Theory and models

Keeping in Touch with the Family: Home and Away with the ASTRA Awareness System

Publication Type:

Conference Paper

Source:

CHI 2004, ACM Press, Vienna (0)

Keywords:

Published papers

Supporting Social Worlds with the Community Bar

Publication Type:

Report

Source:

Department of Computer Science, University of Calgary, Calgary, Alberta CANADA, Number 2005-789-2 (0)

Keywords:

Awareness Systems

Providing presence cues to telephone users

Publication Type:

Conference Paper

Source:

Proceedings of the 2000 ACM conference on Computer supported cooperative work, ACM Press, Philadelphia, Pennsylvania, United States, p.89-96 (0)

Keywords:

Presence; awareness; telecommunication; mobility; Social Communication

Abstract:

A significant problem with telephone communication is that callers do not have enough awareness about the Personal Presence of people they want to call. The result can be unwanted, interrupting calls. Thelive addressbookis an application that helps users make more informed telephone calls and teleconferences, from anywhere, via their wireless PDA or desktop browser. Unlike other network-based address books, which maintain static information, the live addressbook can display dynamic information about where the recipient currently is (i.e., reach number), and how available he/she currently is for calls. The system accomplishes this by applying to telephony the "Buddy List" concepts made popular in Instant Messaging applications. User trials assess the applicability of Personal Presence information in a telephone context

Evaluating Computer-Supported Cooperative Work: Models and Frameworks

Publication Type:

Conference Paper

Source:

CSCW'04, Volume 6, Chicago, Illinois, USA, p.11-121 (0)

Keywords:

Awareness Systems

Balancing Privacy and Awareness in Home Media Spaces

Publication Type:

Conference Paper

Source:

UBICOMP 03 - Workshop, p.5 (0)

Keywords:

casual interaction; awareness; video media spaces; privacy; telecommmuting; Privacy - Ubicomp - Workshop 2003

Notes:

This paper is a summary of: Neustaedter, C.: Balancing Privacy and Awareness in Home Media Spaces, MSc Thesis, Department of Computer Science, University of Calgary, Calgary, AB, Canada, June 2003.

Privacy Awareness System for Ubiquitous Computing Environments

Publication Type:

Conference Paper

Source:

International Conference on Ubiquitous Computing - UbiComp, Springer Verlag, GÖteberg, Sweden (0)

Keywords:

Privacy- Marc Langheinrich

Abstract:

Protecting personal privacy is going to be a prime concern for the deployment of ubiquitous computing systems in the real world. With daunting Orwellian visions looming, it is easy to conclude that tamper-proof technical protection mechanisms such as strong anonymization and encryption are the only solutions to such privacy threats. However, we argue that such perfect protection for personal information will hardly be achievable, and propose instead to build systems that help others respect our personal privacy, enable us to be aware of our own privacy, and to rely on social and legal norms to protect us from the few wrongdoers. We introduce a privacy awareness system targeted at ubiquitous computing environments that allows data collectors to both announce and implement data usage policies, as well as providing data subjects with technical means to keep track of their personal information as it is stored, used, and possibly removed from the system. Even though such a system cannot guarantee our privacy, we believe that it can create a sense of accountability in a world of invisible services that we will be comfortable living in and interacting with.

Notes:

Purpose: · Create a sense of accountability · Anonymities vs. Real identity Solutions: · Notice: privacy policies & policy announcement · Choice and consent: privacy agreements · Proximity and locality: locality information · Access and recourse: data access, and data logs. 4 Core concept of the system: 1. Machine-readable privacy policies (to provide choice and consent) 2. Policy announcement mechanism (to give notice) 3. Privacy proxies (to support access) 4. Privacy aware database (to support recourse: usage logs) References: 1. Mark Stefik. Trusted Systems. Scientific American, pages 78-81, March 1997

Experiences in the Use of a Media Space

Publication Type:

Journal Article

Source:

ACM Trans. Comput.-Hum. Interact., p.203-208 (0)

Keywords:

Awareness Systems

Supporting Group Collaboration with Inter-Personal Awareness Devices

Publication Type:

Journal Article

Source:

Personal Technologies, Volume 3, p.13-21 (0)

Keywords:

Awareness Systems

Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems

Publication Type:

Conference Paper

Source:

ACM conference on Computer supported cooperative work, ACM Press, Boston, Massachusetts, United States, p.248 - 257 (0)

Keywords:

Distributed Work Groups; Awareness Support; Privacy; Audio; Video; Visualization; Media Spaces.; Privacy - ACM

Abstract:

This paper describes a fundamental dual tradeoff that occurs in systems supporting awareness for distributed work groups, and presents several specific new techniques which illustrate good compromise points within this tradeoff space. This dual tradeoff is between privacy and awareness, and between awareness and disturbance. Simply stated, the more information about oneself that leaves your work area, the more potential for awareness of you exists for your colleagues. Unfortunately, this also represents the greatest potential for intrusion on your privacy. Similarly, the more information that is received about the activities of colleagues, the more potential awareness we have of them. However, at the same time, the more information we receive, the greater the chance that the information will become a disturbance to our normal work. This dual tradeoff seems to be a fundamental one. However, by carefully examining awareness problems in the light of this tradeoff it is possible to devise techniques which expose new points in the design space. These new points provide different types and quantities of information so that awareness can be achieved without invading the privacy of the sender, or creating a disturbance for the receiver. This paper presents four such techniques, each based on a careful selection of the information transmitted.

Notes:

Privacy vs. Awareness vs. Disturbance (overload of information) Co-located interaction is: · Implicit · Informal · Serendipitous Needs: · Continuous fashion of sharing spaces · Immediate awareness as a catalyst of communication Techniques to meet awareness goals and preserve privacy and non-disruption properties: · Privacy: THE SHADOW-VIEW & SHARED AUDIO o What information is, can be, or should be transmitted in terms both of its awareness support content, and in terms of its effect on privacy. o Reciprocity · Disruption and high resource utilization: SHARED AUDIO (who's speaking but not what is saying & background noise) o Partial control over interruptions in the hands of the receiver o Do not consume too many resources (cognitive and machine) · THE SYNTHETIC GROUP-PHOTO · VISUALIZE A RECENT HISTORY OF ACTIVITIES (non-uniformly in time)

A Room of Our Own: Experiences from a Direct Office Share

Publication Type:

Conference Paper

Source:

CHI, Boston, Massachussets, USA, p.138-144 (0)

Keywords:

Awareness Systems

Syndicate content