Thursday, May 1, 2008

CAPTCHA broken?

A classic problem of digital deception is determining whether an entity is a computer or a human. The most famous test was the Turing test. More recently, CAPTCHAs (or Completely Automated Public Turing Test to Tell Computers and Humans Apart) have been used to ensure that a user is a human and not a computer. They do this by displaying letters against a cluttered visual background that makes automated optical resolution difficult. But, in the article here, reports indicate that spammers have broken CAPTCHAs. Chalk up another form of digital deception.
--Jeff

Monday, April 7, 2008

More relevant news - Men more likely fooled by Interent Fraud

According to this blog, a report by the Internet Crime Complaint Center also came out the day of the workshop (I couldn't find the actual report) - men more likely than women to be fooled by Internet fraud...by a lot (for every $1 lost by females, $1.67 was lost by males).

our posters...

Here's Will's pictures of the posters from the afternoon....(ok, not yet - wifi issues...)

Great Workshop!

Hi all,

We had a great time yesterday - the talks were fantastic and the people even better. I think we've started an important community and made some key connections. Plus, that dinner....!

A few things:

1. the poster session for the workshops is Tues at 10.30

2. Adam will post some pictures from the workshop

3. It seems like everyday brings a relevant news story. Here's one related to secrets I saw in the New York Times after dinner.

I'll work on making this blog a repository for readings and other resources.

--Jeff, Adam and Pam

Sunday, April 6, 2008

From Simeon Yates

Every time I send an e-mail, make a phone call or talk to a colleague I lie – then again we all do. That is if we mean by ‘lying’ that we make statements, assert facts that are not ‘true’ or in fact fail to state things. It is a well-established feature of all interaction that we avoid having to make, or causing others to have to make, ‘accounts’ – see the Conversation Analytic and Discursive Psychological work on ‘accounts’ – they tend to mark out points of ‘trouble’ in on-going interaction and we tend to avoid this for the sake of interactional expediency – except for when we don't….

I could make an account of why I am doing this on the night before the workshop that lists – work pressures, having just been on leave, family issues etc. But as no one nor the structure of the interaction on the blog required me to do so I am not (well I have a bit…). Excessive accounts often lead to problems as they break Grice’s rules and raise issues of Relevance.

It is easier to send the e-mail saying ‘job nearly done’ (even if you are still working furiously away) than send the long explanation of why it is still being done. It is easier to say ‘cant make it tonight busy with work’ in an SMS (even though you are not doing anything) rather than explain the complexities of give and take with a partner that keep your relationship healthy and therefore the need to be at home… I will of course put a positive spin on an issue if I am trying to persuade (even if I may feel down that day, or in truth the issue is pretty dire). I may express annoyance at someone or something as part of a strategy to deal with a problem at work.

In one sense I am keeping secrets (not revealing information) and telling lies (not being fully open) but this is the nature of interaction – without this it would all fall down. The interesting thing for me is the new resources digital media provide for doing this everyday interactional work.

My favourite examples – many of which I have done myself – come from media choices in ongoing interaction. Why an SMS or e-mail rather than a phone call? Why a phone call rather than a meeting. Often this is about limiting the bandwidth, or making the interaction written and formal; in order to prevent the awkward questions, the probing, the chance the ‘face’ might slip, which face-to-face often risks.

In our work on mobile use we have found evidence of complex face management games as well as identity play which rely on the ability to control the information ‘given off’ (as Goffman would say) in an interaction. In the end this is what digital media change. Some, like SMS and e-mail allow us to undertake private interaction in public, others like Facebook risk making our private things public. This is what fascinates me – the cleverness with which we all use the features (affordances?) of the medium to do social and interactional work, and at the same time how this makes me reflect on the social science, communications studies and linguistic theories of interaction.

Simeon Yates...See you all tomorrow.

Secrets of real estate

This is a pretty mundane secret, but it *is* something that occurred this week. I sold my house n Tuesday, and there is a lot of secrecy about pricing--you don't want to let the other party know what your lowest acceptable price is.
When coming up with an asking price, the real estate agent uses an archive of listings in the neighbourhood; given that one lives there, you can easily find out what various neighbour's housea are worth, which is traditionally not a polite question. Also, because a lot of this information (homeowner) is in databases, you can build up a profile of the neighbourhood --who lives where--even for those whose names you don't know. The city of St. John's (Newfoundland), for instance, keeps full maps with homeowner(s) of record listed online, so you can basically look up each house on the street and find out who owns it; kind of like a reverse directory, but with maps.
Again, this information was traditionally available in some sort of public archive, but it's very easy to get online, so doing very gentle "snooping" is very easy.

Wednesday, April 2, 2008

Keeping secrets

An example of a set of secrets I have hidden for 15 years are a series of online discussions which I collected as part of my PhD data. In those days before social networking, very basic asynchronous computer conferencing was used for my participants to discuss a controversial topic online (rape). I was looking for instances of flaming and self-disclosure and boy did I get some! The topic stimulated some very revealing comments, many about personal experiences of rape / assault and many personal views on the motives and reactions to rape.
Obviously, I have kept these to myself, however I now know many of my participants! and none of them have ever mentioned my study (they have either forgotten my name or do not want to relate the experience...). In those early days, there were not that many people who (a) were using online communication and (b) had the technical skills and time to take part in my longitudinal study. Therefore the sample was made up of a certain type of participant and most have gone on to become established researchers or lecturers in the areas of psychology, media and/or ICT.
Therefore, perhaps a question which I could raise here or at the workshop relates to ethics and the protection of the researcher [as well as participant] as a result of having knowledge of a crime committed or knowledge of a set of extreme views held my someone else.
Look forwrad to seeing you on Sunday....Jacqui

Friday, March 28, 2008

Some thoughts about my outlook calendar

My thinking on this is perhaps more mundane, but I'm fascinated by the information that lives on my outlook calendar. This calendar is accessible to a number of individuals across the university and so among other things, it tells senior staff and colleagues what I'm up to. I don't explicitly tell lies on my calendar, but I am capable of duplicity ... so that if, for example, a lengthy meeting is subsequently cancelled, I'm quite likely to breathe a sigh of relief, knowing that I can get on with work, but that others will not be interrupting me. Of course I can block out time on my calendar (as I do with big 'keep free' signs), but somehow the secret spaces that develop from cancelled events etc seem more precious to me!

Thursday, March 27, 2008

What am I doing now?

I'm going to argue that what I'm doing right now (as you read this) is an online secret. (It's not, just for the record, anything incriminating. Or at least probably not :) ).

Chances are pretty good that I'm not far from my computer, so you may be able to get some cues about what I'm doing from it. If I'm on your AIM, MSN or Skype buddy list, that'll tell you if I've used my keyboard recently. Google's chat app might tell you the same thing, and I may also have recently updated my status line there. If I'm teaching class on certain days and you're bored enough to watch my Yahoo live channel, you might be able to see video of what I'm doing. Or possibly a still image of what I was doing the last time I logged in. And my Facebook status might also provide you with some information.

Even with all of that, though, you'd have a hard time guessing what I'm doing right now. Care to try? And that's probably a good thing. I don't know most of you and there's little reason for you to have this information.

There may be times, though, when I do want you to know what I'm doing. Or at least have enough information to let you see that I have a minute to chat or that I'm scrambling toward the CSCW deadline and don't want to talk about anything not related to that. And there may be times when I want you to think I'm scrambling toward the CSCW deadline, but am actually out drinking with my friends (possibly even complaining about what a lousy co-author you are :) ).

These are truths, secrets and lies related to interpersonal awareness. And they're my motivation for participating in this workshop.

An IM infatuation Turned to Romance. Then the Truth Came Out

So, the majority of lies, including those online, seem to be pretty small and non-consequential. But, every once and a while we hear of incredible and terrible ones. This article from WIRED about an online romance gone bad is one of these - in the end it turns out that the only person involved that wasn't lying about their realspace identity was the one who ended up dead. There's a moral here.

Tuesday, March 25, 2008

Gold Sellers Hold Account Hostage -- Really?

WoW Insider, a prominent World of Warcraft blog, recently reported on a story of a player whose World of Warcraft account was hacked and held hostage by gold sellers. A short snippet from the original article explains the situation.


As John tells us, the guild was gathering around for another regular and fun day of game play. Things were going fine until all of the sudden one of their guild mates logged on and started acting weird. This was the first sign something was wrong. The second was when the people playing the guild mate's account started demanding gold in return for returning the character to the owner.

The gold sellers effectively held the account hostage until the guild ponnied up the ransom. John doesn't tell us if they complied, so we'll all have to guess. What is interesting here is the tactics employed by the gold spammers. If they are actually doing this, then they have gotten quite desperate in their attempts to get easy and quick gold.



To me, the most amazing part of this story is that everyone banded behind John and believed that his account was hacked. What if John was deceiving his entire guild for great personal gain? Why would gold sellers be willing to invest so much personal time and risk into a hostage situation that is likely to end in little reward? A phone call to Warcraft customer service would shut this situation down in a few minutes. The article claims that gold sellers are getting desparate, but the price of Warcraft gold on the grey markets has been consistent for months. In the past gold sellers have resorted to raising prices when their gold supply diminishes (or when demand increases). I doubt the gold seller situation has changed so drastically that they're resorting to extreme hostage situations.

Did John deceive his guildmates? How can his colleagues tell if they're being deceived? If John deceived guildmates, why was it so easy to get dozens of people to support him with such minimal effort? These are the types of questions I would like to flesh out during the workshop.

Monday, March 17, 2008

Preferred outcomes from workshop?

We (the organizers) are beginning to think about ways ahead after the workshop. One option is to have an edited book of with chapters by the position paper authors...we've already begun initial discussions with one publisher. The other option is to push for a special issue of a journal (like, for instance, IJHCS). There are plusses and negatives for each route - the advantage of a book is that there is more support (e.g. for editing, indexing), and it is more likely to be read (and cited) and used in class. But, it also takes quite a long time to come out, and before you know it there's a $40 charge added to it. Special issues of journals can take just as long to come out, although there's the added academic kudos (but often fewer readers...)

Do you have a preference - edited book or special issue? And why....

Sunday, March 16, 2008

Game of on-line buying

When planning my trip to Florence I found out that RyanAir, one of those cheap European airlines, flies between Eindhoven, NL (where I live) and Pisa (80 km from Florence) and it offers rather inexpensive tickets - about 60 Euro both ways. Sounds good? Obviously if something sounds too good to be true it probably is;)))) The fact that airport taxes are always hidden is already common knowledge. I was also not that shocked seeing additional charge for use of a credit card for my payment. But I was really surprised to see that not only I can take no more than 15 kg luggage (which is not so much of a problem) but also that I have to pay additional 26 Euro if I want to check my luggage in. And thinking of all those restrictions regarding liquid transportation it is sure money for the airlines neatly hidden deep into the booking process only after you really made up your mind about purchasing the ticket. On the top of all that RyanAir insists on paying additional money for travel insurance 'threatening' that if something happens to the plane and you don't have their insurance they cannot be made liable. So, my initial 60-euro ticket was nicely getting the price of about 200-euro by the time I got to the end of the booking procedure.

There are some discussions going on in the European Union commissions regarding new policies prohibiting hiding any additional charges of the flight tickets. It seems like the companies like RyanAir start smelling the possible consequences of those discussions and run for last quick shot of easy money. Why easy? I guess that if you have already made up your mind about taking that particular flight you are very likely to decide to pay the additional 20 - 30 Euro just to avoid the hustle of searching for a new connection and possibly replanning your trip. It is also very likely that this ticket is still the cheapest possible option anyway. But such an unfair process of finding out what the real price of the ticket is makes one feel cheated, pretty badly cheated, to be honest. The sequential booking process easily allows for such a trick - you need invest time to go from one page to the other and at the end of this process you are too tired to fight the system. Cheap airlines is just one example of such "ambiguous" procedures that make people feel mistreated. Would you think of similar examples (like small print policies) making a straightforward buying process feel like a game which rules are known only to guys who made them?

Thursday, March 13, 2008

Inadvertent revelations

I study plausible deniability, when we deliberately make our actions ambiguous in such a way so that other people can't know our true motivations for doing something. How do we design software systems to support or deny certain types of plausible deniability? What do people choose to hide and how do people use software to do it?

Plausible deniability is a fascinating topic but not one very conducive to research because if people don't want to reveal their intentions to anyone, they definitely don't want to reveal it to researchers. However, sometimes people can slip up and reveal more than they intend to, especially if their understanding of how software works is at odds with reality.

On Facebook, people can write notes and "tag" certain friends to appear alongside the note. When viewing the notes, the order which people appear on the tagged friends list is the order in which they were added. They shouldn't be, and nobody is aware they are, but thats how the system was programmed. Looking at the order in which people are tagged reveals some fascinating internal motivations. In many cases, 2 or 3 people will be tagged first, then the rest of the list will proceed in alphabetical order of last name. Those 2 or 3 people, they were the ones who the author really want to read the note, but they didn't want those people to know they were the ones the note was intended for. So how do you plausibly deny this? You go back through your friends list and add a whole bunch of other people and now your intention is hidden. Except, in this case it wasn't, the system was not well designed for plausible deniability.

The question I want to ask is, as researchers, how do we go ahead and study plausible deniability? Once you become aware of it, you start to see plausible deniability everywhere. It's such an important part of normal human interaction that we must account for it in software design. But the frustrating thing is that plausible deniability is, well... plausible. They *could* not want to pretend not to have seen your email and claim the spam filter ate it, or maybe the spam filter really did eat it. It's only when plausible deniability goes wrong that you can conclusively proves that it exists. So what is a poor researcher to do?

Friday, March 7, 2008

An example I use in class...

This is an example of a discussion about a product that raises issues about the authenticity of the author...and also how quickly any posting viewed as inauthentic is challenged....from memory, it came from a gadget discussion site..

XXXXX @ Nov 14th 2006 3:22PM

My girlfriend and I both bought zunes today at Best Buy. After we installed the software (worked flawlessy on xp pro on both our notebooks). We started downloading the crap out of the marketplace with our subscriptions. I just met her a hour ago at a coffee shop and we sent each other some songs to test everything out. A bunch of people kept asking us what we were using and what the hell we were doing. It was pretty cool. I am not a big fan of the 3 x 3 plan, but if you have the subscription package on marketplace, its not a big deal at all since all songs are free (just your $15 fee per month)

XXX @ Nov 14th 2006 4:10PM

I don't wanna hate the Zune. Really, I don't. Even still, you can't tell me someone other than Bill Gates is signing your paycheck. I don't believe one word of your post.

XXX @ Nov 14th 2006 7:54PM

XX, ummm, so if someone has a good experience with a Zune, they must be lying and being paid by MS? Come on, it is possible, and probably likely, for consumers to have a positive experience.

XXXX @ Nov 14th 2006 10:08PM

Hmmm....

Smells funny. Me thinks you are working in Redmond alot these days. Something smells brown and its not your Zune my friend.

Thursday, March 6, 2008

Welcome

Welcome to the Secrets and Lies CHI 2008 Blog.

We'll be posting examples of secrets and lies (and "not sure's") here in preparation for the workshop.

Here is the Secret and Lies homepage where you can view the invited papers and authors.

--Adam, Jeff and Pamela