Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Migrated to Confluence 4.0

...

  • Use their mobile phones very frequently to communicate with others
  • Have to deal with sensitive information on a regular basis
  • Concerned with Privacy, but not with the technical details of how to be secure
  • Concerned about Personal Safety

User Classes

Message Sender

Message Receiver

Task Analysis

...

Task

Goal

Frequency

Effort

Pitfalls

Others Involved

Manage Contacts Add contact

To ensure the identity (or psudo-identity) of the intended recipient
other users and to communicate efficiently.

sometimes

medium

 

 


Indicates that the user
knows someone

The contact
(sometimes)

Communicate Find Public Conversations

To discuss a topic
securely while remaining
as anonymous as the user wishes.

semi- often

medium

potentially lots of information

 

Erase evidence of communication

Break contact or association

rarely

easy

unsafe (can't undo)

 

Group (closed) Conversation Actions

...

Task

...

Goal

...

Frequency

...

Effort

...

Pitfalls

...

Others Involved

...

Join

...

Join a group conversation

...

sometimes

...

medium

...

Requires the controller to add the user to the conversation

...

Remove oneself from a group

...

sometimes

...

easy

...

Unsafe (for security reasons, undo will be impossible).

...

 

...

Send

...

Send a message to a group

...

often

...

easy

...

Potential to send message to wrong person.

...

The group

...

Receive

...

Receive a message

...

often

...

none

...

 

...

The group

...

Log

...

Keep a log of messages

...

background

...

none

...

Some users may not want to be logged. Removal must be thorough.

...

 

Public Conversation Actions

...

Task

...

Goal

...

Frequency

...

Effort

...

Pitfalls

...

Others Involved

...

Join

...

Join a public conversation

...

sometimes

...

easy

...

 

...

Leave

...

Remove oneself from a public conversation

...

sometimes

...

easy

...

 

...

 

...

Send

...

Send a message to a public conversation

...

often

...

easy

...

Potential to send a private message to a public chat.

...

The receivers

...

Receive

...

Receive a message

...

often

...

none

...

 

...

The sender

...

Log

...

Keep a log of messages

...

background

...

none

...

Some users may not want to be logged. Removal must be thorough.

...

 

Expose information

Other people in
the conversation

Dissociate with a user
or erase records of a
conversation

To break contact or association with a contact
or group of contacts or erase any record of a
conversation.

rarely

fast

unsafe (can't undo)


Private (direct) Conversation Actions

Task

Goal

Frequency

Effort

Pitfalls

Others Involved

Send

Send a message to another person

often

easy

Potential to send message to wrong person.

The recipient

Receive

Receive a message

often

none

 

The recipient

Log

Keep a log of messages

background

none

Some users may not want to be logged. Removal must be thorough.

 

General Comments

  • Safety is very important--a user should always be certain of the level of privacy they're communicating with
  • Need connecting with people to be fairly easy to be adoptable
  • Most (if not all) actions will be preformed in private (probably a very clean, quiet environment) (according to the user in the second interview).
  • Where possible, tasks will mimic those in other chat applications. Where unique, tasks will include a short help text. In most cases, new users will be taught the basics by the person who introduced them to the application.
  • The frequencies are based on estimates given by the user in the second interview.

Interviews

Interview 1

This user works as a consultant and is constantly on the road. It is very important for him to be able to communicate with clients, co-workers, and to his family back at home, and he relies very much on his mobile devices to allow him to stay in touch and coordinate his life. In his line of work he frequently deals with sensitive corporate information. He ends up using two mobile devices -- a secure device dedicated to work, and a personal one for other purposes. He understands the need to keep client information secure but doesn't really understand all of the ways in which using an insecure device can actually be potentially harmful to his firm and/or himself. He would love to be able to deal with both work and personal tasks from a single application.

...