Social serendipity: mobilizing social software | IEEE Journals & Magazine | IEEE Xplore

Social serendipity: mobilizing social software


Abstract:

Many mobile devices incorporate low-power wireless connectivity protocols, such as Bluetooth, that can be used to identify an individual to other people nearby. We have d...Show More

Abstract:

Many mobile devices incorporate low-power wireless connectivity protocols, such as Bluetooth, that can be used to identify an individual to other people nearby. We have developed an architecture that leverages this functionality in mobile phones - originally designed for communication at a distance - to connect people across the room. Serendipity is an application of the architecture. It combines the existing communications infrastructure with online introduction systems' functionality to facilitate interactions between physically proximate people through a centralized server. A new mobile-phone-based system uses Bluetooth hardware addresses and a database of user profiles to cue informal, face-to-face interactions between nearby users who don't know each other, but probably should.
Published in: IEEE Pervasive Computing ( Volume: 4, Issue: 2, Jan.-March 2005)
Page(s): 28 - 34
Date of Publication: 09 May 2005

ISSN Information:

References is not available for this document.

Bluetooth Proximity Detection

After years of hype, Bluetooth is finally seeing mass-market adoption in mobile electronics. According to the official Bluetooth Web site (www.bluetooth.com/news/releases.asp), more than three million Bluetooth devices are currently sold each week. The protocol's primary use is to connect items such as a wireless headset or laptop to a phone. As a by-product, Bluetooth devices can also discover other devices nearby. This “accidental” functionality enables mobile communication devices to act as a gateway to online introduction systems, such as Friendster, Monster, or Match.com. The difference is that mobile devices situate the introduction in an immediate social context, rather than asynchronously in front of a desktop computer.

Select All
1.
Y. Iwatani, "Love: Japanese Style", Wired News, Jun 1998, [online] Available: www.wired.com/news/culture/0,1284,12899,00.html.
2.
J. F. McCarthy et al., "Proactive Displays and the Experience UbiComp Project", ACM Siggroup Bull., pp. 38-41, Dec. 2002.
3.
M. Terry et al., "Social Net: Using Patterns of Physical Proximity over Time to Infer Shared Interests", Proc. Human Factors in Computing Systems (CHI 2002), pp. 816-817, 2002.
4.
L. E. Holmquist, J. Falk and J. Wigstrom, "Supporting Group Collaboration with Interpersonal Awareness Devices", J. Personal Technologies, vol. 3, no. 1–2, pp. 105-124, 1999.
5.
E. Paulos and E. Goodman, "The Familiar Stranger: Anxiety Comfort and Play in Public Places", Proc. Human Factors in Computing Systems (CHI 2004), pp. 223-230, 2004.
6.
B. Wood et al., "Market Share: Mobile Terminals Worldwide 4Q04 and 2004", market report, Mar. 2004.
7.
M. Laibowitz, "Parasitic Mobility for Sensate Media", 2004.
8.
"Interaction Cueing Using Wireless Networking and a User Profile Database", May 2004.
9.
N. Eagle and A. Pentland, "Reality Mining: Sensing Complex Social Systems", Personal and Ubiquitous Computing, June 2005.
10.
N. Eagle, "Can Serendipity Be Planned?", MIT Sloan Management Rev., vol. 46, no. 1, pp. 10-14, 2004.
11.
R. Borovoy et al., "Meme Tags and Community Mirrors: Moving from Conferences to Collaboration", Proc. 1998 ACM Conf. Computer Supported Cooperative Work, pp. 159-168, 1998.
12.
R. Sandhu, D. Ferraiolo and R. Kuhn, "The NIST Model for Role Based Access Control: Towards a Unified Standard", Proc. 5th ACM workshop on Role Based Access Control, pp. 47-63, 2000.

Contact IEEE to Subscribe

References

References is not available for this document.