Sakari Tamminen

Learn More
When on the move, cognitive resources are reserved partly for passively monitoring and reacting to contexts and events, and partly for actively constructing them. The Re-source Competition Framework (RCF), building on the Multiple Resources Theory, explains how psychosocial tasks typical of mobile situations compete for cognitive resources and then suggests(More)
The workload needed for managing privacy and publicness in current social network services (SNSs) is placed on individuals, yet people have few means to control what others disclose about them. This paper considers SNS-users' concerns in relation to online disclosure and the ways in which they cope with these both individually and collaboratively. While(More)
Mobile urban environments present a challenge for context-aware computers because they differ from fixed indoor contexts such as offices, meeting rooms, and lecture halls in many important ways. Internal factors such as tasks and goals are different—external factors such as social resources are dynamic and unpredictable. An empirical, user-centred approach(More)
A mundane but theoretically interesting and practically relevant situation presents itself on social networking sites: the co-presence of multiple groups important to an individual. This primarily qualitative study concentrates on the point of view of individual SNS users and their perspectives on multiple group affiliations. After charting the perceived(More)
During the last few years, there have been debates over what is context and how computers should act upon it. Two disparate camps of thought can be recognized. First, Realism, having its roots in natural sciences, believes that contexts exist out there and that, if properly instrumented and programmed, computers can correctly recognize and adapt to them.(More)
Technology acceptance models are tools for predicting users’ reception of technology by measuring how they rate statements on a questionnaire scale. It has been claimed that these tools help to assess the social acceptance of a final IT product when its development is still underway. However, their use is not without problems. This paper highlights some of(More)
by the Society for the Study of Symbolic Interaction. All rights reserved. Please direct all requests for permission to photocopy or reproduce article content through the University of California Press’s Rights and Permissions website, at http://www.ucpressjournals.com/reprintinfo.asp. DOI: 10.1525/si.2010.33.4.603. The Virtuality of Virtual Worlds, or What(More)
Based on a summary description of privacy protection research within three fields of inquiry, viz. the social sciences, legal science, and computer and systems sciences, we discuss multidisciplinary approaches with regard to the difficulties and the risks that they entail as well as their possible advantages. The latter include the identification of(More)
Based on a study of everyday users of modern information technologies, we present a set of possible ways to interpret privacy in the context of new information technologies. The results indicate a need to pay more attention to subject-subject information exchange in the study of privacy and emerging information technologies. The results also give us reason(More)