Relations are more than Bytes (original) (raw)
Related papers
Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
Critical approaches to smart technologies have emerged in HCI that question the conditions necessary for smart technologies to benefit people. Smart services rely on a relation of trust and sense of security between people and technology requiring a more expansive definition of security. Using established design methods, we worked with two residents' groups to critically explore and rethink smart services in the home and city. From our data analysis, we derive insights about perceptions and understandings of trust, privacy and security of smart devices, and identify how technological security needs to work in concert with social and relational forms of security for smart services to be effective. We conclude with an orientation for HCI that focuses on designing services for and with smart people and things.
Proceedings of the ACM on human-computer interaction, 2024
The growing adoption of smart devices has fuelled privacy concerns, and prior research has highlighted the privacy of bystanders: individuals who are subjected to the smart device use of others. Most of this research has focused on households in Western contexts (i.e., Europe and North America), but few studies have explored the design challenges of protecting bystanders, and even fewer have explored these in Muslim Arab Middle Eastern settings, such as Jordan. We conduct 44 interviews with users (i.e., families, domestic workers), local and international business leaders, and smart device designers to explore design challenges for privacy protection in the Jordanian context. Our analysis highlights the importance of considering contextual influences and power dynamics, localization and design guidelines, innovative technologies, awareness to design, and regulation. This paper concludes with recommendations for technical, social, business, and legal interventions to improve data protection design of smart devices in Jordan. CCS Concepts: • Security and privacy → Privacy protections; • Human-centered computing → Empirical studies in HCI; HCI theory, concepts and models.
Designing for Data Awareness: Addressing Privacy and Security Concerns About "Smart" Technologies
CSCW '21: Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing , 2021
The internet of things (IoT) and smart home technologies are pervasive in the U.S. and abroad. Devices like smart speakers, cameras, thermostats, and vacuums promise to save consumers time and energy and to make tasks easier. Many devices also provide significant benefits through accessibility features that offer hands-free options, voice commands, and management through smartphone apps. At the same time, however, researchers and the media have documented a number of vulnerabilities in these devices, which raises concerns about what and how much data is being collected, how that data is used, and who has access to the data. In this one-day workshop, participants will work together to brainstorm potential solutions for making smart device data more visible and interpretable for consumers. Through rotating breakout sessions and full-group discussions, participants will identify data-based threats in popular smart home technologies, select data flows that are most concerning, a nd generate design ideas for tools or other artifacts that can help consumers make more informed decisions about using these devices. Opportunities for networking and future collaborations will also be incorporated. CCS CONCEPTS • Security and privacy; • Human and societal aspects of security and privacy; • Privacy protections;
The Contextual Complexity of Privacy in Smart Homes and Smart Buildings
HCI in Business, Government, and Organizations: Information Systems, 2016
Smart technologies allow unprecedented visibility into activities in homes and buildings, while they enable new services that householders and workers will value. As people become increasingly aware of the magnitude and potentially sensitive nature of the data being collected through these technologies, privacy is emerging as a potential barrier to user adoption. In this paper, we apply leading privacy models to the results of qualitative research in which we solicited ideas for adding intelligence to homes and buildings, paying particular attention to information sensitivity about everyday activities that take place in those settings. We identify locations and activities that are particularly information-sharing sensitive, prioritize the salience of different types of privacy violations for householders and workers, and examine the influence of privacy attitudes on smart device ownership and desired future smart experiences.
Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems
2002
Privacy is a known issue in ubiquitous computing, exasperated by an oft-cited feature of ubiquitous computing -invisibility. Dangers of invisible computing are interfaces that do not give people the needed tools of awareness and control to understand and shape the behavior of the system. By definition, ubiquitous computing systems are socio-technical, encompassing three environments: social, technical, and physical. We argue that addressing or presenting solutions in any one environment alone cannot solve the privacy issue in ubiquitous computing. Privacy is addressed best by giving users methods, mechanisms, and interfaces to understand and then shape the system in all three environments. We introduce Privacy Mirrors, a framework for designing socio-technical ubiquitous computing systems that will integrate into people's on-going needs, practices, values, and aesthetic sensibilities.
Spaces and Traces: Implications of Smart Technology in Public Housing
Smart home technologies are beginning to become more widespread and common, even as their deployment and implementation remain complex and spread across different competing commercial ecosystems. Looking beyond the middle-class, single-family home often at the center of the smart home narrative, we report on a series of participatory design workshops held with residents and building managers to better understand the role of smart home technologies in the context of public housing in the U.S. The design workshops enabled us to gather insight into the specific challenges and opportunities of deploying smart home technologies in a setting where issues of privacy, data collection and ownership , and autonomy collide with diverse living arrangements, where income, age, and the consequences of monitoring and data aggregation setup an expanding collection of design implications in the ecosystems of smart home technologies. CCS CONCEPTS • Human-centered computing → Empirical studies in interaction design.
Trust in Home: Rethinking Interface Design in IoT
2021
IoT systems in smart homes present several privacy challenges. To this end, we have been running design workshops to foster community discussion and collaboration among a multidisciplinary group of experts and early-career researchers in a design workshop. Through these creative design workshops, we aim to deepen understanding of the security, privacy, identity and trust issues with four use cases namely i) smart health, ii) smart appliances, iii) smart toys and iv) home security. Our work aims to build on previous creative approaches, and the findings from the workshop to provide a valuable insight to both further research and industrial implementation.
Exploring Bystanders’ Privacy Concerns with Smart Homes in Jordan
CHI Conference on Human Factors in Computing Systems, 2022
Smart homes continue to raise concerns about privacy and encroachment of businesses into intimate spaces. Prior research has focused on families and device owners in western contexts (Europe and North America), and has identified the importance of bystanders: individuals who are subjected to smart device use of others. Given the cultural and contextual aspects of accommodating bystanders, we identify a gap where bystanders in non-western societies have been insufficiently researched. To address this we conduct 20 interviews with domestic workers and household employers in Jordan, exploring privacy attitudes and practices. Our analysis uncovers a complex interplay between religious and social norms; legal and regulatory perspectives on privacy; and tensions between households and their domestic workers. We explore issues arising from smart homes coexisting as a residence and workplace, and highlight how workplace protections are ill-suited. We structure our findings to help inform public awareness, policy makers, manufacturers, and future research. CCS CONCEPTS • Security and privacy → Usability in security and privacy; Human and societal aspects of security and privacy.
Accidentally Evil: On Questionable Values in Smart Home Co-Design
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems
An ongoing mystery of HCI is how do well-intentioned designers consistently enable products with unintentionally evil consequences. Using "questionable values" as a lens, we retell and analyze four design scenarios for smart homes that were created by participants with an IoT toolkit we designed. The selected design scenarios reveal practices that violate principles of responsible smart home design. Through our analysis we show (1) how participants explore sensor-driven objectification of the home then leverage data for surveillance, nudging, and control over others; (2) how the dominant technosolutionist narratives of efficiency and productivity ground such questionable values; (3) and how the materiality of mass-produced sensors pre-mediates questionable design scenarios. We discuss how to attend to and utilize questionable values in design: Making space for questionable values will empower design researchers to better "look around corners", anticipating tomorrow's concerns and forestalling the worst of their harms. CCS CONCEPTS • Human-centered computing → Human computer interaction (HCI); Empirical studies in HCI; Collaborative and social computing; Empirical studies in collaborative and social computing.