Number of co-authors:26
Number of publications with 3 favourite co-authors:Mor Naaman:2Joseph A. Konstan:2Victoria Bellotti:2
Nathaniel Good's 3 most productive colleagues in number of publications:Patrick Baudisch:57Joseph A. Konstan:47Jennifer Mankoff:45
Design can be art. Design can be aesthetics. Design is so simple, that's why it is so complicated.
-- Paul Rand, 1997
Read the fascinating history of Wearable Computing, told by its father, Steve Mann
Read Steve's chapter !
Has also published under the name of:
"Nathaniel S. Good"
Publications by Nathaniel Good (bibliography)
Ahern, Shane, Eckles, Dean, Good, Nathaniel, King, Simon, Naaman, Mor and Nair, Rahul (2007): Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems 2007. pp. 357-366.
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge -- especially when the persistent nature of the media and associated context reveals details about the physical and social context in which the media items were created. In a first-of-its-kind study, we use context-aware camerephone devices to examine privacy decisions in mobile and online photo sharing. Through data analysis on a corpus of privacy decisions and associated context data from a real-world system, we identify relationships between location of photo capture and photo privacy settings. Our data analysis leads to further questions which we investigate through a set of interviews with 15 users. The interviews reveal common themes in privacy considerations: security, social disclosure, identity and convenience. Finally, we highlight several implications and opportunities for design of media sharing applications, including using past privacy patterns to prevent oversights and errors.
© All rights reserved Ahern et al. and/or ACM Press
Good, Nathaniel, Grossklags, Jens, Mulligan, Deirdre K. and Konstan, Joseph A. (2007): Noticing notice: a large-scale experiment on the timing of software license agreements. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems 2007. pp. 607-616.
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report on a study of software installation to assess the effectiveness of different notices for helping people make better decisions on which software to install. Our study of 222 users showed that providing a short summary notice, in addition to the End User License Agreement (EULA), before the installation reduced the number of software installations significantly. We also found that providing the short summary notice after installation led to a significant number of uninstalls. However, even with the short notices, many users installed the program and later expressed regret for doing so. These results, along with a detailed analysis of installation, regret, and survey data about user behaviors informs our recommendations to policymakers and designers for assessing the "adequacy" of consent in the context of software that exhibits behaviors associated with spyware.
© All rights reserved Good et al. and/or ACM Press
Rattenbury, Tye, Good, Nathaniel and Naaman, Mor (2007): Towards automatic extraction of event and place semantics from Flickr tags. In: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval 2007. pp. 103-110.
We describe an approach for extracting semantics of tags, unstructured text-labels assigned to resources on the Web, based on each tag's usage patterns. In particular, we focus on the problem of extracting place and event semantics for tags that are assigned to photos on Flickr, a popular photo sharing website that supports time and location (latitude/longitude) metadata. We analyze two methods inspired by well-known burst-analysis techniques and one novel method: Scale-structure Identification. We evaluate the methods on a subset of Flickr data, and show that our Scale-structure Identification method outperforms the existing techniques. The approach and methods described in this work can be used in other domains such as geo-annotated web pages, where text terms can be extracted and associated with usage patterns.
© All rights reserved Rattenbury et al. and/or ACM Press
Good, Nathaniel, Dhamija, Rachna, Grossklags, Jens, Thaw, David, Aronowitz, Steven, Mulligan, Deirdre and Konstan, Joseph A. (2005): Stopping spyware at the gate: a user study of privacy, notice and spyware. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 43-52.
Spyware is a significant problem for most computer users. The term "spyware" loosely describes a new class of computer software. This type of software may track user activities online and offline, provide targeted advertising and/or engage in other types of activities that users describe as invasive or undesirable. While the magnitude of the spyware problem is well documented, recent studies have had only limited success in explaining the broad range of user behaviors that contribute to the proliferation of spyware. As opposed to viruses and other malicious code, users themselves often have a choice whether they want to install these programs. In this paper, we discuss an ecological study of users installing five real world applications. In particular, we seek to understand the influence of the form and content of notices (e.g., EULAs) on user's installation decisions. Our study indicates that while notice is important, notice alone may not be enough to affect users' decisions to install an application. We found that users have limited understanding of EULA content and little desire to read lengthy notices. Users found short, concise notices more useful, and noticed them more often, yet they did not have a significant effect on installation for our population. When users were informed of the actual contents of the EULAs to which they agreed, we found that users often regret their installation decisions. We discovered that regardless of the bundled content, users will often install an application if they believe the utility is high enough. However, we discovered that privacy and security become important factors when choosing between two applications with similar functionality. Given two similar programs (e.g. KaZaA and Edonkey), consumers will choose the one they believe to be less invasive and more stable. We also found that providing vague information in EULAs and short notices can create an unwarranted impression of increased security. In these cases, it may be helpful to have a standardized format for assessing the possible options and trade-offs between applications.
© All rights reserved Good et al. and/or ACM Press
Heer, Jeffrey, Good, Nathaniel, Ramirez, Ana, Davis, Marc and Mankoff, Jennifer (2004): Presiding over accidents: system direction of human action. In: Dykstra-Erickson, Elizabeth and Tscheligi, Manfred (eds.) Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems April 24-29, 2004, Vienna, Austria. pp. 463-470.
As human-computer interaction becomes more closely modeled on human-human interaction, new techniques and strategies for human-computer interaction are required. In response to the inevitable shortcomings of recognition technologies, researchers have studied mediation: interaction techniques by which users can resolve system ambiguity and error. In this paper we approach the human-computer dialogue from the other side, examining system-initiated direction and mediation of human action. We conducted contextual interviews with a variety of experts in fields involving human-human direction, including a film director, photographer, golf instructor, and 911 operator. Informed by these interviews and a review of prior work, we present strategies for directing physical human action and an associated design space for systems that perform such direction. We illustrate these concepts with excerpts from our interviews and with our implemented system for automated media capture or "Active Capture," in which an unaided computer system uses techniques identified in our design space to act as a photographer, film director, and cinematographer.
© All rights reserved Heer et al. and/or ACM Press
Bellotti, Victoria, Dalal, Brinda, Good, Nathaniel, Flynn, Peter, Bobrow, Daniel G. and Ducheneaut, Nicolas (2004): What a to-do: studies of task management towards the design of a personal task list manager. In: Dykstra-Erickson, Elizabeth and Tscheligi, Manfred (eds.) Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems April 24-29, 2004, Vienna, Austria. pp. 735-742.
This paper reports on the results of studies of task management to support the design of a task list manager. We examined the media used to record and organize to-dos and tracked how tasks are completed over time. Our work shows that, contrary to popular wisdom, people are not poor at prioritizing. Rather, they have well-honed strategies for tackling particular task management challenges. By illustrating what factors influence task completion and how representations function to support task management, we hope to provide a strong foundation for the design of a personal to-do list manager. We also present some preliminary efforts in this direction.
© All rights reserved Bellotti et al. and/or ACM Press
Good, Nathaniel and Krekelberg, Aaron (2003): Usability and privacy: a study of Kazaa P2P file-sharing. In: Cockton, Gilbert and Korhonen, Panu (eds.) Proceedings of the ACM CHI 2003 Human Factors in Computing Systems Conference April 5-10, 2003, Ft. Lauderdale, Florida, USA. pp. 137-144.
Baudisch, Patrick, Good, Nathaniel, Bellotti, Victoria and Schraedley, Pamela (2002): Keeping things in context: a comparative evaluation of focus plus context screens, overviews, and zooming. In: Terveen, Loren (ed.) Proceedings of the ACM CHI 2002 Conference on Human Factors in Computing Systems Conference April 20-25, 2002, Minneapolis, Minnesota. pp. 259-266.
Baudisch, Patrick, Good, Nathaniel and Stewart, Paul (2001): Focus plus context screens: combining display technology with visualization techniques. In: Marks, Joe and Mynatt, Elizabeth D. (eds.) Proceedings of the 14th annual ACM symposium on User interface software and technology November 11 - 14, 2001, Orlando, Florida. pp. 31-40.
Computer users working with large visual documents, such as large layouts,
blueprints, or maps perform tasks that require them to simultaneously access
overview information while working on details. To avoid the need for zooming,
users currently have to choose between using a sufficiently large screen or
applying appropriate visualization techniques. Currently available hi-res
"wall-size" screens, however, are cost-intensive, space-intensive, or both.
Visualization techniques allow the user to more efficiently use the given
screen space, but in exchange they either require the user to switch between
multiple views or they introduce distortion. In this paper, we present a novel
approach to simultaneously display focus and context information. Focus plus
context screens consist of a hi-res display and a larger low-res display. Image
content is displayed such that the scaling of the display content is preserved,
while its resolution may vary according to which display region it is displayed
in. Focus plus context screens are applicable to practically all tasks that
currently use overviews or fisheye views, but unlike these visualization
techniques, focus plus context screens provide a single, non-distorted view. We
present a prototype that seamlessly integrates an LCD with a projection screen
and demonstrate four applications that we have adapted so far.
© All rights reserved Baudisch et al. and/or ACM Press
Show this list on your homepage
Join the technology elite and advance:
Changes to this page (author)10 Feb 2010: Modified12 May 2008: Added
12 May 2008: Added
19 Jun 2007: Added
19 Jun 2007: Added
28 Apr 2003: Added
Page maintainer: The Editorial Team