skip to main content
10.1145/3025453.3025878acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things

Authors Info & Claims
Published:02 May 2017Publication History

ABSTRACT

We are surrounded by a proliferation of connected devices performing increasingly complex data transactions. Traditional design methods tend to simplify or conceal this complexity to improve ease of use. However, the hidden nature of data is causing increasing discomfort. This paper presents BitBarista, a coffee machine designed to explore perceptions of data processes in the Internet of Things. BitBarista reveals social, environmental, qualitative and economic aspects of coffee supply chains. It allows people to choose a source of future coffee beans, situating their choices within the pool of decisions previously made. In doing so, it attempts to engage them in the transactions that are required to produce coffee. Initial studies of BitBarista with 42 participants reveal challenges of designing for connected systems, particularly in terms of perceptions of data gathering and sharing, as well as assumptions generated by current models of consumption. A discussion is followed by a series of suggestions for increasing positive attitudes towards data use in interactive systems.

References

  1. Alessandro Acquisti, Idris Adjerid, and Laura Brandimarte. 2013. Gone in 15 Seconds: The Limits of Privacy Transparency and Control. IEEE Security and Privacy 11, 4 (July 2013), 72--74. DOI: http://dx.doi.org/10.1109/MSP.2013.86 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, Article 9, 11 pages. DOI: http://dx.doi.org/10.1145/2501604.2501613 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 787--796. DOI: http://dx.doi.org/10.1145/2702123.2702210 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Naveen Farag Awad and M. S. Krishnan. 2006. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Q. 30, 1 (March 2006), 13--28. http://dl.acm.org/citation.cfm?id=2017284.2017287Google ScholarGoogle ScholarCross RefCross Ref
  5. Tim Baarslag, Alper T. Alan, Richard C. Gomer, Ilaria Liccardi, Helia Marreiros, Enrico H. Gerding, and m.c. schraefel. 2016. Negotiation As an Interaction Mechanism for Deciding App Permissions. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2012--2019. DOI: http://dx.doi.org/10.1145/2851581.2892340 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Igor Bilogrevic and Martin Ortlieb. 2016. "If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5215--5227. http://doi.acm.org/10.1145/2858036.2858432 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Matthew Chalmers and Areti Galani. 2004. Seamful Interweaving: Heterogeneity in the Theory and Design of Interactive Systems. In Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '04). ACM, New York, NY, USA, 243--252. DOI: http://dx.doi.org/10.1145/1013115.1013149 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Daphne Chang, Erin L. Krupka, Eytan Adar, and Alessandro Acquisti. 2016. Engineering Information Disclosure: Norm Shaping Designs. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 587--597. DOI:http://dx.doi.org/10.1145/2858036.2858346 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ramnath K. Chellappa and Raymond G. Sin. 2005. Personalization Versus Privacy: An Empirical Examination of the Online Consumer's Dilemma. Inf. Technol. and Management 6, 2--3 (April 2005), 181--202. DOI:http://dx.doi.org/10.1007/s10799-005--5879-yGoogle ScholarGoogle ScholarCross RefCross Ref
  10. Anthony Dunne and Fiona Raby. 2001. Design Noir: The Secret Life of Electronic Objects (1 ed.). Birkhaeuser Basel. http://www.worldcat.org/isbn/3764365668Google ScholarGoogle ScholarCross RefCross Ref
  11. Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy Personas: Clustering Users via Attitudes and Behaviors Toward Security Practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5228--5239. DOI: http://dx.doi.org/10.1145/2858036.2858214 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I'Ve Got 99 Problems, but Vibration Ain'T One: A Survey of Smartphone Users' Concerns. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12). ACM, New York, NY, USA, 33--44. DOI: http://dx.doi.org/10.1145/2381934.2381943 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Andrew Gambino, Jinyoung Kim, S. Shyam Sundar, Jun Ge, and Mary Beth Rosson. 2016. User Disbelief in Privacy Paradox: Heuristics That Determine Disclosure. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2837--2843. DOI: http://dx.doi.org/10.1145/2851581.2892413 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Liang Gou, Michelle X. Zhou, and Huahai Yang. 2014. KnowMe and ShareMe: Understanding Automatically Discovered Personality Traits from Social Media and User Sharing Preferences. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 955--964. http://doi.acm.org/10.1145/2556288.2557398 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Steven Houben, Connie Golsteijn, Sarah Gallacher, Rose Johnson, Saskia Bakker, Nicolai Marquardt, Licia Capra, and Yvonne Rogers. 2016. Physikit: Data Engagement Through Physical Ambient Visualizations in the Home. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 1608--1619. DOI: http://dx.doi.org/10.1145/2858036.2858059 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Carlos Jensen and Colin Potts. 2004. Privacy Policies As Decision-making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '04). ACM, New York, NY, USA, 471--478. DOI: http://dx.doi.org/10.1145/985692.985752 Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What Matters to Users?: Factors That Affect Users' Willingness to Share Information with Online Advertisers. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, Article 7, 12 pages. DOI: http://dx.doi.org/10.1145/2501604.2501611 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Lima. 2013. Visual Complexity: Mapping Patterns of Information. Princeton Architectural Press. https://books.google.co.uk/books?id=59xlmQEACAAJGoogle ScholarGoogle Scholar
  19. Vikram Mehta, Arosha K. Bandara, Blaine A. Price, and Bashar Nuseibeh. 2016. Privacy Itch and Scratch: On Body Privacy Warnings and Controls. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2417--2424. http://doi.acm.org/10.1145/2851581.2892475 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Jakob Nielsen. 1994. Enhancing the Explanatory Power of Usability Heuristics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '94). ACM, New York, NY, USA, 152--158. DOI: http://dx.doi.org/10.1145/191666.191729 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Donald A. Norman. 1998. The Invisible Computer. MIT Press, Cambridge, MA, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. William Odom, Richard Banks, Abigail Durrant, David Kirk, and James Pierce. 2012. Slow technology: critical reflection and future directions. In Proceedings of the Designing Interactive Systems Conference (DIS '12). ACM, 816--817. DOI: http://dx.doi.org/10.1145/2317956.2318088 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Chanda Phelan, Cliff Lampe, and Paul Resnick. 2016. It's Creepy, But It Doesn'T Bother Me. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5240--5251. DOI: http://dx.doi.org/10.1145/2858036.2858381 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Larissa Pschetz, Michelle Bastian, and Chris Speed. 2016. Temporal Design: Looking at Time as Social Coordination. In Proceedings of the Design Research Society Conference (RTD '16). http://www.drs2016.org/442Google ScholarGoogle ScholarCross RefCross Ref
  25. Phoebe Sengers, Kirsten Boehner, Shay David, and Joseph 'Jofish' Kaye. 2005. Reflective design. In Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility (CC '05). ACM, New York, NY, USA, 49--58. DOI: http://dx.doi.org/10.1145/1094562.1094569 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2347--2356. DOI: http://dx.doi.org/10.1145/2556288.2557421 Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Carolyn F. Strauss and Alastair Fuad-Luke. 2009. The Slow Design Principles. www.slowlab.net/CtC_SlowDesignPrinciples.pdf. (2009). Online, Last accessed: 19.01.2014.Google ScholarGoogle Scholar
  28. Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, and David Wagner. 2014. The Effect of Developer-specified Explanations for Permission Requests on Smartphone User Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 91--100. DOI: http://dx.doi.org/10.1145/2556288.2557400 Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, and Norman Sadeh. 2014. A Field Trial of Privacy Nudges for Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2367--2376. DOI: http://dx.doi.org/10.1145/2556288.2557413 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS '16). ACM, New York, NY, USA, 427--434. DOI: http://dx.doi.org/10.1145/2901790.2901890 Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Bo Zhang, Mu Wu, Hyunjin Kang, Eun Go, and S. Shyam Sundar. 2014. Effects of Security Warnings and Instant Gratification Cues on Attitudes Toward Mobile Websites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 111--114. DOI: http://dx.doi.org/10.1145/2556288.2557347 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
      May 2017
      7138 pages
      ISBN:9781450346559
      DOI:10.1145/3025453

      Copyright © 2017 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 2 May 2017

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '17 Paper Acceptance Rate600of2,400submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader