vic: a flexible framework for packet video
Proceedings of the third ACM international conference on Multimedia
CHI '95 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Receiver-driven layered multicast
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
NYNEX portholes: initial user reactions and redesign implications
GROUP '97 Proceedings of the international ACM SIGGROUP conference on Supporting group work: the integration challenge
Successful multiparty audio communication over the Internet
Communications of the ACM
Design for privacy in multimedia computing and communications environments
Technology and privacy
Protecting digital media content
Communications of the ACM
Technical trials and legal tribulations
Communications of the ACM
Communications of the ACM
Users' perception of privacy in multimedia communication
CHI '99 Extended Abstracts on Human Factors in Computing Systems
Making Passwords Secure and Usable
HCI 97 Proceedings of HCI on People and Computers XII
Information processing, context and privacy
INTERACT '90 Proceedings of the IFIP TC13 Third Interational Conference on Human-Computer Interaction
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Digital Libraries in a Clinical Setting: Friend or Foe?
ECDL '01 Proceedings of the 5th European Conference on Research and Advanced Technology for Digital Libraries
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A theory of personalisation of appearance: quantitative evaluation of qualitatively derived data
Behaviour & Information Technology
Understanding privacy regulation in ubicomp interactions
Personal and Ubiquitous Computing
Hi-index | 0.00 |
When ubiquitous multimedia technology is introduced in an organization, the privacy implications of that technology are rarely addressed. Users usually extend the trust they have in an organization to the technology it employs. This paper reports results from interviews with 24 Internet Engineering Task Force (IETF) attendees whose presentations or contributions to IETF sessions were transmitted on the multicast backbone (Mbone). Due to a high level of trust in the organization, these users had few initial concerns about the privacy implications of this technology. However, interviewees' trust relied on inaccurate assumptions, since the interviews revealed a number of potential and actual invasions of privacy in transmission, recording and editing of multicast data. Previous research found that users who experience an unexpected invasion of their privacy are not only likely to reject the technology that afforded the invasion, but lose trust in the organization that introduced it [2,3]. We discuss a number of mechanisms and policies for protecting users' privacy in this particular application, and propose a strategy for introducing networked multimedia technology in general.