Advertisement

Inverting the Panopticon to Safeguard Privacy in Ambient Environments: An Exploratory Study

Conference paper
  • 777 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 12203)

Abstract

Jeremy Bentham is known for designing an institutional building, a prison named a panopticon and some alternatives to this concept. One of the alternatives are the inverted or constitutional panopticon in which the purpose is to let the governed, the citizens’ see and monitor the governors. Hence, the concept of inverted panopticon can be used to describe an analyze privacy protecting devices. In this paper we report on a national study on citizens’ opinion and attitudes to devices that can protect the user from being seen and listened to, with 1289 participants. At this stage of the work, we have not done statistical analysis of factors that might reveal differences between citizens, but as an exploratory study, we provide an overview of how the two privacy protecting devices were received by Norwegian citizens, based on survey responses. Our aim is to build a foundation for future studies that will investigate the inverted panopticon concept in a society in which personal data has become a currency.

Keywords

Privacy Personal data Privacy protection Privacy enhancing technologies 

References

  1. Augusto, J., Nakashima, H., Aghajan, H.: Ambient intelligence and smart environments: a state of the art. In: Nakashima, H., Aghajan, H., Augusto, J.C. (eds.) Handbook of Ambient Intelligence and Smart Environments, pp. 3–31. Springer, Boston (2010).  https://doi.org/10.1007/978-0-387-93808-0_1CrossRefGoogle Scholar
  2. Ben-Akiva, M., et al.: Combining revealed and stated preferences data. Market. Lett. 5(4), 335–349 (1994).  https://doi.org/10.1007/BF00999209CrossRefGoogle Scholar
  3. Cyphers, B., Gebhart, G.: Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance. A Publication of the Electronic Frontier Foundation, 2019 Released Under a Creative Commons Attribution 4.0 International License (CC BY 4.0) (2019)Google Scholar
  4. Elvy, S.A.: Paying for privacy and the personal data economy. Columbia Law Rev. 117(6), 1369–1459 (2017)Google Scholar
  5. Elvy, S.A.: Commodifying consumer data in the era of the Internet of Things. B.C. L. Rev. 59, 423, 446 (2018)Google Scholar
  6. Barth, S., de Jong, M.: The privacy paradox – investigating discrepancies between expressed privacy concerns and actual online behavior – a systematic literature review. Telematics Inform. 34(7), 1038–1058 (2017)CrossRefGoogle Scholar
  7. Bentham, J.: Constitutional code, vol. 1. Rosen, F. (ed.) Clarendon Press, Oxford, 1983 (1830)Google Scholar
  8. Brunon-Ernst, A.: Beyond Foucault: New Perspectives on Bentham’s Panopticon. Ashgate, London (2013)Google Scholar
  9. Chen, Y., et al.: Understanding the Effectiveness of Ultrasonic Microphone Jammer, vol. 1, no. 1, April 2019 (2019). 17 pagesGoogle Scholar
  10. DeMoranville, C.W., Bienstock, C.C.: Question order effects in measuring service quality. Int. J. Res. Mark. 20(3), 217–231 (2003)CrossRefGoogle Scholar
  11. Galič, M., Timan, T., Koops, B.-J.: Bentham, Deleuze and beyond: an overview of surveillance theories from the panopticon to participation. Philos. Technol. 30(1), 9–37 (2017).  https://doi.org/10.1007/s13347-016-0219-1CrossRefGoogle Scholar
  12. Gao, C., Fawaz, K., Sur, S., Banerjee, S.: Privacy Protection for Audio Sensing Against Multi-Microphone Adversaries (2019).  https://doi.org/10.2478/popets-2019-0024
  13. Grice, H.P.: Logic and conversation. In: Cole, P., Morgan, J.L. (eds.) Syntax and Semantics 3: Speech Acts, pp. 41–58. Academic Press, New York (1975)Google Scholar
  14. Li, Z., Rathore, A.S., Chen, B., Song, C., Yang, Z., Xu, W.: SpecEye: towards pervasive and privacy-preserving screen exposure detection in daily life. In: The 17th Annual International Conference on Mobile Systems, Applications, and Services (MobiSys 2019), 17–21 June 2019 (2019)Google Scholar
  15. Malkin, N., Deatrick, J., Tong, A., Wijesekera, P., Egelman, S., Wagner, D.: Privacy Attitudes of Smart Speaker Users (2019).  https://doi.org/10.2478/popets-2019-0068
  16. Mann, S., Nolan, J., Wellman, B.: Sousveillance: inventing and using wearable computing devices for data collection in surveillance environments. Surveill. Soc. 1(3), 331–355 (2003)CrossRefGoogle Scholar
  17. Mann, S.: ‘Sousveillance’: inverse surveillance in multimedia imaging. In: 12th Annual ACM International Conference on Multimedia. ACM, New York (2004)Google Scholar
  18. Preibusch, S.: The value of privacy in web search. In: Proceedings of the Twelfth Workshop on the Economics of Information Security (WEIS) (2013)Google Scholar
  19. Strack, F.: “Order effects” in survey research: activation and information functions of preceding questions. In: Schwarz, N., Sudman, S. (eds.) Context Effects in Social and Psychological Research, pp. 23–34. Springer, New York (1992).  https://doi.org/10.1007/978-1-4612-2848-6_3CrossRefGoogle Scholar
  20. Streitz, N., Charitos, D., Kaptein, M., Böhlen, M.: Grand challenges for ambient intelligence and implications for design contexts and smart societies. J. Ambient Intell. Smart Environ. 11(1), 87–107 (2019). Tenth Anniversary IssueCrossRefGoogle Scholar
  21. Tjostheim, I., Waterworth, J.A.: Predicting personal susceptibility to phishing. In: Rocha, Á., Ferrás, C., Montenegro Marin, C.E., Medina García, V.H. (eds.) ICITS 2020. AISC, vol. 1137, pp. 564–575. Springer, Cham (2020).  https://doi.org/10.1007/978-3-030-40690-5_54CrossRefGoogle Scholar
  22. LNCS Homepage. http://www.springer.com/lncs. Accessed 21 Nov 2016

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Norwegian Computing CenterOsloNorway
  2. 2.Umeå UniversityUmeåSweden

Personalised recommendations