Abstract
Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown that users are not only concerned with the preservation privacy through non-disclosure. Instead, disclosure is manipulated for the constant presentation of self to the group in everyday social situations. Basing on 3 years of research with the mobile social awareness system ContextContacts, established findings in social psychology and ubiquitous computing, we propose a number of design principles to support users in this management of privacy and presentation. These principles are to apply even if disclosure is automated, and include support for lightweight permissions, assuming reciprocity, appearing differently to different audiences, providing for feedback on presentation and allowing lying. These principles are applied in interaction design and protocol engineering for the next version of a mobile awareness system called ContextContacts.
Similar content being viewed by others
Notes
Some of the interaction design ideas were presented in an earlier workshop paper [13], but the analytical structure is completely new.
The first three studies have been reported in detail in Oulasvirta et al. [28]. The latest study has not been fully analyzed, but we will give preliminary results based on interview data. The existing reports have mostly skimmed the privacy aspects, which we will focus on here.
References
Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone’s Contact Book to Support Mobile Awareness and Collaboration. In: Proceedings of the 7th international conference on human computer interaction with mobile devices and services, MOBILEHCI’05. ACM, pp 167–174
Dourish P, Bellotti V (1992) Awareness and coordination in shared workspaces. In: CSCW ‘92: proceedings of the 1992 ACM conference on Computer-supported cooperative work. ACM Press, New York, pp 107–114
Langheinrich M (2001) Privacy by Design—Principles of Privacy-Aware Ubiquitous Systems. In: Abowd GD, Brumitt B, Shafer SA (eds) Proceedings of the third international conference on ubiquitous computing (UbiComp 2001), vol 2201. Lecture Notes in Computer Science. Springer, Atlanta, pp 273–291
Smith I, Consolvo S, Lamarca A, Hightower J, Scott J, Sohn T, Hughes J, Iachello G, Abowd GD (2005) Social disclosure of place: from location technology to communication practices. In: Gellersen HW, Want R, Schmidt A (eds) Pervasive computing: third international conference, PERVASIVE 2005, Munich, Germany, May 8–13, 2005. Proceedings, vol 3468. Lecture Notes in Computer Science. Springer, Berlin, pp 134–151
Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Comput 8(6):440–454
W3C (2005) Platform for Privacy Preferences (P3P) Project, online, http://www.w3.org/P3P/, referenced Jun 2006
Palen L, Dourish P (2003) Unpacking “privacy” for a networked world. In: CHI ‘03: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 129–136
Aoki PA, Woodruff A (2005) Making space for stories: ambiguity in the design of personal communication systems. In: CHI ‘05: Proceeding of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 181–190
Altman I, Vinsel A, Brown BB (1981) Dialectic conceptions in social psychology: an application to social penetration and privacy regulation. Adv Exp Soc Psychol 14:108–161
Margulis ST (2003) On the status and contribution of Westin’s and Altman’s Theories of Privacy. J Soc Issues 59(2):411–429
Petronio S (2002) Boundaries of privacy, dialectics of disclosure. State University of New York Press
Goffman E (1990) The presentation of self in everyday life. Penguin Books, London, Reprinted, original 1959 Anchor Books
Raento M, Oulasvirta A (2005) Privacy management for social awareness applications. In: Proceedings of the workshop on context awareness for proactive systems, CAPS 2005. Helsinki University Press, pp 105–114
Goffman E (1967) Interaction Ritual, chapter On Face-Work. Pantheon Books, New York, pp 5–45
Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: MobiSys ‘04: Proceedings of the 2nd international conference on Mobile systems, applications, and services. ACM Press, New York, pp 177–189
Nardi BA, Whittaker S, Bradner E (2000) Interaction and outeraction: instant messaging in action. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 79–88
Berg JH, Derlega VJ (1987) Themes in study of self-disclosure. In: Derlega VJ, Berg JH (eds) Self-disclosure. Theory, Research and Therapy. Plenum Press, New York, pp 1–8
Vittengl JR, Holt CS (2002) Getting acquainted: the relationship of self-disclosure and social attraction to positive affect. J Soc Pers Relat 17(1):53–66
Miller JB, Stubblefield A (1993) Parental disclosure from the perspective of late adolescent. J Adolesc 16:439–455
Leary MR, Kowalski RM (1990) Impression Management: a literature review and a two-component model. Psychol Bull 107(1)
DePaulo BM, Kashy DA, Kirkendol SE, Wyer MM (1996) Lying in everyday life. J Personal Soc Psychol 70(5):979–995
GEOPRIV Working Group Archives (2003) Geopriv and actively lying. Mailing list exchange, online, http://ecotroph.net/~anewton/hypermail/geopriv/0309/0846.html, referenced June 2006
Berger PL, Luckman T (1966) The social construction of reality: a treatise in the sociology of knowledge. Garden City, New York
Antaki C, Barnes R, Leudar I (2005) Self-disclosure as a situated interactional practice. Br J Soc Psychol 44:181–199
Consolvo S, Smith IE, Matthews T, LaMarca A, Tabert J, Powledge P (2005) Location disclosure to social relations: why, when, and what people want to share. In: CHI ‘05: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 81–90
Grice H (1975) Logic and conversation. In: Cole P, Morgan JL (eds) Syntax and semantics, Speech Acts, vol 3. Academic Press, New York, pp 43–58
Schegloff EA (1972) Notes on a conversational practice: formulating place. In: Sudnow D (ed) Studies in social interaction. The Free Press, New York, pp 75–119
Oulasvirta A, Petit R, Raento M, Tiitta S (2006) On how users interpret and act upon mobile awareness cues. Human–Computer interaction (in press)
Raento M, Oulasvirta A, Petit R, Toivonen H (2005) ContextPhone, a prototyping platform for context-aware mobile applications. IEEE Pervasive Comput 4(2):51–59
Bardram JE, Hansen TR (2003) The AWARE architecture: supporting context-mediated social awareness in mobile cooperation. In: Proceedings of the CSCW03. ACM Press, New York, pp 192–201
Milewski AE, Smith TM (2000) Providing presence cues to telephone users. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 89–96
Katz J, Aakhus M (eds) (2002) Perpetual contact: mobile communication, private talk, public performance. Cambridge University Press, Cambridge
Ling R (2004) The mobile connection: the cell phones impact on society. Morgan Kaufmann, San Francisco
Laasonen K, Raento M, Toivonen H (2004) Adaptive on-device location recognition. In: Proceedings of the 2nd international conference on pervasive computing (Pervasive 2004), vol 3001, Lecture Notes in Computer Science. Springer, Berlin, pp 287–304
Prinz W (1999) NESSIE: an awareness environment for cooperative settings. In: Proceedings of the sixth European conference on computer supported cooperative work—ECSCW99. Kluwer, Dordrecht, pp 391–410
Rubin Z (1975) Disclosing oneself to a stranger: reciprocity and its limits. J Exp Soc Psychol 11(3):233–260
Ambady N, Bernieri F, Richeson JA (2000) Toward a histology of social behavior: judgmental accuracy from thin slices of the behavioral stream. Adv Exp Soc Psychol 32:201–271
McEwan G, Greenberg S (2005) Supporting social worlds with the community bar. In: GROUP ‘05 Proceedings of the 2005 international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 21–30
Wiberg M, Whittaker S (2005) Managing availability: supporting lightweight negotiations to handle interruptions. ACM Trans Comput Hum Interact 12(4):356–387
Deci EL, Ryan RM (2000) The “What” and “Why” of goal pursuits: Human needs and the self-determination of behavior. Psychol Inq 11(4):227–268
Sloane L (1992) Orwellian dream come true: a badge that pinpoints you. The New York Times, September 12
Lee A, Girgensohn A, Schlueter K (1997) Nynex portholes: initial user reactions and redesign implications. In: GROUP ‘97 Proceedings of the international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 385–394
Griswold WG, Shanahan P, Brown SW, Boyer R, Ratto M, Shapiro RB, Truong TM (2004) ActiveCampus: experiments in community-oriented ubiquitous computing. Computer 37:73–81
Barkhuus L, Dey AK (2003) Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact 2003. ACM Press, Zurich, pp 709–712
Oulasvirta A, Tamminen S, Roto V, Kuorelahti J (2005) Interaction in 4-s bursts: the fragmented nature of attention in mobile HCI. In: Proceedings of the 2005 conference on human factors in computing systems (CHI 2005). ACM Press, New York, pp 919–928
Palen L (1999) Social, individual and technological issues for groupware calendar systems. In: Proceedings of the SIGCHI conference on Human factors in computing systems ACM Press, New York, pp 17–24
Zaner M, Chung EK, Savage T (2003) 3 and the Net Generation: Designing for Inner Circles of Friends. In: Proceedings of the workshop on intimate ubiquitous computing at UbiComp 2003. Intel Corporation, online, http://berkeley.intel-research.net/paulos/lab/ubicomp03/Workshop/index.html, referenced June 2006
Phillips DJ (1996) Defending the boundaries: identifying and countering threats in a usenet newsgroup. Inf Soc 12(1):39–62
Smith CB (1997) Conduct control on usenet. J Comput Mediat Commun 2(4)
Weilenmann A, Larsson C (2001) Local use and sharing of mobile phones. In: Brown B, Green N, Harper R (eds) Wireless world: social, cultural and interactional aspects of wireless technology. Springer, London, pp 99–115
The European Commission (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Commun (L 281):31–50
IETF Secretariat (2005) SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE), online http://www.ietf.org/html.charters/simple-charter.html, referenced May 2005
Saint-Andre P (ed) (2004) IETF. RFC 3920. Extensible messaging and presence protocol (XMPP): Core, October
Peterson J (2004) A presence architecture for the distribution of GEOPRIV Location Objects
Saint-Andre P (ed) (2004) IETF. RFC 3921. Extensible messaging and presence protocol (XMPP): instant messaging and presence
Symbian Ltd (2006) How has Symbian Signed evolved with Symbian OS v9? online, https://www.symbiansigned.com/How_has_Symbian_Signed_evolved_with_Symbian_OS_v9.pdf, referenced June 2006
Schneier B (1995) Applied cryptography, 2nd edn. Wiley, London
Burkholder P (2002) SSL Man-in-the-Middle Attacks. Technical report, February 2002. online, http://www.sans.org/rr/whitepapers/threats/480.php, referenced Jun 2006
Tang JC, Yankelovich N, Begole J, Van Kleek M, Li F, Bhalodia J (2001) ConNexus to awarenex: extending awareness to mobile users. In: CHI ‘01: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 221–228
Holmquist LE, Falk J, Wigström J (1999) Supporting group collaboration with interpersonal awareness devices. Pers Technol 3(1–2):13–21
Marmasse N, Schmandt C, Spectre D (2004) WatchMe: Communication and Awareness Between Members of a Closely-Knit Group. In: Davies N, Mynatt E, Siio I (eds) UbiComp 2004: Ubiquitous Computing: 6th International Conference Nottingham, UK, September 7–10, 2004 Proceedings, vol 3205. Springer, Berling, pp 214–231
Burak A, Sharon T (2004) Usage patterns of FriendZone: mobile location-based community services. In: MUM ‘04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia. ACM Press, New York, pp 93–100
Isaacs EA, Tang JC, Morris T (1996) Piazza: a desktop environment supporting impromptu and planned interactions. In: CSCW ‘96: Proceedings of the 1996 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 315–324
Davis M, Van House N, Towle J, King S, Ahern S, Burgener C, Perkel D, Finn M, Viswanathan V, Rothenberg M (2005) MMM2: mobile media metadata for media sharing. In: CHI ‘05: CHI ‘05 extended abstracts on Human factors in computing systems. ACM Press, New York, pp 1335–1338
Counts S, Fellheimer E (2004) Supporting social presence through lightweight photo sharing on and off the desktop. In: CHI ‘04: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 599–606
Rantanen M, Oulasvirta A, Blom J, Tiitta S, Mäntylä M (2004) InfoRadar: Group and public messaging in mobile context. In: Proceedings of NordiCHI04’. ACM Press, New York, pp 131–140
Persson P, Espinoza F, Fagerberg P, Sandin A, Cöster R (2003) GeoNotes: a location-based information system for public spaces. In: Designing information spaces: the social navigation approach. Springer, London, pp 151–173
Acknowledgments
This work has been funded by the Academy of Finland under the PROACT research programme, and by the Helsinki Graduate School in Computer Science and Engineering. We thank Antti Salovaara, Sakari Tamminen, Marko Turpeinen, Louise Barkhuus and Markus Bylund for commenting on drafts of the paper and Kliment Yanev for comments on the protocol design section.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Raento, M., Oulasvirta, A. Designing for privacy and self-presentation in social awareness. Pers Ubiquit Comput 12, 527–542 (2008). https://doi.org/10.1007/s00779-008-0200-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-008-0200-9