ABSTRACT
A significant problem with telephone communication is that callers do not have enough awareness about the Personal Presence of people they want to call. The result can be unwanted, interrupting calls. Thelive addressbookis an application that helps users make more informed telephone calls and teleconferences, from anywhere, via their wireless PDA or desktop browser. Unlike other network-based address books, which maintain static information, the live addressbook can display dynamic information about where the recipient currently is (i.e., reach number), and how available he/she currently is for calls. The system accomplishes this by applying to telephony the "Buddy List" concepts made popular in Instant Messaging applications. User trials assess the applicability of Personal Presence information in a telephone context.
- 1.Ack rman,M.S.,Hindus,D.,Mainwaring,S.D.,& Starr,B.Hanging on th Wir :A Fi ld Study of an Audio-Only Media Space.ACM Transactions on Computer-Human Interaction,vol.4 (1997),39-66. Google ScholarDigital Library
- 2.Bennett,R.W.and Kling r,J.G.T l phony Interfaces derived from user 's conceptual models. Proceedings of the AT&T Behavioral Sciences Days (1990),45-49.Google Scholar
- 3.Bly,S.A.,Harrison,S.R.,&Irwin,S.Media Spaces:Bringing P ople Tog ther in a Video, Audio,and Computing Environment. Communications of the ACM ,35(1),1993.28-46. Google ScholarDigital Library
- 4.Broll,W.,Grather,W.,Meir,E.,Pankok -Babatz, U.and Prinz,W.Place people in context-th awareness forum.Proceedings of Meetings of the Human-Computer Interface International (1999), 462-471. Google ScholarDigital Library
- 5.Clark,H.Using Language .Cambridg University Press,1996.Google Scholar
- 6.Erickson,T.Smith,D.N.,Kellogg,W.A.,Laff,M., Richards,J.T.and Bradner,E.Socially Translucent Systems:Social Proxies,P rsistent Conv rsation and the Design of "Babble."Proceedings of the CHI99 Conference on Human Factors in Computing Systems ,ACM Press (1999),72-79. Google ScholarDigital Library
- 7.Greenberg,S.Peepholes:Low Cost Awareness of One 's Community.Conference Companion of the CHI '91 Conference on Human Factors in Computing Systems ,ACM Press (1991),206-207. Google ScholarDigital Library
- 8.Grudin,J.,.Groupware and Social Dynamics:eight chall nges for d velop rs.Communications of the ACM (1994),92-105. Google ScholarDigital Library
- 9.Gutwin,C.&Greenberg,S.Workspace Awareness for Groupware.Proceedings of the CHI '96 Conference on Human Factors in Computing Systems ,.ACM Press (1996),208-209. Google ScholarDigital Library
- 11.Hudson,S.E.,and Smith,I.Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems. Proceedings of Computer Supported Cooperative Work '96 ,ACM Press (1996),248-257. Google ScholarDigital Library
- 12.Karsenty,A.Easing interaction through groupawareness.Proceedings of the International User Interaction (1997),225-228. Google ScholarDigital Library
- 13.Lee,A.,Girgensohn,A.&Schlueter,K.NYNEX Portholes:Initial User Reactions and Redesign Implications.Group'97 Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work ,ACM Press (1997),385-393. Google ScholarDigital Library
- 14.Millen,D.,Milewski,A.,Smith,T.,W imer,D., W llner,P.Th Corner Office:An Exploration of an Informal T leconferencing Service.Proceedings of 17th International Symposium on Human Factors in Telecommunications ,Cop nhagen,D nmark,May 4-7,1999,103-112.Google Scholar
- 15.Nardi,B.,Whittaker,S.&Bradner,E.Interaction and Outeraction:Instant Messaging in Action. Proceedings of Computer Supported Cooperative Work 2000,ACM Press (2000). Google ScholarDigital Library
- 16.Suchman,L.Plans and Situated Actions:The problem of human-machin communication. Cambridge University Press,1987. Google ScholarDigital Library
Index Terms
- Providing presence cues to telephone users
Recommendations
Location-based assisted handover for the IP Multimedia Subsystem
The IP Multimedia Subsystem (IMS) is one promising candidate for merging currently deployed circuit-switched and packet-switched voice and data networks into a service-based All-IP architecture. One requirement common to all of these Next Generation ...
Users really do answer telephone scams
SEC'19: Proceedings of the 28th USENIX Conference on Security SymposiumAs telephone scams become increasingly prevalent, it is crucial to understand what causes recipients to fall victim to these scams. Armed with this knowledge, effective countermeasures can be developed to challenge the key foundations of successful ...
Status Update on Phishing Emails Awareness: Jordanian Case
ICEMIS'21: The 7th International Conference on Engineering & MIS 2021Abstract—This study is a response to the rapid proliferation of high-risk phishing emails, representing one of the most dangerous cybercrimes and the primary medium for the deception of online users. This study aims to investigate the various ...
Comments