<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Tempus Fugit and the Need for an e-Social Contract</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>James Kaufman</string-name>
          <email>kaufman@almaden.ibm.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Joann Ruvolo</string-name>
          <email>ruvolo@almaden.ibm.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniel Ford</string-name>
          <email>daford@almaden.ibm.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>650 Harry Road</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>IBM Almaden Research Center</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>San Jose</institution>
          ,
          <addr-line>CA 95120, 1-(408) 927-1450</addr-line>
        </aff>
      </contrib-group>
      <fpage>3</fpage>
      <lpage>10</lpage>
      <abstract>
        <p>For autonomous agents to achieve their full potential they require access to detaile d private information about individuals they are designed to assist. The time is rapidly approaching when we can build systems to gather this information and monitor all aspects of an individual's life. In this paper we describe Tempus Fugit (Time Flies), an attempt to create just such a system. The reality of this technology has enormous social implications and, misused, it creates direct threats to liberty. We further describe an “e-Social Contract”, a design philosophy developed to safeguard against these threats. It is the foundation of the design philosophy behind Tempus Fugit and should be considered in the development of any agent technology.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;e-Social Contract</kwd>
        <kwd>Agent</kwd>
        <kwd>Personal Information System</kwd>
        <kwd>Calendar</kwd>
        <kwd>Active Calendar</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. INTRODUCTION</title>
      <p>
        The technology to enable people to remain in contact with their
computer systems while they roam from place-to-place and switch
from activity-to-activity is rapidly being deployed[3][
        <xref ref-type="bibr" rid="ref14">18</xref>
        ][
        <xref ref-type="bibr" rid="ref16">20</xref>
        ]. The
advantage of this connectivity is that it enables technologies like
autonomous agents to interact with their human counterparts in
almost any situation or physical place. The potential benefits touch
all aspects of people’s lives and new industries based on
locationbased services are rapidly developing innovative and practical
applications. The disadvantage of this connectivity is the enormous
threat to personal and societal liberty it presents. This threat is being
recognized and some legislation in the United States and other
countries has been passed to contain it[
        <xref ref-type="bibr" rid="ref1">5</xref>
        ][
        <xref ref-type="bibr" rid="ref17">21</xref>
        ]. However, legislation
may not be enough. Already, Governments are using location
information obtained from mobile phone use to suppress groups they
feel threaten the State[
        <xref ref-type="bibr" rid="ref6">10</xref>
        ].
      </p>
      <p>The threat before us is that the development and deployment of
autonomous agent technology, coupled with new communications
technologies (mobile phones) will, in the guise of helping its users,
create an infrastructure capable of monitoring the activities of large
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists,
requires prior specific permission and/or a fee.</p>
      <p>Conference ’00, Month 1-2, 2000, City, State.</p>
      <p>Copyright 2000 ACM 1-58113-000-0/00/0000…$5.00.
numbers of people. This infrastructure could be abused to control
people in a manner never before possible.</p>
      <p>
        According to Hobbes we give up basic rights for the personal
benefits we gain from living in society[
        <xref ref-type="bibr" rid="ref3">7</xref>
        ][
        <xref ref-type="bibr" rid="ref4">8</xref>
        ]. Locke and Rousseau
argue that these rights are ours alone and we must not allow them
to be taken from us[
        <xref ref-type="bibr" rid="ref10">14</xref>
        ][
        <xref ref-type="bibr" rid="ref13">17</xref>
        ]. Hence the question of what rights and
liberties we can delegate to machines is no different than the
question of what rights and liberties we may safely delegate to
Government and the forces of Government. The choices are the
same as are the risks. This is the fundamental problem faced by
Hobbes, Locke, Rousseau, and others. It is a problem for which
they found a solution - The Social Contract[
        <xref ref-type="bibr" rid="ref13">17</xref>
        ]. We now face the
same problem with regard to the IT Revolution and the software
agent technologies we are able to create. Restating Rousseau’s
question from 1762 in Du contrat social,
“The problem is to find a form of association…” between people
and machines “… which will defend and protect with the whole
common force the person and goods of each associate, and in
which each, while uniting himself with all, may still obey himself
alone, and remain as free as before.”[
        <xref ref-type="bibr" rid="ref13">17</xref>
        ]
In the Tempus Fugit (Time Flies) project[4] we are coupling
autonomous agent technology with that of mobile telephones and
location sensors (e.g., GPS), and thus are creating an infrastructure
capable of monitoring the activities of large numbers of people. Our
intentions are noble, but we recognize the fundamental social
implications and risks associated with our work. Our response is to
adopt as the foundation of Tempus Fugit a design philosophy that
mitigates the threats to individual and societal liberty. We call this
philosophy the “e-Social Contract” and present it here for
consideration as a guideline for future development of such systems.
In section 2, we present the principles of the e-Social Contract. In
section 3, we discuss how these principles apply to a continuum of
agent technologies. In section 4, we describe Tempus Fugit, its
implementation, and how it utilizes a range of agent autonomy,
which conforms to the e-Social Contract philosophy.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. THE e-SOCIAL CONTRACT</title>
      <p>Du contrat social asserts that individuals possess certain basic
rights. They may choose to delegate certain rights for the greater
good because they, as individuals, also benefit from living in a free
Society and working in partnership with others. However, the
Government must protect the rights of all.</p>
      <p>An e-Social Contract must recognize that individuals also have basic
rights pertaining to the use of software technology. These rights are
intrinsic to all individuals and should be respected in the design of
that technology. Users may delegate rights to an agent for their
benefit or the greater good of a community, but the technology itself
must never deprive the individual of any rights. These rights,
liberties, and privileges are possessions of all individuals. To protect
rights under an e-Social Contract one must first define them. We
ascribe the following as rights, liberties, and privileges of the
individual user.
varying degrees. We chose a coordinates system to independently
characterize: (Axis A) the degree of Autonomy of an agent, (Axis
B) the Beneficiary of an agent, and (Axis I) the Impact an agent
has or is designed to have. Note that none of these axes denote the
performance or effectiveness of the software, only the intent of the
software design.</p>
      <sec id="sec-2-1">
        <title>Private information will not be exposed without explicit</title>
        <p>permission by the owner of that information.</p>
      </sec>
      <sec id="sec-2-2">
        <title>User information belongs to the user and is private by default. a. b.</title>
      </sec>
      <sec id="sec-2-3">
        <title>Information entered by the user (e.g., events, tasks) is private by default.</title>
      </sec>
      <sec id="sec-2-4">
        <title>Information collected about a user is private by default.</title>
      </sec>
      <sec id="sec-2-5">
        <title>Information collected about a user’s physical or virtual property is private by default.</title>
      </sec>
      <sec id="sec-2-6">
        <title>Time dependent private information collected on a users behalf (e.g., spatial-temporal data) should not, by default, be maintained as a history.</title>
        <p>B.</p>
        <sec id="sec-2-6-1">
          <title>Authority to Delegate</title>
        </sec>
      </sec>
      <sec id="sec-2-7">
        <title>Collection of information about a user and a user’s</title>
        <p>property is under the direct control of the user.</p>
      </sec>
      <sec id="sec-2-8">
        <title>Only a user can delegate authority to or enable an autonomous agent.</title>
      </sec>
      <sec id="sec-2-9">
        <title>An autonomous agent must act to benefit a user.</title>
      </sec>
      <sec id="sec-2-10">
        <title>An autonomous agent acting on the user’s behalf cannot</title>
        <p>also act for a third party without user permission.</p>
      </sec>
      <sec id="sec-2-11">
        <title>User decisions regarding the exposure of information are</title>
        <p>private by default and should not be exposed.</p>
      </sec>
      <sec id="sec-2-12">
        <title>User decisions regarding delegation and authorization are private by default and should not be exposed.</title>
      </sec>
      <sec id="sec-2-13">
        <title>Relationships between people will not be disclosed without permission from all parties.</title>
        <sec id="sec-2-13-1">
          <title>C. Privacy of Associations</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. A CONTINUUM OF AGENTS</title>
      <p>
        Having defined the rights of individuals, one must next understand
how different classes of “agent” technology affect them. As
Hobbes, wrote in De Cive (The Citizen), “for every thing is best
understood by its constitutive causes; for as in a watch, or some
such small engine, the matter, figure, and motion of the wheeles,
cannot well be known, except it be taken in sunder, and viewed in
parts”[
        <xref ref-type="bibr" rid="ref4">8</xref>
        ]. Hobbes sought to understand society by studying its
individual parts; here we try to understand the effect of technology
on society by looking at the components of that technology and how
those components affect the individual.
      </p>
      <p>
        The software components that define the broad class of programs
we call agents are as varied and numerous as the parts in a
Hobbes’ watch[2][
        <xref ref-type="bibr" rid="ref2">6</xref>
        ][
        <xref ref-type="bibr" rid="ref8">12</xref>
        ][
        <xref ref-type="bibr" rid="ref11">15</xref>
        ][
        <xref ref-type="bibr" rid="ref12">16</xref>
        ][
        <xref ref-type="bibr" rid="ref13">17</xref>
        ]. In Figure 1 we define an
orthonormal set of basis vectors to help classify different agent
technologies. Within the unit cube so defined, there is a continuum in
agent designs. Different designs will affect the rights of users to
The Autonomy (A) axis reflects the degree to which an agent acts
independently of the user. We define A=0 to be software which is
entirely directed by the actions of the user and A=1 to be
completely autonomous software. The autonomy of any agent lies
between 0 ? A ? 1 . The Beneficiary (B) axis characterizes the
degree to which an agent acts on behalf of the individual user (B=0)
as opposed to some external party (B=1). The Beneficiary of an
agent lies between 0 ? B ? 1 . The Impact (I) axis characterizes
the degree to which a software agent seeks to inform (I=0) a user
as opposed to affect (I=1) a user. The impact of any agent lies
between 0 ? I ? 1 .
      </p>
      <p>Clearly there is a continuum of agent technology that may reside
anywhere in the unit cube defined in the 3-D space (A, I, B) of
Figure 2. Agents may act with varying degrees of autonomy, having
varying impact, on behalf of the user or others. Based on this
coordinate system, we consider 4 classes of agent technology.
First, we define agent-less technology as software that uses no
agents and depends solely on direct manipulation by the user.
Agent-less technology corresponds to the plane A=0. Software in
this plane has no active components.</p>
      <p>Second, we define collaborative agents as technology that acts
only on behalf of the user, whose intended beneficiary is the user
(B=0). Purely collaborative agents reside in the A-I plane. They
may seek out information or resources for a user and may act upon
that information with varying degrees of autonomy. A collaborative
agent might look for a source of books on the Internet based on user
input. An agent that recommends books on behalf of an Internet
business is not collaborative, although it could be of some benefit to
a user (B&gt;0).
Third, we consider informing Agents, which only provide
information. An informing agent will never take action that would
affect the user without direct approval by the user. It may act with
varying degrees of autonomy and may gather information for the
user or for some other party. Purely informing agents reside in the
A-B plane.</p>
      <p>Finally, we define autonomous agents as fully independent
software that accesses user information and takes action without
even requiring the user be aware of said action. These agents act
with complete autonomy. The actions may or may not be on the
users behalf. The system may gather information or take action to
impact the user or others. Purely autonomous agents reside in a
plane parallel to the B-I plane with a normalized autonomy value of
1.0 (100% autonomous).</p>
      <p>
        To apply an e-Social Contract, one must first determine within this
space, how these technologies affect the rights of a user. An
individual user of a collaborative-informing agent must trust the
software if the user is to rely only on the agent for information and
services. However, the risk accepted by the user of an informing
agent is limited. The agent requires permission of the user to spend
money or give out personal information (such as a credit card
number, billing address, and telephone number). Agents that take
autonomous action on a user’s behalf require a greater degree of
trust. In 1994, Pattie Maes proposed a system wherein users begin
to trust an agent to act autonomously once their confidence in the
software rises above some fixed threshold (e.g. 80%)[
        <xref ref-type="bibr" rid="ref11">15</xref>
        ].
Experience with an agent technology may be of value in developing
this trust. Autonomous agents include the class of intelligent agents
and assistants that learn. A collaborative agent may start out life
with little or no autonomy and become more autonomous as it learns
from the user[
        <xref ref-type="bibr" rid="ref11">15</xref>
        ]. The level of trust or confidence one has for an
autonomous agent depends not only on the performance of the
agent, but also on user control.
      </p>
      <p>The e-Social Contract dictates that the individual must retain the
rights to define and restrict the behavior of potentially invasive
technology. The permissions a user chooses to grant or deny to a
software system will depend on the properties of the system with
respect to the (A, I, B) coordinates. Figure 3 represents a possible
permission-surface defined by a hypothetical user. In this example
the user allows a high degree of autonomy only for components that
act entirely on the users behalf. For any agent that acts for a
different beneficiary, the allowed autonomous behavior drops
exponentially. This particular user permits significant information to
be gathered on behalf of some external beneficiary (e.g., another
member of the system) but these permissions are also severely
restricted as soon as the information gathering begins to affect the
user. Agent behaviors enclosed by this permission surface are
enabled for this user. Agents whose activities extend beyond this
surface are disabled. Individuals could, no doubt, choose a different
surface. The e-Social Contract insists that the power to define the
permission-surface must remain with the user.</p>
    </sec>
    <sec id="sec-4">
      <title>4. TEMPUS FUGIT</title>
      <p>The active and autonomous components of Tempus Fugit were
designed to conform to the proposed e-Social Contract. Below we
describe the Tempus Fugit system, its implementation, and how it
fulfills the e-Social Contract.</p>
    </sec>
    <sec id="sec-5">
      <title>4.1 Project Description</title>
      <p>
        At its core Tempus Fugit [4] is a "smart" electronic personal
information management (PIM) system. The use of electronic PIMs
has grown dramatically in the past few years with widespread
adoption of Personal Digital Assistants (PDAs) (e.g., Palm Pilot,
Palm PC, etc.), mobile phones with integrated calendars, and
"groupware" such as Lotus Notes and Microsoft Exchange[
        <xref ref-type="bibr" rid="ref2">6</xref>
        ].
Tempus Fugit implements the same conventional functionality, but
then goes further by actively using the information it manages to act
on behalf of its users.
      </p>
      <p>The Tempus Fugit PIM records the details of a user’s life in an
accessible electronic form that can easily be processed. Tempus
Fugit knows the past, current and future activities of its users. It
knows where its users are, where they are scheduled to be, what
they are scheduled to do, and with whom they plan to meet. From
the "to do" list, it knows the tasks its users want to accomplish, and
from the “resource book” (a more generalized extension of the idea
of an address book), Tempus Fugit knows the people the users
know and the objects they own. In addition, Tempus Fugit
incorporates other information not usually associated with PIMs that
help it more effectively assist its users. In particular it incorporates
the ability to track and record the physical and virtual locations of
users, objects and other resources known to the system.
Tempus Fugit goes beyond conventional PIM systems in other
dimensions as well. Tempus Fugit is also a Social Information
Management. (SIM) system. A SIM manages the social
connections users have to their personal communities. Tempus Fugit
attempts to make its users more effective in managing their social
relationships.</p>
      <p>The value that users derive from Tempus Fugit can be partitioned
into two areas: automation and awareness. The combination
creates several modes of functionality: personal automation,
social automation, personal awareness and social awareness.
The area of personal automation leverages the information users
maintains about their schedule (calendar), goals (“to-do list”) and
people they know (address book), to implement features that
automate tasks for the user. In the calendar, for instance, the
system will automatically generate background intelligence
information for a user’s meetings. This involves aggregating
available information such as news reports, business summaries and
stock information. The calendar also exploits the location tracking
information collected by the system to predict attendance and arrival
times for meeting participants. For instance, the system will predict
that someone will be late and provides an estimated time of arrival
given their current velocity.</p>
      <p>The social automation features of Tempus Fugit allow users to
discover other people that may wish to meet. This discovery can be
manual, or with Tempus Fugit’s help automatic. For instance, a
user being informed of a new person joining an organization who
has characteristics that match theirs (e.g., they speak Finnish).
The personal awareness features of Tempus Fugit concentrate of
providing access to the system through mobile devices (i.e., mobile
phones). For instance, the system is fully accessible to WAP/WML
enabled mobile phones. To expand this interface we have also
developed automatic voice summarizations of the system contents
represented in VoiceXML? that can be rendered in a variety of
formats. In particular we create MP3 files of text-to-speech output.
The social awareness features of Tempus Fugit concentrate on
informing users of the status of other users in their self-defined
social circle.</p>
    </sec>
    <sec id="sec-6">
      <title>4.2 Implementation</title>
      <p>Tempus Fugit is implemented with a scaleable architecture designed
to support large numbers of users. The core of the system is
implemented using Java? Servlets and Enterprise Java Beans. A
relational database is employed as the system's persistent storage.
It runs on both Windows 2000 and Linux. The architecture includes
a layer of XSLT translation between end users and the main system
that allows great flexibility in supporting different output formats and
devices; Tempus Fugit generates HTML, WML and VoiceXML?
from the same XML data simply by providing three different XSL
style sheets.</p>
      <p>The architecture of Tempus Fugit includes an event distribution
mechanism based on the Java? Messaging Service (JMS). All
external information enters Tempus Fugit initially as an event and
many "state changing" operations that occur within Tempus Fugit
are made visible as events in this system. For instance, as location
transponders report the locations of users, these are turned into
events that propagate through JMS and into the core Tempus Fugit
database of user positions. The flexibility of this architecture has
allowed us to integrate a "rule engine" into Tempus Fugit as a
subscriber and publisher of events. This rule engine enables many
other powerful features that are beyond the scope of this paper.
The location-tracking features of the system are exercised by five
vehicles equipped with "PinPoint" CDPD GPS location transponders
from AirLink Communications[1]. These send a UDP packet
containing the latitude and longitude of the vehicle to Tempus Fugit
every 5 minutes. The system also tracks the location of individual
laptop computers that participate in a wireless Ethernet LAN. In
that case, a utility running on the laptop beacons the id of the
wireless access point (i.e., the "cell") it is connected to.
Full support for national languages and localization is designed into
the core of Tempus Fugit. Currently Tempus Fugit supports US and
Canadian English, Swedish, German and Finnish.</p>
      <p>
        A guiding principle in the system's implementation is that it contains
no proprietary interfaces; instead the project will adopt and
implement whatever standards are successful. For instance, for
communication with other PIM systems, Tempus Fugit implements
the iCalendar standard[
        <xref ref-type="bibr" rid="ref5">9</xref>
        ]. Using these standards, we have
implemented the ability for users to automatically synchronize PIM
data with Lotus Notes on a daily basis.
      </p>
    </sec>
    <sec id="sec-7">
      <title>4.3 The e-Social Contract in Tempus Fugit</title>
      <p>We have incorporated into the infrastructure of Tempus Fugit the
following controls to safeguard the rights of its users with respect to
the principles defined in the e-Social Contract. Through these
controls, every user can create an individualized
permissionsurface (Figure 3).</p>
      <sec id="sec-7-1">
        <title>A. Privacy of Information</title>
        <p>1.
2.</p>
        <p>To protect their rights, users can specify access privileges
to any personal data. The default access right is
“private”. The user can set the access level at the
granularity of his/her choosing – from protecting an
individual data object to protecting all data. The user can
grant or deny access to individuals, groups, or to agents of
the Tempus Fugit system. These privileges not only
determine whether or not other users can access the data
but also whether the active agent components can make
use of it.</p>
        <sec id="sec-7-1-1">
          <title>The physical or virtual locations of a user or their property are stored for as short a time as possible and then completely deleted.</title>
        </sec>
        <sec id="sec-7-1-2">
          <title>Only one value for the physical or virtual locations of a user or their property is maintained at a time. No record of their path is stored.</title>
        </sec>
        <sec id="sec-7-1-3">
          <title>The proximity of users may be used to trigger an alert but is not stored in a history.</title>
        </sec>
        <sec id="sec-7-1-4">
          <title>The default settings for active components are restrictive.</title>
          <p>Autonomous agents are disabled until activated by the
user. Informing-collaborative agents are enabled.</p>
        </sec>
        <sec id="sec-7-1-5">
          <title>Users define individual preferences that set limits on the</title>
          <p>behavior of enabled autonomous features.</p>
        </sec>
        <sec id="sec-7-1-6">
          <title>By default only the user can activate any potentially</title>
          <p>invasive functionality (e.g., location tracking).</p>
        </sec>
        <sec id="sec-7-1-7">
          <title>The system renders as “unavailable” user information</title>
          <p>not known by the system, known by the system but
marked private by the user, or not known to the system
because its collection is disabled by the user. This masks
the user’s intention to hide their information.</p>
        </sec>
        <sec id="sec-7-1-8">
          <title>Relationships between users and corresponding</title>
          <p>relationship data are just as important as individual user
data. The default access right for relationships is private.
The user can set the access level at the granularity of
his/her choosing – from protecting an individual
relationship to all relationship data. The user can grant or
deny access to individuals, groups, or to agents of the
Tempus Fugit system.</p>
          <p>Tempus Fugit embodies many agent types through out the
continuum of agent behaviors. In Figure 4 we show a two
dimensional space of collaborative agents (the A-I plane of Figure
2). Even for agents designed only to support a single user, the user
accepts a larger risk when relying on an agent that exercises
greater autonomy or creates greater impact. As information about
an individual becomes available to other clients of the system, the
actions of the agent begin to affect multiple individuals and multiple
permissions may be required to constrain agent behavior. Examples
of agents affecting multiple clients are extruded out of the A-I plane
in Figure 4. Below we describe some of these Tempus Fugit
features with respect to these different agent behaviors.
The screenshots below (Figures 5-7) illustrate the Tempus Fugit
interface we call “Mozongo”.
4.3.1 Form Data Entry
Form entry is a mechanism used to gather information from a user.
Form filling can be a tedious task. An agent can assist in this task
with varying degrees of autonomy. An agent-less form would not
assist the user at all. An informative agent could provide look-ahead
features and order likely options. Tempus Fugit can examine the
repository of knowledge it maintains about its users and predict the
values most likely to be entered (e.g., likely destinations for travel
events, usual participants for certain types of events). These values
can then be presented to the user as possible choices in order of
likelihood.</p>
          <p>Tempus Fugit moves along the collaborative plane towards
autonomous form entry by pre-selecting likely values. Pre-filling
and pre-selecting data in a form can readily affect a user to a
greater extent than populating a selection box with likely choices. In
accordance with the e-Social Contract design philosophy, only the
user should have the authority to grant Tempus Fugit permission to
pre-fill/pre-select a form. Without this permission the autonomous
behavior is not allowed.</p>
          <p>Another example, demonstrates a Tempus Fugit autonomous action.
As part of its PIM functions, Tempus Fugit maintains an address
book for each of its users. A user can manually create contacts and
group them, via form entry. When a user first joins Tempus Fugit
from within an organization, the system discovers, if possible, the
user’s position within the organization and pre-fills the address book
with department members, the user’s manager, and secretary. This
requires no request or validation by the user. In this case the
autonomous action is informative. If the autonomous agent is
ineffective in putting useful information in the users address book,
the user can simply remove the new entries or groups. Pre-loading
the user’s address book lies close to the A axis in the A-I plane
(Figure 4).
4.3.2 People Matching
One of the more intriguing aspects of Tempus Fugit is its social
automation capability. Tempus Fugit enables the discovery of
potential social connections between people. For instance, a new
person joining an organization such as a company or a university
may be completely unaware of the traits and characteristics of the
other individuals. Tempus Fugit uses the intimate knowledge it
maintains about its users to identify compatible (or incompatible)
people.</p>
          <p>A first time user of Tempus Fugit is prompted to enter personal
traits and characteristics (e.g., languages spoken, hometown, marital
status, interests, expertise, skills) that the user is willing to share
with others. Users are never coerced to reveal this information.
A user can query Tempus Fugit to find others with a particular trait
or interest (e.g., spoken language) or an expertise in a subject. This
is agent-less technology. With the use of a collaborative agent,
Tempus Fugit can pre-determine the best matches for a user and
inform that user (Figure 5). The user can then follow up on Tempus
Fugit’s “recommendation”, by clicking on the link to learn more
about the matched user(s). Without the use of an autonomous agent
Tempus Fugit could, having identified a possible match, offer to
request a meeting between the users. Since this action requires
validation by the user, the user’s rights are protected. The matched
colleague is affected by this possible action. The colleague
permitted the possible action by choosing to share personal
information with others in the system. Having made this decision,
the colleague is free to decline any meeting. Notice that there are
various levels of impact depending upon the level of autonomy. By
informing user ‘Sally’ that user ‘Bob’ is a good match for her, Bob
is mildly affected since Sally is now aware of Bob. Tempus Fugit
would have a more significant affect if it were to automatically set
up a meeting between Sally and Bob. In accordance with our design
philosophy, before Tempus Fugit could automatically send out a
meeting invitation, both Sally and Bob would have to permit or
enable the autonomous matching function.
4.3.3 Location Tracking
Tempus Fugit supports tracking the location of its users. In general
tracking the location of individuals is inherently invasive. However,
Tempus Fugit adheres to the e-Social Contract design philosophy,
and only tracks those users that have given their permission to be
tracked. In addition, it provides two other mechanisms to allow a
tracked user to disable tracking on an as desired basis. By not
keeping a history of potentially sensitive location information, such
as previous locations visited, paths taken, and proximity to other
users, Tempus Fugit further safeguards its users as specified in the
e-Social Contract tenet A.2-4.</p>
          <p>An example of applying the e-Social Contract as a guiding
philosophy in making design choices is the approach taken in the
tracking of laptops participating in a wireless Ethernet. Two
techniques were available. The first was to poll the wireless access
points (WAPS) (i.e., “base stations”) that serve as the “connect
points” for the laptops to the wired network. This technique gives
the list of laptops that were “connected” to the access point. The
second technique was to have the laptops run software that
periodically beaconed the name of the access point to which they
were connected. Both were equivalent in giving an estimated
position of the laptop as somewhere in the proximity of the access
point. Applying the tenet B.1 of the e-Social Contract that states
that the collection of information about a user is under their control,
Tempus Fugit uses only the second technique. This gives users
complete control to turn off tracking and be confident that their
position is not being recorded in any way.
Tempus Fugit uses the tracked location information to predict the
attendance and arrival times of individuals (Figure 6). Tempus Fugit
also applies location information in support of its social automation.
It is included in status displays, so a client can be aware of the
location of people important to him/her. It is also used to automate
serendipity, the fortuitous discovery of something not sought. In
interpersonal relationships, this manifests itself when one discovers
the presence of a friend/colleague without prior arrangement of a
meeting. For instance, when two users are within proximity of each
other, they can be informed of the presence of the other. Another
example, involves static locations, rather than tracked dynamic
locations. Tempus Fugit can examine the schedules (including
meeting locations) of its users and discover the potentia l for future
encounters, and inform each user accordingly. In keeping with the
e-Social Contract, both users would have to permit or enable this
informed “connection”. Before Tempus Fugit could move along the
collaborative plane towards autonomous connections, both users
would have to give additional permissions to enable autonomous
connections.
4.3.4 Information Gathering
Tempus Fugit provides background information to support a user's
scheduled activities. For instance, when a user creates an event
and invites participants, Tempus Fugit will automatically initiate a
search to discover background information (if it exists) on the
named participants. This information can include their position in the
organizational hierarchy, inventions they patented, and publications
they authored. In accordance with the e-Social Contract design
philosophy, only public information is obtained, all private information
is off-limits. Another example is when a user creates an event
identifying a public company. Again, Tempus Fugit will initiate a
search to discover background information on the named company.
This information includes stock price, financial data, and company
news. Figure 7 displays information about 2 companies identified in
the creation of an event. Information gathering, though initiated
autonomous, is strictly informative. Its impact on the user is
dependent upon the value of the material gathered.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>5. CONCLUSION</title>
      <p>
        A storm is coming and we must prepare ourselves for what may
unfold. It is ironic that the liberties and freedom members of modern
societies take for granted could be tested by technologies born
under that freedom. Will a society that nurtures the freedom to
invent anything also create the tools of its own destruction[
        <xref ref-type="bibr" rid="ref7">11</xref>
        ][
        <xref ref-type="bibr" rid="ref9">13</xref>
        ]?
In this paper, we have argued that a free society has the ability to
articulate philosophies to guide the design and use of such
dangerous tools. Without such a philosophy, the development of
future technologies, such as autonomous agents and location
tracking, could put individual liberty at risk.
      </p>
      <p>We propose an e-Social Contract as a prototype philosophy for
consideration. The contract is not, however, a hypothetical
suggestion. It is the foundation of the design philosophy behind a
working system, Tempus Fugit. This system combines features of
autonomous agents with physical tracking of its users to create a
kind of “super” personal information management system. This
PIM system knows “everything” about a user’s activities, plans,
goals, relationships, and current location. Tempus Fugit is the first
system we are aware of that puts such an ominous combination of
features into one powerful package. It uses those features to assist
individuals and to help groups of users work together. A wealth of
detailed information gives Tempus Fugit great power to fulfill its
mission. It also makes it a potentially dangerous device if used to
control people. Tempus Fugit is an ongoing experiment to test the
idea that these dangers can be avoided with an appropriate design
philosophy. Future systems, as is always the case, will be yet more
powerful. We believe that some design philosophy must emerge by
consensus, which will protect the rights of individuals, in the same
spirit as our e-Social Contract.</p>
    </sec>
    <sec id="sec-9">
      <title>6. ACKNOWLEDGMENTS</title>
      <p>We would like to acknowledge the people who contributed to
Tempus Fugit: K. Cao, S. Edlund, M. Gerlach, J. Jackson, R. Kraft,
S. Lassahn, P. Lazarus, D. McKenzie, M. Muhammad, J.,
Myllymaki, and the many subscribers to the system.</p>
    </sec>
    <sec id="sec-10">
      <title>7. REFERENCES</title>
      <p>[1] AirLink Communications, www.airlinnk.com
[2] Di Stefano, A., Santoro, C., “Agent Support for Personal</p>
      <p>Mobility”, IEEE Computing, March/April 2000, p74-79.
[3] Economist, October 9, 1999.
[4] Ford D., Edlund S., Ruvolo J., Myllymaki, J., Kraft R., Lazarus
P., Cao K., Lassahn S., McKenzie D., Jackson J., Muhammad
M., Gerlach M., Kaufman J. “Tempus Fugit: A system for user
automation and awareness”, SIGCHI’01, (submitted for
publication).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [5] France,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Berman</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. K.</surname>
          </string-name>
          , “Big Brother Calling”,
          <source>Business Week</source>
          , pp.
          <volume>92</volume>
          ,
          <issue>94</issue>
          , 98,
          <string-name>
            <surname>September</surname>
            <given-names>25</given-names>
          </string-name>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Greif</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          “Desktop Agents in Group-Enabled Products”,
          <source>Communications of the ACM</source>
          ,
          <volume>37</volume>
          ,
          <issue>7</issue>
          <year>July 1994</year>
          ,
          <fpage>100</fpage>
          -
          <lpage>105</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Hobbes</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , “The Leviathan” (
          <volume>1650</volume>
          ). http://www.orst.edu/instruct/phl302/texts/hobbes/leviathancontents.html
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Hobbes</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          , “
          <string-name>
            <surname>De Cive (The Citizen) Philosophicall Rudiments Concerning Government</surname>
          </string-name>
          and Society”, (
          <volume>1651</volume>
          ). http://www.constitution.org/th/decive.htm
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[9] iCalendar, Internet Calendaring and Scheduling Core Object specification</article-title>
          ,
          <source>RFC</source>
          <volume>2445</volume>
          ,
          <year>November 1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Johnson</surname>
          </string-name>
          , I., “
          <article-title>The Survival of Falun Dafa Rests on Beepers and Faith”</article-title>
          ,
          <source>The Wall Street Journal</source>
          , Vol. CCXXXVI,
          <volume>39</volume>
          ,
          <string-name>
            <surname>August</surname>
            <given-names>25</given-names>
          </string-name>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Joy</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <article-title>“Why the Future Doesn't Need Us”</article-title>
          , Wired, Aug.
          <year>2000</year>
          ,
          <fpage>p238</fpage>
          -
          <lpage>262</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Kay</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          “Computer Software”,
          <source>Scientific American</source>
          ,
          <volume>251</volume>
          ,3 Sept 1984
          <fpage>53</fpage>
          -
          <lpage>59</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Lanier</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , “Agents of Alienation”, Interactions,
          <year>July 1995</year>
          ,
          <fpage>66</fpage>
          -
          <lpage>72</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Locke</surname>
            ,
            <given-names>J. “</given-names>
          </string-name>
          <article-title>A Essay Concerning the true original, extent, and end of Civil Government” (</article-title>
          <year>1690</year>
          ). http://www.constitution.org/jl/2ndtreat.htm
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Maes</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          “
          <article-title>Agents that Reduce Work and Information Overload”</article-title>
          ,
          <source>Communications of the ACM</source>
          ,
          <volume>37</volume>
          ,
          <issue>7</issue>
          <year>July</year>
          1994
          <fpage>31</fpage>
          -
          <lpage>146</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Mitchel</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Caruana</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Freitag</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McDermott</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zabowski</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , “
          <article-title>Experience with a Learning Personal Assistant”</article-title>
          ,
          <source>Communications of the ACM 37</source>
          ,
          <issue>7</issue>
          <year>July</year>
          1994
          <fpage>81</fpage>
          -
          <lpage>91</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Rousseau</surname>
            ,
            <given-names>J.-J.</given-names>
          </string-name>
          <article-title>Du contrat social (the social contract</article-title>
          )
          <volume>1762</volume>
          ,
          <string-name>
            <surname>Translated by G. D. H. Cole</surname>
          </string-name>
          , public domain http://www.constitution.org/jjr/socon.htm
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Rysavy</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <article-title>General Packet Radio Service (GPRS), GSM Data Today online journal</article-title>
          , (
          <year>September 30</year>
          ,
          <year>1998</year>
          ), www.gsmdata.com/paprysavy.htm
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Selker</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          “
          <article-title>Coach: A Teaching Agent that Learns”</article-title>
          ,
          <source>Communications of the ACM</source>
          ,
          <volume>37</volume>
          ,
          <issue>7</issue>
          <year>July</year>
          1994
          <fpage>92</fpage>
          -
          <lpage>99</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>UMTS</given-names>
            <surname>Forum</surname>
          </string-name>
          <article-title>Reports 1-6 Executive Summary, UMTS Forum, www</article-title>
          .umts-forum.org
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>Wireless</given-names>
            <surname>Communications</surname>
          </string-name>
          and
          <article-title>Public Safety Act of 1999(S.</article-title>
          <year>800</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>