12.04.2014 Views

Social Serendipity: Proximity Sensing and Cueing - Human ...

Social Serendipity: Proximity Sensing and Cueing - Human ...

Social Serendipity: Proximity Sensing and Cueing - Human ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Role-Based Access Control. Role-Based Access Control (RBAC) is a technique used<br />

to assign user permissions that correspond to functional roles in an organization [12].<br />

By capturing extensive user behavior patterns over time, our system has the potential<br />

to infer not only relationships between users, but also their permissions. For example,<br />

if two students working in different labs begin Tuesday collaborations at a coffee<br />

shop, they should be granted constrained entrance access to each other's lab.<br />

Public Release of <strong>Serendipity</strong>. While Symbian Series 60 phones have become a<br />

st<strong>and</strong>ard for Nokia's high-end h<strong>and</strong>sets, they represent a small fraction of today's Bluetooth<br />

devices. We are in the final stages of developing a MIDP (Java) version of the<br />

BlueAware application that will run on a wider range of mobile phones. The final test<br />

of <strong>Serendipity</strong> will be its public launch on www.mobule.net. We hope that not only<br />

will the application prove to be robust, but also quite popular within the realms described<br />

above, as well as those unanticipated.<br />

8 Conclusions<br />

Our society is more connected than ever before due to two parallel paradigm shifts in<br />

computing: movement from desktop to mobile computing, <strong>and</strong> from individual to<br />

social software. Mobile phones have become st<strong>and</strong>ard attire across the globe. In millions<br />

of pockets <strong>and</strong> purses are wireless transceivers, microphones, <strong>and</strong> the computational<br />

horsepower of a desktop computer of just a few years ago. Today the majority<br />

of this processing power goes unused. However, once the emphasis of mobile applications<br />

shift towards supporting the desire of individuals to affiliate with others to<br />

achieve their personal goals, this will soon change. We are catching glimpses of introduction<br />

services with the advent of online dating <strong>and</strong> knowledge management, yet the<br />

real potential of these new applications will be realized by an infrastructure of socially<br />

curious mobile devices, allowing us to untether social software from the desktop <strong>and</strong><br />

imbue it into everyday life. It is our belief that the mobile phone market is at a critical<br />

tipping point where the functionality will shift from the traditional telephone paradigm<br />

to a much broader social-centric perspective. We hope that this work represents a step<br />

further in that direction.<br />

Acknowledgements<br />

The authors would like to express their gratitude to everyone who participated<br />

throughout the development of the application including Pedro Yip, Steve Kannan,<br />

Doochan Han, Greg Sterndale, Tony Pryor, Jon Gips, Mat Laibowitz, <strong>and</strong> Igor Sylvester.<br />

Additionally, the authors would like to thank members of both Nokia <strong>and</strong><br />

Nokia Research, particularly Saku Hieta, Peter Wakim, Hari Pennanen, Suvi Hiltunen<br />

<strong>and</strong> Timo Salomaki.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!