SCN: Presence awareness
Steve
steve at advocate.net
Thu Feb 7 16:41:13 PST 2002
x-no-archive: yes
=================
(Lisa Guernsey, NY Times)---Making a phone call has always
been a game of chance. You never know whether the person you
are calling is available. You just punch in the numbers and hope to
get lucky.
Imagine being able to learn without dialing a single digit whether
another person's phone is in use, or in the case of a cellphone,
whether it is even turned on. Now imagine being able to do the
same thing with any wired or wireless device of the future -
whether it is in the car, in an airplane or at the gym. Not only could
you learn whether a person is available for a chat, but you could
also deduce what that person might be doing at that exact moment,
all without exchanging a word.
That is the idea behind a programming concept called presence
awareness, which is based on the realization that appliances on a
network can automatically be detected by other devices.
"The days of phone tag are on the way out," said Sonu Aggarwal,
chief executive of Cordant, a company that develops instant-
messaging technology. "This is a very powerful concept with long-
term implications."
Many software developers predict that presence technology will
become almost as ubiquitous as communication devices
themselves. In six months, Motorola officials say, the company will
roll out a system that will allow a caller to tell whether another
person's mobile phone is on and whether it is in use. Nokia and
Ericsson, among several other telecommunications companies, are
also developing the technology, for use in either land-line or
wireless phones.
Presence technology is also being considered for hand-held
computers, wireless Web pads, communications systems in cars,
and even exercise machines that provide Internet access at the
gym. Some systems, the officials say, will go as far as using
tracking systems like the Global Positioning System, or G.P.S., to
detect the location of a person who is logged in.
The prospect of information that can reveal a person's availability
at a given moment, anywhere in the world strikes many people as
both creepy and intriguing.
Katelyn Y. A. McKenna, an assistant professor at New York
University who conducts research on Internet relationships, has
found that people are comforted when they can see the distant
movements of people from their inner circles, like family and
friends. Devices that use presence technology could provide such
reassurance.
"You could see that you could instantaneously reach these people
if you need them," Dr. McKenna said. "I know my mother would be
extremely reassured if she could see, 'Oh, she's off the plane; her
cellphone came on; she's landed.'"
But along with comfort comes the unnerving feeling of being
watched, a lesson that has been experienced by millions of instant
messaging users. By keeping track of the activity on their Buddy
Lists, people with I.M. can use log-in information to get a sense of
their buddies' routines - when they arrive at work, when they are
online at home on a weekend, or in some cases how long they
have been away from their computers. Information that was private
(or at least not easy to acquire) can become known - with little
effort - by employers, co-workers, friends, family members and,
sometimes, by strangers.
"When you have these technologies you really expose yourself
and your day to a lot of people," said Bonnie A. Nardi, an
anthropologist at Agilent Technologies, a company that makes
high-tech monitoring devices.
After spending a few years studying instant messaging, Dr. Nardi
said she became aware of the subtle impact of presence
technology on people's lives. It is time, she said, to think about
"what we want people to know about what we are doing at a given
moment."
Software programmers and executives have begun talking about
how to capitalize on presence technology's potential. For example,
at Dynamicsoft, officials have discussed how presence software,
wireless hand-held computers and G.P.S. tracking could alert a
person when a friend happened to be a few blocks away. A phone-
based system could also automatically plug in teleconference
participants the instant everyone in the group was available.
In the future, Mr. Aggarwal of Cordant said, technology might be so
integrated that a traveler could wear a wireless badge that
interacts with a computer on the back of an airplane seat. When
the computer sensed that the traveler was seated, it could
automatically redirect messages to the computer's screen or send
word to the traveler's contacts that he was on board.
The only widely available version of the technology currently in
use is instant messaging. If I.M.'s popularity is any indication,
people may be ready to embrace the possibilities of presence
detection.
More than 50 million people in the United States use instant-
messaging products today, according to industry estimates, and
many of those people say that their favorite aspect of the
technology is the ability to see whether a buddy is online.
Still, even some of the technology's adherents acknowledge how
strange it is to remotely broadcast their whereabouts. Mr. Aggarwal
uses MSN Messenger, which displays a clock icon in the contact
list to indicate when a person has not touched the keyboard or
mouse for, say, five minutes. As soon as he resumes use of his
keyboard or mouse, the clock goes away. Often, he said, he gets a
phone calls the minute he hits the keys, and the caller is invariably
someone who had been waiting for that icon to disappear.
"Without my being aware, people are watching me," Mr. Aggarwal
said.
Hints of a coming struggle between privacy and openness turned
up in a recent project at Bell Labs, the research and development
arm of Lucent Technologies. In the project, which was called Rear
View Mirror, a scientist, Dr. James Herbsleb, and several
colleagues studied a group of Lucent employees in American and
European offices who used a Bell Labs instant messaging system
for more than a year. Privacy issues arose from the start.
"Some people in Germany said, 'This looks like a surveillance tool
for us,'" Dr. Herbsleb said.
He added that they did not like the idea that supervisors could
detect - and therefore monitor - exactly how long they had been
online and how much time they had spent typing on their
keyboards.
As a result, Bell Labs researchers altered the software to give
users complete control. The program's default options were set to
make users appear to be offline. If people wanted co-workers to
know they had logged in, they had to turn on the feature that
displayed their availability.
That solution did not work very well, Dr. Herbsleb said. The
software, which was intended to avoid problems like phone tag,
was useless if people had to badger colleagues to announce their
availability. Besides, he said, it missed the point of presence
technology, which is useful precisely because it senses what is
going on without any action by a user.
Ultimately, the researchers and employees compromised. The
presence system was automatically turned on for people within
small work groups. People outside those groups had to get
colleagues' permission to watch their movements. "Don't allow
people to just lurk and spy," Dr. Herbsleb said.
But as staying in touch electronically becomes the mark of modern
movers and shakers, many people say they will gladly allow their
presence to be known in exchange for the convenience of constant
contact. "It's sort of like leaving the front door open, and saying,
'Come on in; don't even knock,' " said David Wertheimer, who
writes a daily Web log called Netwert and is an avid user of instant
messaging software.
Software developers say they can design presence awareness
systems to accommodate both those who seek privacy and those
who want constant contact. Yahoo and Microsoft, for example,
include privacy features in their instant messaging products. Users
must grant permission before their names can be added to
someone's contact list. Instant Messenger, both the stand-alone
version and the one embedded in AOL's Internet service, does not
allow that level of control. Users have no way of knowing whether
someone has added their screen names to a buddy list.
Michele Magazine, a publishing consultant in Manhattan who
briefly used the Instant Messenger program from America Online,
said she was troubled by the lack of privacy. "I don't want people to
know when I'm at home," she said. "There was no way to hide."
Whether people will use permission features or other blocking
tools is another question. Social pressure can be a powerful
disincentive. Some teenagers who use instant messaging
programs, for example, said they would not block their peers
because they would not want to seem rude.
Consider something like the following alert showing up on your
screen: "Bill wants to put you on his buddy list. Do you accept?" If
Bill is merely a distant acquaintance, and you decline, will it look
like a snub? Suppose your girlfriend can tell that you are in your
office, using your computer but not your phone. If she decides to
call and you don't answer, she may think: "Why not? Clearly you
are available. Are you ignoring me?"
The Internet Engineering Task Force, the group that develops
standards for Internet communication, has been thinking about
several such implications, according to the engineers involved.
One of them is Jonathan Rosenberg, chief scientist for
Dynamicsoft and a co-author of the task force's standards for
presence and instant messaging technology.
Dr. Rosenberg has come up with an answer for the social dilemma
of managing privacy without appearing rude. His idea is
appropriately called polite blocking, and it works something like a
little white lie. Users could appear to be busy with phone calls
when, in fact, they might be blissfully enjoying a few minutes of
solitude.
There is another alternative, of course: People could extricate
themselves from the technology often enough to keep their
contacts guessing. A contact may determine that someone's mobile
phone is on - and it very well may be, but it may also be sitting at
home.
"Until we get to the bioimplant," said Craig Peddie, who works on
presence technology at Motorola, "we won't be able to know that
you really have it with you."
Copyright 2002 The New York Times Company
* * * * * * * * * * * * * * From the Listowner * * * * * * * * * * * *
. To unsubscribe from this list, send a message to:
majordomo at scn.org In the body of the message, type:
unsubscribe scn
==== Messages posted on this list are also available on the web at: ====
* * * * * * * http://www.scn.org/volunteers/scn-l/ * * * * * * *
More information about the scn
mailing list