« October 18, 2004 - October 24, 2004 | Main | November 1, 2004 - November 7, 2004 »

29 October 2004

Usage data on Internet access through Hotspots

Nearly all companies and individuals interviewed by In-Stat/MDR for Hotspots: Influencers and Individuals are aware of this new Internet access service. Hotspots usage appears however to be sporadic. Half of the respondents use hotspots for Internet access, and 40% of them do so once every couple of months or less. With availability and security, the main concern is price: respondents are unwilling to pay more than 8$ a month on this Internet access.

Where: US
When: October 2004 (publication)

28 October 2004

Web searching 1.0: Public searching of the Web, by A. Spink and B.J. Jansen

The results from seven years of research on how people look for information on the web are presented in a new book by Amanda Spink and Bernard J. Jansen: Web searching: Public searching of the Web. The book is not available yet, but some reviews are.

Among the findings, Spink and Jansen observe little evolution over time in search behaviour: people do simple, rapid searches. On average they enter two words per search; inspect only the first page of results; do two queries per search session; search sessions are short, less than five minutes.

What has significantly evolved over time is the content searched. In 1997, about 20% of the search terms used was sex-related, now they account for about 5% in the US, between 8 and 10% in Europe. The opposite has happened with search terms related to e-commerce: they are 86% more frequent now than seven years ago.

Where: US (mostly)
When: 1997 - 2003

27 October 2004

Online safety-related behaviours and attitudes

Most uses of Internet technologies are straightforward. Others instead are quite sophisticated. They require a good understanding of how the technology works and some system management. The AOL and National Cyber Security Alliance Online Safety Study reminds us of how complex Internet can be for many people, and even for those experienced users who took part in the study (online for more than 6 years on average). The research highlights how this complexity contributes to confusion and inefficacy when it comes to manage Online Safety.

A word on the structure of the study, because it is clever and original. A sample of 329 urban/suburban adult Internet users were surveyed over the phone, and answered around 40 questions, about demographics, factual behavioural descriptions, knowledge evaluations and attitudes. Then, a group of technicians examined the respondents' computers safety status and configuration.

In the large majority of households, the connected home computer plays a sensitive role: it stores confidential information and processes confidential transactions (84% and 72% respectively). Most people feel that it is safe from online threats (77%) and from hackers (60%). At the same time, for some people the connected home computer is also an open system. Almost half of the respondents (47%) have downloaded file sharing applications, and one computer out of four has such an application installed and active. Fewer households have a wireless network (12%), and when they do, most take steps to protect it (62% encrypt and 51% use MAC filtering).

VIRUS PROTECTION
A majority of respondents (73%) declare that they feel safe from viruses (14% very, 59% somewhat safe) even though in the past they experienced viruses on their computer (63%, 18% don't know) and today they don't know whether they do or not (50%) or think they might have one (6%). The home computer analysis shows that 19% have at least a virus.

When it comes to protection, the large majority (83%) says they have anti-virus software (9% don't know). The home computer analysis confirms the presence of anti-virus software (85%). This software either came with the computer (55%) or was purchased by the user (44%). But since new viruses appear all the time, anti-virus software has to be kept constantly updated. The majority of respondents (71) say that they update daily/weekly. The others say that they never do so (12%); they do so on a monthly basis (12%) or on a yearly basis (5%). Contrary to what has been said, the analysis indicates 33% updates within the previous week and 52% between one and more than six month. In reality, the majority of respondents (67%) either have no anti-virus protection or have not recently updated their protection.

The fact that most respondents (58%) say they don't understand well the difference between a firewall and antivirus software doesn't help.

ACCESS PROTECTION
Given the previous findings, it is not surprising to discover that half the respondents (48%) feel they know well what a firewall is and how it works. One on three (37%) say they use a firewall and think that the firewall is set up correctly (87%). The home computer analysis confirms the proportion of firewalls (33%), but also indicates that most of the times they aren’t properly configured (72%).

SPYWARE/ADWARE PROTECTION
Even though they all experienced spyware/adware generated nuisance, and have heard the term spyware (91%), knowledge of what it is and of ways to remove them is very limited. And even if practically none of the respondents (90%) say they accept installation of spyware/adware, one in two respondents (53%) believe they have spyware/adware on their machine. The analysis shows that they are actually 80% to have spyware/adware installed. And practically all of them (86%) accepted the technicians' offer to remove the spyware/adware components from their computers.

Where: US
When: September 15th - October 8th 2004

26 October 2004

Perspectives on usage of mobile TV and video over 3G

One of the central usage scenarios to inspire 3G Telecom operators envisions customers watching TV contents, Video on Demand and sharing personal videos across the network using their mobile devices. This vision is spelt out in the Register article 3G must embrace TV, based on an Analysys study. The argument is that 3G success may come from high revenue generating TV and video clips delivered to mobile phones. Its structure reminds me of similar arguments put forward at the end of the 90's to justify investments in WAP and the Mobile Internet. A mature context: both mobile phones and TV are ubiquitous, and people spend a significant amount of time watching TV. A keen audience: customer research indicates strong latent demand. A success story: rapid adoption of TV, VoD, Video 3G services in South Korea. Awareness of technical (speed, capacity, size) and economic (pricing) shortcomings, but obviously solutions are in view. A potential risk: competition from new broadcasting technologies, such as DVB - handhelds.

As I was reading this article, I had the opportunity to discuss the results from a recent longitudinal study on how new 3G customers services explore, try out and use TV, VoD and video services; and I came across the report Conflicting signals: a cell phone television interest survey, from the Lyra Research DTV View . The survey (of 1361 US cell phone users) evaluates people's overall interest in watching cell phone television or videos. It found that slightly more than half (53%) are either not interested at all or not very interested; 32% are somewhat interested; 14% are either very or extremely interested. The remaining 2% doesn't know. Both sources question the assumption that strong demand exists for TV, VoD and video 3G services. Clearly, more research and a closer look at how people use and feel about these services, in South Korea for instance, would help orient their development and diffusion.

Where: US
When: 2004

A snapshot of US College students Internet usage

comScore MediaMetrix The Score October 2004 reports that, in the US, more than 12 M College students (out of around 13M) use the web. They do so with a frequency and duration that are about 20% higher than the average Internet user. Their favorite destinations, as measured by the "the composition index: a measure of the proportional likelihood of a population segment to visit a site or group of sites compared to the average user", are EDUCATION - the Career & Development and Training & Education categories - TECHNOLOGY - especially the Downloads category with a strong preference for peer-to-peer applications - ENTERTAINMENT - 50% visit Humor and Music sites, such as Launch, MTV Networks, AOL Music, MusicMatch, ArtistDirect, WindowsMediaMusic - RETAIL - Computer Hardware and Consumer Electronics, especially Mobile phone sites like AT&T Wireless, Cingular, T-Mobile. College students make extensive use of IM: 40% of college students use at least one IM application; and iTunes: college students represent 17% of all the iTunes users, but only about 8% of all Internet users.

Where: US
When: September 2004

Digital Cameras adoption trend

According to data published by InfoTrends Research Group/CAP Ventures, this year more than one out of two US Internet households (59%) have digital cameras, a growth of 14% over 2003. This represents 42 M of the 72 M US households that have an Internet connection. The survey also found that 26% of these households, equivalent to around 10 M, have a wireless home network. How all of that technology is brought together remains to be understood.

Where: US
When: 2004

US adolescents IMing

Three excellent scientific papers, one in press and the two others published in 2002, expand our understanding of IM usage among adolescents with in-depth qualitative research. These papers uncover what have become IM common practices; explore motives and external factors that have contributed to IM widespread adoption; define the place that IM has with respect to other formats of being together and communicating.

Today, Instant Messaging offers a very good fit to adolescents' emotional and social needs: of intimate, intense relationships with a few close friends; of feeling part of peer groups and of spending as much time as possible with them. Using IM, adolescent friends manage to spend more time together; create private social spaces within the larger domestic environment; maintain and develop distant relationships; cope with the changing status of their relationships and more generally dispose of an environment to explore social roles and relationships freely. It is alos over IM that alliances are forged, social and emotional support is offered, personal issues raised.

IM conversations are a natural extension to the multiple interactions that take place face-to-face among adolescents. One the studies (Grinder & Paten) reports that some of the interviewees feel that school leaves too little time to be with their friends. The first thing they do when they come home is to log on and open the IM channel to meet them again. Incidentally, this time also coincides with a period in which the home computer and Internet access are usually more available. The meeting itself is either set up by a system-generated invitation to join in a chat session; planned at school “IM me after school”; part of routines as participants have a good idea of their friends’ domestic schedules; or started from the buddy list where the friend shows up as she or he logs on.

Most of IM conversations therefore take place among friends who are used to spend time together in the physical space. They general concern one or two friends, but can go grow to four or five simultaneous conversations (Schiano et al.). The social network within which IM operates is relatively well defined. Rare are the conversations with strangers. And when they happen, it is around specific topic of interest, such as music, or to kill time when none of the friends is online. Public chat rooms are considered a "waste of time" because of the poor quality of the conversations. More frequent conversations occur with distant friends, former school-mates, friends met at summer camps; or friends of friends. Most of the conversations happen between the more or less five core friends that represent the core of the buddy list. And when researchers have asked participants to describe their buddy list, they found that beside the core, the buddy list contained several infrequently contacted remote friends and acquaintances, and many others handles participants could no longer identify (Schiano et al.). "I'm away messages" further facilitate group cohesion beyond co-presence as they keep each other up-to-date with their whereabouts.

The topics also reflect the continuity between face-to-face and IM mediated conversations. On IM, friends chitchat, gossip, flirt, just like they do when they are physically together. They also do event planning which is considered to be greatly facilitated by IM. Given the practical and family-related constraints adolescents face, they use IM to coordinate when it comes to going out together for shopping or to see a movie. That same planning would require multiple dyadic telephone conversations that, as one interviewee in Grinter & Palen study said, "took forever to get it sorted out". Sharing relevant web pages, such as film start times, through IM also facilitates planning. Finally, some interviewees indicate that at times friends discuss over IM course material, exercise or practice foreign languages over IM.

Flexibility in the handling of relationships is another important feature of IM use. With access permission, public profiles, multiple screen names, IM provide a palette of tools to explore - test, develop and repair personality traits and reactions - one's identity and the relationships with other group's members. For some participants, IM conversations help overcome shyness in approaching difficult topics with friends, facilitating online flirting. An anecdote illustrates this point. It is common practice to take part in a central group conversation and at the same time engage in other, parallel gossiping with some of the same people. This behaviour requires that many IM windows be open at the same time. Two of the participants in Grinder & Pale study described situations where they accidentally selected the wrong window and replied to the person they were gossiping about, instead of the one they were gossiping with.

A further feature, essential to understand the place that IM conversations have in adolescents' everyday life, is the creation of autonomous, private social arenas carved out of the public domestic arena. IM doesn't require ad hoc devices, IM doesn't ring, IM doesn't talk loud. As one of the authors write, "within domestic ecologies, IM operates below the radar: it is a quiet technology that is easily integrated into the conduct of other activities". And this feature was recognized as an important advantage by all participants. Considering the significant time that adolescents spend alone in front of the computer, IM conversations play a significant role in socializing the computer experience as a whole.

A final word on multitasking which is a defining feature of the way we function today. Once online, IM conversations coexist easily with multiple activities, from doing one's homework, to listening to music, emailing, searching the web. Conversations are put on hold, closed, and restarted. The semi-synchronous, informal nature of IM differentiates it quite clearly from email that adolescents use - they all have email accounts and check them regularly - for more formal purposes, such as applications to college, exchanges with teachers. Contrary to IM, email requires careful writing and spell-checking, and can spread over several days work.

Some elements concerning the way IM adoption unfolds. Participants refer to their desire to claim membership to particular social groups and to augment socializing opportunities with the groups. As one of the interviewee says: "It was a matter of be on or be out", while another added "because all my friends were talking, and I didn't want to miss out". Peer pressure appears to be a major catalyst in IM adoption, following a group-wise discretionary, bottom-up process. A few friends select an IM service; they encourage other group members to join in and use the same system. One participant recalls that he uses one IM system with his college friends, and another one with his high school friends, who had collectively decided on that system when he arrived at college. According to Grinter & Palen, peer pressure achieved critical mass, which in turn sustained long-term use. Over time, participation in IM conversations has simply become a dimension of group membership so much so that IM non-users are considered to be a nuisance. As one of the participants in Grinter & Palen study says about non-IM users: "not feeling like she knew where her friends were". The fact that IM clients are free, that infrastructure costs are taken up by the household or the school has certainly also contributed to massive IM adoption.

Instant messaging in teen life
R.E. Grinter & L. Palen
CSCW '02

Teenage Communication in the Instant Messaging Era
B.S. Boneva, A. Quinn, R.E. Kraut, S. Kiesler, I. Shklovski
In press, R. Krant, M. Brynin, S. Kiesler (Eds), During , Oxford University Press.

Teen use of messaging media
D. J. Schiano, C. P. Chen, J. Ginsberg, U. Gretarsdottir, M. Huddleston, E. Isaacs
CHI 2002 (unfortunately for subscribers only)

Where: US
When: 2001-2003 (approx)

About

Recent Posts

    Observatories

    • Broadband adoption
    • Pew Internet & American Life Project
    • IT Facts
    • InternetWorldStats
    • Xten X-lite Free World Dial-up user map

    Blogroll

    • Clay Shirky
    • Dan Gillmor
    • Future Now
    • Joi Ito
    • Are's blog
    • Aswath Weblog
    • Blog.org
    • Mathemagenic
    • Raindrop
    • Robert Paterson
    • Unbound Spiral
    • Many-to-Many
    • Conversations with Dina
    • EuroTelcoblog

    Now playing

    • Joanna McGregor: Quiet Music
    • Gilad Atzmon and the Orient Home Ensemble: Exile and musiK

    Related Links