...
- Use their mobile phones very frequently to communicate with others
- Have to deal with sensitive information on a regular basis
- Concerned with Privacy, but not with the technical details of how to be secure
- Concerned about Personal Safety
User Classes
Message Sender
Message Receiver
Task Analysis
General Actions
Task | Goal | Frequency | Effort | Pitfalls | Others Involved | |||
---|---|---|---|---|---|---|---|---|
Manage Contacts Add contact | To ensure the identity (or psudo-identity) of the intended recipient | sometimes | medium |
|
| Indicates that the user | The contact | |
Communicate Find Public Conversations | To discuss a topic | semi- often | medium | potentially lots of information |
| |||
Erase evidence of communication | Break contact or association | rarely | easy | unsafe (can't undo) |
|
Group (closed) Conversation Actions
...
Task
...
Goal
...
Frequency
...
Effort
...
Pitfalls
...
Others Involved
...
Join
...
Join a group conversation
...
sometimes
...
medium
...
Requires the controller to add the user to the conversation
...
Remove oneself from a group
...
sometimes
...
easy
...
Unsafe (for security reasons, undo will be impossible).
...
...
Send
...
Send a message to a group
...
often
...
easy
...
Potential to send message to wrong person.
...
The group
...
Receive
...
Receive a message
...
often
...
none
...
...
The group
...
Log
...
Keep a log of messages
...
background
...
none
...
Some users may not want to be logged. Removal must be thorough.
...
Public Conversation Actions
...
Task
...
Goal
...
Frequency
...
Effort
...
Pitfalls
...
Others Involved
...
Join
...
Join a public conversation
...
sometimes
...
easy
...
...
Leave
...
Remove oneself from a public conversation
...
sometimes
...
easy
...
...
...
Send
...
Send a message to a public conversation
...
often
...
easy
...
Potential to send a private message to a public chat.
...
The receivers
...
Receive
...
Receive a message
...
often
...
none
...
...
The sender
...
Log
...
Keep a log of messages
...
background
...
none
...
Some users may not want to be logged. Removal must be thorough.
...
Expose information | Other people in | |||
Dissociate with a user | To break contact or association with a contact | rarely | fast | unsafe (can't undo) |
Private (direct) Conversation Actions
Task | Goal | Frequency | Effort | Pitfalls | Others Involved | |
---|---|---|---|---|---|---|
Send | Send a message to another person | often | easy | Potential to send message to wrong person. | The recipient | |
Receive | Receive a message | often | none |
| The recipient | |
Log | Keep a log of messages | background | none | Some users may not want to be logged. Removal must be thorough. | |
General Comments
- Safety is very important--a user should always be certain of the level of privacy they're communicating with
- Need connecting with people to be fairly easy to be adoptable
- Most (if not all) actions will be preformed in private (probably a very clean, quiet environment) (according to the user in the second interview).
- Where possible, tasks will mimic those in other chat applications. Where unique, tasks will include a short help text. In most cases, new users will be taught the basics by the person who introduced them to the application.
- The frequencies are based on estimates given by the user in the second interview.
...