skip to main content
10.1145/1753326.1753390acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

The infrastructure problem in HCI

Published:10 April 2010Publication History

ABSTRACT

HCI endeavors to create human-centered computer systems, but underlying technological infrastructures often stymie these efforts. We outline three specific classes of user experience difficulties caused by underlying technical infrastructures, which we term constrained possibilities, unmediated interaction, and interjected abstractions. We explore how prior approaches in HCI have addressed these issues, and discuss new approaches that will be required for future progress. We argue that the HCI community must become more deeply involved with the creation of technical infrastructures. Doing so, however, requires a substantial expansion to the methodological toolbox of HCI.

Skip Supplemental Material Section

Supplemental Material

1753390.mp4

mp4

342.2 MB

References

  1. Ackerman, M.S.: The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human-Computer Interaction, 15(2--3):179--203, (2000) Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bell, M., et al.: Interweaving Mobile Games with Everyday Life. ACM CHI 2006 417--426 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bhattacharjee, S., Calvert, K.L. and Zegura, E.W.: An Architecture for Active Networking. Proceedings of the Seventh IFIP Conference on High Performance Networking, White Plains, NY, USA (1997) 265--279 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Blumenthal, M.S. and Clark, D.D.: Rethinking the Design of the Internet: The End-to-End Arguments vs. the Brave New World. ACM Trans. on Internet Tech., 1(1):70--109, (2001) Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Bly, S., et al.: Broken Expectations in the Digital Home. ACM CHI 2006 568--573 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Calvert, K.L., Edwards, W.K. and Grinter, R.E.: Moving Toward the Middle: The Case Against the End-to-End Argument in Home Networking. ACM HotNets--VI (2007)Google ScholarGoogle Scholar
  7. Cao, X. and Iverson, L.: Intentional Access Management: Making Access Control Usable for End-Users. ACM SOUPS 2006 20--31 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Card, S.K., Moran, T.P. and Newell, A.: The Psychology of Human-Computer Interaction. Erlbaum (1983) Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chetty, M., Sung, J.-Y. and Grinter, R.E.: How Smart Homes Learn: The Evolution of the Networked Home and Household. Ubicomp 2007 127--144 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Chun, B., et al.: PlanetLab: an overlay testbed for broad-coverage services. SIGCOMM Comput. Commun. Rev., 33(3):3--12, (2003) Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dabrowski, J.R. and Munson, E.V.: Is 100 Milliseconds Too Fast? : CHI 2001 317--318 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Dey, A.K., Abowd, G.D. and Salber, D.: A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications. Hum.-Comput. Interact., 16(2):97--166, (2001) Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dey, A.K. and Newberger, A.: Support for Context-Aware Intelligibility and Control. ACM CHI 2009 859--868 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dourish, P.: Developing a Reflective Model of Collaborative Systems. ACM ToCHI, 2(1):40--63, (1995) Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dourish, P.: Accounting for System Behaviour. Computers and Design in Context (1997) 145--170 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Dourish, P., et al.: Extending Document Management Systems with User-Specific Active Properties. ACM Trans. Inf. Syst., 18(2):140--170, (2000) Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Edwards, W.K., et al.: Stuck in the Middle: The Challenges of User-Centered Design and Evaluation for Infrastructure. ACM CHI 2003:297--304, (2003) Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Edwards, W.K. and Grinter, R.E.: At Home With Ubiquitous Computing: Seven Challenges. Ubicomp 2001 256--272 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Edwards, W.K., et al.: Experiences with Recombinant Computing. ACM ToCHI, 16(1):1--44, (2009) Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Edwards, W.K., et al.: Using Speakeasy for Ad Hoc Peer to Peer Collaboration. ACM CSCW 2002 256--265 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Glasson, J.: Introduction to Environmental Impact Assessment. Routledge (2005)Google ScholarGoogle Scholar
  22. Grinter, R.E., et al.: The Work to Make a Home Network Work. ECSCW 2005 469--488 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hong, J.I. and Landay, J.A.: An Architecture for Privacy-Sensitive Ubiquitous Computing. ACM MobiSys 2004 177--189 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Hong, J.I. and Landay, J.A.: SATIN: a Toolkit for Informal Ink-Based Applications. ACM UIST 2000 63--72 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Horrigan, J.: Home Broadband Adoption 2009. Pew Internet & American Life, Washington, DC, USA (2009)Google ScholarGoogle Scholar
  26. Johanson, B. and Fox, A.: Extending Tuplespaces for Coordination in Interactive Workspaces. J. Syst. Softw., 69(3):243--266, (2004) Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. John, B.E., et al.: Bringing Usability Concerns to the Design of Software Architecture. Engineering HCI and Interactive Systems. Springer (2005) 1--19 Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Kiczales, G., des Rivieres, J. and Bobrow, D.: The Art of the Meta-Object Protocol. MIT Press, Cambridge (1991) Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Klemmer, S.R., et al.: Papier-Mache: Toolkit Support for Tangible Input. ACM CHI 2004 399--406 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Lampson, B.: Protection. ACM SIGOPS Operating Systems Review, 8(1):18--24, (1974) Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Lee, C., Dourish, P. and Mark, G.: The Human Infrastructure of Cyberinfrastructure. ACM CSCW 2006. 483--492 Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Leopold, L.B., et al.: A Procedure for Evaluating Environmental Impact. U.S. Geological Survey (1971)Google ScholarGoogle Scholar
  33. Lim, B.Y., Dey, A.K. and Avrahami, D.: Why and Why Not Explanations Improve the Intelligibility of Context-Aware Intelligent Systems. ACM CHI 2009 2119--2128 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Maeda, C., et al.: Open Implementation Analysis and Design. SIGSOFT Softw. Eng. Notes, 22(3):44--52, (1997) Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Mainwaring, S.D., Chang, M.F. and Anderson, K.: Infrastructures and Their Discontents: Implications for Ubicomp. Ubicomp 2004 418--432Google ScholarGoogle Scholar
  36. Maxion, R.A. and Reeder, R.W.: Improving User-Interface Dependability Through Mitigation of Human Error. Int. J. Hum.-Comput. Stud., 63(1--2):25--50, (2005) Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. McDonald, D.W., Smith, K.A. and Karlova, N.: Problem Solving Probes: A Method for Discovering Conceptual Disconnects with Digital Living Technologies. ACM CSCW 2008 Designing for Families WorkshopGoogle ScholarGoogle Scholar
  38. Miller, B., et al.: Home Networking with Universal Plug and Play. IEEE Communications, 39(12):104--109, (2001) Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Miller, R.B.: Response Time in Man-Computer Conversational Transactions. December 1968 Fall Joint Computer Conference (1968) Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Myers, B., Hudson, S.E. and Pausch, R.: Past, Present, and Future of User Interface Software Tools. ACM ToCHI, 7(1):3--28, (2000) Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Newman, W.M.: Better or just different? On the benefits of designing interactive systems in terms of critical parameters. ACM DIS 1997 239--245 Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Nichols, J., et al.: Generating Remote Control Interfaces for Complex Appliances. ACM UIST 2002 161--170 Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Norman, D.A.: The Design of Everyday Things. Basic Books (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Olsen, D.R.: Evaluating User Interface Systems Research. ACM UIST 2007 251--258 Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Olsen, D.R., et al.: Cross-Modal Interaction Using XWeb. ACM UIST 2000 191--200 Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Olson, J.S., Grudin, J. and Horvitz, E.: A Study of Preferences for Sharing and Privacy. ACM CHI 2005 1985--1988 Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Oppenheimer, P.: Top-down network design. Cisco (1998) Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Palen, L. and Dourish, P.: Unpacking "Privacy" for a Networked World. ACM CHI 2003 129--136 Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Rodden, T. and Benford, S.: The evolution of buildings and implications for the design of ubiquitous domestic environments. ACM CHI 2003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Salber, D., Dey, A.K. and Abowd, G.D.: The Context Toolkit: Aiding the Development of Context-Enabled Applications. ACM CHI 1999 434--441 Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Sandhu, R. and Samarati, P.: Access control: Principle and Practice. IEEE Communications, 32(9):40--48, (1994)Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Shehan, E. and Edwards, W.K.: Home Networking and HCI: What Hath God Wrought? : CHI 2007 547--556 Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Stankovic, J. and Ramamritham, K.: A Reflective Architecture for Real-Time Operating Systems. Advances in Real-Time Systems:23--38, (1995) Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Star, S.L.: The Ethnography of Infrastructure. The American Behavior Scientist, 43(3):377--391, (1999)Google ScholarGoogle ScholarCross RefCross Ref
  55. Star, S.L. and Ruhleder, K.: Steps towards an ecology of infrastructure: complex problems in design and access for large-scale collaborative systems. ACM CSCW 1994 253--264 Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Tolia, N., Andersen, D.G. and Satyanarayanan, M.: Quantifying Interactive User Experience on Thin Clients. Computer, 39(3):46--52, (2006) Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Tolmie, P., et al.: Unremarkable computing. ACM CHI 2002. pp. 399--406 Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Voida, S., et al.: Share and Share Alike: Exploring User Interface Affordances of File Sharing. ACM CHI 2006 221--230 Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Westman, W.E.: Ecology, Impact Assessment, and Environmental Planning. Wiley (1985)Google ScholarGoogle Scholar
  60. Whitten, A. and Tygar, J.D.: Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. USENIX Security Symposium (1999) Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The infrastructure problem in HCI

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2010
      2690 pages
      ISBN:9781605589299
      DOI:10.1145/1753326

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 10 April 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader