skip to main content
10.1145/1180875.1180947acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
Article

Context-aware telephony: privacy preferences and sharing patterns

Published:04 November 2006Publication History

ABSTRACT

The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with context information about the receivers, has been proposed as a solution for this problem. This approach, however, raises many privacy issues that may render it infeasible. In this paper, we report on an in-situ study of user privacy preferences and patterns of sharing different types of context information with different social relations. We found that participants disclosed their context information generously, suggesting that context-aware telephony is not only feasible, but also desirable. Our data shows a distinct sharing pattern across social relations and different types of context information. We discuss the implications of the results for designers of context-aware telephony in particular and context-aware applications in general.

References

  1. Avrahami, D., D. Gergle, S.E. Hudson, and S. Kiesler, Improving the match between callers and receivers: A study on the effect of contextual information on cell phone interruptions. To appear in Behaviour & Information Technology.]]Google ScholarGoogle Scholar
  2. Bellotti, V. and A. Sellen. Design for privacy in ubiquitous computing environments. In Proceedings of Third European Conference on Computer Supported Cooperative Work (ECSCW'93). 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Consolvo, S., Smith I., Mathews T., and L. A. Location Disclosure To Social Relations: Why, When, & What People Want To Share. In Proceedings of CHI 2005. 2005. Portland, Oregon.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Consolvo, S. and M. Walker, Using the Experience Sampling Method to Evaluate Ubicomp Applications: The Human Experience. IEEE Pervasive Computing Mobile and Ubiquitous Systems, 2003. 2(2): p. 24--31.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Csikszentmihalyi, M., R. Larson, and S. Prescott, The ecology of adolescent activity and experience. Journal of Youth and Adolescence, 1977. 6: p. 281--94.]]Google ScholarGoogle ScholarCross RefCross Ref
  6. Cutrell, E., M. Czerwinski, and E. Horvitz. Notification, Disruption, and Memory: Effects of Messaging Interruptions on Memory and Performance. In Proceedings of Interact 2001. 2001.]]Google ScholarGoogle Scholar
  7. Danezis, G., S. Lewis, and R. Anderson. How much is location privacy worth? In Proceedings of Workshop on Economics of Information Security (WEIS 05). 2005.]]Google ScholarGoogle Scholar
  8. Eagle, N. and A. Pentland, Social Serendipity: Mobilizing Social Software. IEEE Pervasive Computing, 2005. 4(2).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Fogarty, J., S. Hudson, C. Atkeson, D. Avrahami, J. Forlizzi, S. Kiesler, J. Lee, and J. Yang, Predicting Human Interruptibility with Sensors. ACM Transactions on CHI, 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Goffman, E., The Presentation of Self in Everyday Life. 1959, Garden City, NY.]]Google ScholarGoogle Scholar
  11. Jensen, C. and C. Potts, Privacy Practices of Internet Users: Self-report versus Observed Behavior. To appear in International Journal of Human Computer Studies special issue on HCI Research in Privacy and Security.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Kern, N., S. Antifakos, B. Schiele, and A. Schwaninger. A model for human interruptability: experimental evaluation and automatic estimation from wearable sensors. In Proceedings of IEEE International Symposium on Wearable Computers. 2004.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Khalil, A. and K. Connelly. Improving cell phone awareness by using calendar information. In Proceedings of INTERACT 05. 2005. Rome, Italy.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Laurier, E., Why people say where they are during mobile phone calls. Environment and Planning D: Society & Space, 2001: p. 485--504.]]Google ScholarGoogle Scholar
  15. Lederer, S., J.I. Hong, A. Dey, and J.A. Landay, Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Personal and Ubiquitous Computing, 2004. 8(6).]] Google ScholarGoogle ScholarCross RefCross Ref
  16. Lederer, S., J. Mankoff, and A.K. Dey. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In Proceedings of Extended Abstracts of CHI 2003. 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Marmasse, N., C. Schmandt, and D. Spectre. Watchme: Communication and Awareness between Members of a Closely-Knit Group. In Proceedings of UbiComp. 2004.]]Google ScholarGoogle ScholarCross RefCross Ref
  18. Milewshi, A.E. and T.M. Smith. Providing Presence Cues to Telephone Users. In Proceedings of CSCW 2000. 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Nelson, L., S. Bly, and T. Sokoler. Quiet Calls: Talking Silently on Mobile Phones. In Proceedings of CHI 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. O'Connail, B. and D. Frohlich. Timespace in the workplace: Dealing with interruptions. In Proceedings of CHI '95. Extended Abstracts. 1995: ACM Press.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Oliver, N., E. Horvitz, and A. Garg. Layered Representations for Recognizing Office Activity. In Proceedings of International Conference on Multimodal Interaction (ICMI 2002). 2002.]]Google ScholarGoogle Scholar
  22. Olson, J., J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In Proceedings of CHI 05. 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P&AB, Consumer Privacy Attitudes: A Major Shift since 2000 and Why. Privacy & American Business Newsletter, 2003. 10(6).]]Google ScholarGoogle Scholar
  24. Palen, L. and P. Dourish. Unpacking "Privacy" for a Networked World. In Proceedings of ACM Conference on Human Factors in Computing Systems CHI 03. 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Patil, S. and J. Lai. Who Gets to Know What When: Configuring Privacy Preferences in an Awareness Application. In Proceedings of CHI 2005. 2005.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Pedersen, E.R. Calls.calm: Enabling Caller and Callee to Collaborate. In Proceedings of CHI 2001. 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. REUTERS, Mobile phone users double since 2000, http://www.computerworld.com/mobiletopics/mobile/story/0%2C10801%2C98142%2C00.html]]Google ScholarGoogle Scholar
  28. Schmidt, A., A. Takaluoma, and J. Mantyjarvi, Context-Aware Telephony Over WAP. Personal and Ubiquitous Computing, 2000. 4(4): p. 225--229.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Sheehan, K., Toward a Typology of Internet Users and Online Privacy Concerns. The Information Society, 2002. 18(1): p. 21--32.]]Google ScholarGoogle Scholar
  30. Siewiorek, D., A. Smailagic, J. Furukawa, N. Moraveji, K. Reiger, and J. Shaffer. SenSay: A Context-Aware Mobile Phone. In Proceedings of IEEE International Symposium on Wearable Computers (ISWC). 2003.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Speier, C., J.S. Valacich, and I. Vessey. The effects of task interruption and information presentation on individual decision making. In Proceedings of Eighteenth International Conference on Information Systems. 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Tang, C., N. Yankelovich, J. Begole, M. Van kleek, F. Li, and J. Bhalodia. ConNexus to awarenex: extending awareness to mobile users. In Proceedings of CHI 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Context-aware telephony: privacy preferences and sharing patterns

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative work
            November 2006
            548 pages
            ISBN:1595932496
            DOI:10.1145/1180875

            Copyright © 2006 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 4 November 2006

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,986of7,449submissions,27%

            Upcoming Conference

            CSCW '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader