ABSTRACT
In this article, we describe the design process of Reno, a location-enhanced, mobile coordination tool and person finder. The design process included three field experiments: a formative Experience Sampling Method (ESM) study, a pilot deployment and an extended user study. These studies were targeted at the significant personal security, privacy and data protection concerns caused by this application. We distil this experience into a small set of guidelines for designers of social mobile applications and show how these guidelines can be applied to a different application, called Boise. These guidelines cover issues pertaining to personal boundary definition, control, deception and denial, and group vs. individual communication. We also report on lessons learned from our evaluation experience, which might help practitioners in designing novel mobile applications, including the choice and characterization of users for testing security and privacy features of designs, the length of learning curves and their effect on evaluation and the impact of peculiar deployment circumstances on the results of these finely tuned user studies.
- Barkhuus, L., Dey, A. Location-Based Services for Mobile Telephony: a study of users' privacy concerns. In Proc. Interact 2003, 709--712, IOS Press, Amsterdam, 2003.Google Scholar
- Brown, K. On The Trail Of Location Services. Wireless Week, p. 18, March 1, 2004, Reed Business Information.Google Scholar
- Consolvo, S., Smith, I., Matthews, T., LaMarca, A., Tabert, J., Powledge, P. Location Disclosure to Social Relations: Why, When, & What People Want to Share. In Proc. of the Conference on Human Factors and Computing Systems: CHI 2005, 81--90, ACM Press, 2005. Google ScholarDigital Library
- Darrah, C. N. Family Models, Model Families. In Revisiting the American Dream: How U. S. Families Cope with Work and Family Life, American Anthropological Association Annual Conference, Chicago, IL, November 23, 2003.Google Scholar
- DePaulo B. M., Kashy D. A. Everyday Lies in Close and Casual Relationships. Journal of Personality and Social Psychology, 74 (1), 63--79, American Psychological Association, January 1998.Google ScholarCross Ref
- Ubiquity Labs, Dodgeball. Available online at http://www.dodgeball.com. Last accessed: Feb 17, 2005.Google Scholar
- Fithian, R., Iachello, G., Moghazy, J., Pousman, Z., Stasko, J. The Design and Evaluation of a Mobile Location-aware Handheld Event Planner. In Proc. of the Fifth International Symposium on Human Computer Interaction with Mobile Devices and Services (Mobile HCI 2003), Udine, Italy, Sept. 8--11, 2003, LNCS 2795, 145--160, Springer Verlag.Google Scholar
- Grinter, R. E., Eldridge, M. 'y do tngrs luv 2 txt msg?'. In: Proc. Seventh European Conference on Computer-Supported Cooperative Work ECSCW '01, 219--238, Kluwer Academic Publishers, 2001. Google ScholarDigital Library
- Ito, M. and Daisuke, O. Mobile Phones, Japanese Youth and the Replacement of Social Contact. In Ling, R. and Pedersen, P. (eds.) Front Stage/Back Stage: Mobile communication and the Renegotiation of the Social Sphere, Conference Proceedings, 22--24 June 2003, Grimstad, Norway.Google Scholar
- LaMarca, A., Chawathe, Y., Consolvo, S., Hightower, J., Smith, I., Scott, J., Sohn, T., Howard, J., Hughes, J., Potter, F., Tabert, J., Powledge, P., Borriello, G., Schilit, B. Place Lab: Device Positioning Using Radio Beacons in the Wild. In Proc. Pervasive 2005, Springer Verlag, 2005. Google ScholarDigital Library
- Langheinrich, M. Privacy by Design: Principles of Privacy-Aware Ubiquitous Systems. In Proc. Ubicomp 2001, LNCS 2201, 273--291, Springer Verlag, 2001. Google ScholarDigital Library
- Laurier, E. Why People Say Where They Are During Mobile Phone Calls. Environment and Planning D: Society and Space, 19, 485--504, Pion, London, UK, 2001.Google ScholarCross Ref
- Lederer, S., Mankoff, J., Dey, A. Who Wants to Know What When? Privacy Preference Determinants in Ubiquitous Computing. In Proc. of the Conference on Human Factors and Computing Systems: CHI 2003, ACM Press, 2003. Google ScholarDigital Library
- Ling, R. Norwegian teens, mobile telephony and SMS use in school. Technical Report Telenor R&D N 7/2000, Telenor, 2000.Google Scholar
- Palen, L., Dourish, P. Unpacking Privacy for a Networked World. In Proc. of the Conference on Human Factors and Computing Systems: CHI 2003, 129--136, ACM Press, 2003. Google ScholarDigital Library
- P&AB: Consumer Privacy Attitudes: A Major Shift Since 2000 and Why. In Privacy & American Business Newsletter, 10 (6), Sep 2003.Google Scholar
- Schegloff E. A. Notes on a Conversational Practice: Formulating Place. In Sudnow, D. N. (ed.), Studies in Social Interaction, 75--119, MacMillan, The Free Press, New York, 1972.Google Scholar
- Smith, I., Consolvo, S., Hightower, J., Hughes, J., Iachello, G., LaMarca, A., Abowd, G. D., Scott, J., Sohn, T. Social Disclosure Of Place: From Location Technology to Communication Practice. In Proc. Pervasive 2005, Springer Verlag, 2005. Google ScholarDigital Library
- United States Department of Health, Education and Welfare. Records, Computers and the Rights of Citizens. Report of the Secretary's Advisory Committee on Automated Personal Data Systems, 1973.Google Scholar
- Weilenmann A. "I Can't Talk Now: I'm In A Fitting Room:" Formulating Availability And Location In Mobile Phone Conversations. Environment and Planning A, 35, 1589--1605, Pion, London, UK, 2003.Google Scholar
- The Yankee Group. 2004 Mobile Users Survey. Synopsis available at http://www.yankeegroup.com. Last accessed on Feb. 17, 2005.Google Scholar
Index Terms
- Developing privacy guidelines for social location disclosure applications and services
Recommendations
On the development of electronic design tools and associated guidelines for supporting the early stages of the design process
DESIRE '11: Procedings of the Second Conference on Creativity and Innovation in DesignAccording to the user-centred design (UCD) philosophy, users should be involved as much as possible in the different stages of the design process, to optimize the likelihood that design proposals will be appreciated by users. In this paper, first we ...
Privacy antecedents for SNS self-disclosure
Social networking sites privacy issues and self-disclosure are examined.A research model of privacy issues and self-disclosure is built.Structural equations modeling is used to assess the model fit.Path analysis is done to analyze hypothesis whereas 11 ...
Developing design guidelines for context-aware mobile applications
Mobility '06: Proceedings of the 3rd international conference on Mobile technology, applications & systemsContext-aware computing sets new challenges for interaction design. This paper introduces the special characteristics of context-aware mobile devices that should be taken into account in interaction and user interface design, and proposes design ...
Comments