Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290605.3300538acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Relations are more than Bytes: Re-thinking the Benefits of Smart Services through People and Things

Published: 02 May 2019 Publication History

Abstract

Critical approaches to smart technologies have emerged in HCI that question the conditions necessary for smart technologies to benefit people. Smart services rely on a relation of trust and sense of security between people and technology requiring a more expansive definition of security. Using established design methods, we worked with two residents' groups to critically explore and rethink smart services in the home and city. From our data analysis, we derive insights about perceptions and understandings of trust, privacy and security of smart devices, and identify how technological security needs to work in concert with social and relational forms of security for smart services to be effective. We conclude with an orientation for HCI that focuses on designing services for and with smart people and things.

References

[1]
Khorshed Alam and Sophia Imran. 2015. The digital divide and social inclusion among refugee migrants: A case in regional Australia. Information Technology & People 28, 2 (2015), 344--365.
[2]
Asam Almohamed and Dhaval Vyas. 2016. Designing for the Marginalized: A step towards understanding the lives of refugees and asylum seekers. In Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems. ACM, 165--168.
[3]
Sunderland City Council/Edge Analytics. 2016. Sunderland: Updating the Demographic Evidence. Retrieved August 31, 2018 from https://www.sunderland.gov.uk/media/19033/ Sunderland-Updating-the-Demographic-Evidence-2016-/pdf/6_Sunderland_Updating_the_Demographic_Evidence_(2016).pdf
[4]
Mariam Asad, Christopher A Le Dantec, Becky Nielsen, and Kate Diedrick. 2017. Creating a Sociotechnical API: Designing City-Scale Community Engagement. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 2295--2306.
[5]
Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, and Björn Tackmann. 2015. Augmented secure channels and the goal of the TLS 1.3 record layer. In International Conference on Provable Security. Springer, 85--104.
[6]
Kirsten Boehner and Carl DiSalvo. 2016. Data, design and civics: An exploratory study of civic tech. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2970--2981.
[7]
Sergey Bratus, Trey Darley, Michael Locasto, Meredith L Patterson, Rebecca bx Shapiro, and Anna Shubina. 2014. Beyond planted bugs in" trusting trust": The input-processing frontier. IEEE Security & Privacy 12, 1 (2014), 83--87.
[8]
Andre de Oliveira Bueno. 2016. From Smart Cities to Social Cities: Technology to Support Community Life. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. ACM, 198--202.
[9]
Peter Bürgi and Johan Roos. 2003. Images of strategy. European Management Journal 21, 1 (2003), 69--78.
[10]
Peter T Bürgi, Claus D Jacobs, and Johan Roos. 2005. From metaphor to practice in the crafting of strategy. Journal of Management Inquiry 14, 1 (2005), 78--94. Relations are more than Bytes CHI'19, May 2019, Glasgow, UK
[11]
Paolo Cardullo and Rob Kitchin. 2017. Being a 'citizen' in the smart city: Up and down the scaffold of smart citizen participation: The Programmable City Working Paper 30 (2017).
[12]
Eric Corbett and Christopher A Le Dantec. 2018. Going the Distance: Trust Work for Citizen Participation. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 312.
[13]
Lorrie Faith Cranor and Simson Garfinkel. 2005. Security and usability: designing secure systems that people can use. O'Reilly Media, Inc.
[14]
Clara Crivellaro, Rob Comber, Martyn Dade-Robertson, Simon J Bowen, Peter C Wright, and Patrick Olivier. 2015. Contesting the city: Enacting the political through digitally supported urban walks. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2853--2862.
[15]
Carl DiSalvo, Jonathan Lukens, Thomas Lodato, Tom Jenkins, and Tanyoung Kim. 2014. Making public things: how HCI design can express matters of concern. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2397--2406.
[16]
Lynn Dombrowski, Ellie Harmon, and Sarah Fox. 2016. Social justiceoriented interaction design: Outlining key design strategies and commitments. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems. ACM, 656--671.
[17]
Paul Dourish and Ken Anderson. 2006. Collective information practice: Exploring privacy and security as social and cultural phenomena. Human-computer interaction 21, 3 (2006), 319--342.
[18]
Paul Dourish, E Grinter, Jessica Delgado De La Flor, and Melissa Joseph. 2004. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (2004), 391--401.
[19]
Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasilis Vlachokyriakos, Peter Wright, John McCarthy, and Patrick Olivier. 2014. Understanding the experience-centeredness of privacy and security technologies. In Proceedings of the 2014 New Security Paradigms Workshop. ACM, 83--94.
[20]
Thomas Erickson, Mark Podlaseck, Sambit Sahu, Jing D Dai, Tian Chao, and Milind Naphade. 2012. The dubuque water portal: evaluation of the uptake, use and impact of residential water consumption feedback. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 675--684.
[21]
Laura Forlano. 2016. Decentering the human in the design of collaborative cities. Design Issues 32, 3 (2016), 42--54.
[22]
Anthony Giddens. 1991. Modernity and self-identity: Self and society in the late modern age. Stanford university press.
[23]
Donna Haraway. 1988. Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist studies 14, 3 (1988), 575--599.
[24]
Lambeth Public Health. 2015. Joint Strategic Needs Assessment (JSNA), Lambeth Public Health. Retrieved August 31, 2018 from https://www.lambeth.gov.uk/sites/default/files/ssh-lambeth-demography-2015.pdf
[25]
Lambeth Public Health. 2017. Lambeth diverse: Joint Strategic Needs Assessment (JSNA), Lambeth Public Health. Retrieved August 31, 2018 from https://www.lambeth.gov.uk/adult-social-care-and-health/health-and-wellbeing/lambeths-health-profile-and-the-jsna
[26]
Claude Heath, Lizzie Coles-Kemp, Peter A Hall, et al. 2018. Holding onto Dissensus: the participatory co-design of security. Strategic Design Research Journal (2018).
[27]
C. P. Heath, L. Coles-Kemp, and P. A Hall. 2014. Logical Lego?: Coconstructed perspectives on service design. NordDesign 2014, Proceedings (2014).
[28]
Sara Heitlinger, Nick Bryan-Kinns, and Rob Comber. 2018. Connected seeds and sensors: co-designing internet of things for sustainable smart cities with urban food-growing communities. In Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial-Volume 2. ACM, 18.
[29]
Thomas Hobbes. 2016. Thomas Hobbes: Leviathan (Longman Library of Primary Sources in Philosophy). Routledge.
[30]
Andrew Hood and Tom Waters. 2017. Living standards, poverty and inequality in the UK: 2016--17 to 2021--22. Institute for Fiscal Studies London, England.
[31]
Philip G Inglesant and M Angela Sasse. 2010. The true cost of unusable password policies: password use in the wild. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 383--392.
[32]
Dorothea Kleine. 2009. The ideology behind the technology--Chilean microentrepreneurs and public ICT policies. Geoforum 40, 2 (2009), 171--183.
[33]
Susan Landau. 2011. Surveillance or security?: The risks posed by new wiretapping technologies. MIT Press.
[34]
Christopher A Le Dantec. 2016. Designing publics. MIT Press.
[35]
Thomas Maskell, Clara Crivellaro, Robert Anderson, Tom Nappey, Vera Araújo-Soares, and Kyle Montague. 2018. Spokespeople: Exploring Routes to Action through Citizen-Generated Data. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 405.
[36]
John McCarthy and Peter Wright. 2004. Technology as experience. interactions 11, 5 (2004), 42--43.
[37]
Donald McMillan, Arvid Engström, Airi Lampinen, and Barry Brown. 2016. Data and the City. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 2933--2944.
[38]
Peter JJ McNerney and Ning Zhang. 2011. Towards an integration of security and quality of service in ip-based mobile ad hoc networks. In Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE. IEEE, 1--6.
[39]
Andrew Monk and Steve Howard. 1998. Methods & tools: the rich picture: a tool for reasoning about work context. interactions 5, 2 (1998), 21--30.
[40]
Andrew Moravcsik. 2001. Liberal international relations theory: a social scientific assessment. Number 1--2. Weatherhead Center for International Affairs, Harvard University Cambridge, MA.
[41]
University of Durham/Office for National Statistics. 2018. Nomis. Retrieved August 31, 2018 from https://www.nomisweb.co.uk/
[42]
Patrick Olivier and Peter Wright. 2015. Digital civics: Taking a local turn. interactions 22, 4 (2015), 61--63.
[43]
Lego Serious Play. 2010. Open Source Introduction to Lego Serious Play. Billund: Lego. Lokaliseret den 7 (2010), 2013.
[44]
The Brixton Pound. 2018. The Brixton Pound. Retrieved August 31, 2018 from http://brixtonpound.org
[45]
Aare Puussaar, Ian G Johnson, Kyle Montague, Philip James, and Peter Wright. 2019. Making Open Data Work for Civic Advocacy. CSCW Paper, In Press (2019).
[46]
Johan Roos, Bart Victor, and Matt Statler. 2004. Playing seriously with strategy. Long Range Planning 37, 6 (2004), 549--568.
[47]
M Angela Sasse and Ivan Flechais. 2005. Usable security: Why do we need it? How do we get it? O'Reilly.
[48]
Klaus-Peter Schulz and Silke Geithner. 2013. Creative Tools for Collective Creativity The Serious Play Method Using Lego Bricks. Learning and Collective Creativity: Activity-Theoretical and Sociocultural Studies (2013), 179--197.
[49]
Amartya Sen. 1993. Capability and well-being. The quality of life. 30 (1993).
[50]
Amartya Sen. 2005. Human rights and capabilities. Journal of human development 6, 2 (2005), 151--166.
[51]
Graham M Smith. 2005. Into Cerberus' Lair: Bringing the Idea of Security to Light 1. The British Journal of Politics & International CHI'19, May 2019, Glasgow, UK Heath, Crivellaro, and Coles-Kemp Relations 7, 4 (2005), 485--507.
[52]
Alex S Taylor, Siân Lindley, Tim Regan, David Sweeney, Vasillis Vlachokyriakos, Lillie Grainger, and Jessica Lingel. 2015. Data-in-place: Thinking through the relations between data and community. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 2863--2872.
[53]
Joan C Tronto. 2013. Caring democracy: Markets, equality, and justice. NYU Press.
[54]
Jeroen Van den Hoven, P Vermaas, and Ibo Van de Poel. 2015. Handbook of ethics, values and technological design. Springer.
[55]
Alexander JAM van Deursen and Karen Mossberger. 2018. Any Thing for Anyone? A New Digital Divide in Internet-of-Things Skills. Policy & internet (2018).
[56]
John Vines, Mark Blythe, Paul Dunphy, Vasillis Vlachokyriakos, Isaac Teece, Andrew Monk, and Patrick Olivier. 2012. Cheque mates: participatory design of digital payments with eighty somethings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1189--1198.
[57]
John Vines, Paul Dunphy, Mark Blythe, Stephen Lindsay, Andrew Monk, and Patrick Olivier. 2012. The joy of cheques: trust, paper and eighty somethings. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work. ACM, 147--156.
[58]
Vasillis Vlachokyriakos, Clara Crivellaro, Pete Wright, Evika Karamagioli, Eleni-Revekka Staiou, Dimitris Gouscos, Rowan Thorpe, Antonio Krüger, Johannes Schöning, Matt Jones, et al. 2017. HCI, Solidarity Movements and the Solidarity Economy. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. ACM, 3126--3137.
[59]
Langdon Winner. 1980. Do artifacts have politics? Daedalus (1980), 121--136.
[60]
Donald Woods Winnicott. 2012. Playing and reality. Routledge.

Cited By

View all
  • (2023)Values@Runtime: An Adaptive Framework for Operationalising Values2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)10.1109/ICSE-SEIS58686.2023.00024(175-179)Online publication date: May-2023
  • (2022)Towards a Conceptual Framework for Understanding the Challenges in Refugee Re-settlementProceedings of the ACM on Human-Computer Interaction10.1145/34928566:GROUP(1-27)Online publication date: 14-Jan-2022
  • (2021)Resisting Resolution: Enterprise Civic Systems Meet Community OrganizingMultimodal Technologies and Interaction10.3390/mti50400205:4(20)Online publication date: 13-Apr-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
May 2019
9077 pages
ISBN:9781450359702
DOI:10.1145/3290605
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. digital civics
  2. iot
  3. lego
  4. participatory design
  5. security theory
  6. shared space
  7. smart cities

Qualifiers

  • Research-article

Funding Sources

  • EPSRC

Conference

CHI '19
Sponsor:

Acceptance Rates

CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)5
Reflects downloads up to 25 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Values@Runtime: An Adaptive Framework for Operationalising Values2023 IEEE/ACM 45th International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS)10.1109/ICSE-SEIS58686.2023.00024(175-179)Online publication date: May-2023
  • (2022)Towards a Conceptual Framework for Understanding the Challenges in Refugee Re-settlementProceedings of the ACM on Human-Computer Interaction10.1145/34928566:GROUP(1-27)Online publication date: 14-Jan-2022
  • (2021)Resisting Resolution: Enterprise Civic Systems Meet Community OrganizingMultimodal Technologies and Interaction10.3390/mti50400205:4(20)Online publication date: 13-Apr-2021
  • (2021)What Makes Civic Tech Initiatives To Last Over Time? Dissecting Two Global CasesProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445667(1-17)Online publication date: 6-May-2021
  • (2021)Opening Research Commissioning To Civic Participation: Creating A Community Panel To Review The Social Impact of HCI Research ProposalsProceedings of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411764.3445113(1-17)Online publication date: 6-May-2021
  • (2020)Towards more-than-human digital data studies: developing research-creation methodsQualitative Research10.1177/146879412093923521:4(463-480)Online publication date: 14-Jul-2020
  • (2019)Usability analysis of shared device ecosystem securityProceedings of the New Security Paradigms Workshop10.1145/3368860.3368861(1-15)Online publication date: 23-Sep-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media