Advertisement

Abstract

To prevent unwanted interruptions from cell phones, this paper proposes a system solution considering user’s unavailability. We first look at desirable characteristics of the system, then design a system architecture which takes as input user preferences, relevant context information and then produces as output if an incoming call should be allowed to ring. We also present a case study application that benefit by using the interruption management system. Finally, we discuss evaluations of the system by (i) evaluating the prototype and (ii) undertaking cognitive walkthroughs of the application.

Keywords

Context Aware System Interruption Ubiquitous Computing Unavailability 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adamczyk, P.D., Bailey, B.P.: If not now, when? the effects of interruption at different moments within task execution. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vienna, Austria, pp. 271–278 (2004)Google Scholar
  2. 2.
    Adamczyk, P.D., Iqbal, S.T., Bailey, B.P.: A method, system, and tools for intelligent interruption management. In: Proceedings of the 4th International Workshop on Task Models and Diagrams, pp. 123–126 (2005)Google Scholar
  3. 3.
    Ahamed, S.I., Sharmin, M., Ahmed, S.: A Risk-aware Trust Based Secure Resource Discovery (RTSRD) Model for Pervasive Computing. In: Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications, pp. 590–595 (2008)Google Scholar
  4. 4.
    Bailey, B.P., Konstan, J.A.: On the need for attention aware systems: Measuring effects of interruption on task performance, error rate, and affective state. Journal of Computers in Human Behavior 22(4), 709–732 (2006)CrossRefGoogle Scholar
  5. 5.
    Bailey, B.P., Iqbal, S.T.: Understanding changes in mental workload during execution of goal-directed tasks and its application for interruption management. ACM Trans. Comput.-Hum. Interact. 14(4), 1–28 (2008)CrossRefGoogle Scholar
  6. 6.
    Baldauf, M., Dustdar, S., Rosenberg, F.: A Survey on Context Aware Systems. International Journal of Ad Hoc and Ubiquitous Computing 2(4), 263–277 (2007)CrossRefGoogle Scholar
  7. 7.
    Bayley, C., Jernigan, C., Lin, J., Shu, J., Wright, C.: Talk Android (2008), http://www.talkandroid.com/android-forums/android-market-reviews/495-locale.html
  8. 8.
    Begole, J., Matsakis, N.E., Tang, J.C.: Lilsys: Sensing Unavailability. In: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, pp. 511–514 (2004)Google Scholar
  9. 9.
    Brown, P.J.: The Stick-e Document: a framework for creating context-aware applications. Electronic Publishing, Palo Alto (1996)Google Scholar
  10. 10.
    Conlan, O., Power, R., Higel, S., O’Sullivan, D., Barrett, K.: Next generation context aware adaptive services. In: Proceedings of the 1st International Symposium on Information and Communication Technologies, pp. 205–212 (2003)Google Scholar
  11. 11.
    Dekel, A., Nacht, D., Kirkpatrick, S.: Minimizing mobile phone disruption via smart profile management. In: Proceedings of the 11th International Conference on Human-Computer interaction with Mobile Devices and Services, Bonn, Germany, pp. 1–5 (2009)Google Scholar
  12. 12.
    Dey, A.K.: Enabling the use of context in interactive applications. In: Extended Abstracts on Human Factors in Computing Systems, CHI 2000, The Hague, The Netherlands, pp. 79–80 (2000)Google Scholar
  13. 13.
    Dey, A.K., Salber, D., Abowd, G.D.: A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. The Human-Computer Interaction (HCI) Journal, 97–166 (2001)Google Scholar
  14. 14.
    Dey, A., Mankoff, J., Abowd, G., Carter, S.: Distributed mediation of ambiguous context in aware environments. In: Proceedings of the 15th Annual ACM Symposium on User interface Software and Technology, Paris, France, pp. 121–130 (2002)Google Scholar
  15. 15.
    Godbole, A., Smari, W.W.: A Methodology and Design Process for System Generated User Interruption based on Context, Preferences, and Situation Awareness. In: IEEE International Conference on Information Reuse and Integration, pp. 608–616 (2006)Google Scholar
  16. 16.
    Grandhi, S.A., Schuler, R.P., Jones, Q.: To answer or not to answer: that is the question for the cell phone users. In: Proceedings of the 27th International Conference Extended Abstracts on Human Factors in Computing Systems, pp. 4621–4626 (2009)Google Scholar
  17. 17.
    De Guzman, E.S., Sharmin, M., Bailey, B.P.: Should I call now? Understanding what context is considered when deciding whether to initiate remote communication via mobile devices. In: Proceedings of Graphics Interface 2007, Montreal, Canada, pp. 143–150 (2007)Google Scholar
  18. 18.
    Henricksen, K., Indulska, J.: A software engineering framework for context-aware pervasive computing. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications (PerCom), pp. 77–86 (2004)Google Scholar
  19. 19.
    Henricksen, K., Indulska, J.: Modeling and using imperfect context information. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, pp. 33–37 (2004)Google Scholar
  20. 20.
    Ho, J., Intille, S.S.: Using context-aware computing to reduce the perceived burden of interruptions from mobile devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Portland, Oregon, USA, pp. 909–918 (2005)Google Scholar
  21. 21.
    Horvitz, E., Koch, P., Apacible, J.: BusyBody: creating and fielding personalized models of the cost of interruption. In: Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work, pp. 507–510 (2004)Google Scholar
  22. 22.
    Hull, R., Neaves, P., Bedford-Roberts, J.: Towards situated computing. In: Proceedings of International Symposium on Wearable Computers (1997)Google Scholar
  23. 23.
    Iqbal, S.T., Bailey, B.P.: Leveraging characteristics of task structure to predict the cost of interruption. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Montréal, Québec, Canada, pp. 741–750 (2006)Google Scholar
  24. 24.
    Jiang, X., Chen, N.Y., Hong, J.I., Wang, K., Takayama, L., Landay, J.A.: Siren: Context aware Computing for Firefighting. In: Ferscha, A., Mattern, F. (eds.) PERVASIVE 2004. LNCS, vol. 3001, pp. 87–105. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  25. 25.
    Khalil, A., Connelly, K.: Improving cell phone awareness by using calendar information. In: Proceedings of INTERACT, Rome, Italy (2005)Google Scholar
  26. 26.
    Lederer, S., Mankoff, J., Dey, A.K.: Who wants to know what when? Privacy preference determinants in ubiquitous computing. In: Extended Abstracts on Human Factors in Computing Systems, CHI 2003, Ft. Lauderdale, Florida, USA, pp. 724–725 (2003)Google Scholar
  27. 27.
    Mark, G., Gudith, D., Klocke, U.: The cost of interrupted work: more speed and stress. In: Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems, Florence, Italy, pp. 107–110 (2008)Google Scholar
  28. 28.
    Marti, S., Schmandt, C.: Giving the caller the finger: collaborative responsibility for cellphone interruptions. In: Extended Abstracts on Human Factors in Computing Systems, CHI 2005, Portland, OR, USA, pp. 1633–1636 (2005)Google Scholar
  29. 29.
    McCrickard, D.S., Chewar, C.M., Somervell, J.P., Ndiwalana, A.: A model for notification systems evaluation—assessing user goals for multitasking activity. ACM Trans. Comput. Hum. Interact. 10(4), 312–338 (2003)CrossRefGoogle Scholar
  30. 30.
    Petersen, S.A., Cassens, J., Kofod-Petersen, A., Divitini, M.: To be or not to be aware: Reducing interruptions in pervasive awareness systems. In: Proceedings of the Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies UBICOMM, pp. 327–332 (2008)Google Scholar
  31. 31.
    Rosalind, P.W., Karen, L.K.: Relative subjective count and assessment of interruptive technologies applied to mobile monitoring of stress. International Journal of Human-Computer Studies 65(4), 361–375 (2007)CrossRefGoogle Scholar
  32. 32.
    Savioja, P.A.: Necessary Interruptions? Seminar on User Interfaces and Usability, HUT, Sober IT, pp. 121-900 (2004) Google Scholar
  33. 33.
    Sharmin, M., Ahamed, S.I., Ahmed, S., Li, H.: SSRD+: A Privacy-aware Trust and Security Model for Resource Discovery in Pervasive Computing Environment. In: Computer Software and Systems Conference, pp. 67–70 (2006)Google Scholar
  34. 34.
    Spira, J.B., Feintuch, J.B.: The Cost of Not Paying Attention: How Interruptions Impact Knowledge Worker Productivity, Basex (2005) Google Scholar
  35. 35.
    Stamm, K., Ahamed, S.I., Madiraju, P., Zulkernain, S.: Mobile Intelligent Interruption Management (MIIM): A Context Aware Unavailability System. In: Proceedings of the 25th Annual ACM Symposium on Applied Computing, Sierre, Switzerland (2010)Google Scholar
  36. 36.
    Toninelli, A., Khushraj, D., Lassila, O., Montanari, R.: Towards Socially Aware Mobile Phones. In: 7th International Semantic Web Conference (2008)Google Scholar
  37. 37.
    Zhiwen, Y., Xingshe, Z., Daqing, Z., Chung-Yau, C., Xiaohang, W., Ji, M.: Supporting context-aware media recommendations for smart phones. IEEE Pervasive Computing 5(3), 68–75 (2006)CrossRefGoogle Scholar
  38. 38.
    Ziebart, B.D., Roth, D., Campbell, R.H., Dey, A.K.: Learning Automation Policies for Pervasive Computing Environments. In: Proceedings of the Second International Conference on Automatic Computing,, pp. 193–203. IEEE Computer Society, Washington (2005)Google Scholar
  39. 39.
    International Telecommunication Union, http://www.itu.int/newsroom/press_releases/2009/39.html
  40. 40.
    University of Michigan News Service, http://www.ur.umich.edu/0607/Apr02_07/02.shtml
  41. 41.
    Disruptive communication and attentive productivity, http://www.iii-p.org/research/disrupt_comm_report_v2.pdf
  42. 42.
  43. 43.
    Bureau of Labor Statistics, http://www.bls.gov/

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2010

Authors and Affiliations

  • Sina Zulkernain
    • 1
  • Praveen Madiraju
    • 1
  • Sheikh Iqbal Ahamed
    • 1
  1. 1.Dept. of Mathematics, Statistics & Computer ScienceMarquette UniversityMilwaukeeUSA

Personalised recommendations