skip to main content
10.1145/1240866.1241013acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Addressing constraints: multiple usernames task spillage and notions of identity

Published:28 April 2007Publication History

ABSTRACT

In this work in progress report, we present preliminary results from an interview study on people's use of email addresses and instant messenger usernames. Based on these interview findings, we speculate that many people use multiple identifiers reactively and prosaically, rather than simply proactively and strategically. This has implications for understanding the scope of previous studies; for developing cross-platform methodologies for analysis of people's practices; for understanding identifier selection; and for design of communication tools and protocols. We believe that a focus on "identity", which we characterize to be a set of strategic and coherent practices for self-presentation/protection, has led to an under-representation of reactive and prosaic practices of identifier selection that can result from organizational policy, technological implementations, and social and task information flow management.

References

  1. H. R. Baker, N. B. Duarte, A. Haririnia, D. E. Klinesmith, H. Lee, L. A. Velikovich, A. O. Wanga, M. J. Westhoff, and C. Plaisant. A design study of the integration of email and role management for university students. TR HCIL--2003--3, University of Maryland, College Park, 2003.Google ScholarGoogle Scholar
  2. O. Bälter. Electronic Mail in a Working Context. PhD thesis, Royal Institute of Technology, IPLab, NADA, KTH, 10044 Stockholm, 1998.Google ScholarGoogle Scholar
  3. V. Bellotti, N. Ducheneaut, M. Howard, and I. Smith. Taking email to task: The design and evaluation of a task management centered email tool. Proceedings CHI '03, pp 345--352, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. A. Dabbish and R. E. Kraut. Email overload at work: An analysis of factors associated with email strain. CSCW'06, pp 431--440, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. A. Dabbish, R. E. Kraut, S. Fussell, and S. Kiesler. Understanding email use: Predicting action on a message. CHI '05, pp 691--700, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Fisher, A. J. Brush, E. Gleave, and M. A. Smith. Revisiting Whittaker & Sidner's "email overload" ten years later. CSCW'06, pp 309--312, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. B. M. Gross. Multiple email addresses: A socio-technical investigation. Proceedings of the First Conference on Email and Anti-Spam (CEAS), 2004.Google ScholarGoogle Scholar
  8. S. Jones. The internet goes to college: How students are living in the future with today's technology. The Pew Internet & American Life Project, Sept 2002.Google ScholarGoogle Scholar
  9. Lenhart, A., and Rainie, L. Teenage life online: The rise of the instant-message generation and the internet's impact on friendships and family relationships. The Pew Internet & American Life Project, Sept 2005.Google ScholarGoogle Scholar
  10. W. E. Mackay. Diversity in the use of electronic mail: a preliminary inquiry. ACM Transactions on Information Systems (TOIS), 6(4):380--397, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Mueller, M. L., Park, Y., Lee, J., and Kimb, T.-Y. Digital identity: How users value the attributes of online identifiers. Information Economics and Policy 18, 4, 405--422, 2006.Google ScholarGoogle Scholar
  12. C. E. Nippert-Eng. Home and Work: Negotiating Boundaries Through Everyday Life. University of Chicago Press, 1996.Google ScholarGoogle Scholar
  13. N. J. Victory and K. B. Cooper. A nation online: How Americans are expanding their use of the internet. Economics and Statistics Administration and National Telecommunications and Information Administration, Feb 2002.Google ScholarGoogle Scholar
  14. S. Whittaker, Q. Jones, B. Nardi, M. Creech, L. Terveen, E. Isaacs, and J. Hainsworth. Contactmap: Organizing communication in a social desktop. ACM TOCHI, 11(4):445--471, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Whittaker and C. Sidner. Email overload: Exploring personal information management of email. Proceedings CHI '96, pp 276--283, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Addressing constraints: multiple usernames task spillage and notions of identity

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI EA '07: CHI '07 Extended Abstracts on Human Factors in Computing Systems
      April 2007
      1286 pages
      ISBN:9781595936424
      DOI:10.1145/1240866

      Copyright © 2007 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 April 2007

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      CHI EA '07 Paper Acceptance Rate212of582submissions,36%Overall Acceptance Rate6,164of23,696submissions,26%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader