Timespace in the workplace: dealing with interruptions
CHI '95 Conference Companion on Human Factors in Computing Systems
The effects of task interruption and information presentation on individual decision making
ICIS '97 Proceedings of the eighteenth international conference on Information systems
Providing presence cues to telephone users
CSCW '00 Proceedings of the 2000 ACM conference on Computer supported cooperative work
Quiet calls: talking silently on mobile phones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ConNexus to awarenex: extending awareness to mobile users
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Context-Aware Telephony Over WAP
Personal and Ubiquitous Computing
Calls.calm: enabling caller and callee to collaborate
CHI '01 Extended Abstracts on Human Factors in Computing Systems
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Using the Experience Sampling Method to Evaluate Ubicomp Applications
IEEE Pervasive Computing
SenSay: A Context-Aware Mobile Phone
ISWC '03 Proceedings of the 7th IEEE International Symposium on Wearable Computers
ISWC '04 Proceedings of the Eighth International Symposium on Wearable Computers
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who gets to know what when: configuring privacy permissions in an awareness application
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Predicting human interruptibility with sensors
ACM Transactions on Computer-Human Interaction (TOCHI)
Social Serendipity: Mobilizing Social Software
IEEE Pervasive Computing
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Behaviour & Information Technology
Improving cell phone awareness by using calendar information
INTERACT'05 Proceedings of the 2005 IFIP TC13 international conference on Human-Computer Interaction
GI '07 Proceedings of Graphics Interface 2007
From awareness to repartee: sharing location within social groups
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Finding a balance: social support v. privacy during weight-management
CHI '08 Extended Abstracts on Human Factors in Computing Systems
Xensible interruptions from your mobile phone
Proceedings of the 9th international conference on Human computer interaction with mobile devices and services
Nuisance level of a voice call
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Busy families' awareness needs
International Journal of Human-Computer Studies
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Capturing Social Networking Privacy Preferences
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
International Journal of Human-Computer Studies
From spaces to places: emerging contexts in mobile privacy
Proceedings of the 11th international conference on Ubiquitous computing
Context information exchange and sharing in a peer-to-peer community: a video annotation scenario
Proceedings of the 27th ACM international conference on Design of communication
Opportunistic sensing: security challenges for the new paradigm
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Find me if you can: improving geographical prediction with social and spatial proximity
Proceedings of the 19th international conference on World wide web
Do i do what i say?: observed versus stated privacy preferences
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction
Mobile phone-to-phone personal context sharing
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Hide and seek: location sharing practices with social media
Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
A context information structure using peer-to-peer networks with the TV users
WebMedia '09 Proceedings of the XV Brazilian Symposium on Multimedia and the Web
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Who's your best friend?: targeted privacy attacks In location-sharing social networks
Proceedings of the 13th international conference on Ubiquitous computing
Empowerment through seamfulness: smart phones in everyday life
Personal and Ubiquitous Computing
Super-Ego: a framework for privacy-sensitive bounded context-awareness
CASEMANS '11 Proceedings of the 5th ACM International Workshop on Context-Awareness for Self-Managing Systems
Improving users' consistency when recalling location sharing preferences
INTERACT'11 Proceedings of the 13th IFIP TC 13 international conference on Human-computer interaction - Volume Part I
Contextcapture: exploring the usage of context-based awareness cues in informal information sharing
Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments
Undistracted driving: a mobile phone that doesn't distract
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
SCIMS: a social context information management system for socially-aware applications
CAiSE'12 Proceedings of the 24th international conference on Advanced Information Systems Engineering
Guided Sampling Using Mobile Electronic Diaries
International Journal of Mobile Human Computer Interaction
When privacy and utility are in harmony: towards better design of presence technologies
Personal and Ubiquitous Computing
Fusing Text and Frienships for Location Inference in Online Social Networks
WI-IAT '12 Proceedings of the The 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Utilizing contextual information for mobile communication
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Exploring user expectations for context and road video sharing while calling and driving
Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications
Dimensionality of information disclosure behavior
International Journal of Human-Computer Studies
Crowdsourcing privacy preferences in context-aware applications
Personal and Ubiquitous Computing
Hi-index | 0.00 |
The proliferation of cell phones has led to an ever increasing number of inappropriate interruptions. Context-aware telephony applications, in which callers are provided with context information about the receivers, has been proposed as a solution for this problem. This approach, however, raises many privacy issues that may render it infeasible. In this paper, we report on an in-situ study of user privacy preferences and patterns of sharing different types of context information with different social relations. We found that participants disclosed their context information generously, suggesting that context-aware telephony is not only feasible, but also desirable. Our data shows a distinct sharing pattern across social relations and different types of context information. We discuss the implications of the results for designers of context-aware telephony in particular and context-aware applications in general.