Theory and models

Hanging on the ’Wire: A Field Study of an Audio-Only Media Space

Publication Type:

Journal Article

Source:

ACM Transactions on Computer-Human Interaction, Volume 4, Number 1, p.39-66 (0)

Keywords:

Awareness Systems

Thunderwire: A Field Study of an Audio-Only Media Space

Publication Type:

Conference Paper

Source:

CSCW, Cambridge, MA, USA, p.238-247 (0)

Keywords:

Awareness Systems

Privacy Issues in Ubiquitous Multimedia Environments: Wake Sleeping Dogs, or Let Them Lie?

Publication Type:

Conference Paper

Source:

Interact '99, International Conference on Human-Computer Interaction, IOS Press, IFIP TC.13, Edinburgh, UK, p.214-221 (0)

Keywords:

internet; multimedia applications; privacy trust; ubiquitous computing; grounded theory; Privacy - Anne Adams

Abstract:

Many users are not aware of the potential privacy implications of ubiquitous multimedia applications. Decision-makers are often reluctant to raise users’ awareness, since this may open a ‘can of worms’ and deter potential users. We conducted an opportunistic study after video-conferencing developers placed a camera in the common room of their university department, broadcasting the video on the Internet. The email debate following the common room users ‘discovery’ of the camera’s existence was analysed as well as 47 anonymous questionnaire responses. Three distinct types of responses were identified, varying with the media type (audio vs. video) transmitted and scope of distribution (local vs. global). The groups also differ in their perception of the common room situation (public vs. private) and the degree of control exerted by observers and those observed. We conclude that privacy implications of ubiquitous multimedia applications must be made explicit. Users who discover privacy implication retrospectively are likely to respond in an emotive manner, reject the technology, and lose trust in those responsible for it

Notes:

Social interactions: · Sense of place rather than physical characteristics of spaces · Presentation of the self within a perceived situation · User need social cues about type of situation in which they find themselves (private/public) and the types of appropriate behavior.

Casablanca: Designing Social Communication Devices for the Home

Publication Type:

Conference Paper

Source:

CHI 2001, Volume 2, p.325-332 (0)

Keywords:

CMC; domestic technologies; residential technologies; media spaces; audio spaces; shared whiteboards; awareness; ambient displays; internet appliances; design guidelines; aesthetics; consumers; homes; computer-human interaction; Social Communication

Abstract:

The Casablanca project explored how media space concepts could be incorporated into households and family life. Thiseffort included prototypes built for the researchers’ own home use, field studies of households, and consumer testingof design concepts. A number of previously unreported consumer preferences and concerns were uncovered and incorporated into several original prototypes, most notably ScanBoard and the Intentional Presence Lamp. Casablanca also resulted in conclusions about designing household social communication devices.

Privacy in Multimedia Communications: Protecting Users, Not Just Data

Publication Type:

Conference Paper

Source:

People and Computers XV - Interaction without frontiers - Joint Proceedings of HCI2001 and ICM2001, Springer, Lille, p.49-64 (0)

Keywords:

privacy; multimedia communications; grounded theory; trust; user centred design; Privacy - Anne Adams

Abstract:

As the use of ubiquitous multimedia communication increases so do the privacy risks associated with widespread accessibility and utilisation of data generated by such applications. Most invasions of privacy are not intentional but due to designers inability to anticipate how this data could be used, by whom, and how this might affect users. This paper addresses the problem by providing a model of user perceptions of privacy in multimedia environments. The model has been derived from an analysis of empirical studies conducted by the authors and other researchers and aids designers to determine which information users regard as private, and in which context. It also identifies trade-offs that users are willing to make rendering some privacy risks acceptable. To demonstrate how this model can be used to assess the privacy implications of multimedia communications in a specific context, an example of the models application for a specific usage scenario is provided.

Notes:

Influences of what users are prepared to reveal about themselves: · Organizational culture · Perceptions of the situation Model of how user perceives privacy: · Which info users regard as private · From whom · In which context · Trade-off between potential risks and benefits Privacy model factors and assumptions: · Information Sensitivity · Information Receiver · Information Usage Privacy Invasion Cycle · Trust: users don’t go into every situation ready to assess the privacy benefits and risks. · Assumptions: based on o User previous knowledge and experiences and their role in the interaction o Perceived Information Sensitivity § Primary (core data being broadcasting; topic of the discussion) and Secondary (social psychological interpretation; body language) Level Information. What context the info was viewed in, how it was used and who viewed it. § Situation: user’s notion of place o Perceived Information Receiver o Perceived Information Usage § Task § Recording awareness § Repeated viewing § Context § Editing § Risk/benefits trade-offs o Perceived Context of Interaction § Technology § Social, organizational and national context · Realization and Response · Decreasing Cycle Recommendations: · Briefing Session o Systems details o Interaction details § When they can be viewed and heard § Who the IR is o Recoding details · Interface changes: Information Broadcaster o Data transmission o Interaction Feedback o Recording Feedback · Interface changes: Information Receiver o Contextual feedback o Edited data o Information handling/usage · Policy procedures o Recording permission o Changed usage o Editing o Continued privacy evaluation References: · Adams, A. (1999) Users’ Perception of Privacy in Multimedia Communication, in M.W. Altom & M.G.Williams (eds.), Companion Proceedings of CHI’99, ACM Press, 53-4 · Belloti, V. (1996). What you don’t know can hurt you: privacy in collaborative computing, in A. Sasse, R.J. Cunningham & R. Winder (eds.), People and Computers XI (Proceedings HCI’96), 241-61 · Davies, S. (1997), Re-Engineering in Right to Privacy, in P. Agre & M. Rotenberg (eds.), Technology and Privacy: The New Landscape, MIT Press, 143-65 Goffman, E. (1969), The Presentation of Self in Everyday Life, sec edition, Penguin

Supporting Group Collaboration with Inter-Personal Awareness Devices

Publication Type:

Journal Article

Source:

Personal Technologies, Volume 3, p.13-21 (0)

Keywords:

Awareness Systems

A Room of Our Own: Experiences from a Direct Office Share

Publication Type:

Conference Paper

Source:

CHI, Boston, Massachussets, USA, p.138-144 (0)

Keywords:

Awareness Systems

Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems

Publication Type:

Conference Paper

Source:

ACM conference on Computer supported cooperative work, ACM Press, Boston, Massachusetts, United States, p.248 - 257 (0)

Keywords:

Distributed Work Groups; Awareness Support; Privacy; Audio; Video; Visualization; Media Spaces.; Privacy - ACM

Abstract:

This paper describes a fundamental dual tradeoff that occurs in systems supporting awareness for distributed work groups, and presents several specific new techniques which illustrate good compromise points within this tradeoff space. This dual tradeoff is between privacy and awareness, and between awareness and disturbance. Simply stated, the more information about oneself that leaves your work area, the more potential for awareness of you exists for your colleagues. Unfortunately, this also represents the greatest potential for intrusion on your privacy. Similarly, the more information that is received about the activities of colleagues, the more potential awareness we have of them. However, at the same time, the more information we receive, the greater the chance that the information will become a disturbance to our normal work. This dual tradeoff seems to be a fundamental one. However, by carefully examining awareness problems in the light of this tradeoff it is possible to devise techniques which expose new points in the design space. These new points provide different types and quantities of information so that awareness can be achieved without invading the privacy of the sender, or creating a disturbance for the receiver. This paper presents four such techniques, each based on a careful selection of the information transmitted.

Notes:

Privacy vs. Awareness vs. Disturbance (overload of information) Co-located interaction is: · Implicit · Informal · Serendipitous Needs: · Continuous fashion of sharing spaces · Immediate awareness as a catalyst of communication Techniques to meet awareness goals and preserve privacy and non-disruption properties: · Privacy: THE SHADOW-VIEW & SHARED AUDIO o What information is, can be, or should be transmitted in terms both of its awareness support content, and in terms of its effect on privacy. o Reciprocity · Disruption and high resource utilization: SHARED AUDIO (who's speaking but not what is saying & background noise) o Partial control over interruptions in the hands of the receiver o Do not consume too many resources (cognitive and machine) · THE SYNTHETIC GROUP-PHOTO · VISUALIZE A RECENT HISTORY OF ACTIVITIES (non-uniformly in time)

Co-design and new technologies with family users - Deliverable 1.2 & 2.2

Publication Type:

Report

Source:

Interliving - Desinging Interactivite, Intergenerational Interfaces for living together, IST-2000-26068, Number ISSN 1650- (0)

Keywords:

Context-Awareness Interliving

Rhythm Modeling, Visualizations and Applications

Publication Type:

Conference Paper

Source:

UIST 2003, ACM Press, Volume 5, Vancouver, BC, Canada, p.11-20 (0)

Keywords:

Awareness; context-aware computing; rhythms; CSCW; user modeling; instant messaging; visualization; CMC; Reachability

Syndicate content