Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/1531407.1531424guideproceedingsArticle/Chapter ViewAbstractPublication Pagesbcs-hciConference Proceedingsconference-collections
research-article
Free access

Bluetooth friendly names: bringing classic HCI questions into the mobile space

Published: 03 September 2007 Publication History

Abstract

We explore the use of Bluetooth friendly names within the mobile space. Each Bluetooth-enabled device possesses a short string known as a 'friendly name' used to help identify a device to human users. In our analysis, we collected friendly names in use on 9,854 Bluetooth-enabled devices over a 7-month period. These names were then classified and the results analysed. We discovered that a broad range of HCI themes are applicable to the domain of Bluetooth friendly names, including previous work on personalisation, naming strategies and anonymity in computer mediated communication. We also found that Bluetooth is already being used as a platform for social interaction and communication amongst collocated groups and has moved beyond its original intention of file exchange.

References

[1]
Baumann, S., Jung, B., Bassoli, A. and Wisniowski, M. BluetunA: let your neighbour know what music you like. In Extended Abstracts of Conference on Human factors in Computing Systems (CHI '07), (San Jose, USA, April 2007). ACM Press, New York, NY, 1941--1946.
[2]
Bechar-Israeli, H. (1995) From <Bonehead> to <cLoNehEAd>: Nicknames, Play, and Identity on Internet Relay Chat, Journal of Computer-Mediated Communication, 1, 2 (Sept. 1995).
[3]
Bialoglowy, M. Bluetooth Security Review, Part 1. (Apr. 2005) Retrieved from: http://www.securityfocus.com/infocus/1830
[4]
Bluetooth SIG. Bluetooth Technology in Hands of One Billion. (Nov. 2006) Retrieved from: http://www.bluetooth.com/Bluetooth/SIG/Billion.htm
[5]
Carroll, J. M. What's in a Name? An Essay in the Psychology of Reference. W. H. Freeman and Company, New York, 1985.
[6]
Eagle, N. and Pentland, A. (2005), Social Serendipity: Mobilizing Social Software. IEEE Pervasive Computing, Special Issue: The Smart Phone. (April-June 2005), 28--34.
[7]
Gwet, K. Handbook of Inter-Rater Reliability, Gaithersburg, StatAxis Publishing, 2001
[8]
Jaffe, J. M., Lee Y. E., Huang, L. and Oshagan H. Gender, Pseudonyms, and CMC: Masking Identities and Baring Souls. Paper presented at the Annual Conference of the International Communication Association, (1995) Albuquerque, New Mexico. Available: http://research.haifa.ac.il/~jmjaffe/genderpseudocmc/.
[9]
Kiesler, S., Siegel, J., and McGuire, T. W. Social psychological aspects of computer-mediated communication. American Psychologist, 39, 10 (1984), 1123--1134.
[10]
Kruger, J., Epley, N., Parker, J. & Ng, Zhi-Wen (2005) Egocentrism Over Email: Can We Communicate as Wellas We Think? Journal of Personality and Social Psychology, 89, 6, (2005), 925--936.
[11]
Nokia Europe. Nokia Sensor. (2005) Retrieved from: http://europe.nokia.com/A4144923
[12]
Pitman, J. A. and Payne S. J. Creating names for retrieval by self and others. Behaviour & Information Technology, 25, 6 (Nov. - Dec. 2006), 489--496.
[13]
Rice, R. E. The New Media: Communication, Research, and Technology. Beverly Hills, CA, Sage, 1984.
[14]
Rice, R. E. Issues and concepts in research on computer-mediated communication systems. In J. A. Anderson (Ed.), Communication Yearbook 12 (pp. 436--476). Newbury Park, CA, Sage, 1989.
[15]
Solon, A. and Callaghan, M. (2006) Case Study on the Bluetooth Vulnerabilities in Mobile Devices. IJCSNS International Journal of Computer Science and Network Security, 6, 4 (April 2006), 125--129.
[16]
Sproull, L., and Kiesler, S. Connections: New Ways of Working in the Networked Organization. Cambridge, MA MIT Press, 1991.
[17]
Thom-Santelli, J., Ainslie, A. and Gay, G. Location, location, location: a study of bluejacking practices. In Extended Abstracts of Conference on Human factors in Computing Systems (CHI 2007), (San Jose, USA, April 2007). ACM Press, New York, NY, 2693--2698.

Cited By

View all
  • (2013)Inferring social activities with mobile sensor networksProceedings of the 15th ACM on International conference on multimodal interaction10.1145/2522848.2522894(405-412)Online publication date: 9-Dec-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
BCS-HCI '07: Proceedings of the 21st British HCI Group Annual Conference on People and Computers: HCI...but not as we know it - Volume 2
September 2007
270 pages
ISBN:9781902505954

Publisher

BCS Learning & Development Ltd.

Swindon, United Kingdom

Publication History

Published: 03 September 2007

Author Tags

  1. Bluetooth
  2. friendly name
  3. mobile computing
  4. mobile phones

Qualifiers

  • Research-article

Acceptance Rates

Overall Acceptance Rate 28 of 62 submissions, 45%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)12
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Inferring social activities with mobile sensor networksProceedings of the 15th ACM on International conference on multimodal interaction10.1145/2522848.2522894(405-412)Online publication date: 9-Dec-2013

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media