groups, and the sharing may happen in a variety of
contexts, for example competitive as well as
collaborative. Furthermore, the nature and state of
these personal artifacts, the group with which they
are shared, and the relationships between the owner
and the receivers of information are all dynamic (i.e.
drafts become publications, people join or leave a
group, and users change team/projects) (Razavi and
Iverson, 2006). We claim that this combination of
context-sensitivity and dynamicity makes both the
public/private dichotomy (as seen in many Web 2.0
systems such as del.icio.us) and static access control
models (derived from file system and enterprise
service security models) inadequate for SPIM
applications (Razavi and Iverson, 2007).
In the SPIM domain the information sharing act
is often about establishing and maintaining a
dynamic sharing relationship: users have nuanced
ideas about what they want to share with whom in
what context and rather than a binary scale of public
vs. private, their judgment of the privacy of their
resources often reflects a transition from private, to
semi-private/restricted share, to public, depending
on the state of the artifact, the group in which it is
shared, and the context of sharing.
An underlying user interaction model must then
take into account that at any time during an artifact’s
life cycle, artifacts’ categorizations might change;
users' need to share classes of artifacts with certain
audiences might change; and user’s relationships
and trust patterns within those relationships might
change. Finally, users come to expect their tools to
provide flexible support for these changes in their
privacy preferences when the social parameters that
define the sharing model change (Razavi and
Iverson, 2006).
From a user’s point of view, the primary concern
in managing information sharing is the ability to
define the audience that will have access to their
information. A simple example is the case of contact
management, in which users selectively choose
which of a variety of different categories of ‘friend’
and ‘colleague’ will be allowed to contact them in a
particular way (e.g. who do I give my phone
number, address, or AIM id to?). Without aid of
technology, we either publish them for all to see or
hand them out individually or in particular contexts
(e.g. I tend to give my cell phone number to students
I teach, but not other students). Generally, the choice
of audience for a particular artifact or personal
attribute is expressed in terms of a group of others
who one trusts with that particular piece of
information, so tools should provide support for the
definition and manipulation of these groups in which
information is to be shared.
Traditionally, group definition for access control
has been based on organizational roles (i.e. RBAC
(Sandhu et. al., 1996)) or the equivalent (i.e. task
(Thomas and Sandhu, 1997)). While it makes sense
for an organization to align access rights to
organizational roles, it makes little sense for a user
to align privacy rights with those organizational
roles especially when their members are managed by
others. In the social networking world, access is
often defined in terms of 'networks of friends'
relationships, in which all `friends' are created equal
and are often required to be reciprocal (e.g. in
Facebook
iv
). But when dealing with information
privacy in the SPIM domain, the potential audience
for personal artifacts or attributes must be defined in
a user’s own terms, based on a variety of kinds of
relationships, some of which are one-sided. As such,
our second design motivation has been to enable
users to define egocentric groups of friends or
collaborators and then enable them to assign access
rights to their personal information based on these
user-controlled relationship models. We will
describe how Opntag handles this need below.
2.3 Tagging as Primary Organizing
Tool
Finally, we approach the issue of information
organization. Long one of the most difficult and
problematic issues for PIM systems, it has been long
obvious that neither traditional filesystem models
(i.e. files and folders) nor newer semantic
approaches were adequate for managing a wide
range of kinds of information (as seen in PIM
systems) in a cohesive, intuitive and user-centered
fashion. Recently, however, Web 2.0 applications
(in particular del.icio.us and Flickr
v
) have presented
"tagging" as an incremental, user-centered strategy
for organizing personal information in a public
space.
The web bookmarking service del.icio.us first
introduced tagging to a broad audience by asking its
members to submit a list of words along with any
bookmark to be saved. Any word or set of words can
be associated with a bookmark and they form the
fundamental organizational structure of the system.
In essence, each tag that I use becomes a "category"
within my own information space and since I can
use as many tags as I want for each item, I place any
item in as many categories as makes sense to me.
PERSONAL AND SOCIAL INFORMATION MANAGEMENT WITH OPNTAG
197