Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Proceedings on Privacy Enhancing Technologies

4 Issues per year

Open Access
Online
ISSN
2299-0984
See all formats and pricing
More options …

Flying Eyes and Hidden Controllers: A Qualitative Study of People’s Privacy Perceptions of Civilian Drones in The US

Yang Wang / Huichuan Xia / Yaxing Yao / Yun Huang
Published Online: 2016-05-06 | DOI: https://doi.org/10.1515/popets-2016-0022

Abstract

Drones are unmanned aircraft controlled remotely or operated autonomously. While the extant literature suggests that drones can in principle invade people’s privacy, little is known about how people actually think about drones. Drawing from a series of in-depth interviews conducted in the United States, we provide a novel and rich account of people’s privacy perceptions of drones for civilian uses both in general and under specific usage scenarios. Our informants raised both physical and information privacy issues against government, organization and individual use of drones. Informants’ reasoning about the acceptance of drone use was in part based on whether the drone is operating in a public or private space. However, our informants differed significantly in their definitions of public and private spaces. While our informants’ privacy concerns such as surveillance, data collection and sharing have been raised for other tracking technologies such as camera phones and closed-circuit television (CCTV), our interviews highlight two heightened issues of drones: (1) powerful yet inconspicuous data collection, (2) hidden and inaccessible drone controllers. These two aspects of drones render some of people’s existing privacy practices futile (e.g., notice recording and ask controllers to stop or delete the recording). Some informants demanded notifications of drones near them and expected drone controllers asking for their explicit permissions before recording. We discuss implications for future privacy-enhancing drone designs.

Keywords: Drone; UAV; tracking; perceptions; privacy

References

  • [1] Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347, 6221 (2015), 509-514.Google Scholar

  • [2] Alan Boyle. 2016. FAA panel will decide how drones and people mix. (Feb. 2016). http://www.geekwire.com/2016/faacreates-panel-to-come-up-with-rules-for-letting-dronescome-near-innocent-bystanders/Google Scholar

  • [3] Anita Allen. 2015. Privacy and Medicine. In The Stanford Encyclopedia of Philosophy (fall 2015 ed.), Edward N. Zalta (Ed.). http://plato.stanford.edu/archives/fall2015/entries/privacy-medicine/Google Scholar

  • [4] Amazon. 2014. Amazon Prime Air. (2014). http://www.amazon.com/b?node=8037720011Google Scholar

  • [5] Rebecca Angeles. 2007. An empirical study of the anticipated consumer response to RFID product item tagging. Industrial Management & Data Systems 107, 4 (2007), 461-483.Google Scholar

  • [6] Melissa Barbee. 2014. Uncharted Territory: The FAA and the Regulation of Privacy via Rulemaking for Domestic Drones. (2014).Google Scholar

  • [7] Richard E. Boyatzis. 1998. Transforming Qualitative Information: Thematic Analysis and Code Development. SAGE.Google Scholar

  • [8] Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (Jan. 2006), 77-101. DOI: http://dx.doi.org/10.1191/1478088706qp063oaCrossrefGoogle Scholar

  • [9] Daniel J. Butler, Justin Huang, Franziska Roesner, and Maya Cakmak. 2015. The Privacy-Utility Tradeoff for Remotely Teleoperated Robots. In Proceedings of the Tenth Annual ACM/IEEE International Conference on Human-Robot Interaction (HRI ’15). ACM, New York, NY, USA, 27-34. DOI: http://dx.doi.org/10.1145/2696454.2696484CrossrefGoogle Scholar

  • [10] John Travis Butler and Arvin Agah. 2001. Psychological effects of behavior patterns of a mobile personal robot. Autonomous Robots 10, 2 (2001), 185-202.CrossrefGoogle Scholar

  • [11] Ryan Calo. 2011. The drone as privacy catalyst. Stanford Law Review Online 64 (2011), 29-33.Google Scholar

  • [12] Ann Cavoukian. 2012. Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Ontario, Canada.Google Scholar

  • [13] Reece A Clothier, Dominique A Greer, Duncan G Greer, and Amisha M Mehta. 2015. Risk perception and the public acceptance of drones. Risk analysis (2015).Google Scholar

  • [14] Consumer Electronics Association (CEA). 2015. U.S. Consumer Electronics Sales and Forecasts. Technical Report. Consumer Electronics Association (CEA). https://www.cta.tech/News/News-Releases/Press-Releases/2015-Press-Releases/New-Tech-to-Drive-CE-Industry-Growth-in-2015,-Proj.aspxGoogle Scholar

  • [15] Kathleen Bartzen Culver. 2014. From battlefield to newsroom: Ethical implications of drone technology in journalism. Journal of Mass Media Ethics 29, 1 (2014), 52-64.Google Scholar

  • [16] Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In situ with bystanders of augmented reality glasses: Perspectives on recording and privacy-mediating technologies. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems. ACM, 2377-2386.Google Scholar

  • [17] Paul Dourish. 2004. What we talk about when we talk about context. Personal and ubiquitous computing 8, 1 (2004), 19-30.Google Scholar

  • [18] Travis Dunlap. 2009. We’ve got our eyes on you: When surveillance by unmanned aircraft systems constitutes a Fourth Amendment search. S. Tex. L. Rev. 51 (2009), 173.Google Scholar

  • [19] FAA. 2015a. B4UFLY Smartphone App. (2015). https://www.faa.gov/uas/b4ufly/Google Scholar

  • [20] FAA. 2015b. Unmanned Aircraft Systems. (2015). https://www.faa.gov/uas/Google Scholar

  • [21] Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I’ve got 99 problems, but vibration ain’t one: a survey of smartphone users’ concerns. In Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices. ACM, 33-44.Google Scholar

  • [22] Baruch Fischhoff, Paul Slovic, Sarah Lichtenstein, Stephen Read, and Barbara Combs. 1978. How safe is safe enough? A psychometric study of attitudes towards technological risks and benefits. Policy Sciences 9, 2 (April 1978), 127-152. DOI: http://dx.doi.org/10.1007/BF00143739CrossrefGoogle Scholar

  • [23] Erving Goffman. 1959. The Presentation of Self in Everyday Life (1 ed.). Anchor.Google Scholar

  • [24] Erving Goffman. 1971. Relations in public. microstructure of the public order. Hannondsworth: Penguin (1971).Google Scholar

  • [25] Edward Twitchell Hall. 1966. The hidden dimension . (1966).Google Scholar

  • [26] Steve Hodges, Emma Berry, and Ken Wood. 2011. Sense- Cam: a wearable camera that stimulates and rehabilitates autobiographical memory. Memory (Hove, England) 19, 7 (Oct. 2011), 685-696. DOI: http://dx.doi.org/10.1080/09658211.2011.605591CrossrefGoogle Scholar

  • [27] Joachim R Höflich. 2006. The mobile phone and the dynamic between private and public communication: Results of an international exploratory study. Knowledge, Technology & Policy 19, 2 (2006), 58-68.Google Scholar

  • [28] Jason Hong. 2013. Considering privacy issues in the context of Google glass. Commun. ACM 56, 11 (2013), 10-11.CrossrefGoogle Scholar

  • [29] Mohammad Alamgir Hossain and Yogesh K Dwivedi. 2014. What improves citizens’ privacy perceptions toward RFID technology? A cross-country investigation using mixed method approach. International Journal of Information Management 34, 6 (2014), 711-719.CrossrefGoogle Scholar

  • [30] Roberto Hoyle, Robert Templeman, Denise Anthony, David Crandall, and Apu Kapadia. 2015. Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 1645-1648.Google Scholar

  • [31] Roberto Hoyle, Robert Templeman, Steven Armes, Denise Anthony, David Crandall, and Apu Kapadia. 2014. Privacy behaviors of lifeloggers using wearable cameras. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, 571-582.Google Scholar

  • [32] Ira Lamcja. 2015. Canada’s police forces take to the sky with drones | Metro News. (2015). http://goo.gl/ITh2Nu http://www.metronews.ca/news/canada/2015/03/19/canadas-police-forces-taking-to-the-sky-with-drones.html.Google Scholar

  • [33] Jeremy Diamond. 2015. Obama: We need more drone regulations. (2015). http://www.cnn.com/2015/01/27/politics/obama-drones-fareed/Google Scholar

  • [34] Jonathan Kaiman. 2015. Chinese film star Zhang Ziyi is proposed to - by drone. The Guardian (Feb. 2015). http://goo.gl/kxo4lh http://www.theguardian.com/world/2015/feb/09/chinese-film-star-zhang-ziyi-is-proposed-to-by-drone.Google Scholar

  • [35] Jerry Kang. 1998. Information Privacy in Cyberspace Transactions. Stanford Law Review 50, 4 (April 1998), 1193-1294. DOI: http://dx.doi.org/10.2307/1229286CrossrefGoogle Scholar

  • [36] Kathy Baxter and Catherine Courage. 2005. Understanding Your Users: A Practical Guide to User Requirements Methods, Tools, and Techniques (1 edition ed.). Morgan Kaufmann, San Francisco, CA.Google Scholar

  • [37] Yoohwan Kim, Juyeon Jo, and Sanjeeb Shrestha. 2014. A server-based real-time privacy protection scheme against video surveillance by Unmanned Aerial Systems. In Unmanned Aircraft Systems (ICUAS), 2014 International Conference on. IEEE, 684-691.Google Scholar

  • [38] Mohammed Korayem, Robert Templeman, Dennis Chen, David Crandall, and Apu Kapadia. 2014. Screenavoider: Protecting computer screens from ubiquitous cameras. arXiv preprint arXiv:1412.0008 (2014).Google Scholar

  • [39] Les Dorr and Alison Duquette. 2015. Press Release - Unmanned Aircraft Registration System Takes Flight. (Dec. 2015). http://www.faa.gov/news/press_releases/news_story.cfm?newsId=19874Google Scholar

  • [40] LightCense. 2016. LightCense. (2016). http://www.lightcense.co/Google Scholar

  • [41] Lyn H. Lofland. 1998. The Public Realm: Exploring the City’s Quintessential Social Territory. Transaction Publishers.Google Scholar

  • [42] Aleecia M. McDonald and Lorrie Faith Cranor. 2010. Americans’ attitudes about internet behavioral advertising practices. ACM Press, 63. DOI: http://dx.doi.org/10.1145/1866919.1866929CrossrefGoogle Scholar

  • [43] David H. Nguyen and Gillian R. Hayes. 2010. Information Privacy in Institutional and End-user Tracking and Recording Technologies. Personal Ubiquitous Comput. 14, 1 (Jan. 2010), 53-72. DOI: http://dx.doi.org/10.1007/s00779-009-0229-4CrossrefGoogle Scholar

  • [44] Jack Nicas. 2016. U.S. Drone Users Number At Least 181,000. (Jan. 2016). http://blogs.wsj.com/digits/2016/01/06/u-s-drone-users-number-at-least-181000/Google Scholar

  • [45] Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington law review 79, 1 (2004), 119-158.Google Scholar

  • [46] Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press.Google Scholar

  • [47] NoFlyZone. 2016. NoFlyZone. (2016). https://www.noflyzone.org/Google Scholar

  • [48] Wanda J. Orlikowski. 1992. The Duality of Technology: Rethinking the Concept of Technology in Organizations. Organization Science 3, 3 (Aug. 1992), 398-427. http://www.jstor.org/stable/2635280Google Scholar

  • [49] George Orwell. 1949. 1984. Signet Classic.Google Scholar

  • [50] Leysia Palen and Paul Dourish. 2003. Unpacking “privacy” for a networked world. In Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, Ft. Lauderdale, Florida, USA, 129-136. DOI: http://dx.doi.org/10.1145/642611.642635CrossrefGoogle Scholar

  • [51] Pensacola News Journal. 2015. Drone video: Pensacola Grand Mardi Gras Parade. (2015). http://www.pnj.com/videos/entertainment/events/mardi-gras/2015/02/15/23444447/Google Scholar

  • [52] Katerina Pramatari and Aristeidis Theotokis. 2009. Consumer acceptance of RFID-enabled services: a model of multiple attitudes, perceived system characteristics and individual traits. European Journal of Information Systems 18, 6 (2009), 541-552.CrossrefGoogle Scholar

  • [53] Nisarg Raval, Landon Cox, Animesh Srivastava, Ashwin Machanavajjhala, and Kiron Lebeck. 2014. Markit: privacy markers for protecting visual secrets. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication. ACM, 1289-1295.Google Scholar

  • [54] Franziska Roesner, David Molnar, Alexander Moshchuk, Tadayoshi Kohno, and Helen J Wang. 2014. World-driven access control for continuous sensing. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, 1169-1181.Google Scholar

  • [55] Bruce Schneier. 2015. Is it OK to shoot down a drone over your house? - CNN.com. (2015). http://www.cnn.com/2015/09/09/opinions/schneier-shoot-down-drones/index.htmlGoogle Scholar

  • [56] H Jeff Smith, Tamara Dinev, and Heng Xu. 2011. Information privacy research: an interdisciplinary review. MIS quarterly 35, 4 (2011), 989-1016.Google Scholar

  • [57] Daniel J Solove. 2006. A taxonomy of privacy. University of Pennsylvania law review (2006), 477-564.Google Scholar

  • [58] Robert Templeman, Mohammed Korayem, David Crandall, and Apu Kapadia. 2014. PlaceAvoider: Steering first-person cameras away from sensitive spaces. In Network and Distributed System Security Symposium (NDSS).Google Scholar

  • [59] Emily Troshynski, Charlotte Lee, and Paul Dourish. 2008. Accountabilities of presence: reframing location-based systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 487-496.Google Scholar

  • [60] Janice Tsai, Patrick Kelley, Lorrie Cranor, and Norman Sadeh. 2010. Location-Sharing Technologies: Privacy Risks and Controls. I/S: A Journal of Law and Policy for the Information Society 6, 2 (2010), 119-152. http: //ssrn.com/abstract=1997782Google Scholar

  • [61] Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012a. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ’12). ACM, New York, NY, USA, 4:1-4:15. DOI: http://dx.doi.org/10.1145/2335356.2335362CrossrefGoogle Scholar

  • [62] Blase Ur, Pedro Giovanni Leon, Lorrie Faith Cranor, Richard Shay, and Yang Wang. 2012b. Smart, useful, scary, creepy: perceptions of online behavioral advertising. In Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, 4-19.Google Scholar

  • [63] Samuel Warren and Louis Brandeis. 1890. The Right to Privacy. Harvard Law Review 4, 5 (1890), 193-220.CrossrefGoogle Scholar

  • [64] Alan F. Westin. 2003. Social and Political Dimensions of Privacy. Journal of Social Issues 59, 2 (July 2003), 431-453. DOI: http://dx.doi.org/10.1111/1540-4560.00072CrossrefGoogle Scholar

  • [65] David Wright, Rachel Finn, Raphael Gellert, Serge Gutwirth, Philip Schütz, Michael Friedewald, Silvia Venier, and Emilio Mordini. 2014. Ethical dilemma scenarios and emerging technologies. Technological Forecasting and Social Change 87 (2014), 325-336.Google Scholar

  • [66] WUSA9. 2015. Drone video goes inside abandoned White Flint Mall. (2015). http://goo.gl/Akndp2 http://bethesda.wusa9.com/news/news/2664031-dronevideo-goes-inside-abandoned-white-flint-mall. Google Scholar

About the article

Received: 2015-11-30

Revised: 2016-03-01

Accepted: 2016-03-02

Published Online: 2016-05-06

Published in Print: 2016-07-01


Citation Information: Proceedings on Privacy Enhancing Technologies, ISSN (Online) 2299-0984, DOI: https://doi.org/10.1515/popets-2016-0022.

Export Citation

© 2016. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. BY-NC-ND 4.0

Citing Articles

Here you can find all Crossref-listed publications in which this article is cited. If you would like to receive automatic email messages as soon as this article is cited in other publications, simply activate the “Citation Alert” on the top of this page.

[1]
Paul R. Nesbit, Thomas E. Barchyn, Chris H. Hugenholtz, Sterling Cripps, and Maja Kucharczyk
Journal of Unmanned Vehicle Systems, 2017, Volume 5, Number 2, Page 51

Comments (0)

Please log in or register to comment.
Log in