Abstract
Throughout their lives, people gather contacts on their mobile phones. Some of these are unused contacts—contacts that have not been used for a long time and are less likely to be used in future calls. These contacts compete for the users’ attention and the mobile phone’s limited screen capacity. To address this problem, we developed a prototype contact list interface called DMTR, which automatically demotes unused contacts by presenting them in a smaller font at the bottom of the contact list. In phase I of this research, we asked 18 participants to assess for how long they had not used each of their mobile phone contacts. Results show that 47% of all their contacts had not been used for over 6 months or had never been used at all. In phase II, we demoted these unused contacts using DMTR and asked our participants to locate contacts that they had recently used, with and without the prototype. Results indicate that the use of DMTR reduced both the number of key strokes and the retrieval time significantly. The majority of participants indicated that it was easier for them to access their contacts using DMTR and that they would like to use it in their next mobile phone. The results provide strong evidence for the demotion principle suggested by the user-subjective approach.
Similar content being viewed by others
Notes
References
Kwasnik BH (1991) The importance of factors that are not document attributes in the organization of personal documents. J Document 47:389–398
Malone TW (1983) How do people organize their desks? Implications for the design of office information systems. ACM Trans Office Inf Syst 1:99–112
Whittaker S, Hirschberg J (2001) The character, value, and management of personal paper archives. ACM Trans Comput Hum Interact 8(2):150–170. doi:10.1145/376929.376932
Barreau DK, Nardi BA (1995) Finding and reminding: file organization from the desktop. SIGCHI Bull 27(3):39–43
Bergman O, Whittaker S, Sanderson M, Nachmias R, Ramamoorthy A (2010) The effect of folder structure on personal file navigation. J Am Soc Inf Sci Technol 61(12):2426–2441
Henderson S, Srinivasan A (2009) An empirical analysis of personal digital document structures. Paper presented at the HCI international, San Diego, CA, USA
Fisher D, Brush AJ, Gleave E, Smith MA (2006) Revisiting Whittaker and Sidner’s “email overload” ten years later. In: Paper presented at the proceedings of the 2006 20th anniversary conference on computer supported cooperative work, Banff, Alberta, Canada
Whittaker S, Sidner C (1996) Email overload: exploring personal information management of email. In: Proceedings of the SIGCHI conference on human factors in computing systems: common ground. ACM Press, Vancouver, British Columbia, Canada, pp 276–283
Whittaker S, Jones Q, Terveen L (2002) Contact management: identifying contacts to support long term communication. In: Conference on computer supported cooperative work, pp 216–225
Bellotti V, Dalal B, Good N, Flynn P, Bobrow DG, Ducheneaut N (2004) What a to-do: studies of task management towards the design of a personal task list manager. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Vienna, Austria
Czerwinski M, Horvitz E, Wilhite S (2004) A diary study of task switching and interruptions. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Vienna, Austria
Kalnikait V, Whittaker S (2008) Cueing digital memory: how and why do digital notes help us remember? In: Paper presented at the proceedings of the 22nd British HCI group annual conference on HCI 2008: people and computers XXII: culture, creativity, interaction—vol 1, Liverpool, United Kingdom
Bergman O, Beyth-Marom R, Nachmias R (2008) The user-subjective approach to personal information management systems design—evidence and implementations. J Am Soc Inf Sci Technol 59(2):235–246
Boardman R, Sasse MA (2004) “Stuff goes into the computer and doesn’t come out”: a cross-tool study of personal information management. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, Vienna, Austria, pp 583–590
Bhamidipaty A, Deepak P (2007) SymAB: symbol-based address book for the semi-literate mobile user. Lect Notes Comput Sci 4662:389–392
Böcker M, Suwita A (1999) Evaluating the Siemens C10 mobile phone—beyond “quick and dirty” usability testing. In: HFT’99, Copenhagen, Denmark
Klockar T, Carr D, Hedman A, Johansson T, Bengtsson F (2003) Usability of mobile phones. In: The 19th international symposium on human factors in telecommunications, Berlin, Germany, pp 197–204
Gaur S (2008) Mobile phone contact. In: Ylä-Jääski A, Takkinen L (eds) Technical reports in computer science and engineering. TKK
Rhee Y, Kim J, Chung A (2006) Your phone automatically caches your life. Interactions 13(4):42–44. doi:10.1145/1142169.1142196
Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone’s contact book to support mobile awareness and collaboration. In: Paper presented at the proceedings of the 7th international conference on human computer interaction with mobile devices and services, Salzburg, Austria
Brown B, Randell R (2004) Building a context sensitive telephone: some hopes and pitfalls for context sensitive computing. Comput Sup Coop Work 13(3–4):329–345. doi:10.1007/s10606-004-2806-4
Tolmie P, Pycock J, Diggins T, MacLean A, Karsenty A (2002) Unremarkable computing. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems: changing our world, changing ourselves, Minneapolis, Minnesota, USA
Jung Y, Anttila A, Blom J (2008) Designing for the evolution of mobile contacts application. In: Paper presented at the proceedings of the 10th international conference on human computer interaction with mobile devices and services, Amsterdam, The Netherlands
Jones W (2004) Finders, keepers? The present and future perfect in support of personal information management. First Monday 9(3)
Shneiderman B, Plaisant C (2010) Designing the user interface: strategies for effective human-computer interaction, 5th edn. Addison-Wesley Publ. Co., Reading
Bergman O, Beyth-Marom R, Nachmias R (2003) The user-subjective approach to personal information management systems. J Am Soc Inf Sci Technol 54(9):872–878
Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision making under risk. Eugene, Ore
Bergman O, Tucker S, Beyth-Marom R, Cutrell E, Whittaker S (2009) It’s not that important: demoting personal information of low subjective importance using GrayArea. In: CHI 2009 conference on human factors and computing systems, Boston, USA
Abrams D, Baecker R, Chignell M (1998) Information archiving with bookmarks: personal Web space construction and organization. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press/Addison-Wesley Publishing Co., Los Angeles, CA, pp 41–48
Kirk D, Sellen A, Rother C, Wood K (2006) Understanding photowork. Paper presented at the SIGCHI conference on human factors in computing systems, Montreal
Neisser U (1964) Visual search. Sci Am 210(6):94–102
Treisman A, Gelade G (1980) A feature-integration theory of attention. Cogn Psychol 12:97–136
Tungare M, P′erez-Qui˜nones M (2008) Thinking outside the (beige) box: Personal information management beyond the desktop. Paper presented at the PIM workshop at CHI 2008, Florence, Italy
Acknowledgments
We thank our participants for their time and efforts. This research was partially funded by the European Union Marie Curie Grant, PERG-GA-2009-248997.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bergman, O., Komninos, A., Liarokapis, D. et al. You never call: Demoting unused contacts on mobile phones using DMTR . Pers Ubiquit Comput 16, 757–766 (2012). https://doi.org/10.1007/s00779-011-0411-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-011-0411-3