ABSTRACT
This one-day, embedded workshop will explore the design intersections of human values and internet of things (IoT) applications. In a day-long session we will configure and build small IoT devices (using the Particle platform), then deploy them to collect, share and publish the data they harvest throughout the conference. During the conference program we will reconvene to debate how a world of connected devices intersects with human values (such as privacy and transparency) and to articulate the specific challenges for designing a value-conscious IoT.
- Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The Internet of Things: A survey. Computer Networks 54, 15: 2787--2805. http://doi.org/10.1016/j.comnet.2010.05.010 Google ScholarDigital Library
- Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2014. From "smart objects" to "social objects": The next evolutionary step of the internet of things. IEEE Communications Magazine 52, 1: 97--105. http://doi.org/10.1109/MCOM.2014.6710070Google ScholarCross Ref
- Debasis Bandyopadhyay and Jaydip Sen. 201 Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications 58, 1: 49--69. Google ScholarDigital Library
- Alessandro Bassi and Geir Horn. 2008. Internet of Things in 2020: A Roadmap for the Future. Brussels.Google Scholar
- Federal Trade Commission. 2015. Internet of things: Privacy & security in a connected world. Retrieved from http://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdfGoogle Scholar
- John Halloran, Eva Hornecker, Mark Stringer, Eric Harris, and Geraldine Fitzpatrick. 2009. The value of values: Resourcing co-design of ubiquitous computing. CoDesign 5, 4: 245--273.Google ScholarCross Ref
- Sue Halpern. 2014. The Creepy New Wave of the Internet. The New York Review of Books, November 20, 2014 Issue. Retrieved from http://www.nybooks.com/articles/archives/2014/nov/20/creepy-new-wave-internet/Google Scholar
- Treffyn Lynch Koreshoff, Tuck Wah Leong, and Toni Robertson. 2013. Approaching a Human-centred Internet of Things. Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, ACM, 363--366. http://doi.org/10.1145/2541016.2541093 Google ScholarDigital Library
- Ewa Luger and Tom Rodden. 2013. Terms of agreement: Rethinking consent for pervasive computing. Interacting with Computers 25, 3: 199--203.Google ScholarCross Ref
- Robert P. Minch. 2015. Location Privacy in the Era of the Internet of Things and Big Data Analytics. System Sciences (HICSS), 2015 48th Hawaii International Conference on, IEEE, 1521--1530. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7069994 Google ScholarDigital Library
- Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10, 7: 1497--1516. http://doi.org/10.1016/j.adhoc.2012.02.016 Google ScholarDigital Library
- Toni Robertson and Ina Wagner. 2015. CSCW and the Internet of Things. ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 19-23 September 2015, Oslo, Norway, Springer, 285--294. http://link.springer.com/chapter/10.1007/978--3--319--20499--4_15Google Scholar
- Rolf H. Weber. 2010. Internet of Things -- New security and privacy challenges. Computer Law & Security Review 26, 1: 23--30. http://doi.org/10.1016/j.clsr.2009.11.008Google ScholarCross Ref
Index Terms
- IoT: Designing for Human Values
Recommendations
Exploring the internet of things: an interdisciplinary workshop approach
BCS-HCI '13: Proceedings of the 27th International BCS Human Computer Interaction ConferenceThis paper gives an account of our experience running a workshop series exploring the 'Internet of Things' which was designed to focus on the idea the Internet of Things may develop from interdisciplinary collaboration and hacking/tinkering/making as ...
CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityThe fifth Workshop on CPS & IoT Security and Privacy is set to take place in Copenhagen, Denmark, on November 26, 2023, in conjunction with the ACM Conference on Computer and Communications Security (CCS'23). This workshop marks the amalgamation of two ...
CPSIoTSec '22: 4th Workshop on CPS & IoT Security and Privacy
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityThere is a rapidly growing interest in the security of cyber-physical systems (CPS) and internet-of-things (IoT) in industry, government and academia. This interest is also reflected in this workshop that from 2019 has been part of the ACM Conference on ...
Comments