Skip to main content
Log in

Designing for privacy and self-presentation in social awareness

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown that users are not only concerned with the preservation privacy through non-disclosure. Instead, disclosure is manipulated for the constant presentation of self to the group in everyday social situations. Basing on 3 years of research with the mobile social awareness system ContextContacts, established findings in social psychology and ubiquitous computing, we propose a number of design principles to support users in this management of privacy and presentation. These principles are to apply even if disclosure is automated, and include support for lightweight permissions, assuming reciprocity, appearing differently to different audiences, providing for feedback on presentation and allowing lying. These principles are applied in interaction design and protocol engineering for the next version of a mobile awareness system called ContextContacts.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. Some of the interaction design ideas were presented in an earlier workshop paper [13], but the analytical structure is completely new.

  2. The first three studies have been reported in detail in Oulasvirta et al. [28]. The latest study has not been fully analyzed, but we will give preliminary results based on interview data. The existing reports have mostly skimmed the privacy aspects, which we will focus on here.

  3. http://messenger.msn.com/.

  4. http://www.aim.com/.

  5. http://www.icq.com/.

  6. http://www.plazes.com/.

  7. http://www.dodgeball.com/.

  8. http://www.proxidating.com/.

References

  1. Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone’s Contact Book to Support Mobile Awareness and Collaboration. In: Proceedings of the 7th international conference on human computer interaction with mobile devices and services, MOBILEHCI’05. ACM, pp 167–174

  2. Dourish P, Bellotti V (1992) Awareness and coordination in shared workspaces. In: CSCW ‘92: proceedings of the 1992 ACM conference on Computer-supported cooperative work. ACM Press, New York, pp 107–114

  3. Langheinrich M (2001) Privacy by Design—Principles of Privacy-Aware Ubiquitous Systems. In: Abowd GD, Brumitt B, Shafer SA (eds) Proceedings of the third international conference on ubiquitous computing (UbiComp 2001), vol 2201. Lecture Notes in Computer Science. Springer, Atlanta, pp 273–291

  4. Smith I, Consolvo S, Lamarca A, Hightower J, Scott J, Sohn T, Hughes J, Iachello G, Abowd GD (2005) Social disclosure of place: from location technology to communication practices. In: Gellersen HW, Want R, Schmidt A (eds) Pervasive computing: third international conference, PERVASIVE 2005, Munich, Germany, May 8–13, 2005. Proceedings, vol 3468. Lecture Notes in Computer Science. Springer, Berlin, pp 134–151

  5. Lederer S, Hong JI, Dey AK, Landay JA (2004) Personal privacy through understanding and action: five pitfalls for designers. Personal Ubiquitous Comput 8(6):440–454

    Article  Google Scholar 

  6. W3C (2005) Platform for Privacy Preferences (P3P) Project, online, http://www.w3.org/P3P/, referenced Jun 2006

  7. Palen L, Dourish P (2003) Unpacking “privacy” for a networked world. In: CHI ‘03: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 129–136

  8. Aoki PA, Woodruff A (2005) Making space for stories: ambiguity in the design of personal communication systems. In: CHI ‘05: Proceeding of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 181–190

  9. Altman I, Vinsel A, Brown BB (1981) Dialectic conceptions in social psychology: an application to social penetration and privacy regulation. Adv Exp Soc Psychol 14:108–161

    Google Scholar 

  10. Margulis ST (2003) On the status and contribution of Westin’s and Altman’s Theories of Privacy. J Soc Issues 59(2):411–429

    Article  Google Scholar 

  11. Petronio S (2002) Boundaries of privacy, dialectics of disclosure. State University of New York Press

  12. Goffman E (1990) The presentation of self in everyday life. Penguin Books, London, Reprinted, original 1959 Anchor Books

  13. Raento M, Oulasvirta A (2005) Privacy management for social awareness applications. In: Proceedings of the workshop on context awareness for proactive systems, CAPS 2005. Helsinki University Press, pp 105–114

  14. Goffman E (1967) Interaction Ritual, chapter On Face-Work. Pantheon Books, New York, pp 5–45

    Google Scholar 

  15. Hong JI, Landay JA (2004) An architecture for privacy-sensitive ubiquitous computing. In: MobiSys ‘04: Proceedings of the 2nd international conference on Mobile systems, applications, and services. ACM Press, New York, pp 177–189

  16. Nardi BA, Whittaker S, Bradner E (2000) Interaction and outeraction: instant messaging in action. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 79–88

  17. Berg JH, Derlega VJ (1987) Themes in study of self-disclosure. In: Derlega VJ, Berg JH (eds) Self-disclosure. Theory, Research and Therapy. Plenum Press, New York, pp 1–8

    Google Scholar 

  18. Vittengl JR, Holt CS (2002) Getting acquainted: the relationship of self-disclosure and social attraction to positive affect. J Soc Pers Relat 17(1):53–66

    Article  Google Scholar 

  19. Miller JB, Stubblefield A (1993) Parental disclosure from the perspective of late adolescent. J Adolesc 16:439–455

    Article  Google Scholar 

  20. Leary MR, Kowalski RM (1990) Impression Management: a literature review and a two-component model. Psychol Bull 107(1)

  21. DePaulo BM, Kashy DA, Kirkendol SE, Wyer MM (1996) Lying in everyday life. J Personal Soc Psychol 70(5):979–995

    Article  Google Scholar 

  22. GEOPRIV Working Group Archives (2003) Geopriv and actively lying. Mailing list exchange, online, http://ecotroph.net/~anewton/hypermail/geopriv/0309/0846.html, referenced June 2006

  23. Berger PL, Luckman T (1966) The social construction of reality: a treatise in the sociology of knowledge. Garden City, New York

  24. Antaki C, Barnes R, Leudar I (2005) Self-disclosure as a situated interactional practice. Br J Soc Psychol 44:181–199

    Article  Google Scholar 

  25. Consolvo S, Smith IE, Matthews T, LaMarca A, Tabert J, Powledge P (2005) Location disclosure to social relations: why, when, and what people want to share. In: CHI ‘05: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 81–90

  26. Grice H (1975) Logic and conversation. In: Cole P, Morgan JL (eds) Syntax and semantics, Speech Acts, vol 3. Academic Press, New York, pp 43–58

    Google Scholar 

  27. Schegloff EA (1972) Notes on a conversational practice: formulating place. In: Sudnow D (ed) Studies in social interaction. The Free Press, New York, pp 75–119

    Google Scholar 

  28. Oulasvirta A, Petit R, Raento M, Tiitta S (2006) On how users interpret and act upon mobile awareness cues. Human–Computer interaction (in press)

  29. Raento M, Oulasvirta A, Petit R, Toivonen H (2005) ContextPhone, a prototyping platform for context-aware mobile applications. IEEE Pervasive Comput 4(2):51–59

    Article  Google Scholar 

  30. Bardram JE, Hansen TR (2003) The AWARE architecture: supporting context-mediated social awareness in mobile cooperation. In: Proceedings of the CSCW03. ACM Press, New York, pp 192–201

  31. Milewski AE, Smith TM (2000) Providing presence cues to telephone users. In: CSCW ‘00: Proceedings of the 2000 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 89–96

  32. Katz J, Aakhus M (eds) (2002) Perpetual contact: mobile communication, private talk, public performance. Cambridge University Press, Cambridge

    Google Scholar 

  33. Ling R (2004) The mobile connection: the cell phones impact on society. Morgan Kaufmann, San Francisco

    Google Scholar 

  34. Laasonen K, Raento M, Toivonen H (2004) Adaptive on-device location recognition. In: Proceedings of the 2nd international conference on pervasive computing (Pervasive 2004), vol 3001, Lecture Notes in Computer Science. Springer, Berlin, pp 287–304

  35. Prinz W (1999) NESSIE: an awareness environment for cooperative settings. In: Proceedings of the sixth European conference on computer supported cooperative work—ECSCW99. Kluwer, Dordrecht, pp 391–410

  36. Rubin Z (1975) Disclosing oneself to a stranger: reciprocity and its limits. J Exp Soc Psychol 11(3):233–260

    Article  Google Scholar 

  37. Ambady N, Bernieri F, Richeson JA (2000) Toward a histology of social behavior: judgmental accuracy from thin slices of the behavioral stream. Adv Exp Soc Psychol 32:201–271

    Article  Google Scholar 

  38. McEwan G, Greenberg S (2005) Supporting social worlds with the community bar. In: GROUP ‘05 Proceedings of the 2005 international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 21–30

  39. Wiberg M, Whittaker S (2005) Managing availability: supporting lightweight negotiations to handle interruptions. ACM Trans Comput Hum Interact 12(4):356–387

    Article  Google Scholar 

  40. Deci EL, Ryan RM (2000) The “What” and “Why” of goal pursuits: Human needs and the self-determination of behavior. Psychol Inq 11(4):227–268

    Article  Google Scholar 

  41. Sloane L (1992) Orwellian dream come true: a badge that pinpoints you. The New York Times, September 12

  42. Lee A, Girgensohn A, Schlueter K (1997) Nynex portholes: initial user reactions and redesign implications. In: GROUP ‘97 Proceedings of the international ACM SIGGROUP conference on supporting group work. ACM Press, New York, pp 385–394

  43. Griswold WG, Shanahan P, Brown SW, Boyer R, Ratto M, Shapiro RB, Truong TM (2004) ActiveCampus: experiments in community-oriented ubiquitous computing. Computer 37:73–81

    Article  Google Scholar 

  44. Barkhuus L, Dey AK (2003) Location-based services for mobile telephony: a study of users’ privacy concerns. In: Interact 2003. ACM Press, Zurich, pp 709–712

  45. Oulasvirta A, Tamminen S, Roto V, Kuorelahti J (2005) Interaction in 4-s bursts: the fragmented nature of attention in mobile HCI. In: Proceedings of the 2005 conference on human factors in computing systems (CHI 2005). ACM Press, New York, pp 919–928

  46. Palen L (1999) Social, individual and technological issues for groupware calendar systems. In: Proceedings of the SIGCHI conference on Human factors in computing systems ACM Press, New York, pp 17–24

  47. Zaner M, Chung EK, Savage T (2003) 3 and the Net Generation: Designing for Inner Circles of Friends. In: Proceedings of the workshop on intimate ubiquitous computing at UbiComp 2003. Intel Corporation, online, http://berkeley.intel-research.net/paulos/lab/ubicomp03/Workshop/index.html, referenced June 2006

  48. Phillips DJ (1996) Defending the boundaries: identifying and countering threats in a usenet newsgroup. Inf Soc 12(1):39–62

    Article  Google Scholar 

  49. Smith CB (1997) Conduct control on usenet. J Comput Mediat Commun 2(4)

  50. Weilenmann A, Larsson C (2001) Local use and sharing of mobile phones. In: Brown B, Green N, Harper R (eds) Wireless world: social, cultural and interactional aspects of wireless technology. Springer, London, pp 99–115

    Google Scholar 

  51. The European Commission (1995) Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J Eur Commun (L 281):31–50

  52. IETF Secretariat (2005) SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE), online http://www.ietf.org/html.charters/simple-charter.html, referenced May 2005

  53. Saint-Andre P (ed) (2004) IETF. RFC 3920. Extensible messaging and presence protocol (XMPP): Core, October

  54. Peterson J (2004) A presence architecture for the distribution of GEOPRIV Location Objects

  55. Saint-Andre P (ed) (2004) IETF. RFC 3921. Extensible messaging and presence protocol (XMPP): instant messaging and presence

  56. Symbian Ltd (2006) How has Symbian Signed evolved with Symbian OS v9? online, https://www.symbiansigned.com/How_has_Symbian_Signed_evolved_with_Symbian_OS_v9.pdf, referenced June 2006

  57. Schneier B (1995) Applied cryptography, 2nd edn. Wiley, London

    Google Scholar 

  58. Burkholder P (2002) SSL Man-in-the-Middle Attacks. Technical report, February 2002. online, http://www.sans.org/rr/whitepapers/threats/480.php, referenced Jun 2006

  59. Tang JC, Yankelovich N, Begole J, Van Kleek M, Li F, Bhalodia J (2001) ConNexus to awarenex: extending awareness to mobile users. In: CHI ‘01: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, New York, pp 221–228

  60. Holmquist LE, Falk J, Wigström J (1999) Supporting group collaboration with interpersonal awareness devices. Pers Technol 3(1–2):13–21

    Article  Google Scholar 

  61. Marmasse N, Schmandt C, Spectre D (2004) WatchMe: Communication and Awareness Between Members of a Closely-Knit Group. In: Davies N, Mynatt E, Siio I (eds) UbiComp 2004: Ubiquitous Computing: 6th International Conference Nottingham, UK, September 7–10, 2004 Proceedings, vol 3205. Springer, Berling, pp 214–231

  62. Burak A, Sharon T (2004) Usage patterns of FriendZone: mobile location-based community services. In: MUM ‘04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimedia. ACM Press, New York, pp 93–100

  63. Isaacs EA, Tang JC, Morris T (1996) Piazza: a desktop environment supporting impromptu and planned interactions. In: CSCW ‘96: Proceedings of the 1996 ACM conference on Computer supported cooperative work. ACM Press, New York, pp 315–324

  64. Davis M, Van House N, Towle J, King S, Ahern S, Burgener C, Perkel D, Finn M, Viswanathan V, Rothenberg M (2005) MMM2: mobile media metadata for media sharing. In: CHI ‘05: CHI ‘05 extended abstracts on Human factors in computing systems. ACM Press, New York, pp 1335–1338

  65. Counts S, Fellheimer E (2004) Supporting social presence through lightweight photo sharing on and off the desktop. In: CHI ‘04: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM Press, New York, pp 599–606

  66. Rantanen M, Oulasvirta A, Blom J, Tiitta S, Mäntylä M (2004) InfoRadar: Group and public messaging in mobile context. In: Proceedings of NordiCHI04’. ACM Press, New York, pp 131–140

  67. Persson P, Espinoza F, Fagerberg P, Sandin A, Cöster R (2003) GeoNotes: a location-based information system for public spaces. In: Designing information spaces: the social navigation approach. Springer, London, pp 151–173

Download references

Acknowledgments

This work has been funded by the Academy of Finland under the PROACT research programme, and by the Helsinki Graduate School in Computer Science and Engineering. We thank Antti Salovaara, Sakari Tamminen, Marko Turpeinen, Louise Barkhuus and Markus Bylund for commenting on drafts of the paper and Kliment Yanev for comments on the protocol design section.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mika Raento.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Raento, M., Oulasvirta, A. Designing for privacy and self-presentation in social awareness. Pers Ubiquit Comput 12, 527–542 (2008). https://doi.org/10.1007/s00779-008-0200-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-008-0200-9

Keywords

Navigation