Working papers in Information Systems MOBILE TELEPHONY

advertisement
Working papers in
Information Systems
PRIVACY MANAGEMENT FOR NEXT GENERATION
MOBILE TELEPHONY
Steinar Kristoffersen
WP 8/2005
Copyright © with the author(s). The content of this material is to be considered preliminary and are not to
be quoted without the author(s)'s permission.
Information Systems group
University of Oslo
Gaustadalléen 23
P.O.Box 1080 Blindern
N-0316 Oslo
Norway
http://www.ifi.uio.no/~systemarbeid
Kristoffersen
Copyright © with the author(s). The content of this material is to be considered
preliminary and are not to be quoted without the author(s)'s permission.
Privacy management for next generation mobile telephony
Steinar Kristoffersen
Dept. of informatics
University of Oslo
P.O. Box 1080 Blindern
0316 Oslo
Norway
<steinkri@ifi.uio.no>
+47 2284 2409 (phone)
+47 2285 2401 (fax)
Abstract:
This paper is concerned with privacy management in settings where mobile telephones
with Dictaphones and cameras are becoming commonplace. Such phones have been
banned in several places, due to privacy concerns. Increasingly restrictive personal data
legislations coming from, e.g., the EU Commission indicates that this is not simply an
instinctive response to unknown technology and “Orwellian” scenarios. However,
prohibition also rules out many productive and enjoyable applications of next generation
mobile telephony in these settings. Therefore, an alternative and much more nuanced set
of schemes should be explored, and that is the scope of this paper. It looks at the much
richer ideas of awareness, privacy and control of objects in a shared space that is coming
from Computer-Supported Cooperative Work (CSCW) and contrasts them to the
available mechanisms for privacy management in mobile telephony. The result is a new
model for privacy management that may be used to implement a higher level of personal
control with the increasing and potentially sensitive information flow caused by
ubiquitous multimedia in next generation mobile telephony.
Citation: http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
1.
Introduction
The Scottish Secondary Teachers’ Association last year called on all local authorities in
Scotland to issue clear instructions banning the use of mobile phone cameras within
schools1. There are other examples as well, where mobile phones with cameras are seen
to represent a huge risk to the personal safety of pupils and staff and to the human rights
of the individual to privacy2. The foundation of the argument is that there is such as thing
as a natural right to privacy3, which for instance comprises the control over the use of
images. Mobile telephones, then, are a threat to that right.
This is not simply a matter of badly conceived technology “creating” an opportunity for
malicious behaviour. There is a wider set of issues at stake, and this is reflected by the
European Union by the relatively recent Data Protection Directive 95/46/EC.
Governments see themselves as having to control the flow of information in society, on
the notion that privacy will not be sufficiently well managed otherwise.
The paper is motivated by this “knee-jerk” response by governing bodies to the alleged
privacy threats brought on by data communication, multimedia and mobile telephony
converging. It explores existing ideas of privacy management from various domains,
predominantly CSCW (Computer Supported Co-operative Work) and Computer Ethics.
The objective of this paper is to elicit from that some core concepts and, eventually, a
model that can improve the realisation of privacy management in next generation mobile
systems.
The wider goal of the research presented here is to discern, reason about and evaluate
privacy management models that afford a much more nuanced and liberal approach than
prohibition by furnishing users with mechanisms to control the flow of personal and
potentially sensitive information (even if it is captured with somebody else mobile phone).
Mobile telephones are becoming universal. Average ownership in Europe is above 55%
and Spain, Norway, Iceland and the Czech Republic are among the countries that have
1
http://www.ssta.org.uk/PressReleases/PressRelease_mobilephoneban.htm
http://news.bbc.co.uk/1/hi/england/wear/3390909.stm
3
In a neo-Lockean sense?
2
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
more than 90% cell phone coverage in the population. Luxembourg, Taiwan, Italy and
Hong Kong, to name a few, are above 100% 4 . At the same time, the technical
functionality of mobile telephones is broadening. Most new models have digital highresolution cameras with zooming capabilities, as well a Dictaphone. Using Multimedia
Messaging Services (MMS), data thus recorded can easily and widely be distributed.
Mobile telephones are small and fashionable5 and they are waterproof, which means that
they can inconspicuously be used in entirely new settings.
There is, arguably, convergence of internet technologies and mobile telephony, which
enriches the communication possibilities of such devices immensely (ITU Internet
Reports 2002: Internet for a Mobile Generation 6 ). The problem is that using this
technology, people can compile potentially compromising material about each other (or
themselves) in an inconspicuous way. Still, the models that such devices implement in
order to let the users manage their privacy, the projection of their activities upon others
and (reciprocally) their awareness of others, are very crude indeed. You are either online,
or you are offline. Most cellular phones have profiles which allow them to be roughly
adapted to the specific use context, by adjusting ring volumes, activating vibration, etc.
Moreover, one can usually create “ring groups” to which contacts may be assigned in
order to get an audio cue as to who is calling. Many cellular networks are starting to offer
the possibility of location-based services7, and for those users are usually required to
request, accept and receive information across SMS (Simple Messaging Service) or WAP
(Wireless Application Protocol). However, many complaints have been made about
insufficient and unreliable privacy management associated with such services8.
When others have been concerned with issues of privacy and mobile telephony, it has
mainly been linked to positioning services (Barkuss and Dey 2003) or the intrusion of
(loud) speakers of their private conversations if, indeed, that is what they are, on others
4
http://www.itu.int/ITU-D/ict/statistics/at_glance/cellular03.pdf
http://www.phonecontent.com/bm/news/nokia/7200.shtml
6
http://www.itu.int/osg/spu/publications/mobileinternet/
7
http://www.wireless.expert-views.com/2005/02/nokia-launches-next-generation-platform-for-locationbased-services-in-gsm-and-wcdma-3g-networks/
8
http://www.aftenposten.no/nyheter/nett/article387527.ece
5
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
(Laurier 2001). Network snooping is considered in this paper as a technical challenge (on
the network level) for operators, and, however important. It is therefore outside the scope
of this paper which is concerned with users’ as well as non-users’ privacy management,
its underlying models and philosophies and the services offered to them for that purpose.
2. Privacy in CSCW
The work on privacy in CSCW is pertinent because many of the technologies that are
now driving the convergence of mobile telephony and ubiquitous computing, have been
central to that community (Boyle et al. 2000). CSCW has, moreover, seen its work on
privacy underpinned by a fair amount of empirical work and testing (Hinckley, Ramos et
al. 2004). This is not to say that it is from within CSCW that the most profound
theoretical reflections on this topic are coming, nor is it a claim of this paper that the
models of privacy and the implementation of such models in this area are unsurpassed by
contributions from other fields. However, in CSCW it was acknowledged early that:
“Increasingly, we are seeing such systems incorporate sensors such as
microphones, cameras and signal receivers for wireless communication. These
sensors have the potential to transmit information such as speech, video images,
or signals from portable computing devices, active badges (…), and so on
(Bellotti and Sellen 1993, p. 80)”.
What was described and reasoned about as “ubiquitous computing” and CSCW then, is
mobile telephony today.
In a recent paper, Palen and Dourish (2003) set out claiming that “In an increasingly
networked world, privacy-protection is an ever-present concern (ibid p. 129).” They state
that privacy is such a broad concern that one needs improved conceptual models in order
to reason analytically about it, and they state that “Privacy regulation is complicated and
has a range of functions, from maintaining comfortable personal spaces to protecting
personal data from surreptitious capture (ibid p. 129)”.
Privacy, according to this model, is contingent and multi-faceted. Building on Irwin
Altman, they outline a model comprising three boundaries: Disclosure, identity and time.
Altman subscribes to a theory of privacy as restricting access to one’s self. Thus, the
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
model of privacy proposed by Palen and Dourish can be seen as the dynamic process of
negotiating access to the personal sphere along these boundaries.
The boundaries that constitute the core of Palen and Dourish’s model are implicitly
assumed and even applied in previous work as well. For instance, Bellotti and Sellen
(1993) argue that a framework for the design of privacy in ubiquitous computing
environments is needed. The paper departs from an assumption (commonly made also in
the domain of mobile phones with cameras, as was shown above) that computers can be
put into insidious, unethical, malicious use. Information technology leads to increasing
capture and storage of information about people and that raises serious concerns about the
protection of privacy. Moreover, poor design results in invasive technology. Badly
designed user interfaces make the technology intrusive. Thus, it can interfere with crucial
social mechanisms and they claim that privacy challenges are brought to the fore by the
ways in which technology attenuates feedback and control mechanisms.
They say that “In attempting to design systems which reduce invasions of privacy, it
would be useful to have a practical working definition of the concept (p. 78)”, but they do
not offer one in the paper. However, Bellotti and Sellen propose a design framework that
relies implicitly on an understanding of privacy similar to the model suggested by Palen
and Dourish (op. cit). The design framework can therefore be seen as a manifest that
describes privacy management for such environments. The framework can briefly be
descried as a set of design questions asked (on behalf of a hypothetical user) about which
information is gathered when, its distribution and usage. The crux of the design
framework is that it explicitly states that this information should be fed back to the user
and that the user should act on these grounds to exert control over exactly those factors.
So, similarly to Palen and Dourish, Bellotti and Sellen proposes a model based on
contingent negotiation of access to information, and validation of the purposes of its use.
They are, however, not concerned with the boundaries of self versus other, at least not
explicitly, so correctness of representation is not an issue here.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
Paul Dourish (1993) has also looked at matters relating to privacy in an entirely different
context, namely that of implementing a system to control the Media Space application of
Xerox’s laboratory in Cambridge. Dourish describes a software package by which the
system can be controlled by the actors. Interestingly, there is a lot of emphasis in the
paper on the interplay between the transparency of the technical platform, i.e., “all” the
users know how to configure the system themselves, and the cultural setting; which are
“the social components which determine acceptable use and behaviour”. The paper
emphasizes especially the flexible and dynamic control of the users with regards to who
can access their personal sphere. So, quite narrowly, the system relies on an assumption
of privacy as a matter of regulating access. Moreover, Dourish emphasize the importance
of co-adaptation between the technology and the culture of the workplace in which it was
used. The system, one must say, was a success in this context inasmuch as it was
deployed and used over a number over years. There was no explicit sign-up to the
technology, it was simply made available to new members of the lab. Of course, this also
points in the direction of workplace culture and expectations stipulating “adoption” of
technology.
Richard Harper has described a related development effort from a slightly different point
of view (Harper 1992). He found that adoption and use of technology, even in a situation
where privacy potentially was very much at stake, was guided by organizational roles and
job responsibilities, as the users perceived them. So, in one organization, users accepted
the technology because they considered it their job to partake in experiments pertaining
new technology, even though they were wary of the potential consequences. In another
organization, people more openly recognized the need for the system, and seemed to
make the trade-off that it would be beneficial to them, although they did recognize the
challenges related to privacy “elsewhere”.
The importance of company culture is quite easily illustrated with a reference to a similar
infrastructure introduced on the workshop floor of production facilities in the UK and the
Netherlands, a setting in which emphasis was with the practical adaptation and fitting
of ’bad’ technology into good organization practices (Pagani and Mackay 1993). They
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
describe how engineers and designers recast the technology from a ‘videophone’ into a
tool for technical inspection of the production line. Video was not adopted as an
interpersonal communication medium, but voice was used instead. In an office share
between two other groups of users in the same company, it did not particularly bother the
users that the technology was unreliable and plagued by latency. It could for example
show people in their offices long after they had left. Even so, it was described as “nice-tohave” and a medium that brought the two groups closer, with the “small” modification
that it was simply not relied upon as a source of information.
A lot of the work with privacy in CSCW has ended up concluding that privacy is social
“through-and-through” and that most of the responsibility can be handed off to users, if
they are granted sufficient control and understanding of the technology. A
complementary design recommendation has often been that of reciprocity, in other words,
when creating a system that might compromise privacy; one should make sure that it is
mutual. It is normally a property of physical spaces that when someone else can see or
hear you, then there’s a good chance that you will see and hear them (Fish et al. 1993).
Hong et al. recognize that we all perceive privacy differently (Hong et al. 2004). They
describe privacy as a design issue, similarly to Bellotti and Sellen (op. cit.). Also,
implicitly, they subscribe to the model of privacy as contingent and relative, since they
aim to provide designers with a model that can be implemented to offer a
“reasonable level of privacy that is commensurate with the domain, with the
community of users, and with the risks and benefits to all stakeholders in the
intended system (Hong et al. 2004)”.
There are some very interesting assumptions underpinning their work. They focus,
explicitly, on privacy as a separate concern from system security, and claim that
knowledge (of location, e.g.) is not in itself harmful to the “self”. It is the risk of being
subjected to distress that the model is intended to prevent. Moreover, Hong et al. also see
that risk is a trade-off between concerns, e.g., sometimes the greater society’s needs must
rise above that of individuals (for instance when cars are required to carry license plates).
The model that they propose consists of a serious of highly relevant questions that should
be asked by designers when creating technical solutions that might obstruct users’ need
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
for privacy. There is in principle nothing that separates this model from those surveyed
above. Albeit it does contain some new questions, they still pertain only to the trade-offs
that have to be made when giving up a piece of information, the desire to need what is it
used for and by whom, etc.
There are a couple of new perspectives in this mode, for instance that it explicitly is
concerned with the value proposition to the users that “give up their privacy” and,
contrary to their conceptual groundwork they mix into it some elements pertaining to data
security. Still, it has to be described as a contingent, relational model in which regulation
of access through managing the risk of unwanted disclosure, the control of information
dissemination through data security concerns and the verification of representation as part
and parcel of the model asking questions about the quality of the information stored.
Summarizing the point of view of some seminal contributions in CSCW privacy is
fundamentally a derived phenomenon. It is treated, and to some extent with success, as a
design issue, although of course this is quite an extreme stance compared e.g., to the
stance of the European Commission. We find, like in Harpers work, that it is interpreted
differently between different cultures (Harper 1992). Privacy, in this manifestation,
makes and aims for the possibility to withdraw from exposure through access regulation.
Consistently also, there is keen interest in furnishing control over personal information. It
is in some sense treated as the subjects’ own property, a property of which they are
entitled to exclusive control. Concern with the correctness of representation is not dealt
with consistently in CSCW.
Interestingly, CSCW has not picked up many other perspectives on privacy that have
been discussed elsewhere in the literature, for instance in business ethics and philosophy.
For instance, some see privacy as a derived implication from that of personal security, or
the right of freedom from the judgement of others. These issues will be discussed again
towards the end of the paper.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
3. Next generation mobile telephony
We have already, pretty much everywhere, entered a world of online, omnipresent,
multimedia recording devices. One need not speculate what the next generation of mobile
telephony will be like exactly. Looking at reports from the industry (Ralph 2002; Harmer
2003), one can assume that it will be pretty much like we have already, only “better”,
using:
•
Packet-switched network connections, potentially “always on”
•
Overweight on prizing per data volume, but some fixed prices services that would
otherwise be much too expensive on an item-per-item basis
•
Simple- and Multimedia Messaging Service (SMS, MMS), for which the industry
will primarily continue to develop machine-to-person services, i.e., ring tones,
logos, animation and videos, eventually
•
The mobile phone is and will continue to be a high-resolution (video) camera with
a Dictaphone, and these elements can be combined in messages or emails as well
as in real-time video conferencing, and there will be
•
Location based services (based on network triangulation as well as GSM)
•
M-commerce, in which e-cash and credit card usage may leave tracks of
consumer behavior, etc.
Unfortunately, there is not much empirical research on the use of mobile telephony
around:
“While technological innovations in general have been the focus of a wealth f
research, telephony, and more specifically mobile telephony, is only just
beginning to be studied in any depth (Lacohée et al. 2003, p. 206). “
Taylor and Harper has written a nice “design-oriented sociology” of the ways in which
young people use SMS on mobile phones to exchange “gifts” of value, such as emotive
texts, jokes, graphics, etc (Taylor and Harper 2003). Privacy is not a concern of their
paper; however, one can easily see the correlation to multimedia messages created
combining photos of friends (or foes) with personalized messages (Berg, Alex et al.
2003), so the relevance is still clear.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
In (Perry et al. 2001) there is a brief exploration of how mobile telephones where used by
traveling workers to keep abreast with developments in the workplace whilst they were
away. Their account shows that even businesspeople were using the mobile phone in an
informal, preemptive fashion, to make open enquires even of a social nature, at the office.
These calls were made on the discretion of the mobile user. This way of using the phone
for updates of a “peripheral” nature corroborates with that of informal communication in
CSCW (Fish et al. 1993). In CSCW, on the other hand, emphasis usually has been on
serendipitous encounters (Bellotti and Bly 1996; Bergqvist et al. 1999; Edwards 1994)
rather than the very formal establishing of sessions that can be found in mobile telephony
(Cesare 2001, Yigal et al. 2000).
Palen et al. looked at a small number of new mobile telephony users using interviews and
“voice mail feedback” data from the users to find out how their phone practices evolved
over a period of six weeks. They found that users quite rapidly modified their perception
of the appropriateness of mobile telephony usage to different circumstances9, and that
these device, clearly, were (considered) part of the socio-technical network (Palen et al.
2000).
Palen et al. make the claim that privacy violation concerns have shifted from the nonusers’ infringement on the users private communication to the mobile speaker’s
infringement upon the ears and thoughts of the non-users. It might be that some people
would consider this a matter of “pollution” rather than privacy. One could, arguably,
claim that the notion of privacy does not really apply to situation in which the disclosing
party is not making a reasonable effort to protect it (McArthur 2001). One might, on the
other hand, say that people sometimes do not know their own good, but even if they did,
there are two parties in a phone conversation and the second party is indirectly exposed
9
This is something that most of us, perhaps, remember from our own “careers” as owners
of a mobile phone: From skepticism and even prejudice about what people think they are
and do when they insist on making their private calls a public concern, via
superenthusiasm that makes us carry the phone around with us everywhere and then to
some sort of organizationally or culturally co-adapted pattern of usage where one either is
expected to answer a call in the middle of a meeting, or to turn it off from the beginning.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
through such conduct. Still, one does see from this that the “non-user” of information that
is communicated in a phone conversation is not the intended, voluntary recipient of the
message. In CSCW, however, there are multiple receivers, all of which are intentionally
“targeted” and the concern is usually not that they might “connect” inadvertently, but
rather that the “communication” (and thus implicitly the “content”) might not be
deliberate.
The symbolic meaning of either the message or the device or the act of actually making a
call might still be directed at a larger audience, of course, and this has been pointed to by,
for instance, Rich Ling (1996). The act of impressing ones peers might have a bearing on
how people manage their privacy. Also, Ling maintains that teenagers buy-in so strongly
to mobile telephony because they are interested in being accessible to their peers. The
telephone is used for micro-coordination (Ling 2001). In another report, Ling and Yttri
(1999) use the term “hypercoordination” to include social and emotional aspects. SMS,
for instance, is often “low in informational value but high in terms of social grooming
(Lacohée et al. 2003, p. 206).”
This paper disagrees with these interpretations of “co-ordination”. When people phone
home to say that they are, in fact, on the bus on their way home, it is not because the
information shall be used to do coordination work. It still is important, however, since
“… it shapes the character of the ordinary geographical work that we need to do
every time we are talking to people we know but we know not where (Laurier
2003). “
In other words, it is used to establish a communicative context that is otherwise, from
landline telephony, implicitly known (Lacohée et al. 2003, p. 207).
Palen et al. observed many different strategies for managing access, and, if privacy shall
be interpreted as regulation of access to one’s personal sphere, then this is a relevant
concern. Some subjects forwarded all calls to their mobile phone, some subjects kept
their phones off all he time, and most subjects struggled with deciding whether to answer
calls from blocked or unknown numbers. Some people limited the distribution of their
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
phone numbers (Palen et al. 2000). This is corroborated by another study of mobile
telephony usage, in which as many as 70% said that they were restrictive about giving out
their phone number. Even more surprising, perhaps, was that only 18% gave the number
freely to their friends (Licoppe and Heurtin 2001, p. 100).
Green et al. find that rather than being devices that transcend spheres and cross existing
boundaries of private and public space, mobile devices are “space adjusting technologies”.
This is quite similar to the ambitions that underlie CSCW research (Green et al. 2001).
They make it worth noticing that
“Both individually and in concert therefore, people develop strategies to maintain
or reconstruct boundaries of public and private space (ibid p.149).”
One way that that people are reconstructing space, is by actively acting as if conversation
cannot be overheard, (Goffman 1963). There is probably a great difference in the extent
to which that will work in the same way in a workplace setting compared to a public
place. Goffman’s work is about behavior in public places, and one particular
characteristic, almost the fundamental aspect, of public places is that they are arenas in
which people can gather to exchange ideas, rather privately and in quite skillfully
restricted settings. Think of the walk in the park, the pub or clubs of various orientations.
These public “places” are not unrestricted. Family life, on the other hand, is private, as
private as can be, but communication within that sphere is not at all qualified in the same
way as exchanges in the public spaces. On the contrary, any topic can be brought up.
Participation, however, is of course heavily restricted. Workplaces can be seen as a third,
distinctive setting in which, again, separate conventions and practical arrangements
govern membership, participation and communication. CSCW and ubiquitous computing
have been concerned with this arena, an arena in which one cannot, generally, get away
with pretending that no one can overhear a private conversation. Therefore, also, people
tend to leave the meeting room to talk outside, even if there are more people on the
outside than on the inside, and the meeting cannot go on anyway because the other
participants are waiting for them to get back in. People are neither fundamentally lazy,
nor rude.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
Licoppe and Heurtin argue that mobile telephony is reciprocal. They found a correlation
between the number of outgoing and incoming calls, and place this within the larger
context of managing bi-directional social bonds. It is easy to agree with them when they
assert that
“Reciprocity does not occur only within the improvised regulation of sequences of
telephone calls between two parties; it pervades a web of interactions through
different channels (Licoppe and Heurtin 2001, p. 107).”
One might then summarize the finding of modern mobile telephony usage, contrasted to
that of ubiquitous computing in CSCW, as listed in the table below:
Properties
Information flow
Aligned with space
Location co-ordinates
Communication
Number of non-users
Status of non-users
Status of receivers
Co-ordination level
Reciprocality
Technology transparency
Session management
Ubiquitous computing
(CSCW)
Pull
Private
Contextually-derived or à
priori familiar
One-to-many
Few
Dynamic
Sometime anonymous
Micro (at the core)
Low
High
Serendipitous, continuous
often symmetric
Low
Symbolic value of
communication/devices
Low
Emotive and social weight
of communication
Access control transparency Low
Mobile telephony
Push
Public
Explicit
One-to-one
Many
Static
Never anonymous
Macro (if at all)
High
Low
Conscious, discrete, often
asymmetric
High
High
High
Table 1: Some important properties of existing privacy models in CSCW and telephony
It seems that in CSCW, particularly because the research into most of these technologies
has been motivated by the desire to support peripheral and direct awareness as one
important factor in informal communication, privacy models have been concerned with
information that is pulled from the private subject. For mobile telephony, it is the other
way around. That is to say, on a technological perspective, information is pushed. If the
mobile phone is used as a camera to ‘spy’ on third-parties, however, the picture becomes
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
fuzzier, but that first step of “pulling information off” someone is still carried out by
someone within the private sphere.
CSCW is designed to work in the workplace, which is a private place compared to the
global distribution of mobile telephony. Communication in CSCW has been, in terms of
awareness information, going from one-to-many: Generally, CSCW-systems have been
set-up to broadcast information. Mobile telephony, on the other hand goes from one
handset to another. For many applications of 2.5 and 3G cellular networks (e.g., SMS,
MMS) messages and pictures can, indeed, be sent to many receivers. This is, in the
perspective of this paper, however, considered a local, application level facilitation of
one-to-one communication. The network transmits them in a “serialized” fashion; it has
no concept of a group. One interesting exception is the “buddy”-oriented location
services and group-based chat-services that are becoming more widely available now,
even in cellular network. These applications indicate some common ground even on the
conceptual level between “groupware” and telephony. Moreover, they underpin clearly
the hypothesis of this paper that lessons can be learnt from CSCW to mobile telephony
and perhaps also that seamlessly integrating the functionally of these two domains will be
a requirement. One must expect PC users to wish to chat with friends who are currently
away from their desks, using the best technology available to them.
CSCW has really not been much concerned with non-users, and if there are any, their
status is dynamic inasmuch as much of the focus of these environments has been to make
the transition from non-user to user easier (session management). This is inextricably
linked to the point below, namely that it is used for micro-coordination. In mobile
telephony this is always opposite. If you are in the loop, you are in the loop. The caller
knows the “called“, and no-one else is supposed to eavesdrop. There are exceptions, but
then act of communication in the fashion or parts of the communication itself has
symbolic rather than substantial value.
CSCW-systems are usually not fully reciprocal; instead one can perhaps say that they are
asymmetric. In mobile telephony it is the other way around. There are other differences
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
as well. Sessions are usually managed in an implicit fashion by CSCW-systems and many
of the experiments that have proven successful have exposed the underlying
infrastructure to technologically skilled users. Communication content in CSCW has been
work-oriented and co-ordination intense, but has carried very little emotive weight. With
telephony it is the other way around. Much communication is low in information content,
but high in social management (Ling 2001). Finally, a phone is off when it is off. Many
CSCW systems are technically speaking always on, and “off” only when no-one are
looking/listening. Therefore, one might actually argue that it is mobile telephony usage
that is socially sanctioned, whilst CSCW continually tries to develop technological means
for regulation; this is quite the opposite of what is sometimes claimed (Dourish 1993).
4. Revisiting privacy
The notion of privacy as a relational (or more broadly speaking, contingent) and relative
concept is common beyond the CSCW-community of course. Introne and Pouloudi
(1999), coming from the Business Ethics community, share this view. Going further still,
they maintain that privacy is essentially the freedom or immunity from the judgment of
others and the right to critically examine the relationships to others in a particular context.
They go on to make an argument that deeply shows the relationship between their
position and that of the previous authors (and indeed the Directive 95/64/EC): They
maintain that only the information about others that is relevant and appropriate to the
particular (and appropriate) judgment, should be made available. This really only
extends the argument of control into a extreme position, since it denies other members of
society at least as fundamental rights as privacy, such as freedom of speech and thought
and the exclusive right to their own mind. Moreover, Introne and Pouloudi suggest a
principle of equal power, so that all stakeholders ought to have equal opportunity to
successfully make a claim to privacy (ibid). One might say that this principle seems
overly idealistic compared to the true state of the world.
The stand of Hong et al, that was mentioned earlier (Hong et al 2004), on privacy as
something entirely separate from system security is very different from that of Thompson
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
(2001). Thomson argues that some issues often associated with privacy is better analyzed
in quite different terms, namely that of personal security (ibid).
The risk at stake then is not that private information might get known, but that others
might threaten the security of the originator. Confidentiality, for instance, is something
often “lumped” into the concept of privacy. It should, according to Thompson, instead be
seen as a “managerial” responsibility; a contractual response to the request for an
exchange.
It is within this perspective that the first sketch of an “integrity-preserving model of
privacy” fits. It is possible to model the “multimedia capture and send” aspect of mobile
telephony applications such as MMS, quite neatly using a simple state chart, thus getting
ready to launch more elaborate and integrated models later:
capt
4
send
1
send
end
capt
2
store
0
3
store
item
5
item
empty
Figure 1: A model of mobile telephony "capture and send" applications
Rather informally, still, Figure 1 shows how such applications start from a state (number
0) from which the users decides to capture something using, e.g., the Dictaphone or
vide/camera of the mobile phone. The phone is a “black box” which responds with
issuing the
capt
action. The user (with a device now in state 2), can analogously either
store or send the content (multiple times, if desired, in alternating sequence) before
concluding with an end-command. Alternatively, from state 0 (the start state), the user
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
can go to the multimedia storage of the device and perform the same actions reusing
existing objects. The mode matches some of the aspects pointed to in
Table 1 inasmuch as the information is pushed, it makes no reference to the spatial
context of use and therefore it can be seen as embedded in a fully public space.
Communication is one-to-one, potentially (and manually) one-to-many in the limited
fashion explained above and the receivers are explicitly known (although this is not easy
to see in the model, yet, at this high conceptual level, they have to be “picked” in order
for the sender to “send”). Location information sharing could be modelled analogously to
multimedia capture. Sessions are seen as highly discrete, even discontinuous and
asymmetric (the senders can go on with their business irrespective of acknowledgement
of receipt).
Similarly, a (typical) CSCW application with “capture and send” functionality can be
drawn as a state chart, showing how the “same time - different place10” category can be
modelled. It is not the aspiration of this paper to say that the two models are comparable
or that they ought to be more or less different than what they are. The aim is to start
reasoning more precisely about exactly which properties such privacy management
models have (or ought to have).
10
http://www.cc.gatech.edu/fac/Gregory.Abowd/hci-resources/area-bok/cscw.html
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
check_send
1
4’
send_ok
capt
capt_ok
4
send
no_send
check_capt
send
1’
2
capt
item
no_capt
store
0
end
check_store
store
no_store
3
store_ok
3’
5
item
empty
Figure 2: The "CSCW extension" to the “capture and send” model
In this model, each operation is preceded by the application looking up if the intended
operation e.g., capture), is allowed, given a set of criteria and potentially known
stakeholders not visible in the diagram on this level of detail. Information can be
“pulled”, due the combination of the “same-time-different place” type of application and
the “check_cap” (e.g.) action. Still, there is a lot of functionality missing from the model,
e.g., the notion of context and the status of non-users. Co-ordination is still (in terms of
applications- and thus privacy management) taking place on a macro level.
Not all aspects of privacy management in the two pertinent domains have been included,
yet. Reciprocity is one aspect of privacy that is perhaps overrated (which in future
research pertaining to this paper will be considered an empirical question) and might even
be misguided (a theoretical concern, potentially). Hudson and Smith (1996) present a nice
argument in which they point to the problems of reciprocity forcing all spaces to become
public spaces, all events becoming equally important and therefore, whilst purporting to
represent a property of face-to-face encounters in physical spaces it really implements
some rather disruptive anomalies that were never really part of the physical word. For
instance, if someone enters a large room then that experience in itself consumes all of the
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
attention of person entering (presumably), but might and should go largely unnoticed by
most of the people already in the room. A digital environment cannot really represent
such analogue qualities very well, regardless; however, the abstract model of session- of
privacy management ought to be able to capture such properties. For this purpose, the
models above will have to be extended in future research.
5. Conclusion
This paper has shown that the ideas coming out of CSCW with regard to privacy are
probably not instantaneously useful with regard to resolving the challenges imposed on
us by networked mobile telephones with cameras and Dictaphones. To begin with, they
are very different, and much work remains to reconcile the underlying models of privacy
management. This will be pursued in future work. One working hypothesis of this paper,
that CSCW can be seen as a constitutive factor of modern mobile telephony and therefore
would offer particularly useful lessons for that domain, remains promising, but “to be
proved”. This work might also become useful inasmuch as it can test whether
omnipresent multimedia devices of 3G telephony, that so clearly carry with them
technological components that are similar or even exactly the same as those from within
CSCW, are really the products of such a convergence after all.
This paper has pointed to quite longitudinal practical experiments with technology that
potentially could compromise the privacy of its users. It is a strong indication that privacy
is foremost a pragmatic, contingent and dynamic value when its success or failure
depends so much on the culture of the setting and the practical circumstances, and is
negotiated within those terms. That would also explain how similar groups produce
different results upon encountering the same technology (Kraut et al. 1994). There is
probably some truth in both. We should therefore continue unpacking and splitting the
notion of privacy to find out, for each and every type of practical situation, exactly in
which ways the social construction of this “hybrid” takes place.
The conclusion is that it one should start considering the introduction of mobile
telephones with data processing capabilities neither as telephones, computers nor
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
something in the middle. Rather they should be treated, at least with regards to the
challenges of understanding and maintaining privacy, as an entirely new phenomenon in
its own right. More elaborate theoretical thinking is needed. The notion of reflexivity
(Beck 1986), for instance, springs to mind, since clearly a technology has been created to
reach people anywhere, anytime, that at the same time makes it impossible for them to go
certain places, for instance to take a shower in a public changing room after working out.
Hong et al. do claim that security and privacy are related, but interestingly they see
security as a precondition for creating systems that can maintain privacy. Looking at
Thompson (op. cit.), in contrast, it would be interpreted as an opposite implication,
namely that security (also in terms of the integrity of the underlying infrastructure) is a
prerequisite for privacy, as it is, in fact, one of the constituent elements from which
privacy is derived.
Sheller and Urry, in a paper from 2003, make many useful
observations, for instance that:
“One of the key dilemmas of the 20th century concerned the overwhelming power
of the state and market to interfere in and to overpower ‘private’ life. By contrast,
in the 21st century, the emerging social problem is seen as the erosion of the
‘public’ by processes otherwise understood to be ‘private’ (Sheller and Urry,
2003, p. 107).”
and they continue, referring to, but certainly not supporting, a argument that says that:
“On every front is seems, the ‘public’ is being privatized, the private is becoming
oversized and this undermines democratic life (ibid).”
This has of course produced a discourse with results like the ones we saw in those two
schools in the UK. They argue that the notions of ‘private’ and ‘public’ often is too static
and regional, and that they encompass multifarious meanings.
“Private-and-public life” is a complex and mobile hybrid. Mobile information
systems contribute to “a more complex de-territorialization of publics and
privates, each constantly shifting and being performed in rapid flashed within less
anchored spaces (ibid, p. 108).”
and so they argue that “social theory will need to develop a more dynamic
conceptualization of the fluidities and mobilities that have increasingly hybridized the
public and the private (ibid, 2003, p. 113).” which is exactly what this paper was geared
towards, in that particular context of next generation mobile telephony.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
References
Barkuus, Louise, and Anind Dey (2003): Location-Based Services for Mobile Telephony: a Study
of Users’ Privacy Concerns, Proceedings of the INTERACT 2003, 9TH IFIP TC13
International Conference on Human-Computer Interaction, IRB-TR-03-024, July
Beck, U. (1986) Risk society: towards a new modernity, London: Sage.
Bellotti, V. and S. Bly (1996). Walking away from the desktop computer: distributed
collaboration and mobility in a product design team. Proceedings of the 1996 ACM
conference on Computer supported cooperative work. Boston, Massachusetts, United
States, ACM Press.
Bellotti, V. & Sellen, A. (1993): Design for Privacy in Ubiquitous Computing Environments.
Proc. 3rd European Conf. on Computer Supported Cooperative Work, (ECSCW 93), G.
de Michelis, C. Simone and K. Schmidt (Eds.), Kluwer, 1993, 77-92.
Bergqvist, J., P. Dahlberg, et al. (1999). Moving out of the meeting room: exploring support for
mobile meetings. Proceedings of the Sixth European conference on Computer supported
cooperative work. Copenghagen, Denmark, Kluwer Academic Publishers.
Boyle, M., Edwards, C. and Greenberg, S. (2000). The Effects of Filtered Video on Awareness
and Privacy. Proceedings of the CSCW'00 Conference on Computer Supported
Cooperative Work [CHI Letters 2(3)], p1-10, ACM Press.
Cesare, M. (2001). System and process modelling for design, management and performance
evaluation of present and future mobile networks. Proceedings of the 4th ACM
international workshop on Modeling, analysis and simulation of wireless and mobile
systems. Rome, Italy, ACM Press.
Yigal, B., C. Israel, et al. (2000). Dynamic session management for static and mobile users: a
competitive on-line algorithmic approach. Proceedings of the 4th international workshop
on Discrete algorithms and methods for mobile computing and communications. Boston,
Massachusetts, United States, ACM Press.
Dourish, P. (1993): Culture and Control in a Media Space, Proc. 3rd European Conf. on
Computer Supported Cooperative Work, (ECSCW 93), G. de Michelis, C. Simone and K.
Schmidt (Eds.), Kluwer.
Edwards, W. K. (1994). Session management for collaborative applications. Proceedings of the
1994 ACM conference on Computer supported cooperative work. Chapel Hill, North
Carolina, United States, ACM Press.
Fish, Robert S., Robert E. Kraut, Robert W. Root, Ronald E. Rice (1993): Video as a technology
for informal communication, Communications of the ACM, Volume 36 Issue 1.
Garfinkel, Harold. Good Reasons for 'Bad' Clinic Records in Studies in Ethnomethodology.
(1967): 186-207
Gaver, W. W., Moran T. P., MacLean A., Lovstrand L., Dourish P., Carter K., Buxton W. (1992):
Realizing a Video Environment: EuroPARC's RAVE System. In Proceedings of CHI '92
(Monteray, California, 3-7 May, 1992). ACM, New York, p. 27-35.
Godefroid, Patrice. and James D. Herbsleb and Lalita Jategaonkar Jagadeesany and Du Li.
(2000): Ensuring privacy in presence awareness: an automated verification approach.
Proceedings of the 2000 ACM conference on Computer supported cooperative work,
Philadelphia, Pennsylvania, United States p. 59-68.
Goffmann, E. (1063): Behavior in Public Places: Notes on the Social Organization of Gatherings,
Free Press of Glencoe, 1963.
Green, N., Harper, R., Murtagh, G. and Cooper, G. (2001), ‘Configuring the Mobile User:
Sociological and Industry Views, Personal and Ubiquitous Computing, Vol..5, No.2,
pp.146-56.
Harmer J.A. (2003): Mobile Multimedia Services, BT Technology Journal, 21(3); pp. 169-180
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
Harper, R. (1992): Looking at ourselves: an examination of the social organisation of two
research laboratories. Proceedings of the 1992 ACM conference on Computer-supported
cooperative work, Toronto, Ontario, Canada, p. 330-337.
Hinckley, K., G. Ramos, et al. (2004). Stitching: pen gestures that span multiple displays.
Proceedings of the working conference on Advanced visual interfaces. Gallipoli, Italy,
ACM Press.
Hong, Jason I., Ng, Jennifer D., Lederer, Scott and Landay, James A. (2004): Ubicomp at home
and on the move: Privacy risk models for designing privacy-sensitive ubiquitous
computing systems. Proceedings of the 2004 conference on Designing interactive
systems, Cambridge, MA, USA, p. 91-100.
Hudson, Scott E. and Smith, Ian (1996): Techniques for addressing fundamental privacy and
disruption tradeoffs in awareness support systems. Proceedings of the 1996 ACM
conference on Computer supported cooperative work, Boston, Massachusetts, United
States, p. 248-257.
Introne, L. D and Pouloudi (1999): A. Privacy in the Information Age: Stakeholders, Interests and
Values. Journal of Business Ethics 22: p. 27-38.
Kraut, Robert E., Ronald E. Rice, Colleen Cool, Robert S. Fish: Life and Death of New
Technology: Task, Utility and Social Influences on the Use of a Communication
Medium. Proceedings of the 1994 ACM conference on Computer supported cooperative
work. Chapel Hill, North Carolina, United States, pp. 13-21
Lacohée H.; Wakeford N.; Pearson I. (2003): A Social History of the Mobile Telephone with a
View of its Future, BT Technology Journal, 21(3), pp. 203-211
Laurier, E. 2001. 'Why people say where they are during mobile phone calls', Environment and
Planning D: Society & Space, v.19,4, 485-504
Licoppe, C., Heurtin, J. P. (2001): Managing One's Availability to Telephone Communication
Through Mobile Phones: A French Case Study of the Development Dynamics of Mobile
Phone Use. Personal and Ubiquitous Computing, 5, 2, pp. 99-108
Ling, R. (1996)."’One can talk about common manners!’: the use of mobile telephones in
inappropriate situations." Report 32/96, Telenor Research & Development, Norway.
Ling, Rich (2001): “We Release Them Little by Little”: Maturation and Gender Identity as Seen
in the Use of Mobile Telephony. Personal and Ubiquitous Computing 5(2): 123-136
Ling, R. & Yttri, B. (1999). "Nobody sits at home and waits for the telephone to ring: Micro and
hypercoordination through the use of the mobile telephone." Report 30/99, Telenor
Research & Dev., Norway.
McArthur, R. L. (2001): “Reasonable expectations of privacy”, Ethics and Information
technology 3:, pp 123-128.
Pagani, D. and Mackay, W. (1993): Bringing media spaces into the real world. Proc. 3rd
European Conf. on Computer Supported Cooperative Work, (ECSCW 93), G. de
Michelis, C. Simone and K. Schmidt (Eds.), Kluwer, 1993, pp. 77-92.
Palen, Leysia, Marilyn Salzman, and Ed Youngs (2000). Going Wireless: Behavior and Practice
of New Mobile Phone Users. Proceedings of the ACM Conference on Computer
Supported Cooperative Work (CSCW 2000), Philadelphia, PA, pp. 201-210.
Palen, L. and Dourish, P. (1993): Unpacking “privacy” for a networked world, Proceedings of the
conference on Human factors in computing systems, April 05-10, 2003, Ft. Lauderdale,
Florida, USA, pp. 129-136.
Perry, M, O’Hara, K, Sellen, A, Brown, B and Harper, R (2001) Dealing with mobility:
understanding access anytime, anywhere. ACM Transactions on Human-Computer
Interaction, 8 (4), p 323-347.
Ralph, D. T. (2002): 3G and beyond – the applications generation. BT Technology Journal 20(1),
pp. 22-28.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Kristoffersen
Sara, B., S. T. Alex, et al. (2003). Mobile phones for the next generation: device designs for
teenagers. Proceedings of the conference on Human factors in computing systems. Ft.
Lauderdale, Florida, USA, ACM Press.
Sheller, M and Urry, John (2003); Mobile Trasformations of ‘Public’ and ‘Private’ Life. Theory,
Culture and Society 20(3): pp. 107-125.
Taylor, Alex S. and Richard Harper, The Gift of the Gab?: A Design Oriented Sociology of
Young People's Use of Mobiles, Computer Supported Cooperative Work (CSCW),
Volume 12, Issue 3, 2003, Pages 267 – 296.
Number 8, 2005
http://www.ifi.uio.no/forskning/grupper/is/wp/082005.pdf
Download