  8. Brett Bilbrey. 2010. Embedded camera with privacy filter. U.S. Patent 7,728,906. (1 June 2010). Filed January 4, 2006.Google ScholarGoogle Scholar
  9. Rainer Böhme and Stefanie Pötzsch. 2011. Collective exposure: Peer effects in voluntary disclosure of personal data. In Financial Cryptography (FC '11). Springer, Berlin, Germany, 1--15. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Laura Brandimarte, Alessandro Acquisti, and George Loewenstein. 2013. Misplaced confidences privacy and the control paradox. Social Psychological and Personality Science 4, 3 (2013), 340--347.Google ScholarGoogle ScholarCross RefCross Ref
  11. Matthew Brocker and Stephen Checkoway. 2014. ISeeYou: Disabling the MacBook webcam indicator LED. In Proceedings of the USENIX Security Symposium (USENIX Security '14). USENIX Association, Berkeley, CA, USA, 337--352. https://www.usenix.org/conference/usenixsecurity14/tec hnical-sessions/presentation/brocker Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Barry Brown. 2001. Studying the Internet experience. (2001). http://www.hpl.hp.com/techreports/2001/HPL­ 2001--49.pdf.Google ScholarGoogle Scholar
  13. Wynne W. Chin. 1998. Modern methods for business research (8th ed.). Lawrence Erlbaum Associates, Mahwah, NJ, USA, Chapter The partial least squares approach to structural equation modeling, 295--336.Google ScholarGoogle Scholar
  14. Wynne W. Chin. 2010. Handbook of partial least squares: Concepts, methods and applications. Springer, Berlin, Germany, Chapter How to write up and report PLS analyses, 655--690.Google ScholarGoogle Scholar
  15. James DeLong. 2011. Computer webcam privacy cover. U.S. Patent D643,457. (16 August 2011). Filed June 21, 2010.Google ScholarGoogle Scholar
  16. Tamara Denning, Alan Borning, Batya Friedman, Brian T. Gill, Tadayoshi Kohno, and William H Maisel. 2010. Patients, pacemakers, and implantable defibrillators: Human values and security for wireless implantable medical devices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10). ACM, New York, NY, USA, 917--926. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Lothar Determann and Robert Sprague. 2011. Intrusive monitoring: Employee privacy expectations are reasonable in Europe, destroyed in the United States. Berkeley Technology Law Journal 26, 2 (2011), 979--1036.Google ScholarGoogle Scholar
  18. Alex Dobuzinskis. 2013. California man agrees to plead guilty to extortion of Miss Teen USA. (2013). https://www.reuters.com/article/us-usa-missteen­ extortion/california-man-agrees-to-plead-guilty-to­ extortion-of-miss-teen-usa-idUSBRE99U1G520131031.Google ScholarGoogle Scholar
  19. Brown Farinholt, Mohammad Rezaeirad, Paul Pearce, Hitesh Dharmdasani, Haikuo Yin, Stevens Le Blond, Damon McCoy, and Kirill Levchenko. 2017. To catch a ratter: Monitoring the behavior of amateur DarkComet RAT operators in the wild. In IEEE Symposium on Security and Privacy (SP '17). IEEE, 770--787.Google ScholarGoogle ScholarCross RefCross Ref
  20. FBI. 2014. International Blackshades malware takedown. (2014). https://www.fbi.gov/news/stories/international­ blackshades-malware-takedown-1.Google ScholarGoogle Scholar
  21. Martin Fishbein and Icek Ajzen. 1975. Belief, attitude, intention and behavior: An introduction to theory and research. Addison-Wesley, Reading, MA, USA.Google ScholarGoogle Scholar
  22. Jason Fitzpatrick. 2016. How to disable your webcam (and why you should). (2016). https://www.howtogeek.com/210921/how-to-disable-your­ webcam,-and-why-you-should/.Google ScholarGoogle Scholar
  23. Jens Fortmann. 2013. Closure device for an image capture facility. U.S. Patent 8,471,956. (25 June 2013). Filed October 29, 2010.Google ScholarGoogle Scholar
  24. Seymour Geisser. 1974. A predictive approach to the random effect model. Social Science Computer Review 61, 1 (1974), 101--107.Google ScholarGoogle Scholar
  25. Joey F. George. 2004. The Theory of Planned Behavior and Internet purchasing. Internet Research 14, 3 (2004), 198--212.Google ScholarGoogle ScholarCross RefCross Ref
  26. Oliver Götz, Kerstin Liehr-Gobbers, and Manfred Krafft. 2010. Handbook of partial least squares: Concepts, methods and applications. Springer, Berlin, Germany, Chapter Evaluation of structural equation models using the partial least squares (PLS) approach, 691--711.Google ScholarGoogle Scholar
  27. Ron G. Gustaveson. 2012. Webcam cover. U.S. Patent D669,112. (16 October 2012). Filed February 22, 2011.Google ScholarGoogle Scholar
  28. Joseph F. Hair Jr., G. Tomas M. Hult, Christian Ringle, and Marko Sarstedt. 2016. A primer on partial least squares structural equation modeling (PLS-SEM). Sage Publications, Thousand Oaks, CA, USA.Google ScholarGoogle Scholar
  29. Joseph F. Hair Jr., Christian M. Ringle, and Marko Sarstedt. 2011. PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice 19, 2 (2011), 139--152.Google ScholarGoogle ScholarCross RefCross Ref
  30. Horizont. 2014. Usage of consumer electronics in Germany, by age and device type. (2014). https://www.statista.com/statistics/448268/consumer­ electronics-usage-by-device-type-and-age-germany/.Google ScholarGoogle Scholar
  31. Chih-Min Huang, Yi-Ting Chen, and Li-Yen Wang. 2012. Laptop computer with hardware security protection. U.S. Patent 8,242,924. (14 August 2012). Filed September 16, 2009.Google ScholarGoogle Scholar
  32. Thomas Hughes-Roberts and Elahe Kani-Zabihi. 2014. On-line privacy behavior: Using user interfaces for salient factors. Journal of Computer and Communications 2, 4 (2014), 220--231.Google ScholarGoogle ScholarCross RefCross Ref
  33. Ming-Chi Lee. 2009. Factors influencing the adoption of Internet banking: An integration of TAM and TPB with perceived risk and perceived benefit. Electronic Commerce Research and Applications 8, 3 (2009), 130--141. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Younghwa Lee and Kenneth A. Kozar. 2005. Investigating factors affecting the adoption of anti-spyware systems. Commun. ACM 48, 8 (2005), 72--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Sonia Livingstone. 2008. Taking risky opportunities in youthful content creation: Teenagers' use of social networking sites for intimacy, privacy and self-expression. New Media & Society 10, 3 (2008), 393--411.Google ScholarGoogle ScholarCross RefCross Ref
  36. May O. Lwin and Jerome D. Williams. 2003. A model integrating the multidimensional developmental Theory of Privacy and Theory of Planned Behavior to examine fabrication of information online. Marketing Letters 14, 4 (2003), 257--272.Google ScholarGoogle ScholarCross RefCross Ref
  37. Dominique Machuletz, Henrik Sendt, Stefan Laube, and Rainer Böhme. 2016. Users protect their privacy if they can: Determinants of webcam covering behavior. In Proceedings of the European Workshop on Usable Security (EuroUSEC '16). Internet Society, Reston, VA, USA.Google ScholarGoogle ScholarCross RefCross Ref
  38. Saeed Mirzamohammadi and Ardalan Amiri Sani. 2016. Viola: Trustworthy sensor notifications for enhanced privacy on mobile systems. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys '16). ACM, New York, NY, USA, 263--276. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Patricia A. Norberg, Daniel R. Horne, and David A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41, 1 (2007), 100--126.Google ScholarGoogle ScholarCross RefCross Ref
  40. Paul A. Pavlou and Lin Chai. 2002. What drives electronic commerce across cultures? Across-cultural empirical investigation of the Theory of Planned Behavior. Journal of Electronic Commerce Research 3, 4 (2002), 240--253.Google ScholarGoogle Scholar
  41. Paul A. Pavlou and Mendel Fygenson. 2006. Understanding and predicting electronic commerce adoption: An extension of the Theory of Planned Behavior. MIS quarterly 30, 1 (2006), 115--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Rebecca S. Portnoff, Linda N. Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's watching me?: Assessing the effectiveness of webcam indicator lights. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 1649--1658. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Peter Prüfer and Margrit Rexroth. 2005. Kognitive Interviews. (2005). http://nbn-resolving.de/urn:nbn:de:0168-ssoar-201470.Google ScholarGoogle Scholar
  44. Andrew Raij, Animikh Ghosh, Santosh Kumar, and Mani Srivastava. 2011. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '11). ACM, New York, NY, USA, 11--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Ruby A. Rouse. 2012. Is someone watching you through your webcam? (2012). http: //campatch.com/wpcontent/uploads/2012/05/CamPatch­ AcademyStudy-on-Webcam-Hacking-Awareness-May2012.pdf.Google ScholarGoogle Scholar
  46. Gaston Sanchez. 2013. PLS path modeling with R. (2013). https://pdfs.semanticscholar.org/3713/89101516 16de6f122d0e757b55c81c8737e5.pdf.Google ScholarGoogle Scholar
  47. Ashkan Soltani and Timothy B. Lee. 2013. Research shows how MacBook webcams can spy on their users without warning. (2013). https://www.washingtonpost.com/news/the­ switch/wp/2013/12/18/research-shows-how-macbook­ webcams-can-spy-on-their-users-without­ warning/?utm_term=.9d68526f643c.Google ScholarGoogle Scholar
  48. Sarah Spiekermann, Jens Grossklags, and Bettina Berendt. 2001. E-privacy in 2nd generation e-commerce: Privacy preferences versus actual behavior. In Proceedings of the ACM conference on Electronic Commerce (EC '01). ACM, New York, NY, USA, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Mervyn Stone. 1974. Cross-validatory choice and assessment of statistical predictions. Journal of the Royal Statistical Society 36, 2 (1974), 111--147.Google ScholarGoogle Scholar
  50. Alan F. Westin. 1967. Privacy and freedom. Atheneum, New York, NY, USA.Google ScholarGoogle Scholar
  51. Kuang-Wen Wu, Shaio Yan Huang, David C. Yen, and Irina Popova. 2012. The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior 28, 3 (2012), 889--897. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Mike Z Yao and Daniel G Linz. 2008. Predicting self-protections of online privacy. CyberPsychology & Behavior 11, 5 (2008), 615--617.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Webcam Covering as Planned Behavior

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
        April 2018
        8489 pages
        ISBN:9781450356206
        DOI:10.1145/3173574

        Copyright © 2018 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 19 April 2018

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '18 Paper Acceptance Rate666of2,590submissions,26%Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader