{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:34:29Z","timestamp":1776116069716,"version":"3.50.1"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T00:00:00Z","timestamp":1602633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006435","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1252697, CNS-1814513, and CNS-181486"],"award-info":[{"award-number":["CNS-1252697, CNS-1814513, and CNS-181486"]}],"id":[{"id":"10.13039\/100006435","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2020,10,14]]},"abstract":"<jats:p>Sensor-enabled computers in the form of 'IoT' devices such as home security cameras and voice assistants are increasingly becoming pervasive in our environment. With the embedded cameras and microphones in these devices, this 'invasion' of our everyday spaces can pose significant threats to the privacy of bystanders. Because of their complex functionality, even when people attempt privacy measures (such as asking the owner to \"turn the camera off\"), these devices may still record information because of the lack of a 'real' off button. With the ambiguities of current designs, a bystander's perceived privacy can diverge from their actual privacy. Indeed, being able to assess one's actual privacy is a key aspect in managing one's privacy according to Altman's theory of boundary regulation, and current designs fall short in assuring people of their privacy. To understand how people as bystanders manage their privacy with IoT devices, we conducted an interview study about people's perceptions of and behaviors around current IoT devices. We find that although participants' behaviors line up with Altman's theory of boundary regulation, in the face of uncertainty about their privacy, they desire or engage in various 'tangible' workarounds. Based on our findings, we identify and introduce the concept of 'tangible privacy' as being essential to boundary regulation with IoT devices. We argue that IoT devices should be designed in a way that clearly and unambiguously conveys sensor states to people around them and make actionable design recommendations to provide strong privacy assurances to bystanders.<\/jats:p>","DOI":"10.1145\/3415187","type":"journal-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T22:27:49Z","timestamp":1602800869000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":98,"title":["Tangible Privacy"],"prefix":"10.1145","volume":"4","author":[{"given":"Imtiaz","family":"Ahmad","sequence":"first","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Rosta","family":"Farzan","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]},{"given":"Apu","family":"Kapadia","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Adam J.","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Pittsburgh, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,10,15]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Personal Space, Territory, and Crowding. Brooks\/Cole Pub","author":"Altman Irwin"},{"key":"e_1_2_1_2_1","volume-title":"Omar Abou Khaled, and Nadine Couture","author":"Angelini Leonardo","year":"2018"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2925509.2925546"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0038038597031003015"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-011-2094-4_6"},{"key":"e_1_2_1_6_1","volume-title":"The SAGE encyclopedia of qualitative research methods","author":"Benaquisto Lucia","year":"2008"},{"key":"e_1_2_1_7_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Brocker Matthew","year":"2014"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.044"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0740-8188(03)00033-1"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882992.1883016"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025485"},{"key":"e_1_2_1_12_1","volume-title":"Characterizing Privacy Perceptions of Voice Assistants: A Technology Probe Study. ArXiv","author":"Chandrasekaran Varun","year":"2018"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2016.62"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173848"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873600"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466251"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1620545.1620564"},{"key":"e_1_2_1_20_1","unstructured":"Emily Dixon. 2019. Family finds hidden camera livestreaming from their Airbnb in Ireland. https:\/\/www.cnn.com\/2019\/04\/05\/europe\/ireland-airbnb-hidden-camera-scli-intl\/index.html.  Emily Dixon. 2019. Family finds hidden camera livestreaming from their Airbnb in Ireland. https:\/\/www.cnn.com\/2019\/04\/05\/europe\/ireland-airbnb-hidden-camera-scli-intl\/index.html."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235924.3235956"},{"key":"e_1_2_1_22_1","first-page":"2","article-title":"The Watcher and the Watched: Social Judgments About Privacy in a Public","volume":"21","author":"Friedman Batya","year":"2008","journal-title":"Place. Hum.-Comput. Interact."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP)","author":"Gerber Nina","year":"2018"},{"key":"e_1_2_1_24_1","unstructured":"Stacy Gray. 2016. Always on: privacy implications of microphone-enabled devices. In Future of privacy forum.  Stacy Gray. 2016. Always on: privacy implications of microphone-enabled devices. In Future of privacy forum."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208296"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124838"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_2_1_28_1","unstructured":"Intel. 2014. Intel IoT Gateway. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/gateway-solutions-iot-brief.pdf.  Intel. 2014. Intel IoT Gateway. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/gateway-solutions-iot-brief.pdf."},{"key":"e_1_2_1_29_1","volume-title":"Axial coding and the grounded theory controversy. Western journal of nursing research","author":"Kendall Judy","year":"1999"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173225.3173234"},{"key":"e_1_2_1_31_1","volume-title":"Needing smart home technologies: The perspectives of older adults in continuing care retirement communities. Intformatics in primary care","author":"Courtney Karen L","year":"2008"},{"key":"e_1_2_1_32_1","volume-title":"Concerns and Privacy-seeking Behaviors with Smart Speakers. Proceedings of the ACM on Human-Computer Interaction","volume":"2","author":"Lau Josephine","year":"2018"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/criq.12526"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2987780"},{"key":"e_1_2_1_39_1","volume-title":"Sociology: Exploring the architecture of everyday life","author":"Newman David M","year":"2020"},{"key":"e_1_2_1_40_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_41_1","volume-title":"Turn signals are the facial expressions of automobiles","author":"Norman Don"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.67.2.35.18612"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20389"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300275"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702164"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of the USENIX Symposium on Usable Privacy and Security (SOUPS '18)","author":"Rashidi Yasmeen","year":"2018"},{"key":"e_1_2_1_48_1","first-page":"141","article-title":"Privacy in public","volume":"69","author":"Reidenberg Joel R","year":"2014","journal-title":"U. Miami L. Rev."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466152"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_2_1_51_1","volume-title":"Clearly Opaque: Privacy Risks of the Internet of Things. In Rosner, Gilad and Kenneally, Erin","author":"Rosner Gilad","year":"2018"},{"key":"e_1_2_1_52_1","volume-title":"External cognition: how do graphical representations work? International journal of human-computer studies","author":"Scaife Mike","year":"1996"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the 18th Annual Network and Distributed System Security Symposium (NDSS). 17--33","author":"Schlegel Roman","year":"2011"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2010.36"},{"key":"e_1_2_1_55_1","unstructured":"Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences .Teachers college press.  Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences .Teachers college press."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126633"},{"key":"e_1_2_1_57_1","volume-title":"Luigi Alfredo Grieco, and Alberto Coen-Porisini","author":"Sicari Sabrina","year":"2015"},{"key":"e_1_2_1_58_1","volume-title":"Perceptions and Attitudes Towards Smart Home Technologies. In International Conference on Smart Homes and Health Telematics. Springer, 203--214","author":"Singh Deepika","year":"2018"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376585"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2015.1107167"},{"key":"e_1_2_1_61_1","volume-title":"Exploring Home Security Risks with Smart Toy Bears. In 2018 IEEE\/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 285--286","author":"Streiff Joshua","year":"2018"},{"key":"e_1_2_1_62_1","first-page":"34","article-title":"Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things","volume":"3","author":"Sundmaeker Harald","year":"2010","journal-title":"European Commision"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of The 20th Annual Network and Distributed System Security Symposium (NDSS).","author":"Templeman Robert","year":"2013"},{"key":"e_1_2_1_64_1","volume-title":"Emerging frameworks for tangible user interfaces. IBM systems journal","author":"Ullmer Brygg","year":"2000"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.360"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0022"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2016.25"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"},{"key":"e_1_2_1_69_1","first-page":"24","volume-title":"Privacy Perceptions and Designs of Bystanders in Smart Homes. Proc. ACM Hum.-Comput. Interact.","volume":"3","author":"Yao Yaxing","year":"2019"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025907"},{"key":"e_1_2_1_71_1","volume-title":"End User Security and Privacy Concerns with Smart Homes. In Thirteenth Symposium on Usable Privacy and Security (SOUPS","author":"Zeng Eric","year":"2017"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2677199.2687906"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415187","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3415187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:10Z","timestamp":1750197790000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3415187"}},"subtitle":["Towards User-Centric Sensor Designs for Bystander Privacy"],"short-title":[],"issued":{"date-parts":[[2020,10,14]]},"references-count":73,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2020,10,14]]}},"alternative-id":["10.1145\/3415187"],"URL":"https:\/\/doi.org\/10.1145\/3415187","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10,14]]},"assertion":[{"value":"2020-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}