Natural Web Interfaces
نویسندگان
چکیده
2 Published by the IEEE Computer Society 1089-7801/16/$33.00 © 2016 IEEE IEEE INTERNET COMPUTING W illiam Prosser, in his classic paper, describes how privacy involves diverse aspects centered on the idea of being let alone (p. 389).1 We view privacy as crucial to the user experience (UX) in a sociotechnical setting, wherein users engage socially through information technology. In previous work, we addressed privacy by limiting information disclosure to location-based (and not necessarily social) applications by computing context at an abstract level that enhances usability but hides details.2 Here, we approach privacy from the standpoint of engineering social applications, wherein interactions among users are central and thus privacy matters for more than just disclosure. Specifically, we investigate how to develop applications that deal with two foundational aspects of privacy.1 Intrusion into someone’s solitude, which originally meant physical intrusion into a person’s space, we also take to include making a noise or otherwise interrupting someone’s life. Disapprobation of someone’s peers would mean loss of face, which can arise not only with a person’s inner circle but also with strangers looking askance. Avoiding intrusion and disapprobation is overshadowed in computing research by concerns of information leakage — arguably, information leakage involves confidentiality more than privacy per se. A social application caters to multiple users: primary users, who directly interact with it, and secondary users, who might not directly interact with the application but are affected by it. The lowly ringer manager on a cell phone is a social application: its primary user is the phone’s owner and the secondary users are callers and those within earshot. The ringer manager helps the owner set a ringer mode (loud, silent, or vibrate) for incoming phone calls. A rigid design yields poor privacy and experience: The phone might ring loudly when the owner is in an important meeting (causing a nuisance) or stay silent even when the owner’s spouse calls in an emergency (losing value). Traditionally, UX design concentrates on primary users and disregards secondary users.3 This attitude can lead to suboptimal experiences for both primary and secondary users, specifically, because privacy presupposes interaction between users. Intrusion is a prominent aspect of privacy in the ringer scenario: Does the caller intrude upon the callee and does the callee intrude upon people nearby (by taking a call or by letting a phone ring)? The UX for all concerned parties depends upon whether the phone rings: the caller could be stymied by a phone set on silent and the privacy of the other users might be violated otherwise. Also, improper ringer settings expose another privacy risk — that of disapprobation, causing the owner embarrassment. Imagine if your phone went off during a classical concert!
منابع مشابه
Web-Based Interfaces For Natural Language Processing Tools
We have built web interfaces to a number of Natural Language Processing technologies. These interfaces allow students to experiment with different inputs and view corresponding output and inner workings of the systems. When possible, the interfaces also enable the student to modify the knowledge bases of the systems and view the resulting change in behavior. Such interfaces are important becaus...
متن کاملEvaluating the usability of natural language query languages and interfaces to Semantic Web knowledge bases
The need to make the contents of the Semantic Web accessible to end-users becomes increasingly pressing as the amount of information stored in ontology-based knowledge bases steadily increases. Natural language interfaces (NLIs) provide a familiar and convenient means of query access to Semantic Web data for casual end-users. While several studies have shown that NLIs can achieve high retrieval...
متن کاملHow Useful Are Natural Language Interfaces to the Semantic Web for Casual End-Users?
Natural language interfaces offer end-users a familiar and convenient option for querying ontology-based knowledge bases. Several studies have shown that they can achieve high retrieval performance as well as domain independence. This paper focuses on usability and investigates if NLIs are useful from an end-user’s point of view. To that end, we introduce four interfaces each allowing a differe...
متن کاملQuestion Answering, Semantic Search and Data Service Querying
Question Answering (QA) systems have profoundly evolved since their inception as natural language interfaces to databases. QA technology has indeed become state-of-the-art on open-domain, unstructured information retrieval and more recently touched the Semantic Web and the problem of querying structured data (e.g. RDF triples) on the Web. A natural new challenge is QA over data services, suppor...
متن کاملWhere are the ‘Killer Applications’ of Restricted Domain Question Answering?
From a language technologist’s point of view, the penetration of natural language interfaces onto today’s web is somewhat disappointing; it seems that information retrieval, forms based, metaphor-based and hyper-link interfaces dominate all points of the design space. While open domain question answering promises to rival or extend information retrieval systems, restricted domain question answe...
متن کاملDynamic Product Interfaces: A Key Element for Ambient Shopping Environments
By embedding information technologies into tangible products a new class of products is created that we call smart products. Smart products use product information in product-centered communication with users. Communication of smart products is handled by dynamic product interfaces. We present a model for QA-based dynamic product interfaces and its implementation DyPI. It is based on a schema-d...
متن کامل