[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1240866.1241013acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
Article

Addressing constraints: multiple usernames task spillage and notions of identity

Published: 28 April 2007 Publication History

Abstract

In this work in progress report, we present preliminary results from an interview study on people's use of email addresses and instant messenger usernames. Based on these interview findings, we speculate that many people use multiple identifiers reactively and prosaically, rather than simply proactively and strategically. This has implications for understanding the scope of previous studies; for developing cross-platform methodologies for analysis of people's practices; for understanding identifier selection; and for design of communication tools and protocols. We believe that a focus on "identity", which we characterize to be a set of strategic and coherent practices for self-presentation/protection, has led to an under-representation of reactive and prosaic practices of identifier selection that can result from organizational policy, technological implementations, and social and task information flow management.

References

[1]
H. R. Baker, N. B. Duarte, A. Haririnia, D. E. Klinesmith, H. Lee, L. A. Velikovich, A. O. Wanga, M. J. Westhoff, and C. Plaisant. A design study of the integration of email and role management for university students. TR HCIL--2003--3, University of Maryland, College Park, 2003.
[2]
O. Bälter. Electronic Mail in a Working Context. PhD thesis, Royal Institute of Technology, IPLab, NADA, KTH, 10044 Stockholm, 1998.
[3]
V. Bellotti, N. Ducheneaut, M. Howard, and I. Smith. Taking email to task: The design and evaluation of a task management centered email tool. Proceedings CHI '03, pp 345--352, ACM Press.
[4]
L. A. Dabbish and R. E. Kraut. Email overload at work: An analysis of factors associated with email strain. CSCW'06, pp 431--440, ACM Press.
[5]
L. A. Dabbish, R. E. Kraut, S. Fussell, and S. Kiesler. Understanding email use: Predicting action on a message. CHI '05, pp 691--700, ACM Press.
[6]
D. Fisher, A. J. Brush, E. Gleave, and M. A. Smith. Revisiting Whittaker & Sidner's "email overload" ten years later. CSCW'06, pp 309--312, 2006. ACM Press.
[7]
B. M. Gross. Multiple email addresses: A socio-technical investigation. Proceedings of the First Conference on Email and Anti-Spam (CEAS), 2004.
[8]
S. Jones. The internet goes to college: How students are living in the future with today's technology. The Pew Internet & American Life Project, Sept 2002.
[9]
Lenhart, A., and Rainie, L. Teenage life online: The rise of the instant-message generation and the internet's impact on friendships and family relationships. The Pew Internet & American Life Project, Sept 2005.
[10]
W. E. Mackay. Diversity in the use of electronic mail: a preliminary inquiry. ACM Transactions on Information Systems (TOIS), 6(4):380--397, 1988.
[11]
Mueller, M. L., Park, Y., Lee, J., and Kimb, T.-Y. Digital identity: How users value the attributes of online identifiers. Information Economics and Policy 18, 4, 405--422, 2006.
[12]
C. E. Nippert-Eng. Home and Work: Negotiating Boundaries Through Everyday Life. University of Chicago Press, 1996.
[13]
N. J. Victory and K. B. Cooper. A nation online: How Americans are expanding their use of the internet. Economics and Statistics Administration and National Telecommunications and Information Administration, Feb 2002.
[14]
S. Whittaker, Q. Jones, B. Nardi, M. Creech, L. Terveen, E. Isaacs, and J. Hainsworth. Contactmap: Organizing communication in a social desktop. ACM TOCHI, 11(4):445--471, 2004.
[15]
S. Whittaker and C. Sidner. Email overload: Exploring personal information management of email. Proceedings CHI '96, pp 276--283, ACM Press.

Cited By

View all
  • (2018)How to Compare Different Social Media: A Conceptual and Technical FrameworkSecond International Handbook of Internet Research10.1007/978-94-024-1202-4_32-1(1-16)Online publication date: 3-Jul-2018
  • (2018)Finding and Rating Personal Names on Drives for Forensic NeedsDigital Forensics and Cyber Crime10.1007/978-3-319-73697-6_4(49-63)Online publication date: 6-Jan-2018
  • (2017)"WhatsApp is for family; Messenger is for friends"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025484(727-735)Online publication date: 2-May-2017
  • Show More Cited By

Index Terms

  1. Addressing constraints: multiple usernames task spillage and notions of identity

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI EA '07: CHI '07 Extended Abstracts on Human Factors in Computing Systems
    April 2007
    1286 pages
    ISBN:9781595936424
    DOI:10.1145/1240866
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 April 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. collaboration
    2. email
    3. identifier
    4. identity
    5. instant messaging
    6. interview study
    7. task
    8. usernames

    Qualifiers

    • Article

    Conference

    CHI07
    Sponsor:

    Acceptance Rates

    CHI EA '07 Paper Acceptance Rate 212 of 582 submissions, 36%;
    Overall Acceptance Rate 6,164 of 23,696 submissions, 26%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)How to Compare Different Social Media: A Conceptual and Technical FrameworkSecond International Handbook of Internet Research10.1007/978-94-024-1202-4_32-1(1-16)Online publication date: 3-Jul-2018
    • (2018)Finding and Rating Personal Names on Drives for Forensic NeedsDigital Forensics and Cyber Crime10.1007/978-3-319-73697-6_4(49-63)Online publication date: 6-Jan-2018
    • (2017)"WhatsApp is for family; Messenger is for friends"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025484(727-735)Online publication date: 2-May-2017
    • (2016)Sharing Personal Content OnlineProceedings of the 2016 CHI Conference on Human Factors in Computing Systems10.1145/2858036.2858170(101-112)Online publication date: 7-May-2016
    • (2015)Disclosure, Stress, and Support During Gender Transition on FacebookProceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing10.1145/2675133.2675152(1176-1190)Online publication date: 28-Feb-2015
    • (2013)Turbulence in the cloudsProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/2470654.2481313(2273-2282)Online publication date: 27-Apr-2013
    • (2013)Work and personal e‐mail use by university employees: PIM practices across domain boundariesJournal of the American Society for Information Science and Technology10.1002/asi.2281564:5(1029-1044)Online publication date: Apr-2013
    • (2011)Life "modes" in social mediaProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1978942.1979022(561-570)Online publication date: 7-May-2011
    • (2011)Faceted identity, faceted livesProceedings of the ACM 2011 conference on Computer supported cooperative work10.1145/1958824.1958880(359-368)Online publication date: 19-Mar-2011
    • (2010)Human FactorsHandbook of Financial Cryptography and Security10.1201/9781420059823-c17(497-519)Online publication date: 4-Aug-2010
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media