SlideShare a Scribd company logo
Wearable Privacy: Skeletons In The Data
Closet
Byron Lowens M.S.
blowens@g.clemson.edu
Prof.Vivian Genaro Motti Ph.D.
vmotti@gmu.edu
Prof. Kelly Caine Ph.D.
caine@clemson.edu
IEEE International Conference on
HealthCare Informatics 2017
Park City, Utah
August 26th, 2017
1
Overview of Talk
● Acknowledgments
● Introduction and Background
● Introduction to the Problem
● Methods
● Results
● Summary of Work
● Conclusion
● Questions
2
Acknowledgements
Support: NSF: 1314342
I’m especially thankful to:
● Kelly Caine
● Vivian Motti
● Bart Knijnenburg
● Jacob Sorber
● David Kotz
● Ryan Halter
● Amulet team
● Hatlab members
port: NSF: 1314342
3
Wearable Technology
4
5
Jalaliniya, S., & Pederson, T. (2012, October). A wearable kids' health monitoring system on
smartphone. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making
Sense Through Design(pp. 791-792). ACM.
Wu, J., Tian, Z., Sun, L., Estevez, L., & Jafari, R. (2015, June). Real-time American sign language recognition
using wrist-worn motion and surface EMG sensors. In Wearable and Implantable Body Sensor Networks (BSN),
2015 IEEE 12th International Conference on (pp. 1-6). IEEE.
Van Hoof, C., & Penders, J. (2013, March). Addressing the healthcare cost dilemma by managing health
instead of managing illness: an opportunity for wearable wireless sensors. In Proceedings of the Conference on
Design, Automation and Test in Europe (pp. 1537-1539). EDA Consortium.
Lo, B. P., Ip, H., & Yang, G. Z. (2016). Transforming health care: body
sensor networks, wearables, and the Internet of Things.
6
7
8Wearable device unit sales worldwide by region in 2015 and 2020,”
https://www.statista.com/statistics/490231/wearable-devices-worldwideby-region/.
9
Fitness Track and Smartwatches
10
11
12
13
14
15
16
17
18
19
Research Questions
● How do users understand privacy in the context of wearables, specifically
WWDs?
● What are the benefits and concerns related the collection and sharing of
health data collected via WWDs and when do these concerns arise?
● What are common misconceptions users’ share about health related data on
WWDs?
20
21
22
● 32 semi-structured interviews with existing users of
wearable devices to identify:
○ Key Benefits
○ Drawbacks
○ Misconceptions
○ Tradeoffs
○ Solutions
Methods
23
Methods:Interview Questions
● What are your privacy concerns, if any?
● Would you share your device and/or the data? Why? With Who?
● Do you sync/view data? How?
● How often do you access it?
● Do you access it for healthcare purposes?
24
25
Demographics
26
Device Ownership
27
Level of Concern For Privacy Among Wearable Users
60%
25%
15%
28
Level of Privacy Concern: Unconcerned (N=12)
“None of the data that I’m logging I think is significant enough to cause any grief.”
(P2)
“As a technology person, I don’t really mind sharing data like this. To me, that
doesn’t really quantify anything about me nor from my private life.”
(P6)
29
Level of Concern: Somewhat Concerned (N=5)
● “This is super interesting because right now I don’t have any. But I can see if
this information was somehow accessed by let’s say a health insurance
company or someone else who could use it in order to determine what kind of
care I received. That’s a little big brotherish.” (P23)
30
Level of Concern: Highly Concerned (N=3)
“I have more privacy concerns about the fact that there will be some vast analytics
running on it... maybe there are some aspects which could be derived that
somewhere in the future I’ll be sick... I’m more worried about the fact that it can be
used against me.” (P12)
31
Type of Privacy Concern
Unintended Use “But, if after the fact someone were to gain this access to this data and use it to prove why I shouldn’t be eligible for
something or exclude from a health program that would be concerning.” (P23)
“If it was collecting,information about like ”oh, he’s feeling sick today” and maybe if there’s a conflict in terms of well
he’s sick, but he’s supposed to be at work.” (P16)
“Oh, you know if I were connected to coworkers or my boss and I called in sick one day and she sees that I am
completing these hikes...that could be an issue. Like I said it’s a hypothetical, potential privacy concern right now.”
(P9)
Control “That I am forgetting it, and it keeps measuring unobtrusively, without me thinking about it. And its uploading data
somewhere. Okay, so the bad thing, maybe also, I don’t own the data yet. They say they’re still working on the data
sharing, so I cannot pull up any data, I can just see them as graphs on the website. So that’s a bad thing still.” (P12)
“I don’t know how practical it is but it seems like a nice thing would be it doesn’t necessarily need to be shared with
anybody or synced online or anything. It just needs to talk directly to...let’s say your cell phone and keep it stored on
your cell phone but it doesn’t need to sync those settings or with anything else.” (P3)
32
Benefits
● “The basis watch, I very much like it, I would say I’m even more addicted to see the patterns, to see
also the improvements in me changing some behaviors, and I’ll tell you in a moment what have I
changed. And then, seeing the effect of this.” (P12)
● “Yeah, I had my husband, my boss, we’re all on this together and we always with my coworkers. We
are part of each other’s little social circle and we’ll chat back and forth. look how many calories I
burn, come with me, join me!” (P23)
● “Yeah, it’s funny I actually use in it presentations at work. Because what I do is often talk about
motivation and I’ll use as a real world example to help people understand how I am personally
motivated by data in my own life.” (P23)
33
Misconceptions
● “Yeah, there weren’t any passwords or anything like that I put into the device.
And also, that specific device doesn’t have a keyboard, so you can’t type in
any sensitive information.” (P20)
● “Daily activity is not something private... I mean, if people are around you,
they... figure out whether you’re lazy or not.” (P6)
34
Solutions
● Authentication
○ “You could only have your biometrics be private to you, they would not be shared with
someone other online account or anything.” (P3)
● Policies
○ “I was not aware of this before, but apparently, now, if you go download an app, these things
need to be clear in there.” (P6)
● Network of Friends:
○ “I haven’t really thought about my privacy concerns, but I do try to limit them by just limiting
how much information I share and how many friends I have.” (P9)
35
Privacy Settings
“I like to control it, I wouldn’t want a lot of strange people see it so I would only
share it with my friends.” (P14)
“Yes, I have changed it. I’ve gone into settings to say what kind of information do
you want to report. I’ve actually done that more often” (P9)
36
37
“I may have had to change it.”; “I don’t
think so, no I don’t think I really ever
thought about it that deeply. I don’t really
remember actually... let me just double
check. That’s crazy, I am looking at the
app right now, and I can’t tell” (P24).
“
“ Personally I wasn’t too concerned
about it “ P20
“They came private from the get go”
P6
38
Tradeoffs
“there’s a price I pay for having it convenient and nice but I’ve kind of accepted that’s, you know, pick your
poison, and that’s just something I run the risk of to use these applications...I don’t trust them but I go
ahead and use their products anyways.” (P12)
39
Emerging Concerns
“I don’t care much about if people are looking at my performance as a
runner.....I’m just running for fun, so I feel like... I’m less concerned about my
running tracks than about features about myself, for instance. I have no problem to
make this kind of information public, but of course, nobody’s interested in these
things as well.” (P28)
40
“No, I yeah, I of course, it’s
sensitive because you can
figure out where I’ve been, in a
specific, in which city I’m
living.” (P28)
41
Key Findings
● There is variety in concern among users
● Users have a partial understanding about privacy;
● The lack of input device led some users to feel that they should not be
concerned about the privacy of the data collected by their WWD;
● Users' concerns in relation to the collection and sharing of their health related
data on WWD were mainly related to Unintended Use and Control over data.
42
Design Implications
Transparency
43
Design Implications For Wearable Applications
● None (users without concerns and/or public data)
○ the lack of concern occurs either when users have no sharing options, and all the data are
kept private, or when no sensitive information is handled, enabling users to have it publicly
available without any implications.
● Moderated (users with some privacy concerns)
○ the control mechanisms needed to ensure that users select the data they want to be shared,
with who they want to share it, and how. Fine-grained solutions are preferred (allowing a
flexible and detailed control level).
● Extreme (users with high levels of privacy concern)
○ users with high levels of concerns do not want anything to be shared, so the systems need to
either have everything private by default (preferred by users) or enable them to set everything
as private. In both cases, the status of the system needs to be presented in a clear and
reliable format to users seeking to ensure transparency.
44
45
46
47
48
49
Contact Information
Byron M. Lowens M.S.
Ph.D. Candidate
Research Assistant
blowens@g.clemson.edu

More Related Content

Similar to Wearable privacy skeletons in the data closet

“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...
University of Sydney
 
Privacy, security and ethics in data science
Privacy, security and ethics in data sciencePrivacy, security and ethics in data science
Privacy, security and ethics in data science
Nikolaos Vasiloglou
 
Digital Health Generation Project Findings
Digital Health Generation Project FindingsDigital Health Generation Project Findings
Digital Health Generation Project Findings
University of Salford, Manchester
 
A Process View of Missing Data
A Process View of Missing DataA Process View of Missing Data
A Process View of Missing Data
Maria Wolters
 
Internet as place: Policy, practice, and research in e-mental health for Scot...
Internet as place: Policy, practice, and research in e-mental health for Scot...Internet as place: Policy, practice, and research in e-mental health for Scot...
Internet as place: Policy, practice, and research in e-mental health for Scot...
Diane Rasmussen Pennington
 
Shorter Version of BbWorld 09 Forensics Presentation
Shorter Version of BbWorld 09 Forensics PresentationShorter Version of BbWorld 09 Forensics Presentation
Shorter Version of BbWorld 09 Forensics Presentation
Steve Feldman
 
Utilization Based Evaluation In Mental Health
Utilization Based Evaluation In Mental HealthUtilization Based Evaluation In Mental Health
Utilization Based Evaluation In Mental Health
Paul Frankel
 
mini project computer engineering e-doctor.pdf
mini project computer engineering e-doctor.pdfmini project computer engineering e-doctor.pdf
mini project computer engineering e-doctor.pdf
289khashshamkhan
 
re
rere
CSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdfCSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdf
SaraJayneTerp
 
Digital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes versionDigital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes version
Marilyn Herie
 
Book Summary : Everybody Lies
Book Summary : Everybody LiesBook Summary : Everybody Lies
Book Summary : Everybody Lies
Rahul Rishi
 
Testing slides
Testing slidesTesting slides
Testing slides
RuthBeresford
 
CSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdfCSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdf
SaraJayneTerp
 
Editing Digital Imagery in Research: Exploring the Fidelity-to-Artificiality...
Editing Digital Imagery in Research:  Exploring the Fidelity-to-Artificiality...Editing Digital Imagery in Research:  Exploring the Fidelity-to-Artificiality...
Editing Digital Imagery in Research: Exploring the Fidelity-to-Artificiality...
Shalin Hai-Jew
 
The Hidden Stories of Missing Data
The Hidden Stories of Missing DataThe Hidden Stories of Missing Data
The Hidden Stories of Missing Data
Maria Wolters
 
Co-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptxCo-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptx
University of Sydney
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
Steve Mckee
 
Dec 21 122112 Marshall Sponder
Dec 21 122112 Marshall SponderDec 21 122112 Marshall Sponder
Dec 21 122112 Marshall Sponder
Marshall Sponder
 
Let's Talk Inclusion (and making UX more innovative)
Let's Talk Inclusion (and making UX more innovative)Let's Talk Inclusion (and making UX more innovative)
Let's Talk Inclusion (and making UX more innovative)
Center for Civic Design
 

Similar to Wearable privacy skeletons in the data closet (20)

“Never go through our chats and phones without our consent!” The emerging i...
“Never go through our chats and phones without our consent!”   The emerging i...“Never go through our chats and phones without our consent!”   The emerging i...
“Never go through our chats and phones without our consent!” The emerging i...
 
Privacy, security and ethics in data science
Privacy, security and ethics in data sciencePrivacy, security and ethics in data science
Privacy, security and ethics in data science
 
Digital Health Generation Project Findings
Digital Health Generation Project FindingsDigital Health Generation Project Findings
Digital Health Generation Project Findings
 
A Process View of Missing Data
A Process View of Missing DataA Process View of Missing Data
A Process View of Missing Data
 
Internet as place: Policy, practice, and research in e-mental health for Scot...
Internet as place: Policy, practice, and research in e-mental health for Scot...Internet as place: Policy, practice, and research in e-mental health for Scot...
Internet as place: Policy, practice, and research in e-mental health for Scot...
 
Shorter Version of BbWorld 09 Forensics Presentation
Shorter Version of BbWorld 09 Forensics PresentationShorter Version of BbWorld 09 Forensics Presentation
Shorter Version of BbWorld 09 Forensics Presentation
 
Utilization Based Evaluation In Mental Health
Utilization Based Evaluation In Mental HealthUtilization Based Evaluation In Mental Health
Utilization Based Evaluation In Mental Health
 
mini project computer engineering e-doctor.pdf
mini project computer engineering e-doctor.pdfmini project computer engineering e-doctor.pdf
mini project computer engineering e-doctor.pdf
 
re
rere
re
 
CSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdfCSW2022_04_project_setup.pptx.pdf
CSW2022_04_project_setup.pptx.pdf
 
Digital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes versionDigital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes version
 
Book Summary : Everybody Lies
Book Summary : Everybody LiesBook Summary : Everybody Lies
Book Summary : Everybody Lies
 
Testing slides
Testing slidesTesting slides
Testing slides
 
CSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdfCSW2022_10_risk_prioritisation.pptx.pdf
CSW2022_10_risk_prioritisation.pptx.pdf
 
Editing Digital Imagery in Research: Exploring the Fidelity-to-Artificiality...
Editing Digital Imagery in Research:  Exploring the Fidelity-to-Artificiality...Editing Digital Imagery in Research:  Exploring the Fidelity-to-Artificiality...
Editing Digital Imagery in Research: Exploring the Fidelity-to-Artificiality...
 
The Hidden Stories of Missing Data
The Hidden Stories of Missing DataThe Hidden Stories of Missing Data
The Hidden Stories of Missing Data
 
Co-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptxCo-designing online safety with young people in a post-crisis world.pptx
Co-designing online safety with young people in a post-crisis world.pptx
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Dec 21 122112 Marshall Sponder
Dec 21 122112 Marshall SponderDec 21 122112 Marshall Sponder
Dec 21 122112 Marshall Sponder
 
Let's Talk Inclusion (and making UX more innovative)
Let's Talk Inclusion (and making UX more innovative)Let's Talk Inclusion (and making UX more innovative)
Let's Talk Inclusion (and making UX more innovative)
 

More from Vivian Motti

Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020
Vivian Motti
 
Usable Privacy
Usable PrivacyUsable Privacy
Usable Privacy
Vivian Motti
 
Smartwatch Applications as Assistive Technologies
Smartwatch Applications as Assistive TechnologiesSmartwatch Applications as Assistive Technologies
Smartwatch Applications as Assistive Technologies
Vivian Motti
 
Wearable technologies
Wearable technologiesWearable technologies
Wearable technologies
Vivian Motti
 
Cards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course MaterialCards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course Material
Vivian Motti
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Vivian Motti
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Vivian Motti
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Vivian Motti
 
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
Vivian Motti
 
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Vivian Motti
 
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special EducationWearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
Vivian Motti
 
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
Vivian Motti
 
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Vivian Motti
 
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Vivian Motti
 
Toward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy ConceptsToward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy Concepts
Vivian Motti
 
Wearable Health
Wearable HealthWearable Health
Wearable Health
Vivian Motti
 
Wearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and PrivacyWearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and Privacy
Vivian Motti
 
Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...
Vivian Motti
 
An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...
Vivian Motti
 
Wrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and OpportunitiesWrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and Opportunities
Vivian Motti
 

More from Vivian Motti (20)

Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020Keynote speech - Webmedia 2020
Keynote speech - Webmedia 2020
 
Usable Privacy
Usable PrivacyUsable Privacy
Usable Privacy
 
Smartwatch Applications as Assistive Technologies
Smartwatch Applications as Assistive TechnologiesSmartwatch Applications as Assistive Technologies
Smartwatch Applications as Assistive Technologies
 
Wearable technologies
Wearable technologiesWearable technologies
Wearable technologies
 
Cards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course MaterialCards - Users with Disabilities - Course Material
Cards - Users with Disabilities - Course Material
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
 
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...Assisting Students with Intellectual and Developmental Disabilities in Inclus...
Assisting Students with Intellectual and Developmental Disabilities in Inclus...
 
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
mHealth Application to Inform Caregivers of Babies with Congenital Zika Virus...
 
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
Smartwatch Applications for Mental Health: A Qualitative Analysis of Users’ P...
 
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special EducationWearable Life: a Wrist-Worn Application to Assist Students in Special Education
Wearable Life: a Wrist-Worn Application to Assist Students in Special Education
 
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
UX Design for Wrist-Worn Wearables – how contextual dynamics influence intera...
 
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
Using Smartwatches to Assist Students with Intellectual and Developmental Dis...
 
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
Smart Wearables or Dumb Wearables? Understanding how Context Impacts the UX i...
 
Toward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy ConceptsToward a Visual Vocabulary for Privacy Concepts
Toward a Visual Vocabulary for Privacy Concepts
 
Wearable Health
Wearable HealthWearable Health
Wearable Health
 
Wearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and PrivacyWearable Computing: Healthcare, Human Factors and Privacy
Wearable Computing: Healthcare, Human Factors and Privacy
 
Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...Micro interactions and multi dimensional graphical user interfaces in the des...
Micro interactions and multi dimensional graphical user interfaces in the des...
 
An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...An Overview of Wearable Applications for Health Care: Requirements and Challe...
An Overview of Wearable Applications for Health Care: Requirements and Challe...
 
Wrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and OpportunitiesWrist-Worn Interaction: Design Challenges and Opportunities
Wrist-Worn Interaction: Design Challenges and Opportunities
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 

Wearable privacy skeletons in the data closet

  • 1. Wearable Privacy: Skeletons In The Data Closet Byron Lowens M.S. blowens@g.clemson.edu Prof.Vivian Genaro Motti Ph.D. vmotti@gmu.edu Prof. Kelly Caine Ph.D. caine@clemson.edu IEEE International Conference on HealthCare Informatics 2017 Park City, Utah August 26th, 2017 1
  • 2. Overview of Talk ● Acknowledgments ● Introduction and Background ● Introduction to the Problem ● Methods ● Results ● Summary of Work ● Conclusion ● Questions 2
  • 3. Acknowledgements Support: NSF: 1314342 I’m especially thankful to: ● Kelly Caine ● Vivian Motti ● Bart Knijnenburg ● Jacob Sorber ● David Kotz ● Ryan Halter ● Amulet team ● Hatlab members port: NSF: 1314342 3
  • 5. 5
  • 6. Jalaliniya, S., & Pederson, T. (2012, October). A wearable kids' health monitoring system on smartphone. In Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design(pp. 791-792). ACM. Wu, J., Tian, Z., Sun, L., Estevez, L., & Jafari, R. (2015, June). Real-time American sign language recognition using wrist-worn motion and surface EMG sensors. In Wearable and Implantable Body Sensor Networks (BSN), 2015 IEEE 12th International Conference on (pp. 1-6). IEEE. Van Hoof, C., & Penders, J. (2013, March). Addressing the healthcare cost dilemma by managing health instead of managing illness: an opportunity for wearable wireless sensors. In Proceedings of the Conference on Design, Automation and Test in Europe (pp. 1537-1539). EDA Consortium. Lo, B. P., Ip, H., & Yang, G. Z. (2016). Transforming health care: body sensor networks, wearables, and the Internet of Things. 6
  • 7. 7
  • 8. 8Wearable device unit sales worldwide by region in 2015 and 2020,” https://www.statista.com/statistics/490231/wearable-devices-worldwideby-region/.
  • 9. 9
  • 10. Fitness Track and Smartwatches 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. 18
  • 19. 19
  • 20. Research Questions ● How do users understand privacy in the context of wearables, specifically WWDs? ● What are the benefits and concerns related the collection and sharing of health data collected via WWDs and when do these concerns arise? ● What are common misconceptions users’ share about health related data on WWDs? 20
  • 21. 21
  • 22. 22
  • 23. ● 32 semi-structured interviews with existing users of wearable devices to identify: ○ Key Benefits ○ Drawbacks ○ Misconceptions ○ Tradeoffs ○ Solutions Methods 23
  • 24. Methods:Interview Questions ● What are your privacy concerns, if any? ● Would you share your device and/or the data? Why? With Who? ● Do you sync/view data? How? ● How often do you access it? ● Do you access it for healthcare purposes? 24
  • 25. 25
  • 28. Level of Concern For Privacy Among Wearable Users 60% 25% 15% 28
  • 29. Level of Privacy Concern: Unconcerned (N=12) “None of the data that I’m logging I think is significant enough to cause any grief.” (P2) “As a technology person, I don’t really mind sharing data like this. To me, that doesn’t really quantify anything about me nor from my private life.” (P6) 29
  • 30. Level of Concern: Somewhat Concerned (N=5) ● “This is super interesting because right now I don’t have any. But I can see if this information was somehow accessed by let’s say a health insurance company or someone else who could use it in order to determine what kind of care I received. That’s a little big brotherish.” (P23) 30
  • 31. Level of Concern: Highly Concerned (N=3) “I have more privacy concerns about the fact that there will be some vast analytics running on it... maybe there are some aspects which could be derived that somewhere in the future I’ll be sick... I’m more worried about the fact that it can be used against me.” (P12) 31
  • 32. Type of Privacy Concern Unintended Use “But, if after the fact someone were to gain this access to this data and use it to prove why I shouldn’t be eligible for something or exclude from a health program that would be concerning.” (P23) “If it was collecting,information about like ”oh, he’s feeling sick today” and maybe if there’s a conflict in terms of well he’s sick, but he’s supposed to be at work.” (P16) “Oh, you know if I were connected to coworkers or my boss and I called in sick one day and she sees that I am completing these hikes...that could be an issue. Like I said it’s a hypothetical, potential privacy concern right now.” (P9) Control “That I am forgetting it, and it keeps measuring unobtrusively, without me thinking about it. And its uploading data somewhere. Okay, so the bad thing, maybe also, I don’t own the data yet. They say they’re still working on the data sharing, so I cannot pull up any data, I can just see them as graphs on the website. So that’s a bad thing still.” (P12) “I don’t know how practical it is but it seems like a nice thing would be it doesn’t necessarily need to be shared with anybody or synced online or anything. It just needs to talk directly to...let’s say your cell phone and keep it stored on your cell phone but it doesn’t need to sync those settings or with anything else.” (P3) 32
  • 33. Benefits ● “The basis watch, I very much like it, I would say I’m even more addicted to see the patterns, to see also the improvements in me changing some behaviors, and I’ll tell you in a moment what have I changed. And then, seeing the effect of this.” (P12) ● “Yeah, I had my husband, my boss, we’re all on this together and we always with my coworkers. We are part of each other’s little social circle and we’ll chat back and forth. look how many calories I burn, come with me, join me!” (P23) ● “Yeah, it’s funny I actually use in it presentations at work. Because what I do is often talk about motivation and I’ll use as a real world example to help people understand how I am personally motivated by data in my own life.” (P23) 33
  • 34. Misconceptions ● “Yeah, there weren’t any passwords or anything like that I put into the device. And also, that specific device doesn’t have a keyboard, so you can’t type in any sensitive information.” (P20) ● “Daily activity is not something private... I mean, if people are around you, they... figure out whether you’re lazy or not.” (P6) 34
  • 35. Solutions ● Authentication ○ “You could only have your biometrics be private to you, they would not be shared with someone other online account or anything.” (P3) ● Policies ○ “I was not aware of this before, but apparently, now, if you go download an app, these things need to be clear in there.” (P6) ● Network of Friends: ○ “I haven’t really thought about my privacy concerns, but I do try to limit them by just limiting how much information I share and how many friends I have.” (P9) 35
  • 36. Privacy Settings “I like to control it, I wouldn’t want a lot of strange people see it so I would only share it with my friends.” (P14) “Yes, I have changed it. I’ve gone into settings to say what kind of information do you want to report. I’ve actually done that more often” (P9) 36
  • 37. 37 “I may have had to change it.”; “I don’t think so, no I don’t think I really ever thought about it that deeply. I don’t really remember actually... let me just double check. That’s crazy, I am looking at the app right now, and I can’t tell” (P24).
  • 38. “ “ Personally I wasn’t too concerned about it “ P20 “They came private from the get go” P6 38
  • 39. Tradeoffs “there’s a price I pay for having it convenient and nice but I’ve kind of accepted that’s, you know, pick your poison, and that’s just something I run the risk of to use these applications...I don’t trust them but I go ahead and use their products anyways.” (P12) 39
  • 40. Emerging Concerns “I don’t care much about if people are looking at my performance as a runner.....I’m just running for fun, so I feel like... I’m less concerned about my running tracks than about features about myself, for instance. I have no problem to make this kind of information public, but of course, nobody’s interested in these things as well.” (P28) 40
  • 41. “No, I yeah, I of course, it’s sensitive because you can figure out where I’ve been, in a specific, in which city I’m living.” (P28) 41
  • 42. Key Findings ● There is variety in concern among users ● Users have a partial understanding about privacy; ● The lack of input device led some users to feel that they should not be concerned about the privacy of the data collected by their WWD; ● Users' concerns in relation to the collection and sharing of their health related data on WWD were mainly related to Unintended Use and Control over data. 42
  • 44. Design Implications For Wearable Applications ● None (users without concerns and/or public data) ○ the lack of concern occurs either when users have no sharing options, and all the data are kept private, or when no sensitive information is handled, enabling users to have it publicly available without any implications. ● Moderated (users with some privacy concerns) ○ the control mechanisms needed to ensure that users select the data they want to be shared, with who they want to share it, and how. Fine-grained solutions are preferred (allowing a flexible and detailed control level). ● Extreme (users with high levels of privacy concern) ○ users with high levels of concerns do not want anything to be shared, so the systems need to either have everything private by default (preferred by users) or enable them to set everything as private. In both cases, the status of the system needs to be presented in a clear and reliable format to users seeking to ensure transparency. 44
  • 45. 45
  • 46. 46
  • 47. 47
  • 48. 48
  • 49. 49 Contact Information Byron M. Lowens M.S. Ph.D. Candidate Research Assistant blowens@g.clemson.edu