...
- Concerned with Privacy
- Unconcerned with Technical Details
- Concerned about Personal Safety
Task Analysis
Conversation Types
Task | Why | Prereq | Where | Environment | Frequency | Effort | Taught | Pitfalls | Others Involved |
---|---|---|---|---|---|---|---|---|---|
Group Chat |
|
|
|
|
|
|
|
|
|
Public Chat |
|
|
|
|
|
|
|
|
|
Private Chat |
|
|
|
|
|
|
|
|
|
Conversation Actions
Task | Why | Prereq | Where | Environment | Frequency | Effort | Taught | Pitfalls | Others Involved |
---|---|---|---|---|---|---|---|---|---|
Join |
|
|
|
|
|
|
|
|
|
Leave |
|
|
|
|
|
|
|
|
|
Send |
|
|
|
|
|
|
|
|
|
Receive |
|
|
|
|
|
|
|
|
|
Log |
|
|
|
|
|
|
|
|
|
- Have a secure and anonymous group chat (private to the group).
- Join/leave the group chat.
- Send/receive messages.
- Log the group chat.
- Have a public and anonymous conversation (readable by all).
- Join/leave the conversation.
- Send/receive messages.
- Log the conversation.
- Have a direct, private, and anonymous and secure conversations.
- Send/receive messages.
- Log the conversation.
- Authenticate pseudonyms.
- Find public conversation topics.
- Erase evidence of communication.
...