SlideShare a Scribd company logo
1 of 21
Download to read offline
Undo for Mobile Phones
Does Your Mobile Phone Need an Undo Key? Do You?

    Marco Loregian, University of Milano-Bicocca (Italy)
                 www.marcoloregian.net
Undo
• Well known function of PC
  applications
• Allows to revert (the effects of)
  commands
• Applied to user actions
• Different strategies
Undo models
        A coarse classification
What does “undo”
  mean when
 operating with
 mobile phones?
...and I really
 mean phones,
not cool gadgets
The problem

• We need to know it in order to
  design usable (successful) devices
• How should we find it out?
• Undo is a user intention
• We surveyed users
Concerns in mind

• Reversibility (yes/no)

• Criticality (high/low)
The survey
Online survey, 20 questions, 5 parts


    1. Personal info (demographics)
    2. Introduction (basic operations)
    3. Scenario (multiple steps)
    4. Reversed perspective
    5. Conclusion (overall opinion)
The results
              Full stats and comments in the paper




• Demographics

• Interesting facts from the survey
Demographics
     146 respondents, 133 answered all questions

                       Age Distribution                      Gender
80
            80

60


40                                                     45%
                  36                                                  55%
20

      11                  10
 0                               6
                                     1     1     1                      Male
     15-20 21-25 26-30 31-35 36-40 41-45 46-50 51-55
                                                                        Female
Number of phones used regularly
150,0

112,5          116
                                                With respect to the
                                                diffusion of mobile
 75,0                                           phones, the sample is
                                                consistent with Italian
 37,5                                           population (istat.it)
                       25

   0     1                     4
        none   one    two    three   more


                                                   Computer Skills (wrt applications)
                                           60
                                                                                        54
                                                                   52

               Different computer          45

                skills may indicate                                         39

                                           30
          familiarity with different
                       undo models
                                           15

                                            0             1
                                                 None   Basic   Average Advanced Absolute
Highlights and
selected survey
     items
Confirmation
                 Prompt for confirmation
 100
           97

  75


  50


  25                       33

                                           18
   0
           Yes             No          Yes, if...

66% want to know what they are undoing
22% ask for a transparent implementation
12% want to be warned in case of irreversibility
Granularity
              Question 8                            Question 10
110,0                              70,0
             102
                                                        61
 82,5                              52,5
                                          47
 55,0                              35,0


 27,5                              17,5
                      27                       17                 18
        13
   0                       4         0
                                                                       1


        Different preferences, variable granularity with
        respect to different situations… context awareness?
        The same key has different behaviors in different
        moments, sometimes matching the End key
Timeline

• Very simple/intuitive interaction

• Linear and sequential undo
  operations undone one-by-one in reverse chronological order
Privacy and
           Responsibility
                              Can a SMS be deleted from your phone if you’ve not read it?

                      110,0
                                                                       103

• Nothing hidden to    82,5
  me
                       55,0

• The responsible
  pays the price       27,5                 31


                         0
                                           Yes                         No
The verdict
     Would you like mobile phones to have an undo key?
                                                            53
70                                                            %
                                                                  Ye
                                                                     s
                            65
60

50

40
      38
30                                                34


20

10

 0
     Yes                    No                 Yes, if...
Conclusion
• Undo for mobile phones:
  linear, sequential, with
  variable granularity and
  confirmation before execution


• Generalization of the results
More work

• Undo for email, a.k.a. retraction
  (poster yesterday)



• Undo for Ubiquitous Computing
  published at UIC’08, IDC’2008
Moral of the talk
                undo!
                undo!
                undo!




  If we had more ctrl+Z
 our lives might be better
Thank you,
              any question?


 Undo for Mobile Phones
Does Your Mobile Phone Need an Undo Key? Do You?

    Marco Loregian, University of Milano-Bicocca (Italy)
                 www.marcoloregian.net

More Related Content

More from Marco Loregian

Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3Marco Loregian
 
Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)Marco Loregian
 
lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009Marco Loregian
 
lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009Marco Loregian
 
Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009Marco Loregian
 
Undo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing EnvironmentsUndo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing EnvironmentsMarco Loregian
 
CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?Marco Loregian
 
Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4Marco Loregian
 
Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3Marco Loregian
 
Sistemi Context Aware Esercitazione 1
Sistemi Context Aware   Esercitazione 1Sistemi Context Aware   Esercitazione 1
Sistemi Context Aware Esercitazione 1Marco Loregian
 
Mobile Social Software
Mobile Social SoftwareMobile Social Software
Mobile Social SoftwareMarco Loregian
 

More from Marco Loregian (15)

Lezione ID 2010 -3
Lezione ID 2010 -3Lezione ID 2010 -3
Lezione ID 2010 -3
 
Lezione ID 2010 - 1
Lezione ID 2010 - 1Lezione ID 2010 - 1
Lezione ID 2010 - 1
 
Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3
 
Cac Es3 2009
Cac Es3 2009Cac Es3 2009
Cac Es3 2009
 
Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)
 
lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009
 
lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009
 
Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009
 
Undo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing EnvironmentsUndo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing Environments
 
CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?
 
Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4
 
Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3
 
Cac Es2
Cac Es2Cac Es2
Cac Es2
 
Sistemi Context Aware Esercitazione 1
Sistemi Context Aware   Esercitazione 1Sistemi Context Aware   Esercitazione 1
Sistemi Context Aware Esercitazione 1
 
Mobile Social Software
Mobile Social SoftwareMobile Social Software
Mobile Social Software
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Undo for Mobile Phones Does Your Mobile Phone Need an Undo Key? Do You?

  • 1. Undo for Mobile Phones Does Your Mobile Phone Need an Undo Key? Do You? Marco Loregian, University of Milano-Bicocca (Italy) www.marcoloregian.net
  • 2. Undo • Well known function of PC applications • Allows to revert (the effects of) commands • Applied to user actions • Different strategies
  • 3. Undo models A coarse classification
  • 4. What does “undo” mean when operating with mobile phones?
  • 5. ...and I really mean phones, not cool gadgets
  • 6. The problem • We need to know it in order to design usable (successful) devices • How should we find it out? • Undo is a user intention • We surveyed users
  • 7. Concerns in mind • Reversibility (yes/no) • Criticality (high/low)
  • 8. The survey Online survey, 20 questions, 5 parts 1. Personal info (demographics) 2. Introduction (basic operations) 3. Scenario (multiple steps) 4. Reversed perspective 5. Conclusion (overall opinion)
  • 9. The results Full stats and comments in the paper • Demographics • Interesting facts from the survey
  • 10. Demographics 146 respondents, 133 answered all questions Age Distribution Gender 80 80 60 40 45% 36 55% 20 11 10 0 6 1 1 1 Male 15-20 21-25 26-30 31-35 36-40 41-45 46-50 51-55 Female
  • 11. Number of phones used regularly 150,0 112,5 116 With respect to the diffusion of mobile 75,0 phones, the sample is consistent with Italian 37,5 population (istat.it) 25 0 1 4 none one two three more Computer Skills (wrt applications) 60 54 52 Different computer 45 skills may indicate 39 30 familiarity with different undo models 15 0 1 None Basic Average Advanced Absolute
  • 13. Confirmation Prompt for confirmation 100 97 75 50 25 33 18 0 Yes No Yes, if... 66% want to know what they are undoing 22% ask for a transparent implementation 12% want to be warned in case of irreversibility
  • 14. Granularity Question 8 Question 10 110,0 70,0 102 61 82,5 52,5 47 55,0 35,0 27,5 17,5 27 17 18 13 0 4 0 1 Different preferences, variable granularity with respect to different situations… context awareness? The same key has different behaviors in different moments, sometimes matching the End key
  • 15. Timeline • Very simple/intuitive interaction • Linear and sequential undo operations undone one-by-one in reverse chronological order
  • 16. Privacy and Responsibility Can a SMS be deleted from your phone if you’ve not read it? 110,0 103 • Nothing hidden to 82,5 me 55,0 • The responsible pays the price 27,5 31 0 Yes No
  • 17. The verdict Would you like mobile phones to have an undo key? 53 70 % Ye s 65 60 50 40 38 30 34 20 10 0 Yes No Yes, if...
  • 18. Conclusion • Undo for mobile phones: linear, sequential, with variable granularity and confirmation before execution • Generalization of the results
  • 19. More work • Undo for email, a.k.a. retraction (poster yesterday) • Undo for Ubiquitous Computing published at UIC’08, IDC’2008
  • 20. Moral of the talk undo! undo! undo! If we had more ctrl+Z our lives might be better
  • 21. Thank you, any question? Undo for Mobile Phones Does Your Mobile Phone Need an Undo Key? Do You? Marco Loregian, University of Milano-Bicocca (Italy) www.marcoloregian.net