Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Public Access

Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust

Published: 30 December 2021 Publication History

Abstract

Laptop webcams can be covertly activated by malware and law enforcement agencies. Consequently, 59% percent of Americans manually cover their webcams to avoid being surveilled. However, manual covers are prone to human error---through a survey with 200 users, we found that 61.5% occasionally forget to re-attach their cover after using their webcam. To address this problem, we developed Smart Webcam Cover (SWC): a thin film that covers the webcam (PDLC-overlay) by default until a user manually uncovers the webcam, and automatically covers the webcam when not in use. Through a two-phased design iteration process, we evaluated SWC with 20 webcam cover users through a remote study with a video prototype of SWC, compared to manual operation, and discussed factors that influence users' trust in the effectiveness of SWC and their perceptions of its utility.

Supplementary Material

do (do.zip)
Supplemental movie, appendix, image and software files for, Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust

References

[1]
2014. Purism Librem 14. https://puri.sm/ (Accessed on 09/07/2020).
[2]
2018. Facebook Portal. https://portal.facebook.com/. (Accessed on 09/07/2020).
[3]
2020. ThinkPad X1 Extreme Gen 2 Laptop. https://www.lenovo.com/us/en/laptops/thinkpad/thinkpad-x1/X1-Extreme-Gen-2/p/22TP2TXX1E2 (Accessed on 09/07/2020).
[4]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J Lee. 2020. Tangible privacy: Towards user-centric sensor designs for bystander privacy. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (2020), 1--28.
[5]
Rawan Alharbi, Mariam Tolba, Lucia C Petito, Josiah Hester, and Nabil Alshurafa. 2019. To mask or not to mask? balancing privacy with visual confirmation utility in activity-oriented wearable cameras. Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies 3, 3 (2019), 1--29.
[6]
Apple. 2020. Don't close your MacBook, MacBook Air, or MacBook Pro with a cover over the camera. https://support.apple.com/en-us/HT211148
[7]
Jenni Balthrop. 2019. HP Survey highlights webcam security and privacy behaviors. https://press.hp.com/us/en/press-releases/2019/awareness-of-webcam-hacking.html. (Accessed on 09/09/2020).
[8]
Andrew Besmer and Heather Richter Lipford. 2008. Privacy perceptions of photo sharing in facebook. In Proc. SOUPS, Vol. 8.
[9]
Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator {LED}. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 337--352.
[10]
Richard B Chase and Douglas M Stewart. 1994. Make your service fail-safe. MIT Sloan Management Review 35, 3 (1994), 35.
[11]
Yuxin Chen, Huiying Li, Shan-Yuan Teng, Steven Nagels, Zhijing Li, Pedro Lopes, Ben Y Zhao, and Haitao Zheng. 2020. Wearable Microphone Jamming. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--12.
[12]
Lorrie F Cranor. 2008. A framework for reasoning about the human in the loop. (2008).
[13]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The effect of social influence on security sensitivity. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 143--157.
[14]
Matt Day, Giles Turner, and Natalia Drozdiak. 2019. Is Anyone Listening to You on Alexa? A Global Team Reviews Audio. https://www.bloomberg.com/news/articles/2019-04-10/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio
[15]
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2377--2386.
[16]
Paul Dourish, E Grinter, Jessica Delgado De La Flor, and Melissa Joseph. 2004. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (2004), 391--401.
[17]
Jack Forman, Taylor Tabb, Youngwook Do, Meng-Han Yeh, Adrian Galvin, and Lining Yao. 2019. ModiFiber: Two-Way Morphing Soft Thread Actuators for Tangible Interaction. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--11.
[18]
Shirley Gaw, Edward W Felten, and Patricia Fernandez-Kelly. 2006. Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In Proceedings of the SIGCHI conference on human factors in computing systems. 591--600.
[19]
Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. 571--582.
[20]
Giovanni Iachello, Khai N Truong, Gregory D Abowd, Gillian R Hayes, and Molly Stevens. 2006. Prototyping and sampling experience to evaluate ubiquitous computing privacy in the real world. In Proceedings of the SIGCHI conference on Human Factors in computing systems. 1009--1018.
[21]
Apple Inc. 2020. Don't close your MacBook, MacBook Air, or MacBook Pro with a cover over the camera. https://support.apple.com/en-us/HT211148 (Accessed on 09/12/2020).
[22]
Shanghai HOHO Industry. [n.d.]. HoHo Smart PDLC Film. http://www.hohotint.com/list-10-1.html (Accessed on 09/12/2020).
[23]
Marion Koelle, Torben Wallbaum, Wilko Heuten, and Susanne Boll. 2019. Evaluating a Wearable Camera's Social Acceptability In-the-Wild. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--6.
[24]
Marion Koelle, Katrin Wolf, and Susanne Boll. 2018. Beyond LED status lights-design requirements of privacy notices for body-worn cameras. In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction. 177--187.
[25]
Phillippa Lally, Cornelia HM Van Jaarsveld, Henry WW Potts, and Jane Wardle. 2010. How are habits formed: Modelling habit formation in the real world. European journal of social psychology 40, 6 (2010), 998--1009.
[26]
B. W. Lampson. 2004. Computer security in the real world. Computer 37, 6 (June 2004), 37--46. https://doi.org/10.1109/MC.2004.17
[27]
Dominique Machuletz, Stefan Laube, and Rainer Böhme. 2018. Webcam covering as planned behavior. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--13.
[28]
Dominique Machuletz, Henrik Sendt, Stefan Laube, and Rainer Böhme. 2016. Users protect their privacy if they can: Determinants of webcam covering behavior. In Proceedings of the European Workshop on Usable Security (EuroUSEC'16). Internet Society, Reston, VA, USA.
[29]
Tyler Moore. 2010. The economics of cybersecurity: Principles and policy options. International Journal of Critical Infrastructure Protection 3, 3 (2010), 103 - 117. https://doi.org/10.1016/j.ijcip.2010.10.002
[30]
Ryosuke Nakayama, Ryo Suzuki, Satoshi Nakamaru, Ryuma Niiyama, Yoshihiro Kawahara, and Yasuaki Kakehi. 2019. MorphIO: Entirely Soft Sensing and Actuation Modules for Programming Shape Changes through Tangible Interaction. In Proceedings of the 2019 on Designing Interactive Systems Conference. 975--986.
[31]
Sucheol Park and Jin Who Hong. 2009. Polymer dispersed liquid crystal film for variable-transparency glazing. Thin Solid Films 517, 10 (2009), 3183--3186.
[32]
Rebecca S Portnoff, Linda N Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's watching me? assessing the effectiveness of webcam indicator lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649--1658.
[33]
Halley P Profita, James Clawson, Scott Gilliland, Clint Zeagler, Thad Starner, Jim Budd, and Ellen Yi-Luen Do. 2013. Don't mind me touching my wrist: a case study of interacting with on-body technology in public. In Proceedings of the 2013 International Symposium on Wearable Computers. 89--96.
[34]
Sam Rutherford. 2020. Apple Warns Against Closing Your Laptop While Using a Webcam Cover. https://www.gizmodo.co.uk/2020/07/apple-warns-against-closing-your-laptop-while-using-a-webcam-cover/ (Accessed on 09/08/2020).
[35]
Marc Saltzman. 2020. Webcams are infiltrating your home. Here's how to secure those on your computers. https://www.usatoday.com/story/tech/columnist/2020/02/15/webcam-security-heres-some-simple-tips-protect-your-privacy/4749529002/
[36]
Stuart E Schechter, Rachna Dhamija, Andy Ozment, and Ian Fischer. 2007. The emperor's new security indicators. In 2007 IEEE Symposium on Security and Privacy (SP'07). IEEE, 51--65.
[37]
David Sharek, Cameron Swofford, and Michael Wogalter. 2008. Failure to recognize fake internet popup warning messages. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 52. SAGE Publications Sage CA: Los Angeles, CA, 557--560.
[38]
Thad Starner. 2001. The challenges of wearable computing: Part 1. Ieee Micro 21, 4 (2001), 44--52.
[39]
Thad Starner. 2001. The challenges of wearable computing: Part 2. Ieee Micro 21, 4 (2001), 54--67.
[40]
Katarzyna Stawarz, Anna L Cox, and Ann Blandford. 2015. Beyond self-tracking and reminders: designing smartphone apps that support habit formation. In Proceedings of the 33rd annual ACM conference on human factors in computing systems. 2653--2662.
[41]
Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness. In USENIX security symposium. Montreal, Canada, 399--416.
[42]
Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. " I don't own the data": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019).
[43]
Craig Timberg and Ellen Nakashima. 2013. FBI's search for 'Mo,' suspect in bomb threats, highlights use of malware for surveillance. The Washington Post (Dec 2013). https://www.washingtonpost.com/business/technology/2013/12/06/352ba174-5397-11e3-9e2c-e1d01116fd98_story.html
[44]
Khai N Truong, Shwetak N Patel, Jay W Summet, and Gregory D Abowd. 2005. Preventing camera recording by designing a capture-resistant environment. In International conference on ubiquitous computing. Springer, 73--86.
[45]
Kurt Wagner. 2020. Facebook Shared User Data With Developers Longer Than Promised. https://www.bloomberg.com/news/articles/2020-07-01/facebook-shared-user-data-with-developers-longer-than-promised
[46]
Guanyun Wang, Tingyu Cheng, Youngwook Do, Humphrey Yang, Ye Tao, Jianzhe Gu, Byoungkwon An, and Lining Yao. 2018. Printed paper actuator: A low-cost reversible actuation and sensing method for shape changing interfaces. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12.
[47]
Huiying Yan. 2020. Memory Bookmarking: Using In Situ Information to Promote Recall in Online Data Collection. Ph.D. Dissertation.
[48]
Lining Yao, Ryuma Niiyama, Jifei Ou, Sean Follmer, Clark Della Silva, and Hiroshi Ishii. 2013. PneUI: pneumatically actuated soft composite materials for shape changing interfaces. In Proceedings of the 26th annual ACM symposium on User interface software and Technology. 13--22.
[49]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending my castle: A co-design study of privacy mechanisms for smart homes. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--12.

Cited By

View all
  • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
  • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
  • (2024)The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image ModificationsProceedings of the ACM on Human-Computer Interaction10.1145/36410248:CSCW1(1-43)Online publication date: 26-Apr-2024
  • Show More Cited By

Index Terms

  1. Smart Webcam Cover: Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 5, Issue 4
    Dec 2021
    1307 pages
    EISSN:2474-9567
    DOI:10.1145/3508492
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 December 2021
    Published in IMWUT Volume 5, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. privacy-invasive sensor
    2. usable security and privacy
    3. webcam cover

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)305
    • Downloads (Last 6 weeks)34
    Reflects downloads up to 23 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Manual, Hybrid, and Automatic Privacy Covers for Smart Home CamerasProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661569(3453-3470)Online publication date: 1-Jul-2024
    • (2024)Designing Interactive Privacy Labels for Advanced Smart Home Device Configuration OptionsProceedings of the 2024 ACM Designing Interactive Systems Conference10.1145/3643834.3661527(3372-3388)Online publication date: 1-Jul-2024
    • (2024)The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image ModificationsProceedings of the ACM on Human-Computer Interaction10.1145/36410248:CSCW1(1-43)Online publication date: 26-Apr-2024
    • (2024)Do You Need to Touch? Exploring Correlations between Personal Attributes and Preferences for Tangible Privacy MechanismsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642863(1-23)Online publication date: 11-May-2024
    • (2023)Powering for privacyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620376(2473-2490)Online publication date: 9-Aug-2023
    • (2023)OptiRing: Low-Resolution Optical Sensing for Subtle Thumb-to-Index Micro-InteractionsProceedings of the 2023 ACM Symposium on Spatial User Interaction10.1145/3607822.3614538(1-13)Online publication date: 13-Oct-2023
    • (2023)Low-Voltage Haze Tuning with Cellulose-Network Liquid Crystal GelsACS Nano10.1021/acsnano.3c0369317:20(19767-19778)Online publication date: 19-Sep-2023
    • (2023)ConnectivityControl: Providing Smart Home Users with Real Privacy Configuration OptionsEnd-User Development10.1007/978-3-031-34433-6_11(180-188)Online publication date: 6-Jun-2023
    • (2022)PriKey – Investigating Tangible Privacy Control for Smart Home Inhabitants and VisitorsNordic Human-Computer Interaction Conference10.1145/3546155.3546640(1-13)Online publication date: 8-Oct-2022

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media