I don't mind being logged, but want to remain in control: a field study of mobile activity and context logging Tuula Kärkkäinen, Tuomas Vaittinen, Kaisa.

Slides:



Advertisements
Similar presentations
Cityware: Design and Evaluation of City-scale Pervasive Technologies Tim Jay
Advertisements

Internet Bullying Social Networking Site Security Potential to Law Infringement Let us do something more.
© 2011 Crain Communications Inc.. Always on Women A survey of how women are using technology today What Devices Millennials are Using, And What They Are.
Term 2, 2011 Week 1. CONTENTS Sending and receiving devices Mobile devices connected to networks – Smart phones – Personal digital assistants – Hand-held.
 Vibrant and rapidly growing content creation ecosystems which are very popular at grassroots.  Create hyper-local content on topics like entertainment,
Facebook Twitter MySpace Cell Phones ???!!!!
Unit 1 Living in the Digital WorldChapter 2 Which devices should we take? This presentation will cover the following topic: Which devices should we take?
‘Do violent video games appeal to key stage three students at Lincroft, and if so why?’ By Richard Webb.
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
IPad Use Among Freshmen Honors Students at The College at Brockport Pat Maxwell Priya Banerjee.
1 Alcatel Onetouch Antivirus. 2 Thinking about security on your smartphone Alcatel OneTouch? We have the solution. Among the applications on your smartphone,
What you don’t know CAN hurt you!
Cyber Safety What Every Parent Needs to Know If your child is surfing the Web, you need to be paddling right alongside him/her.
Advanced Techniques in Forensic Examination of Smartphones (C) Oxygen Software,
Influence of Social Networking sites on the Internet
Suman Nath Microsoft Research. Contextual Computing Make computing context-aware Context: location, activity, preference, history A lot of progresses.
A smartphone from Apple that integrates cellphone, iPod, camera, text messaging, and Web browsing. Data and applications can be sent to the phone.
Are you being a safe and successful digital citizen?
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
So You Want to Buy a Cell Phone !. What You Need To Decide How many minutes a month will I use it? What features do I want? What areas will I use it in?
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
Mobile Recruiting Mobile Sensitivity Training for Recruiters.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Development in Mobile Technologies Mobile Technology is a collective term used to describe the various types of cellular communication technology.
WebCall - A Rich Context Mobile Research Platform Zhigang Liu, Hawk Yin Pang, Jun Yang, Guang Yang, Peter Boda (Special thanks to August Joki) Nokia Research.
Taking the Road Not Traveled An interactive locative media project By: Laura Crestohl.
LifeLogOn: Log on to Your Lifelog Ontology! Introduction & Demonstration Sangkeun Lee, Gihyun Gong, Sang-goo Lee Intelligent Database Systems Lab Seoul.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
INFORMATION TECHNOLOGY IN BUSINESS AND SOCIETY SESSION 21 – LOCATION-BASED SERVICES SEAN J. TAYLOR.
GIS and Cloud Computing. Flickr  Upload and manage your photos online  Share your photos with your family and friends  Post your photos everywhere.
????. What is a QR code? It’s a type of barcode invented by the Japanese motor industry to keep track of spare parts.
Social Media How Can This New Technology Possibly Help My Congregation?
User Perspectives on Mobile Data Services June 1, 2007 Global Mobility Roundtable Elizabeth Fife Principal Researcher USC Marshall School of Business C.
Adviser’s Presentation. SMS Fleet (Pty) Ltd Privately owned company established in 2006 Our product “My Tracer” is a locally developed, brilliant, fully.
Page 1 Login Security Usability Test Results | August 2014 Login Security Usability Test Results Conducted by Jayne Schurick Usability Consultant
Phones and fieldTask. Session Objective Be familiar with: – selecting smart phones for a survey, – configuring them – and using them – fieldTask (c) Smap.
Geographic Information Systems Cloud GIS. ► The use of computing resources (hardware and software) that are delivered as a service over the Internet ►
Safe Mobile Devices Designs Kristen Kuron JMA464; Dr. Gibbs Prototype A Prototype B.
George Johnson Director of Technology and Innovation What do our students want?
>  Slide 1 Coaching Insights Coaching statistics and analysis 2015/16.
Accessibility Violations Group 6. Description Everyone naturally has right of accessibility to the places which all people can access. However, some people.
Introduction to Mobile Development 1. Mobile Communications One of the fastest growing industries on earth Unprecedented consumer take-up Mobile phones.
©2010 John Wiley and Sons Chapter 6 Research Methods in Human-Computer Interaction Chapter 6- Diaries.
Canadian Advertising in Action, 6th ed. Keith J. Tuckwell ©2003 Pearson Education Canada Inc Elements of the Internet World Wide Web World.
Managing your Digital Footprint Real Life vs. Digital Life.
Features of mobile apps. Introduction of mobile apps  FACEBOOK  Facebook is an online social networking service. Its name comes from a colloquialism.
Recommendations Adam would like you to create a list of recommended mobile phones for three different types of user: Teenagers Business Users Senior Citizens.
A Case Study of Interaction Design. “Most people think it is a ludicrous idea to view Web pages on mobile phones because of the small screen and slow.
Technology & Stalking. Every single datum about my life is private? That's silly," Scalia [said].
Build Relationships and Build Business on Powered by Customer WOW Project.
The Smart watch 1. ① Introduction ② ADVT.&DISADVT. ③ Examples ④ Future ⑤ Conclusion Agenda 2.
Nokia Nseries See new. Hear new. Feel new. April 27, 2005 Multimedia Nokia.
IPHONE Neeraj Dhiman. CONTENT  INTRODUCTION  HISTORY  HARDWARE  SOFTWARE  FEATURES  SPECIFICATIONS  RESTRICTIONS.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
FriendFinder Location-aware social networking on mobile phones.
FriendFinder Location-aware social networking on mobile phones.
Sensing Meets Mobile Social Networks: The Design, Implementation and Evaluation of the CenceMe Application Emiliano Miluzzo†, Nicholas D. Lane†, Kristóf.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
FriendFinder Location-aware social networking on mobile phones.
TEXT MESSAGING AS A FORM OF COMMUNICATION A presentation about the hypothesis, survey and results.
Winky Lau s seminarsonly.com us for more reports
1 Thinking Do you have a cell phone? If so, do you prefer to communicate via text or a direct phone call? If not, do you think you would be more.
Introduction Skip Intro Connect you to next durga. Just buzzer by saying “help me”. We will connect you to the next durga near to you. Next.
MY NEST A TECHNOLOGICAL OVERVIEW. NECKLACE Reason: Hidden Less like being tagged and branded (jail)
11 A Website dedicated entirely to Selling Your Home!
A presentation by Schäffer Markus. Table of Content General information Main goals and ideas History Products – Mobil Phone Series & Nokia Ovi Locations.
Smartphone questionnaire
Which Mobile?.
Presentation transcript:

I don't mind being logged, but want to remain in control: a field study of mobile activity and context logging Tuula Kärkkäinen, Tuomas Vaittinen, Kaisa Väänänen-Vainio-Mattila CHI 2010

Lifelogging Lifelogging: recording information about person’s activities and content of what was done/said, etc. Lifelogging with smartphones: GPS, bluetooth, WiFi, messages, phone calls, web browsing history, music, voice calls, etc. Motivation: so far no extensive UX studies on lifelogging

Study Setup 13 participants w/ 8-11 weeks (in Finland) Study started at the 6 th week (till 9 th week) Nokia N95 phone with the following setup: – ShoZu: getting GPS coordinates to the photos and videos and for uploading them to Flickr – Simple Context Collector: Location tracking data (GPS, GSM cell IDs) Bluetooth scanning data WiFi scanning data Voice phone calls Text messages Music tracks

Study Setup Web application for browsing the logged information A user can share data (photo, video, location, music) with friends (displayed in the lifeline view) (Map View)

Study Setup Participant setup: – Group 1: 4 males + 1 female (all close friends) – Group 2: 2 brothers who share the apt – Group 3: acquaintances (4 males + 1 female) Participants were interviewed twice Quantitative survey at the end of the trial – AttracDiff 2: pragmatic quality, hedonic quality, etc. – Roto & Rautava: utility, usability, social value, enjoyment

General experiences on mobile phone activity logging Users were only a little disturbed by the logging After the logging client had been running on the users’ phones for a few days, users stopped paying attention to the logging. Logging created positive experiences for users “…In a way you can analyze your lifestyle more. And similarly what your friends are doing, you can find common interests that you might not have realized before.” Yet, there are still some concerns with battery consumption and privacy violation

Experiences on the Logged Content Types and Actions The logged data makes me curious: 6 (mostly agree) The system logs all the data I want: 4.5 – Users want to log more information (e.g., status, video calls, traffic etc). The system logs data that I don’t want in the questionnaire: 4 (neither agree nor disagree)

Sense of Privacy Most of the users felt that their privacy was not threatened, despite using the logging system Yet, people concern with potential leakage (e.g., stolen password?) Users want control what to log and when to log (even uploading, deleting); i.e., fine-grained control preferred Text messaging is deemed to be most private (some didn’t want to log at all) People shared photos (among friends via Flickr) Few shared location tracks with friends (e.g., trip information sharing)

Changes in User Behavior during the Trial Awareness of the data logging encourages me to actively gain new experiences: 5 (mostly agree) – Logging increased communications among friends – Logging encouraged taking more photos and playing with GPS log data Awareness of the logging makes me restrict my doings: 2 (mostly disagree)