ABSTRACT
Through a design-led inquiry focused on smart home security cameras, this research develops three key concepts for research and design pertaining to new and emerging digital consumer technologies. Digital leakage names the propensity for digital information to be shared, stolen, and misused in ways unbeknownst or even harmful to those to whom the data pertains or belongs. Hole-and-corner applications are those functions connected to users' data, devices, and interactions yet concealed from or downplayed to them, often because they are non-beneficial or harmful to them. Foot-in-the-door devices are product and services with functional offerings and affordances that work to normalize and integrate a technology, thus laying groundwork for future adoption of features that might have earlier been rejected as unacceptable or unnecessary. Developed and illustrated through a set of design studies and explorations, this paper shows how these concepts may be used analytically to investigate issues such as privacy and security, anticipatorily to speculate about the future of technology development and use, and generatively to synthesize design concepts and solutions.
- Akrich, Madeleine. "The De-Scription of Technical Objects," 1992.Google Scholar
- Ahmed, Nova, Sadd Azmeen Ur Rahman, Rahat Jahangir Rony, Tanvir Mushfique, and Vikram Mehta. "Protibadinext: Sensor Support to Handle Sexual Harassment." In Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct, 918--921. UbiComp '16. New York, NY, USA: ACM, 2016. Google ScholarDigital Library
- Aipperspach, Ryan, Ben Hooker, and Allison Woodruff. "The Heterogeneous Home." In Proceedings of the 10th International Conference on Ubiquitous Computing, 222--231. UbiComp '08. New York, NY, USA: ACM, 2008. Google ScholarDigital Library
- Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., and Feamster, N. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. Arxiv, 2017. https://arxiv.org/abs/1708.05044Google Scholar
- Astor, Maggie. "Your Roomba May Be Mapping Your Home, Collecting Data That Could Be Shared." The New York Times, January 20, 2018, sec. Technology. https://www.nytimes.com/2017/07/25/technology/roomba-irobot-data-privacy.html.Google Scholar
- Baumer, Eric PS. "Usees." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 3295--3298. ACM, 2015. Google ScholarDigital Library
- Beattie, Scott, Carolyn Woodley, and Kay Souter. "Creepy Analytics and Learner Data Rights." Rhetoric and Reality: Critical Perspectives on Educational Technology. Proceedings Ascilite, 2014, 421--425.Google Scholar
- Biddle, Sam. "Troubling Study Says Artificial Intelligence Can Predict Who Will Be Criminals Based on Facial Features." The Intercept (blog), November 18, 2016. https://theintercept.com/2016/11/18/troubling-study-says-artificial-intelligence-can-predict-who-will-be-criminals-based-on-facial-features/.Google Scholar
- Blackwell, Lindsay, Jean Hardy, Tawfiq Ammari, Tiffany Veinot, Cliff Lampe, and Sarita Schoenebeck. "LGBT Parents and Social Media: Advocacy, Privacy, and Disclosure During Shifting Social Movements." In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 610--622. CHI '16. New York, NY, USA: ACM, 2016. Google ScholarDigital Library
- Boing Boing."Chinese Jaywalkers Are Identified and Shamed by Facial Recognition, and Now They'll Get Warnings over Text Message." Boing Boing. Accessed September 17, 2018. https://boingboing.net/2018/03/28/chinese-jaywalkers-are-identif.html.Google Scholar
- Boucher, Andy, David Cameron, and Nadine Jarvis. "Power to the People: Dynamic Energy Management through Communal Cooperation." In Proceedings of the Designing Interactive Systems Conference, 612--620. ACM, 2012. Google ScholarDigital Library
- Blythe, Mark, Jamie Steane, Jenny Roe, and Caroline Oliver. "Solutionism, the Game: Design Fictions for Positive Aging." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 3849--3858. ACM, 2015. Google ScholarDigital Library
- Brunton, Finn, and Helen Nissenbaum. Obfuscation: A User's Guide for Privacy and Protest. Mit Press, 2015. Google ScholarDigital Library
- Brunton, Finn, and Helen Nissenbaum. "Vernacular Resistance to Data Collection and Analysis: A Political Theory of Obfuscation." First Monday 16, no. 5 (2011).Google Scholar
- Chesney, Robert and Danielle Citron. "Deep Fakes: A Looming Crisis for National Security, Democracy and Privacy? - Lawfare." Accessed September 19, 2018. https://www.lawfareblog.com/deep-fakes-looming-crisis-national-security-democracy-and-privacy.Google Scholar
- Cialdini, R.B.; Vincent, J.E.; Lewis, S.K.; Catalan, J.; Wheeler, D.; Darby, B. L. (1975). "Reciprocal concessions procedure for inducing compliance: the door-in-the-face technique". Journal of Personality and Social Psychology. 31: 206--215.Google Scholar
- Cila, Nazli, Iskander Smit, Elisa Giaccardi, and Ben Kröse. "Products As Agents: Metaphors for Designing the Products of the IoT Age." In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 448--459. CHI '17. New York, NY, USA: ACM, 2017. Google ScholarDigital Library
- Citron, Danielle Keats. Hate Crimes in Cyberspace. Harvard University Press, 2014. Google ScholarDigital Library
- Cole, Robert. Google Eric Schmidt - The Creepy Line (Edited). Accessed September 17, 2018. https://www.youtube.com/watch?v=mpmOL-MT5lQ.Google Scholar
- Clifford, Stephanie and Quenin Hardy. "Attention, Shoppers: Store Is Tracking Your Cell - The New York Times." Accessed September 17, 2018. https://www.nytimes.com/2013/07/15/business/attention-shopper-stores-are-tracking-your-cell.htmlGoogle Scholar
- Cumbley, Richard, and Peter Church. "Is 'Big Data' Creepy?" Computer Law & Security Review 29, no. 5 (2013): 601--609.Google ScholarCross Ref
- Diamond, Jared. Collapse: How Societies Choose to Fail or Succeed. Penguin, 2005.Google Scholar
- Das, Sauvik, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2015. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW '15), 1416--1426. Google ScholarDigital Library
- Egelman. Serge, Lorrie Faith Cranor, and Jason Hong. 2008. You've been warned: an empirical study of the effectiveness of web browser phishing warnings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '08), 1065--1074.: Google ScholarDigital Library
- Dourish, Paul and Ken Anderson. 2006. Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena. Human-Computer Interaction 21, 3: 319--342. Google ScholarDigital Library
- Ferguson, Andrew Guthrie. The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement. NYU Press, 2017.Google ScholarCross Ref
- Sarah E. Fox, Rafael M.L. Silva, and Daniela K. Rosner. 2018. Beyond the Prototype: Maintenance, Collective Responsibility, and Public IoT. In Proceedings of the 2018 Designing Interactive Systems Conference (DIS '18). ACM, New York, NY, USA, 21--32. Google ScholarDigital Library
- Freedman, J. L.; Fraser, S. C. (1966). "Compliance without pressure: The foot-in-the-door technique". Journal of Personality and Social Psychology. 4 (2): 195--202.Google Scholar
- Gaver, William. "What Should We Expect from Research through Design?" In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 937--946. ACM, 2012 Google ScholarDigital Library
- Gaver, William. "Making Spaces: How Design Workbooks Work." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1551--1560. CHI '11. New York, NY, USA: ACM, 2011. Google ScholarDigital Library
- Giaccardi, Elisa, Nazli Cila, Chris Speed, and Melissa Caldwell. "Thing Ethnography: Doing Design Research with Non-Humans." In Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 377--387. DIS '16. New York, NY, USA: ACM, 2016. Google ScholarDigital Library
- Goldschmidt, Gabriela, Hagay Hochman, and Itay Dafni. "The Design Studio 'Crit': Teacher--Student Communication." AI EDAM 24, no. 3 (August 2010): 285--302. Google ScholarDigital Library
- Haiyan Jia, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, and John M Carroll. 2015. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing - CSCW '15, 583--599. Google ScholarDigital Library
- Hauser, Sabrina, Doenja Oogjes, Ron Wakkary, and Peter-Paul Verbeek. "An Annotated Portfolio on Doing Postphenomenology Through Research Products." In Proceedings of the 2018 on Designing Interactive Systems Conference 2018, 459--471. ACM, 2018. Google ScholarDigital Library
- Harvey, Adam. "CV Dazzle: Camouflage from Face Detection." Accessed September 17, 2018. https://cvdazzle.com/.Google Scholar
- Healy, John. "The Components of the" Crit" in Art and Design Education." Irish Journal of Academic Practice 5, no. 1 (2016): 7.Google Scholar
- Hu, Tung-Hui. A Prehistory of the Cloud, 2015. Cambridge MA, MIT Press, 2015. Google ScholarDigital Library
- Jenkins, Tom. "Cohousing IoT: Design Prototyping for Community Life." In Proceedings of the Twelfth International Conference on Tangible, Embedded, and Embodied Interaction, 667--673. ACM, 2018. Google ScholarDigital Library
- Jones, Rhett. "Roomba's Next Big Step Is Selling Maps of Your Home to the Highest Bidder." Accessed September 17, 2018. https://gizmodo.com/roombas-next-big-step-is-selling-maps-of-your-home-to-t-1797187829.Google Scholar
- Kopytoff, Verne. "The Real Reason Google Paid $3.2 Billion For Nest." Time. Accessed September 18, 2018. http://business.time.com/2014/01/14/the-real-reason-google-paid-3--2-billion-for-nest/Google Scholar
- Krishnamurthy, Balachander, and Craig E. Wills. "Generating a Privacy Footprint on the Internet." In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 65--70. ACM, 2006. Google ScholarDigital Library
- Lentricchia, Frank, and Andrew DuBois. Close Reading: The Reader. Duke University Press Durham, NC, 2003.Google Scholar
- Liu, Jen, Daragh Byrne, and Laura Devendorf. "Design for Collaborative Survival: An Inquiry into Human-Fungi Relationships." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 40. ACM, 2018. Google ScholarDigital Library
- Lin, Jialiu, Shahriyar Amini, Jason I. Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. "Expectation and Purpose: Understanding Users' Mental Models of Mobile App Privacy through Crowdsourcing." In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 501--510. ACM, 2012. Google ScholarDigital Library
- Lindley, Joseph, Paul Coulton and Rachel Cooper. Why the Internet of Things needs Object Orientated Ontology, The Design Journal, 2017.Google ScholarCross Ref
- Ma, Alexandra. "These Are the Things That Can Get You Punished under China's Creepy "social Credit' System - from Fake News to Jaywalking." Business Insider. Accessed September 17, 2018. https://www.businessinsider.com/china-social-credit-system-things-you-can-do-wrong-and-punishments-2018--4.Google Scholar
- Neurospeculative afro-feminism. "Nsaf." Accessed September 17, 2018. http://www.hyphen-labs.com/nsaf.html.Google Scholar
- Nest.com."Privacy Statement for Nest Products and Services." Nest. Accessed January 6, 2018. https://www.nest.com/legal/privacy-statement-for-nest-products-and-services/Google Scholar
- Nest.com."The Nestie Awards, Year Two | Nest." Accessed December 22, 2017. https://nest.com/blog/2017/03/08/the-nestie-awards-year-two/.Google Scholar
- Nest.com. "Video | Nest." Accessed December 22, 2017. https://nest.com/video/category/security/Google Scholar
- Nest. "Support." Nest. Accessed September 19, 2018. https://www.nest.com/support/article/.Google Scholar
- Nissenbaum, Helen. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, 2009. Google ScholarDigital Library
- NMSBA. "NMSBA - What Is Neuromarketing." Accessed September 17, 2018. http://www.nmsba.com/what-is-neuromarketing.Google Scholar
- Oxford dictionary, "Creepy | Definition of Creepy in US English by Oxford Dictionaries." Oxford Dictionaries | English. Accessed September 17, 2018. https://en.oxforddictionaries.com/definition/us/creepy.Google Scholar
- Pater, Jessica A., Moon K. Kim, Elizabeth D. Mynatt, and Casey Fiesler. "Characterizations of Online Harassment: Comparing Policies across Social Media Platforms." In Proceedings of the 19th International Conference on Supporting Group Work, 369--374. ACM, 2016. Google ScholarDigital Library
- Pierce, James. "On the Presentation and Production of Design Research Artifacts in HCI." In Proceedings of the 2014 Conference on Designing Interactive Systems, 735--744. ACM, 2014. Google ScholarDigital Library
- Pierce, James, and Carl DiSalvo. "Addressing Network Anxieties with Alternative Design Metaphors." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 549. ACM, 2018. Google ScholarDigital Library
- Pierce, James, and Carl DiSalvo. "Dark Clouds, Io&#!+, and {Crystal Ball Emoji}: Projecting Network Anxieties with Alternative Design Metaphors." In Proceedings of the 2017 Conference on Designing Interactive Systems, 1383--1393. ACM, 2017. Google ScholarDigital Library
- Rosner, Daniela K., Miwa Ikemiya, Diana Kim, and Kristin Koch. "Designing with Traces." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1649--1658. ACM, 2013. Google ScholarDigital Library
- Schön, Donald A. "The Architectural Studio as an Exemplar of Education for Reflection-in-Action." Journal of Architectural Education 38, no. 1 (1984): 2--9.Google ScholarCross Ref
- Schüll, Natasha Dow. Addiction by Design: Machine Gambling in Las Vegas. Princeton University Press, 2012. Google ScholarDigital Library
- Sheperd, Mark. "Sentient City Survival Kit." Accessed September 17, 2018. http://survival.sentientcity.net/umbrella.html.Google Scholar
- Shklovski, Irina, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. "Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use." In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, 2347--2356. ACM, 2014. http://dl.acm.org/citation.cfm?id=2557421. Google ScholarDigital Library
- Shove, Elizabeth. "Comfort, Cleanliness and Convenience: The Social Organization of Normality (New Technologies/New Cultures)," 2004.Google Scholar
- Skirpan, Michael Warren, Jacqueline Cameron, and Tom Yeh. "More Than a Show: Using Personalized Immersive Theater to Educate and Engage the Public in Technology Ethics." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 464. ACM, 2018. Google ScholarDigital Library
- Tene, Omer, and Jules Polonetsky. "A Theory of Creepy: Technology, Privacy and Shifting Social Norms." Yale JL & Tech. 16 (2013): 59.Google Scholar
- Vaghefi, Isaac, and Liette Lapointe. "When Too Much Usage Is Too Much: Exploring the Process of It Addiction." In System Sciences (HICSS), 2014 47th Hawaii International Conference On, 4494--4503. IEEE, 2014. Google ScholarDigital Library
- Verbeek, P. P., and Slob, A., 2006, User Behavior and Technology Development: Shaping Sustainable Relations between Consumers and Technologies, vol. 20 of Eco-Efficiency in Industry and Science, Springer, Dordrecht.Google Scholar
- Verbeek, Peter-Paul. "Obstetric Ultrasound and the Technological Mediation of Morality: A Postphenomenological Analysis." Human Studies 31, no. 1 (2008): 11--26.Google ScholarCross Ref
- Wakkary, Ron, Doenja Oogjes, Henry WJ Lin, and Sabrina Hauser. "Philosophers Living with the Tilting Bowl." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 94. ACM, 2018. Google ScholarDigital Library
- Wallace, Jayne, Jon Rogers, Michael Shorter, Pete Thomas, Martin Skelly, and Richard Cook. "The SelfReflector: Design, IoT and the High Street." In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 423. ACM, 2018. Google ScholarDigital Library
- Weizman, Eyal. "Introduction: Forensis." Forensis: The Architecture of Public Truth, 2014, 9--32.Google Scholar
- Wikipedia. "Targeted Advertising." Wikipedia, September 5, 2018. https://en.wikipedia.org/w/index.php?title=Targeted_advertising&oldid=858248415.Google Scholar
- Wisniewski, Pamela, Haiyan Jia, Na Wang, Saijing Zheng, Heng Xu, Mary Beth Rosson, and John M. Carroll. "Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure." In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 4029--4038. ACM, 2015. Google ScholarDigital Library
- Wong, Richmond Y., and Deirdre K. Mulligan. "When a Product Is Still Fictional: Anticipating and Speculating Futures through Concept Videos." In Proceedings of the 2016 ACM Conference on Designing Interactive Systems, 121--133. ACM, 2016. Google ScholarDigital Library
- Wu, Xiaolin, and Xi Zhang. "Automated Inference on Criminality Using Face Images." ArXiv Preprint arXiv:1611.04135, 2016.Google Scholar
- Zimmerman, John, Jodi Forlizzi, and Shelley Evenson. "Research through Design as a Method for Interaction Design Research in HCI." In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 493--502. ACM, 2007. Google ScholarDigital Library
- Zuboff, Shoshana. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. (In Press: January 2019). Public Affairs.Google Scholar
- Zuboff, Shoshana. "Big Other: Surveillance Capitalism and the Prospects of an Information Civilization." Journal of Information Technology 30, no. 1 (2015): 75--89.Google ScholarCross Ref
Index Terms
- Smart Home Security Cameras and Shifting Lines of Creepiness: A Design-Led Inquiry
Recommendations
Smart Home
The smart home service is a key part of the smart grid consumption. It is a real-time interactive response between the power grid and users, and enhances the comprehensive service capability of the power grid, also realizes the intelligent and ...
Smart Home Technologies: A Preliminary Review
ICIT '18: Proceedings of the 6th International Conference on Information Technology: IoT and Smart CityIn recent years, smart homes have become increasingly popular with the deployment of Internet of Things (IoT). Rapid diffusion of sensing technology also enabled advancement in smart homes. The advancements in these technologies surroundings smart homes ...
Enablement of IoT Based Context-Aware Smart Home with Fog Computing
The recent advent of Internet of Things IoT, has given rise to a plethora of smart verticals-smart homes being one of them. Smart Home is a classic example of IoT, wherein smart appliances connected via home gateways constitute a local home network to ...
Comments