Divining a Digital Future

Total Page:16

File Type:pdf, Size:1020Kb

Divining a Digital Future Divining a Digital Future Mess and Mythology in Ubiquitous Computing Paul Dourish and Genevieve Bell 2011 The MIT Press Cambridge, Massachusetts London, England Contents Preface vii Acknowledgments ix 1 Introduction : The Myth and Mess of Ubiquitous Computing 1 I 7 2 Contextualizing Ubiquitous Computing 9 3 Making Room for the Social and Cultural 45 4 A Role for Ethnography : Methodology and Theory 61 II 91 5 What Lies Beneath 95 6 Mobility and Urbanism 117 7 Rethinking Privacy 137 8 Domesticity and Its Discontents 161 III 185 9 Reimagining Ubiquitous Computing : A Conclusion 187 References 211 Index 245 Preface We wrote the proposal for this book in a stark modernist hotel room in Geneva, while attending a new media conference there. In between con- ference sessions, extravagant French-infl uenced desserts, and a memorable trip to the International Museum of the Reformation, we sketched out a plan for how it might take shape. We knew from the outset that we wanted to critically interrogate the idea of “ ubiquitous computing ” (or “ ubicomp ” ). It was a project that we had been circling around in various publications and talks for several years, and the time seemed ripe to take a more comprehensive look. Much of this project ’ s distinctiveness and whatever success it achieves relies on the interdisciplinary nature of our collaboration. Dourish is a com- puter scientist whose work lies at the intersection of computer science and social science; Bell is a cultural anthropologist with a primary concern in information technology as a site of cultural production along with the con- sequences for technology innovation and diffusion. Our intellectual and personal trajectories are complicated. We have each spent time, in various guises — as a child, worker, student, professor, and researcher — in a range of signifi cant hubs — such as the Australian National University, Stanford Uni- versity, Bryn Mawr College, Cambridge, University College London, Silicon Valley, Rank Xerox EuroPARC, Xerox PARC, Apple, and Intel ’ s Architecture Lab and Corporate Technology Group. Raised in Australia and educated in the United States, Bell is currently directing a new Interaction and Experi- ence Research laboratory at Intel Corporation. Raised in Scotland, and educated in Scotland and England, Dourish now runs an interdisciplinary research program at the University of California, Irvine. Our collaboration refl ects our belief that any satisfactory account of contemporary computational practice must be deeply grounded in cultural and specifi c settings yet must also take the nature of computational devices seriously, not black boxing them, but instead engaging with both the viii Preface technology and practice of information technology design. The material in this book, then, draws on the body of empirical and conceptual work that we have undertaken, individually and together, over the last six years, across a wide range of related topics, domains of inquiry, and regions of the world. Our work has generated a series of articles in journals and other publications over the last three or four years; these writings form the basis of the book and are elaborated, developed, connected, and reframed in terms of a broader set of conceptual and methodological themes. The book itself is divided into three sections. The fi rst section spells out the terrain of ubicomp with a particular focus on culture and eth- nography as theoretical as well as methodological stances. The second one provides a sequence of thematic explorations of dominant narratives within ubicomp. The third section provides a conclusion, proposing directions for future exploration and study. We wrote this book over a long period, and it has gone through multiple instantiations and a number of working titles. But the one thing that has been a constant is the cover image. It fi rst appeared in Australia in 1985. Produced by Redback Graphix, an activist design house run by Michael Callaghan from Wollongong, “ Bush Radio ” sought to promote a joint venture — bringing radio in local languages to the aboriginal communities of central Australia— between the Australian Broadcasting Corporation and the Central Australian Aboriginal Media Association. The image blends contemporary representations of radio waves and broadcast ranges with a map of the Northern Territory, while simultaneously evoking the more traditional images of Aboriginal art and country. Here, the “ future ” is understood by reference to the present and the ever present. It is just such forms of hybridity, the reappropriations of technical realities, around which this book turns. Acknowledgments Although we both attended a conference organized by Lucy Suchman and her colleagues in 1999, we managed not to meet until an Intel-sponsored conference in Oregon in September 2003. Other conferences followed, and over time an intellectual connection bloomed into an ongoing collabora- tion that has seen us writing papers together for nearly seven years. This book is a natural outgrowth and result of that process, but it would never have come to print without a great deal of assistance, input, and support. Some specifi c material for this book has been drawn from written pieces and projects that we have undertaken in collaboration with others, includ- ing Ken Anderson, Arianna Bassoli, Kirsten Boehner, Johanna Brewer, Simon Cole, Rogerio de Paula, Eric Kabisch, Scott Mainwaring, Karen Martin, Phoebe Sengers, Jennifer Terry, and Amanda Williams. We have benefi ted greatly from a sustaining network of colleagues who, through conversation, collaboration, and critique, have helped shape the ideas we present here. At Intel, this includes Ken Anderson, Ashwini Asokan, Maria Bezaitis, Sue Faulkner, Anthony LaMarca, Scott Mainwaring, Jay Melican, Dawn Nafus, Mike Payne, Tony Salvador, John Sherry, and Alex Zafi roglu. At the University of California, Irvine, this includes Tom Boellstorff, Simon Cole, Beatriz da Costa, Martha Feldman, David Theo Goldberg, Gillian Hayes, Garnet Hertz, Mimi Ito, Crista Lopes, Liz Losh, George Marcus, Gloria Mark, Bill Maurer, Melissa Mazmanian, Bonnie Nardi, Robert Nideffer, Don Patterson, Simon Penny, Kavita Philip, Mark Poster, David Redmiles, and Jennifer Terry. Beyond the immediate boundaries of our own institutions, this includes Mark Ackerman, Julian Bleecker, Geoffrey Bowker, John Seely Brown, Matthew Chalmers, Kate Crawford, Michael Curry, Keith Edwards, Bill Gaver, Gerard Goggin, Melissa Gregg, Beki Grinter, Steve Harrison, Larrisa Hjorth, Kia H ö ö k, Ann Light, Peter Lunenfeld, John McCarthy, Malcolm x Acknowledgments McCullough, Christena Nippert-Eng, Eric Paulos, Yvonne Rogers, Christine Satchell, Phoebe Sengers, Brian Cantwell Smith, Lucy Suchman, Nina Wakeford, and Peter Wright. At the outset of our collaboration, we found ourselves writing about infrastructure, and so we sent a draft of our fi rst paper on the topic to Leigh Star, whose thinking and writing on infrastructure and messiness were as inspiring to us then as they are now. Leigh’ s generous and thought- ful engagements with us, around that paper and in the years that fol- lowed, were invaluable. Leigh passed away a few weeks before this manuscript was completed. Her presence is hugely missed both personally and intellectually. Dourish ’ s students and postdocs, past and present, have made— and continue to make — key contributions through their research, questions, and refreshing refusal to take anything at face value: Johanna Brewer, Judy Chen, Marisa Cohn, Rogerio de Paula, Danyel Fisher, Lilly Irani, Charlotte Lee, Silvia Lindtner, Madhu Reddy, Jennifer Rode, Irina Shklovski, Janet Vertesi, and Amanda Williams. We thank our current institutions for their forbearance, support, and engagement: UC Irvine’ s Department of Informatics as well as the Labora- tory for Ubiquitous Computing and Interaction, and Intel Corporation (in particular, the Corporate Technology Group ’ s Peoples and Practice Research along with the Digital Home Group’ s User Experience Group). Aspects of this work were also supported in part by the National Science Foundation under awards 0133749, 0205724, 0326105, 0524033, 0527729, 0712890, 0838499, 0838601, and 0917401, and by grants from the Intel Research Council and Intel’ s Digital Home Group. Early material was developed while Paul was on sabbatical at Stanford University, where Terry Winograd, Scott Klemmer, and their students were his welcoming and engaging hosts. We should also thank the MIT Press, and in particular Doug Sery for his commitment to this project and to us, willingness to take this book on when it was just a title and short abstract, and remarkable patience as it developed. On a personal note, we also acknowledge the support of Brian David Johnson, Katrina Jungnickel, Heather Masterton, Josh Rohrbach, and Melinda Stelzer. 1 Introduction : The Myth and Mess of Ubiquitous Computing Ubiquitous computing names the third wave in computing, just now beginning. First were mainframes, each shared by lots of people. Now we are in the personal computing era, person and machine staring uneasily at each other across the desktop. Next comes ubiquitous computing, or the age of calm technology, when technology recedes into the background of our lives. — Mark Weiser, “ The Computer for the 21st Century” In Palo Alto, California, on Coyote Hill Road, in sight of the foothills of the coastal range, the Xerox Corporation runs a research and development center. Xerox founded its Palo Alto Research Center, or PARC as it is known,
Recommended publications
  • Computer-Supported Cooperative Work: History and Focus
    Computer-Supported Cooperative Work: Historv and Focus d Jonathan Grudin, University of California, Irvine en years ago, hen Greif of MIT and Paul Cashman of Digital Equipment Corporation organized a workshop that had far-reaching effects. Twenty people from different fields -but with a shared interest in how people work -gathered to explore technology’s role in the work environment and coined the term “computer-supported cooperative work” to describe it. Since then, thousands of researchers and developers have responded to this ini- tiative. Although the first CSCW conferences were held in the United States, the topic was picked up immediately in Europe and Asia, where related work and seri- ous interest already existed. This article describes the people and the work found under the CSCW umbrella. Why i984? An earlier approach to group support, called “office automation,” had run out of steam by 1984. OA’s primary problem was not technical, although technical chal- lenges certainly existed; it was in understanding system requirements. In the mid- CSCW and groupware 1960s, tasks such as filling seats on airplane flights or printing payroll checks had emerged in the 1980s been translated into requirements that resulted (with some trial and error) in suc- cessful mainframe systems. In the mid-l970s, minicomputers promised to support from shared interests groups and organizations in more sophisticated, interactive ways, and OA was born. OA tried to extend and integrate single-user applications, such as word processors and among product spreadsheets, to support groups and departments. But what were the precise re- developers and quirements for such systems? Building technology was not enough.
    [Show full text]
  • Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G
    Social Computing-Driven Activism in Youth Empowerment Organizations: Challenges and Opportunities Farnaz Irannejad Bisafar1, Lina Itzel Martinez2, Andrea G. Parker1,2 1College of Computer and Information Science 2Bouvé College of Health Sciences Northeastern University 360 Huntington Ave. Boston, MA 02115 Boston, United States [email protected], [email protected], [email protected] ABSTRACT significantly higher rates of health problems (e.g., diabetes) Throughout the world, organizations empower youth to than more affluent communities [17,29,44]. Previous work participate in civic engagement to impact social change, has examined how youth-led activism can be effective in and adult-youth collaborations are instrumental to the addressing these challenges and affecting social change success of such initiatives. However, little is known about [9,47]. In fact, throughout the world, many organizations how technology supports this activism work, despite the have created youth-led programs with the goals of solving fact that tools such as Social Networking Applications community problems and empowering youth to educate (SNAs) are increasingly being leveraged in such contexts. their peers about issues of concern [33]. These We report results from a qualitative study of SNA use organizations provide youth with resources needed to run within a youth empowerment organization. Using the social action initiatives (e.g., support for collective analytical lens of object-oriented publics, our findings organizing). As adult staff work together with youth, they reveal opportunities and challenges that youth and staff face create an environment that nurtures youth’s confidence that when they use SNAs. We describe the illegibility of youth they can take on social problems.
    [Show full text]
  • More Than Writing Text: Multiplicity in Collaborative Academic Writing
    More Than Writing Text: Multiplicity in Collaborative Academic Writing Ida Larsen-Ledet Ph.D. Thesis Department of Computer Science Aarhus University Denmark More Than Writing Text: Multiplicity in Collaborative Academic Writing A Thesis Presented to the Faculty of Natural Sciences of Aarhus University in Partial Fulfillment of the Requirements for the Ph.D. Degree. by Ida Larsen-Ledet November 2, 2020 Abstract This thesis explores collaborative academic writing with a focus on how it is medi- ated by multiple technologies. The thesis presents findings from two empirical stud- ies with university students and researchers: The first combined semi-structured interviews with visualizations of document editing activity to explore transitions through co-writers’ artifact ecologies along with co-writers’ motivations for per- forming these transitions. The second study was a three-stage co-design workshop series that progressed from dialog through ideation to exploration of a prototype for a shared editor that was based on the participants’ proposed features and designs. The contribution from the second study to this thesis is the analysis of participants’ viewpoints and ideas. The analyses of these findings contribute a characterization of co-writers’ practical and social motivations for using multiple tools in their collaborations, and the chal- lenges this poses for sharing and adressing the work. Multiplicity is also addressed in terms of co-writers bringing multiple and diverse needs and preferences into the writing, and how these may be approached in efforts to design and improve support for collaborative writing. Additionally, the notion of text function is introduced to describe the text’s role as a mediator of the writing.
    [Show full text]
  • An Infrastructure to Support Extensible Context-Enhanced Collaborative Applications
    Putting Computing in Context: An Infrastructure to Support Extensible Context-Enhanced Collaborative Applications W. KEITH EDWARDS Georgia Institute of Technology Context-aware computing exposes a unique tension in how information about human context is modeled and used. On the one hand, approaches that use loosely structured information have been shown to be useful in situations where humans are the final consumers of contextual information; these approaches have found favor in many CSCW applications. On the other hand, more rigidly structured information supports machine interpretation and exchange; these approaches have been explored in the ubiquitous computing community. The system presented here, dubbed Intermezzo, represents an exploration of a space between these two extremes. Intermezzo combines a loose data structuring with a number of unique features designed to allow applications to embed special- ized semantic interpretations of data into the infrastructure, allowing them to be reused by other applications. This approach can enable the construction of applications that can take advantage of rich, layered interpretations of context without requiring that they understand all aspects of that context. This approach is explored through the creation of two higher-level services that provide context-enhanced session management and context-enhanced access control. Categories and Subject Descriptors: D.2.11 [Software Engineering]: Software Architectures— Domain-specific architectures; H.5.3 [Information Interfaces and Presentation]: Group and Organization Interfaces—Collaborative computing; H.3.4 [Information Storage and Retrieval]: Systems and Software—Distributed systems, current awareness systems General Terms: Design, Human Factors Additional Key Words and Phrases: Collaboration, context-aware computing, data representations, coordination 1. INTRODUCTION All work—like everything else in our lives—occurs in some setting.
    [Show full text]
  • The Imaginary of Internet Patrice Flichy
    1 The imaginary of Internet Patrice Flichy I The Ideal Scientific Community Summary The Internet is the result of an imagined, technological construction in a particular social environment: academic computer science departments. This article considers the intentions and socio-technological choices of the initial designers of the Internet era. It focuses on the definition of the concept of network computing, the setting up of the network and its uses, the creation of a single world network and finally, hypertext projects and tools for accessing information. The earliest Internet model built in this framework has remained an unavoidable reference for all Internautes to this day. How can the success of the Internet be explained? Most analysts see the world as undergoing a major technological revolution comparable to the development of the steam engine or electricity, with the Internet at the summit of the third wave so dear to Alvin Toffler: high- tech, anti-industrial and based primarily on services and technology. This technological determinism often goes hand in hand with technological optimism which sees the Internet as the spearhead of a profound social transformation affecting the corporate world, the state and social relations alike. Others, however, consider that the prophets of the Internet have a short memory. A few years ago their peers and sometimes they themselves claimed that the image would replace writing, the videotext would supplant the press, offices would be paper-free and the cable would be the downfall of mass media since everyone would henceforth be able to express themselves without recognized intermediaries. Understandably, with this discourse on the communication revolution repeated every time a new medium starts to appear, attentive observers sometimes have the impression that history is stuttering.
    [Show full text]
  • UC Irvine Electronic Theses and Dissertations
    UC Irvine UC Irvine Electronic Theses and Dissertations Title Improving Efficacy of Support Groups in Online Environments Permalink https://escholarship.org/uc/item/12q608h5 Author Esmaeeli, Ali Publication Date 2020 License https://creativecommons.org/licenses/by/4.0/ 4.0 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, IRVINE Improving Efficacy of Support Groups in Online Environments DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Management by Ali Esmaeeli Dissertation Committee: Professor L. Robin Keller, Co-chair Professor Cornelia (Connie) Pechmann, Co-chair Associate Professor John Turner 2020 © 2020 Ali Esmaeeli DEDICATION To My supportive family who value diligence and wisdom ii TABLE OF CONTENTS Page LIST OF FIGURES v LIST OF TABLES vi ACKNOWLEDGMENTS vii VITA viii ABSTRACT OF THE DISSERTATION ix INTRODUCTION 1 CHAPTER 1: The Effects of Buddy Systems in Online Support Groups on Members’ Goal Attainment and Interactions 4 Theoretical Framework and Hypotheses 7 Buddy Systems and Hypotheses Development 7 Measuring Tie Strength 13 Research Methods 16 Setting 16 Dependent and Independent Variables 18 Analyses Approach 21 Empirical Results 23 Descriptive Statistics 23 Test of H1 25 Test of H2 26 Test of H3 29 Test of H4 30 Test of H5 (Mediation Test) 34 Discussion 36 Summary and Conclusion 36 Limitations 37 CHAPTER 2: Adding a Chatbot to Online Support Groups: The Natural Language
    [Show full text]
  • Supporting Early-Stage Ubicomp Experimentation
    Supporting early-stage ubicomp experimentation Scott Alan Carter Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2007-58 http://www.eecs.berkeley.edu/Pubs/TechRpts/2007/EECS-2007-58.html May 16, 2007 Copyright © 2007, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Supporting early-stage ubicomp experimentation by Scott Alan Carter B.S. (University of New Mexico) 2000 M.S. (University of California, Berkeley) 2004 A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the GRADUATE DIVISION of the UNIVERSITY OF CALIFORNIA, BERKELEY Committee in charge: Professor John Canny, Chair Assistant Professor Jennifer Mankoff Professor Peter Lyman Assistant Professor Maneesh Agrawala Spring 2007 The dissertation of Scott Alan Carter is approved. Chair Date Date Date Date University of California, Berkeley Spring 2007 Supporting early-stage ubicomp experimentation Copyright c 2007 by Scott Alan Carter Abstract Supporting early-stage ubicomp experimentation by Scott Alan Carter Doctor of Philosophy in Computer Science University of California, Berkeley Professor John Canny, Chair The thesis of this dissertation is that tools and techniques that leverage pre-existing infrastructures, human operators, and the increasing power of mobile devices can im- prove innovation, development, and evaluation of ubicomp applications.
    [Show full text]
  • Open Research Online Oro.Open.Ac.Uk
    Open Research Online The Open University’s repository of research publications and other research outputs Applying Direct Combination to afford spontaneity in Pervasive Computing Conference or Workshop Item How to cite: Holland, Simon; Gedenryd, Henrik and Morse, David (2002). Applying Direct Combination to afford spontaneity in Pervasive Computing. In: Workshop on Supporting Spontaneous Interaction in Ubiquitous Computing Settings, 29 Sep - 1 Oct 2002, Gothenburg, Sweden. For guidance on citations see FAQs. c [not recorded] https://creativecommons.org/licenses/by-nc-nd/4.0/ Version: Version of Record Link(s) to article on publisher’s website: https://web.archive.org/web/20030418015553/http://www.dcs.gla.ac.uk/ pd/Workshops/spontaneity02Prog.htm Copyright and Moral Rights for the articles on this site are retained by the individual authors and/or other copyright owners. For more information on Open Research Online’s data policy on reuse of materials please consult the policies page. oro.open.ac.uk Applying Direct Combination to afford spontaneity in pervasive computing Simon Holland, Henrik Gedenryd, David Morse Department of Computer Science, The Open University, Milton Keynes, UK. s.holland, h.gedenryd, d.r.morse, @open.ac.uk © July 2002 Abstract In rich pervasive environments, there will be numerous opportunities for end users to dynamically create services of interest by causing two or more devices or resources to interoperate together, often under changing circumstances. In general, users find this kind of process hard to manage. Existing programming architectures make the situation difficult to address in a principled, scaleable way. Users find it hard to tackle such problems via devices with small, resource-poor user interfaces.
    [Show full text]
  • INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick Mckelvey
    INTERNET DAEMONS ELECTRONIC MEDIATIONS Series Editors: N. Katherine Hayles, Peter Krapp, Rita Raley, and Samuel Weber Founding Editor: Mark Poster 56 INTERNET DAEMONS: DIGITAL COMMUNICATIONS POSSESSED Fenwick McKelvey 55 WHAT IS INFORMATION? Peter Janich 54 DECONSTRUCTION MACHINES: WRITING IN THE AGE OF CYBERWAR Justin Joque 53 METAGAMING: PLAYING, COMPETING, SPECTATING, CHEATING, TRADING, MAKING, AND BREAKING VIDEOGAMES Stephanie Boluk and Patrick LeMieux 52 THE PERVERSITY OF THINGS: HUGO GERNSBACK ON MEDIA, TINKERING, AND SCIENTIFICTION Hugo Gernsback, Edited by Grant Wythoff 51 THE PARTICIPATORY CONDITION IN THE DIGITAL AGE Darin Barney, Gabriella Coleman, Christine Ross, Jonathan Sterne, and Tamar Tembeck, Editors 50 MIXED REALISM: VIDEOGAMES AND THE VIOLENCE OF FICTION Timothy J. Welsh 49 PROGRAM EARTH: ENVIRONMENTAL SENSING TECHNOLOGY AND THE MAKING OF A COMPUTATIONAL PLANET Jennifer Gabrys 48 ON THE EXISTENCE OF DIGITAL OBJECTS Yuk Hui 47 HOW TO TALK ABOUT VIDEOGAMES Ian Bogost 46 A GEOLOGY OF MEDIA Jussi Parikka 45 WORLD PROJECTS: GLOBAL INFORMATION BEFORE WORLD WAR I Markus Krajewski 44 READING WRITING INTERFACES: FROM THE DIGITAL TO THE BOOKBOUND Lori Emerson 43 NAUMAN REITERATED Janet Kraynak 42 COMPARATIVE TEXTUAL MEDIA: TRANSFORMING THE HUMANITIES IN THE POSTPRINT ERA N. Katherine Hayles and Jessica Pressman, Editors (continued on page 321) INTERNET DAEMONS Digital Communications Possessed FENWICK McKELVEY Electronic Mediations 56 University of Minnesota Press Minneapolis London The University of Minnesota Press gratefully acknowledges the generous assis- tance provided for the open access version of this book by the Concordia Open Access Author Fund. Portions of chapter 7 were published in a different form in “Algorithmic Media Need Democratic Methods: Why Publics Matter,” Canadian Journal of Com- munication 39, no.
    [Show full text]
  • Divining a Digital Future
    Divining a Digital Future Divining a Digital Future Mess and Mythology in Ubiquitous Computing Paul Dourish and Genevieve Bell The MIT Press Cambridge, Massachusetts London, England © 2011 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. For information about special quantity discounts, please email special_sales@ mitpress.mit.edu This book was set in Stone Sans and Stone Serif by Toppan Best-set Premedia Limited. Printed and bound in the United States of America. Every effort has been made to trace copyright holders and to obtain their permis- sion for the use of copyrighted material. The publisher apologizes for any errors or omissions and would be grateful if notifi ed of any corrections that should be incorporated in future reprints or editions of this book. Library of Congress Cataloging-in-Publication Data Dourish, Paul. Divining a digital future : mess and mythology in ubiquitous computing / Paul Dourish and Genevieve Bell. p. cm. Includes bibliographical references and index. ISBN 978-0-262-01555-4 (hardcover : alk. paper) 1. Ubiquitous computing. 2. Computer networks — Social aspects — Forecasting. I. Bell, Genevieve. II. Title. QA76.5915.D68 2011 303.48′ 33 — dc22 2010038387 10 9 8 7 6 5 4 3 2 1 Contents Preface vii Acknowledgments ix 1 Introduction : The Myth and Mess of Ubiquitous Computing 1 I 7 2 Contextualizing Ubiquitous Computing 9 3 Making Room for the Social and Cultural 45 4 A Role for Ethnography : Methodology and Theory 61 II 91 5 What Lies Beneath 95 6 Mobility and Urbanism 117 7 Rethinking Privacy 137 8 Domesticity and Its Discontents 161 III 185 9 Reimagining Ubiquitous Computing : A Conclusion 187 References 211 Index 245 Preface We wrote the proposal for this book in a stark modernist hotel room in Geneva, while attending a new media conference there.
    [Show full text]
  • Dissertation
    © Copyright 2016 Kyle Rector Enhancing Quality of Life for People who are Blind or Low Vision Using Computing Technology Kyle Rector A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2016 Reading Committee: Julie A. Kientz, Chair Richard E. Ladner, Chair Jennifer Mankoff Program Authorized to Offer Degree: Computer Science and Engineering University of Washington Abstract Enhancing Quality of Life for People who are Blind or Low Vision Using Computing Technology Kyle K. Rector Chairs of the Supervisory Committee: Professor Richard E. Ladner, Associate Professor Julie A. Kientz Computer Science and Engineering, Human Centered Design & Engineering People who are blind or low vision may have a harder time participating in activities that enhance quality of life due to inaccessibility, travel difficulties, or lack of experience. Enhancing quality of life allows people to complete and enjoy activities that they view as important such as exercise, education, or engaging in culture. The goal of this dissertation is to present the artifacts and studies that give insights to help people who are blind or low vision engage in these activities. First, I present an empirical investigation where I employed Value Sensitive Design. My Value Sensitive Design work involved 20 semi-structured interviews and a 76-person survey to learn about the opportunities and challenges for exercise technologies. I present four new themes I discovered through this work. Then, I present Eyes-Free Yoga, an accessible yoga coach that provides personalized real-time feedback on yoga postures and auditory motivations including levels, achievements, and reminders.
    [Show full text]
  • Security Usability Fundamentals an Important Consideration When You’Re Building an Application Is the Usability of the Security Features That You’Ll Be Employing
    Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you’re building an application is the usability of the security features that you’ll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however the security community has committed the exact same sin in reverse, placing usability considerations in second place behind security, if they were considered at all. As a result, we spent the 1990s building and deploying security that wasn’t really needed, and now that we’re experiencing widespread phishing attacks with viruses and worms running rampant and the security is actually needed, we’re finding that no-one can use it. To understand the problem, it’s necessary to go back to the basic definition of functionality and security. An application exhibits functionality if things that are supposed to happen, do happen. Similarly, an application exhibits security if things that aren’t supposed to happen, don’t happen. Security developers are interested in the latter, marketers and management tend to be more interested in the former. Ensuring that things that aren’t supposed to happen don’t happen can be approached from both the application side and from the user side. From the application side, the application should behave in a safe manner, defaulting to behaviour that protects the user from harm. From the user side, the application should act in a manner in which the user’s expectations of a safe user experience are met. The following sections look at some of the issues that face developers trying to create a user interface for a security application.
    [Show full text]