SlideShare a Scribd company logo
1 of 22
Consideration in Software-
mediated Social Interaction
Raian Ali, Nan Jiang, Sherry Jeary,
Keith Phalp
Outline
 Problem
 Aim
 Method
 Results
 Challenges
 Conclusions
Problem
 Being considerate is important in any
business environment but sometimes
it is down to personal choice.
 People are trying to be considerate in
“traditional” communications but not
always in software mediated
communications
 This often leads to negative impacts
Examples
 Seeing more and more people being
copied in an email conversation
 Being cc’ed without specifying why and
what exactly to look at
 Being forwarded an email with FYI
without specifying why and what
exactly to look at
 Other short emails with only a few words or no
word
Research Aim
 Understand how users perceive
consideration in software-mediated
interaction to improve social
interaction facilitated by software
 Our ultimate goal is to develop
considerate software
Method
 Mixed methods research
 Sequential exploratory designs (Stoller
et al, 2009)
 Phase 1: qualitative research
 Exploration
 Phase 2: quantitative research
 Validation and elaboration
Qualitative Phase
 Semi-structured interviews
 Participants:
 8 professionals (6 males and 2
females) with multicultural background
living and working in the UK
 Different roles from office worker to
senior management
 Age: 35 (Median), 37.5 (Mean)
Interview Questions
 General
 Cognitive understanding, motivations for being
considerate/inconsiderate
 Popular software means used in workplace
 Specific (software-mediated)
 Consideration/inconsideration
 User’s attitude and reactions
 Decision shift of being considerately or
inconsiderately treated
 Expectations of software on consideration-
support
Quantitative Phase
 Large scale online survey
 Questionnaire based on
interview findings
 Distribution channels (UK
and US):
 BU academic staff mailing list
 Chinwag mailing list
 Several research mailing lists
 Respondents: 122 (67 males,
55 females)
Age Distribution (Survey)
0%
20%
40%
18-24 25-34 35-44 45-54 55-64 65-74
Age Groups
Percentage
Results Overview
 Overall user perception mapped well
 Over 90% agreed, only 9 new codes proposed from
less than 10% respondents
 Gender effects are not significant in all areas
 Cross tabulation, Chi-Square p> 0.05
 Age effects are significant in some areas
 Cross tabulation, Chi-Square p> 0.05
 Perception of consideration/inconsideration has
impact on specifying consideration
Goal of Interaction
 Goal of the interaction itself [65%]:
 “If they are not interacting for the right reason, then I
am less likely to be considerate”.
 Constraints on achieving the goal [59%]:
 “In my reminders, I could be inconsiderate because of
the urgency and importance of attending the event,
nothing personalised”.
 Availability of other methods to achieve the same
goal [56%]:
 “Some people were in the habit of opening the shared
file and then wandering off. They lock it. They could
work-offline and then upload all text together”.
Consequence
 Consequence on the organisation [63%]
 “Consideration needs managing otherwise destroys projects”
 Colleagues’ reactions [59%]
 “I would deal with senior managers and close colleagues
differently”
 Mental cost [55%]
 “If I did inconsiderate interactions, it makes me feel bad”
 Social isolation [22%]
 “I want to be a nice person because I need to work with them
every day.”
Audience
 Relation with the audience [76%]
 Value of the audience [54%]
 Personality of the audience [74%]
 Interaction history with the audience [79%]
 Situation awareness [63%]
 Visibility of the interaction to other audience
[56%]
Types of Inconsideration
 Membership termination [59%]
 Locking [49%]
 Ignoring [70%]
 Flame wars [50%]
 Laziness/Carelessness [61%]
 Formality level [19%]
 Timeliness [60%]
 Pressure [49%]
 Invading personal space [50%]
 Irrelevance [36%]
 Violation of the norms [31%]
 Curt/ Abrupt wording [61%]
Treating Inconsideration
 Behave in an ad-hoc way [25%]
 Conservative [37%]
 Receptive [48%]
 Anxious [35%]
 Practical [32%]
 Authority seeker [17%]
 Evasive [14%]
 Apologetic [36%]
Age Effects on Reaction
 18 – 24 yrs old were more passive
 “I prefer others to handle this”
 25 – 34 yrs old were more proactive
 “I will report it”
 “I will say it to the other”
 35+ yrs old showed less interests,
tend to ignore
 “Let it be”, “let’s just focus on the
business”
Visibility
 Explicitly said [40%]
 Anonymously said [24%]
 Said by an authority [28%]
 Learned over time [59%]
Perception Impacts: Consequences
 “I didn’t realise it could be
inconsiderate for someone”
 People were more concerned about
their own mental cost (60% agreed)
 “It could be inconsiderate”
 People were more concerned about
their recipients’ reactions (71.88%
agreed)
Perception Impacts: Attitudes
 TIL – “Today I learned”
 59.68% would prefer that others learn
their view of consideration/inconsideration
over time through the way they interact
with them
 “The big brother is watching you”
 62.07% - 79.31% respondents would like
“third-party” to get involved as this will
not affect their relationships
Perception Impacts: Reactions
 “I am cautious to my own behaviour
so I will be cautious to others
behaviour”
 73.5% respondents would be cautious
what they do
 Less than half of them would feel bad if
they did something inconsiderate
 “Fair play”
 58.82% don’t mind if they would be
treated in the same way as they treated
others
Challenges
 Users as modellers: only user can model themselves
 Tacitness: easy to feel but difficult to elicit
 Personal vs. public: private but can be leaked
 Evolution of perception: change over time
 Context-dependency: goal driven
 Measurement: how it can be measured for each individual
 Learning and adaptability: software needs to learn and
adapt according to user actions/behaviours
Conclusions
 Empirical study to deduce a number of
observations on the nature of
consideration
 A starting point for understanding how to
move towards building considerate
software
 Models and tools will be developed to
capture user concerns in software
mediated communications

More Related Content

Similar to Consideration in Software-Mediated Social Interactions

Ilkley business forum mentoring and networking
Ilkley business forum mentoring and networkingIlkley business forum mentoring and networking
Ilkley business forum mentoring and networkingLucy Laville
 
Consumer Behavior Final Project
Consumer Behavior Final ProjectConsumer Behavior Final Project
Consumer Behavior Final ProjectDonna Moulton
 
People, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software DevelopmentPeople, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software DevelopmentIvo Peksens
 
CHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docxCHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docxketurahhazelhurst
 
CHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docxCHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docxrobertad6
 
Survey Research in Design
Survey Research in DesignSurvey Research in Design
Survey Research in DesignSam Ladner
 
Silence Kills With Notes
Silence Kills With NotesSilence Kills With Notes
Silence Kills With NotesBetsy Burtis
 
CHAPTER 4Social Perceptions and Managing Diversity©McGra.docx
CHAPTER 4Social Perceptions and Managing Diversity©McGra.docxCHAPTER 4Social Perceptions and Managing Diversity©McGra.docx
CHAPTER 4Social Perceptions and Managing Diversity©McGra.docxrobertad6
 
Evaluating Revalidation: Lessons from the Evaluation of Complex Interventions
Evaluating Revalidation: Lessons from  the Evaluation of Complex Interventions  Evaluating Revalidation: Lessons from  the Evaluation of Complex Interventions
Evaluating Revalidation: Lessons from the Evaluation of Complex Interventions IAMRAreval2015
 
Expanding Potential Poster
Expanding Potential PosterExpanding Potential Poster
Expanding Potential PosterJosue Ayala
 
Risk of Bias_StaR Child Health Summit_07May12
Risk of Bias_StaR Child Health Summit_07May12Risk of Bias_StaR Child Health Summit_07May12
Risk of Bias_StaR Child Health Summit_07May12michele_hamm
 
KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...Leon Gou
 
Peter workplace bullying11
Peter workplace bullying11Peter workplace bullying11
Peter workplace bullying11Peter Gillotte
 
Presentation debiasing m-azimi,amshirazi,hdarzi
Presentation debiasing   m-azimi,amshirazi,hdarzi Presentation debiasing   m-azimi,amshirazi,hdarzi
Presentation debiasing m-azimi,amshirazi,hdarzi Omid Aminzadeh Gohari
 
Strategic Market Research (Chapter 3): Choosing the Right Method
Strategic Market Research (Chapter 3): Choosing the Right MethodStrategic Market Research (Chapter 3): Choosing the Right Method
Strategic Market Research (Chapter 3): Choosing the Right MethodMatthew A. Gilbert, MBA
 
FINAL MSL Fraternity and Sorority Presentation
FINAL MSL Fraternity and Sorority PresentationFINAL MSL Fraternity and Sorority Presentation
FINAL MSL Fraternity and Sorority PresentationIsmael Correa
 
Losing Control in Qualitative Research
Losing Control in Qualitative ResearchLosing Control in Qualitative Research
Losing Control in Qualitative ResearchLatitude Insights
 

Similar to Consideration in Software-Mediated Social Interactions (20)

Ilkley business forum mentoring and networking
Ilkley business forum mentoring and networkingIlkley business forum mentoring and networking
Ilkley business forum mentoring and networking
 
Consumer Behavior Final Project
Consumer Behavior Final ProjectConsumer Behavior Final Project
Consumer Behavior Final Project
 
People, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software DevelopmentPeople, brain and change in the Manifesto for Agile Software Development
People, brain and change in the Manifesto for Agile Software Development
 
CHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docxCHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docx
 
CHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docxCHAPTER 4Social Perceptions and Managing Diversity©McG.docx
CHAPTER 4Social Perceptions and Managing Diversity©McG.docx
 
Survey Research in Design
Survey Research in DesignSurvey Research in Design
Survey Research in Design
 
Silence Kills With Notes
Silence Kills With NotesSilence Kills With Notes
Silence Kills With Notes
 
CHAPTER 4Social Perceptions and Managing Diversity©McGra.docx
CHAPTER 4Social Perceptions and Managing Diversity©McGra.docxCHAPTER 4Social Perceptions and Managing Diversity©McGra.docx
CHAPTER 4Social Perceptions and Managing Diversity©McGra.docx
 
Evaluating Revalidation: Lessons from the Evaluation of Complex Interventions
Evaluating Revalidation: Lessons from  the Evaluation of Complex Interventions  Evaluating Revalidation: Lessons from  the Evaluation of Complex Interventions
Evaluating Revalidation: Lessons from the Evaluation of Complex Interventions
 
Expanding Potential Poster
Expanding Potential PosterExpanding Potential Poster
Expanding Potential Poster
 
Risk of Bias_StaR Child Health Summit_07May12
Risk of Bias_StaR Child Health Summit_07May12Risk of Bias_StaR Child Health Summit_07May12
Risk of Bias_StaR Child Health Summit_07May12
 
KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...KnowMe and ShareMe: understanding automatically discovered personality traits...
KnowMe and ShareMe: understanding automatically discovered personality traits...
 
Peter workplace bullying11
Peter workplace bullying11Peter workplace bullying11
Peter workplace bullying11
 
Wave 1: Learning Session 1
Wave 1: Learning Session 1Wave 1: Learning Session 1
Wave 1: Learning Session 1
 
Wave 1: Learning Session 1
Wave 1: Learning Session 1Wave 1: Learning Session 1
Wave 1: Learning Session 1
 
Unconscious Bias and the Hiring Process
Unconscious Bias and the Hiring ProcessUnconscious Bias and the Hiring Process
Unconscious Bias and the Hiring Process
 
Presentation debiasing m-azimi,amshirazi,hdarzi
Presentation debiasing   m-azimi,amshirazi,hdarzi Presentation debiasing   m-azimi,amshirazi,hdarzi
Presentation debiasing m-azimi,amshirazi,hdarzi
 
Strategic Market Research (Chapter 3): Choosing the Right Method
Strategic Market Research (Chapter 3): Choosing the Right MethodStrategic Market Research (Chapter 3): Choosing the Right Method
Strategic Market Research (Chapter 3): Choosing the Right Method
 
FINAL MSL Fraternity and Sorority Presentation
FINAL MSL Fraternity and Sorority PresentationFINAL MSL Fraternity and Sorority Presentation
FINAL MSL Fraternity and Sorority Presentation
 
Losing Control in Qualitative Research
Losing Control in Qualitative ResearchLosing Control in Qualitative Research
Losing Control in Qualitative Research
 

More from Engineering and Social Informatics (ESOTICS)

More from Engineering and Social Informatics (ESOTICS) (20)

Digital addiction and what you need to know
Digital addiction and what you need to knowDigital addiction and what you need to know
Digital addiction and what you need to know
 
Pragmatic requirements for adaptive systems a goal driven modeling and analys...
Pragmatic requirements for adaptive systems a goal driven modeling and analys...Pragmatic requirements for adaptive systems a goal driven modeling and analys...
Pragmatic requirements for adaptive systems a goal driven modeling and analys...
 
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
 
Mitigating circumstances in cyber crime
Mitigating circumstances in cyber  crimeMitigating circumstances in cyber  crime
Mitigating circumstances in cyber crime
 
The design of software based peer groups to combat digital addiction
The design of software based peer groups to combat digital addiction The design of software based peer groups to combat digital addiction
The design of software based peer groups to combat digital addiction
 
Crowdsourcing transparency requirements through structured feedback and social
Crowdsourcing transparency requirements through structured feedback and socialCrowdsourcing transparency requirements through structured feedback and social
Crowdsourcing transparency requirements through structured feedback and social
 
Persuasive and culture aware feedback acquisition
Persuasive and culture aware feedback acquisitionPersuasive and culture aware feedback acquisition
Persuasive and culture aware feedback acquisition
 
Adaptive software based feedback acquisition a personas-based design
Adaptive software based feedback acquisition a personas-based designAdaptive software based feedback acquisition a personas-based design
Adaptive software based feedback acquisition a personas-based design
 
A modelling language for transparency requirements in business information sy...
A modelling language for transparency requirements in business information sy...A modelling language for transparency requirements in business information sy...
A modelling language for transparency requirements in business information sy...
 
Modelling and analysing contextual failures for dependability requirements
Modelling and analysing contextual failures for dependability requirementsModelling and analysing contextual failures for dependability requirements
Modelling and analysing contextual failures for dependability requirements
 
Engineering software based motivation a persona-based approach
Engineering software based motivation a persona-based approachEngineering software based motivation a persona-based approach
Engineering software based motivation a persona-based approach
 
REfine a gamifiedplatform for participatory requirements engineering
REfine a gamifiedplatform for participatory requirements engineeringREfine a gamifiedplatform for participatory requirements engineering
REfine a gamifiedplatform for participatory requirements engineering
 
The Emerging Requirement for Digital Addiction Labels
The Emerging Requirement for Digital Addiction LabelsThe Emerging Requirement for Digital Addiction Labels
The Emerging Requirement for Digital Addiction Labels
 
Gamification for volunteer cloud computing
Gamification for volunteer cloud computingGamification for volunteer cloud computing
Gamification for volunteer cloud computing
 
Crowd centric requirements engineering - ra
Crowd centric requirements engineering - raCrowd centric requirements engineering - ra
Crowd centric requirements engineering - ra
 
Towards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po emTowards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po em
 
Software evaluation via users’ feedback at runtime
Software evaluation via users’ feedback at runtimeSoftware evaluation via users’ feedback at runtime
Software evaluation via users’ feedback at runtime
 
Crowdsourcing Software Evaluation
Crowdsourcing Software EvaluationCrowdsourcing Software Evaluation
Crowdsourcing Software Evaluation
 
Digital addiction REFSQ 14
Digital addiction REFSQ 14 Digital addiction REFSQ 14
Digital addiction REFSQ 14
 
The design of adaptive acquisition of users feedback an empirical study (rcis...
The design of adaptive acquisition of users feedback an empirical study (rcis...The design of adaptive acquisition of users feedback an empirical study (rcis...
The design of adaptive acquisition of users feedback an empirical study (rcis...
 

Recently uploaded

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 

Recently uploaded (20)

Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 

Consideration in Software-Mediated Social Interactions

  • 1. Consideration in Software- mediated Social Interaction Raian Ali, Nan Jiang, Sherry Jeary, Keith Phalp
  • 2. Outline  Problem  Aim  Method  Results  Challenges  Conclusions
  • 3. Problem  Being considerate is important in any business environment but sometimes it is down to personal choice.  People are trying to be considerate in “traditional” communications but not always in software mediated communications  This often leads to negative impacts
  • 4. Examples  Seeing more and more people being copied in an email conversation  Being cc’ed without specifying why and what exactly to look at  Being forwarded an email with FYI without specifying why and what exactly to look at  Other short emails with only a few words or no word
  • 5. Research Aim  Understand how users perceive consideration in software-mediated interaction to improve social interaction facilitated by software  Our ultimate goal is to develop considerate software
  • 6. Method  Mixed methods research  Sequential exploratory designs (Stoller et al, 2009)  Phase 1: qualitative research  Exploration  Phase 2: quantitative research  Validation and elaboration
  • 7. Qualitative Phase  Semi-structured interviews  Participants:  8 professionals (6 males and 2 females) with multicultural background living and working in the UK  Different roles from office worker to senior management  Age: 35 (Median), 37.5 (Mean)
  • 8. Interview Questions  General  Cognitive understanding, motivations for being considerate/inconsiderate  Popular software means used in workplace  Specific (software-mediated)  Consideration/inconsideration  User’s attitude and reactions  Decision shift of being considerately or inconsiderately treated  Expectations of software on consideration- support
  • 9. Quantitative Phase  Large scale online survey  Questionnaire based on interview findings  Distribution channels (UK and US):  BU academic staff mailing list  Chinwag mailing list  Several research mailing lists  Respondents: 122 (67 males, 55 females) Age Distribution (Survey) 0% 20% 40% 18-24 25-34 35-44 45-54 55-64 65-74 Age Groups Percentage
  • 10. Results Overview  Overall user perception mapped well  Over 90% agreed, only 9 new codes proposed from less than 10% respondents  Gender effects are not significant in all areas  Cross tabulation, Chi-Square p> 0.05  Age effects are significant in some areas  Cross tabulation, Chi-Square p> 0.05  Perception of consideration/inconsideration has impact on specifying consideration
  • 11. Goal of Interaction  Goal of the interaction itself [65%]:  “If they are not interacting for the right reason, then I am less likely to be considerate”.  Constraints on achieving the goal [59%]:  “In my reminders, I could be inconsiderate because of the urgency and importance of attending the event, nothing personalised”.  Availability of other methods to achieve the same goal [56%]:  “Some people were in the habit of opening the shared file and then wandering off. They lock it. They could work-offline and then upload all text together”.
  • 12. Consequence  Consequence on the organisation [63%]  “Consideration needs managing otherwise destroys projects”  Colleagues’ reactions [59%]  “I would deal with senior managers and close colleagues differently”  Mental cost [55%]  “If I did inconsiderate interactions, it makes me feel bad”  Social isolation [22%]  “I want to be a nice person because I need to work with them every day.”
  • 13. Audience  Relation with the audience [76%]  Value of the audience [54%]  Personality of the audience [74%]  Interaction history with the audience [79%]  Situation awareness [63%]  Visibility of the interaction to other audience [56%]
  • 14. Types of Inconsideration  Membership termination [59%]  Locking [49%]  Ignoring [70%]  Flame wars [50%]  Laziness/Carelessness [61%]  Formality level [19%]  Timeliness [60%]  Pressure [49%]  Invading personal space [50%]  Irrelevance [36%]  Violation of the norms [31%]  Curt/ Abrupt wording [61%]
  • 15. Treating Inconsideration  Behave in an ad-hoc way [25%]  Conservative [37%]  Receptive [48%]  Anxious [35%]  Practical [32%]  Authority seeker [17%]  Evasive [14%]  Apologetic [36%]
  • 16. Age Effects on Reaction  18 – 24 yrs old were more passive  “I prefer others to handle this”  25 – 34 yrs old were more proactive  “I will report it”  “I will say it to the other”  35+ yrs old showed less interests, tend to ignore  “Let it be”, “let’s just focus on the business”
  • 17. Visibility  Explicitly said [40%]  Anonymously said [24%]  Said by an authority [28%]  Learned over time [59%]
  • 18. Perception Impacts: Consequences  “I didn’t realise it could be inconsiderate for someone”  People were more concerned about their own mental cost (60% agreed)  “It could be inconsiderate”  People were more concerned about their recipients’ reactions (71.88% agreed)
  • 19. Perception Impacts: Attitudes  TIL – “Today I learned”  59.68% would prefer that others learn their view of consideration/inconsideration over time through the way they interact with them  “The big brother is watching you”  62.07% - 79.31% respondents would like “third-party” to get involved as this will not affect their relationships
  • 20. Perception Impacts: Reactions  “I am cautious to my own behaviour so I will be cautious to others behaviour”  73.5% respondents would be cautious what they do  Less than half of them would feel bad if they did something inconsiderate  “Fair play”  58.82% don’t mind if they would be treated in the same way as they treated others
  • 21. Challenges  Users as modellers: only user can model themselves  Tacitness: easy to feel but difficult to elicit  Personal vs. public: private but can be leaked  Evolution of perception: change over time  Context-dependency: goal driven  Measurement: how it can be measured for each individual  Learning and adaptability: software needs to learn and adapt according to user actions/behaviours
  • 22. Conclusions  Empirical study to deduce a number of observations on the nature of consideration  A starting point for understanding how to move towards building considerate software  Models and tools will be developed to capture user concerns in software mediated communications

Editor's Notes

  1. Note: Evaluating considerate nature of an interaction depends on the reason for the interaction
  2. Note: Evaluating considerate nature of an interaction depends on the consequences of the interaction
  3. Note: Context of the audience
  4. Note: It is about how to treat inconsiderate interactions.
  5. Note: How people would declare their view
  6. Note: In a business environment, when you are about to make an interaction which might be seen inconsiderate by some of the recipients/audience, which of these items you would look at to decide whether to execute it or revise it?
  7. Note: Development of consideration software