skip to main content
10.1145/3563657.3596012acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
research-article
Open Access

Broadening Privacy and Surveillance: Eliciting Interconnected Values with a Scenarios Workbook on Smart Home Cameras

Published:10 July 2023Publication History

ABSTRACT

We use a design workbook of speculative scenarios as a values elicitation activity with 14 participants. The workbook depicts use case scenarios with smart home camera technologies that involve surveillance and uneven power relations. The scenarios were initially designed by the researchers to explore scenarios of privacy and surveillance within three social relationships involving “primary” and “non-primary” users: Parents-Children, Landlords-Tenants, and Residents-Domestic Workers. When the scenarios were utilized as part of a values elicitation activity with participants, we found that they reflected on a broader set of interconnected social values beyond privacy and surveillance, including autonomy and agency, physical safety, property rights, trust and accountability, and fairness. The paper suggests that future research about ethical issues in smart homes should conceptualize privacy as interconnected with a broader set of social values (which can align or be in tension with privacy), and reflects on considerations for doing research with non-primary users.

Skip Supplemental Material Section

Supplemental Material

References

  1. Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proc. ACM Hum.-Comput. Interact. 4, CSCW2, Article 116 (oct 2020), 28 pages. https://doi.org/10.1145/3415187Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ryan Aipperspach, Ben Hooker, and Allison Woodruff. 2008. The Heterogeneous Home. In Proceedings of the 10th International Conference on Ubiquitous Computing (Seoul, Korea) (UbiComp ’08). Association for Computing Machinery, New York, NY, USA, 222–231. https://doi.org/10.1145/1409635.1409666Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Yoko Akama, Ann Light, and Takahito Kamihira. 2020. Expanding Participation to Design with More-Than-Human Concerns. In Proceedings of the 16th Participatory Design Conference 2020 - Participation(s) Otherwise - Volume 1 (Manizales, Colombia) (PDC ’20). Association for Computing Machinery, New York, NY, USA, 1–11. https://doi.org/10.1145/3385010.3385016Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Irwin Altman. 1975. The environment and social behavior: privacy, personal space, territory, crowding. Brooks/Cole Pub. Co., Monterey, California.Google ScholarGoogle Scholar
  5. Mark Andrejevic. 2005. The work of watching one another: Lateral surveillance, risk, and governance. Surveillance and Society 2, 4 (2005), 479–497. https://doi.org/10.24908/ss.v2i4.3359Google ScholarGoogle ScholarCross RefCross Ref
  6. Paritosh Bahirat, Martijn C. Willemsen, Yangyang He, Qizhang Sun, and Bart P. Knijnenburg. 2021. Overlooking Context : How do Defaults and Framing Reduce Deliberation in Smart Home Privacy Decision-Making?. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (2021). ACM. https://doi.org/10.1145/3411764.3445672Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Stephanie Ballard, Karen M. Chappell, and Kristen Kennedy. 2019. Judgment Call the Game: Using value sensitive design and design fiction to surface ethical concerns related to technology. In Proceedings of the 2019 on Designing Interactive Systems Conference - DIS ’19 (2019). ACM Press, New York, New York, USA, 421–433. https://doi.org/10.1145/3322276.3323697Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Shaowen Bardzell. 2010. Feminist HCI: Taking Stock and Outlining an Agenda for Design. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Atlanta, Georgia, USA) (CHI ’10). Association for Computing Machinery, New York, NY, USA, 1301–1310. https://doi.org/10.1145/1753326.1753521Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Brian Barrett. 2015. Fuhu’s Kid-Centric Smart Home Is a Helicopter Parent’s Dream. Wired (8 7 2015). https://www.wired.com/2015/07/fuhu-smart-home/Google ScholarGoogle Scholar
  10. Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (Seoul, Republic of Korea) (CHI ’15). Association for Computing Machinery, New York, NY, USA, 3295–3298. https://doi.org/10.1145/2702123.2702147Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Eric P.S. Baumer, Timothy Berrill, Sarah C. Botwinick, Jonathan L. Gonzales, Kevin Ho, Allison Kundrik, Luke Kwon, Tim LaRowe, Chanh P. Nguyen, Fredy Ramirez, Peter Schaedler, William Ulrich, Amber Wallace, Yuchen Wan, and Benjamin Weinfeld. 2018. What Would You Do? Design Fiction and Ethics. In Proceedings of the 2018 ACM International Conference on Supporting Group Work (Sanibel Island, Florida, USA) (GROUP ’18). Association for Computing Machinery, New York, NY, USA, 244–256. https://doi.org/10.1145/3148330.3149405Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Julia Bernd, Ruba Abu-Salma, Junghyun Choy, and Alisa Frik. 2022. Balancing Power Dynamics in Smart Homes: Nannies’ Perspectives on How Cameras Reflect and Affect Relationships. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022) (2022). USENIX Association, 687—706. https://www.usenix.org/conference/soups2022/presentation/berndGoogle ScholarGoogle Scholar
  13. Julia Bernd, Ruba Abu-Salma, and Alisa Frik. 2020. Bystanders’ privacy: The perspectives of nannies on smart home surveillance. In FOCI 2020 - 10th USENIX Workshop on Free and Open Communications on the Internet (2020).Google ScholarGoogle Scholar
  14. Heidi Biggs, Cayla Key, Audrey Desjardins, and Afroditi Psarra. 2021. Moving Design Research: GIFs as Research Tools. In Designing Interactive Systems Conference 2021 (Virtual Event, USA) (DIS ’21). Association for Computing Machinery, New York, NY, USA, 1927–1940. https://doi.org/10.1145/3461778.3462144Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dieter Bohn. 2020. The Ring drone is just the latest Amazon privacy puzzle box. The Verge (2020). https://www.theverge.com/2020/9/25/21455197/amazon-ring-drone-home-security-surveillance-sidewalk-halo-privacy [Online; accessed 2021-09-09].Google ScholarGoogle Scholar
  16. Andy Boucher, David Cameron, and Nadine Jarvis. 2012. Power to the People: Dynamic Energy Management through Communal Cooperation. In Proceedings of the Designing Interactive Systems Conference (Newcastle Upon Tyne, United Kingdom) (DIS ’12). Association for Computing Machinery, New York, NY, USA, 612–620. https://doi.org/10.1145/2317956.2318048Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Pam Briggs and Lisa Thomas. 2015. An Inclusive, Value Sensitive Design Perspective on Future Identity Technologies. ACM Transactions on Computer-Human Interaction 22, 5 (10 8 2015), 1–28. https://doi.org/10.1145/2778972Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Simone Browne. 2015. Dark Matters: On the Surveillance of Blackness. Duke University Press, Durham.Google ScholarGoogle ScholarCross RefCross Ref
  19. Joern Henning Buehring and Jeanne Liedtka. 2018. Embracing systematic futures thinking at the intersection of Strategic Planning, Foresight and Design. Journal of Innovation Management 6, 3 (23 11 2018), 134. https://doi.org/10.24840/2183-0606_006.003_0006Google ScholarGoogle ScholarCross RefCross Ref
  20. Daniel J. Butler, Justin Huang, Franziska Roesner, and Maya Cakmak. 2015. The Privacy-Utility Tradeoff for Remotely Teleoperated Robots. In Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction (2015-03-02). ACM, Portland Oregon USA, 27–34. https://doi.org/10.1145/2696454.2696484Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. John M Carroll (Ed.). 1995. Scenario-based design: Envisioning work and technology in system development. John Wiley & Sons, Inc., New York.Google ScholarGoogle Scholar
  22. George Chalhoub, Martin J Kraemer, Norbert Nthala, and Ivan Flechais. 2021. “It Did Not Give Me an Option to Decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 555, 16 pages. https://doi.org/10.1145/3411764.3445691Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Janet X. Chen, Francesco Vitale, and Joanna McGrenere. 2021. What Happens After Death? Using a Design Workbook to Understand User Expectations for Preparing their Data. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (2021-05-06). ACM, New York, NY, USA, 1–13. https://doi.org/10.1145/3411764.3445359Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y. Zhao, and Haitao Zheng. 2020. Wearable Microphone Jamming. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–12. https://doi.org/10.1145/3313831.3376304Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Yu-Ting Cheng, Mathias Funk, Wenn-Chieh Tsai, and Lin-Lin Chen. 2019. Peekaboo Cam: Designing an observational camera for home ecologies concerning privacy. In Proceedings of the 2019 on Designing Interactive Systems Conference (2019-06-18). ACM, New York, NY, USA, 823–836. https://doi.org/10.1145/3322276.3323699Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Eun Kyoung Choe, Sunny Consolvo, Jaeyeon Jung, Beverly Harrison, Shwetak N. Patel, and Julie A. Kientz. 2012. Investigating receptiveness to sensing and inference in the home using sensor proxies. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp ’12 (2012). ACM Press, Pittsburgh, Pennsylvania, 61. https://doi.org/10.1145/2370216.2370226Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Danielle Keats Citron and Daniel J. Solove. 2022. Privacy Harms. Boston University Law Review 102, 3 (2022), 793–864. https://doi.org/10.2139/ssrn.3782222Google ScholarGoogle ScholarCross RefCross Ref
  28. Camille Cobb, Sruti Bhagavatula, Kalil Anderson Garrett, Alison Hoffman, Varun Rao, and Lujo Bauer. 2021. “I would have to evaluate their objections”: Privacy tensions between smart home device owners and incidental users. Proceedings on Privacy Enhancing Technologies 2021, 4 (1 10 2021), 54–75. https://doi.org/10.2478/popets-2021-0060Google ScholarGoogle ScholarCross RefCross Ref
  29. Brendan David-John, Diane Hosfelt, Kevin Butler, and Eakta Jain. 2021. Let’s SOUP up XR: Collected thoughts from an IEEE VR workshop on privacy in mixed reality. In VR4Sec: Security for VR and VR for Security, SOUPS 2021 Workshop.Google ScholarGoogle Scholar
  30. Maria Puig de la Bellacasa. 2010. Matters of care in technoscience: Assembling neglected things. Social Studies of Science 41, 1 (Dec. 2010), 85–106. https://doi.org/10.1177/0306312710380301Google ScholarGoogle ScholarCross RefCross Ref
  31. Teresa Denefleh, Arne Berger, Albrecht Kurze, and Chris Frauenberger. 2019. Sensorstation: Exploring Simple Sensor Data in the Context of a Shared Apartment. In Proceedings of the 2019 Designing Interactive Systems Conference (DIS) (2019). https://doi.org/10.1145/3322276.3322309Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Carl DiSalvo, Tom Jenkins, and Thomas Lodato. 2016. Designing Speculative Civics. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI ’16). Association for Computing Machinery, New York, NY, USA, 4979–4990. https://doi.org/10.1145/2858036.2858505Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Carl DiSalvo, Jonathan Lukens, Thomas Lodato, Tom Jenkins, and Tanyoung Kim. 2014. Making public things: How HCI Design Can Express Matters of Concern. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (2014-04-26). ACM, New York, NY, USA, 2397–2406. https://doi.org/10.1145/2556288.2557359Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Cynthia Dwork and Mulligan. 2013. It’s not privacy, and it’s not fair. Stanford Law Review Online 66 (2013), 35–40.Google ScholarGoogle Scholar
  35. Nils Ehrenberg and Turkka Keinonen. 2021. The Technology Is Enemy for Me at the Moment: How Smart Home Technologies Assert Control Beyond Intent. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (2021-05-06). ACM, New York, NY, USA, 1–11. https://doi.org/10.1145/3411764.3445058Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Chris Elsden, David Chatting, Abigail C. Durrant, Andrew Garbett, Bettina Nissen, John Vines, and David S. Kirk. 2017. On Speculative Enactments. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (2017-05-02). ACM, New York, NY, USA, 5386–5399. https://doi.org/10.1145/3025453.3025503Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Felix Anand Epp, Tim Moesgen, Antti Salovaara, Emmi Pouta, and İdil Gaziulusoy. 2022. Reinventing the Wheel: The Future Ripples Method for Activating Anticipatory Capacities in Innovation Teams. In Designing Interactive Systems Conference (2022-06-13). ACM, Virtual Event Australia, 387–399. https://doi.org/10.1145/3532106.3534570Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Martyn Evans. 2003. Trend Forecasting for Design Futures. In European Academy of Design Conference (2003).Google ScholarGoogle Scholar
  39. Yuanyuan Feng, Yaxing Yao, and Norman Sadeh. 2021. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, 1–16. https://doi.org/10.1145/3411764.3445148Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Casey Fiesler. 2019. Ethical Considerations for Research Involving (Speculative) Public Data. Proceedings of the ACM on Human-Computer Interaction 3, GROUP (5 12 2019), 1–13. https://doi.org/10.1145/3370271Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Casey Fiesler. 2021. Ethical Speculation in the Computing Classroom. In 2021 Conference on Research in Equitable and Sustained Participation in Engineering, Computing, and Technology (RESPECT) (2021-05-23). IEEE, Philadelphia, PA, USA, 1–1. https://doi.org/10.1109/RESPECT51740.2021.9620641Google ScholarGoogle ScholarCross RefCross Ref
  42. Mary Flanagan and Helen Nissenbaum. 2014. Groundwork for Values in Games. In Values at Play in Digital Games. MIT Press, Cambridge, Massachusetts.Google ScholarGoogle Scholar
  43. Center for Long-Term Cybersecurity. 2016. Cybersecurity futures 2020. Technical Report. 128 pages. https://cltc.berkeley.edu/2016/04/28/cybersecurity-futures-2020/Google ScholarGoogle Scholar
  44. Diana Freed, Jackeline Palmer, Diana Minchala, Karen Levy, Thomas Ristenpart, and Nicola Dell. 2018. "A Stalker’s Paradise": How Intimate Partner Abusers Exploit Technology. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI ’18 (2018). ACM Press, New York, New York, USA, 1–13. https://doi.org/10.1145/3173574.3174241Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Batya Friedman, David G. Hendry, and Alan Borning. 2017. A Survey of Value Sensitive Design Methods. Foundations and Trends® in Human–Computer Interaction 11, 2 (2017), 63–125. https://doi.org/10.1561/1100000015Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Radhika Garg and Hua Cui. 2022. Social Contexts, Agency, and Conflicts: Exploring Critical Aspects of Design for Future Smart Home Technologies. ACM Transactions on Computer-Human Interaction 29, 2 (30 4 2022), 1–30. https://doi.org/10.1145/3485058Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Bill Gaver and Heather Martin. 2000. Alternatives: Exploring Information Appliances through Conceptual Design Proposals. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (The Hague, The Netherlands) (CHI ’00). Association for Computing Machinery, New York, NY, USA, 209–216. https://doi.org/10.1145/332040.332433Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. William Gaver. 2011. Making spaces: how design workbooks work. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’11) (2011). 1551–1560. https://doi.org/10.1145/1978942.1979169Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Elisa Giaccardi, Nazli Cila, Chris Speed, and Melissa Caldwell. 2016. Thing Ethnography: Doing Design Research with Non-Humans. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (Brisbane, QLD, Australia) (DIS ’16). Association for Computing Machinery, New York, NY, USA, 377–387. https://doi.org/10.1145/2901790.2901905Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Christina Harrington and Tawanna R. Dillahunt. 2021. Eliciting Tech Futures Among Black Young Adults: A Case Study of Remote Speculative Co-Design. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (2021-05-06). ACM, New York, NY, USA, 1–15. https://doi.org/10.1145/3411764.3445723Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Hilary Hutchinson, Heiko Hansen, Nicolas Roussel, Björn Eiderbäck, Wendy Mackay, Bosse Westerlund, Benjamin B Bederson, Allison Druin, Catherine Plaisant, Michel Beaudouin-Lafon, Stéphane Conversy, and Helen Evans. 2003. Technology probes. In Proceedings of the conference on Human factors in computing systems (CHI ’03) (2003). ACM Press, New York, New York, USA, 17–24. https://doi.org/10.1145/642611.642616Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Alan Jacobs. 2016. Attending to Technology - Theses for Disputation. The New Atlantis (2016). https://www.thenewatlantis.com/publications/attending-to-technology-theses-for-disputationGoogle ScholarGoogle Scholar
  53. Nassim JafariNaimi, Lisa Nathan, and Ian Hargraves. 2015. Values as Hypotheses: Design, Inquiry, and the Service of Values. Design Issues 31, 4 (10 2015), 91–104. https://doi.org/10.1162/DESI_a_00354Google ScholarGoogle ScholarCross RefCross Ref
  54. Tom Jenkins. 2017. Living Apart, Together: Cohousing as a Site for ICT Design. In Proceedings of the 2017 Conference on Designing Interactive Systems (2017-06-10). ACM, Edinburgh United Kingdom, 1039–1051. https://doi.org/10.1145/3064663.3064751Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Cayla Key, Fiona Browne, Nick Taylor, and Jon Rogers. 2021. Proceed with Care: Reimagining Home IoT Through a Care Perspective. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 166, 15 pages. https://doi.org/10.1145/3411764.3445602Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Bran Knowles, Sophie Beck, Joe Finney, James Devine, and Joseph Lindley. 2019. A Scenario-Based Methodology for Exploring Risks: Children and Programmable IoT. In Proceedings of the 2019 on Designing Interactive Systems Conference (2019-06-18). ACM, New York, NY, USA, 751–761. https://doi.org/10.1145/3322276.3322315Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, and Karrie Karahalios. 2021. “We Just Use What They Give Us”: Understanding Passenger User Perspectives in Smart Homes. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 41, 14 pages. https://doi.org/10.1145/3411764.3445598Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Sandjar Kozubaev, Chris Elsden, Noura Howell, Marie Louise Juul Søndergaard, Nick Merrill, Britta Schulte, and Richmond Y Wong. 2020. Expanding Modes of Reflection in Design Futuring. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (2020-04-21). ACM, New York, NY, USA, 1–15. https://doi.org/10.1145/3313831.3376526Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Sandjar Kozubaev, Fernando Rochaix, Carl DiSalvo, and Christopher A. Le Dantec. 2019. Spaces and Traces: Implications of Smart Technology in Public Housing. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI ’19 (2019). ACM Press, New York, New York, USA, 1–13. https://doi.org/10.1145/3290605.3300669Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Albrecht Kurze, Andreas Bischof, Sören Totzauer, Michael Storz, Maximilian Eibl, Margot Brereton, and Arne Berger. 2020. Guess the Data: Data Work to Understand How People Make Sense of and Use Simple Sensor Data from Homes. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (2020-04-21). ACM, Honolulu HI USA, 1–12. https://doi.org/10.1145/3313831.3376273Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Josephine Lau, Benjamin Zimmerman, and Florian Schaub. 2018. Alexa, Are You Listening?: Privacy Perceptions, Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (11 2018), 1–31. https://doi.org/10.1145/3274371Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Christopher A. Le Dantec, Erika Shehan Poole, and Susan P. Wyche. 2009. Values as lived experience: Evolving value sensitive design in support of value discovery. In Proceedings of the 27th international conference on Human factors in computing systems - CHI 09 (2009). ACM Press, New York, New York, USA, 1141. https://doi.org/10.1145/1518701.1518875Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Hosub Lee and Alfred Kobsa. 2020. Confident Privacy Decision-Making in IoT Environments. ACM Transactions on Computer-Human Interaction 27, 1 (23 1 2020), 1–39. https://doi.org/10.1145/3364223Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Joseph Lindley, Haider Ali Akmal, and Paul Coulton. 2020. Design Research and Object-Oriented Ontology. Open Philosophy 3, 1 (Jan. 2020), 11–41. https://doi.org/10.1515/opphil-2020-0002Google ScholarGoogle ScholarCross RefCross Ref
  65. Joseph Lindley, Haider Ali Akmal, Franziska Pilling, and Paul Coulton. 2020. Researching AI Legibility through Design. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3313831.3376792Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Jen Liu, Daragh Byrne, and Laura Devendorf. 2018. Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3173574.3173614Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Dan Lockton, Devika Singh, Saloni Sabnis, Michelle Chou, Sarah Foley, and Alejandro Pantoja. 2019. New Metaphors: A workshop method for generating ideas and reframing problems in design and beyond. In Proceedings of the 2019 on Creativity and Cognition (2019-06-13). ACM, New York, NY, USA, 319–332. https://doi.org/10.1145/3325480.3326570Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Karola Marky, Sarah Prange, Florian Krell, Max Mühlhäuser, and Florian Alt. 2020. “You just can’t know about everything”: Privacy Perceptions of Smart Home Visitors. In 19th International Conference on Mobile and Ubiquitous Multimedia (2020-11-22). ACM, Essen Germany, 83–95. https://doi.org/10.1145/3428361.3428464Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Karola Marky, Sarah Prange, Max Mühlhäuser, and Florian Alt. 2021. Roles Matter! Understanding Differences in the Privacy Mental Models of Smart Home Visitors and Residents. In 20th International Conference on Mobile and Ubiquitous Multimedia (2021-05-12). ACM, Leuven Belgium, 108–122. https://doi.org/10.1145/3490632.3490664Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Roger Martin. 2009. The Design of Business: Why Design Thinking is the Next Competitive Edge. Harvard Business Press, Cambridge, Massachusetts.Google ScholarGoogle Scholar
  71. Ramia Mazé 2019. Politics of designing visions of the future. Journal of Futures Studies 23, 3 (2019), 23–38. https://doi.org/10.6531/JFS.201903_23(3).0003Google ScholarGoogle ScholarCross RefCross Ref
  72. Nora McDonald, Karla Badillo-Urquiola, Morgan G. Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J. Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems (2020-04-25). ACM, New York, NY, USA, 1–8. https://doi.org/10.1145/3334480.3375174Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Nora McDonald and Andrea Forte. 2020. The Politics of Privacy Theories: Moving from Norms to Vulnerabilities. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (2020-04-21). ACM, New York, NY, USA, 1–14. https://doi.org/10.1145/3313831.3376167Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Nick Merrill. 2020. Security Fictions: Bridging Speculative Design and Computer Security. In Proceedings of the 2020 ACM Designing Interactive Systems Conference (2020-07-03). ACM, New York, NY, USA, 1727–1735. https://doi.org/10.1145/3357236.3395451Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Deirdre K. Mulligan and Jennifer King. 2011. Bridging the gap between privacy and design. University of Pennsylvania Journal of Constitutional Law (2011), 989–1034.Google ScholarGoogle Scholar
  76. Deirdre K. Mulligan, Colin Koopman, and Nick Doty. 2016. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, 2083 (28 12 2016), 1–17. https://doi.org/10.1098/rsta.2016.0118Google ScholarGoogle ScholarCross RefCross Ref
  77. Deirdre K. Mulligan, Joshua A. Kroll, Nitin Kohli, and Richmond Y. Wong. 2019. This Thing Called Fairness: Disciplinary confusion realizing a value in technology. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (7 11 2019), 1–36. https://doi.org/10.1145/3359221Google ScholarGoogle ScholarDigital LibraryDigital Library
  78. Deirdre K. Mulligan and Helen Nissenbaum. 2020. The Concept of Handoff as a Model for Ethical Analysis and Design. In The Oxford Handbook of Ethics of AI, Markus D. Dubber, Frank Pasquale, and Sunit Das (Eds.). Oxford University Press, 231–251. https://doi.org/10.1093/oxfordhb/9780190067397.013.15Google ScholarGoogle ScholarCross RefCross Ref
  79. Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) (2017). 399–412.Google ScholarGoogle Scholar
  80. Larissa Vivian Nägele, Merja Ryöppy, and Danielle Wilde. 2018. PDFi: Participatory Design Fiction with Vulnerable Users. In Proceedings of the 10th Nordic Conference on Human-Computer Interaction (Oslo, Norway) (NordiCHI ’18). Association for Computing Machinery, New York, NY, USA, 819–831. https://doi.org/10.1145/3240167.3240272Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Lisa P. Nathan, Batya Friedman, Predrag Klasnja, Shaun K. Kane, and Jessica K. Miller. 2008. Envisioning systemic effects on persons and society throughout interactive system design. In Proceedings of the 7th ACM conference on Designing interactive systems - DIS ’08 (2008). ACM Press, New York, New York, USA, 1–10. https://doi.org/10.1145/1394445.1394446Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Helen Nissenbaum. 2009. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford, California.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Renee Noortman, Britta F. Schulte, Paul Marshall, Saskia Bakker, and Anna L. Cox. 2019. HawkEye - Deploying a Design Fiction Probe. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI ’19 (2019). ACM Press, New York, New York, USA, 1–14. https://doi.org/10.1145/3290605.3300652Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. William Odom, Sumeet Anand, Doenja Oogjes, and Jo Shin. 2019. Diversifying the Domestic: A Design Inquiry into Collective and Mobile Living. In Proceedings of the 2019 on Designing Interactive Systems Conference - DIS ’19 (2019). ACM Press, New York, New York, USA, 1377–1390. https://doi.org/10.1145/3322276.3323687Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Doenja Oogjes, William Odom, and Pete Fung. 2018. Designing for an other Home: Expanding and Speculating on Different Forms of Domestic Life. In Proceedings of the 2018 on Designing Interactive Systems Conference 2018 - DIS ’18 (2018). ACM Press, New York, New York, USA, 313–326. https://doi.org/10.1145/3196709.3196810Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. James Pierce. 2019. Lamps, Curtains, Robots: 3 scenarios for the future of the smart home. In Proceedings of the 2019 on Creativity and Cognition - C&C ’19 (2019). ACM Press, New York, New York, USA, 423–424. https://doi.org/10.1145/3325480.3329181Google ScholarGoogle ScholarDigital LibraryDigital Library
  87. James Pierce. 2019. Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (2019-05-02). ACM, Glasgow Scotland Uk, 1–14. https://doi.org/10.1145/3290605.3300275Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. James Pierce. 2021. Eccentric Sensing Devices: Using Conceptual Design Notes to Understand Design Opportunities, Limitations, and Concerns Connected to Digital Sensing. In Creativity and Cognition (Virtual Event, Italy) (C&C ’21). Association for Computing Machinery, New York, NY, USA, Article 37, 14 pages. https://doi.org/10.1145/3450741.3466775Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. James Pierce and Carl DiSalvo. 2018. Addressing Network Anxieties with Alternative Design Metaphors. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3173574.3174123Google ScholarGoogle ScholarDigital LibraryDigital Library
  90. James Pierce, Sarah Fox, Nick Merrill, and Richmond Wong. 2018. Differential Vulnerabilities and a Diversity of Tactics: What Toolkits Teach Us about Cybersecurity. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (1 11 2018), 1–24. https://doi.org/10.1145/3274408Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. James Pierce, Sarah Fox, Nick Merrill, Richmond Wong, and Carl DiSalvo. 2018. An Interface without A User: An Exploratory Design Study of Online Privacy Policies and Digital Legalese. In Proceedings of the 2018 Designing Interactive Systems Conference (Hong Kong, China) (DIS ’18). Association for Computing Machinery, New York, NY, USA, 1345–1358. https://doi.org/10.1145/3196709.3196818Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. James Pierce, Claire Weizenegger, Parag Nandi, Isha Agarwal, Gwenna Gram, Jade Hurrle, Hannah Liao, Betty Lo, Aaron Park, Aivy Phan, Mark Shumskiy, and Grace Sturlaugson. 2022. Addressing Adjacent Actor Privacy: Designing for Bystanders, Co-Users, and Surveilled Subjects of Smart Home Cameras. In Designing Interactive Systems Conference (2022-06-13). ACM, Virtual Event Australia, 26–40. https://doi.org/10.1145/3532106.3535195Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. James Pierce, Richmond Y. Wong, and Nick Merrill. 2020. Sensor Illumination: Exploring Design Qualities and Ethical Implications of Smart Cameras and Image/Video Analytics. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ’20) (2020). 1–19. https://doi.org/10.1145/3313831.3376347Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Jon Rogers, Loraine Clarke, Martin Skelly, Nick Taylor, Pete Thomas, Michelle Thorne, Solana Larsen, Katarzyna Odrozek, Julia Kloiber, Peter Bihr, Anab Jain, Jon Arden, and Max von Grafenstein. 2019. Our Friends Electric: Reflections on Advocacy and Design Research for the Voice Enabled Internet. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300344Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Johnny Saldaña. 2013. The Coding Manual for Qualitative Researchers. Sage, Los Angeles.Google ScholarGoogle Scholar
  96. Katie Shilton. 2018. Values and Ethics in Human-Computer Interaction. Foundations and Trends® in Human–Computer Interaction 12, 2 (2018), 107–171. https://doi.org/10.1561/1100000073Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Katie Shilton, Donal Heidenblad, Adam Porter, Susan Winter, and Mary Kendig. 2020. Role-Playing Computer Ethics: Designing and Evaluating the Privacy by Design (PbD) Simulation. Science and Engineering Ethics (1 7 2020). https://doi.org/10.1007/s11948-020-00250-0Google ScholarGoogle ScholarCross RefCross Ref
  98. Daniel J. Solove. 2002. Conceptualizing privacy. California Law Review 90 (2002), 1087–1155. https://doi.org/10.1145/1929609.1929610Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. Daniel J. Solove. 2003. A Taxonomy of Privacy. University of Pennsylvania Law Review 154, 3 (2003), 477–560.Google ScholarGoogle ScholarCross RefCross Ref
  100. Daniel J Solove. 2008. Privacy: A Concept in Disarray. In Understanding privacy. Harvard University Press, Cambridge, Massachusetts.Google ScholarGoogle Scholar
  101. Luke Stark and Karen Levy. 2018. The surveillant consumer. Media, Culture & Society 40, 8 (25 11 2018), 1202–1220. https://doi.org/10.1177/0163443718781985Google ScholarGoogle ScholarCross RefCross Ref
  102. Yolande Strengers, Jenny Kennedy, Paula Arcari, Larissa Nicholls, and Melissa Gregg. 2019. Protection, Productivity and Pleasure in the Smart Home: Emerging Expectations and Gendered Insights from Australian Early Adopters. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (2019-05-02). ACM, Glasgow Scotland Uk, 1–13. https://doi.org/10.1145/3290605.3300875Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. Shea Swauger. 2020. Software that monitors students during tests perpetuates inequality and violates their privacy. MIT Technology Review (7 8 2020). https://www.technologyreview.com/2020/08/07/1006132/software-algorithms-proctoring-online-tests-ai-ethics/Google ScholarGoogle Scholar
  104. Madiha Tabassum, Jess Kropczynski, Pamela Wisniewski, and Heather Richter Lipford. 2020. Smart Home Beyond the Home: A Case for Community-Based Access Control. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (2020-04-21). ACM, Honolulu HI USA, 1–12. https://doi.org/10.1145/3313831.3376255Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Neilly H. Tan, Brian Kinnee, Dana Langseth, Sean A. Munson, and Audrey Desjardins. 2022. Critical-Playful Speculations with Cameras in the Home. In CHI Conference on Human Factors in Computing Systems (2022-04-29). ACM, New Orleans LA USA, 1–22. https://doi.org/10.1145/3491102.3502109Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Neilly H. Tan, Richmond Y. Wong, Audrey Desjardins, Sean A. Munson, and James Pierce. 2022. Monitoring Pets, Deterring Intruders, and Casually Spying on Neighbors: Everyday Uses of Smart Home Cameras. In CHI Conference on Human Factors in Computing Systems (2022-04-29). ACM, New Orleans LA USA, 1–25. https://doi.org/10.1145/3491102.3517617Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Parth Kirankumar Thakkar, Shijing He, Shiyu Xu, Danny Yuxing Huang, and Yaxing Yao. 2022. “It would probably turn into a social faux-pas”: Users’ and Bystanders’ Preferences of Privacy Awareness Mechanisms in Smart Homes. In CHI Conference on Human Factors in Computing Systems (2022-04-29). ACM, New Orleans LA USA, 1–13. https://doi.org/10.1145/3491102.3502137Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Jasper Tran O’Leary, Sara Zewde, Jennifer Mankoff, and Daniela K Rosner. 2019. Who Gets to Future? Race, Representation, and Design Methods in Africatown. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI ’19 (2019). ACM Press, New York, New York, USA, 1–13. https://doi.org/10.1145/3290605.3300791Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders versus intrusiveness: Teens’ and Parents’ Perspectives on Home-Entryway Surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (2014-09-13). ACM, New York, NY, USA, 129–139. https://doi.org/10.1145/2632048.2632107Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Eero Vaara and Richard Whittington. 2012. Strategy-as-Practice: Taking Social Practices Seriously. Academy of Management Annals 6, 1 (6 2012), 285–336. https://doi.org/10.5465/19416520.2012.672039Google ScholarGoogle ScholarCross RefCross Ref
  111. Kees van der Heijden. 2005. Scenarios: The Art of Strategic Conversation. John Wiley & Sons, Inc.Google ScholarGoogle Scholar
  112. Joost M. Vervoort, Roy Bendor, Aisling Kelliher, Oscar Strik, and Ariella E.R. Helfgott. 2015. Scenarios and the art of worldmaking. Futures 74 (11 2015), 62–70. https://doi.org/10.1016/j.futures.2015.08.009Google ScholarGoogle ScholarCross RefCross Ref
  113. Pierre Wack. 1985. Scenarios: uncharted waters ahead. Harvard Business Review 63, 5 (1985), 73–89.Google ScholarGoogle Scholar
  114. Ron Wakkary. 2021. Things We Could Design: For More Than Human-Centered Worlds. MIT Press.Google ScholarGoogle Scholar
  115. Steven Weber. 1996. Counterfactuals, past and future. In Counterfactual Thought Experiments in World Politics: Logical, Methodological, and Psychological Perspectives, Phlip E. Tetlock and Aaron Belkin (Eds.). Princeton University Press, Princeton, New Jersey.Google ScholarGoogle Scholar
  116. Richmond Y Wong, Karen Boyd, Jake Metcalf, and Katie Shilton. 2020. Beyond Checklist Approaches to Ethics in Design. In Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing (2020-10-17). ACM, New York, NY, USA, 511–517. https://doi.org/10.1145/3406865.3418590Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Richmond Y. Wong and Vera Khovanskaya. 2018. Speculative Design in HCI: From Corporate Imaginations to Critical Orientations. In New Directions in 3rd Wave HCI, Michael Filimowicz (Ed.). Springer, Cham, Switzerland, 175–202. https://doi.org/10.1007/978-3-319-73374-6_10Google ScholarGoogle ScholarCross RefCross Ref
  118. Richmond Y Wong, Vera Khovanskaya, Sarah E Fox, Nick Merrill, and Phoebe Sengers. 2020. Infrastructural Speculations: Tactics for Designing and Interrogating Lifeworlds. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (2020-04-21). ACM, New York, NY, USA, 1–15. https://doi.org/10.1145/3313831.3376515Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Richmond Y. Wong and Deirdre K. Mulligan. 2019. Bringing Design to the Privacy Table: Broadening "Design" in "Privacy by Design" Through the Lens of HCI. In CHI Conference on Human Factors in Computing Systems (CHI 2019) (2019). https://doi.org/10.1145/3290605.3300492Google ScholarGoogle ScholarDigital LibraryDigital Library
  120. Richmond Y. Wong, Deirdre K Mulligan, Ellen Van Wyk, James Pierce, and John Chuang. 2017. Eliciting Values Reflections by Engaging Privacy Futures Using Design Workbooks. Proceedings of the ACM on Human Computer Interaction 1, CSCW (2017). https://doi.org/10.1145/3134746Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Richmond Y. Wong and Tonya Nguyen. 2021. Timelines: A World-Building Activity for Values Advocacy. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (2021-05-06). ACM, New York, NY, USA, 1–15. https://doi.org/10.1145/3411764.3445447Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Yanlai Wu, Xinning Gui, Pamela J. Wisniewski, and Yao Li. 2023. Do Streamers Care about Bystanders’ Privacy? An Examination of Live Streamers’ Considerations and Strategies for Bystanders’ Privacy Management. Proc. ACM Hum.-Comput. Interact. 7, CSCW1, Article 127 (apr 2023), 29 pages. https://doi.org/10.1145/3579603Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Susan Wyche. 2021. The Benefits of Using Design Workbooks with Speculative Design Proposals in Information Communication Technology for Development (ICTD). In Designing Interactive Systems Conference 2021 (2021-06-28). ACM, New York, NY, USA, 1861–1874. https://doi.org/10.1145/3461778.3462140Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Yaxing Yao, Justin Reed Basdeo, Oriana Rosata Mcdonough, and Yang Wang. 2019. Privacy Perceptions and Designs of Bystanders in Smart Homes. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (7 11 2019), 1–24. https://doi.org/10.1145/3359161Google ScholarGoogle ScholarDigital LibraryDigital Library
  125. Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017) (2017). 65–80. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/zengGoogle ScholarGoogle Scholar
  126. Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19) (2019). USENIX Association, 159—176. https://www.usenix.org/conference/usenixsecurity19/presentation/zengGoogle ScholarGoogle Scholar

Index Terms

  1. Broadening Privacy and Surveillance: Eliciting Interconnected Values with a Scenarios Workbook on Smart Home Cameras

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format