Proposed FBI crime computer system raises questions on accuracy, privacy
Computerization and controversy
Computers and moral responsibility: a framework for an ethical analysis
Computerization and controversy
Locating systems at work: implications for the development of active badge applications
Interacting with Computers
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
The language of privacy: Learning from video media space analysis and design
ACM Transactions on Computer-Human Interaction (TOCHI)
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Evaluation of an inexpensive depth camera for in-home gait assessment
Journal of Ambient Intelligence and Smart Environments
Evaluation of an inexpensive depth camera for in-home gait assessment
Journal of Ambient Intelligence and Smart Environments
Hi-index | 0.01 |
This study aims to explore older adults' privacy considerations for technology based monitoring applications in eldercare that use video systems. It specifically aims to introduce alternative vision based tools and identify whether distorting or "anonymizing" captured images affect older adults' privacy concerns and willingness to allow such an application to be installed in their residence. Ten residents of an independent retirement community were recruited to participate in a series of scenarios. Each scenario involved a daily activity such as sitting in the living room and having a visitor, or preparing a snack. These sessions were video-recorded using different image processing and extraction approaches. Follow-up in-depth interviews with participants were conducted after a demonstration of the captured images. Findings indicate that shape extraction can alleviate privacy concerns associated with the use of cameras. Participants expressed no privacy concerns with silhouette images and emphasized the importance of anonymity in the video sequences. They furthermore expressed the desire to control system operation by being able to turn a vision-based system off and on, and also determine who has access to the collected information.