Date post: | 21-Mar-2023 |
Category: |
Documents |
Upload: | independent |
View: | 0 times |
Download: | 0 times |
Probing Technology with Technology Probes *
* © The authors, 2004. This is the Andy Crabtree’s version of the work. It is posted here for your personal use. Not for
redistribution. The definitive version was presented at the Equator Workshop on Record and Replay Technologies, February
12-13, London: EPSRC.
Dan Fitton, Keith Cheverst, Mark Rouncefield,
Alan Dix Lancaster University
Lancaster, UK
LA1 4YR +44 (0)1524 594532
{d.fitton,k.cheverst, a.dix, m.rouncefield}@ lancaster.ac.uk
Andy Crabtree
University of Nottingham Nottingham, UK
NG8 1BB
+44 (0)115 846 6512
1. INTRODUCTION: INVESTIGATING
TEXTING In ‘Smart Mobs’ Howard Rheingold [22] makes dramatic claims
about the social and political impact of texting, drawing particular
attention to the emergence of ‘thumb tribes’ and ‘generation txt’
and the potential impact of texting on practices as diverse as
teenage mating rituals and demonstrations. Like Rheingold we are
equally interested in one of the most surprising phenomena to have
occurred within the field of mobile computing within recent years -
the uptake of SMS (or Short Message Service) text messaging.
According to the Mobile Data Association [18], the total number of
chargeable person-to-person SMS text messages sent across the
main four UK GSM network operators between 31st December
2003 and 1st January 2004, was 111 million, an 8% increase
compared to figures over the same period the previous year
(http://www.text.it/mediacentre), and new uses of SMS messaging
are emerging in conjunction with interactive TV services, for
example. Unlike Rheingold we are rather reluctant to speculate
wildly on what exactly this development might amount to or mean.
There are, of course, various well-known problems involved in
interpreting statistical data [3] [2], along with associated issues
concerning what data is appropriate and how it might be collected
[17]. In this paper we wish to consider some of the technical
difficulties involved in data collection.
Our studies are particularly concerned to understand a use of SMS
texting that has received little investigation to date, largely due to
its novel character. The topic we have in mind is the use of texting
as a means of enabling people to send messages to displays
situated in the fabric of a setting rather than to another mobile
device owned by a particular individual. Such a facility has clear
potential in cooperative work settings where the need to distribute
awareness amongst members [9] means that messaging to a place
may be more appropriate than messaging directly to a particular
individual. The potential utility of ‘situated displays’ is articulated
by O’Hara et al. [20] -
In recent years, more and more information is being
presented on dedicated digital displays situated at
particular locations within our environment. At their most
basic, digital display technologies allow information to be
more easily updated dynamically and remotely. However,
these new kinds of interaction technologies also allow
people to use these situated displays in novel ways both as
for the individual’s purposes and in the support of group
work.
O’Hara et al.[20] draw particular attention to the potential for
texting to and updating situated displays remotely, and it is this
functionality and how we might measure and assess it that forms
the focus of this paper.
2. TEXTING TECHNOLOGIES: HERMES
AND SPAM In this paper we describe two applications. Hermes
([4],[5],[6],[11]), which was deployed in a university, and SPAM
[8], which was deployed in a residential care setting. Both of these
applications enable users to text to and update situated displays
remotely. The Hermes system enables users to interact remotely
with office door displays via their mobile phone using SMS. The
SPAM messaging system evolved from our experiences with
Hermes and also enables users to remotely update situated displays
(using SMS) in order to facilitate coordination and cooperation
with remote work colleagues. In texting to situated displays users
of the Hermes and SPAM systems may make available to others
their location, plans, and activities, and thereby draw upon and
reflect social aspects of everyday life that are essential to
collaboration and coordination. Another way of thinking about the
Hermes and SPAM technology is in terms of ‘affordances’ [1] and
the notion that we can treat technology as affording knowledge and
as having been designed with this possibility in mind. Here our
interest is in how the different features of the assembled systems
are constructed so as to ‘afford knowledge’ to, for example, the
working division of labour through the reflexive articulation of
which the various workaday activities in a setting are coordinated
and performed [24]. Accordingly, texts (to both Hermes and
SPAM) become both the focus of work and a visible record of
work that has been done, put on hold, remains to be done, and so
on. By embedding messages in the fabric of the workplace, by
putting the work on display so that others may be aware of it, these
textual representations make everyday work ‘visible’ so that it can
be ‘taken note of’, ‘reviewed’, ‘queried’ and in other ways be made
accountable by and for others involved in the work.
2.1 Hermes and SPAM: Overview and
Requirements This section provides some technical details of the Hermes and
SPAM systems. The Hermes system supports remote interaction by
allowing messages to be created and read via the web or a mobile
phone. We hoped that by supporting remote interaction and
observing how the new system was used over a significant period
of time we would gain some useful insights into the relative
importance and interaction of ‘place’ ‘space’ and ‘text’ within this
application domain. For example, what kinds of messages would
members of university staff post on their door when texting remotely?
The Hermes system comprises a central server and a number of
wall or door mountable units (referred to as Hermes displays). At
present we have 10 units deployed on one floor of the Computing
Department at Lancaster University. Our intention was for Hermes
displays to have the ease of use and dependability associated with
an information appliance - i.e., to perform a small number of tasks
simply and well. The system provides the owner of the Hermes
display with two key functions:
1) The ability to create a message to appear on the display.
2) The ability to read messages left by visitors.
Typically, the owner will create a message to appear on their
Hermes display by entering some appropriate text using the web
interface (Figure 1.) The web interface can also be used to upload a
graphical image for display, such as an animated GIF.
The overall system architecture of the Hermes system is illustrated
in Figure 2. In this figure, the yellow oval represents the typical
entities associated with a given user. At the heart of the system is a
single central server application written in Java that runs on the
Linux platform and provides the following key functions:
1) Centralized storage for messages and user profile
information.
2) Communication with the SMS Gateway.
3) Hosting of the web portal.
Figure 1. The Hermes Web Interface [5]
The system utilizes both wireless (802.11b) and wired Ethernet
network infrastructures. In order to support the reception of SMS
messages, the central server communicates with a Wavecom DB02
GSM terminal. The web portal is implemented using Java Servlets
and this enables the dynamical generation and publication of html
web pages. The Hermes displays themselves use the CrEme Java
virtual machine, and run the PocketPC operating system.
Figure 2. The System Architecture of Hermes [5]
The SPAM system has been developed to support cooperation
between staff working at two associated sites located in Carlisle, a
small city in the North of England. The requirements for SPAM
were obtained through ethnographic study, informational probes
[7] and design workshops with the staff. The overall response to
the idea of a messaging system was extremely positive. In
particular, such a system was viewed as another, alternative, tool
for communication capable of supporting staff in their everyday
work and interaction with residents. This then became the rationale
for the construction, testing and deployment of the SPAM system.
Figure 3. One of the SPAM Displays
The SPAM system has been designed to run an SMS messaging
application, allowing staff from the hostel office to communicate
easily with staff from the semi-independent living accommodation
office (and vice-versa) by composing messages using an on screen
keyboard displayed on a touch sensitive screen (Figure 3). When
messages are received by a SPAM unit they are displayed on the
screen until deleted by a member of staff. Staff can also use their
own mobile phones in order to send text messages to the SPAM
displays when they are out of the office and to receive messages
originating from a SPAM display.
The overall design of the system architecture is shown in Figure 4.
This highlights the way in which SMS messages sent via mobile
phones and by the SPAM units themselves are handled by the
system.
Figure 4. Architecture of the SPAM system
The typical use scenario is illustrated by SMS Message 1 - i.e., the
message originating from a mobile phone is successfully delivered
to the permanently staffed hostel (Location B) and the transmission
of a ‘message read’ acknowledgement is triggered by a member of
staff reading the message. Message forwarding is performed by the
system if a message is sent to the semi-independent living
accommodation (Location A) at a time when no member of staff is
providing cover (denoted by AWAY STATE). In this case, the
message (Message 2) is automatically forwarded to the display of
the hostel with 24-hour cover. The two SPAM displays were
deployed in the two offices in October 2002. Since that time the
units have been used on a daily basis.
3. TECHNOLOGY PROBES: GETTING
DATA FROM HERMES AND SPAM In a number of papers ([7],[8]) we have outlined a range of factors
that conspire to render our usual ethnographic data collection
techniques inappropriate and how we have sought to supplement
our understanding of the care setting ‘from within’ by adapting
Cultural Probes. Cultural Probes [13] have achieved some
prominence in interactive systems design, where they have been
employed to inspire design as computing moves out of the
workplace and into everyday life more generally. In contrast, we
have elected to adapt Cultural Probes through the incorporation of
social science research methods to gather data about participants’
daily lives. Our Informational Probes have been employed to
sensitise parties involved in design to the local cultures within
which new technology will be embedded and to elaborate the needs
of users. As SPAM and Hermes have been put to use in their
respective settings we have found that the technology also acts as a
probe – i.e., as a means of gathering data. The text logs generated
through the technology’s employment provide us with a
complementary source of information, which may be used to
measure and assess the functional value of our systems from the
point of view of day-to-day use.
3.1 Technology Probes The notion of Technology Probes has recently been employed in
the Interliving Project [15]. In this context Technology Probes are
adaptations of Cultural Probes that seek to embed inspiration
within the design process, in contrast to providing inspiration for
design. Hutchinson et al’s Technology Probes situate existing
technologies in real homes rather than ‘lab houses’ in order to
inspire design by exposing inhabitants to new experiences. While
there is merit and value to this approach, this is not what we mean
when we invoke the notion of a Technology Probe. Our take on
Technology Probes is different and perhaps simpler, involving the
embedding of a logging system into the technology itself.
3.2 Logging Hermes and SPAM Usage Both Hermes and SPAM perform their logging functions by
appending messages to a text file, though the source of these
messages differs between the two systems due to their design and
implementation.
In Hermes we log many aspects of the system ranging from user
interfaces actions to messages sent to the system via SMS. Due to
the multitude of devices generating messages to log, we provide a
central logging agent accessible over a network.
The SPAM application runs on a stand-alone miniature PC and all
messages to log are generated by the SPAM main application. The
GSM terminal is interfaced though a Java class sending and
parsing AT commands (a separate piece of 3rd
party software is
used in Hermes), so much more debugging information about
communication with the GSM terminal is available. This enables
all information sent to and from the GSM terminal to be logged.
In the Hermes project the emphasis has been on logging the user
interactions which occur, as we provide many different
mechanisms for interactions. While with SPAM there are fewer
mechanisms for interactions, consequently we concentrate on
logging the messages sent and received.
3.3 Examples of Raw Log Data Figure 8a shows a sample of the log file entries generated by the
SPAM system for a message sent to Location A from Location B,
figure 8b shows a sample of the log entries generated at Location A
when this message arrives. This is a mixture of debug output from
communication with the GSM terminal, and ‘higher-level’
messages indicating that a message has been sent, received etc.
Figure 9 shows a sample from the Hermes log. This logs stores
user interface actions from the Hermes doorplate appliances, along
with information about the appliance from which the message
originated and a timestamp. The log also explicitly stores messages
about other actions which occur such as messages sent and users
logging in/out.
Figure 8a: Log of message sent from Loc. B to Loc. A
Figure 8b: Log showing message received at Loc. A
Figure 9 – A sample from the Hermes log
3.4 Working with Logs: Technical Issues One of the initial technical issues encountered was that of what
information to log, as it is difficult to predict which information
may be useful in the future. It is sometimes obvious from the outset
which information will give the best clues about use (etc), though it
may not be apparent until thorough analysis of the logs what
additional information it would have been useful to collect. When
collecting information there are usually limits on the amount that
can be collected, so a balance is necessary between what is
essential and what is possible to store. For example, for the Hermes
doorplate appliances most user interface actions are logged, but the
pen movements (i.e. a user drawing a note) are not, as this would
require large amounts of network bandwidth between the appliance
and the logging agent, and place a high processing load on both
devices. The doorplate appliance would definitely not be able to
cope with the additional load and the ‘leaving a note’ process
would be so un-responsive it would be unusable. However, in
general our policy is a prudent one, i.e. to collect more information
than may at first appear necessary.
The safe storage of the logs is another important technical issue
which needs to be addressed. Initially all the logs were stored on
single computers, but (typically!) we experienced hard disk failure
with both the Hermes and SPAM systems. Our initial solution had
been to make backups of the logs as regularity as possible and
replicate these across many machines. The opportunity to backup
logs also provides a good point to start a new log file, we do this as
our logs file tend to reach several hundred megabytes in size which
can introduce problems for analysis. As the Hermes system is
located inside the computing department we are in the process of
altering the logging system to store an additional copy of the log
file on a departmental fileserver, which is regularly backed up.
However this approach cannot be used for the SPAM system, as
the two end units are located geographically far from the university
(approximately 90 miles) and currently have no (reasonable
bandwidth) connectivity with the university. Obviously this factor
means that collection of the logs is difficult. The SPAM units are
also very compact machines, making it very difficult to add
additional redundant storage, e.g. extra hard drives etc.
Reliability of the logging functions can also be a problematic issue.
This is especially true of Hermes where the logging is done by a
separate agent. If the Logging Agent stops functioning or crashes
there is currently no easy way to detect that this has occurred. This
is a scenario we have already encountered and are working on
implementing a ‘watcher’ to monitor the Logging Agent.
Furthermore, we do not have an active feedback mechanism to
monitor free disk space available for the logs or any other problems
which may occur while attempting to write to a file. The
aforementioned problems must be solved to increase the
dependability of the logging function. Furthermore, clearly when
either system is not running then no information will be logged.
Both Hermes and SPAM systems have suffered unscheduled
‘downtime’.
3.5 Experiences Analysing Log data To date, we have done a preliminary analysis of 300 messages set
by the owners of Hermes displays over a continuous period of
approximately five months. The goal of this analysis was to obtain
a rough approximation of the proportion of messages which shared
personal context in some way, and the breakdown of these
messages in terms of their containing location, activity or temporal
information. For example, through analysis we found that 250 (83
%) contained some aspect of sharing context [5], the breakdown of
these messages is shown in figure 10.
8
location6
29
1812
5 5
activity
temporal
Figure 10: Analysis of Hermes messages according to the
categories of shared context [5]
In order to obtain this statistical breakdown from the Hermes logs
several phases of parsing and analysis were required. It was first
necessary to extract all the parts of the log concerned with users
setting messages on their doorplates (this was achieved using the
standard Unix ‘grep’ command). A program was then written to
parse the remaining parts of the log, separating the entries and
formatting the text. The fourth phase was then to perform a search
to replace the user identifiers used by the system with users full
names. The fifth phase was to go through each entry by hand
looking at the message and categorising (using tags) its context. A
sample from the log including tags is shown in figure 11. The final
phase was to write a program to analyse the context each message
was tagged with and produce the statistics, which could then be
used to generate figure 10.
Figure 11: Part of the Hermes Message Log including Context
Tags [5]
Clearly the analysis of logs such as those produced by Hermes can
be a difficult and time consuming process. Performing the analysis
in phases is useful as the information generated at each phase can
be used for different types of analysis and to look at different
factors.
The manual tagging of entries was an unfortunate but necessary
step which required a large degree of human judgement. In more
detail, some messages required careful consideration to decide
what types of context they actually shared. For example, the
message: 'At CSCW'02 back Monday 25th Nov' has been
categorized as containing activity + location + temporal but it
could be argued that the message only contains temporal and
location attributes.
When we attempted to analyse the SPAM logs to look at the
dialogue taking place we found this to be an unexpected challenge.
After attempting various means to parse the logs in different ways,
programs were written to extract messages sent and received from
the SPAM logs and place them in separate text files, separating and
formatting the entries. An example of the results from this process
for Location A’s log file can be seen in figures 12a and 12b, this
sample includes the messages which can be seen in figures 8a and
8b. It is interesting to note that we only have to look at the log file
at one of the locations (in this case Location A) to see all the
messages sent between the two.
Figure 12a: Messages Received at Location A
Figure 12b Messages Sent by Location A
Initially it was very hard to follow the chronological order of
dialogues using two separate files for messages sent and received,
so the analysis program was modified to output to a single file.
Unfortunately we found that only the time and date of messages
received had been logged, not the time and date that messages were
sent. The SPAM system does provide an acknowledgement reply
SMS message when a message has been read, this means that
usually the next entry in the log gives a good approximation of
when the previous message has been sent. This is obviously not
ideal, and makes analysis of the logs more difficult, as the
acknowledgement messages entries in the logs tend to make it
harder to see the actual messages being sent and received (and
should ideally be filtered out). Our solution to this problems has
again been to modify the analysis program to make the
acknowledgement entries much smaller (so they only take up a
single line), and to highlight by hand the messages sent and
received using different coloured marker pens. Additionally we
performed a search and replace to add names to known mobile
phone numbers. The final result can be seem in figure 13 where
messages received are highlighted in green and messages sent in
yellow, this makes it much easier to see dialogue taking place than
in figures 12a and 12b.
Figure 13: Manually amalgamated (and annotated) log file
showing dialogue between SPAM units at Loc. A (Durran Hill)
and Loc. B (Botcherby)
3.6 Future Work We hope to further analyse the SPAM logs, using a similar
approach as with Hermes, to tag and analyse messages sent (e.g.
one category might be a request to switch communication
mediums) and dialogues taking place. This will help us to explore
how the SPAM systems is actually being used; and how this use
has changed over time and whether or not the types of usage follow
regular patterns.
It is crucial that we strive for an overall improvement in the
dependability and flexibility of our logging systems. To this end,
we plan to investigate the approaches adopted by other systems
(e.g. safety critical control systems) for managing the production of
log files, and this should reveal some useful insights into how we
might improve the reliability of our logging processes, e.g. through
the use of monitoring and notification mechanisms.
3.7 Human Troubles Involved in Getting the
Data One of the key issues with both texting systems, and particularly
the ability to collect any worthwhile data from them, is the need for
users to have a strong trust in the reliability of the system - i.e., a
strong belief that any SMS text message that they send to a situated
display will (indeed) appear on the situated display and remain
there for an appropriate period of time. In the absence of such
dependability any interpretation of the data from the technology
probes is, at best, problematic. In the case of Hermes this means
messages staying there until removed or replaced by another
message while in the case of SPAM it means staying visible until
deleted by a member of staff. Of course, in order to encourage
users to trust the system, they need to see the system functioning
correctly over a protracted period of time - i.e., months rather than
minutes. We have found achieving this kind of dependability
difficult, especially for the Hermes system. The ideal situation
would be to develop a system in which all components work
faultlessly or at least have an extremely long mean-time to failure
(MTF). However, such a situation is indeed ideal. For example,
SMS messages are not always delivered in a timely way by a given
GSM service provider (especially where a message requires
routing between different service providers). It has been interesting
to observe how some users have developed coping strategies to
deal with early reliability problems. For example, on one occasion,
a user’s Hermes display did not update properly so that for a week
while he was away his door displayed “I am in! Alan”. Now he
always includes with such messages an explicit date, e.g. “Alan in
all day today, Thurs 13th”. In this case because Alan possesses a
good ‘mental model’ of the Hermes system he was able to adapt
his behaviour through a subtle change in message composition to
overcome the potential problem caused by a Hermes update failure
[4]. Providing users with appropriate feedback is of paramount
importance when supporting such interaction and is one means for
tackling the complex dependability requirements inherent in
systems such as Hermes and SPAM - the quantum leap in difficulty
of building and deploying systems that need to be operational on a
constant basis. Crucially, we believe that it is important to deploy
such systems in the long term. This is necessary in order for users
to have sufficient time to domesticate the technology by adapting it
to particular features of the domain and/or to develop new forms of
use (‘innofusion’ in [12]).
4. UNDERSTANDING USER EXPERIENCE
WITH HERMES AND SPAM This section presents some reflections on the data we have
obtained from the ‘technology probes’ in the Hermes and SPAM
systems. Despite the difficulties of extracting coherent data from
the probes we believe that some interesting and important material
has been produced. Our emphasis has been on studying technology
in use, reflecting a longstanding tradition if not research orthodoxy
in the field of Computer Supported Cooperative Work
([14],[21],[10]). Our interest is in understanding the data on texting
as ‘everyday occurrences’, as constituent features of ordinary
workaday activities. The point of this is, as the late Harvey Sacks
might say, is to examine the data to see what details it provides of
how the technology is ‘made at home’ in the settings it inhabits and
how it comes to fit into and resonate with a domain of practical
action ‘that has whatever organization it already has’ [23]. Our
concern, then, is with how this technology finds a place within the
day-to-day work of a setting and is responsive to the ‘working
sensibility’ of those under study. This interest and the kind of data
collection it requires is, perhaps, remote from the kinds of general
reflections that someone in an occupation (e.g., a university
lecturer or care worker) can produce, and much more attuned to
their consciousness and attention when they are actually engaged
in their work. In particular we are interested in the use of texting in
the exercise and development of users working sensibility and
especially how and in what circumstances they react to or decide to
initiate text messaging. The development, deployment and
evaluation of the Hermes and SPAM systems have revealed a
number of interesting issues in this regard.
Having installed the text messaging equipment, ensured it
functioned adequately, and demonstrated it to users, the systems
have now been in constant use for over a year. Without necessarily
subscribing to the fetishization of quantitative data, our analysis to
date has been hampered by an inability to easily compile statistical
data on usage and so our analysis has largely been based on a time-
consuming manual examination of the logs. Manual examination of
the logs suggests that current usage seems focused on:
Awareness (e.g., “Has fax, email got through? Has X left yet?”).
Coordination between sites (e.g., “I keep ringing and nobody
answers? Can you ring me please”; “Pizza & and chips ready
come on in !”).
Coordination between staff (e.g., “Please ring car wont start”;
“Alison can you ask terri to ring me when she comes in about the
swop”).
Tracking schedules (e.g., “What shift is steve doing tomorrow and
where”; “Alison on visits and has mobile. Brian out with hh and
has own mobile”
Queries (e.g., “Which keys should we hand over?”; “Can I possibly
get a lift into town”).
The SPAM logs reveal a growing familiarity with SMS or
‘textspeak’ (e.g., “What does 18tr mean?” - “Later in SMS speak,
get with it babe”) and its use to tell jokes (e.g., “how do u turn a
duck in2 a soul singer: put it in the microwave until its bill
withers”) suggests the technology is slowly but surely becoming
organizationally embedded in the day-to-day work of the
residential care setting, as the following extracts also indicate:
“SORRY IM GOING 2B LATE DARRIN”
“Blocked in snow will be late”
“Snow problem please ring Barbara”
“Penny am with mr gate closed bvt not locked”
“Hold up with s m money will be delayed back a s a p Barbara”
The organizational character of texting has also become evident in
the use of Hermes, as the following extracts make perspicuous:
“Am running 20 mins late”
“On bus - in shortly”
“Gone to the gym”
“Johm - in ww burger joint.”
“Maomao going to be late – will catch up later. A.”
“ In big q at post office … Will be a bit late”
As these examples illustrate, the organizational character of texting
consists of an explicit sharing of context in order to support (or
potentially support) collaboration with others.
Like Nardi et al. [19] and Isaacs et al. [16], when examining the
sharing of context we are interested in the communicative functions
of texting - of the use of texting for quick questions and
clarifications, for example (e.g., “Do you know if Helen has any
medicine”; “ Wot time is Paul calling to c hh”). Similarly, there is
evidence in the logs that texting is useful for various kinds of
coordination. Texting is particularly useful to coordination when
immediate responses are required (e.g., “D ... XXX has to have
blood test at cc at 10 30 i will take him can you tell him to be ready
- let me know if you have got message” - “Got message have
cancelled his taxi”). However, the use of text also extends to
coordinating the use of technology when, for example, a
conversation is complicated and/or involves too much typing (e.g.,
“Please phone house when you are able”). In other instances
texting is relied upon when other technologies (phone, fax, email,
etc.) are in use or are being kept clear in the anticipation of urgent
use and to alert others on occasions where technical failures occur
(e.g., “Put the phone on to answerphone”; “Please switch the
mobile phone on”; “u r blocking the phone line after someone
telephoned here it sounded like mike. Please sort out as we can not
use the mobile if needed”).
What becomes obvious in reading the text logs is the flexibility of
text messaging in terms of supporting the everyday work of the
hostel and the university department. The expressive’ character of
texting is also noteworthy. Even without the addition of emoticons,
our users routinely employ texting for affective communication
about work, work crises, jokes and general social banter.
“I can hear a kind of jingley sound and there are animals on the
roof what does this mean?” “It means that Santa is passing over
the house and making his way down to see me”
“Help please its all too much on my first day back”
“Hello ian i was wondering if everything was alright?”
“A man went to the doctors with a lettuce up his bum and the
doctor said its just the tip of the iceberg im afraid”
The affective character of texting has been observed by other
researchers in other settings [25]. As Nardi et al. [19] put it,
It is interesting that a lightweight technology consisting of
no more than typing text into a window succeeds in
providing enough context to make a variety of social
exchanges vivid, pleasurable, capable of conveying humour and emotional nuance.
Of particular interest to us is what Nardi et al. characterise as
‘outeraction’, where text messaging does more than support rapid
informal communication but also facilitates practices that make
communication possible. Such practices include negotiating the
availability of others for conversation (e.g. “Please phone the house
when you are able”). Such negotiation requires some sensitivity
towards the work and pace of work of others and involves
recognizing appropriate and inappropriate times to contact others,
appropriate modes of interruption, and so on. Texting allows
people to address the kind of issues on which communication turns
in that it is less obviously ‘in your face’ than some other forms of
communication. It permits delayed response or easy
acknowledgement (pressing the acknowledgement button), for
example, and at the same time facilitates multi-tasking, allowing
workers to monitor texts whilst engaged in other jobs. The logs
suggest that texting in the hostel allows workers to negotiate their
availability and maintain their connection with the rest of the staff.
Knowing who is around, what people are doing at weekends or
during sleepovers at the main hostel, for example, enables workers
to establish and project a range of possible interactions, much as
the door displays at the university allow people to project
appropriate course of action in response to messages left by staff.
Texting, in other words, enables users to plan joint activities as
much as it enables their coordination.
5. CONCLUDING REMARKS In this paper we have commented on some of the technical
difficulties we have faced in our deployment and use of
'technology probes' as an attempt to log activity and use of two
SMS applications.
From a technical perspective we have certainly found that
managing and maintaining the logging functions of both the
Hermes and SPAM systems has raised some unexpected
challenges. We have certainly learnt that appropriate support for
logging needs to be considered at design time given the potential
implications that appropriate support for logging can have on
system design. For example, with both the Hermes and SPAM
systems the adopted network infrastructure limits the flexibility
with which logs can be maintained.
We believe that the experiences we have had with the logging
aspects associated with Hermes and SPAM would generalise
significantly with that of other systems in the loosely defined
ubicomp domain. In more detail, we believe that logging tools need
to be developed to support remote monitoring and/or capturing of
logs from different (but related) sources that are potentially
producing data 24/7. Clearly, we need to look to the solutions that
have been found in domains such as safely critical control systems
to provide us with insights, e.g. the need to develop special
‘watcher’ processes to monitor the correct functioning of the
logging function by detecting and warn of potential problems, e.g.
approaching storage limits.
One requirement that is perhaps more peculiar to ubicomp systems
(given the potential range and number of sources of logging
information) is the need to consider the design of appropriate tools
to support the amalgamation of separate logs and the need to
support human augmentation (e.g. categorising data in the logs) of
these logs, we have found this latter requirement to be a key
requirement for analysing usage patterns from both Hermes and
SPAM. Supporting an automated categorisation process certainly
poses an interesting AI challenge.
For the social scientists on the project the logs provided a valued
and worthwhile resource that supplemented existing social research
techniques. The value of the logs resides in providing a record of
and thereby facilitating our understanding social action and the
members' standpoint in real time. The logs produced by the
technology probes sustain the distinctiveness of our
ethnomethodological approach to understanding social action and
its insistence upon a conception of social action in real time. Of
course, this may seem, and probably is, no more than common
sense to those who are not sociologists. Because we are interested
in understanding exactly how people carry out their activities the
concern to consider their action in ‘real time’ is similarly obvious.
Our point is that sociological analyses often benefit from hindsight,
they often know how things turned out and therefore whether
something was (ultimately) a mistake, foolish wise, hopeless and
so on. But people cannot know how their activities will turn out -
whatever their intentions and best efforts accidents and mistakes
sometimes occur - and these happen in real time. Consequently
getting a better understanding of the actor’s point of view - which
is the essence of this approach to usability - requires the
examination of the organisation of social action over its course -
an activity promoted by the logs. This is a basic feature of our
ethnomethodological investigations, regarding the social actor as a
practical doer, needing to get things done. The logs tap into the
fact that everyday activities possess an essentially temporal
character; for lacking the benefit of hindsight the actor’s point of
view is always located as some here and now within any particular
course of action. Even the idea that something is part of a course of
action is integral to the production of the course of action itself.
That is, determinations the actor makes as part of the means of
carrying out the action as to ‘where I am now’?, ‘how much have I
done?’, ‘is this course of action working out as I anticipated or do
I need to adjust the prepared course’, ‘how much more is there left
to do’, ‘how can I get from doing what I am doing now to doing
what I need to do next?’, ‘what do I need to do next, exactly’, etc.
To the extent to which the logs reflect and document these kinds of
processes we have found them invaluable. This is not to suggest
that either getting or analysing the data is easy, for the data is
indexical to the activities that generated it. Knowledge of those
activities - obtained through our other researches - is brought to
bear on analysis of the data and to make sense of it – to make it
meaningful. In other words, the data depends for its adequacy on
knowledge of the activities in which the technology is embedded
and used. That knowledge is used to interpret the data but is not
contained within the data [3]. Consequently where the
measurement and assessment of the functional value of
collaborative systems is concerned there remains a need to exercise
caution and leave certain tasks to human skill and judgement.
6. ACKNOWLEDGEMENTS This work described in this chapter has been conducted under the
auspices of the CASCO project (grant number GR/R54200/01), the
Equator IRC (www.equator.ac.uk) and Dependability IRC
(www.dirc.org.uk) funded by the UK Engineering and Physical
Sciences Research Council. We would also like to acknowledge
the members of Lancaster University’s Computing Department and
the Croftlands Trust for their continued tolerance and support.
7. REFERENCES 1. Anderson, R.J., and Sharrock W.W Can organizations afford
knowledge Computer Supported Cooperative Work: The
Journal of Collaborative Computing, vol. 1 (3), 1993, 143-161.
2. Benson, D. and Hughes, J.A “Method: evidence and
inference”, Ethnomethodology and the Human Sciences (ed.
Button, G.), Cambridge: Cambridge University Press, 1991, 109-136.
3. Cicourel, A.V. Method and Measurement in Sociology, New York: Free Press, 1964.
4. Cheverst, K., Dix, A., Fitton, D., Friday, A. and Rouncefield,
M. “Exploring the utility of remote messaging and situated
office door displays”, Proceedings of the 5th
International
Symposium on Human Computer Interaction with Mobile Devices and Services, Udine, Italy: Springer, 2003, 336-341.
5. Cheverst, K., Dix, A., Fitton, D. and Rouncefield, M. “‘Out to
lunch’: exploring the sharing of personal context through
office door displays”, Proceedings of OzCHI 2003, Brisbane Australia: Ergonomics Society of Australia, 2003, 74-83.
6. Cheverst, K., D. Fitton, and A. Dix. Exploring the evolution
of office door displays, Public and Situated Displays: Social
and Interactional Aspects of Shared Display Technologies.
(eds. O’Hara, K., Perry, M., Churchill, E. and Russell, D.), Dordrecht: Kluwer Academic Publishers, 2003, 141-169.
7. Cheverst, K., Clarke, K., Dewsbury, G., Hughes, J.,
Rouncefield, M., Crabtree, A., Hemmings, T. and Rodden, T.
“Designing with care: adapting cultural probes to inform
design in sensitive settings”, Proceedings of OZCHI 2003,
Brisbane, Australia: Ergonomics Society of Australia, 2003, 4-13.
8. Cheverst, K., Clarke, K., Fitton, D., Rouncefield, M.,
Crabtree, A. and Hemmings, T. “SPAM on the menu: the
practical use of remote messaging in community care”,
Proceedings of the 2003 ACM Conference on Universal Usability, Vancouver, Canada: ACM Press, 2003, 23-29.
9. COMIC Deliverable 2.1 Informing CSCW Requirements,
Lancaster University: Sociology & Computing Departments. ftp.comp.lancs.ac.uk/pub/comic/, 1994.
10. Crabtree, A. Designing Collaborative Systems: A Practical Guide to Ethnography, London: Springer, 2003.
11. Fitton, D., Cheverst K., Experiences Managing and
Maintaining a Collection of Interactive Office Door Displays,
in proc. of 1st European Symposium on Ambient Intelligence
(EUSAI’03) (Eindhoven, Netherlands, November 2003)
Lecture Notes in Computer Science, Springer-Verlag, 2003,
394-410.
12. Fleck, J. Innofusion or diffusation? The Nature of
Technological Development in Robotics, Edinburgh PICT
Working Paper No 4, www.rcss.ed.ac.uk/ publications/, 1988.
13. Gaver, W.H., Dunne, A. and Pacenti, E. Design: cultural probes, Interactions, vol. 6 (1), 1999, 21-29.
14. Hughes, J.A., King, V., Rodden, T. and Andersen, H. Moving
out of the control room: ethnography in systems design,
Proceedings of the 1994 ACM Conference on Computer
Supported Cooperative Work, Chapel Hill, North Carolina: ACM Press, 1994, 429-438.
15. Hutchinson, H., Mackay, W., Westerlund, B., Bederson, B.B,
Druin, A., Plaisant, C., Beaudouin-Lafon, M., Conversy, S.,
Evans, H., Hansen, H., Roussel, N. and Eiderbäck, B.
Technology probes: inspiring design for and with families,
Proceedings of the 2003 CHI Conference on Human Factors in Computing Systems, Florida: ACM Press, 2003, 17-24.
16. Isaacs, E., Walendowski, A., Whittaker, S., Schiano, D. and
Kamm, C. The character, functions, and styles of instant
messaging in the workplace, Proceedings of the 2002 ACM
Conference on Computer Supported Cooperative Work, New Orleans: ACM Press, 2002, 11-20.
17. Lazarsfeld, P.F. and Rosenburg, M. The Language of Social Research, New York: Free Press, 1955
18. Mobile Data Association, www.mda-mobiledata.org/resource/hottopics/sms.asp, 2004
19. Nardi, B., Whittaker, S. and Bradner, E. Interaction and
outeraction: instant messaging in action, Proceedings of the
2000 ACM Conference on Computer Supported Cooperative Work, Philadelphia: ACM Press, 2000, 79-88.
20. O’Hara, K. E. Churchill, M. Perry, D. Russell, N. A. Streitz,
Public, Community and Situated Displays: Design, Use and
Interaction around Shared Information Displays,
www.appliancestudio.com/cscw/cscwdisplayworkshopcall.htm, 2002.
21. Randall, D., Rouncefield, M. and Hughes, J.A. Chalk and
cheese: BPR and ethnomethodologically informed
ethnography in CSCW, Proceedings of the 4th
European
Conference on Computer Supported Cooperative Work,
Stockholm, Sweden: Kluwer Academic Publishers, 1995, 325-340.
22. Rheingold, H. Smart Mobs: the next social revolution. Perseus Publishing, Cambridge MA, 2002.
23. Sacks, H. A single instance of a phone-call opening, Lectures
on Conversation (ed. Jefferson, G.), vol. II, Oxford: Blackwell, 1992, 542-553.
24. Schmidt, K. and Bannon, L. Taking CSCW seriously:
supporting articulation work, Computer Supported
Cooperative Work: The Journal of Collaborative Computing, vol. 1 (1), 1992, 7-40.
25. Taylor, S. and Harper, R. “Age-old practices in the ‘new
world’: a study of gift-giving between teenage mobile phone
users, Proceedings of the 2002 CHI Conference on Human
Factors in Computing Systems, Minneapolis: ACM Press, 2002, 439-446.