The importance of visibility for folk theories of sensor data
نویسندگان
چکیده
Sensor-enabled wearable devices and smartphones collect data about users’ movements, location, and private spaces and activities. As with many ubiquitous computing technologies, this data collection happens in the background and appears “seamless” or invisible to the user. Despite this, users are still expected to make informed choices regarding consent to data collection. Folk theories are sets of beliefs and understandings that arise informally and guide decision-making. To investigate folk theories regarding sensor data collection that might guide privacy self-management decisions, we conducted qualitative free list activities with 30 activity tracker users in which we asked them to list “information that an activity tracker knows”. We found that folk theories regarding the data that activity trackers collect depend on interactions between the users and their trackers that provide visibility into dependencies among data types, evidence about what trackers are able to record, and feedback that inspires speculation about how trackers work. Our findings suggest opportunities for designing interfaces that intentionally support the development of folk theories about how sensor data are produced and how they might be used, which may enable users to make more informed privacy self-management decisions.
منابع مشابه
Investigation of Behavior and Trend of Nitrogen Dioxide in Tehran Using OMI Satellite Sensor Measurements
Air pollution is one of the most important problems in the world’s major cities in the last century because it endangers human health and the environment. One of the indicators of air pollution is nitrogen dioxide, which is continuously measured by satellite from space and via ground-based instruments. In this paper, the data for nitrogen dioxide was measured by OMI over Tehran. Wind, surface t...
متن کاملDesigning a Home Security System using Sensor Data Fusion with DST and DSMT Methods
Today due to the importance and necessity of implementing security systems in homes and other buildings, systems with higher certainty, lower cost and with sensor fusion methods are more attractive, as an applicable and high performance methods for the researchers. In this paper, the application of Dempster-Shafer evidential theory and also the newer, more general one Dezert-Smarandache theory ...
متن کاملIdentifying and Examining the Importance of Ethical Theories in Auditing from the Perspective of Experts and Practitioners
Background: Attention to ethical philosophy and in particular ethical theories is necessary for audits. The purpose of this study is to identify and examine the importance of ethical theories in auditing from the perspective of experts and professional activists. Method: This research is a combination of qualitative and quantitative methods. Qualitative part is conducted by Delphi and content ...
متن کاملRegion Directed Diffusion in Sensor Network Using Learning Automata:RDDLA
One of the main challenges in wireless sensor network is energy problem and life cycle of nodes in networks. Several methods can be used for increasing life cycle of nodes. One of these methods is load balancing in nodes while transmitting data from source to destination. Directed diffusion algorithm is one of declared methods in wireless sensor networks which is data-oriented algorithm. Direct...
متن کاملRegion Directed Diffusion in Sensor Network Using Learning Automata:RDDLA
One of the main challenges in wireless sensor network is energy problem and life cycle of nodes in networks. Several methods can be used for increasing life cycle of nodes. One of these methods is load balancing in nodes while transmitting data from source to destination. Directed diffusion algorithm is one of declared methods in wireless sensor networks which is data-oriented algorithm. Direct...
متن کامل