+ All Categories
Home > Documents > Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel...

Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel...

Date post: 22-Dec-2015
Category:
View: 212 times
Download: 0 times
Share this document with a friend
Popular Tags:
33
Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop
Transcript
Page 1: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Four Two Rants on Mobile Computing

Jason I. HongFeb 20 2007

Carnegie Mellon UniversityIntel Ultra-Mobile Devices Workshop

Page 2: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Two Rants on Mobile Computing

• Text input is terrible• Facing new privacy and security risks

• Cross-platform issues stifle wide-scale deployment• Conducting realistic user evaluations difficult

Page 3: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Rant #1 – Text Input is Terrible

• Standard phones– Multi-tap, 8-20 wpm, world record 29 wpm

– T9, ~20 wpm

• Special hardware– Twiddler, ~26-47 wpm (training)

• Pen– QWERTY, ~34 wpm

– IBM SHARK (pen), 60-70 wpm

• Stuck with ~20 wpm for near future

Page 4: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Rant #1 – Text Input is Terrible

• Observation: don’t have to support generic text input– Support input for tasks that are common when mobile

• inTouch – Leverage daily rhythms and real-time context

– Improve group awareness and messaging

• GurunGo– Use existing desktop web browsing activities

– Improve information retrieval while on the go

Page 5: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

inTouch: Mobile Group Coordination

• Goal: Better coordination for small mobile groups– Contextual awareness

– Contextual messaging

Page 6: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Project: InTouch

It’s 4:30pm and Mom is stuck in traffic

inTouch checks her calendar and sees she’s supposed to pick up Cindy from ballet

Page 7: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Project: InTouch

Mom’s phone senses that she is in a traffic jam, and automatically prepares a status message

Mom hits “send”, and Cindy sees that Mom is running late. Cindy decides to wait inside.

Page 8: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

inTouch: Mobile Group Coordination

• Using context to: – Select a message template

– Fill in the blanks (like a MadLib)

• When is contextual messaging useful?– Calendar alarms (“running late, will be there in <ETA>”)

– Current activity (“I’m in a meeting, done at <time>”)

– Daily rhythms (“Picked up kid ok” at 3PM)

– Messages received (“Where r u?” -> “I am at <place>”)

• Currently developing a working prototype

Page 9: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

GurunGo

• Goal: Make it easy to access useful information while mobile

• Observation #1: People still tend to print out online maps, despite having mobile device. Why?– Found it via desktop, easier to print than to copy to mobile

– Slow or expensive wireless connections

– Inconvenient form factor on mobile device

• Observation #2: People don’t do the same kind of web browsing on mobile phones as on desktops– Don’t have to support all information finding tasks,

just ones more likely to be done when mobile

Page 10: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

GurunGo Scenarios

• Idea: Tie mobile more closely with desktop

• You find an interesting product while browsing– Use GurunGo to copy-and-paste to mobile

– Augments with product reviews

– Copies to mobile

– Kept until explicitly deleted

• As you browse web on desktop:– GurunGo scans HTML for maps

– Generates speech-based directions

– Copies to mobile

– Directions eventually discarded after given time

Page 11: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

GurunGo Usage

• Acquire– Let people explicitly copy-and-paste info to mobile

– Let people implicitly copy info via regular web browsing• GurunGo scans pages seen for potentially useful stuff

• Augment– Look for known data types, make mobile data more useful

– Ex. Augment maps with speech-based directions

• Copy (to mobile in the background)• Browse

– Organize data based on common data types

– Street addresses, product comparisons, phone #s

Page 12: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

GurunGo: Speech-based Directions

Page 13: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Nice Features of GurunGo

• Reduces number of clicks to get to useful information– Can support specific information finding tasks while mobile

– Currently: Directions, products

– Future: Movies, phone #s, dates and times, recent emails

• Works even if you don’t have wide-area wireless– Works disconnected (no network or don’t want to pay)

– Only needs personal area network (Bluetooth)

Page 14: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Rant #2: New Privacy and Security Risks

• Mobile devices becoming intimate part of our lives– Mobile communication

– Mobile e-commerce

– Sharing location information with others

– Unlock doors in home

• Leads to lots of new risks– Mobile spyware (tracks location, already starting)

– Steal and punch thru corporate firewalls

– Device lost, embarrassment

Page 15: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

User Controllable Privacy and Security

• Goal: Make it easy for people to manage privacy and security policies for pervasive computing– Simple UIs for specifying policies

– Clear notifications and explanations of what happened

– Better visualizations to summarize results

– Machine learning for learning preferences

– Start with small evaluations, continue with large-scale ones

• Large multi-disciplinary team and project– Six faculty, 1.5 postdocs, six students

– Supported by NSF, CMU CyLab

– Roughly 1 year into project

Page 16: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Contextual Instant Messaging

• Facilitate coordination and communication by letting people request contextual information via IM– Interruptibility (via SUBTLE toolkit)

– Location (via Place Lab WiFi positioning)

– Active window

• Developed a custom client and robot on top of AIM– Client (Trillian plugin) captures and sends context to robot

– People can query imbuddy411 robot for info• “howbusyis username”

– Robot also contains privacy rules governing disclosure

Page 17: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Contextual Instant MessagingPrivacy Mechanisms

• Web-based specification of privacy preferences– Users can create groups and

put screennames into groups

– Users can specify what each group can see

Page 18: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Contextual Instant MessagingPrivacy Mechanisms

• Notifications of requests

Page 19: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Contextual Instant MessagingPrivacy Mechanisms

• Social translucency

Page 20: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Contextual Instant MessagingPrivacy Mechanisms

• Audit logs

Page 21: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

People Finder

• Location useful for micro-coordination– Meeting up

– Okayness checking

• Developed phone-based client– GSM localization (Intel)

• Conducted studies to see how people specify rules (& how well)

• See how well machine learning can learn preferences

Page 22: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Grey – Access Control to Resources

• Distributed smartphone-based access control system – physical resources like office doors,

computers, and coke machines

– electronic ones like computer accounts and electronic files

– currently only physical doors

• Proofs assembled from credentials– No central access control list

– End-users can create flexible policies

Page 23: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Some Early Lessons

• People don’t seem to think about things in terms of privacy and security, more of value proposition

• Need large network effects to study some things– Right now, only seeing small interesting results– Believe we will find interesting results with LOTS of people

• Machine learning seems promising• Social psychology issues

– Projecting a desired persona, plausible deniability

Cornwell, J., et al. User-Controllable Security and Privacy for Pervasive Computing. In the Proceedings of The 8th IEEE Workshop on Mobile Computing Systems and Applications (HotMobile 2007).

Page 24: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Other Rants (Briefly)

• Rant #3 – Cross-platform issues stifling wide-scale deployability– Symbian, Nokia, Palm, Windows Mobile, Blackberry

– All incompatible!

– J2ME only helps a little

– Severely limits deployability and usage of apps

• Rant #4 – Conducting realistic user evals difficult– Hard to do lab studies since (by definition) mobile

– Hard to observe while mobile

– Majority of people already have phones (contacts, phone#)

Page 25: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Summary

• Text input is terrible– Likely we will be stuck with 20wpm

– Leverage real-time context to support specific mobile information finding tasks rather than generic ones

• Facing new privacy and security risks– This may be an Achilles’ heel for pervasive computing

• Hard, and lots of devices to manage

– Our work looks at making it easy for people to specify, visualize, and manage their privacy and security policies

Page 26: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Backup Slides

Page 27: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Usability Issues

• ~20% of WiFi access points returned– People couldn’t figure out how to make it work

• My guess: ~80% of unsecured WiFi access points– When you are mobile, risk of eavesdroppers

– Computer security too hard to understand, too hard to setup

Page 28: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Usability Issues

• Phishing really really works– Exact numbers hard to find, but LOTS of people fall for them

• Semantic gap between us and everyday users– SSL, certificates, encryption, man-in-the-middle attacks

– But simple phishing is stunningly effective

• Observation: need security models that are invisible (managed by others) or extremely easy to understand

“Civilization advances by extending the number of operations we can perform without thinking about them.” - Alfred North Whitehead

Page 29: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Cultural Issues

• Browser Cookies– Originally meant for maintaining state

– Now a pervasive means for tracking people online

– Embedded in every browser, hard to change

• Observation: Security hard issue to wrap brain around– Hard to assess risk of low-probability event in future

– Adds to cost of development for uncertain benefit

– Thus, often done as an afterthought (ie too late)

Page 30: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Economic Issues

• Estimated cost of phishing in US is ~$5 billion• Solutions already exist

– Two-factor authentication– Email authentication

• But:– Non-computer scams ~$200 billion– Estimated cost of implementation > $5 billion

• Observation: Many solutions are out there, but: – Need to align needs of various parties (politics)– Need incentives (cost-benefit, law)

• Observation: Scammers getting more sophisticated– Market for scammers (setup + steal, mules, bookkeeping)– “Build it, and scammers will also come”

Page 31: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

No Secure Mobile Computing Soon

• Lots of important info on mobile devices• Usability issues• Cultural issues• Economic issues

IEEE Computer, Dec 2005“Minimizing Security Risks in Ubicomp Systems”Invisible Computing Column

Page 32: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

GurunGo: Product Reviews

Page 33: Four Two Rants on Mobile Computing Jason I. Hong Feb 20 2007 Carnegie Mellon University Intel Ultra-Mobile Devices Workshop.

Rant #2: New Privacy and Security Risks

This was just March 2006


Recommended