SlideShare a Scribd company logo
1 of 32
Barriers and bridges
in the adoption of today’s
      mobile phone
    contextual services
  Mauro Cherubini, Rodrigo de Oliveira,
    Anna Hiltunen, and Nuria Oliver
          Telefonica Research
vs.




photo credit: http://www.staudinger-franke.com/
diagram credit: Zimmerman et al, 2007
• identify the human needs that support the
  adoption of contextual services (i.e.,
  contextual needs)

• understand how these needs relate to more
                   vs.
  general human needs

• identify the barriers for adoptions of the
  contextual services


                               photo credit: http://www.staudinger-franke.com/
1) ethnographic study of
                                   how people use
                                  contextual services
                                    (8 participants)




2) large-scale questionnaire
      (395 participants)
qualitative study
diagram credit: Zimmerman et al, 2007

                                            physical exercise
                                        memory prosthetic support
                                          remote collaboration
                                                    ...

    social awareness
communication outside the
     social network
   collective initiatives
             ...


                                                                          recommend places
                                                                     search/track personal location
                                                                    search location of static objects
                                                                       advertisement on the spot
                                                                          purchase on the go
                                                                                   ...
            recommend activity
           search/track activity
  evaluate possible obstacles to an event
 search/track location related to an event
diagram credit: Zimmerman et al, 2007

                                            physical exercise
                                        memory prosthetic support
                                          remote collaboration
                                                    ...

    social awareness
communication outside the
     social network
   collective initiatives
             ...


                                                                          recommend places
                                                                     search/track personal location
                                                                    search location of static objects
                                                                       advertisement on the spot
                                                                          purchase on the go
                                                                                   ...
            recommend activity
           search/track activity
  evaluate possible obstacles to an event
 search/track location related to an event
social awareness
   discover what peers are doing / where they are
    to understand whether they are available for
                   social activity



“I often look at the status on Whatsapp to decide whether
         it is a good time to pay a visit to a friend”
                        [participant 8]
22                                                                                    "Whe
perso         sports)                 model personal status.
              Memory prosthetic       Support for storing and retrieving information one       “I ad
           23
              support                 collects during daily life.                              name
                                                                                               “I tak
                Remote/asynchronous
           24
                collaboration     barriers for adoption
                                      Provide or receive help from colleagues while on the go. of my
                                                                                               subje
                                                                                                 "I do
           B1 Trust                   Lack of trust in the information provided by the service
                                                                                                 of th
           B2 Privacy                 Privacy is at risk by using the service                    "I fee
                                      Lack of coverage of the service on relevant                "My s
           B3 Popularity
                                      stakeholders                                               [subj
           B4 Difficulty              Troubles understanding/interacting with the service        "I do
barriers




           B5 Embarassement           Interacting with the service exposes the user              "I do
                                      Lack of control over the quantity of information           "I fea
           B6 Overload
                                      received from the service                                  adve
                                                                                                 "I fee
           B7 Usefulness              Lack of benefits from using the service
                                                                                                 more
                                      The data presented by the service does not match with
           B8 Personalization                                                               "The
                                      the user profile
           B9 Dangerous               Using the service is dangerous                        "It is



 ble 2. Contextual needs (top) and barriers for adoption (bottom) repor
to the five human needs [15] according to the way subjects expressed
solved during the interviews. Some details from the examples were [om
trust

   lack of trust in the information provided
                  by the service



“I do not trust the recommendations in Around Me
  because the majority of these have been left by
              english-speaking users.”
                    [participant 3]
• We observed 24 distinct contextual needs
• Some of these needs did not have an
  informational nature

• We observed 9 barriers for adoption
quantitative study
• contextual needs derived from basic human
  needs are more important than those
  derived from high-level human needs

• the frequency with which participants
  currently address these needs is inversely
  proportional to their level of importance
Developed
countries
Developed
             countries




Developing
 regions
of
Table 5. Relationship among participants’ complaints about current
mobile phone contextual applications. Bold letters highlight the most   th
important barriers for each contextual dimension.                       th
 Table 5.1. All contextual dimensions:                                  ab
 this is...       more important    as important     less important     er
                  than...           as...            than...            ba
 trust            po/di/e/da        u/pe/o           pr
 privacy          t/po/di/e/o/da u/pe
                                                                        va
 popularity                         di/e/o/da        pr/u/pe/t          th
 difficulty        e                 po/o/da          pr/u/pe/t          Fo
 embarrassment                      po/da            pr/u/pe/t/         tio
                                                     o/di               an
 overload         e                 t/po/di/da       pr/u/pe
 usefulness       po/di/e/o/da      t/pr/pe
                                                                        th
 personalization po/di/e/o/da       t/pr/u
 dangerous                          po/di/e/o        t/pr/u/pe          Fu
                                                                        ad
                                    ...
 Table 5.2. Spatio-temporal/Activity contextual dimensions:             fo
 this is...       more important     as important      less important
                  than...            as...             than...          ho
 trust                               po/di/e/o/da      pr/u/pe          W
                                                                        bi
of
Table 5. Relationship among participants’ complaints about current
mobile phone contextual applications. Bold letters highlight the most   th
important barriers for each contextual dimension.                       th
 Table 5.1. All contextual dimensions:                                  ab
 this is...       more important    as important     less important     er
                  than...           as...            than...            ba
 trust            po/di/e/da        u/pe/o           pr
 privacy          t/po/di/e/o/da u/pe
                                                                        va
 popularity                         di/e/o/da        pr/u/pe/t          th
 difficulty        e                 po/o/da          pr/u/pe/t          Fo
 embarrassment                      po/da            pr/u/pe/t/         tio
                                                     o/di               an
 overload         e                 t/po/di/da       pr/u/pe
 usefulness       po/di/e/o/da      t/pr/pe
                                                                        th
 personalization po/di/e/o/da       t/pr/u
 dangerous                          po/di/e/o        t/pr/u/pe          Fu
                                                                        ad
                                    ...
 Table 5.2. Spatio-temporal/Activity contextual dimensions:             fo
 this is...       more important     as important      less important
                  than...            as...             than...          ho
 trust                               po/di/e/o/da      pr/u/pe          W
                                                                        bi
implications for design
diagram credit: Zimmerman et al, 2007
acknowledgments


 we would like to thank our colleagues at
Barcelona Media and the UDSI team
         at Telefonica Research
Q&A

  thanks!

mauro@tid.es
Cherubini, M., de Oliveira, R., Hiltunen, A., and
Oliver, N. Barriers and bridges in the adoption of
today’s mobile phone contextual services. In
MobileHCI’11 (Stockholm, Sweden, August 30
– September 2 2011), ACM Press.

More Related Content

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 

Featured

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Barriers and bridges in the adoption of today’s mobile phone contextual services

  • 1. Barriers and bridges in the adoption of today’s mobile phone contextual services Mauro Cherubini, Rodrigo de Oliveira, Anna Hiltunen, and Nuria Oliver Telefonica Research
  • 4. • identify the human needs that support the adoption of contextual services (i.e., contextual needs) • understand how these needs relate to more vs. general human needs • identify the barriers for adoptions of the contextual services photo credit: http://www.staudinger-franke.com/
  • 5. 1) ethnographic study of how people use contextual services (8 participants) 2) large-scale questionnaire (395 participants)
  • 7.
  • 8.
  • 9.
  • 10. diagram credit: Zimmerman et al, 2007 physical exercise memory prosthetic support remote collaboration ... social awareness communication outside the social network collective initiatives ... recommend places search/track personal location search location of static objects advertisement on the spot purchase on the go ... recommend activity search/track activity evaluate possible obstacles to an event search/track location related to an event
  • 11. diagram credit: Zimmerman et al, 2007 physical exercise memory prosthetic support remote collaboration ... social awareness communication outside the social network collective initiatives ... recommend places search/track personal location search location of static objects advertisement on the spot purchase on the go ... recommend activity search/track activity evaluate possible obstacles to an event search/track location related to an event
  • 12. social awareness discover what peers are doing / where they are to understand whether they are available for social activity “I often look at the status on Whatsapp to decide whether it is a good time to pay a visit to a friend” [participant 8]
  • 13. 22 "Whe perso sports) model personal status. Memory prosthetic Support for storing and retrieving information one “I ad 23 support collects during daily life. name “I tak Remote/asynchronous 24 collaboration barriers for adoption Provide or receive help from colleagues while on the go. of my subje "I do B1 Trust Lack of trust in the information provided by the service of th B2 Privacy Privacy is at risk by using the service "I fee Lack of coverage of the service on relevant "My s B3 Popularity stakeholders [subj B4 Difficulty Troubles understanding/interacting with the service "I do barriers B5 Embarassement Interacting with the service exposes the user "I do Lack of control over the quantity of information "I fea B6 Overload received from the service adve "I fee B7 Usefulness Lack of benefits from using the service more The data presented by the service does not match with B8 Personalization "The the user profile B9 Dangerous Using the service is dangerous "It is ble 2. Contextual needs (top) and barriers for adoption (bottom) repor to the five human needs [15] according to the way subjects expressed solved during the interviews. Some details from the examples were [om
  • 14. trust lack of trust in the information provided by the service “I do not trust the recommendations in Around Me because the majority of these have been left by english-speaking users.” [participant 3]
  • 15. • We observed 24 distinct contextual needs • Some of these needs did not have an informational nature • We observed 9 barriers for adoption
  • 17. • contextual needs derived from basic human needs are more important than those derived from high-level human needs • the frequency with which participants currently address these needs is inversely proportional to their level of importance
  • 18.
  • 19.
  • 20.
  • 22. Developed countries Developing regions
  • 23. of Table 5. Relationship among participants’ complaints about current mobile phone contextual applications. Bold letters highlight the most th important barriers for each contextual dimension. th Table 5.1. All contextual dimensions: ab this is... more important as important less important er than... as... than... ba trust po/di/e/da u/pe/o pr privacy t/po/di/e/o/da u/pe va popularity di/e/o/da pr/u/pe/t th difficulty e po/o/da pr/u/pe/t Fo embarrassment po/da pr/u/pe/t/ tio o/di an overload e t/po/di/da pr/u/pe usefulness po/di/e/o/da t/pr/pe th personalization po/di/e/o/da t/pr/u dangerous po/di/e/o t/pr/u/pe Fu ad ... Table 5.2. Spatio-temporal/Activity contextual dimensions: fo this is... more important as important less important than... as... than... ho trust po/di/e/o/da pr/u/pe W bi
  • 24. of Table 5. Relationship among participants’ complaints about current mobile phone contextual applications. Bold letters highlight the most th important barriers for each contextual dimension. th Table 5.1. All contextual dimensions: ab this is... more important as important less important er than... as... than... ba trust po/di/e/da u/pe/o pr privacy t/po/di/e/o/da u/pe va popularity di/e/o/da pr/u/pe/t th difficulty e po/o/da pr/u/pe/t Fo embarrassment po/da pr/u/pe/t/ tio o/di an overload e t/po/di/da pr/u/pe usefulness po/di/e/o/da t/pr/pe th personalization po/di/e/o/da t/pr/u dangerous po/di/e/o t/pr/u/pe Fu ad ... Table 5.2. Spatio-temporal/Activity contextual dimensions: fo this is... more important as important less important than... as... than... ho trust po/di/e/o/da pr/u/pe W bi
  • 26.
  • 28.
  • 29.
  • 30. acknowledgments we would like to thank our colleagues at Barcelona Media and the UDSI team at Telefonica Research
  • 32. Cherubini, M., de Oliveira, R., Hiltunen, A., and Oliver, N. Barriers and bridges in the adoption of today’s mobile phone contextual services. In MobileHCI’11 (Stockholm, Sweden, August 30 – September 2 2011), ACM Press.

Editor's Notes

  1. Good afternoon. This is joint work with my colleagues Rodrigo de Oliveira (who is here in the audience), Anna Hiltunen, and Nuria Oliver at Telefonica Research, in Barcelona.\n
  2. Let me jump right in: Applications on mobile phones are becoming extremely popular. They allow the user to use a mobile in an unprecedented number of ways. A Mobile is a communication device but it is also becoming rapidly an entertainment center, or a navigation device for instance. Applications add functionalities to the device and extend the number of situations in which it is used. Yet, a large portion of the market is dominated by feature phones. These are devices that offer a limited connectivity to the internet and they do not allow to install 3rd party applications.\n
  3. One of the reasons of the success of smartphones is the abundance of contextual applications. These are applications that sense and model the user’s context to operate. \n\nSo, in this diagram we list the five most common dimensions of context and examples of contextual applications that model a particular dimension. [talk about them]. Usually location and time are intertwined dimensions.\n
  4. We were interested in understanding the following: \n(1) identifying the human needs that support the adoption of contextual services (we call these contextual needs) and \n(2) understanding how these needs relate to more general human needs. \nMoreover, we analyze potential barriers for adoption of contextual services (3)\n
  5. To reflect on these issues we have carried out two user studies: the first is a qualitative ethnographic observational study of the contextual needs that smartphone users experience in their lives. It involved 8 participants. \n\nThe second study is a quantitative large-scale questionnaire where we aimed at generalizing the findings of the qualitative study to a larger population. Almost 400 people answered this questionnaire.\n\nWe deployed both studies in Spain.\n
  6. \n
  7. The study comprised three parts: the first was an initial interview where we gathered demographic information and explained the different aspects of the study. the participants were given a diary kit that I will show in the next slide. The second activity was the in-situ interview and observation. \n\nFinally, we conducted an interview in the participant's home to collect the diary and clarified some of the entries. \n\nAfter each interview we had a debriefing session with the team to highlight important parts of the interview.\n
  8. We complemented the contextual interview with a diary study that was often used in related studies to capture impromptu needs of contextual services and applications. Diary studies have the advantage that they help participants reflect and document their experiences when the researcher is not there. They also provide a more longitudinal depth to the study. In our case they provided accounts for needs that spanned over three weeks.\n\n> in this picture you can see the kit that we gave to participants. They could use both a paper diary and a video diary because we felt that these two modalities could complement each other (one is faster, the other is more discreet). The other elements of the kit are ...\n
  9. 10. So, we used an external recruitment agency to enroll 10 participants. Two dropped out in the middle of the study for personal reasons. We gave the agency a pretty detailed screener. We were looking for people that were both power users of smartphones and beginners. We looked also at whether they had previous experience with any AR application and location-based services. Again, we tried to have a good mix of both. \n\nWe balanced the sample in terms of male and female because we felt that gender could play a role especially for location-based services. \n
  10. 12. Due to time constraints we had to create two teams for the field work: we asked help of two local facilitators that conducted the interviews and that were native in Spanish. We prepared a moderator script to make sure we were not forgetting any important point and to make the sessions run more smoothly.\n\n> here is a picture taken in the field. This is the subject that was going shopping in this mall and behind the facilitator.\n
  11. The participants produced 116 diary entries (median 15). They also produced about 6 hours of video diary entries. We also collected several hours of interview recordings. \nAll this multimedia material was analyzed and categorized. Interview notes were transcribed and annotated with relevant pictures and extra information that was extrapolated from the debriefing sessions. \n\nThe different contextual needs participants thought about during the field study were organized into recurring contextual needs. We developed the categories of the code by looking at the diary entries, and the interview notes. Overlaps between the categories was clarified to make sure entries fell uniquely into one category. \n
  12. 22. I joined effort with another colleague UX Res, who helped me develop a coding scheme for the different contextual needs participants thought about during the field study. We developed the categories of the code by looking at the diary entries, and the interview notes. Overlaps between the categories was clarified to make sure entries fell uniquely into one category. \n\n Using the same technique, we could identify 9 barriers for adoptions of contextual services.\n\n> here you can see an excerpt of the coding scheme.\n
  13. 24 contextual needs emerged from this exercise. We organized them according to the 4 contextual dimension that was suggested by the related literature.\nThe majority of the needs that we could observe in our dataset belonged to the spatio-temporal dimension (8 entries) and to the social and personal dimension (6 entries), while we could observe only 4 needs in the data that belonged to the activity dimension.\n\nParticularly [click] these contextual needs were not identified by previous work on mobile information needs.\n
  14. Example. We named this category of contextual needs “social awareness” because participants expressed the need of monitoring what their friends were doing. \n
  15. Using the same technique, we could identify 9 barriers for adoptions of contextual services. \nHere, some reasons dealt with the quality/quantity of the data provided by the service (B1, and B6, table 2), or the way private information was handled (B2). Other reasons focused on the interaction design of the service (B4, B5, and B8) that did not correspond to the users’ needs. Finally, some reasons focused on the lack of inclusion of the service in the ecology of routines and technological artifacts already in use in the users’ daily lives.\n\n
  16. Example. Many participants reported the fact that they did not trust either the information provided by the service or the company that was operating the service. \n\nIn the quote one of the participants was explaining that many of the recommendations left in Around Me about Barcelona are not useful for citizens of the city because people living in Barcelona usually avoid touristic places.\n
  17. To summarize, this is what we found. We observed 24 contextual needs. We do not argue that this list is complete as our study was exploratory with a limited sample and a short observation period. \n\nWhile for many needs the goal is that of increasing personal knowledge about things (e.g., weather forecast) –that is the informational nature Church and Smyth talk about [3]– other needs have different goals, for instance supporting a physiological function.\n\nThis scheme helped us understand that not all the contextual needs that we identified were covered by previous studies. Finally, we observed 9 barriers for adoption.\n
  18. \n
  19. Findings from this study extend those obtained in study 1. Particularly, we found that participants considered contextual needs derived from basic human needs as more important than those derived from high-level human needs. \n\nMoreover, the frequency with which participants currently address these needs is inversely proportional to their level of importance. These results might be related to the fact that participants lived in a developed country and therefore had a somewhat privileged socio-economical status (e.g., only 11% unemployed, 98% finished at least secondary school, 99% own at least one mobile phone, 95% use computers every day, etc.).\n
  20. Also, we were interested in understanding how these contextual needs mapped to the more general human needs. To do that we referred to psychological theories of human motivation. Particularly, we referred to Maslow's theory of human needs. [explain] \n\nMaslow’s theory is often represented with a pyramid. It says that human needs can be organized in 5 hierarchical levels. For an individual to express needs in the upper part of the pyramid, the most basic needs have to be satisfied.\n\nWithout going into much details, [click] Maslow's theory helped us understand that most of the needs participants referred to during the field work, were associated to high-level human needs. \n
  21. This result could be red in two different ways: [click] on one hand this means that if you want a contextual app to be successful in developed countries then you have to focus on needs in the upper part of the pyramid. \n\n[click] On the other hand, if you are developing an contextual app for an emerging market, then you have also the opportunity to focus on the lower part of the pyramid.\n
  22. This result could be red in two different ways: [click] on one hand this means that if you want a contextual app to be successful in developed countries then you have to focus on needs in the upper part of the pyramid. \n\n[click] On the other hand, if you are developing an contextual app for an emerging market, then you have also the opportunity to focus on the lower part of the pyramid.\n
  23. I do not have time to explain the details the design of the questionnaire and the rest of the findings. However, I want to spend one minute to talk about one of the most important outcomes: a quantitative relationship between the barriers for adoptions. Using this information designers and developers of contextual services can prioritize budget and resources to increase the popularity of a service and the users' satisfaction. \n
  24. If you are part of a development team you can use this information to prioritize results. Using this information, a Product Manager could see that, privacy issues are generally considered more important than the difficulty of using the system, for instance and s/he could decide to give special attention to the privacy treats entailed by the services under development.\n
  25. I would like to conclude this presentation with three implications for design.\n
  26. When we looked at the percentage of time that participants satisfied their contextual needs by means of their mobile phones, we found activity and personal-related needs to be the least satisfied. However, the contextual needs in these two dimensions were pervasive in the lives of our first study participants. \n\nIn 20% of the cases, participants reported not liking existing applications in these two dimensions. Hence, our findings suggest that there is a need – and an opportunity – for novel mobile contextual applications that fulfill needs in the activity and personal dimensions. For example, a mobile application that monitors their users’ physiological state while exercising and helps them achieve pre-defined exercise goals [16].\n
  27. Just to expand the information presented in the previous slide, if you look at the current panorama of contextual applications, these two areas are usually under-represented. \n\nHowever, we found evidences that support the development of applications that use contextual information from these two dimensions.\n
  28. Second implication. \n\nThe reality today is that there are limited tools for feature phone application development, there is no application store and feature phone typically have more limited computation and sensing capabilities when compared to smartphones. At the same time, the vast majority (about 90% [20]) of mobile users in the world – and particularly in developing countries – use feature phones. \n\nHence, there is a need and an opportunity to develop intelligent contextual applications for feature phone users. One idea would be to move the applications’ intelligence to the cloud, thus bypassing the phones’ limited computational power. For example, simple location-based services could compute the approximate location of the users by looking at the closest BTS that (s)he is connected to.\n
  29. Third implication. \n\nIn developing countries, a big part of the population is still fighting to satisfy their basic needs (e.g., safe food, basic health, safety, etc.). Given that most of them do have a feature phone, the challenge would be to not only build a smart device whose cost should be comparable with that of a feature phone, but also to develop contextual applications that could address more basic human needs. For instance, we can think about a service to map contaminated wells through user-generated content, or an application to share recipes to prepare well balanced baby-food from nutrients available in local markets. \n\nWe plan to focus on these challenges as part of our future research agenda.\n
  30. Let me conclude by acknowledging my colleagues at Barcelona Media and at Telefonica Research that were instrumental to the development of this research.\n
  31. Thanks.\n
  32. \n