The Community for Technology Leaders
RSS Icon
Issue No.04 - October-December (2007 vol.6)
pp: 56-63
Gillian R. Hayes , Georgia Institute of Technology
Erika Shehan Poole , Georgia Institute of Technology
Giovanni Iachello , Georgia Institute of Technology
Shwetak N. Patel , Georgia Institute of Technology
Andrea Grimes , Georgia Institute of Technology
Gregory D. Abowd , Georgia Institute of Technology
Khai N. Truong , Georgia Institute of Technology
BufferWare is a selective archiving application for recording everyday experiences in an informal space. An evaluation of the system's deployment, combined with analysis of existing research on recording technologies and security and privacy, demonstrates that people use three types of knowledge to determine new technologies' relative utility and safety. <it>Physical knowledge</it> includes design elements that inform people about the technology and how to use it. <it>Social knowledge</it> includes a community's embedded knowledge. <it>Experiential knowledge</it> includes users' past interactions with similar technologies and new technologies. This article is part of a special issue on security and privacy.
capture and access, selective archiving, record-keeping, security, privacy, trust
Gillian R. Hayes, Erika Shehan Poole, Giovanni Iachello, Shwetak N. Patel, Andrea Grimes, Gregory D. Abowd, Khai N. Truong, "Physical, Social, and Experiential Knowledge in Pervasive Computing Environments", IEEE Pervasive Computing, vol.6, no. 4, pp. 56-63, October-December 2007, doi:10.1109/MPRV.2007.82
1. D.A. Norman, The Design of Everyday Things, Doubleday, 1990.
2. G. Jancke et al., "Linking Public Spaces: Technical and Social Issues," Proc. 2001 SIGCHIConf. Human Factors in Computing Systems (CHI 01), ACM Press, 2001, pp. 530–537.
3. D.H. Nguyen and E.D. Mynatt, Privacy Mirrors: Understanding and Shaping Sociotechnical Ubiquitous Computing Systems, tech. report GIT-GVU-02-16, Georgia Inst. of Technology, June 2002.
4. T. Erickson and W. Kellogg, "Social Translucence: An Approach to Designing Systems that Mesh with Social Processes," Trans. Computer-Human Interaction, vol. 7, no. 1, 2000, pp 59–83.
5. G. Iachello and J. Hong, "End-User Privacy in Human-Computer Interaction," Foundations and Trends in Human-Computer Interaction, vol. 1, no. 1, 2007, pp. 1–137.
6. S. Lahlou, "Living in a Goldfish Bowl: Lessons Learned about Privacy Issues in a Privacy-Challenged Environment," Proc. Privacy Workshop at Ubicomp Conf., 2005, Ubicomp2005/papers2-Lahlou.pdf.
7. D. Povey, "Optimistic Security: A New Access Control Paradigm," Proc. New Security Paradigms Workshop, ACM Press, 1999, pp. 40–45.
8. G. Iachello et al., "Prototyping and Sampling Experience to Evaluate Ubiquitous Computing Privacy in the Real World," Proc. 2006 SIGCHIConf. Human Factors in Computing Systems (CHI 06), ACM Press, 2006, pp. 1009–1018.
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool