Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An Internet-less World?: Expected Impacts of a Complete Internet Outage with Implications for Preparedness and Design

Published: 04 January 2020 Publication History
  • Get Citation Alerts
  • Abstract

    In HCI research, non-use of systems, especially involuntary loss of use, is a relatively neglected topic. How do people perceive the impacts on their lives should the Internet go out for an extended period of time? Would it be a minor inconvenience or Armageddon? We took a Futures Studies approach to conduct a conceptualized future, scenario-based study with 754 responses to a survey of mostly students at three universities and used framing theory to help explicate the findings from qualitative data analysis. Our data show that most respondents do believe a long-term complete Internet outage is possible; however, perceptions in terms of what the impacts would be range widely. Most participants employ an egocentric frame to understand the impacts in terms of changes in their personal relationships and activities, with both gains and losses envisioned. A minority frame their visions in terms of the societal level, with severe infrastructure problems resulting. This paper is the first to explore perceptions of the potential impacts of an Internet outage and provide implications for preparedness and design.

    References

    [1]
    Monica Anderson and Laura Silver. 7 key findings about mobile phone and social media use in emerging economies. Pew Research Center. Retrieved June 16, 2019 from https://www.pewresearch.org/fact-tank/2019/03/07/7-key-findings-about-mobile-phone-and-social-media-use-in-emerging-economies/
    [2]
    Víctor Bañuls and Murray Turoff. 2011. Scenario construction via Delphi and cross-impact analysis. Technological Forecasting and Social Change 78, (November 2011), 1579--1602.
    [3]
    Eric P. S. Baumer, Morgan G. Ames, Jenna Burrell, Jed R. Brubaker, and Paul Dourish. 2015. Why study technology non-use? First Monday 20, 11 (November 2015).
    [4]
    Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, and Paul Dourish. 2015. On the Importance and Implications of Studying Technology Non-use. interactions 22, 2 (February 2015), 52--56.
    [5]
    Eric P. S. Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K. Gay. 2015. Missing Photos, Suffering Withdrawal, or Finding Freedom? How Experiences of Social Media Non-Use Influence the Likelihood of Reversion. Social Media + Society 1, 2 (July 2015), 2056305115614851.
    [6]
    Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 3295--3298.
    [7]
    Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, Leaving, and (Re)Lapsing: An Exploration of Facebook Non-use Practices and Experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3257--3266.
    [8]
    Wendell Bell. 2010. Foundations of Futures Studies: Human Science for a New Era: History, Purposes, Knowledge (1 edition ed.). Transaction Publishers, New Brunswick, N.J.
    [9]
    Mark Blythe. 2014. Research Through Design Fiction: Narrative in Real and Imaginary Abstracts. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 703--712.
    [10]
    Mark Blythe. 2017. Research Fiction: Storytelling, Plot and Design. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 5400--5411.
    [11]
    Lena Börjeson, Mattias Höjer, Karl-Henrik Dreborg, Tomas Ekvall, and Göran Finnveden. 2006. Scenario types and techniques: Towards a user's guide. Futures 38, 7 (September 2006), 723--739.
    [12]
    Stephanie E. Chang, Timothy L. McDaniels, Joey Mikawoz, and Krista Peterson. 2007. Infrastructure failure interdependencies in extreme events: power outage consequences in the 1998 Ice Storm. Nat Hazards 41, 2 (May 2007), 337--358.
    [13]
    Juliet Corbin and Anselm Strauss. 2007. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (3rd edition ed.). SAGE Publications, Inc, Los Angeles, Calif.
    [14]
    Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé. 2014. Analysis of Country-wide Internet Outages Caused by Censorship. IEEE/ACM Trans. Netw. 22, 6 (December 2014), 1964--1977.
    [15]
    Carl DiSalvo. 2012. Adversarial Design. The MIT Press.
    [16]
    James N. Druckman. 2001. The Implications of Framing Effects for Citizen Competence. Political Behavior 23, 3 (September 2001), 225--256.
    [17]
    Anthony Dunne and Fiona Raby. 2013. Speculative Everything: Design, Fiction, and Social Dreaming. The MIT Press.
    [18]
    Lindsay Ems. 2015. Exploring ethnographic techniques for ICT non-use research: An Amish case study. First Monday 20, 11 (November 2015).
    [19]
    Rebecca Eynon and Ellen Helsper. 2011. Adults learning online: Digital choice and/or digital exclusion? New Media & Society 13, 4 (June 2011), 534--551.
    [20]
    Alex Feyerke. 2013. Designing Offline-First Web Apps. A List Apart. Retrieved September 21, 2019 from https://alistapart.com/article/offline-first/
    [21]
    Adrian Florido. 2018. 6 Months After Hurricanes, 11 Percent Of Puerto Rico Is Still Without Power. NPR.org. Retrieved June 13, 2019 from https://www.npr.org/2018/03/07/591681107/6-months-after-hurricanes-11-percent-of-puerto-rico-is-still-without-power
    [22]
    William A. Gamson and Andre Modigliani. 1989. Media Discourse and Public Opinion on Nuclear Power: A Constructionist Approach. American Journal of Sociology 95, 1 (July 1989), 1--37.
    [23]
    Thomas Gauthier and Katarzyna Wac. A Foresight Analysis of Pervasive Healthcare Technologies * Journal of Futures Studies. Journal of Futures Studies. Retrieved June 13, 2019 from https://jfsdigital.org/2015--2/vol-20-no-1-sept-2015/articles/a-foresight-analysis-of-pervasive-healthcare-technologies/
    [24]
    Erving Goffman. 1974. Frame analysis: An essay on the organization of experience. Harvard University Press, Cambridge, MA, US.
    [25]
    Jeffrey Gottfried and Elisa Shearer. 2016. News Use Across Social Media Platforms 2016. Pew Research Center. Retrieved June 13, 2019 from https://www.journalism.org/2016/05/26/news-use-across-social-media-platforms-2016/
    [26]
    Jesse Haapoja and Airi Lampinen. 2018. "Datafied" Reading: Framing Behavioral Data and Algorithmic News Recommendations. In Proceedings of the 10th Nordic Conference on Human-Computer Interaction (NordiCHI '18), 125--136.
    [27]
    Mike Hale. 2017. We Love the Sun. It Couldn't Care Less.(The Arts/Cultural Desk)(The Dark Side of the Sun)(Television program review). The New York Times, C3.
    [28]
    Eszter Hargittai. 2007. Whose Space? Differences among Users and Non-Users of Social Network Sites. J Comput Mediat Commun 13, 1 (October 2007), 276--297.
    [29]
    Starr Roxanne Hiltz, Hughes Amanda, Muhammad Imran, Linda Plotnick, Robert Power, and Murray Turoff. 2019. Requirements for software to support the use of social media in emergency management: A Delphi study. In 16th ISCRAM Conference.
    [30]
    Hannah Kosow and Robert Grassner. 2008. Methods of Future and Scenario Analysis: Overview, Assessment, and Selection Criteria. Deutsches Institut für Entwicklungspolitik gGmbH. Retrieved from: https://www.researchgate.net/publication/258510126_Methods_of_Future_and_Scenario_Analysis_Overview_Assessment_and_Selection_Criteria
    [31]
    Cliff Lampe, Jessica Vitak, and Nicole Ellison. 2013. Users and Nonusers: Interactions Between Levels of Adoption and Social Capital. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13), 809--820.
    [32]
    Sven Laumer, N. Sadat Shami, Michael Muller, and Werner Geyer. 2017. The Challenge of Enterprise Social Networking (Non-)Use at Work: A Case Study of How to Positively Influence Employees' Enterprise Social Networking Acceptanc. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 978--994.
    [33]
    Dave Lawler and Jonathan Swan. 2018. Special report: America's greatest threat is a hurricane-force cyberattack. Retrieved June 13, 2019 from https://www.axios.com/americas-greatest-threat-hurricane-force-cyberattack-67ff9c98--1cb8--4358--9d9e-e8c26836dec3.html
    [34]
    Rainie Lee, Aaron Smith, and Maeve Duggan. 2013. Coming and Going on Facebook | Pew Research Center. Retrieved February 17, 2019 from http://www.pewinternet.org/2013/02/05/coming-and-going-on-facebook/
    [35]
    Irwin P. Levin and Gary J. Gaeth. 1988. How Consumers are Affected by the Framing of Attribute Information Before and After Consuming the Product. Journal of Consumer Research 15, 3 (1988), 374--378.
    [36]
    Harold A. Linstone and Murray Turoff. 2002. The Delphi Method: Techniques and Applications. Retrieved from https://web.njit.edu/~turoff/pubs/delphibook/delphibook.pdf
    [37]
    Jennifer Mankoff, Jennifer A. Rode, and Haakon Faste. 2013. Looking Past Yesterday's Tomorrow: Using Futures Studies Methods to Extend the Research Horizon. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 1629--1638.
    [38]
    Joeseph Marks. Homeland Security Invests $11.6 Million in Countering Large-Scale Internet Outages. Nextgov.com. Retrieved June 6, 2019 from https://www.nextgov.com/cybersecurity/2018/09/homeland-security-invests-116-million-countering-large-scale-internet-outages/151315/
    [39]
    Lene Nielsen. 2002. From User to Character: An Investigation into User-descriptions in Scenarios. In Proceedings of the 4th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '02), 99--104.
    [40]
    Sara Ashley O'Brien. 2016. Widespread cyberattack takes down sites worldwide. Retrieved June 13, 2019 from https://money.cnn.com/2016/10/21/technology/ddos-attack-popular-sites/index.html
    [41]
    Wanda J. Orlikowski and Debra C. Gash. 1994. Technological Frames: Making Sense of Information Technology in Organizations. ACM Trans. Inf. Syst. 12, 2 (April 1994), 174--207.
    [42]
    Leysia Palen and Amanda L. Hughes. 2018. Social Media in Disaster Communication. In Handbook of Disaster Research, Havidán Rodríguez, William Donner and Joseph E. Trainor (eds.). Springer International Publishing, Cham, 497--518.
    [43]
    Leysia Palen, Sarah Vieweg, and Kenneth Mark Anderson. 2011. Supporting "Everyday Analysts" in Safety-and Time-Critical Situations. The Information Society 27, 1 (January 2011), 52--62.
    [44]
    Daniel Pargman, Elina Eriksson, Mattias Höjer, Ulrika Gunnarsson Östling, and Luciane Aguiar Borges. 2017. The (Un)Sustainability of Imagined Future Information Societies. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 773--785.
    [45]
    Nicole Perlroth. 2017. Lasting Damage and a Search for Clues in Cyberattack - The New York Times. Retrieved June 13, 2019 from https://www.nytimes.com/2017/07/06/technology/search-for-clues-global-cyberattacks.html
    [46]
    Linda Plotnick and Starr Roxanne Hiltz. 2016. Barriers to Use of Social Media by Emergency Managers. Journal of Homeland Security and Emergency Management 13, (2016), 247--277.
    [47]
    Michael G. Pratt. 2008. Fitting Oval Pegs Into Round Holes: Tensions in Evaluating and Publishing Qualitative Research in Top-Tier North American Journals. Organizational Research Methods 11, 3 (July 2008), 481--509.
    [48]
    E. L. Quarantelli. 1997. Research Based Criteria for Evaluating Disaster Planning and Managing. (1997). Retrieved September 26, 2019 from http://udspace.udel.edu/handle/19716/136
    [49]
    Kelly Quinn and Dmitry Epstein. 2018. #MyPrivacy: How Users Think About Social Media Privacy. In Proceedings of the 9th International Conference on Social Media and Society (SMSociety '18), 360--364.
    [50]
    Rafael Ramirez, Malobi Mukherjee, Simona Vezzoli, and Arnoldo Matus Kramer. 2015. Scenarios as a scholarly methodology to produce "interesting research." Futures 71, (August 2015), 70--87.
    [51]
    Mary Beth Rosson and John M. Carroll. 2002. Usability Engineering: Scenario-based Development of Human-computer Interaction. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
    [52]
    David E. Sanger and Nicole Perlroth. 2019. U.S. Escalates Online Attacks on Russia's Power Grid. The New York Times. Retrieved June 16, 2019 from https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html
    [53]
    Christine Satchell and Paul Dourish. 2009. Beyond the User: Use and Non-use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7 (OZCHI '09), 9--16.
    [54]
    Dietram A. Scheufele and Shanto Iyengar. 2014. The State of Framing Research. Oxford University Press.
    [55]
    Sarita Yardi Schoenebeck. 2014. Giving Up Twitter for Lent: How and Why We Take Breaks from Social Media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 773--782.
    [56]
    Kathleen Seiders, Berry Leonard L, and Larry G. Gresham. Attention, Retailers! How Convenient Is Your Convenience Strategy? MIT Sloan Management Review. Retrieved June 13, 2019 from https://sloanreview.mit.edu/article/attention-retailers-how-convenient-is-your-convenience-strategy/
    [57]
    Kathleen Seiders, Glenn B. Voss, Andrea L. Godfrey, and Dhruv Grewal. 2006. ORIGINAL EMPIRICAL RESEARCH SERVCON: development and validation of a multidimensional service convenience scale.
    [58]
    Neil Selwyn. 2003. Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in Society 25, 1 (January 2003), 99--116.
    [59]
    Aaron Smith. Shared, Collaborative and On Demand: The New Digital Economy. Pew Research Center.
    [60]
    Susan Leigh Star. 1999. The Ethnography of Infrastructure. American Behavioral Scientist 43, 3 (November 1999), 377--391.
    [61]
    The Editorial Board. 2017. Opinion | When Cyberweapons Go Missing. The New York Times. Retrieved June 13, 2019 from https://www.nytimes.com/2017/07/04/opinion/cyberweapons-nsa-attacks.html
    [62]
    Kathleen J. Tierney. 1993. Disaster Preparedness And Response: Research Findings And Guidance From The Social Science Literature. (1993). Retrieved September 26, 2019 from http://udspace.udel.edu/handle/19716/579
    [63]
    Amos Tversky and Daniel Kahneman. 1981. The framing of decisions and the psychology of choice. Science 211, 4481 (January 1981), 453--458.
    [64]
    Murray Turoff, Victor A. Bañuls, Linda Plotnick, Starr Roxanne Hiltz, and Miguel Ramirez de la Huerga. 2015. Collaborative Evolution of a Dynamic Scenario Model for the Interaction of Critical Infrastructures. In ISCRAM.
    [65]
    Murray Turoff, Víctor Bañuls, Linda Plotnick, and Starr Hiltz. 2014. Development of a dynamic scenario model for the interaction of critical infrastructures. In Proceedings of the 11th International ISCRAM Conference.
    [66]
    Sarah Vieweg, Amanda L. Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10), 1079--1088.
    [67]
    Karl E. Weick and Kathleen M. Sutcliffe. 2001. Managing the unexpected: Assuring high performance in an age of complexity. Jossey-Bass, San Francisco, CA, US.
    [68]
    Mark Weiser. 1999. The Computer for the 21st Century. SIGMOBILE Mob. Comput. Commun. Rev. 3, 3 (July 1999), 3--11.
    [69]
    Sally M.E. Wyatt. 2003. Non-users also matter: The construction of users and non-users of the Internet. (2003). Retrieved February 17, 2019 from https://dare.uva.nl/search?identifier=9fc15327--9657--4e65--9af3-b5def673f4e9
    [70]
    Susanna Zaraysky. Design for Offline - Library. Google Design. Retrieved June 11, 2019 from https://design.google/library/offline-design/
    [71]
    NCSAM 2018 Toolkit. Department of Homeland Security. Retrieved June 13, 2019 from https://www.dhs.gov/cisa/cyber-safety
    [72]
    EPRI Report: State of the Technology 2017. Retrieved June 13, 2019 from https://www.epri.com/#/pages/product/000000003002011125/?lang=en-US
    [73]
    Shared, Collaborative and On Demand: The New Digital Economy. Retrieved June 13, 2019 from https://www.pewresearch.org/wp-content/uploads/sites/9/2016/05/PI_2016.05.19_Sharing-Economy_FINAL.pdf
    [74]
    Critical Infrastructure and the Internet of Things | FLETC. Retrieved June 13, 2019 from https://www.fletc.gov/critical-infrastructure-and-internet-things
    [75]
    ICT Facts and Figures 2017. Retrieved June 13, 2019 from https://news.itu.int/itu-statistics-leaving-no-one-offline/
    [76]
    Information Security and Critical Infrastructure Protection | Center for International Strategy, Technology, and Policy. Retrieved June 13, 2019 from https://cistp.gatech.edu/programs/information-security-and-critical-infrastructure-protection
    [77]
    What Point Of Sale System Does Walmart Use? Expert Market US. Retrieved June 13, 2019 from https://www.expertmarket.com/pos/walmart-pos-system

    Cited By

    View all
    • (2023)Measuring the Impacts of Power Outages on Internet Hosts in the United StatesCritical Infrastructure Protection XVII10.1007/978-3-031-49585-4_4(62-90)Online publication date: 29-Dec-2023
    • (2021)Ed-Tech Within Limits: Anticipating educational technology in times of environmental crisisE-Learning and Digital Media10.1177/20427530211022951(204275302110229)Online publication date: 10-Jun-2021
    • (2021)Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for NeighborhoodsCompanion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3462204.3481749(62-66)Online publication date: 23-Oct-2021
    • Show More Cited By

    Index Terms

    1. An Internet-less World?: Expected Impacts of a Complete Internet Outage with Implications for Preparedness and Design

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 4, Issue GROUP
      GROUP
      January 2020
      405 pages
      EISSN:2573-0142
      DOI:10.1145/3378060
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 January 2020
      Published in PACMHCI Volume 4, Issue GROUP

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. design
      2. emergency preparedness
      3. framing
      4. futures studies
      5. impact
      6. infrastructure
      7. internet
      8. non-use
      9. outage
      10. scenario
      11. social media
      12. threat
      13. use

      Qualifiers

      • Research-article

      Funding Sources

      • CSU-AAUP Research Grant (2016-2017)

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)69
      • Downloads (Last 6 weeks)15
      Reflects downloads up to 12 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Measuring the Impacts of Power Outages on Internet Hosts in the United StatesCritical Infrastructure Protection XVII10.1007/978-3-031-49585-4_4(62-90)Online publication date: 29-Dec-2023
      • (2021)Ed-Tech Within Limits: Anticipating educational technology in times of environmental crisisE-Learning and Digital Media10.1177/20427530211022951(204275302110229)Online publication date: 10-Jun-2021
      • (2021)Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for NeighborhoodsCompanion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3462204.3481749(62-66)Online publication date: 23-Oct-2021
      • (2021)Personalised Services in Social SituationsProceedings of the ACM on Human-Computer Interaction10.1145/34329184:CSCW3(1-21)Online publication date: 5-Jan-2021
      • (2020)Space weather climate impacts on railway infrastructureInternational Journal of System Assurance Engineering and Management10.1007/s13198-020-01003-911:S2(267-281)Online publication date: 17-Jun-2020

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media