designing systems that support social behavior
DESCRIPTION
By looking at how people interact in face to face situations we can gain insights on how to better design online systems to support social behavior. In particular, this presentation argues that simple visualizations of the presence and activities of participants in online situations can be a valuable design approach.TRANSCRIPT
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Designing Collaborative Systems that Support Social Behavior
Thomas EricksonSocial Computing Group
IBM T. J. Watson Research Center
SBSC, WebMedia, SBBD, SBESFortaleza, October 5-7, 2009
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Introduction
Outline of the talk• A Social Perspective
• The Face to Face World
• A Design Approach
• Examples
• Closing Remarks
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
A tale of two doors• A Problem:
A door opens into a hallway; opened too quickly it can slam into those on the other side.
• Two sorts of solutions…
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
A tale of two doors• Solution 1: A sign
“Open Door Slowly”
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
A tale of two doors• Solution 2: A window
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
A tale of two doors• Solution 2: A window
• Why It Works
Visibility produces awareness: Movement and faces engage our attention in a way that text does not
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
A tale of two doors• Solution 2: A window
• Why It Works
Visibility produces awareness: Movement and faces engage our attention in a way that text does not
Awareness triggers social norms: I know that you’re there, and therefore social rules or norms come into play
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
A tale of two doors• Solution 2: A window
• Why It Works
Visibility produces awareness: Movement and faces engage our attention in a way that text does not
Awareness triggers social norms: I know that you’re there, and therefore social rules or norms come into play
Mutual visibility triggers accountability: I know that you know that I know,and therefore I am responsible to you
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
A tale of two doors• Solution 2: A window
• Side Effect
Reinforcement of norms: The very act of doing the ‘dance’ at the doorway reinforces the social norms
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Social Perspective
The morals of this story• Many problems can be solved either
by technical means or social means
• And the design of a system can facilitate or inhibit social solutions
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
What can we learn from looking at social behavior in face to face interactions?
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Latour and the missing mass(es)• A physics problem:
The universe is not flying apart as quickly as expected…
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Latour and the missing mass(es)• A sociological problem:
People’s interactions are not nearly so random as might be expected
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Latour and the missing mass(es)• Artifacts and environments play
critical roles in shaping behavior
• The metaphor of social structures as being under a dynamic tension, ready to fly apart except for a web of social forces which binds it together
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Face to Face Interaction
Latour and the missing mass(es)• The masses are missing, or at
least diminished, in the online world
• Online interaction is easily disrupted: it tends towards drift, dissolution and disorder
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Face to Face Interaction
Norms• As we saw in the tale of two
doors, social norms are one way in which human human interaction is structured
There are lots of examples
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social norms in action• Lining up for at parade
- change in paving
- position of other spectators (and marchers)
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social norms in action• Walking on a path
- paved paths and signs
- other walkers staying on path
Note that the cues are reinforcing behavior, not forcing it...
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social norms in action• Waiting in a queue
- poles and ribbons
- the other people in the queue
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social norms in action• Waiting for the light to change
- painted crosswalk, crossing lights
- crowd of people waiting
• Note that a person crossing against the light can trigger everyone to do likewise
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Two claims• Face to face interaction is
supported by social norms
• And social norms are supported by visible cues, which include
- cues embedded in the environment
- and behavioral cues from people
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
It’s not all norms, though• Our collective behavior is also influenced by social forces
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social forces• Curiosity (and ‘meta-curiosity’)
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social forces• Triangulation
(when an object or event pulls strangers into conversation)
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social forces• Imitation
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social forces• Peer Pressure
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social forces• Competition
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Social forces• Herding
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
The Face to Face World
Many social factors combine to order our collective behavior• voluntary adherence to norms
• accountability to others
• curiosity
• triangulation
• imitation
• peer pressure
• competition
• herding
Photo © 2004 Project for Public Spaces, Inc. www.pps.org
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
How do we apply these observations of face to face interaction to digital systems?
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• A social proxy is a minimalist
graphical representations that make people and their activities more visible
An example for a multi-room text-based chat system. . .
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• A conversation is represented by a circle
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• People are represented by colored
dots
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• People in the ‘current’
conversation are shown inside the circle...
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• People in other conversations are
shown outside the circle
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• When a person is ‘active’ in the
chat (types, clicks or moves the mouse), their dot moves towards the center of the circle...
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• So an active conversation in
which lots of people are speaking or listening looks something like this
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• As a person is idle, their dot slowly drifts outward
(over the course of about twenty minutes)
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
A social proxy• An inactive conversation (but one
in which people are still ‘around’) looks something like this
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
The Babble system• The social proxy was
implemented as part of the Babble system, a persistent chat application
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
The Babble system• The social proxy was
implemented as part of the Babble system, a persistent chat application
• There was also an asynchronousproxy that showed the last week of activity
Sleepzone
Morning in Europe
Morning in North Am.
SystemCrash
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
The Babble system• Over the course of five years it
was deployed to about two dozen groups
• And it was generally quite successful:participants liked the proxy
“It makes me feel like people are in the room with me”
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble• Something is happening
(curiosity)
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble• Something is happening
over there (curiosity/herding)
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble• Waylay: Orange is active and
using Babble, and they know that I know it (accountability)
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Ice breaking
(curiosity/triangulation)
Nik: Interesting, why are some dots closer to the middle and some more towards middle/outer radius?
Bob: Hmmm... need more testing to find out!
Tom: Nik, it looks like an activity statement... the longer your idle the further from the center you are.
Nik: Thanks for the info Tom, I'm going to see if I move in closer as a result of typing this message...
Pat: as soon as u send a message u get closer to the center
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
Wendy
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
Wendy
Wendy K
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
Wendy
Wendy K
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
Wendy
Wendy K
Wendy trying to be pink
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
Wendy
Wendy K
Wendy trying to be pink
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
Wendy
Wendy K
Wendy trying to be pink
Wendy pink pink pink pink
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
• Users enjoyed this. Others would watch and make jokes and suggestions about what version of the nickname to try next
Wendy
Wendy K
Wendy trying to be pink
Wendy pink pink pink pink
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Social phenomena in Babble • Color choosing (triangulation)
Originally there was no way to choose a dot’s color; its color was determined by hashing the user’s nickname into the color table
• But then we made a mistake: we put in a menu item: “Options: Select Dot color”
It increased “ease of use” for users, but we lost a small but nice ritual.
Wendy
Wendy K
Wendy trying to be pink
Wendy pink pink pink pink
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
A Design Approach
Summary• The Babble proxy was
easy to learn• Participants used it,
often in unexpected ways• And it seemed to be have
interesting social andexperiential aspects
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
How widely applicable are social proxies?
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for spoken conversation
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for spoken conversation:Supporting audio conferencing
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for spoken conversation: A design sketch
How it works• Dot moves into center when speaking,
slowly drifts out when silent
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for spoken conversation:A design sketch
How it works• Dot moves into center when speaking,
slowly drifts out when silent• A dot’s user can signal various states
such as ‘I have a question’ (shown), ‘I’m on mute’, or ‘I can’t hear’
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for spoken conversation:A design sketch
This proxy is interesting because- shows who has spoken recently
- provides a visual backchannel
- provides a resource for ‘going around the table’
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for spoken conversation:An implementation
Rendezvous: A VoIP-based audio conferencing system at IBM• Participants arrayed around a ‘table’
• Those who are invited, but not present, are shown below
• ‘Speech bubbles’ indicate a signal coming in on that line
• Clicking shows a photo of the person, and right-clicking brings up a menu
Design by Tracee Wolf, IBM Research
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for spoken conversation:An implementation
Observations• People like knowing who is speaking
(or making noise)
• Participants use the state of the proxy to decide when to actually call in
• Users make frequent use of the menu functions for a variety of purposes
Design by Tracee Wolf, IBM Research
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues
“Your call is important to us.
Please remain on the line and your call will be answered in
the order in which it was received.”
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues• An advance in state of the art! ->
“Your call is important to us.
Please remain on the line and your call will be answered in
the order in which it was received.”
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues:A design sketch
How it works• A new dot joins the end of the
queue• Triangles indicate ‘assistants’• Colors show estimated wait time
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues:A design sketch
• A more elaborate version for an online help site that includes a chat space for anyone in the queue
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues:A design sketch
This proxy is interesting because• it provides feedback about the
collective state of the interaction (e.g. wait time, line speed)
• and could provide a framework for other interactions such as chat
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues:An implementation
Chit Chat Club, an installation by Karrie Karahalios and colleagues• People sitting together in a room
can converse with someone who ‘logs into’ the physical avatar in the picture
• However, what to do about people who were waiting to log in next?
Design by Karrie Karahalios and colleagues, University of Illinois, Urbana-Champaign
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues:An implementation
Chit Chat Club, an installation by Karrie Karahalios and colleagues• So the interface for the remote
users included a queue proxy
Design by Karrie Karahalios and colleagues, University of Illinois, Urbana-Champaign
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues:An implementation
Chit Chat Club, an installation by Karrie Karahalios and colleagues• So the interface for the remote
users included a queue proxy
• And it allowed people to chat with one another
Design by Karrie Karahalios and colleagues, University of Illinois, Urbana-Champaign
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for queues:An implementation
Anecdotal observations• People talked quite a lot
• Some users got so involved in their conversations in the queue that they didn’t want to leave the queue when their turn to use the avatar came...
• Karahalios et al are working on another version that allows users to change places, etc. Design by Karrie Karahalios and colleagues,
University of Illinois, Urbana-Champaign
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions:A design sketch
Design• Objects: Viewing, bidding, clock
• Dots: color means it was recently active
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions:A design sketch
Design• Objects: Viewing, bidding, clock
• Dots: color means it was recently active
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions:A design sketch
Design• Objects: Viewing, bidding, clock
• Dots: color means it was recently active
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions:A design sketch
Design• Objects: Viewing, bidding, clock
• Dots: color means it was recently active
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions:A design sketch
Design• Objects: Viewing, bidding, clock
• Dots: color means it was recently active
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions:A design sketch
Design• Objects: Viewing, bidding, clock
• Dots: color means it was recently active
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for auctions
This proxy is interesting because• it tries to create an feeling of drama
• it illustrates the use of cumulative state
• it could provide the basis for visualizations of markets...
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for buildings
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for buildings
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for buildings:A design sketch
How it works• Everyone wears an active badge that
tracks their locations to the meter• People are shown on the map as
squares, and leave a trail of where they’ve been for the last 30 seconds
• However, users are not identified: the only information shown is whether
someone is an employee or visitor
Even without identifying people we can see patterns...
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for buildings:A design sketch design sketch
How it works• Everyone wears an active badge that
tracks their locations to the meter• People are shown on the map as
squares, and leave a trail of where they’ve been for the last 30 seconds
• However, users are not identified: the only information shown is whether
someone is an employee or visitor
Even without identifying people we can see patterns: meetings...
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for buildings:A design sketch
How it works• Everyone wears an active badge that
tracks their locations to the meter• People are shown on the map as
squares, and leave a trail of where they’ve been for the last 30 seconds
• However, users are not identified: the only information shown is whether someone is an employee or visitor
Even without identifying people we can see patterns: mail delivery...
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for buildings:A design sketch
How it works• Everyone wears an active badge that
tracks their locations to the meter• People are shown on the map as
squares, and leave a trail of where they’ve been for the last 30 seconds
• However, users are not identified: the only information shown is whether
someone is an employee or visitor
Even without identifying people we can see patterns: ???
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Examples of Social Proxies
Proxies for buildings:A design sketch
This proxy is interesting because• it shows that proxies are useful
for non-digital spaces
• it illustrates that much can be read even when people are anonymous...
• ...and that more can be read by those who know the background
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Design Explorations
Social proxies more generally• The approach is very flexible
• I claim that you can design a social proxy for any online situation
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Design Explorations
Some social proxy design ‘guidelines’• Everyone sees the same thing; no user-specific customization
• Provide a third person point of view
• Portray actions, not interpretation
• Support deceptive (aka polite) behavior
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Summary and Closing Remarks
Systems can be designed to inhibitsocial behavior...
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Summary and Closing Remarks
Systems can be designed to inhibitsocial behavior or to facilitate it
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Summary and Closing Remarks
Social behavior is supported by norms and forces that depend on visible cues • in the physical environment
• and the behavior of other people
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Summary and Closing Remarks
We can apply these ideas to designing digital systems• We can support collaboration
in digital systems by providing visible cues about the presence and activities of users and about the online situation/environmentthey are in
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Summary and Closing Remarks
We can apply these ideas to designing digital systems• We can support collaboration
in digital systems by providing visible cues about the presence and activities of users and about the online situation/environmentthey are in
• The surprise is that this can be done very simply
Thomas Erickson, Social Computing Group, IBM T. J. Watson Research Center.
Thank You!
And thanks to • those involved in the Babble project...
Erin Bradner, Jason Ellis, Brent Hailpern, Christine Halverson, Wendy Kellogg, Mark Laff, John Richards, David N. Smith, Cal Swart, Tracee Wolf
• ...to the Project for Public Spaces (http://www.pps.org) for many photos (as noted)
• ...to Karrie Karahalios (University of Illinois) for the Chit-Chat Club queue proxy
• ...to Tracee Wolf (IBM) for the Rendezvous proxy design • ... and to my colleagues at IBM for support and inspiration
For more information• [email protected]• http://www.visi.com/~snowfall/