Designing for privacy and self-presentation in social awareness
- 460 Downloads
- 15 Citations
Abstract
Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown that users are not only concerned with the preservation privacy through non-disclosure. Instead, disclosure is manipulated for the constant presentation of self to the group in everyday social situations. Basing on 3 years of research with the mobile social awareness system ContextContacts, established findings in social psychology and ubiquitous computing, we propose a number of design principles to support users in this management of privacy and presentation. These principles are to apply even if disclosure is automated, and include support for lightweight permissions, assuming reciprocity, appearing differently to different audiences, providing for feedback on presentation and allowing lying. These principles are applied in interaction design and protocol engineering for the next version of a mobile awareness system called ContextContacts.
Keywords
Privacy Self-disclosure Self-presentation Social psychology Social awareness User interface design Presence protocols SecurityNotes
Acknowledgments
This work has been funded by the Academy of Finland under the PROACT research programme, and by the Helsinki Graduate School in Computer Science and Engineering. We thank Antti Salovaara, Sakari Tamminen, Marko Turpeinen, Louise Barkhuus and Markus Bylund for commenting on drafts of the paper and Kliment Yanev for comments on the protocol design section.
References
- 1.Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone’s Contact Book to Support Mobile Awareness and Collaboration. In: Proceedings of the 7th international conference on human computer interaction with mobile devices and services, MOBILEHCI’05. ACM, pp 167–174Google Scholar
- 2.Dourish P, Bellotti V (1992) Awareness and coordination in shared workspaces. In: CSCW ‘92: proceedings of the 1992 ACM conference on Computer-supported cooperative work. ACM Press, New York, pp 107–114Google Scholar
- 3.Langheinrich M (2001) Privacy by Design—Principles of Privacy-Aware Ubiquitous Systems. In: Abowd GD, Brumitt B, Shafer SA (eds) Proceedings of the third international conference on ubiquitous computing (UbiComp 2001), vol 2201. Lecture Notes in Computer Science. Springer, Atlanta, pp 273–291Google Scholar
- 4.Smith I, Consolvo S, Lamarca A, Hightower J, Scott J, Sohn T, Hughes J, Iachello G, Abowd GD (2005) Social disclosure of place: from location technology to communication practices. In: Gellersen HW, Want R, Schmidt A (eds) Pervasive computing: third international conference, PERVASIVE 2005, Munich, Germany, May 8–13, 2005. Proceedings, vol 3468. Lecture Notes in Computer Science. Springer, Berlin, pp 134–151Google Scholar
- 5.Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Comput 8(6):440–454CrossRefGoogle Scholar
- 6.W3C (2005) Platform for Privacy Preferences (P3P) Project, online, http://www.w3.org/P3P/, referenced Jun 2006
- 7.Palen L, Dourish P (2003) Unpacking “privacy” for a networked world. In: CHI ‘03: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 129–136Google Scholar
- 8.Aoki PA, Woodruff A (2005) Making space for stories: ambiguity in the design of personal communication systems. In: CHI ‘05: Proceeding of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 181–190Google Scholar
- 9.Altman I, Vinsel A, Brown BB (1981) Dialectic conceptions in social psychology: an application to social penetration and privacy regulation. Adv Exp Soc Psychol 14:108–161Google Scholar
- 10.Margulis ST (2003) On the status and contribution of Westin’s and Altman’s Theories of Privacy. J Soc Issues 59(2):411–429CrossRefGoogle Scholar
- 11.Petronio S (2002) Boundaries of privacy, dialectics of disclosure. State University of New York PressGoogle Scholar
- 12.Goffman E (1990) The presentation of self in everyday life. Penguin Books, London, Reprinted, original 1959 Anchor BooksGoogle Scholar
- 13.Raento M, Oulasvirta A (2005) Privacy management for social awareness applications. In: Proceedings of the workshop on context awareness for proactive systems, CAPS 2005. Helsinki University Press, pp 105–114Google Scholar
- 14.Goffman E (1967) Interaction Ritual, chapter On Face-Work. Pantheon Books, New York, pp 5–45Google Scholar
- 15.Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: MobiSys ‘04: Proceedings of the 2nd international conference on Mobile systems, applications, and services. ACM Press, New York, pp 177–189Google Scholar
- 16.Nardi BA, Whittaker S, Bradner E (2000) Interaction and outeraction: instant messaging in action. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 79–88Google Scholar
- 17.Berg JH, Derlega VJ (1987) Themes in study of self-disclosure. In: Derlega VJ, Berg JH (eds) Self-disclosure. Theory, Research and Therapy. Plenum Press, New York, pp 1–8Google Scholar
- 18.Vittengl JR, Holt CS (2002) Getting acquainted: the relationship of self-disclosure and social attraction to positive affect. J Soc Pers Relat 17(1):53–66CrossRefGoogle Scholar
- 19.Miller JB, Stubblefield A (1993) Parental disclosure from the perspective of late adolescent. J Adolesc 16:439–455CrossRefGoogle Scholar
- 20.Leary MR, Kowalski RM (1990) Impression Management: a literature review and a two-component model. Psychol Bull 107(1)Google Scholar
- 21.DePaulo BM, Kashy DA, Kirkendol SE, Wyer MM (1996) Lying in everyday life. J Personal Soc Psychol 70(5):979–995CrossRefGoogle Scholar
- 22.GEOPRIV Working Group Archives (2003) Geopriv and actively lying. Mailing list exchange, online, http://ecotroph.net/~anewton/hypermail/geopriv/0309/0846.html, referenced June 2006
- 23.Berger PL, Luckman T (1966) The social construction of reality: a treatise in the sociology of knowledge. Garden City, New YorkGoogle Scholar
- 24.Antaki C, Barnes R, Leudar I (2005) Self-disclosure as a situated interactional practice. Br J Soc Psychol 44:181–199CrossRefGoogle Scholar
- 25.Consolvo S, Smith IE, Matthews T, LaMarca A, Tabert J, Powledge P (2005) Location disclosure to social relations: why, when, and what people want to share. In: CHI ‘05: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 81–90Google Scholar
- 26.Grice H (1975) Logic and conversation. In: Cole P, Morgan JL (eds) Syntax and semantics, Speech Acts, vol 3. Academic Press, New York, pp 43–58Google Scholar
- 27.Schegloff EA (1972) Notes on a conversational practice: formulating place. In: Sudnow D (ed) Studies in social interaction. The Free Press, New York, pp 75–119Google Scholar
- 28.Oulasvirta A, Petit R, Raento M, Tiitta S (2006) On how users interpret and act upon mobile awareness cues. Human–Computer interaction (in press)Google Scholar
- 29.Raento M, Oulasvirta A, Petit R, Toivonen H (2005) ContextPhone, a prototyping platform for context-aware mobile applications. IEEE Pervasive Comput 4(2):51–59CrossRefGoogle Scholar
- 30.Bardram JE, Hansen TR (2003) The AWARE architecture: supporting context-mediated social awareness in mobile cooperation. In: Proceedings of the CSCW03. ACM Press, New York, pp 192–201Google Scholar
- 31.Milewski AE, Smith TM (2000) Providing presence cues to telephone users. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 89–96Google Scholar
- 32.Katz J, Aakhus M (eds) (2002) Perpetual contact: mobile communication, private talk, public performance. Cambridge University Press, CambridgeGoogle Scholar
- 33.Ling R (2004) The mobile connection: the cell phones impact on society. Morgan Kaufmann, San FranciscoGoogle Scholar
- 34.Laasonen K, Raento M, Toivonen H (2004) Adaptive on-device location recognition. In: Proceedings of the 2nd international conference on pervasive computing (Pervasive 2004), vol 3001, Lecture Notes in Computer Science. Springer, Berlin, pp 287–304Google Scholar
- 35.Prinz W (1999) NESSIE: an awareness environment for cooperative settings. In: Proceedings of the sixth European conference on computer supported cooperative work—ECSCW99. Kluwer, Dordrecht, pp 391–410Google Scholar
- 36.Rubin Z (1975) Disclosing oneself to a stranger: reciprocity and its limits. J Exp Soc Psychol 11(3):233–260CrossRefGoogle Scholar
- 37.Ambady N, Bernieri F, Richeson JA (2000) Toward a histology of social behavior: judgmental accuracy from thin slices of the behavioral stream. Adv Exp Soc Psychol 32:201–271CrossRefGoogle Scholar
- 38.McEwan G, Greenberg S (2005) Supporting social worlds with the community bar. In: GROUP ‘05 Proceedings of the 2005 international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 21–30Google Scholar
- 39.Wiberg M, Whittaker S (2005) Managing availability: supporting lightweight negotiations to handle interruptions. ACM Trans Comput Hum Interact 12(4):356–387CrossRefGoogle Scholar
- 40.Deci EL, Ryan RM (2000) The “What” and “Why” of goal pursuits: Human needs and the self-determination of behavior. Psychol Inq 11(4):227–268CrossRefGoogle Scholar
- 41.Sloane L (1992) Orwellian dream come true: a badge that pinpoints you. The New York Times, September 12Google Scholar
- 42.Lee A, Girgensohn A, Schlueter K (1997) Nynex portholes: initial user reactions and redesign implications. In: GROUP ‘97 Proceedings of the international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 385–394Google Scholar
- 43.Griswold WG, Shanahan P, Brown SW, Boyer R, Ratto M, Shapiro RB, Truong TM (2004) ActiveCampus: experiments in community-oriented ubiquitous computing. Computer 37:73–81CrossRefGoogle Scholar
- 44.Barkhuus L, Dey AK (2003) Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact 2003. ACM Press, Zurich, pp 709–712Google Scholar
- 45.Oulasvirta A, Tamminen S, Roto V, Kuorelahti J (2005) Interaction in 4-s bursts: the fragmented nature of attention in mobile HCI. In: Proceedings of the 2005 conference on human factors in computing systems (CHI 2005). ACM Press, New York, pp 919–928Google Scholar
- 46.Palen L (1999) Social, individual and technological issues for groupware calendar systems. In: Proceedings of the SIGCHI conference on Human factors in computing systems ACM Press, New York, pp 17–24Google Scholar
- 47.Zaner M, Chung EK, Savage T (2003) 3 and the Net Generation: Designing for Inner Circles of Friends. In: Proceedings of the workshop on intimate ubiquitous computing at UbiComp 2003. Intel Corporation, online, http://berkeley.intel-research.net/paulos/lab/ubicomp03/Workshop/index.html, referenced June 2006
- 48.Phillips DJ (1996) Defending the boundaries: identifying and countering threats in a usenet newsgroup. Inf Soc 12(1):39–62CrossRefGoogle Scholar
- 49.Smith CB (1997) Conduct control on usenet. J Comput Mediat Commun 2(4)Google Scholar
- 50.Weilenmann A, Larsson C (2001) Local use and sharing of mobile phones. In: Brown B, Green N, Harper R (eds) Wireless world: social, cultural and interactional aspects of wireless technology. Springer, London, pp 99–115Google Scholar
- 51.The European Commission (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Commun (L 281):31–50Google Scholar
- 52.IETF Secretariat (2005) SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE), online http://www.ietf.org/html.charters/simple-charter.html, referenced May 2005
- 53.Saint-Andre P (ed) (2004) IETF. RFC 3920. Extensible messaging and presence protocol (XMPP): Core, OctoberGoogle Scholar
- 54.Peterson J (2004) A presence architecture for the distribution of GEOPRIV Location ObjectsGoogle Scholar
- 55.Saint-Andre P (ed) (2004) IETF. RFC 3921. Extensible messaging and presence protocol (XMPP): instant messaging and presence Google Scholar
- 56.Symbian Ltd (2006) How has Symbian Signed evolved with Symbian OS v9? online, https://www.symbiansigned.com/How_has_Symbian_Signed_evolved_with_Symbian_OS_v9.pdf, referenced June 2006
- 57.Schneier B (1995) Applied cryptography, 2nd edn. Wiley, LondonGoogle Scholar
- 58.Burkholder P (2002) SSL Man-in-the-Middle Attacks. Technical report, February 2002. online, http://www.sans.org/rr/whitepapers/threats/480.php, referenced Jun 2006Google Scholar
- 59.Tang JC, Yankelovich N, Begole J, Van Kleek M, Li F, Bhalodia J (2001) ConNexus to awarenex: extending awareness to mobile users. In: CHI ‘01: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 221–228Google Scholar
- 60.Holmquist LE, Falk J, Wigström J (1999) Supporting group collaboration with interpersonal awareness devices. Pers Technol 3(1–2):13–21 CrossRefGoogle Scholar
- 61.Marmasse N, Schmandt C, Spectre D (2004) WatchMe: Communication and Awareness Between Members of a Closely-Knit Group. In: Davies N, Mynatt E, Siio I (eds) UbiComp 2004: Ubiquitous Computing: 6th International Conference Nottingham, UK, September 7–10, 2004 Proceedings, vol 3205. Springer, Berling, pp 214–231Google Scholar
- 62.Burak A, Sharon T (2004) Usage patterns of FriendZone: mobile location-based community services. In: MUM ‘04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia. ACM Press, New York, pp 93–100Google Scholar
- 63.Isaacs EA, Tang JC, Morris T (1996) Piazza: a desktop environment supporting impromptu and planned interactions. In: CSCW ‘96: Proceedings of the 1996 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 315–324Google Scholar
- 64.Davis M, Van House N, Towle J, King S, Ahern S, Burgener C, Perkel D, Finn M, Viswanathan V, Rothenberg M (2005) MMM2: mobile media metadata for media sharing. In: CHI ‘05: CHI ‘05 extended abstracts on Human factors in computing systems. ACM Press, New York, pp 1335–1338Google Scholar
- 65.Counts S, Fellheimer E (2004) Supporting social presence through lightweight photo sharing on and off the desktop. In: CHI ‘04: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 599–606Google Scholar
- 66.Rantanen M, Oulasvirta A, Blom J, Tiitta S, Mäntylä M (2004) InfoRadar: Group and public messaging in mobile context. In: Proceedings of NordiCHI04’. ACM Press, New York, pp 131–140Google Scholar
- 67.Persson P, Espinoza F, Fagerberg P, Sandin A, Cöster R (2003) GeoNotes: a location-based information system for public spaces. In: Designing information spaces: the social navigation approach. Springer, London, pp 151–173Google Scholar