Advertisement

Personal and Ubiquitous Computing

, Volume 12, Issue 7, pp 527–542 | Cite as

Designing for privacy and self-presentation in social awareness

  • Mika RaentoEmail author
  • Antti Oulasvirta
Original Article

Abstract

Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown that users are not only concerned with the preservation privacy through non-disclosure. Instead, disclosure is manipulated for the constant presentation of self to the group in everyday social situations. Basing on 3 years of research with the mobile social awareness system ContextContacts, established findings in social psychology and ubiquitous computing, we propose a number of design principles to support users in this management of privacy and presentation. These principles are to apply even if disclosure is automated, and include support for lightweight permissions, assuming reciprocity, appearing differently to different audiences, providing for feedback on presentation and allowing lying. These principles are applied in interaction design and protocol engineering for the next version of a mobile awareness system called ContextContacts.

Keywords

Privacy Self-disclosure Self-presentation Social psychology Social awareness User interface design Presence protocols Security 

Notes

Acknowledgments

This work has been funded by the Academy of Finland under the PROACT research programme, and by the Helsinki Graduate School in Computer Science and Engineering. We thank Antti Salovaara, Sakari Tamminen, Marko Turpeinen, Louise Barkhuus and Markus Bylund for commenting on drafts of the paper and Kliment Yanev for comments on the protocol design section.

References

  1. 1.
    Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone’s Contact Book to Support Mobile Awareness and Collaboration. In: Proceedings of the 7th international conference on human computer interaction with mobile devices and services, MOBILEHCI’05. ACM, pp 167–174Google Scholar
  2. 2.
    Dourish P, Bellotti V (1992) Awareness and coordination in shared workspaces. In: CSCW ‘92: proceedings of the 1992 ACM conference on Computer-supported cooperative work. ACM Press, New York, pp 107–114Google Scholar
  3. 3.
    Langheinrich M (2001) Privacy by Design—Principles of Privacy-Aware Ubiquitous Systems. In: Abowd GD, Brumitt B, Shafer SA (eds) Proceedings of the third international conference on ubiquitous computing (UbiComp 2001), vol 2201. Lecture Notes in Computer Science. Springer, Atlanta, pp 273–291Google Scholar
  4. 4.
    Smith I, Consolvo S, Lamarca A, Hightower J, Scott J, Sohn T, Hughes J, Iachello G, Abowd GD (2005) Social disclosure of place: from location technology to communication practices. In: Gellersen HW, Want R, Schmidt A (eds) Pervasive computing: third international conference, PERVASIVE 2005, Munich, Germany, May 8–13, 2005. Proceedings, vol 3468. Lecture Notes in Computer Science. Springer, Berlin, pp 134–151Google Scholar
  5. 5.
    Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Comput 8(6):440–454CrossRefGoogle Scholar
  6. 6.
    W3C (2005) Platform for Privacy Preferences (P3P) Project, online, http://www.w3.org/P3P/, referenced Jun 2006
  7. 7.
    Palen L, Dourish P (2003) Unpacking “privacy” for a networked world. In: CHI ‘03: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 129–136Google Scholar
  8. 8.
    Aoki PA, Woodruff A (2005) Making space for stories: ambiguity in the design of personal communication systems. In: CHI ‘05: Proceeding of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 181–190Google Scholar
  9. 9.
    Altman I, Vinsel A, Brown BB (1981) Dialectic conceptions in social psychology: an application to social penetration and privacy regulation. Adv Exp Soc Psychol 14:108–161Google Scholar
  10. 10.
    Margulis ST (2003) On the status and contribution of Westin’s and Altman’s Theories of Privacy. J Soc Issues 59(2):411–429CrossRefGoogle Scholar
  11. 11.
    Petronio S (2002) Boundaries of privacy, dialectics of disclosure. State University of New York PressGoogle Scholar
  12. 12.
    Goffman E (1990) The presentation of self in everyday life. Penguin Books, London, Reprinted, original 1959 Anchor BooksGoogle Scholar
  13. 13.
    Raento M, Oulasvirta A (2005) Privacy management for social awareness applications. In: Proceedings of the workshop on context awareness for proactive systems, CAPS 2005. Helsinki University Press, pp 105–114Google Scholar
  14. 14.
    Goffman E (1967) Interaction Ritual, chapter On Face-Work. Pantheon Books, New York, pp 5–45Google Scholar
  15. 15.
    Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: MobiSys ‘04: Proceedings of the 2nd international conference on Mobile systems, applications, and services. ACM Press, New York, pp 177–189Google Scholar
  16. 16.
    Nardi BA, Whittaker S, Bradner E (2000) Interaction and outeraction: instant messaging in action. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 79–88Google Scholar
  17. 17.
    Berg JH, Derlega VJ (1987) Themes in study of self-disclosure. In: Derlega VJ, Berg JH (eds) Self-disclosure. Theory, Research and Therapy. Plenum Press, New York, pp 1–8Google Scholar
  18. 18.
    Vittengl JR, Holt CS (2002) Getting acquainted: the relationship of self-disclosure and social attraction to positive affect. J Soc Pers Relat 17(1):53–66CrossRefGoogle Scholar
  19. 19.
    Miller JB, Stubblefield A (1993) Parental disclosure from the perspective of late adolescent. J Adolesc 16:439–455CrossRefGoogle Scholar
  20. 20.
    Leary MR, Kowalski RM (1990) Impression Management: a literature review and a two-component model. Psychol Bull 107(1)Google Scholar
  21. 21.
    DePaulo BM, Kashy DA, Kirkendol SE, Wyer MM (1996) Lying in everyday life. J Personal Soc Psychol 70(5):979–995CrossRefGoogle Scholar
  22. 22.
    GEOPRIV Working Group Archives (2003) Geopriv and actively lying. Mailing list exchange, online, http://ecotroph.net/~anewton/hypermail/geopriv/0309/0846.html, referenced June 2006
  23. 23.
    Berger PL, Luckman T (1966) The social construction of reality: a treatise in the sociology of knowledge. Garden City, New YorkGoogle Scholar
  24. 24.
    Antaki C, Barnes R, Leudar I (2005) Self-disclosure as a situated interactional practice. Br J Soc Psychol 44:181–199CrossRefGoogle Scholar
  25. 25.
    Consolvo S, Smith IE, Matthews T, LaMarca A, Tabert J, Powledge P (2005) Location disclosure to social relations: why, when, and what people want to share. In: CHI ‘05: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 81–90Google Scholar
  26. 26.
    Grice H (1975) Logic and conversation. In: Cole P, Morgan JL (eds) Syntax and semantics, Speech Acts, vol 3. Academic Press, New York, pp 43–58Google Scholar
  27. 27.
    Schegloff EA (1972) Notes on a conversational practice: formulating place. In: Sudnow D (ed) Studies in social interaction. The Free Press, New York, pp 75–119Google Scholar
  28. 28.
    Oulasvirta A, Petit R, Raento M, Tiitta S (2006) On how users interpret and act upon mobile awareness cues. Human–Computer interaction (in press)Google Scholar
  29. 29.
    Raento M, Oulasvirta A, Petit R, Toivonen H (2005) ContextPhone, a prototyping platform for context-aware mobile applications. IEEE Pervasive Comput 4(2):51–59CrossRefGoogle Scholar
  30. 30.
    Bardram JE, Hansen TR (2003) The AWARE architecture: supporting context-mediated social awareness in mobile cooperation. In: Proceedings of the CSCW03. ACM Press, New York, pp 192–201Google Scholar
  31. 31.
    Milewski AE, Smith TM (2000) Providing presence cues to telephone users. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 89–96Google Scholar
  32. 32.
    Katz J, Aakhus M (eds) (2002) Perpetual contact: mobile communication, private talk, public performance. Cambridge University Press, CambridgeGoogle Scholar
  33. 33.
    Ling R (2004) The mobile connection: the cell phones impact on society. Morgan Kaufmann, San FranciscoGoogle Scholar
  34. 34.
    Laasonen K, Raento M, Toivonen H (2004) Adaptive on-device location recognition. In: Proceedings of the 2nd international conference on pervasive computing (Pervasive 2004), vol 3001, Lecture Notes in Computer Science. Springer, Berlin, pp 287–304Google Scholar
  35. 35.
    Prinz W (1999) NESSIE: an awareness environment for cooperative settings. In: Proceedings of the sixth European conference on computer supported cooperative work—ECSCW99. Kluwer, Dordrecht, pp 391–410Google Scholar
  36. 36.
    Rubin Z (1975) Disclosing oneself to a stranger: reciprocity and its limits. J Exp Soc Psychol 11(3):233–260CrossRefGoogle Scholar
  37. 37.
    Ambady N, Bernieri F, Richeson JA (2000) Toward a histology of social behavior: judgmental accuracy from thin slices of the behavioral stream. Adv Exp Soc Psychol 32:201–271CrossRefGoogle Scholar
  38. 38.
    McEwan G, Greenberg S (2005) Supporting social worlds with the community bar. In: GROUP ‘05 Proceedings of the 2005 international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 21–30Google Scholar
  39. 39.
    Wiberg M, Whittaker S (2005) Managing availability: supporting lightweight negotiations to handle interruptions. ACM Trans Comput Hum Interact 12(4):356–387CrossRefGoogle Scholar
  40. 40.
    Deci EL, Ryan RM (2000) The “What” and “Why” of goal pursuits: Human needs and the self-determination of behavior. Psychol Inq 11(4):227–268CrossRefGoogle Scholar
  41. 41.
    Sloane L (1992) Orwellian dream come true: a badge that pinpoints you. The New York Times, September 12Google Scholar
  42. 42.
    Lee A, Girgensohn A, Schlueter K (1997) Nynex portholes: initial user reactions and redesign implications. In: GROUP ‘97 Proceedings of the international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 385–394Google Scholar
  43. 43.
    Griswold WG, Shanahan P, Brown SW, Boyer R, Ratto M, Shapiro RB, Truong TM (2004) ActiveCampus: experiments in community-oriented ubiquitous computing. Computer 37:73–81CrossRefGoogle Scholar
  44. 44.
    Barkhuus L, Dey AK (2003) Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact 2003. ACM Press, Zurich, pp 709–712Google Scholar
  45. 45.
    Oulasvirta A, Tamminen S, Roto V, Kuorelahti J (2005) Interaction in 4-s bursts: the fragmented nature of attention in mobile HCI. In: Proceedings of the 2005 conference on human factors in computing systems (CHI 2005). ACM Press, New York, pp 919–928Google Scholar
  46. 46.
    Palen L (1999) Social, individual and technological issues for groupware calendar systems. In: Proceedings of the SIGCHI conference on Human factors in computing systems ACM Press, New York, pp 17–24Google Scholar
  47. 47.
    Zaner M, Chung EK, Savage T (2003) 3 and the Net Generation: Designing for Inner Circles of Friends. In: Proceedings of the workshop on intimate ubiquitous computing at UbiComp 2003. Intel Corporation, online, http://berkeley.intel-research.net/paulos/lab/ubicomp03/Workshop/index.html, referenced June 2006
  48. 48.
    Phillips DJ (1996) Defending the boundaries: identifying and countering threats in a usenet newsgroup. Inf Soc 12(1):39–62CrossRefGoogle Scholar
  49. 49.
    Smith CB (1997) Conduct control on usenet. J Comput Mediat Commun 2(4)Google Scholar
  50. 50.
    Weilenmann A, Larsson C (2001) Local use and sharing of mobile phones. In: Brown B, Green N, Harper R (eds) Wireless world: social, cultural and interactional aspects of wireless technology. Springer, London, pp 99–115Google Scholar
  51. 51.
    The European Commission (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Commun (L 281):31–50Google Scholar
  52. 52.
    IETF Secretariat (2005) SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE), online http://www.ietf.org/html.charters/simple-charter.html, referenced May 2005
  53. 53.
    Saint-Andre P (ed) (2004) IETF. RFC 3920. Extensible messaging and presence protocol (XMPP): Core, OctoberGoogle Scholar
  54. 54.
    Peterson J (2004) A presence architecture for the distribution of GEOPRIV Location ObjectsGoogle Scholar
  55. 55.
    Saint-Andre P (ed) (2004) IETF. RFC 3921. Extensible messaging and presence protocol (XMPP): instant messaging and presence Google Scholar
  56. 56.
    Symbian Ltd (2006) How has Symbian Signed evolved with Symbian OS v9? online, https://www.symbiansigned.com/How_has_Symbian_Signed_evolved_with_Symbian_OS_v9.pdf, referenced June 2006
  57. 57.
    Schneier B (1995) Applied cryptography, 2nd edn. Wiley, LondonGoogle Scholar
  58. 58.
    Burkholder P (2002) SSL Man-in-the-Middle Attacks. Technical report, February 2002. online, http://www.sans.org/rr/whitepapers/threats/480.php, referenced Jun 2006Google Scholar
  59. 59.
    Tang JC, Yankelovich N, Begole J, Van Kleek M, Li F, Bhalodia J (2001) ConNexus to awarenex: extending awareness to mobile users. In: CHI ‘01: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 221–228Google Scholar
  60. 60.
    Holmquist LE, Falk J, Wigström J (1999) Supporting group collaboration with interpersonal awareness devices. Pers Technol 3(1–2):13–21 CrossRefGoogle Scholar
  61. 61.
    Marmasse N, Schmandt C, Spectre D (2004) WatchMe: Communication and Awareness Between Members of a Closely-Knit Group. In: Davies N, Mynatt E, Siio I (eds) UbiComp 2004: Ubiquitous Computing: 6th International Conference Nottingham, UK, September 7–10, 2004 Proceedings, vol 3205. Springer, Berling, pp 214–231Google Scholar
  62. 62.
    Burak A, Sharon T (2004) Usage patterns of FriendZone: mobile location-based community services. In: MUM ‘04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia. ACM Press, New York, pp 93–100Google Scholar
  63. 63.
    Isaacs EA, Tang JC, Morris T (1996) Piazza: a desktop environment supporting impromptu and planned interactions. In: CSCW ‘96: Proceedings of the 1996 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 315–324Google Scholar
  64. 64.
    Davis M, Van House N, Towle J, King S, Ahern S, Burgener C, Perkel D, Finn M, Viswanathan V, Rothenberg M (2005) MMM2: mobile media metadata for media sharing. In: CHI ‘05: CHI ‘05 extended abstracts on Human factors in computing systems. ACM Press, New York, pp 1335–1338Google Scholar
  65. 65.
    Counts S, Fellheimer E (2004) Supporting social presence through lightweight photo sharing on and off the desktop. In: CHI ‘04: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 599–606Google Scholar
  66. 66.
    Rantanen M, Oulasvirta A, Blom J, Tiitta S, Mäntylä M (2004) InfoRadar: Group and public messaging in mobile context. In: Proceedings of NordiCHI04’. ACM Press, New York, pp 131–140Google Scholar
  67. 67.
    Persson P, Espinoza F, Fagerberg P, Sandin A, Cöster R (2003) GeoNotes: a location-based information system for public spaces. In: Designing information spaces: the social navigation approach. Springer, London, pp 151–173Google Scholar

Copyright information

© Springer-Verlag London Limited 2008

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of HelsinkiHelsinkiFinland
  2. 2.Helsinki Institute for Information Technology HIITTKKFinland

Personalised recommendations