• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human-Computer Interaction 15(2/3 (2000)

by M S Ackerman
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 225
Next 10 →

An architecture for privacy-sensitive ubiquitous computing

by Jason I. Hong - In MobiSYS ’04: Proceedings of the 2nd international conference on mobile systems, applications, and services , 2004
"... Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy ..."
Abstract - Cited by 231 (16 self) - Add to MetaCart
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in designing software architectures and in creating interactions that are effective in helping end-users manage their privacy. To address this problem, we present Confab, a toolkit for facilitating the development of privacy-sensitive ubiquitous computing applications. The requirements for Confab were gathered through an analysis of privacy needs for both end-users and application developers. Confab provides basic support for building ubiquitous computing applications, providing a framework as well as several customizable privacy mechanisms. Confab also comes with extensions for managing location privacy. Combined, these features allow application developers and end-users to support a spectrum of trust levels and privacy needs.
(Show Context)

Citation Context

...le with a level of plausible deniability that gives them maneuveringsroom later on.sThe problem, however, is that technical systems are notoriously awkward atssupporting these kinds of social nuances =-=[6]-=-. Although people can develop newspractices for new technologies, for example adapting to the lack of eye gaze in videosconferencing, it can be difficult to predict and design for these practices, and...

Implications for Design

by Paul Dourish - Proc. ACM Conf. Human Factors in Computing Systems CHI 2006 , 2006
"... Although ethnography has become a common approach in HCI research and design, considerable confusion still attends both ethnographic practice and the criteria by which it should be evaluated in HCI. Often, ethnography is seen as an approach to field investigation that can generate requirements for s ..."
Abstract - Cited by 123 (4 self) - Add to MetaCart
Although ethnography has become a common approach in HCI research and design, considerable confusion still attends both ethnographic practice and the criteria by which it should be evaluated in HCI. Often, ethnography is seen as an approach to field investigation that can generate requirements for systems development; by that token, the major evaluative criterion for an ethnographic study is the implications it can provide for design. Exploring the nature of ethnographic inquiry, this paper suggests that “implications for design ” may not be the best metric for evaluation and may, indeed, fail to capture the value of ethnographic investigations.
(Show Context)

Citation Context

...aw in particular on three insightful explorations of the problems of ethnography and design in different contexts – Anderson’s [2] exploration of the issue of ethnography and requirements, Ackerman’s =-=[1]-=- reflections on the socio-technical gap, Button’s [6] comparison between different models for ethnographic analysis, and Suchman’s [37] account of forms of ethnographic encounter between technologists...

Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem

by Paul Dourish, Rebecca E. Grinter, Jessica Delgado De La Flor, Melissa Joseph - PERSONAL AND UBIQUITOUS COMPUTING , 2004
"... Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people’s ability to understand them and use them as part of their work. As a step towards solving t ..."
Abstract - Cited by 114 (6 self) - Add to MetaCart
Ubiquitous and mobile technologies create new challenges for system security. Effective security solutions depend not only on the mathematical and technical properties of those solutions, but also on people’s ability to understand them and use them as part of their work. As a step towards solving this problem, we have been examining how people experience security as a facet of their daily life, and how they routinely answer the question, “is this system secure enough for what I want to do?” We present a number of findings concerning the scope of security, attitudes towards security, and the social and organizational contexts within which security concerns arise, and point towards emerging technical solutions.

Changes in use and perception of Facebook

by Cliff Lampe, Nicole B. Ellison, Charles Steinfield - In Proceedings of the ACM 2008 conference on Computer supported cooperative , 2008
"... As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are becoming more popular across broad segments of Internet users. Facebook, in particular, has very broad participation amo ..."
Abstract - Cited by 69 (6 self) - Add to MetaCart
As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are becoming more popular across broad segments of Internet users. Facebook, in particular, has very broad participation amongst college attendees, and has been growing in other populations as well. This paper looks at how use of Facebook has changed over time, as indicated by three consecutive years of survey data and interviews with a subset of survey respondents. Reported uses of the site remain relatively constant over time, but the perceived audience for user profiles and attitudes about the site show differences over the study period. Author Keywords Social network sites, Facebook, audience, privacy,
(Show Context)

Citation Context

...s of me at a party, I’ve untagged myself in. I don’t really want to convey a message of -- which I’m not a big partier at all -- but I just don’t want somebody getting the wrong impression.” Ackerman =-=[1]-=- presented three challenges to privacy management resulting from the use of technical systems: lack of sufficient nuance, lack of social flexibility, and insufficient capacity for ambiguity. In each s...

"Breaking the Code", moving between private and public work in . . .

by Cleidson R. B. De Souza, David Redmiles, Paul Dourish - IN COLLABORATIVE SOFTWARE DEVELOPMENT" ACM SIGGROUP BULLETIN VOLUME 24 , ISSUE 1 , 2003
"... Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is especially difficult because of the many interdependencies amongst the artifacts created during the process. This has lead s ..."
Abstract - Cited by 34 (1 self) - Add to MetaCart
Software development is typically cooperative endeavor where a group of engineers need to work together to achieve a common, coordinated result. As a cooperative effort, it is especially difficult because of the many interdependencies amongst the artifacts created during the process. This has lead software engineers to create tools, such as configuration management tools, that isolate developers from the effects of each other’s work. In so doing, these tools create a distinction between private and public aspects of work of the developer. Technical support is provided to these aspects as well as for transitions between them. However, we present empirical material collected from a software development team that suggests that the transition from private to public work needs to be more carefully handled. Indeed, the analysis of our material suggests that different formal and informal work practices are adopted by the developers to allow a delicate transition, where software developers are not largely affected by the emergent public work. Finally, we discuss how groupware tools might support this transition.

Managing Personal Information Disclosure in Ubiquitous Computing Environments

by S Lederer, J Mankoff, A K Dey, C Beckmann , 2003
"... ..."
Abstract - Cited by 29 (1 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...in that, in the words of Acke rman, we offer a “first-order approximation” to close part of the “socio-technical gap” between what systems are supposed to do socially and what they can do technically =-=[1]-=-. That is, our solution is neither final nor complete, but is a first step towards fu lfilling the complex promise of manageable privacy in ubiquitous computing. Acknowledgements Thanks to Karen Teng,...

Security Automation Considered Harmful?

by W. Keith Edwards, Erika Shehan Poole, Jennifer Stoll , 2007
"... End-users are often perceived as the weakest link in information security. Because of this perception, a growing body of research and commercial activity is focused on automated approaches to security. With these approaches, security decisions are removed from the hands of the users, and are placed ..."
Abstract - Cited by 27 (3 self) - Add to MetaCart
End-users are often perceived as the weakest link in information security. Because of this perception, a growing body of research and commercial activity is focused on automated approaches to security. With these approaches, security decisions are removed from the hands of the users, and are placed instead in systems themselves, or in remote services or organizations that establish policies that are automatically enforced. We contend that although security automation is potentially beneficial in theory, in practice it is not a panacea for end-user information security. A number of technical and social factors mitigate against the acceptance and efficacy of automated end-user security solutions in many cases. In this paper, we present a discussion of the inherent limitations of automating security for end-users. We then discuss a set of design guidelines for choosing whether to automate end-user security systems. We conclude with a set of research directions focused on increasing the acceptance and efficacy of security solutions for end-users.

A Conceptual Model and a Metaphor of Everyday Privacy in Ubiquitous Computing Environments

by Scott Lederer, Anind K. Dey, Jennifer Mankoff, Scott Lederer, Anind K. Dey, Jennifer Mankoff - Computer , 2002
"... Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective per ..."
Abstract - Cited by 27 (1 self) - Add to MetaCart
Abstract. We present a unified model of everyday privacy in ubiquitous computing environments, designed to aid system designers and administrators in conceptualizing the end-user privacy experience. The model accounts for the influence of societal-scale forces, contextual factors, and subjective perception on end-user privacy. We identify notice and consent as the fair information practices of greatest everyday utility to users, as they gradually engender the user’s conceptual model of ubicomp privacy. Navigating the regular deluge of personal information collection events in ubicomp requires that notice be minimally intrusive and consent be implicitly granted by a persistent, situation-specific set of user preferences. We extend our model into an interactional metaphor called situational faces, designed to mitigate the complexity of privacy for the end-user. When encountering a situation, a user engages the appropriate face, a metaphorical abstraction of a set of privacy preferences. 1
(Show Context)

Citation Context

... networked, computationally rich tapestry of ubicomp, technologists must double as social scientists and make their best efforts to design systems responsive to the nuanced, evolving needs of society =-=[1]-=-. This paper represents the state of our efforts to do just that with regard to end-user understanding and management of privacy in ubiquitous computing. The emergence of ubiquitous sensor networks an...

Argumentation support: From technologies to tools

by Aldo De Moor, Mark Aakhus - ACM , 2006
"... Electronic argumentation support is increasingly important in today’s networked society. Virtual research collaboration, e-business, and many other domains of professional life critically depend on adequate support of tools for productive argumentative interactions. However, a plethora of technologi ..."
Abstract - Cited by 22 (4 self) - Add to MetaCart
Electronic argumentation support is increasingly important in today’s networked society. Virtual research collaboration, e-business, and many other domains of professional life critically depend on adequate support of tools for productive argumentative interactions. However, a plethora of technologies exist that are not necessarily tools. A technology only is a tool if it serves the purposes of the community in which it is used. In this paper, we outline an approach to diagnose to what extent a particular argumentation technology is a tool. We do this by combining a sociotechnical view on technologies with a pragma-dialectical approach to argumentation analysis. We argue that for technologies to become a tool, argumentation routines and design need to co-evolve. We illustrate our approach by applying it to a case on group report authoring. 1.

Social Software for Life-long Learning

by Ralf Klamma, Mohamed Amine Chatti, Erik Duval, Hans Hummel, Ebba Thora Hvannberg, Milos Kravcik, Effie Law, Ambjörn Naeve, Peter Scott
"... Life-long learning is a key issue for our knowledge society. With social software systems new heterogeneous kinds of technology enhanced informal learning are now available to the life-long learner. Learners outside of learning institutions now have access to powerful social communities of experts a ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
Life-long learning is a key issue for our knowledge society. With social software systems new heterogeneous kinds of technology enhanced informal learning are now available to the life-long learner. Learners outside of learning institutions now have access to powerful social communities of experts and peers who are together forging a new web 2.0. This paper reviews current work in pan-European initiatives that impact upon life-long learning via views of professional learning, learner competence and social networking. It seeks to provide an overview of some of the critical research questions for the interdisciplinary field of social software research.
(Show Context)

Citation Context

...ing social software are high usability and good sociability, with each of them comprising a set of criteria and measures (Preece 2001).There are inherent social-technical gaps that seem unbridgeable (=-=Ackerman 2000-=-; Olson & Olson 2000), especially the issue of trust that is intricately related to privacy and security. Some standardization efforts and initiatives have been undertaken (Law & Hvannberg 2007) to ad...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University