Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3025453.3025878acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things

Published: 02 May 2017 Publication History

Abstract

We are surrounded by a proliferation of connected devices performing increasingly complex data transactions. Traditional design methods tend to simplify or conceal this complexity to improve ease of use. However, the hidden nature of data is causing increasing discomfort. This paper presents BitBarista, a coffee machine designed to explore perceptions of data processes in the Internet of Things. BitBarista reveals social, environmental, qualitative and economic aspects of coffee supply chains. It allows people to choose a source of future coffee beans, situating their choices within the pool of decisions previously made. In doing so, it attempts to engage them in the transactions that are required to produce coffee. Initial studies of BitBarista with 42 participants reveal challenges of designing for connected systems, particularly in terms of perceptions of data gathering and sharing, as well as assumptions generated by current models of consumption. A discussion is followed by a series of suggestions for increasing positive attitudes towards data use in interactive systems.

References

[1]
Alessandro Acquisti, Idris Adjerid, and Laura Brandimarte. 2013. Gone in 15 Seconds: The Limits of Privacy Transparency and Control. IEEE Security and Privacy 11, 4 (July 2013), 72--74.
[2]
Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of Privacy: Framing, Disclosures, and the Limits of Transparency. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, Article 9, 11 pages.
[3]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location Has Been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15). ACM, New York, NY, USA, 787--796.
[4]
Naveen Farag Awad and M. S. Krishnan. 2006. The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to Be Profiled Online for Personalization. MIS Q. 30, 1 (March 2006), 13--28. http://dl.acm.org/citation.cfm?id=2017284.2017287
[5]
Tim Baarslag, Alper T. Alan, Richard C. Gomer, Ilaria Liccardi, Helia Marreiros, Enrico H. Gerding, and m.c. schraefel. 2016. Negotiation As an Interaction Mechanism for Deciding App Permissions. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2012--2019.
[6]
Igor Bilogrevic and Martin Ortlieb. 2016. "If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5215--5227. http://doi.acm.org/10.1145/2858036.2858432
[7]
Matthew Chalmers and Areti Galani. 2004. Seamful Interweaving: Heterogeneity in the Theory and Design of Interactive Systems. In Proceedings of the 5th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '04). ACM, New York, NY, USA, 243--252.
[8]
Daphne Chang, Erin L. Krupka, Eytan Adar, and Alessandro Acquisti. 2016. Engineering Information Disclosure: Norm Shaping Designs. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 587--597.
[9]
Ramnath K. Chellappa and Raymond G. Sin. 2005. Personalization Versus Privacy: An Empirical Examination of the Online Consumer's Dilemma. Inf. Technol. and Management 6, 2--3 (April 2005), 181--202.
[10]
Anthony Dunne and Fiona Raby. 2001. Design Noir: The Secret Life of Electronic Objects (1 ed.). Birkhaeuser Basel. http://www.worldcat.org/isbn/3764365668
[11]
Janna Lynn Dupree, Richard Devries, Daniel M. Berry, and Edward Lank. 2016. Privacy Personas: Clustering Users via Attitudes and Behaviors Toward Security Practices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5228--5239.
[12]
Adrienne Porter Felt, Serge Egelman, and David Wagner. 2012. I'Ve Got 99 Problems, but Vibration Ain'T One: A Survey of Smartphone Users' Concerns. In Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '12). ACM, New York, NY, USA, 33--44.
[13]
Andrew Gambino, Jinyoung Kim, S. Shyam Sundar, Jun Ge, and Mary Beth Rosson. 2016. User Disbelief in Privacy Paradox: Heuristics That Determine Disclosure. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2837--2843.
[14]
Liang Gou, Michelle X. Zhou, and Huahai Yang. 2014. KnowMe and ShareMe: Understanding Automatically Discovered Personality Traits from Social Media and User Sharing Preferences. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 955--964. http://doi.acm.org/10.1145/2556288.2557398
[15]
Steven Houben, Connie Golsteijn, Sarah Gallacher, Rose Johnson, Saskia Bakker, Nicolai Marquardt, Licia Capra, and Yvonne Rogers. 2016. Physikit: Data Engagement Through Physical Ambient Visualizations in the Home. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 1608--1619.
[16]
Carlos Jensen and Colin Potts. 2004. Privacy Policies As Decision-making Tools: An Evaluation of Online Privacy Notices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '04). ACM, New York, NY, USA, 471--478.
[17]
Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What Matters to Users?: Factors That Affect Users' Willingness to Share Information with Online Advertisers. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, Article 7, 12 pages.
[18]
M. Lima. 2013. Visual Complexity: Mapping Patterns of Information. Princeton Architectural Press. https://books.google.co.uk/books?id=59xlmQEACAAJ
[19]
Vikram Mehta, Arosha K. Bandara, Blaine A. Price, and Bashar Nuseibeh. 2016. Privacy Itch and Scratch: On Body Privacy Warnings and Controls. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA '16). ACM, New York, NY, USA, 2417--2424. http://doi.acm.org/10.1145/2851581.2892475
[20]
Jakob Nielsen. 1994. Enhancing the Explanatory Power of Usability Heuristics. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '94). ACM, New York, NY, USA, 152--158.
[21]
Donald A. Norman. 1998. The Invisible Computer. MIT Press, Cambridge, MA, USA.
[22]
William Odom, Richard Banks, Abigail Durrant, David Kirk, and James Pierce. 2012. Slow technology: critical reflection and future directions. In Proceedings of the Designing Interactive Systems Conference (DIS '12). ACM, 816--817.
[23]
Chanda Phelan, Cliff Lampe, and Paul Resnick. 2016. It's Creepy, But It Doesn'T Bother Me. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 5240--5251.
[24]
Larissa Pschetz, Michelle Bastian, and Chris Speed. 2016. Temporal Design: Looking at Time as Social Coordination. In Proceedings of the Design Research Society Conference (RTD '16). http://www.drs2016.org/442
[25]
Phoebe Sengers, Kirsten Boehner, Shay David, and Joseph 'Jofish' Kaye. 2005. Reflective design. In Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility (CC '05). ACM, New York, NY, USA, 49--58.
[26]
Irina Shklovski, Scott D. Mainwaring, Halla Hrund Skúladóttir, and Höskuldur Borgthorsson. 2014. Leakiness and Creepiness in App Space: Perceptions of Privacy and Mobile App Use. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2347--2356.
[27]
Carolyn F. Strauss and Alastair Fuad-Luke. 2009. The Slow Design Principles. www.slowlab.net/CtC_SlowDesignPrinciples.pdf. (2009). Online, Last accessed: 19.01.2014.
[28]
Joshua Tan, Khanh Nguyen, Michael Theodorides, Heidi Negrón-Arroyo, Christopher Thompson, Serge Egelman, and David Wagner. 2014. The Effect of Developer-specified Explanations for Permission Requests on Smartphone User Behavior. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 91--100.
[29]
Yang Wang, Pedro Giovanni Leon, Alessandro Acquisti, Lorrie Faith Cranor, Alain Forget, and Norman Sadeh. 2014. A Field Trial of Privacy Nudges for Facebook. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2367--2376.
[30]
Peter Worthy, Ben Matthews, and Stephen Viller. 2016. Trust Me: Doubts and Concerns Living with the Internet of Things. In Proceedings of the 2016 ACM Conference on Designing Interactive Systems (DIS '16). ACM, New York, NY, USA, 427--434.
[31]
Bo Zhang, Mu Wu, Hyunjin Kang, Eun Go, and S. Shyam Sundar. 2014. Effects of Security Warnings and Instant Gratification Cues on Attitudes Toward Mobile Websites. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 111--114.

Cited By

View all
  • (2024)Fear of Missing Out: Constrained Trial of Blockchain in Supply ChainSensors10.3390/s2403098624:3(986)Online publication date: 2-Feb-2024
  • (2023)Exploring Critical Scenarios of Algorithmic Energy Distribution with the Karma Kettle GameCompanion Publication of the 2023 ACM Designing Interactive Systems Conference10.1145/3563703.3596655(266-269)Online publication date: 10-Jul-2023
  • (2023)Blockchain and Beyond: Understanding Blockchains Through Prototypes and Public EngagementACM Transactions on Computer-Human Interaction10.1145/350346229:5(1-73)Online publication date: 6-Jan-2023
  • Show More Cited By

Index Terms

  1. Bitbarista: Exploring Perceptions of Data Transactions in the Internet of Things

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
    May 2017
    7138 pages
    ISBN:9781450346559
    DOI:10.1145/3025453
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. data transactions
    2. design
    3. internet of things
    4. privacy
    5. supply chains

    Qualifiers

    • Research-article

    Funding Sources

    • Research Council UK

    Conference

    CHI '17
    Sponsor:

    Acceptance Rates

    CHI '17 Paper Acceptance Rate 600 of 2,400 submissions, 25%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)60
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 24 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Fear of Missing Out: Constrained Trial of Blockchain in Supply ChainSensors10.3390/s2403098624:3(986)Online publication date: 2-Feb-2024
    • (2023)Exploring Critical Scenarios of Algorithmic Energy Distribution with the Karma Kettle GameCompanion Publication of the 2023 ACM Designing Interactive Systems Conference10.1145/3563703.3596655(266-269)Online publication date: 10-Jul-2023
    • (2023)Blockchain and Beyond: Understanding Blockchains Through Prototypes and Public EngagementACM Transactions on Computer-Human Interaction10.1145/350346229:5(1-73)Online publication date: 6-Jan-2023
    • (2022)Implementation and Evaluation of a Point-Of-Sale Payment System Using Bitcoin LightningNordic Human-Computer Interaction Conference10.1145/3546155.3546700(1-12)Online publication date: 8-Oct-2022
    • (2022)Navigating Imaginaries of DNA-Based Digital Data StorageProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501911(1-15)Online publication date: 29-Apr-2022
    • (2022)Blockchain-Based Traceability System From the Users’ Perspective: A Case Study of Thai Coffee Supply ChainIEEE Access10.1109/ACCESS.2022.320686010(98783-98802)Online publication date: 2022
    • (2021)Problematising Transparency Through LARP And DeliberationProceedings of the 2021 ACM Designing Interactive Systems Conference10.1145/3461778.3462120(1682-1694)Online publication date: 28-Jun-2021
    • (2021)Usability Analysis for Blockchain-Based ApplicationsIntelligent Human Computer Interaction10.1007/978-3-030-98404-5_33(349-360)Online publication date: 20-Dec-2021
    • (2021)IoT Product Pleasurability - Investigating the Pleasurable User Experiences Between Conventional Products and IoT Products Through WatchesInteractivity and Game Creation10.1007/978-3-030-73426-8_24(394-408)Online publication date: 10-Apr-2021
    • (2020)PizzaBlockProceedings of the 2020 ACM Designing Interactive Systems Conference10.1145/3357236.3395568(1593-1606)Online publication date: 3-Jul-2020
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media