ABSTRACT
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with context information about the receivers, has been proposed as a solution for this problem. This approach, however, raises many privacy issues that may render it infeasible. In this paper, we report on an in-situ study of user privacy preferences and patterns of sharing different types of context information with different social relations. We found that participants disclosed their context information generously, suggesting that context-aware telephony is not only feasible, but also desirable. Our data shows a distinct sharing pattern across social relations and different types of context information. We discuss the implications of the results for designers of context-aware telephony in particular and context-aware applications in general.
- Avrahami, D., D. Gergle, S.E. Hudson, and S. Kiesler, Improving the match between callers and receivers: A study on the effect of contextual information on cell phone interruptions. To appear in Behaviour & Information Technology.]]Google Scholar
- Bellotti, V. and A. Sellen. Design for privacy in ubiquitous computing environments. In Proceedings of Third European Conference on Computer Supported Cooperative Work (ECSCW'93). 1993.]] Google ScholarDigital Library
- Consolvo, S., Smith I., Mathews T., and L. A. Location Disclosure To Social Relations: Why, When, & What People Want To Share. In Proceedings of CHI 2005. 2005. Portland, Oregon.]] Google ScholarDigital Library
- Consolvo, S. and M. Walker, Using the Experience Sampling Method to Evaluate Ubicomp Applications: The Human Experience. IEEE Pervasive Computing Mobile and Ubiquitous Systems, 2003. 2(2): p. 24--31.]] Google ScholarDigital Library
- Csikszentmihalyi, M., R. Larson, and S. Prescott, The ecology of adolescent activity and experience. Journal of Youth and Adolescence, 1977. 6: p. 281--94.]]Google ScholarCross Ref
- Cutrell, E., M. Czerwinski, and E. Horvitz. Notification, Disruption, and Memory: Effects of Messaging Interruptions on Memory and Performance. In Proceedings of Interact 2001. 2001.]]Google Scholar
- Danezis, G., S. Lewis, and R. Anderson. How much is location privacy worth? In Proceedings of Workshop on Economics of Information Security (WEIS 05). 2005.]]Google Scholar
- Eagle, N. and A. Pentland, Social Serendipity: Mobilizing Social Software. IEEE Pervasive Computing, 2005. 4(2).]] Google ScholarDigital Library
- Fogarty, J., S. Hudson, C. Atkeson, D. Avrahami, J. Forlizzi, S. Kiesler, J. Lee, and J. Yang, Predicting Human Interruptibility with Sensors. ACM Transactions on CHI, 2004.]] Google ScholarDigital Library
- Goffman, E., The Presentation of Self in Everyday Life. 1959, Garden City, NY.]]Google Scholar
- Jensen, C. and C. Potts, Privacy Practices of Internet Users: Self-report versus Observed Behavior. To appear in International Journal of Human Computer Studies special issue on HCI Research in Privacy and Security.]] Google ScholarDigital Library
- Kern, N., S. Antifakos, B. Schiele, and A. Schwaninger. A model for human interruptability: experimental evaluation and automatic estimation from wearable sensors. In Proceedings of IEEE International Symposium on Wearable Computers. 2004.]] Google ScholarDigital Library
- Khalil, A. and K. Connelly. Improving cell phone awareness by using calendar information. In Proceedings of INTERACT 05. 2005. Rome, Italy.]] Google ScholarDigital Library
- Laurier, E., Why people say where they are during mobile phone calls. Environment and Planning D: Society & Space, 2001: p. 485--504.]]Google Scholar
- Lederer, S., J.I. Hong, A. Dey, and J.A. Landay, Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing, 2004. 8(6).]] Google ScholarCross Ref
- Lederer, S., J. Mankoff, and A.K. Dey. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In Proceedings of Extended Abstracts of CHI 2003. 2003.]] Google ScholarDigital Library
- Marmasse, N., C. Schmandt, and D. Spectre. Watchme: Communication and Awareness between Members of a Closely-Knit Group. In Proceedings of UbiComp. 2004.]]Google ScholarCross Ref
- Milewshi, A.E. and T.M. Smith. Providing Presence Cues to Telephone Users. In Proceedings of CSCW 2000. 2000.]] Google ScholarDigital Library
- Nelson, L., S. Bly, and T. Sokoler. Quiet Calls: Talking Silently on Mobile Phones. In Proceedings of CHI 2001.]] Google ScholarDigital Library
- O'Connail, B. and D. Frohlich. Timespace in the workplace: Dealing with interruptions. In Proceedings of CHI '95. Extended Abstracts. 1995: ACM Press.]] Google ScholarDigital Library
- Oliver, N., E. Horvitz, and A. Garg. Layered Representations for Recognizing Office Activity. In Proceedings of International Conference on Multimodal Interaction (ICMI 2002). 2002.]]Google Scholar
- Olson, J., J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In Proceedings of CHI 05. 2005.]] Google ScholarDigital Library
- P&AB, Consumer Privacy Attitudes: A Major Shift since 2000 and Why. Privacy & American Business Newsletter, 2003. 10(6).]]Google Scholar
- Palen, L. and P. Dourish. Unpacking "Privacy" for a Networked World. In Proceedings of ACM Conference on Human Factors in Computing Systems CHI 03. 2003.]] Google ScholarDigital Library
- Patil, S. and J. Lai. Who Gets to Know What When: Configuring Privacy Preferences in an Awareness Application. In Proceedings of CHI 2005. 2005.]] Google ScholarDigital Library
- Pedersen, E.R. Calls.calm: Enabling Caller and Callee to Collaborate. In Proceedings of CHI 2001. 2001.]] Google ScholarDigital Library
- REUTERS, Mobile phone users double since 2000, http://www.computerworld.com/mobiletopics/mobile/story/0%2C10801%2C98142%2C00.html]]Google Scholar
- Schmidt, A., A. Takaluoma, and J. Mantyjarvi, Context-Aware Telephony Over WAP. Personal and Ubiquitous Computing, 2000. 4(4): p. 225--229.]] Google ScholarDigital Library
- Sheehan, K., Toward a Typology of Internet Users and Online Privacy Concerns. The Information Society, 2002. 18(1): p. 21--32.]]Google Scholar
- Siewiorek, D., A. Smailagic, J. Furukawa, N. Moraveji, K. Reiger, and J. Shaffer. SenSay: A Context-Aware Mobile Phone. In Proceedings of IEEE International Symposium on Wearable Computers (ISWC). 2003.]] Google ScholarDigital Library
- Speier, C., J.S. Valacich, and I. Vessey. The effects of task interruption and information presentation on individual decision making. In Proceedings of Eighteenth International Conference on Information Systems. 1997.]] Google ScholarDigital Library
- Tang, C., N. Yankelovich, J. Begole, M. Van kleek, F. Li, and J. Bhalodia. ConNexus to awarenex: extending awareness to mobile users. In Proceedings of CHI 2001.]] Google ScholarDigital Library
Index Terms
- Context-aware telephony: privacy preferences and sharing patterns
Recommendations
Location disclosure to social relations: why, when, & what people want to share
CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsAdvances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's location to another person or service could be risky, yet valuable. To explore ...
Preventing sensitive relationships disclosure for better social media preservation
A fundamental aspect of all social networks is information sharing. It is one of the most common forms of online interaction that is tightly associated with social media preservation and information disclosure. As such, information sharing is commonly ...
Privacy implications of context-aware services
COMSWARE '09: Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaREPersonal information handling in current and anticipated context use cases is worrisome. This notwithstanding, contextual services are rapidly proliferating into most niches of society, catalysed by technological advancements in sensing, ubiquity and ...
Comments