Field Deployment of IMBuddy : A Study of Privacy Control and Feedback Mechanisms for Contextual IM

We describe the design of privacy controls and feedback mechanisms for contextual IM, an instant messaging service for disclosing contextual information. We tested our designs on IMBuddy, a contextual IM service we developed that discloses contextual information, including interruptibility, location, and the current window in focus (a proxy for the current task). We deployed our initial design of IMBuddy's privacy mechanisms for two weeks with ten IM users. We then evaluated a redesigned version for four weeks with fifteen users. Our evaluation indicated that users found our group-level rule-based privacy control intuitive and easy to use. Furthermore, the set of feedback mechanisms provided users with a good awareness of what was disclosed.

[1]  Herbert H. Clark,et al.  Grounding in communication , 1991, Perspectives on socially shared cognition.

[2]  Stephanie D. Teasley,et al.  Perspectives on socially shared cognition , 1991 .

[3]  Paul Dourish,et al.  Realizing a video environment: EuroPARC's RAVE system , 1992, CHI.

[4]  Abigail Sellen,et al.  Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.

[5]  Sara A. Bly,et al.  Media spaces: bringing people together in a video, audio, and computing environment , 1993, CACM.

[6]  Bonnie A. Nardi,et al.  Interaction and outeraction: instant messaging in action , 2000, CSCW '00.

[7]  Wendy A. Kellogg,et al.  Social translucence: an approach to designing systems that support social processes , 2000, TCHI.

[8]  John C. Tang,et al.  ConNexus to awarenex: extending awareness to mobile users , 2001, CHI.

[9]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[10]  Steve Whittaker,et al.  The character, functions, and styles of instant messaging in the workplace , 2002, CSCW '02.

[11]  Ellen Isaacs,et al.  Hubbub: a sound-enhanced mobile instant messenger that supports awareness and opportunistic interactions , 2002, CHI.

[12]  John C. Tang,et al.  Work rhythms: analyzing visualizations of awareness histories of distributed groups , 2002, CSCW '02.

[13]  Paul Dourish,et al.  Unpacking "privacy" for a networked world , 2003, CHI '03.

[14]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[15]  James A. Landay,et al.  An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.

[16]  Martin R. Gibbs,et al.  Mediating intimacy: designing technologies to support strong-tie relationships , 2005, CHI.

[17]  Gregory D. Abowd,et al.  Developing privacy guidelines for social location disclosure applications and services , 2005, SOUPS '05.

[18]  Bill N. Schilit,et al.  Place Lab: Device Positioning Using Radio Beacons in the Wild , 2005, Pervasive.

[19]  Sameer Patil,et al.  Who gets to know what when: configuring privacy permissions in an awareness application , 2005, CHI.

[20]  Susan R. Fussell,et al.  Project view IM: a tool for juggling multiple projects and teams , 2005, CHI Extended Abstracts.

[21]  James Fogarty,et al.  Toolkit support for developing and deploying sensor-based statistical models of human situations , 2007, CHI.

[22]  Joe Tullio,et al.  How it works: a field study of non-technical users interacting with an intelligent system , 2007, CHI.