[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1124772.1124911acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Tensions in designing capture technologies for an evidence-based care community

Published: 22 April 2006 Publication History

Abstract

Evidence-based care is an increasingly popular process for long term diagnosis and monitoring of education and healthcare disabilities. Because this evidence must also be collected in everyday life, it is a technique that can greatly benefit from automated capture technologies. These solutions, however, can raise significant concerns about privacy, control, and surveillance. In this paper, we present an analysis of these concerns with regard to evidence-based care. This analysis underscores the need to consider community-based risk and reward analyses in addition to the traditionally used analyses for individual users when designing socially appropriate technologies.

References

[1]
Belair, R., Bock, C. Police Use of Remote Camera Systems for Surveillance of Public Streets. Surveillance, Dataveillance and Personal Freedoms: Use and Abuse of Information Technology, Columbia Human Rights Law Review, Burdick, Fair Lawn, NJ, USA (1973). ISBN 0-913638-03-X.
[2]
Bellotti, V. and A. Sellen. Design for Privacy in Ubiquitous Computing Environments. Proc. ECSCW '93. Kluwer Academic Publishers.
[3]
Boyle, M., Edwards, C., and Greenberg, S. 2000. The effects of filtered video on awareness and privacy. Proc. CSCW '00. ACM Press, 1--10.
[4]
Dourish, P., Grinter, R., Delgado de la Flor, J., and Joseph, M. Security in the Wild: User Strategies for Managing Security as an Everyday, Personal and Ubiquitous Computing, 8(6), (2004) 391--401.
[5]
Edelson, S. M. Asperger's Syndrome, http://www.autism.org/asperger.html
[6]
European Commission Article 29, Working Party: Opinion 4/2004 on the Processing of Personal Data by means of Video Surveillance, 2004.
[7]
Etzioni, A., The Limits of Privacy. New York: Basic Books, 1999.
[8]
Family Educational Rights and Privacy Act of 1974 (FERPA) 20 U.S.C. § 1232g; 34 CFR Part 99.
[9]
Hayes, G.R., Kientz, J.A., Truong, K.N., White, D.R., Abowd, G.D., Pering, T. Designing Capture Applications to Support the Education of Children with Autism. Proc. Ubicomp 2004, Springer-Verlag (2004).
[10]
Hayes, G.R., Truong, K.N., Abowd, G.D., Pering. T. Experience Buffers: A Socially Appropriate, Selective Archiving Tool for Evidence-Based Care. Extended Abstracts CHI'05, ACM Press (2005).
[11]
The Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104--191.
[12]
Hong, J.I., Ng, J. and Landay, J.A. Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems. Proc. DIS2004, ACM Press (2004), 91--100.
[13]
Iachello, G. and Abowd, G.D. Privacy and Proportionality: Adapting Legal Evaluation Techniques to Inform Design In Ubiquitous Computing, Proc. CHI 2005, ACM Press (2005), 91--100.
[14]
Individuals with Disabilities Education Act 20 U.S.C. 1401, 1997.
[15]
Langheinrich, M. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Proceedings of Ubicomp 2001. Springer Verlag (2001), 273--291.
[16]
Lederer, S., Hong, J.I., Dey, A., and Landay, J.A., Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 2004. 8(6): 440 -- 454.
[17]
Lessig, L. The Architecture of Privacy. Vanderbilt Journal of Entertainment Law & Practice, 1, Spring 1999; 1 Vand. J. Ent. L. & Prac. 56.
[18]
Netting the Evidence, http://www.shef.ac.uk/ir/netting
[19]
No Child Left Behind Act of 2001 20 USC 6301, 2002.
[20]
Norris, C., McCahill, M., Wood, D. The Growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space. Surveillance & Society. CCTV Special. 2(2/3): 376-395. http://www.surveillance-and-society.org/cctv.htm
[21]
Palen, L. and Dourish, P. Unpacking ""Privacy"" for a Networked World, Proc. CHI '03, ACM Press (2003), 129--136.
[22]
Walby, Kevin ""How Closed-Circuit Television Surveillance Organizes the Social: An Institutional Ethnography"" The Canadian Journal of Sociology - 30 (2), University of Toronto Press, 189--214.
[23]
Smith, Gavin J.D. Behind the Screens: Examining Constructions of Deviance and Informal Practices among CCTV Control Room Operators in the UK. Surveillance and Society. 2(2/3): 376-395. http://www.surveillance-and-society.org/articles2(2)/screens.pdf
[24]
Smith, I. and Hudson, S.E. Techniques for Addressing Fundamental Privacy and Disturbance Tradeoffs In Awareness Support Systems, Proc. CSCW '96, ACM Press (1996), 248--257.
[25]
Truong, K.N., Patel, S.N., Summet, J.W., Abowd, G.D. Preventing Camera Recording by Designing a Capture-Resistant Environment. Proc. UbiComp 2005 Springer Verlag (2005), 73--86.
[26]
Westin, A.F., Privacy and Freedom. New York NY: Atheneum, 1967.
[27]
Zhao, Q. Alex and Stasko, John T. Evaluating Image Filtering Based Techniques in Media Space Applications. Proc. CSCW '98, ACM Press (1998), 11--18.

Cited By

View all
  • (2022)GeniAuti: Toward Data-Driven Interventions to Challenging Behaviors of Autistic Children through Caregivers' TrackingProceedings of the ACM on Human-Computer Interaction10.1145/35129396:CSCW1(1-27)Online publication date: 7-Apr-2022
  • (2021)Tensions in Representing Behavioral Data in an Electronic Health RecordComputer Supported Cooperative Work (CSCW)10.1007/s10606-021-09402-7Online publication date: 22-Jun-2021
  • (2019)Human body reshaping and its application using multiple RGB-D sensorsImage Communication10.1016/j.image.2019.08.01179:C(71-81)Online publication date: 1-Nov-2019
  • Show More Cited By

Index Terms

  1. Tensions in designing capture technologies for an evidence-based care community

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '06: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2006
      1353 pages
      ISBN:1595933727
      DOI:10.1145/1124772
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 April 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. capture and access
      2. ethnography
      3. evidence-based care
      4. privacy
      5. ubicomp

      Qualifiers

      • Article

      Conference

      CHI06
      Sponsor:
      CHI06: CHI 2006 Conference on Human Factors in Computing Systems
      April 22 - 27, 2006
      Québec, Montréal, Canada

      Acceptance Rates

      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)23
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)GeniAuti: Toward Data-Driven Interventions to Challenging Behaviors of Autistic Children through Caregivers' TrackingProceedings of the ACM on Human-Computer Interaction10.1145/35129396:CSCW1(1-27)Online publication date: 7-Apr-2022
      • (2021)Tensions in Representing Behavioral Data in an Electronic Health RecordComputer Supported Cooperative Work (CSCW)10.1007/s10606-021-09402-7Online publication date: 22-Jun-2021
      • (2019)Human body reshaping and its application using multiple RGB-D sensorsImage Communication10.1016/j.image.2019.08.01179:C(71-81)Online publication date: 1-Nov-2019
      • (2018)How Information Sharing about Care Recipients by Family Caregivers Impacts Family CommunicationProceedings of the 2018 CHI Conference on Human Factors in Computing Systems10.1145/3173574.3173796(1-13)Online publication date: 21-Apr-2018
      • (2017)Understanding the Role Fluidity of Stakeholders During Assistive Technology Research "In the Wild"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025493(6147-6158)Online publication date: 2-May-2017
      • (2016)Anxiety and AutismProceedings of the 2016 CHI Conference on Human Factors in Computing Systems10.1145/2858036.2858259(1270-1281)Online publication date: 7-May-2016
      • (2016)Development of Web-Based Platform for Privacy Protective Avatar Mediated Distance-CarePervasive Computing Paradigms for Mental Health10.1007/978-3-319-32270-4_13(131-139)Online publication date: 9-Apr-2016
      • (2015)Multimodal SelfiesProceedings of the 2015 ACM on International Conference on Multimodal Interaction10.1145/2818346.2830606(567-574)Online publication date: 9-Nov-2015
      • (2015)Affect-preserving privacy protection of video2015 IEEE International Conference on Image Processing (ICIP)10.1109/ICIP.2015.7350779(158-162)Online publication date: Sep-2015
      • (2015)Keeping Kids Safe From a Design Perspective: Ethical and Legal Guidelines for Designing a Video-Based App for ChildrenTechTrends10.1007/s11528-015-0838-x59:2(40-46)Online publication date: 28-Jan-2015
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media