Field Deployment of IMBuddy: A Study of Privacy Control and Feedback Mechanisms for Contextual IM

  • Gary Hsieh
  • Karen P. Tang
  • Wai Yong Low
  • Jason I. Hong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4717)

Abstract

We describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. We tested our designs on IMBuddy, a contextual IM service we developed that discloses contextual information, including interruptibility, location, and the current window in focus (a proxy for the current task). We deployed our initial design of IMBuddy’s privacy mechanisms for two weeks with ten IM users. We then evaluated a redesigned version for four weeks with fifteen users. Our evaluation indicated that users found our group-level rule-based privacy control intuitive and easy to use. Furthermore, the set of feedback mechanisms provided users with a good awareness of what was disclosed.

Keywords

Contextual instant messaging context-aware IM privacy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Isaacs, E., Walendowski, A., Whittaker, S., Schiano, D.J., Kamm, C.: The character, functions, and styles of instant messaging in the workplace. In: ACM conference on Computer Supported Cooperative Work (CSCW), pp. 11–20. ACM Press, New York (2002)Google Scholar
  2. 2.
    Nardi, B., Whittaker, S., Bradner, E.: Interaction and Outeraction: Instant Messaging in Action. In: ACM Conference on Computer Supported Cooperative Work (CSCW), pp. 79–88. ACM Press, New York (2000)CrossRefGoogle Scholar
  3. 3.
    Erickson, T., Kellogg, W.A.: Social translucence: an approach to designing systems that support social processes. In: TOCHI, vol. 7, pp. 59–83 (2000)Google Scholar
  4. 4.
    Isaacs, E., Walendowski, A., Ranganathan, D.: Hubbub: A Sound-Enhanced Mobile Instant Messenger that Supports Awareness and Opportunistic Interactions. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 179–186. ACM Press, New York (2002)Google Scholar
  5. 5.
    Scupelli, P., Kiesler, S., Fussell, S.R., Chen, C.: Project view IM: a tool for juggling multiple projects and teams. In: Extended Abstracts of ACM Conference on Human Factors in Computing Systems (CHI), ACM Press, New York (2005)Google Scholar
  6. 6.
    Tang, J.C., Yankelovich, N., Begole, J., Kleek, M.V., Li, F., Bhalodia, J.: ConNexus to awarenex: extending awareness to mobile users. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 221–228. ACM Press, New York (2001)Google Scholar
  7. 7.
    Bellotti, V., Sellen, A.: Design for Privacy in Ubiquitous Computing Environments. In: Third European Conference on Computer Supported Cooperative Work (ECSCW), pp. 77–92 (1993)Google Scholar
  8. 8.
    Gaver, W., Moran, T., MacLean, A., Lovstrand, L., Dourish, P., Carter, K., Buxton, W.: Realizing a video environment: EuroPARC’s RAVE system. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 27–35. ACM Press, New York (1992)Google Scholar
  9. 9.
    Patil, S., Lai, J.: Who gets to know what when: configuring privacy permissions in an awareness application. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 101–110. ACM Press, New York (2005)Google Scholar
  10. 10.
    Bly, S.A., Harrison, S.R., Irwin, S.: Media spaces: bringing people together in a video, audio, and computing environment. ACM Communications 36, 28–46 (1993)CrossRefGoogle Scholar
  11. 11.
    Iachello, G., Smith, I., Consolvo, S., Chen, M., Abowd, G.D.: Developing privacy guidelines for social location disclosure applications and services. In: Symposium on Usable Privacy and Security (SOUPS), pp. 65–76. ACM Press, New York (2005)CrossRefGoogle Scholar
  12. 12.
    Lederer, S., Hong, J.I., Dey, A., Landay, J.A.: Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing 8, 440–454 (2004)CrossRefGoogle Scholar
  13. 13.
    Begole, J.B., Tang, J.C., Smith, R.B., Yankelovich, N.: Work rhythms: analyzing visualizations of awareness histories of distributed groups. In: ACM Conference on Computer Supported Cooperative Work (CSCW), pp. 334–343. ACM Press, New York (2002)Google Scholar
  14. 14.
    Terveen, L., Akolkar, R., Ludford, P., Zhou, C., Murphy, J., Konstan, J., Riedl, J.: Location-Aware Community Applications: Privacy Issues and User Interfaces. In: Location-Privacy Workshop (2004)Google Scholar
  15. 15.
    Hong, J.I., Landay, J.A.: An Architecture for Privacy-Sensitive Ubiquitous Computing. In: Second International Conference on Mobile Systems, Applications, & Services (MobiSys), pp. 177–189 (2004)Google Scholar
  16. 16.
    Palen, L., Dourish, P.: Unpacking ”Privacy” for a Networked World. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 129–136. ACM Press, New York (2003)CrossRefGoogle Scholar
  17. 17.
    Langheinrich, M.: Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001. LNCS, vol. 2201, pp. 273–291. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  18. 18.
    Nguyen, D.H., Mynatt, E.D.: Privacy Mirrors: Making Ubicomp Visible. In: ACM Conference on Human Factors in Computing Systems (CHI), Workshop on Building the User Experience in Ubiquitous Computing (2001)Google Scholar
  19. 19.
    Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Personal and Ubiquitous Computing 8, 440–454 (2004)CrossRefGoogle Scholar
  20. 20.
    Clark, H.H., Brennan, S.E.: Grounding in communication. In: Resnick, L., Levine, J., Teasley, S. (eds.) Perspectives on Socially Shared Cognition, pp. 127–149. American Psychological Society, Washington, DC (1991)CrossRefGoogle Scholar
  21. 21.
    Cerulean Studios - Trillian Pro, http://www.trillian.cc
  22. 22.
  23. 23.
    Fogarty, J., Hudson, S.E.: Toolkit support for developing and deploying sensor-based statistical models of human situations. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 135–144. ACM Press, New York (2007)Google Scholar
  24. 24.
    Tullio, J., Dey, A.K., Chalecki, J., Fogarty, J.: How it works: a field study of non-technical users interacting with an intelligent system. In: ACM Conference on Human Factors in Computing Systems (CHI), pp. 31–40. ACM Press, New York (2007)Google Scholar
  25. 25.
    LaMarca, A., Chawathe, Y., Consolvo, S., Hightower, J., Smith, I.E., Scott, J., Sohn, T., Howard, J., Hughes, J., Potter, F., Tabert, J., Powledge, P., Borriello, G., Schilit, B.N.: Place Lab: Device Positioning Using Radio Beacons in the Wild. In: Third International Conference on Pervasive Computing (Pervasive), pp. 116–133 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Gary Hsieh
    • 1
  • Karen P. Tang
    • 1
  • Wai Yong Low
    • 1
  • Jason I. Hong
    • 1
  1. 1.Human-Computer Interaction Institute, Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, PA 15213 

Personalised recommendations