Building a Context Sensitive Telephone: Some Hopes and Pitfalls for Context Sensitive Computing Article DOI:
Cite this article as: Brown, B. & Randell, R. Comput Supported Coop Work (2004) 13: 329. doi:10.1007/s10606-004-2806-4 Abstract
Although the idea of making technology more context aware is an alluring one, this seemingly simple move hides a great deal of complexity. Even simple examples such as a context sensitive mobile phone which knows when not to ring, are unlikely to be successful. Any context sensitive technology is likely to make mistakes – like ringing in the middle of a film, or not ringing for an urgent call. Using three examples from fieldwork of
alerting systems (two ringing phones and one medical alarm in a hospital), we suggest three guidelines for context systems which could genuinely assist users. First, we argue that context sensitive computing should be used defensively, where incorrect behaviour is tolerable. Second, that technology can provide structures to which people themselves can add context. Third, that technology can communicate context to users, allowing users to make sense of that contextual information themselves. Lastly we argue for an understanding of the long term use of technology use, dwelling with technology, a process which changes how the world is seen and experienced. Keywords alarms context sensitive computing dwelling telephones References Agre, Philip 2001 Changing places: contexts of awareness of computing Human Computer Interaction 16 177 192 Google Scholar
Auge, Marc (1995): Non-places: Introduction to an Anthropology of Supermodernity. Verso Books.
Bellotti, Victoria, Keith, Edwards 2001 Intelligibility and accountability: Human considerations in context-aware systems Human Computer Interaction 16 193 212 Google Scholar Brown, B., Perry, M. 2000 Why don’t telephones have off switches? Understanding the use of everyday technologies Interacting with computers 12 623 634 Google Scholar Brown, Barry, Geelhoed, Erik, Sellen, Abigail J 2001 The Use of Conventional and New Music Media: Implications for Future Technologies Hirose, M eds. Proceedings of Interact 2001. vol. 67–75 IOS Press Tokyo, Japan Google Scholar
Dreyfus, Hubert L. and Charles Spinosa (2002) Highway Bridges and Feasts: Heidegger and Borgmann on How to Affirm Technology. In
Hubert Dreyfus’ Selected Papers. Berkley: University of California.
Garfinkel, Harold (2002): Ethnomethodology’s Program. Rowman & Littlefield.
Gay, Paul du, Hall, Steven, Janes, Linda, Mackay, Hugh, Negus, Keith 1997Doing cultural studies: The Story of The Sony Walkman Sage London Google Scholar Gellersen, Hans-W., Schmidt, Albecht 2001 Look who’s visiting: supporting visitor awareness in the web International journal of human computer interaction 56 25 46 Google Scholar
Goffman, Erving (1986): Stigma: Notes on the Management of a Spoiled Identity. Simon & Schuster.
Heidegger, Martin (1971): Building Dwelling Thinking. In:
Poetry, Language, Thought. New York: Harper Colophon Books.
Jonsson, E. (2002): Inner Navigation. Scribner.
Meredith, C., Edworthy, J. 1995 Are there too many alarms in the intensive care unit? An overview of the problems Journal of Advanced Nursing 21 15 20 Google Scholar Moran, , Thomas, P., Dourish, Paul 2001 Introduction to Special Issue on Context-Aware Computing Human Computer Interaction 16 2 3 Google Scholar
Nole, A. M. (1992): Anatomy of a failure: picturephone revisited. Telecommunications policy, vol. pp. 370–316.
Norberg-Schultz, Christian 1996 The Phenomenon of place Nesbitt, K. eds. Theorizing a new agenda for architecture: an anthology of architectural theory Princeton Architectural Press New York Google Scholar Norman, Donald 1998The invisible computer MA: MIT Press. Cambridge Google Scholar O’Hara, Kenton, Perry, Mark, Sellen, Abi, Brown, Barry A.T. 2001 Managing information on the move: a study of the information needs of mobile professionals Brown, B. Green, N. Harper, R. eds. Wireless World: Social and Interactional Aspects of the Mobile Age Springer Verlag The Hague, Netherlands Google Scholar Pattison, George 2000Routledge Philosophy Guidebook to the Later Heidegger Routledge London Google Scholar
Randell R. (2004a) Accountable technology appropriation and use. In:
Proceedings of the 2004 ACM NordiCHI conference. New York: ACM Press.
Randell, Rebecca (2004b): Accountability in an ‘Alarming’ Environment. In:
Proceedings of CSCW 2004, Chicago, IL. New York: ACM Press.
Sheff, David (1993): Game over: How Nintendo Zapped an American Industry, Captured Your Dollars, & Enslaved Your Children Diane Pub Co.
Weilenmann, Alexandra, Larsson, Catrine 2001 Local Use and Sharing of Mobile Phones Brown, B. Green, N. Harper, R. eds. Wireless World: social, cultural and interactional aspects of wireless technology Springer Verlag London, UK Google Scholar Weiser, M. 1991 The computer for the twenty-first century Scientific American 265 94 104 CrossRef Google Scholar Weiser, M. 1993 Ubiquitous computing IEEE Computer 26 71 72 Google Scholar Copyright information
© Kluwer Academic Publishers 2004