An expanding range of apps supported by wearable and mobile devices are being used by people engaged in personal informatics in order to track and explore data about themselves and their everyday activities. While the aspect of data collection is easier than ever before through these technologies, more advanced forms of support from personal informatics systems are not presently available. This lack of next generation personal informatics systems presents research with an important role to fill, and this paper presents a two-step contribution to this effect. The first step is to present a new model of human cooperation with intelligent computing, which collates key issues from the literature. The second step is to apply this model to personal informatics, identifying twelve key considerations for integrating intelligent computing in the design of future personal informatics systems. These design considerations are also applied to an example system, which illustrates their use in eliciting new design directions.
https://dl.acm.org/ft_gateway.cfm?id=2701378&dwn=1A large proportion of email messages in an average Internet user's inbox are unwanted commercial messages from mailing lists, bots, and so on. Although such messages often include instructions to unsubscribe, people still struggle with stopping unwanted email. We investigated the user experience of unsubscribing from unwanted email messages by recruiting 18 individuals for via a lab study followed by semi-structured interviews. Based on unsubscribing practices of the study participants, we synthesized eight common unsubscription mechanisms and identified the corresponding user experience challenges. We further uncovered alternative practices aimed at circumventing the need to unsubscribe. Our findings reveal frustration with the prevailing options for limiting access to the self by managing email boundaries. We apply our insight to offer design suggestions that could help commercial providers improve the user experience of unsubscribing and provide users more control over the email they receive.
https://dl.acm.org/ft_gateway.cfm?id=3376165&dwn=1Ever wondered if it was a good time to call your spouse, child, or friend? Do you sometimes just want to know if they are on their way to meet you? With Peek you can request the activity state (e.g. walking, in-vehicle, at-rest) and location of a phone when needed. Context is sent back automatically to people on the phone owner's pre-approved Peek contact list. The person being peeked at receives a notification that provides awareness of who peeked at them and when.
https://dl.acm.org/ft_gateway.cfm?id=2442024&dwn=1Computation in biology and in conventional computer architectures seem to share some features, yet many of their important characteristics are very different. To address this, [1] introduced systemic computation, a model of interacting systems with natural characteristics. Following this work, here we introduce the first platform implementing such computation, including programming language, compiler and virtual machine. To investigate their use we then provide an implementation of a genetic algorithm applied to the travelling salesman problem and also explore how SC enables self-adaptation with the minimum of additional code.
https://dl.acm.org/ft_gateway.cfm?id=1274037&dwn=1