Skip to main content

How to Build Awareness-Supported Systems Without Sacrificing Privacy

  • Conference paper
Computer Supported Cooperative Work in Design III (CSCWD 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4402))

  • 954 Accesses

Abstract

The success of group activities depends largely on the extent to which collaborators are aware of the characteristics and progress of a given task, the roles and activities of other members, and situational changes. This issue of awareness has become a central theme in both human–computer interaction and computer-supported cooperative work. However, to increase awareness, privacy is typically sacrificed. Emphasizing the importance of privacy, we suggest guidelines on how to deal with the issue of privacy in awareness-centered CSCW systems design, based on two interview studies and an analysis of scenarios inspired by the interviews. We discuss the results with regard to the factors of awareness of task, members, presence, schedule, and activity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bowers, J., Benford, S. (eds.): Studies in Computer Supported Cooperative Work: Theory, Practice, and Design. North-Holland, Amsterdam (1991)

    MATH  Google Scholar 

  2. Bannon, L.: Perspectives on CSCW: from HCI and CMC to CSCW. In: Proc. International Conference on Human-Computer Interaction, St. Petersburg, Russia, pp. 148–158 (1992)

    Google Scholar 

  3. Shapiro, D., Tauber, M., Traunmuller, R. (eds.): The Design of Computer Supported Cooperative Work and Groupware Systems. Elsevier, Amsterdam (1996)

    Google Scholar 

  4. CHI Workshop: CHI 2003 - Workshop for Elegant Peripheral Awareness. Proceedings of CHI’2003. ACM Press, New York (2003)

    Google Scholar 

  5. CSCW Workshop: International Workshop on Awareness and World Wide Web. Proceedings of CSCW’2000 (2000)

    Google Scholar 

  6. CSCW: a special issue on Awareness on CSCW. Computer Supported Cooperative Work: The Journal of Collaborative Computing 11(3-4), 285–530 (2002)

    Google Scholar 

  7. Dourish, P., Bellotti, V.: Awareness and Coordination in Shared Workspaces. In: Proc. of CSCW’92, pp. 107–114 (1992)

    Google Scholar 

  8. Gutwin, C., Greenberg, S.: The Effects of Workspace Awareness Support on the Usability of Real-time Distributed Groupware. ACM Trans. on CHI 6(2), 243–281 (1999)

    Google Scholar 

  9. HCI: A special issue on Context-aware Computing. HCI 16(2/4), 87–419 (2001)

    Google Scholar 

  10. Dourish, P.: Culture and Control in a Media Space. In: Proc. of the Conference on Computer Supported Cooperative Work (ECSCW’93), pp. 125–144 (1993)

    Google Scholar 

  11. Palen, L.: Social, Individual, and Technological Issues for Groupware Calendar Systems. In: Proceedings of the CHI’99 Conference, Pittsburgh, Pennsylvania, pp. 17–24 (1999)

    Google Scholar 

  12. Whitten, A., Tygar, J.D.: Why Johnny Can’t Encrypt: a Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, Washington, D.C. (1999)

    Google Scholar 

  13. Good, N.S., Krekelberg, A.: Usability and Privacy: A Study of Kazaa P2P File-sharing. In: Proceedings of the CHI’2003, Fort Lauderdale, Florida, pp. 137–144 (2003)

    Google Scholar 

  14. Lederer, S., et al.: Personal Privacy through Understanding and Action: Five Pitfalls for Designers. Pers. Ubiquit. Comp. 8, 440–454 (2004)

    Article  Google Scholar 

  15. Kang, M., Kim, H.-C.: A Privacy Model in Ubiquitous Environments. In: Proc. Int. Conf. on Multimedia, Information, Technology and its Applications, Dalian, China, pp. 273–275 (2006)

    Google Scholar 

  16. Hudson, S.E., Smith, I.: Techniques for Addressing Fundamental Privacy and Disruption Trade-offs in Awareness Support Systems. In: Proc. of the Conf. on Computer Supported Cooperative Work (CSCW’96), pp. 248–257 (1996)

    Google Scholar 

  17. Clark, H.H.: Using Language. Cambridge University Press, Cambridge (1996)

    Google Scholar 

  18. Clark, H.H., Brennan, S.E.: Grounding in Communication. In: Resnick, L.B., Revine, R.M., Teasley, S.D. (eds.) Perspectives on Socially Shared Cognition, pp. 127–149 (1991)

    Google Scholar 

  19. Grudin, J.: Why CSCW Applications Fail: Problems in the Design and Evaluation of Organizational Interfaces. In: Proc. of CSCW’88, pp. 85–93 (1988)

    Google Scholar 

  20. Patton, M.Q.: Qualitative Evaluation and Research Methods, 2nd edn. Sage, Thousand Oaks (1990)

    Google Scholar 

  21. Carroll, J.M.: Artifacts and Scenarios: An Engineering Approach. In: Monk, A., Gilbert, A. (eds.) Perspectives on HCI: Diverse Approaches, Academic Press, London (1995)

    Google Scholar 

  22. Rosson, M.B., Carroll, J.M.: Usability Engineering: Scenario-based Development of Human-Computer Interaction. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  23. Carroll, J.M.: Scenario-based Design: Envisioning Work and Technology in System Development. John Wiley & Sons, Chichester (1995)

    Google Scholar 

  24. Cooper, A.: The Inmates are Running the Asylum: Why High Tech Products Drive Us Crazy and How to Restore the Sanity, 2nd edn. Sams, Indianapolis (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Weiming Shen Junzhou Luo Zongkai Lin Jean-Paul A. Barthès Qi Hao

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, MK., Kim, HC. (2007). How to Build Awareness-Supported Systems Without Sacrificing Privacy. In: Shen, W., Luo, J., Lin, Z., Barthès, JP.A., Hao, Q. (eds) Computer Supported Cooperative Work in Design III. CSCWD 2006. Lecture Notes in Computer Science, vol 4402. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72863-4_62

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72863-4_62

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72862-7

  • Online ISBN: 978-3-540-72863-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics