Computer Supported Cooperative Work (CSCW)

, Volume 13, Issue 3–4, pp 329–345 | Cite as

Building a Context Sensitive Telephone: Some Hopes and Pitfalls for Context Sensitive Computing

Abstract

Although the idea of making technology more context aware is an alluring one, this seemingly simple move hides a great deal of complexity. Even simple examples such as a context sensitive mobile phone which knows when not to ring, are unlikely to be successful. Any context sensitive technology is likely to make mistakes – like ringing in the middle of a film, or not ringing for an urgent call. Using three examples from fieldwork of alerting systems (two ringing phones and one medical alarm in a hospital), we suggest three guidelines for context systems which could genuinely assist users. First, we argue that context sensitive computing should be used defensively, where incorrect behaviour is tolerable. Second, that technology can provide structures to which people themselves can add context. Third, that technology can communicate context to users, allowing users to make sense of that contextual information themselves. Lastly we argue for an understanding of the long term use of technology use, dwelling with technology, a process which changes how the world is seen and experienced.

Keywords

alarms context sensitive computing dwelling telephones 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agre, Philip 2001Changing places: contexts of awareness of computingHuman Computer Interaction16177192Google Scholar
  2. Auge, Marc (1995): Non-places: Introduction to an Anthropology of Supermodernity. Verso Books.Google Scholar
  3. Bellotti, Victoria, Keith, Edwards 2001Intelligibility and accountability: Human considerations in context-aware systemsHuman Computer Interaction16193212Google Scholar
  4. Brown, B., Perry, M. 2000Why don’t telephones have off switches? Understanding the use of everyday technologiesInteracting with computers12623634Google Scholar
  5. Brown, Barry, Geelhoed, Erik, Sellen, Abigail J 2001

    The Use of Conventional and New Music Media: Implications for Future Technologies

    Hirose, M eds. Proceedings of Interact 2001. vol. 67–75IOS PressTokyo, Japan
    Google Scholar
  6. Dreyfus, Hubert L. and Charles Spinosa (2002) Highway Bridges and Feasts: Heidegger and Borgmann on How to Affirm Technology. In Hubert Dreyfus’ Selected Papers. Berkley: University of California.Google Scholar
  7. Garfinkel, Harold (2002): Ethnomethodology’s Program. Rowman & Littlefield.Google Scholar
  8. Gay, Paul du, Hall, Steven, Janes, Linda, Mackay, Hugh, Negus, Keith 1997Doing cultural studies: The Story of The Sony WalkmanSageLondonGoogle Scholar
  9. Gellersen, Hans-W., Schmidt, Albecht 2001Look who’s visiting: supporting visitor awareness in the webInternational journal of human computer interaction562546Google Scholar
  10. Goffman, Erving (1986): Stigma: Notes on the Management of a Spoiled Identity. Simon & Schuster.Google Scholar
  11. Heidegger, Martin (1971): Building Dwelling Thinking. In: Poetry, Language, Thought. New York: Harper Colophon Books.Google Scholar
  12. Jonsson, E. (2002): Inner Navigation. Scribner.Google Scholar
  13. Meredith, C., Edworthy, J. 1995Are there too many alarms in the intensive care unit? An overview of the problemsJournal of Advanced Nursing211520Google Scholar
  14. Moran, , Thomas, P., Dourish, Paul 2001Introduction to Special Issue on Context-Aware ComputingHuman Computer Interaction1623pp 87–96Google Scholar
  15. Nole, A. M. (1992): Anatomy of a failure: picturephone revisited. Telecommunications policy, vol. pp. 370–316.Google Scholar
  16. Norberg-Schultz, Christian 1996

    The Phenomenon of place

    Nesbitt, K. eds. Theorizing a new agenda for architecture: an anthology of architectural theoryPrinceton Architectural PressNew York
    Google Scholar
  17. Norman, Donald 1998The invisible computerMA: MIT Press.CambridgeGoogle Scholar
  18. O’Hara, Kenton, Perry, Mark, Sellen, Abi, Brown, Barry A.T. 2001

    Managing information on the move: a study of the information needs of mobile professionals

    Brown, B.Green, N.Harper, R. eds. Wireless World: Social and Interactional Aspects of the Mobile AgeSpringer VerlagThe Hague, Netherlands
    Google Scholar
  19. Pattison, George 2000Routledge Philosophy Guidebook to the Later HeideggerRoutledgeLondonGoogle Scholar
  20. Randell R. (2004a) Accountable technology appropriation and use. In: Proceedings of the 2004 ACM NordiCHI conference. New York: ACM Press.Google Scholar
  21. Randell, Rebecca (2004b): Accountability in an ‘Alarming’ Environment. In: Proceedings of CSCW 2004, Chicago, IL. New York: ACM Press.Google Scholar
  22. Sheff, David (1993): Game over: How Nintendo Zapped an American Industry, Captured Your Dollars, & Enslaved Your Children Diane Pub Co.Google Scholar
  23. Weilenmann, Alexandra, Larsson, Catrine 2001

    Local Use and Sharing of Mobile Phones

    Brown, B.Green, N.Harper, R. eds. Wireless World: social, cultural and interactional aspects of wireless technologySpringer VerlagLondon, UK
    Google Scholar
  24. Weiser, M. 1991The computer for the twenty-first centuryScientific American26594104CrossRefGoogle Scholar
  25. Weiser, M. 1993Ubiquitous computingIEEE Computer267172Google Scholar

Copyright information

© Kluwer Academic Publishers 2004

Authors and Affiliations

  1. 1.Department of Computer ScienceUniversity of GlasgowGlasgowUK
  2. 2.Interaction Design Centre, School of Computing ScienceMiddlesex UniversityLondonUK

Personalised recommendations