Sunny Consolvo's research while affiliated with Google Inc. and other places

Publications (113)

Article
During the COVID-19 pandemic, risk negotiation became an important precursor to in-person contact. For young adults, social planning generally occurs through computer-mediated communication. Given the importance of social connectedness for mental health and academic engagement, we sought to understand how young adults plan in-person meetups over co...
Preprint
Full-text available
At-risk users are people who experience elevated digital security, privacy, and safety threats because of what they do, who they are, where they are, or who they are with. In this systematization work, we present a framework for reasoning about at-risk users based on a wide-ranging meta-analysis of 85 papers. Across the varied populations that we e...
Article
Full-text available
This mixed-method study examined the experiences of college students during the COVID-19 pandemic through surveys, experience sampling data collected over two academic quarters (Spring 2019 n 1 = 253; Spring 2020 n 2 = 147), and semi-structured interviews with 27 undergraduate students. There were no marked changes in mean levels of depressive symp...
Preprint
In this work, we demonstrate how existing classifiers for identifying toxic comments online fail to generalize to the diverse concerns of Internet users. We survey 17,280 participants to understand how user expectations for what constitutes toxic content differ across demographics, beliefs, and personal experiences. We find that groups historically...
Preprint
Full-text available
People who are involved with political campaigns face increased digital security threats from well-funded, sophisticated attackers, especially nation-states. Improving political campaign security is a vital part of protecting democracy. To identify campaign security issues, we conducted qualitative research with 28 participants across the U.S. poli...
Article
South Asia has one of the world's largest populations—India, Pakistan, and Bangladesh alone are home to more than 20% of all people. The region is also one of the fastest-growing technology markets as a result of its increased infrastructure and growing affordability. Despite this progress, South Asia faces one of the largest online gender disparit...
Conference Paper
South Asia faces one of the largest gender gaps online globally, and online safety is one of the main barriers to gender-equitable Internet access [GSMA, 2015]. To better understand the gendered risks and coping practices online in South Asia, we present a qualitative study of the online abuse experiences and coping practices of 199 people who iden...
Conference Paper
Full-text available
Addressing digital security and privacy issues can be particularly difficult for users who face challenging circumstances. We performed semi-structured interviews with residents and staff at 4 transitional homeless shelters in the U.S. San Francisco Bay Area (n=15 residents, 3 staff) to explore their digital security and privacy challenges. Based o...
Conference Paper
Web browser warnings should help protect people from malware, phishing, and network attacks. Adhering to warnings keeps people safer online. Recent improvements in warning design have raised adherence rates, but they could still be higher. And prior work suggests many people still do not understand them. Thus, two challenges remain: increasing both...
Article
Users often don’t follow expert advice for staying secure online, but the reasons for users’ non-compliance are only partly understood. While some experts express frustration with users for ignoring existing advice, others argue that the advice itself is part of the problem. To inform this debate, we surveyed 231 security experts and asked, “What a...
Article
This book will give you a practical overview of several methods and approaches for designing mobile technologies and conducting mobile user research, including how to understand behavior and evaluate how such technologies are being (or may be) used out in the world. Each chapter includes case studies from our own work and highlights advantages, lim...
Conference Paper
We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into three phases: physical control, escape, and life apart. This three-phase framework combines technol...
Chapter
“Did it work?” This chapter discusses how to answer that seemingly simple question when your mobile system is intended to promote change (as opposed to simple observation, which is discussed in Chapters 2 and 4 on sensing and experience sampling). As you will soon see, answering that question is far more complicated than it might seem.
Chapter
Over the past two decades, as mobile devices have matured into their current state, researchers have explored many ways to understand how new systems fit into people’s lives. Throughout this book, we have provided practical overviews of a wide variety of these methods, including app instrumentation; diverse contextual sensing; lab studies; field st...
Article
Users often don't follow expert advice for staying secure online, but the reasons for users' noncompliance are only partly understood. More than 200 security experts were asked for the top three pieces of advice they would give non-tech-savvy users. The results suggest that, although individual experts give thoughtful, reasonable answers, the exper...
Article
Recognizing how intimate partner abuse's three phases - physical control, escape from abuser, and life apart - affect survivors' technology use can help technology creators better understand and support this population's digital security and privacy needs.
Chapter
Mobile technologies have dramatically changed the way that people interact with each other and the world. People spend an average of over 3.5 hours per day on their smartphones (Khalaf, 2015), using dozens of different applications in a day. Experts predict that the Internet of Things (IoT) will be thriving in less than 10 years (Anderson and Raini...
Chapter
Mobile devices are exciting platforms for creating new types of experiences because of the rich combination of sensors and hardware that are available on the device. From sensing location, motion, proximity indoors or to other people, activity, or just what users are doing in an application, mobile devices enable an entirely new range of interactio...
Conference Paper
Many technologies assume a single user will use an account or device. But account and device sharing situations (when 2+ people use a single device or account) may arise during everyday life. We present results from a multiple-methods study of device and account sharing practices among household members and their relations. Among our findings are t...
Conference Paper
Full-text available
Vehicles increasingly include features that rely on hi-tech sensors and recording; however, little is known of public attitudes toward such recording. We use two studies, an on-line survey (n=349) and an interview-based study (n=15), to examine perceptions of vehicle-based sensing and recording. We focus on: 1) how vehicle-based recording and sensi...
Conference Paper
Browsers warn users when the privacy of an SSL/TLS connection might be at risk. An ideal SSL warning would empower users to make informed decisions and, failing that, guide confused users to safety. Unfortunately, users struggle to understand and often disregard real SSL warnings. We report on the task of designing a new SSL warning, with the goal...
Article
Privacy and security issues might very well be the greatest barrier to creating a ubiquitously connected world. The articles in this special issue show that addressing such concerns will require not only efficient algorithms and secure protocols but also usable interfaces and socially compatible designs. Furthermore, researchers with a strong inter...
Article
In addition to storing a plethora of sensitive personal and work information, smartphones also store sensor data about users and their daily activities. In order to understand users' behaviors and attitudes towards the security of their smartphone data, we conducted 28 qualitative interviews. We examined why users choose (or choose not) to employ l...
Article
Full-text available
Website owners use web analytics tools to better understand their visitors for a range of purposes. However, there is limited understanding of how owners of non-transactional websites use and benefit from web analytics. Through semi-structured interviews (n=18) with non-transactional web analytics users we explore these uses and benefits. Participa...
Article
Web browsers show HTTPS authentication warnings (i.e., SSL warnings) when the integrity and confidentiality of users' interactions with websites are at risk. Our goal in this work is to decrease the number of users who click through the Google Chrome SSL warning. Prior research showed that the Mozilla Firefox SSL warning has a much lower click-thro...
Article
Full-text available
With so much of our lives digital, online, and not entirely under our control, we risk losing access to our communications, reputation, and data. Recent years have brought a rash of high-profile account compromises, but account hijacking is not limited to high-profile accounts. In this paper, we report results of a survey about people's experiences...
Article
This case study presents a critical analysis of microsurveys as a method for conducting user experience research. We focus specifically on Google Consumer Surveys (GCS) and analyze a combination of log data and GCSs run by the authors to investigate how they are used, who the respondents are, and the quality of the data. We find that such microsurv...
Article
Full-text available
Guest editors M. Angela Sasse and Charles C. Palmer speak with security practitioners about what companies are doing to keep customers secure, and what users can do to stay safe.
Conference Paper
Full-text available
The Psychomotor Vigilance Task (PVT) is a validated reaction time (RT) test used to assess aspects of sleep loss including alertness and sleepiness. PVT typically requires a physical button to assess RT, which minimizes the effect of execution time (the time taken to perform a gesture) on RT. When translating this application to mobile devices, a t...
Article
Full-text available
In-home sensing and inference systems impose privacy risks and social tensions, which can be substantial barriers for the wide adoption of these systems. To understand what might affect people's perceptions and acceptance of in-home sensing and inference systems, we conducted an em-pirical study with 22 participants from 11 households. The study in...
Conference Paper
Full-text available
The bedroom environment can have a significant impact on the quality of a person's sleep. Experts recommend sleeping in a room that is cool, dark, quiet, and free from disruptors to ensure the best quality sleep. However, it is sometimes difficult for a person to assess which factors in the environment may be causing disrupted sleep. In this paper,...
Article
Many have enthusiastically greeted the ability to search and view public records online as a great advance for transparency and accountability. Such ability, however, also creates value tensions with privacy and other important human values. In this paper, we report findings from a survey of 134 residents of the US Pacific Northwest on their awa...
Conference Paper
Full-text available
Many people have turned to technological tools to help them be physically active. To better understand how goal-setting, rewards, self-monitoring, and sharing can encourage physical activity, we designed a mobile phone application and deployed it in a four-week field study (n=23). Participants found it beneficial to have secondary and primary weekl...
Article
Full-text available
Sleep is a basic physiological process essential for good health. However, 40 million people in the U.S. are diagnosed with sleep disorders, with many more undiagnosed. To help address this problem, we developed an application, ShutEye, which provides a peripheral display on the wall-paper of the user's mobile phone to promote awareness about recom...
Conference Paper
Each time a user installs an application on their Android phone they are presented with a full screen of information describing what access they will be granting that application. This information is intended to help them make two choices: whether or not they trust that the application will not damage the security of their device and whether or not...
Article
As the rates of lifestyle diseases such as obesity, diabetes, and heart disease continue to rise, the development of effective tools that can help people adopt and sustain healthier habits is becoming ever more important. Mobile computing holds great promise for providing effective support for helping people manage their health in everyday life. Ye...
Conference Paper
Full-text available
As advances in technology accelerate, sensors and recording devices are increasingly being integrated into homes. Although the added benefit of sensing is often clear (e.g., entertainment, security, encouraging sustainable behaviors, etc.), the home is a private and intimate place, with multiple stakeholders who may have competing priorities and to...
Conference Paper
Full-text available
Many have enthusiastically greeted the ability to search and view public records online as a great advance for transparency and accountability. Such ability, however, also creates value tensions with privacy and other important human values. In this paper, we report findings from a survey of 134 residents of the US Pacific Northwest on their awaren...
Conference Paper
Full-text available
New technologies for encouraging physical activity, healthy diet, and other types of health behavior change now frequently appear in the HCI literature. Yet, how such technologies should be evaluated within the context of HCI research remains unclear. In this paper, we argue that the obvious answer to this question - that evaluations should assess...
Conference Paper
Full-text available
Getting the right amount of quality sleep is a key aspect of good health, along with a healthy diet and regular exercise. Human-computer interaction (HCI) researchers have recently designed systems to support diet and exercise, but sleep has been relatively under-studied in the HCI community. We conducted a literature review and formative study aim...
Article
The importance of regular physical activity to overall health has been well established, yet adults in the United States are leading increasingly sedentary lives. Research suggests that lowering perceived barriers to exercise is an effective strategy for encouraging physical activity. This article describes the top barriers that emerged from a qual...
Conference Paper
Full-text available
Obesity, mood, and associated behaviors spread within social networks [1]. Facebook, the primary representation of these networks, shapes our perceptions of social norms and the expectations we set for ourselves. As such, Facebook holds potential to influence health behaviors of individuals and improve public health. This panel explores that potent...
Conference Paper
Full-text available
Anyone within range of an 802.11 wireless network ("Wi-Fi") can use free software to collect the unencrypted web traffic of others on the network. However, many Wi-Fi users are completely unaware of the risk that this creates. This work aims to improve users' awareness about what they expose to others on Wi-Fi networks and provide them with some co...
Conference Paper
Full-text available
The importance of regular physical activity to overall health has been well established, yet U.S. adults are leading increasingly sedentary lives. Research suggests that lowering perceived barriers to physical activity is a critical part of interventions that encourage physical activity. In this paper, we describe the top five barriers---two of whi...
Chapter
Traditionally smart environments have been understood to represent those (often physical) spaces where computation is embedded into the users’ surrounding infrastructure, buildings, homes, and workplaces. Users of this “smartness” move in and out of these spaces. Ambient intelligence assumes that users are automatically and seamlessly provided with...
Article
Full-text available
Lifestyle modification is a key facet of the prevention and management of chronic diseases. Mobile devices that people already carry provide a promising platform for facilitating these lifestyle changes. This paper describes key lessons learned from the development and evaluation of two mobile systems for encouraging physical activity. We argue tha...
Conference Paper
Full-text available
The greatest contributor of CO2 emissions in the average American household is personal transportation. Because transportation is inherently a mobile activity, mobile devices are well suited to sense and provide feedback about these activities. In this paper, we explore the use of personal ambient displays on mobile phones to give users feedback ab...
Article
UbiFit uses on-body sensing, real-time activity inference, and a personal, mobile display to encourage people to incorporate regular and varied physical activity into everyday life.
Conference Paper
Full-text available
More and more personal devices such as mobile phones and multimedia players use embedded sensing. This means that people are wearing and carrying devices capable of sensing details about them such as their activity, location, and environment. In this paper, we explore privacy concerns about such personal sensing through interviews with 24 participa...
Conference Paper
Full-text available
Increasingly, users access online services such as email, e- commerce, and social networking sites via 802.11-based wireless networks. As they do so, they expose a range of personal information such as their names, email addresses, and ZIP codes to anyone within broadcast range of the network. This paper presents results from an exploratory study t...
Conference Paper
The focus of this workshop is on the development of interfaces for long-term, voluntary use, spanning dozens, if not thousands, of interactions, and in which maintenance of user adherence to a desired interaction usage pattern is of primary interest. Domains in which these issues are important include: wellness applications, such as long-term exerc...
Conference Paper
Full-text available
In this paper, we propose design strategies for persuasive technologies that help people who want to change their everyday behaviors. Our strategies use theory and prior work to substantially extend a set of existing design goals. Our extensions specifically account for social characteristics and other tactics that should be supported by persuasive...
Conference Paper
Full-text available
While health records are increasingly stored electronically, we, as citizens, have little access to this data about ourselves. We are not used to thinking of these official records either as ours or as useful to us. We increasingly turn to the Web, however, to query any ache, pain or health goal we may have before consulting with health care profes...
Conference Paper
There is a pressing need for an effective means of transforming health behaviors. Obesity, anxiety and other behavior-generated health conditions result in billions of dollars of healthcare costs and a great deal of human suffering. Technology innovations are rapidly presenting new delivery mechanisms that can be harnessed to influence health behav...
Conference Paper
Goal-setting has been shown to be an effective strategy for changing behavior; therefore employing goal-setting in persuasive technologies could be an effective way to encourage behavior change. In our work, we are developing persuasive technologies to encourage individuals to live healthy lifestyles with a focus on being physically active. As part...
Article
Full-text available
The ability to detect what humans are doing has long been a key part of the ubiquitous computing agenda. We demonstrate a system that can detect many day-to-day human activities in considerable detail. The system has three novel components: sensors based on Radio Frequency Identification (RFID) tags, a library of roughly 38,000 human activity model...
Article
Full-text available
Activity-aware systems have inspired novel user interfaces and new applications in smart environments, surveillance, emergency response, and military missions. Systems that recognize human activities from body-worn sensors can further open the door to a world of healthcare applications, such as fitness monitoring, eldercare support, long-term preve...
Conference Paper
Full-text available
Personal, mobile displays, such as those on mobile phones, are ubiquitous, yet for the most part, underutilized. We present results from a field experiment that investigated the effectiveness of these displays as a means for improving awareness of daily life (in our case, self-monitoring of physical activity). Twenty-eight participants in three exp...
Conference Paper
Full-text available
Recent advances in small inexpensive sensors, low-power processing, and activity modeling have enabled applications that use on-body sensing and machine learning to infer people's activities throughout everyday life. To address the growing rate of sedentary lifestyles, we have developed a system, UbiFit Garden, which uses these technologies and a p...
Article
To evaluate ubiquitous computing technologies, which may be embedded in the environment, embedded in objects, worn, or carried by the user throughout everyday life, it is essential to use methods that accommodate the often unpredictable, real-world environments in which the technologies are used. This article discusses how we have adapted and appli...
Article
Full-text available
This paper presents MyExperience, a system for capturing both objective and subjective in situ data on mobile computing activities. MyExperience combines the following two techniques: 1) passive logging of device usage, user context, and environmental sensor readings, and 2) active context-triggered user experience sampling to collect in situ, subj...
Article
In this talk, we describe how the MyExperience tool uses sensing, machine inference, and self-report to gather information about human attitudes, behaviors, and mobile device usage. To illustrate this, we focus on four field studies that leverage different aspects of MyExperience to collect rich quantitative and qualitative data in the field. For e...
Conference Paper
Drawing on Value Sensitive Design, we developed a workable privacy addendum for an open source software license that not only covers intellectual property rights while allowing software developers to modify the software (the usual scope of an open source license), but also addresses end- user privacy. One central innovation of our work entails the...