How to Build Awareness-Supported Systems Without Sacrificing Privacy

The success of group activities depends largely on the extent to which collaborators are aware of the characteristics and progress of a given task, the roles and activities of other members, and situational changes. This issue of awareness has become a central theme in both human-computer interaction and computer-supported cooperative work. However, to increase awareness, privacy is typically sacrificed. Emphasizing the importance of privacy, we suggest guidelines on how to deal with the issue of privacy in awareness-centered CSCW systems design, based on two interview studies and an analysis of scenarios inspired by the interviews. We discuss the results with regard to the factors of awareness of task, members, presence, schedule, and activity.

[1]  Carl Gutwin,et al.  The effects of workspace awareness support on the usability of real-time distributed groupware , 1999, TCHI.

[2]  M. Patton Qualitative evaluation and research methods, 2nd ed. , 1990 .

[3]  John M. Carroll,et al.  Scenario-based design: envisioning work and technology in system development: john wiley & sons , 1995 .

[4]  Paul Dourish,et al.  Awareness and coordination in shared workspaces , 1992, CSCW '92.

[5]  Kjeld Schmidt,et al.  The Problem with `Awareness': Introductory Remarks on `Awareness in CSCW' , 2002, Computer Supported Cooperative Work (CSCW).

[6]  Leysia Palen,et al.  Social, individual and technological issues for groupware calendar systems , 1999, CHI '99.

[7]  Andrew F. Monk,et al.  Perspectives on HCI : diverse approaches , 1995 .

[8]  Alan Cooper,et al.  The Inmates Are Running the Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity (2nd Edition) , 1999 .

[9]  Dan Shapiro,et al.  Book preview: The design of computer supported cooperative work and groupware systems , 1996, INTR.

[10]  J. Doug Tygar,et al.  Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.

[11]  Jonathan Grudin,et al.  Why CSCW applications fail: problems in the design and evaluationof organizational interfaces , 1988, CSCW '88.

[12]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[13]  Stephanie D. Teasley,et al.  Perspectives on socially shared cognition , 1991 .

[14]  Paul Dourish,et al.  Introduction to This Special Issue on Context-Aware Computing , 2001, Hum. Comput. Interact..

[15]  Min-Soo Kang,et al.  A PRIVACY MODEL IN UBIQUITOUS ENVIRONMENTS , 2006 .

[16]  Paul Dourish,et al.  Culture and Control in a Media Space , 1993, ECSCW.

[17]  Mary Beth Rosson,et al.  Usability Engineering: Scenario-based Development of Human-Computer Interaction , 2001 .

[18]  Nathaniel Good,et al.  Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.

[19]  John Bowers,et al.  Studies in computer supported cooperative work: theory, practice and design , 1990 .

[20]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[21]  Herbert H. Clark,et al.  Grounding in communication , 1991, Perspectives on socially shared cognition.

[22]  Mary Czerwinski,et al.  Providing elegant peripheral awareness , 2003, CHI Extended Abstracts.

[23]  M. Patton,et al.  Qualitative evaluation and research methods , 1992 .