Skip to main content

Advertisement

Log in

You never call: Demoting unused contacts on mobile phones using DMTR

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

Throughout their lives, people gather contacts on their mobile phones. Some of these are unused contacts—contacts that have not been used for a long time and are less likely to be used in future calls. These contacts compete for the users’ attention and the mobile phone’s limited screen capacity. To address this problem, we developed a prototype contact list interface called DMTR, which automatically demotes unused contacts by presenting them in a smaller font at the bottom of the contact list. In phase I of this research, we asked 18 participants to assess for how long they had not used each of their mobile phone contacts. Results show that 47% of all their contacts had not been used for over 6 months or had never been used at all. In phase II, we demoted these unused contacts using DMTR and asked our participants to locate contacts that they had recently used, with and without the prototype. Results indicate that the use of DMTR reduced both the number of key strokes and the retrieval time significantly. The majority of participants indicated that it was easier for them to access their contacts using DMTR and that they would like to use it in their next mobile phone. The results provide strong evidence for the demotion principle suggested by the user-subjective approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. http://www.j2mepolish.org.

References

  1. Kwasnik BH (1991) The importance of factors that are not document attributes in the organization of personal documents. J Document 47:389–398

    Article  Google Scholar 

  2. Malone TW (1983) How do people organize their desks? Implications for the design of office information systems. ACM Trans Office Inf Syst 1:99–112

    Article  Google Scholar 

  3. Whittaker S, Hirschberg J (2001) The character, value, and management of personal paper archives. ACM Trans Comput Hum Interact 8(2):150–170. doi:10.1145/376929.376932

    Article  Google Scholar 

  4. Barreau DK, Nardi BA (1995) Finding and reminding: file organization from the desktop. SIGCHI Bull 27(3):39–43

    Article  Google Scholar 

  5. Bergman O, Whittaker S, Sanderson M, Nachmias R, Ramamoorthy A (2010) The effect of folder structure on personal file navigation. J Am Soc Inf Sci Technol 61(12):2426–2441

    Google Scholar 

  6. Henderson S, Srinivasan A (2009) An empirical analysis of personal digital document structures. Paper presented at the HCI international, San Diego, CA, USA

  7. Fisher D, Brush AJ, Gleave E, Smith MA (2006) Revisiting Whittaker and Sidner’s “email overload” ten years later. In: Paper presented at the proceedings of the 2006 20th anniversary conference on computer supported cooperative work, Banff, Alberta, Canada

  8. Whittaker S, Sidner C (1996) Email overload: exploring personal information management of email. In: Proceedings of the SIGCHI conference on human factors in computing systems: common ground. ACM Press, Vancouver, British Columbia, Canada, pp 276–283

  9. Whittaker S, Jones Q, Terveen L (2002) Contact management: identifying contacts to support long term communication. In: Conference on computer supported cooperative work, pp 216–225

  10. Bellotti V, Dalal B, Good N, Flynn P, Bobrow DG, Ducheneaut N (2004) What a to-do: studies of task management towards the design of a personal task list manager. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Vienna, Austria

  11. Czerwinski M, Horvitz E, Wilhite S (2004) A diary study of task switching and interruptions. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Vienna, Austria

  12. Kalnikait V, Whittaker S (2008) Cueing digital memory: how and why do digital notes help us remember? In: Paper presented at the proceedings of the 22nd British HCI group annual conference on HCI 2008: people and computers XXII: culture, creativity, interaction—vol 1, Liverpool, United Kingdom

  13. Bergman O, Beyth-Marom R, Nachmias R (2008) The user-subjective approach to personal information management systems design—evidence and implementations. J Am Soc Inf Sci Technol 59(2):235–246

    Article  Google Scholar 

  14. Boardman R, Sasse MA (2004) “Stuff goes into the computer and doesn’t come out”: a cross-tool study of personal information management. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press, Vienna, Austria, pp 583–590

  15. Bhamidipaty A, Deepak P (2007) SymAB: symbol-based address book for the semi-literate mobile user. Lect Notes Comput Sci 4662:389–392

    Article  Google Scholar 

  16. Böcker M, Suwita A (1999) Evaluating the Siemens C10 mobile phone—beyond “quick and dirty” usability testing. In: HFT’99, Copenhagen, Denmark

  17. Klockar T, Carr D, Hedman A, Johansson T, Bengtsson F (2003) Usability of mobile phones. In: The 19th international symposium on human factors in telecommunications, Berlin, Germany, pp 197–204

  18. Gaur S (2008) Mobile phone contact. In: Ylä-Jääski A, Takkinen L (eds) Technical reports in computer science and engineering. TKK

  19. Rhee Y, Kim J, Chung A (2006) Your phone automatically caches your life. Interactions 13(4):42–44. doi:10.1145/1142169.1142196

    Article  Google Scholar 

  20. Oulasvirta A, Raento M, Tiitta S (2005) ContextContacts: re-designing SmartPhone’s contact book to support mobile awareness and collaboration. In: Paper presented at the proceedings of the 7th international conference on human computer interaction with mobile devices and services, Salzburg, Austria

  21. Brown B, Randell R (2004) Building a context sensitive telephone: some hopes and pitfalls for context sensitive computing. Comput Sup Coop Work 13(3–4):329–345. doi:10.1007/s10606-004-2806-4

    Article  Google Scholar 

  22. Tolmie P, Pycock J, Diggins T, MacLean A, Karsenty A (2002) Unremarkable computing. In: Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems: changing our world, changing ourselves, Minneapolis, Minnesota, USA

  23. Jung Y, Anttila A, Blom J (2008) Designing for the evolution of mobile contacts application. In: Paper presented at the proceedings of the 10th international conference on human computer interaction with mobile devices and services, Amsterdam, The Netherlands

  24. Jones W (2004) Finders, keepers? The present and future perfect in support of personal information management. First Monday 9(3)

  25. Shneiderman B, Plaisant C (2010) Designing the user interface: strategies for effective human-computer interaction, 5th edn. Addison-Wesley Publ. Co., Reading

    Google Scholar 

  26. Bergman O, Beyth-Marom R, Nachmias R (2003) The user-subjective approach to personal information management systems. J Am Soc Inf Sci Technol 54(9):872–878

    Article  Google Scholar 

  27. Kahneman D, Tversky A (1979) Prospect theory: an analysis of decision making under risk. Eugene, Ore

    Google Scholar 

  28. Bergman O, Tucker S, Beyth-Marom R, Cutrell E, Whittaker S (2009) It’s not that important: demoting personal information of low subjective importance using GrayArea. In: CHI 2009 conference on human factors and computing systems, Boston, USA

  29. Abrams D, Baecker R, Chignell M (1998) Information archiving with bookmarks: personal Web space construction and organization. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM Press/Addison-Wesley Publishing Co., Los Angeles, CA, pp 41–48

  30. Kirk D, Sellen A, Rother C, Wood K (2006) Understanding photowork. Paper presented at the SIGCHI conference on human factors in computing systems, Montreal

  31. Neisser U (1964) Visual search. Sci Am 210(6):94–102

    Article  Google Scholar 

  32. Treisman A, Gelade G (1980) A feature-integration theory of attention. Cogn Psychol 12:97–136

    Article  Google Scholar 

  33. Tungare M, P′erez-Qui˜nones M (2008) Thinking outside the (beige) box: Personal information management beyond the desktop. Paper presented at the PIM workshop at CHI 2008, Florence, Italy

Download references

Acknowledgments

We thank our participants for their time and efforts. This research was partially funded by the European Union Marie Curie Grant, PERG-GA-2009-248997.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ofer Bergman.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bergman, O., Komninos, A., Liarokapis, D. et al. You never call: Demoting unused contacts on mobile phones using DMTR . Pers Ubiquit Comput 16, 757–766 (2012). https://doi.org/10.1007/s00779-011-0411-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-011-0411-3

Keywords

Navigation