ABSTRACT
We are surrounded by a proliferation of connected devices performing increasingly complex data transactions. Traditional design methods tend to simplify or conceal this complexity to improve ease of use. However, the hidden nature of data is causing increasing discomfort. This paper presents BitBarista, a coffee machine designed to explore perceptions of data processes in the Internet of Things. BitBarista reveals social, environmental, qualitative and economic aspects of coffee supply chains. It allows people to choose a source of future coffee beans, situating their choices within the pool of decisions previously made. In doing so, it attempts to engage them in the transactions that are required to produce coffee. Initial studies of BitBarista with 42 participants reveal challenges of designing for connected systems, particularly in terms of perceptions of data gathering and sharing, as well as assumptions generated by current models of consumption. A discussion is followed by a series of suggestions for increasing positive attitudes towards data use in interactive systems.
- Alessandro Acquisti, Idris Adjerid, and Laura Brandimarte. 2013. Gone in 15 Seconds: The Limits of Privacy Transparency and Control. IEEE Security and Privacy 11, 4 (July 2013), 72--74. DOI: http://dx.doi.org/10.1109/MSP.2013.86 Google ScholarDigital Library
- Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, Article 9, 11 pages. DOI: http://dx.doi.org/10.1145/2501604.2501613 Google ScholarDigital Library
- Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 787--796. DOI: http://dx.doi.org/10.1145/2702123.2702210 Google ScholarDigital Library
- Naveen Farag Awad and M. S. Krishnan. 2006. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Q. 30, 1 (March 2006), 13--28. http://dl.acm.org/citation.cfm?id=2017284.2017287Google ScholarCross Ref
- Tim Baarslag, Alper T. Alan, Richard C. Gomer, Ilaria Liccardi, Helia Marreiros, Enrico H. Gerding, and m.c. schraefel. 2016. Negotiation As an Interaction Mechanism for Deciding App Permissions. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2012--2019. DOI: http://dx.doi.org/10.1145/2851581.2892340 Google ScholarDigital Library
- Igor Bilogrevic and Martin Ortlieb. 2016. "If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5215--5227. http://doi.acm.org/10.1145/2858036.2858432 Google ScholarDigital Library
- Matthew Chalmers and Areti Galani. 2004. Seamful Interweaving: Heterogeneity in the Theory and Design of Interactive Systems. In Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '04). ACM, New York, NY, USA, 243--252. DOI: http://dx.doi.org/10.1145/1013115.1013149 Google ScholarDigital Library
- Daphne Chang, Erin L. Krupka, Eytan Adar, and Alessandro Acquisti. 2016. Engineering Information Disclosure: Norm Shaping Designs. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 587--597. DOI:http://dx.doi.org/10.1145/2858036.2858346 Google ScholarDigital Library
- Ramnath K. Chellappa and Raymond G. Sin. 2005. Personalization Versus Privacy: An Empirical Examination of the Online Consumer's Dilemma. Inf. Technol. and Management 6, 2--3 (April 2005), 181--202. DOI:http://dx.doi.org/10.1007/s10799-005--5879-yGoogle ScholarCross Ref
- Anthony Dunne and Fiona Raby. 2001. Design Noir: The Secret Life of Electronic Objects (1 ed.). Birkhaeuser Basel. http://www.worldcat.org/isbn/3764365668Google ScholarCross Ref
- Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy Personas: Clustering Users via Attitudes and Behaviors Toward Security Practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5228--5239. DOI: http://dx.doi.org/10.1145/2858036.2858214 Google ScholarDigital Library
- Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I'Ve Got 99 Problems, but Vibration Ain'T One: A Survey of Smartphone Users' Concerns. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12). ACM, New York, NY, USA, 33--44. DOI: http://dx.doi.org/10.1145/2381934.2381943 Google ScholarDigital Library
- Andrew Gambino, Jinyoung Kim, S. Shyam Sundar, Jun Ge, and Mary Beth Rosson. 2016. User Disbelief in Privacy Paradox: Heuristics That Determine Disclosure. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2837--2843. DOI: http://dx.doi.org/10.1145/2851581.2892413 Google ScholarDigital Library
- Liang Gou, Michelle X. Zhou, and Huahai Yang. 2014. KnowMe and ShareMe: Understanding Automatically Discovered Personality Traits from Social Media and User Sharing Preferences. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 955--964. http://doi.acm.org/10.1145/2556288.2557398 Google ScholarDigital Library
- Steven Houben, Connie Golsteijn, Sarah Gallacher, Rose Johnson, Saskia Bakker, Nicolai Marquardt, Licia Capra, and Yvonne Rogers. 2016. Physikit: Data Engagement Through Physical Ambient Visualizations in the Home. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 1608--1619. DOI: http://dx.doi.org/10.1145/2858036.2858059 Google ScholarDigital Library
- Carlos Jensen and Colin Potts. 2004. Privacy Policies As Decision-making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '04). ACM, New York, NY, USA, 471--478. DOI: http://dx.doi.org/10.1145/985692.985752 Google ScholarDigital Library
- Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What Matters to Users?: Factors That Affect Users' Willingness to Share Information with Online Advertisers. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, Article 7, 12 pages. DOI: http://dx.doi.org/10.1145/2501604.2501611 Google ScholarDigital Library
- M. Lima. 2013. Visual Complexity: Mapping Patterns of Information. Princeton Architectural Press. https://books.google.co.uk/books?id=59xlmQEACAAJGoogle Scholar
- Vikram Mehta, Arosha K. Bandara, Blaine A. Price, and Bashar Nuseibeh. 2016. Privacy Itch and Scratch: On Body Privacy Warnings and Controls. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2417--2424. http://doi.acm.org/10.1145/2851581.2892475 Google ScholarDigital Library
- Jakob Nielsen. 1994. Enhancing the Explanatory Power of Usability Heuristics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '94). ACM, New York, NY, USA, 152--158. DOI: http://dx.doi.org/10.1145/191666.191729 Google ScholarDigital Library
- Donald A. Norman. 1998. The Invisible Computer. MIT Press, Cambridge, MA, USA.Google ScholarDigital Library
- William Odom, Richard Banks, Abigail Durrant, David Kirk, and James Pierce. 2012. Slow technology: critical reflection and future directions. In Proceedings of the Designing Interactive Systems Conference (DIS '12). ACM, 816--817. DOI: http://dx.doi.org/10.1145/2317956.2318088 Google ScholarDigital Library
- Chanda Phelan, Cliff Lampe, and Paul Resnick. 2016. It's Creepy, But It Doesn'T Bother Me. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5240--5251. DOI: http://dx.doi.org/10.1145/2858036.2858381 Google ScholarDigital Library
- Larissa Pschetz, Michelle Bastian, and Chris Speed. 2016. Temporal Design: Looking at Time as Social Coordination. In Proceedings of the Design Research Society Conference (RTD '16). http://www.drs2016.org/442Google ScholarCross Ref
- Phoebe Sengers, Kirsten Boehner, Shay David, and Joseph 'Jofish' Kaye. 2005. Reflective design. In Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility (CC '05). ACM, New York, NY, USA, 49--58. DOI: http://dx.doi.org/10.1145/1094562.1094569 Google ScholarDigital Library
- Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2347--2356. DOI: http://dx.doi.org/10.1145/2556288.2557421 Google ScholarDigital Library
- Carolyn F. Strauss and Alastair Fuad-Luke. 2009. The Slow Design Principles. www.slowlab.net/CtC_SlowDesignPrinciples.pdf. (2009). Online, Last accessed: 19.01.2014.Google Scholar
- Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, and David Wagner. 2014. The Effect of Developer-specified Explanations for Permission Requests on Smartphone User Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 91--100. DOI: http://dx.doi.org/10.1145/2556288.2557400 Google ScholarDigital Library
- Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, and Norman Sadeh. 2014. A Field Trial of Privacy Nudges for Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2367--2376. DOI: http://dx.doi.org/10.1145/2556288.2557413 Google ScholarDigital Library
- Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS '16). ACM, New York, NY, USA, 427--434. DOI: http://dx.doi.org/10.1145/2901790.2901890 Google ScholarDigital Library
- Bo Zhang, Mu Wu, Hyunjin Kang, Eun Go, and S. Shyam Sundar. 2014. Effects of Security Warnings and Instant Gratification Cues on Attitudes Toward Mobile Websites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 111--114. DOI: http://dx.doi.org/10.1145/2556288.2557347 Google ScholarDigital Library
Index Terms
- Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things
Recommendations
IoT: Imminent ownership Threat
IDEAS '17: Proceedings of the 21st International Database Engineering & Applications SymposiumInternet of things (IoT) is the current trend to connect all types of devices to the internet with the purpose of making remote control of these devices possible from anywhere. This allows for convenience, efficiency and the benefit of collecting data ...
A survey on privacy and security of Internet of Things
AbstractInternet of Things (IoT) has fundamentally changed the way information technology and communication environments work, with significant advantages derived from wireless sensors and nanotechnology, among others. While IoT is still a ...
Towards designing open and secure IoT systems: insights for practitioners
IOT '18: Proceedings of the 8th International Conference on the Internet of ThingsFast growth in a number of connected devices, heterogeneity, constrained resources, privacy, software upgrades and operational environment create important security related challenges in Internet of Things (IoT) domain. In this research, a literature ...
Comments