Ethical Use of Lifelogging Data for Research: Perceived Value and Privacy Concerns of Wearable Camera Users
DOI:
https://doi.org/10.7146/ntik.v6i1.98951Keywords:
lifelogging data, data reuse, ethics, value of dataAbstract
Video data generated from wearable cameras is now available online, as the concept of “lifelogging” has been introduced to many citizens due to the spread of wearable camera equipment. Usually, these wearable cameras automatically capture images or record videos from a first-person point of view; they collect a new form of information that cannot be captured through other means. Citizen data Harvest in Motion Everywhere (CHIME) project pays close attention to the value of this new type of resource, particularly regarding the video data that cyclists record using wearable cameras over a long period of time. These contextually rich data capture community members’ infrastructure experiences and interactions with other transit modes, as well as environmental changes. If curated and made publicly accessible, there is great potential for various stakeholders, including public historians, researchers, city planners, and citizens, to use the data. However, making these videos open to the public and to researchers raises ethics issues, as the data include sensitive, location-based information that may intrude into private lives. Additionally, the videos include the accidental collection of data from secondary participants (bystanders). In this paper, we will describe the potential value of citizen-generated video data using the CHIME project example and discuss the privacy and ethical considerations related to the use of this type of data for scientific and citizen research.References
Al-Muhtadi, J., Ranganathan, A., Campbell, R., & Mickunas, M. D. (2003). Cerberus: A context-aware security scheme for smart spaces. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 489. Washington, DC: IEEE Computer Society. Retrieved from http://dl.acm.org/citation.cfm?id=826025.826359
Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66–84. https://doi.org/10.1111/j.1540-4560.1977.tb01883.x
Bernard, R. (2000). Social Research Methods: Qualitative and Quantitative Approach. Sage Publication Ltd. Thousand Oaks, CA.
Bowser, A., & Wiggins, A. (2015). Privacy in participatory research: Advancing policy to support human computation. Human Computation, 2(1), 19–44. https://doi.org/10.15346/hc.v2i1. 3
Cavoukian, A. (2014). Privacy by design. IEEE Technology and Society Magazine, 31(4), 18-19. doi: 10.1109/MTS.2012.2225459
Chaudhari, J., Cheung, S. S., & Venkatesh, M. V. (2007). Privacy protection for life-log video. 2007 IEEE Workshop on Signal Processing Applications for Public Security and Forensics, 1–5.
Cheng, W. C., Golubchik, L., & Kay, D. G. (2004). Total recall: Are privacy changes inevitable? Proceedings of the the 1st ACM Workshop on Continuous Archival and Retrieval of Personal Experiences, 86–92. New York, NY: ACM. https://doi.org/10.1145/1026653.1026666
Cunningham, A. (1994). The archival management of personal records in electronic form: Some suggestions. Archives and Manuscripts, 22(1), 94–105.
Denning, T., Dehlawi, Z., & Kohno, T. (2014). In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, 2377–2386. New York, NY: ACM. https://doi.org/10.1145/2556288.2557352
Eagle, N., & Pentland, A. (2009). Eigenbehaviors: Identifying structure in routine. Behavioral Ecology and Sociobiology, 63(7), 1057–1066. https://doi.org/10.1007/s00265-009-0739-0
Hoyle, R., Templeman, R., Armes, S., Anthony, D., Crandall, D., & Kapadia, A. (2014). Privacy behaviors of lifeloggers using wearable cameras. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 571–582. New York, NY,: ACM. https://doi.org/10.1145/2632048.2632079
Indianapolis Cultural Trail. (2017). About. Retrieved from http://indyculturaltrail.org/about/
Indianapolis Pacers Bikeshare. (2015). About. Retrieved from https://www.pacersbikeshare.org/what-is Indy Parks & Recreation & Dept. of Public Works. (2014). Indy Greenways Full Circle Master Plan, 2013-2023. Retrieved from https://indygreenwaysmasterplan.wordpress.com/full-circle-master-plan-2/
Jana, S., Narayanan, A., & Shmatikov, V. (2013). A scanner darkly: Protecting user privacy from perceptual applications. 2013 IEEE Symposium on Security and Privacy, 349–363. https://doi.org/10.1109/SP.2013.31
Kärkkäinen, T., Vaittinen, T., & Väänänen-Vainio-Mattila, K. (2010). I don’t mind being logged, but want to remain in control: A field study of mobile activity and context logging. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 163–172. New York, NY: ACM. https://doi.org/10.1145/1753326.1753351
Kaye, J. “Jofish,” Vertesi, J., Avery, S., Dafoe, A., David, S., Onaga, L., … Pinch, T. (2006). To have and to hold: Exploring the personal archive. Proceedings of the SIGCHI Conference on Human Factors in Computing System, 275–284. New York, NY: ACM. https://doi.org/http://doi.acm.org.libproxy.lib.unc.edu/10.1145/1124772.1124814
Kelly, P., Marshall, S. J., Badland, H., Kerr, J., Oliver, M., Doherty, A. R., & Foster, C. (2013). An ethical framework for automated, wearable cameras in health behavior research. American Journal of Preventive Medicine, 44(3), 314–319. https://doi.org/10.1016/j.amepre.2012.11.006
Kupfer, J. (1987). Privacy, autonomy, and self-concept. American Philosophical Quarterly, 24(1), 81-89. Retrieved from http://www.jstor.org/stable/20014176
Mann, S. (1997). Wearable computing: A first step toward personal imaging. Computer, 30(2), 25–32. https://doi.org/10.1109/2.566147
McKemmish, S. (1996). Evidence of me . . . Archives and Manuscripts, 24(1), 28–45.
Motti, V. G., & Caine, K. (2015). Users’ privacy concerns about wearables. In M. Brenner, N. Christin, B. Johnson, & K. Rohloff (Eds.), Financial Cryptography and Data Security (pp. 231–244). Berlin: Springer-Verlag Berlin Heidelberg. https://doi.org/10.1007/978-3-662-48051-9_17
Nissenbaum, H. (2010). Privacy in context: Technology, policy, and the integrity of social life. Stanford, CA: Stanford Law Books.
Pucher, J., Buehler, R., & Seinen, M. (2011). Bicycling renaissance in North America? An update and re-appraisal of cycling trends and policies. Transportation Research Part A, 45, 451–475.
Pucher, J., & Renne, J. (2003). Socioeconomics of urban travel: Evidence from the 2001 NHTS. Transportation Quarterly, 57, 49–77.
Rawassizadeh, R. (2012). Towards sharing life-log information with society. Behaviour & Information Technology, 31(11), 1057–1067. https://doi.org/10.1080/0144929X.2010.510208
Richards, N. M., & King, J. H. (2014). Big data ethics. Wake Forest Law Review, 49, 393–432.
Savage, N. (2012). Gaining wisdom from crowds. Communications of the ACM, 55, 13. doi:10.1145/2093548.2093553
Schaar, P. (2010). Privacy by design. Identity in the Information Society, 3(2), 267-274. doi:10.1007/s12394-010-0055-x
Shilton, K., Burke, J. A., Estrin, D., Govindan, R., Hansen, M., Kang, J., & Mun, M. (2009). Designing the personal data stream: Enabling participatory privacy in mobile personal sensing. Center for Embedded Network Sensing. Retrieved from http://escholarship.org/uc/item/4sn741ns
Simmons, A. (2014, March 4). In Indianapolis, a bike path to progress. The New York Times. Retrieved from https://www.nytimes.com/2014/03/09/travel/in-indianapolis-a-bike-path-to-progress.html?_r=0
Solove, D. J. (2013). Introduction: Privacy self-management and the consent dilemma. Harvard Law Review, 126, 1880–1903. Retrieved from https://harvardlawreview.org/2013/05/introduction-privacy-self-management-and-the-consent-dilemma/
Sullivan, B.L., Wood, C.L., Iliff, M.J., Bonney, R.E., Fink, D., & Kelling, S. (2009). eBird: A citizen-based bird observation network in the biological sciences. Biological Conservation, 142 (10), 2282–2292. doi:10.1016/j.biocon.2009.05.006
Templeman, R., Korayem, M., Crandall, D., & Kapadia, A. (2014). PlaceAvoider: Steering first-person cameras away from sensitive spaces. Proceedings from NDSS Symposium 2014. San Diego, CA: NDSS. Retrieved from http://www.internetsociety.org/doc/placeavoider-steering-first-person-cameras-away-sensitive-spaces
Tene, O., & Polonetsky, J. (2012). Privacy in the age of big data: A time for big decisions. Stanford Law Review Online, 64. Retrieved from http://stanfordlawreview.org/online/privacy-paradox-privacy-and-big-data/
Toch, E., Cranshaw, J., Hankes-Drielsma, P., Springfield, J., Kelley, P. G., Cranor, L., … Sadeh, N. (2010). Locaccino: A privacy-centric location sharing application. Proceedings of the 12th ACM International Conference Adjunct Papers on Ubiquitous Computing - Adjunct, 381–382. New York, NY: ACM. https://doi.org/10.1145/1864431.1864446
Tuohy, J. (2015, April 16). 1 year and 100,000 rides later, Indy bike-share program thrives. Retrieved from http://www.indystar.com/story/news/2015/04/16/year-rides-later-indy-bike-share-program-thrives/25880751/
Wang, Y., Leon, P. G., Scott, K., Chen, X., Acquisti, A., & Cranor, L. F. (2013). Privacy nudges for social media: An exploratory Facebook study. Proceedings of the 22nd International Conference on World Wide Web, 763–770. New York, NY: ACM. https://doi.org/10.1145/2487788.2488038
Whittaker, S., & Hirschberg, J. (2001). The character, value, and management of personal paper archives. ACM Transactions on Computer-Human Interaction (TOCHI), 8, 150–170. https://doi.org/10.1145/376929.376932
Wolf, K., Schmidt, A., Bexheti, A., & Langheinrich, M. (2014). Lifelogging: You’re wearing a camera? IEEE Pervasive Computing, 13(3), 8–12. https://doi.org/10.1109/MPRV.2014.53
Yoon, A. (2013). Defining what matters when preserving web-based personal digital collections: Listening to bloggers. International Journal of Digital Curation, 8(1), 173–192. https://doi.org/10.2218/ijdc.v8i1.240
Zimmermann, C., Accorsi, R., & Müller, G. (2014). Privacy dashboards: Reconciling data-driven business models and privacy. Paper presented at the Ninth International Conference on Availability, Reliability and Security (ARES), Fribourg, Switzerland. doi: 10.1109/ARES.2014.27
Downloads
Published
How to Cite
Issue
Section
License
Author and journal have the copyright but can be quoted .