ABSTRACT
With the rapid growth of personal computer networks and the Internet, sharing files has become a central activity in computer use. The ways in which users control the what, how, and with whom of sharing are dictated by the tools they use for sharing; there are a wide range of sharing practices, and hence a wide range of tools to support these practices. In practice, users' requirements for certain sharing features may dictate their choice of tool, even though the other affordances available through that tool may not be an ideal match to the desired manner of sharing.In this paper, we explore users' current practices in file sharing and examine the tools used to share files. Based on our findings, we unpack the features and affordances of these tools into a set of dimensions along which sharing tools can be characterized. Then, we present the set of user interface features we have prototyped in an interface called a sharing palette, which provides a platform for exploration and experimentation with new modalities of sharing. We briefly present the tool as a whole and then focus on the individual features of the sharing palette that support reported styles of sharing.
- Apple iTunes. http://www.apple.com/itunes, 2006.Google Scholar
- Bellotti, V., Ducheneaut, N., Howard, M.A., Smith, I.E. Taking email to task: The design and evaluation of a task management centered email tool. In Proc. of CHI 2003, ACM Press (2003), 345--352. Google ScholarDigital Library
- Bentley, R., Appelt, W., Busbach, U., Hinrichs, E., Kerr, D., Sikkel, K., Trevor, J. and Woetzel, G. Basic support for cooperative work on the World Wide Web. International Journal of Human Computer Studies, 46, 6 (June 1997), 827--846. Google ScholarDigital Library
- Brown, B., Sellen, A.J. & Geelhoed, E. Music sharing as a computer supported collaborative application. In Proc. of ECSCW 2001, Kluwer Academic Publishers (2001), 179--198. Google ScholarDigital Library
- Deolasee, P., Katkar, A., Panchbudhe, A., Ramamritham, K. & Shenoy, P. Adaptive Push-Pull: Disseminating dynamic web data. In Proc. of the International World Wide Web Conference, ACM Press (2001), 265--274. Google ScholarDigital Library
- Edwards, W.K., Newman, M.W., Sedivy, J.Z., Smith, T.F., Balfanz, D., Smetters, D.K., Wong, H.C., and Izadi, S. Using Speakeasy for ad hoc peer--to--peer collaboration. In Proc. of CSCW 2002, ACM Press (2002), 256--265. Google ScholarDigital Library
- Erickson, T. & Kellogg, W. Social Translucence: An approach to designing systems that mesh with social processes. ACM Transactions on Computer-Human Interaction, 7, 1 (2000), 59--83. Google ScholarDigital Library
- Flickr. http://www.flickr.com, 2006.Google Scholar
- Gnutella. http://www.gnutella.com, 2006.Google Scholar
- Good, N.S. and Krekelberg, A. Usability and privacy: A study of KaZaA P2P file sharing. In Proc. of CHI 2003, ACM Press (2003), 137--144. Google ScholarDigital Library
- Groove Virtual Office. http://www.groove.net, 2006.Google Scholar
- Lee, J. Technical and social components of peer--to--peer computing: An end-user perspective on file-sharing systems. Communications of the ACM, 46, 2 (February 2003), 49--53. Google ScholarDigital Library
- Leuf, B. and Cunningham, W. The Wiki Way: Quick collaboration on the Web. Addison-Wesley, Boston, MA, 2001. Google ScholarDigital Library
- KaZaA Media Desktop. http://www.kazaa.com, 2006.Google Scholar
- Napster. http://www.napster.com, 2006.Google Scholar
- Network File System. http://www.nfsv4.org, 2006.Google Scholar
- Norman, D.A. The Design of Everyday Things. Basic Books, New York, 1988.Google Scholar
- Olson, J.S., Grudin, J. and Horvitz, E. Toward understanding preferences for sharing and privacy. In Extended Abstracts of CHI 2005, ACM Press (2005), 1985--1988. Google ScholarDigital Library
- Rodden, T. Populating the application: A model of awareness for cooperative applications. In Proc. of CSCW 1996, ACM Press (1996), 87--96. Google ScholarDigital Library
- Shen, H. and Dewan, P. Access control for collaborative environments. In Proc. of CSCW 1992, ACM Press (2002), 51--58. Google ScholarDigital Library
- Sikkel, K. A group-based authorization model for cooperative systems. In Proc. of ECSCW 1997, Kluwer Academic Publishers (1997), 345--360. Google ScholarDigital Library
- Smetters, D.K. and Grinter, R.E. Moving from the design of usable security technology to the design of useful secure applications. In Proc. of ACM New Security Paradigms Workshop, ACM Press (2002). Google ScholarDigital Library
- Voida, A., Grinter, R.E., Ducheneaut, N., Edwards, W.K. and Newman, M.W. Listening in: Practices surrounding iTunes music sharing. In Proc. of CHI 2005, ACM Press (2005), 191--200. Google ScholarDigital Library
- Voida, S., Edwards, W.K. & Newman, M.W. The Sharing Palette: A user interface for file and service sharing. Poster presented at UIST '04, Santa Fe, New Mexico, October 24--27, 2004.Google Scholar
- Yee, K. User interaction design for secure systems. In Proc. of the 4th International Conference on Information and Communications Security, Springer-Verlag (2002), 278--290. Google ScholarDigital Library
Index Terms
- Share and share alike: exploring the user interface affordances of file sharing
Recommendations
Ideal Secret Sharing Schemes with Share Selectability
Information and Communications SecurityAbstractIn this paper, we investigate a new concept, called share selectable secret sharing, where no unauthorized set can obtain information of the secret (in the information-theoretic sense) even if shares are selectable as arbitrary values which are ...
The Size of a Share Must Be Large
A secret sharing scheme permits a secret to be shared among participants of an n -element group in such a way that only qualified subsets of participants can recover the secret. If any nonqualified subset has absolutely no information on the secret, ...
Image Secret Sharing Construction for General Access Structure with Meaningful Share
This article describes how the (k, n) threshold image secret sharing technology can recover the secret image even n − k shares are lost, or n−k servers do not work, which is useful for cloud storage, etc. Image secret sharing for general access ...
Comments