Privacy in the open: how attention mediates awareness and privacy in open-plan offices

The tension between privacy and awareness has been a persistent difficulty in distributed environments that support opportunistic and informal interaction. For example, many awareness systems that display 'always-on' video links or PC screen contents have been perceived as too invasive, even though functional real-world analogues, like open-plan offices, may provide even less privacy than their online counterparts. In this paper we explore the notion of privacy in open-plan real-world environments, in order to learn more about how it might be supported in distributed systems. From interviews and observations in four open-plan offices, we found that attention plays an important role in the management of both confidentiality and solitude. The public nature of paying attention allows people to build understandings of what objects in a space are legitimate targets for attention and allows people to advertise their interest in interaction. Our results add to what is known about how privacy works in real-world spaces, and suggest valuable design ideas that can help improve support for natural privacy control and interaction in distributed awareness systems.

[1]  Christian Heath,et al.  Collaboration and controlCrisis management and multimedia technology in London Underground Line Control Rooms , 1992, Computer Supported Cooperative Work (CSCW).

[2]  Robert E. Kraut,et al.  Controlling interruptions: awareness displays and social motivation for coordination , 2004, CSCW.

[3]  Victoria Bellotti,et al.  Walking away from the desktop computer: distributed collaboration and mobility in a product design team , 1996, CSCW '96.

[4]  Anoop Gupta,et al.  Linking public spaces: technical and social issues , 2001, CHI.

[5]  Andrew Clement,et al.  Considering privacy in the development of multi-media communications , 1993, Computer Supported Cooperative Work.

[6]  Steinar Kristoffersen,et al.  An empirical study of how people establish interaction: implications for CSCW session management models , 1999, CHI '99.

[7]  Ronald E. Rice,et al.  Evaluating video as a technology for informal communication , 1992, CHI.

[8]  Elizabeth D. Mynatt,et al.  Semi-public displays for small, co-located groups , 2003, CHI '03.

[9]  James H. Moor,et al.  Towards a theory of privacy in the information age , 1997, CSOC.

[10]  Carl Gutwin,et al.  Using relationship to control disclosure in Awareness servers , 2005, Graphics Interface.

[11]  Scott E. Hudson,et al.  Techniques for addressing fundamental privacy and disruption tradeoffs in awareness support systems , 1996, CSCW '96.

[12]  John L. Arnott,et al.  Using spatial cues to improve videoconferencing , 1992, CHI.

[13]  Saul Greenberg,et al.  Making contact: getting the group communicating with groupware , 1993, COCS '93.

[14]  Saul Greenberg,et al.  Peepholes: low cost awareness of one's community , 1996, CHI Conference Companion.

[15]  Abigail Sellen,et al.  Reconsidering the Virtual Workplace: Flexible Support for Collaborative Activity , 1995, ECSCW.

[16]  Saul Greenberg,et al.  Supporting social worlds with the community bar , 2005, GROUP.

[17]  Kara A. Latorella,et al.  The Scope and Importance of Human Interruption in Human-Computer Interaction Design , 2002, Hum. Comput. Interact..

[18]  Robert E. Kraut,et al.  Patterns of contact and communication in scientific research collaboration , 1990, CSCW '88.

[19]  Stephanie D. Teasley,et al.  Rapid Software Development through Team Collocation , 2002, IEEE Trans. Software Eng..

[20]  Paul Dourish,et al.  Portholes: supporting awareness in a distributed work group , 1992, CHI.

[21]  P Paul F M Kuijer,et al.  The effect of office concepts on worker health and performance: a systematic review of the literature , 2005, Ergonomics.

[22]  T. Allen Managing the flow of technology , 1977 .

[23]  Carol M. Werner,et al.  Avoiding Intrusions at the Office: Privacy Regulation on Typical and High Solitude Days , 1992 .

[24]  Julie Thomas,et al.  Attention aware systems: Theories, applications, and research agenda , 2006, Comput. Hum. Behav..

[25]  Owen Daly-Jones,et al.  Informal workplace communication: what is it like and how might we support it? , 1994, CHI '94.

[26]  Roel Vertegaal,et al.  The GAZE groupware system: mediating joint attention in multiparty communication and collaboration , 1999, CHI '99.

[27]  Michael Boyle,et al.  The language of privacy: Learning from video media space analysis and design , 2005, TCHI.

[28]  K. Schmidt The Problem with ''Awareness" , 2002 .

[29]  Saul Greenberg,et al.  Broadcasting information via display names in instant messaging , 2005, GROUP.

[30]  Kjeld Schmidt,et al.  The Problem with `Awareness': Introductory Remarks on `Awareness in CSCW' , 2002, Computer Supported Cooperative Work (CSCW).

[31]  John C. Tang,et al.  Piazza: a desktop environment supporting impromptu and planned interactions , 1996, CSCW '96.

[32]  Eric Horvitz,et al.  Models of attention in computing and communication , 2003, Commun. ACM.

[33]  Steve Benford,et al.  A Spatial Model of Interaction in Large Virtual Environments , 1993, ECSCW.

[34]  John C. Tang,et al.  Lilsys: Sensing Unavailability , 2004, CSCW.

[35]  Carman Neustaedter,et al.  Blur filtration fails to preserve privacy for home-based video conferencing , 2006, TCHI.

[36]  James Fogarty,et al.  Presence versus availability: the design and evaluation of a context-aware communication client , 2004, Int. J. Hum. Comput. Stud..

[37]  Volker Wulf,et al.  The Ambivalence of Network Visibility in an Organizational Context , 1993, NetWORKing.

[38]  Matthew B. Miles,et al.  Qualitative Data Analysis: An Expanded Sourcebook , 1994 .

[39]  Carl Gutwin,et al.  Providing artifact awareness to a distributed group through screen sharing , 2006, CSCW '06.

[40]  Tom Rodden,et al.  Populating the application: a model of awareness for cooperative applications , 1996, CSCW '96.

[41]  Andrew Clement Considering Privacy in the Development of Multimedia Communications , 1996, Computerization and Controversy, 2nd Ed..

[42]  Wendy A. Kellogg,et al.  Socially translucent systems: social proxies, persistent conversation, and the design of “babble” , 1999, CHI '99.

[43]  Marisa S. Viveros,et al.  BlueSpace: personalizing workspace through awareness and adaptability , 2002 .

[44]  Mikael Wiberg,et al.  Managing availability: Supporting lightweight negotiations to handle interruptions , 2005, TCHI.

[45]  Paul Dourish,et al.  Realizing a video environment: EuroPARC's RAVE system , 1992, CHI.

[46]  Jonathan Grudin,et al.  Desituating Action: Digital Representation of Context , 2001, Hum. Comput. Interact..

[47]  Robert W. Root,et al.  Design of a multi-media vehicle for social browsing , 1988, CSCW '88.

[48]  Paul Dourish,et al.  Supporting awareness in a Distributed Work Group , 1992 .

[49]  James A. Landay,et al.  Personal privacy through understanding and action: five pitfalls for designers , 2004, Personal and Ubiquitous Computing.

[50]  Leslie G. Ungerleider,et al.  Mechanisms of visual attention in the human cortex. , 2000, Annual review of neuroscience.

[51]  Bonnie A. Nardi,et al.  Interaction and outeraction: instant messaging in action , 2000, CSCW '00.

[52]  Jeffrey S. Shell,et al.  Designing for augmented attention: Towards a framework for attentive user interfaces , 2006, Comput. Hum. Behav..