skip to main content
10.1145/2908805.2913019acmconferencesArticle/Chapter ViewAbstractPublication PagesdisConference Proceedingsconference-collections
abstract

IoT: Designing for Human Values

Authors Info & Claims
Published:04 June 2016Publication History

ABSTRACT

This one-day, embedded workshop will explore the design intersections of human values and internet of things (IoT) applications. In a day-long session we will configure and build small IoT devices (using the Particle platform), then deploy them to collect, share and publish the data they harvest throughout the conference. During the conference program we will reconvene to debate how a world of connected devices intersects with human values (such as privacy and transparency) and to articulate the specific challenges for designing a value-conscious IoT.

References

  1. Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The Internet of Things: A survey. Computer Networks 54, 15: 2787--2805. http://doi.org/10.1016/j.comnet.2010.05.010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2014. From "smart objects" to "social objects": The next evolutionary step of the internet of things. IEEE Communications Magazine 52, 1: 97--105. http://doi.org/10.1109/MCOM.2014.6710070Google ScholarGoogle ScholarCross RefCross Ref
  3. Debasis Bandyopadhyay and Jaydip Sen. 201 Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications 58, 1: 49--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alessandro Bassi and Geir Horn. 2008. Internet of Things in 2020: A Roadmap for the Future. Brussels.Google ScholarGoogle Scholar
  5. Federal Trade Commission. 2015. Internet of things: Privacy & security in a connected world. Retrieved from http://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdfGoogle ScholarGoogle Scholar
  6. John Halloran, Eva Hornecker, Mark Stringer, Eric Harris, and Geraldine Fitzpatrick. 2009. The value of values: Resourcing co-design of ubiquitous computing. CoDesign 5, 4: 245--273.Google ScholarGoogle ScholarCross RefCross Ref
  7. Sue Halpern. 2014. The Creepy New Wave of the Internet. The New York Review of Books, November 20, 2014 Issue. Retrieved from http://www.nybooks.com/articles/archives/2014/nov/20/creepy-new-wave-internet/Google ScholarGoogle Scholar
  8. Treffyn Lynch Koreshoff, Tuck Wah Leong, and Toni Robertson. 2013. Approaching a Human-centred Internet of Things. Proceedings of the 25th Australian Computer-Human Interaction Conference: Augmentation, Application, Innovation, Collaboration, ACM, 363--366. http://doi.org/10.1145/2541016.2541093 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ewa Luger and Tom Rodden. 2013. Terms of agreement: Rethinking consent for pervasive computing. Interacting with Computers 25, 3: 199--203.Google ScholarGoogle ScholarCross RefCross Ref
  10. Robert P. Minch. 2015. Location Privacy in the Era of the Internet of Things and Big Data Analytics. System Sciences (HICSS), 2015 48th Hawaii International Conference on, IEEE, 1521--1530. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7069994 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Daniele Miorandi, Sabrina Sicari, Francesco De Pellegrini, and Imrich Chlamtac. 2012. Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10, 7: 1497--1516. http://doi.org/10.1016/j.adhoc.2012.02.016 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Toni Robertson and Ina Wagner. 2015. CSCW and the Internet of Things. ECSCW 2015: Proceedings of the 14th European Conference on Computer Supported Cooperative Work, 19-23 September 2015, Oslo, Norway, Springer, 285--294. http://link.springer.com/chapter/10.1007/978--3--319--20499--4_15Google ScholarGoogle Scholar
  13. Rolf H. Weber. 2010. Internet of Things -- New security and privacy challenges. Computer Law & Security Review 26, 1: 23--30. http://doi.org/10.1016/j.clsr.2009.11.008Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. IoT: Designing for Human Values

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        DIS '16 Companion: Proceedings of the 2016 ACM Conference Companion Publication on Designing Interactive Systems
        June 2016
        194 pages
        ISBN:9781450343152
        DOI:10.1145/2908805

        Copyright © 2016 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 June 2016

        Check for updates

        Qualifiers

        • abstract

        Acceptance Rates

        DIS '16 Companion Paper Acceptance Rate107of418submissions,26%Overall Acceptance Rate1,158of4,684submissions,25%

        Upcoming Conference

        DIS '24
        Designing Interactive Systems Conference
        July 1 - 5, 2024
        IT University of Copenhagen , Denmark

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader