Investigating Privacy Perceptions and Subjective Acceptance of Eye Tracking on Handheld Mobile Devices (original) (raw)

The Role of Eye Gaze in Security and Privacy Applications: Survey and Future HCI Research Directions

Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 2020

For the past 20 years, researchers have investigated the use of eye tracking in security applications. We present a holistic view on gaze-based security applications. In particular, we canvassed the literature and classify the utility of gaze in security applications into a) authentication, b) privacy protection, and c) gaze monitoring during security critical tasks. This allows us to chart several research directions, most importantly 1) conducting field studies of implicit and explicit gaze-based authentication due to recent advances in eye tracking, 2) research on gaze-based privacy protection and gaze monitoring in security critical tasks which are under-investigated yet very promising areas, and 3) understanding the privacy implications of pervasive eye tracking. We discuss the most promising opportunities and most pressing challenges of eye tracking for security that will shape research in gaze-based security applications for the next decade.

EyeSpot: Leveraging Gaze to Protect Private Text Content on Mobile Devices from Shoulder Surfing

Multimodal Technologies and Interaction

As mobile devices allow access to an increasing amount of private data, using them in public can potentially leak sensitive information through shoulder surfing. This includes personal private data (e.g., in chat conversations) and business-related content (e.g., in emails). Leaking the former might infringe on users’ privacy, while leaking the latter is considered a breach of the EU’s General Data Protection Regulation as of May 2018. This creates a need for systems that protect sensitive data in public. We introduce EyeSpot, a technique that displays content through a spot that follows the user’s gaze while hiding the rest of the screen from an observer’s view through overlaid masks. We explore different configurations for EyeSpot in a user study in terms of users’ reading speed, text comprehension, and perceived workload. While our system is a proof of concept, we identify crystallized masks as a promising design candidate for further evaluation with regard to the security of the...

Privacy-aware eye tracking using differential privacy

Proceedings of the 11th ACM Symposium on Eye Tracking Research & Applications, 2019

With eye tracking being increasingly integrated into virtual and augmented reality (VR/AR) head-mounted displays, preserving users' privacy is an ever more important, yet under-explored, topic in the eye tracking community. We report a large-scale online survey (N=124) on privacy aspects of eye tracking that provides the first comprehensive account of with whom, for which services, and to what extent users are willing to share their gaze data. Using these insights, we design a privacy-aware VR interface that uses differential privacy, which we evaluate on a new 20-participant dataset for two privacy sensitive tasks: We show that our method can prevent user re-identification and protect gender information while maintaining high performance for gaze-based document type classification. Our results highlight the privacy challenges particular to gaze data and demonstrate that differential privacy is a potential means to address them. Thus, this paper lays important foundations for future research on privacy-aware gaze interfaces. CCS CONCEPTS • Security and privacy → Human and societal aspects of security and privacy; • Human-centered computing → Human computer interaction (HCI);

User Perception of Privacy with Ubiquitous Devices

2021

Privacy is important for all individuals in everyday life. With emerging technologies, smartphones with AR, various social networking applications and artificial intelligence driven modes of surveillance, they tend to intrude privacy. This study aimed to explore and discover various concerns related to perception of privacy in this era of ubiquitous technologies. It employed online survey questionnaire to study user perspectives of privacy. Purposive sampling was used to collect data from 60 participants. Inductive thematic analysis was used to analyze data. Our study discovered key themes like attitude towards privacy in public and private spaces, privacy awareness, consent seeking, dilemmas/confusions related to various technologies, impact of attitude and beliefs on individuals’ actions regarding how to protect oneself from invasion of privacy in both public and private spaces. These themes interacted amongst themselves and influenced formation of various actions. They were like ...

Privacy Perception when Using Smartphone Applications

Mobile Networks and Applications

Our smartphone is full of applications and data that analytically organize, facilitate and describe our lives. We install applications for the most varied reasons, to inform us, to have fun and for work, but, unfortunately, we often install them without reading the terms and conditions of use. The result is that our privacy is increasingly at risk. Considering this scenario, in this paper, we analyze the user's perception towards privacy while using smartphone applications. In particular, we formulate two different hypotheses: 1) the perception of privacy is influenced by the knowledge of the data used by the installed applications; 2) applications access to much more data than they need. The study is based on two questionnaires (within-subject experiments with 200 volunteers) and on the lists of installed apps (30 volunteers). Results show a widespread abuse of data related to location, personal contacts, camera, Wi-Fi network list, running apps list, and vibration. An in-depth analysis shows that some features are more relevant to certain groups of users (e.g., adults are mainly worried about contacts and Wi-Fi connection lists; iOS users are sensitive to smartphone vibration; female participants are worried about possible misuse of the smartphone camera).

The Eye as a New Side Channel Threat on Smartphones

Eye tracking is not a new idea in human-computer interaction research. Since at least as early as 1990s, researchers have tried to utilize eye movement to drive or monitor user interaction with computers. The new idea is using eye movement tracking to breach the privacy of mobile users. In this paper, we study the feasibility of exploiting consumer-grade cameras built onto current smartphones to log eye gazes, and then estimating the keypad numbers being tapped by the user. Assuming Trojan applications with camera use permissions, this process could be implemented without the user contest or knowledge, imposing a potential new threat to the security and privacy of mobile users. Our approach does not involve machine learning methods. In these first preliminary proof-of-concept experiments, we mainly rely on a human attacker to manually analyze the collected images from the smartphone. Utilizing basic dimensionality and motion flow calculations, our results show a promising attack vector with more than 60% of taps inference accuracy.

Privacy in a World of Mobile Devices

2014

Our individual privacy is increasingly at risk in a world full of smart mobile devices. The situation will only get worse with the rise of an Internet of Things. One way to address this problem is through the use of systems that better understand their context and and whose information gathering and sharing behaviors can be controlled or influenced by context-aware policies. We illustrate the the problem and an approach to address it through recent work on FaceBlock, a project that protects the privacy of people around Google Glass users by making pictures taken by the latter, Privacy-Aware. Through sharing of privacy policies, users can choose whether or not to be included in pictures.

Keeping Tabs on Privacy: The Impact of Privacy Information on Mobile App Perceptions

People increasingly use mobile applications (apps) for multiple online activities. Users often do not have access to mobile apps' privacy information when deciding whether to download an app. We designed and tested an interface that provides users with information on apps' privacy practices prior to download. 94 participants were asked to rate 4 app prototypes with varying privacy information. The experiment was a 2 (privacy display: text or visual) x 2 (privacy practices: enhancing or invasive) x 2 (app type: social media or health) factorial design. We found that users rate apps' trustworthiness and their own comfort entering information differently based on apps' privacy practices, and that app type influences these perceptions. Privacy information did not affect whether users liked an app or would use or recommend it. 72% participants found the privacy tab helpful, and we discuss design implications for incorporating privacy information into mobile interfaces prior to download.

Investigating Privacy-Augmented Displays for Mobile Devices

2005

Abstract With more individuals accessing sensitive data in public situations, designers of mobile applications must determine the best ways to keep that information private. This research looks at using pixels, which convey information using color, in conjunction with text in order to maintain desired levels of privacy in otherwise non-private displays. Since privacy can vary according to a person's preferences, a questionnaire was first administered to determine what types of information individuals generally prefer to keep private.