SlideShare a Scribd company logo
1 of 21
Download to read offline
Undo for Mobile Phones
Does Your Mobile Phone Need an Undo Key? Do You?

    Marco Loregian, University of Milano-Bicocca (Italy)
                 www.marcoloregian.net
Undo
• Well known function of PC
  applications
• Allows to revert (the effects of)
  commands
• Applied to user actions
• Different strategies
Undo models
        A coarse classification
What does “undo”
  mean when
 operating with
 mobile phones?
...and I really
 mean phones,
not cool gadgets
The problem

• We need to know it in order to
  design usable (successful) devices
• How should we find it out?
• Undo is a user intention
• We surveyed users
Concerns in mind

• Reversibility (yes/no)

• Criticality (high/low)
The survey
Online survey, 20 questions, 5 parts


    1. Personal info (demographics)
    2. Introduction (basic operations)
    3. Scenario (multiple steps)
    4. Reversed perspective
    5. Conclusion (overall opinion)
The results
              Full stats and comments in the paper




• Demographics

• Interesting facts from the survey
Demographics
     146 respondents, 133 answered all questions

                       Age Distribution                      Gender
80
            80

60


40                                                     45%
                  36                                                  55%
20

      11                  10
 0                               6
                                     1     1     1                      Male
     15-20 21-25 26-30 31-35 36-40 41-45 46-50 51-55
                                                                        Female
Number of phones used regularly
150,0

112,5          116
                                                With respect to the
                                                diffusion of mobile
 75,0                                           phones, the sample is
                                                consistent with Italian
 37,5                                           population (istat.it)
                       25

   0     1                     4
        none   one    two    three   more


                                                   Computer Skills (wrt applications)
                                           60
                                                                                        54
                                                                   52

               Different computer          45

                skills may indicate                                         39

                                           30
          familiarity with different
                       undo models
                                           15

                                            0             1
                                                 None   Basic   Average Advanced Absolute
Highlights and
selected survey
     items
Confirmation
                 Prompt for confirmation
 100
           97

  75


  50


  25                       33

                                           18
   0
           Yes             No          Yes, if...

66% want to know what they are undoing
22% ask for a transparent implementation
12% want to be warned in case of irreversibility
Granularity
              Question 8                            Question 10
110,0                              70,0
             102
                                                        61
 82,5                              52,5
                                          47
 55,0                              35,0


 27,5                              17,5
                      27                       17                 18
        13
   0                       4         0
                                                                       1


        Different preferences, variable granularity with
        respect to different situations… context awareness?
        The same key has different behaviors in different
        moments, sometimes matching the End key
Timeline

• Very simple/intuitive interaction

• Linear and sequential undo
  operations undone one-by-one in reverse chronological order
Privacy and
           Responsibility
                              Can a SMS be deleted from your phone if you’ve not read it?

                      110,0
                                                                       103

• Nothing hidden to    82,5
  me
                       55,0

• The responsible
  pays the price       27,5                 31


                         0
                                           Yes                         No
The verdict
     Would you like mobile phones to have an undo key?
                                                            53
70                                                            %
                                                                  Ye
                                                                     s
                            65
60

50

40
      38
30                                                34


20

10

 0
     Yes                    No                 Yes, if...
Conclusion
• Undo for mobile phones:
  linear, sequential, with
  variable granularity and
  confirmation before execution


• Generalization of the results
More work

• Undo for email, a.k.a. retraction
  (poster yesterday)



• Undo for Ubiquitous Computing
  published at UIC’08, IDC’2008
Moral of the talk
                undo!
                undo!
                undo!




  If we had more ctrl+Z
 our lives might be better
Thank you,
              any question?


 Undo for Mobile Phones
Does Your Mobile Phone Need an Undo Key? Do You?

    Marco Loregian, University of Milano-Bicocca (Italy)
                 www.marcoloregian.net

More Related Content

More from Marco Loregian

Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3Marco Loregian
 
Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)Marco Loregian
 
lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009Marco Loregian
 
lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009Marco Loregian
 
Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009Marco Loregian
 
Undo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing EnvironmentsUndo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing EnvironmentsMarco Loregian
 
CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?Marco Loregian
 
Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4Marco Loregian
 
Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3Marco Loregian
 
Sistemi Context Aware Esercitazione 1
Sistemi Context Aware   Esercitazione 1Sistemi Context Aware   Esercitazione 1
Sistemi Context Aware Esercitazione 1Marco Loregian
 
Mobile Social Software
Mobile Social SoftwareMobile Social Software
Mobile Social SoftwareMarco Loregian
 

More from Marco Loregian (15)

Lezione ID 2010 -3
Lezione ID 2010 -3Lezione ID 2010 -3
Lezione ID 2010 -3
 
Lezione ID 2010 - 1
Lezione ID 2010 - 1Lezione ID 2010 - 1
Lezione ID 2010 - 1
 
Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3Lezione ID 2010 - 2 / 3
Lezione ID 2010 - 2 / 3
 
Cac Es3 2009
Cac Es3 2009Cac Es3 2009
Cac Es3 2009
 
Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)Sistemi context-aware, esercitazione 2 (3 giugno 2009)
Sistemi context-aware, esercitazione 2 (3 giugno 2009)
 
lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009lezione interaction design 18 marzo 2009
lezione interaction design 18 marzo 2009
 
lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009lezione interaction design 11 marzo 2009
lezione interaction design 11 marzo 2009
 
Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009Lezione Interaction Design 10 marzo 2009
Lezione Interaction Design 10 marzo 2009
 
Undo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing EnvironmentsUndo in Context-aware Collaborative Ubiquitous-Computing Environments
Undo in Context-aware Collaborative Ubiquitous-Computing Environments
 
CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?CSCW and Web 2.0: are We in?
CSCW and Web 2.0: are We in?
 
Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4Sistemi Context-aware: Esercitazione 4
Sistemi Context-aware: Esercitazione 4
 
Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3Sistemi Context-aware: Esercitazione 3
Sistemi Context-aware: Esercitazione 3
 
Cac Es2
Cac Es2Cac Es2
Cac Es2
 
Sistemi Context Aware Esercitazione 1
Sistemi Context Aware   Esercitazione 1Sistemi Context Aware   Esercitazione 1
Sistemi Context Aware Esercitazione 1
 
Mobile Social Software
Mobile Social SoftwareMobile Social Software
Mobile Social Software
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Undo for Mobile Phones Does Your Mobile Phone Need an Undo Key? Do You?

  • 1. Undo for Mobile Phones Does Your Mobile Phone Need an Undo Key? Do You? Marco Loregian, University of Milano-Bicocca (Italy) www.marcoloregian.net
  • 2. Undo • Well known function of PC applications • Allows to revert (the effects of) commands • Applied to user actions • Different strategies
  • 3. Undo models A coarse classification
  • 4. What does “undo” mean when operating with mobile phones?
  • 5. ...and I really mean phones, not cool gadgets
  • 6. The problem • We need to know it in order to design usable (successful) devices • How should we find it out? • Undo is a user intention • We surveyed users
  • 7. Concerns in mind • Reversibility (yes/no) • Criticality (high/low)
  • 8. The survey Online survey, 20 questions, 5 parts 1. Personal info (demographics) 2. Introduction (basic operations) 3. Scenario (multiple steps) 4. Reversed perspective 5. Conclusion (overall opinion)
  • 9. The results Full stats and comments in the paper • Demographics • Interesting facts from the survey
  • 10. Demographics 146 respondents, 133 answered all questions Age Distribution Gender 80 80 60 40 45% 36 55% 20 11 10 0 6 1 1 1 Male 15-20 21-25 26-30 31-35 36-40 41-45 46-50 51-55 Female
  • 11. Number of phones used regularly 150,0 112,5 116 With respect to the diffusion of mobile 75,0 phones, the sample is consistent with Italian 37,5 population (istat.it) 25 0 1 4 none one two three more Computer Skills (wrt applications) 60 54 52 Different computer 45 skills may indicate 39 30 familiarity with different undo models 15 0 1 None Basic Average Advanced Absolute
  • 13. Confirmation Prompt for confirmation 100 97 75 50 25 33 18 0 Yes No Yes, if... 66% want to know what they are undoing 22% ask for a transparent implementation 12% want to be warned in case of irreversibility
  • 14. Granularity Question 8 Question 10 110,0 70,0 102 61 82,5 52,5 47 55,0 35,0 27,5 17,5 27 17 18 13 0 4 0 1 Different preferences, variable granularity with respect to different situations… context awareness? The same key has different behaviors in different moments, sometimes matching the End key
  • 15. Timeline • Very simple/intuitive interaction • Linear and sequential undo operations undone one-by-one in reverse chronological order
  • 16. Privacy and Responsibility Can a SMS be deleted from your phone if you’ve not read it? 110,0 103 • Nothing hidden to 82,5 me 55,0 • The responsible pays the price 27,5 31 0 Yes No
  • 17. The verdict Would you like mobile phones to have an undo key? 53 70 % Ye s 65 60 50 40 38 30 34 20 10 0 Yes No Yes, if...
  • 18. Conclusion • Undo for mobile phones: linear, sequential, with variable granularity and confirmation before execution • Generalization of the results
  • 19. More work • Undo for email, a.k.a. retraction (poster yesterday) • Undo for Ubiquitous Computing published at UIC’08, IDC’2008
  • 20. Moral of the talk undo! undo! undo! If we had more ctrl+Z our lives might be better
  • 21. Thank you, any question? Undo for Mobile Phones Does Your Mobile Phone Need an Undo Key? Do You? Marco Loregian, University of Milano-Bicocca (Italy) www.marcoloregian.net