Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3025453.3025740acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Public Access

Post-userism

Published: 02 May 2017 Publication History

Abstract

HCI is focused on improving the interactions we have with technology and innovating new types of interactions, as well as expanding the types of people for whom those interactions are designed. Central to these efforts is the simultaneously empowering and contested construct of the "user." This paper examines what the construct of the user highlights, as well as what it conceals. We introduce post-userism, a perspective that simultaneously acknowledges the limits of, and proposes alternatives to, the central construct of the user as proxy for the "human" in HCI. Drawing on developments across the historical trajectory of HCI, we articulate how the user is enacted across four different levels of representation-systems, interface, design process, and the ideology and identify situations where the user breaks down. Synthesizing prior work, we offer a series of strategies for grappling with such situations. In doing so, we seek to overcome the limitations imposed by the user and develop a language that will aid in evolving the foundations of HCI by asking what, exactly, we place at the center of our scholarship and design.

References

[1]
Mike Ananny. 201 The Curious Connection between Apps for Gay Men and Sex Offenders. The Atlantic.
[2]
Judd Antin and Coye Cheshire. 2010. Readers are not free-riders: reading as a form of participation on wikipedia. In Proc CSCW, 127--130.
[3]
Arnold Baca, Peter Dabnichki, Mario Heller, and Philipp Kornfeind. 2009. Ubiquitous computing in sports: A review and analysis. Journal of Sports Sciences 27, 12: 1335--1346.
[4]
L.J. Bannon. 1991. From Human Factors to Human Actors. In Design at Work, J. Greenbaum and M. Kyng (eds.). Lawrence Earlbaum Associates, Inc., Mahwah, NJ, 25--4
[5]
Jeffrey Bardzell and Shaowen Bardzell. 201 The User Reconfigured: On Subjectivities of Information. In Proc 5th Decennial Aarhus Conference: Critical Alternatives, 133--144.
[6]
Shaowen Bardzell. 2010. Feminist HCI: Taking Stock and Outlining an Agenda for Design. In Proc CHI, 1301--1310.
[7]
Solon Barocas and Andrew D. Selbst. 2016. Big Data's Disparate Impact. California Law Review 104: 671--732.
[8]
Eric P. S. Baumer. 2015. Usees. In Proc CHI, 3295--329
[9]
Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, and Paul Dourish. 2015. On the Importance and Implications of Studying Technology Non-use. interactions 22, 2: 52--56.
[10]
Alas Bisbort. 1999. Escaping Flatland. Retrieved January 1, 2017 from https://www.edwardtufte.com/tufte/advocate_1099
[11]
Susanne Bødker. 2006. When second wave HCI meets third wave challenges. In Proc. NordiCHI, 1--8.
[12]
Kirsten Boehner, Phoebe Sengers, and Simeon Warner. 2008. Interfaces with the ineffable. ACM Transactions on Computer-Human Interaction 15, 3: 1--29.
[13]
R. Borovoy, F. Martin, S. Vemuri, M. Resnick, B. Silverman, and C. Hancock. 1998. Meme tags and community mirrors: moving from conferences to collaboration. . ACM Press, 159--168. Retrieved from
[14]
Barry Brown and Louise Barkhuus. 2007. Leisure and CSCW: Introduction to Special Edition. Computer Supported Cooperative Work 16, 1--2: 1--10.
[15]
Barry Brown and Oskar Juhlin. 20 Enjoying Machines. MIT Press, Cambridge, MA.
[16]
Jed Brubaker, Gillian Hayes, and Paul Dourish. 2013. Beyond the Grave: Facebook as a site for the expansion of death and mourning. The Information Society 29, 3: 152--163.
[17]
Jed R. Brubaker, Lynn S. Dombrowski, Anita M. Gilbert, Nafiri Kusumakaulika, and Gillian R. Hayes. 2014. Stewarding a Legacy: Responsibilities and Relationships in the Management of Post-mortem Data. In Proc CHI, 4157--4166.
[18]
Jed R Brubaker and Vanessa Callison-Burch. 2016. Legacy Contact: Designing and Implementing Post-mortem Stewardship at Facebook. In Proc CHI, 2908--2919.
[19]
Jed R Brubaker and Gillian R Hayes. 2011. SELECT * FROM USER: Infrastructure and Socio-technical Representation. In Proc CSCW, 369--378.
[20]
Hrönn Brynjarsdóttir, Maria Håkansson, James Pierce, Eric P. S. Baumer, Carl DiSalvo, and Phoebe Sengers. 2012. Sustainably Unpersuaded: How Persuasion Narrows our Vision of Sustainability. In Proc CHI, 947--956.
[21]
Jenna Burrell. 2012. Invisible Users: Youth in the Internet Cafes of Urban Ghana. MIT Press, Cambridge, MA.
[22]
Judith Butler. 1990. Gender Trouble: Feminism and the Subversion of Identity. Routledge, Oxon.
[23]
Judith Butler. 1993. Bodies that Matter: On the Discursive Limits of Sex. Routledge, Oxon.
[24]
S.K. Card, T.P. Moran, and A. Newell. 1980. The keystroke-level model for user performance time with interactive systems. Communications of the ACM 23: 396--410.
[25]
S.K. Card, T.P. Moran, and A. Newell. 1983. The Psychology of Human-Computer Interaction. Lawrence Erlbaum Associates, Hillsdale, NJ.
[26]
Ed H. Chi, Gaetano Borriello, Guerney Hunt, and Nigel Davies. 2005. Pervasive computing in sports technologies. IEEE Pervasive Computing 4, 3: 22--25.
[27]
Geoff Cooper and John Bowers. 1995. Representing the User: Notes on the Disciplinary Rhetoric of HCI. In The social and interactional dimensions of human-computer interfaces, Peter J. Thomas (ed.). Cambridge University Press, Cambridge, 48--66.
[28]
Richard Coyne and Adrian Snodgrass. 1995. Problem Setting within Prevalent Metaphors of Design. Design Issues 11, 2: 31--61.
[29]
Kate Crawford. 2009. Following you: Disciplines of listening in social media. Continuum 23, 4: 525--535.
[30]
Gilles Deleuze and Félix Guattari. 1987. A Thousand Plateaus: Capitalism and Schizophrenia. University of Minnesota Press, Minneapolis.
[31]
John Dewey. 1934. Art as Experience. Perigee Books, New York.
[32]
P. Dourish, R. Grinter, J. Delgado de la Flor, and M. Joseph. 2004. Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Personal and Ubiquitous Computing 8, 6: 391--401.
[33]
Tony Dunne and Fiona Raby. 2001. Design Noir: The Secret Life of Electronic Objects. Birkhäuser, Berlin.
[34]
Deni Elliott. 2011. The Real Name Requirement and Ethics of Online Identity. In Social Media and the Value of Truth, Berrin Beasley and Mitchell R. Haney (eds.). Lexington Books, Lanham, MD, 17--26.
[35]
Paul M. Fitts. 1954. The information capacity of the human motor system in controlling the amplitude of movement. Journal of Experimental Psychology 47, 6: 381--391.
[36]
M. Foucault. 1966. The Order of Things. Routledge, New York.
[37]
Michel Foucault. 1977. Discipline and Punish: The Birth of the Prison. Random House, New York.
[38]
R. Stuart Geiger. 2011. The Lives of Bots. In Wikipedia: A Critical Point of View, Geert Lovink and N. Tkacz (eds.). Institute of Network Cultures, Amsterdam, 78--93.
[39]
R. Stuart Geiger. 2014. Bots, bespoke, code and the materiality of software platforms. Information, Communication & Society 17, 3: 342--356.
[40]
R. Stuart Geiger and David Ribes. 2010. The work of sustaining order in wikipedia: the banning of a vandal. In Proc CSCW, 117--126.
[41]
J. Grudin. 1988. Why Groupware Applications Fail: Problems in the Design of Organizational Interfaces. In Proc CSCW, 85--93.
[42]
J. Grudin. 1990. The Computer Reaches Out: the Historical Continuity of Interface Design. In Proc CHI, 261--268.
[43]
J. Grudin and L. Palen. 1995. Why Groupware Applications Succeed: Discretion or Mandate: In Proc ECSCW, 263--278.
[44]
Oliver L Haimson, Jed R Brubaker, Lynn Dombrowski, and Gillian R Hayes. 2015. Disclosure, Stress, and Support During Gender Transition on Facebook. In Proc CSCW, 1176--1190.
[45]
Oliver L Haimson, Jed R Brubaker, Lynn Dombrowski, and Gillian R Hayes. 2016. Digital Footprints and Changing Networks During Online Identity Transitions. In Proc CHI, 2895--2907.
[46]
Maria Håkansson and Phoebe Sengers. 2013. Beyond Being Green?: Simple Living Families and ICT. In Proc CHI, 2725--2734.
[47]
Donna J. Haraway. 1991. A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century. In Simians, Cyborgs, and Women: The Reinvention of Nature. Routledge, New York.
[48]
Steve Harrison, Phoebe Sengers, and Deborah Tatar. 2011. Making epistemological trouble: Third-paradigm HCI as successor science. Interacting with Computers 23, 5: 385--392.
[49]
Jessi Hempel. 2015. Facebook Launches M, Its Bold Answer to Siri and Cortana. Wired. Retrieved January 1, 2017 from https://www.wired.com/2015/08/facebook-launches-m-new-kind-virtual-assistant/
[50]
Thomas T. Hewett, Ronald Baecker, Stu Card, Jane M. Carey, Jean B. Gasen, Marilyn Mantei, Gary Perlman, Gary Strong, and William Verplank. 1992. ACM SIGCHI Curricula for Human-Computer Interaction.
[51]
E. Hutchins. 1995. Cognition in the Wild. MIT Press, Cambridge, MA.
[52]
Lilly Irani, Janet Vertesi, Paul Dourish, Kavita Philip, and R.E. Grinter. 2010. Postcolonial computing: a lens on design and development. In Proc CHI, 1311--1320. Retrieved May 16, 2011 from http://portal.acm.org/citation.cfm?id=1753522
[53]
ISO/IEC. 2001. 9126--1:2001 Software engineering -- Product quality -- Part 1: Quality model.
[54]
ISO/IEC. 2007. 15939:2007 Systems and software engineering -- Measurement process.
[55]
Steven J Jackson and Laewoo Kang. 2014. Breakdown, Obsolescence and Reuse: HCI and the Art of Repair. In Proc CHI, 449--458.
[56]
Steven J Jackson, Alex Pompe, and Gabriel Krieshok. 2012. Repair Worlds: Maintenance, Repair, and ICT for Development in Rural Namibia. In Proc CSCW.
[57]
Fredric Jameson. 1985. Postmodernism and Consumer Society. In Postmodern Culture, Hal Foster (ed.). Pluto Press, London, 111--125.
[58]
Heekyoung Jung and Kay Connelly. 2007. Exploring design concepts for sharing experiences through digital photography. In Proc Designing Pleasurable Products and Interfaces (DPPI), 313--327.
[59]
Joseph 'Jofish' Kaye. 2011. Self-reported Password Sharing Strategies. In Proc CHI, 2619--2622.
[60]
Cliff Lampe, Nicole B Ellison, and Charles Steinfield. 2008. Changes in Use and Perception of Facebook. In Proc CSCW, 721--730.
[61]
Cliff Lampe, Nicole Ellison, and Charles Steinfield. 2006. A Face(book) in the Crowd: Social Searching vs. Social Browsing. In Proc CSCW, 167--170.
[62]
B. Latour. 1992. Where are the Missing Masses? The Sociology of a Few Mundane Artifacts. In Shaping Technology / Building Society: Studies in Sociotechnical Change, Wiebe E. Bijker and John Law (eds.). MIT Press, Cambridge, MA, 225--258.
[63]
Bruno Latour. 1993. Ethnography of a High Tech Case: About Aramis. In Technological Choices: Transformation in Material Cultures Since the Neolithic, Pierre Lemonnier (ed.). Routledge, London, 372--398.
[64]
Bruno Latour. 2005. Reassembling the Social. Oxford University Press, Oxford.
[65]
Alex Leavitt. 2015. "This is a Throwaway Account": Temporary Technical Identities and Perceptions of Anonymity in a Massive Online Community. In Proc CSCW, 317--327.
[66]
Maggie MacAulay and Marcos Daniel Moldes. 2016. Queen don't compute: Reading and casting shade on Facebook's real names policy. Critical Studies in Media Communication 33, 1: 6--22.
[67]
J.F. McCarthy, D.W. McDonald, S. Soroczak, D.H. Nguyen, and A.M. Rashid. 2004. Augmenting the Social Space of an Academic Conference. In Proc CSCW, 39--48.
[68]
Frank Noz and Jinsoo An. 2011. Cat cat revolution: An interspecies gaming experience. In Proc CHI, 2661--2664.
[69]
W.J. Orlikowski. 1992. Learning from Notes: Organizational Issues in Groupware Implementation. In Proc CSCW, 362--3
[70]
Mikko Paldanius, Tuula Kärkkäinen, Kaisa Väänänen-Vainio-Mattila, Oskar Juhlin, and Jonna Häkkilä. 2011. Communication technology for human-dog interaction. In Proc CHI, 2641.
[71]
Tapan S. Parikh and Edward D. Lazowska. 2006. Designing an architecture for delivering mobile information services to the rural developing world. In Proc WWW, 791--800.
[72]
Anne Marie Piper, Raymundo Cornejo, Lisa Hurwitz, and Caitlin Unumb. 2016. Technological Caregiving: Supporting Online Activity for Adults with Cognitive Impairments. In Proc CHI, 5311--5323.
[73]
Laura Portwood-Stacer. 2013. Media Refusal and Conspicuous Non-Consumption: The Performative and Political Dimensions of Facebook Abstention. New Media & Society 15, 7: 1041--1057.
[74]
George Ritzer. 1993. The McDonaldization of American society: An investigation into the changing character of contemporary social life. Pine Forge Press, Newbury Park, CA.
[75]
Nithya Sambasivan, Ed Cutrell, Kentaro Toyama, and Bonnie Nardi. 2010. Intermediated Technology Use in Developing Communities. In Proc CHI, 2583--2592.
[76]
Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. In Proc OZCHI, 9--16.
[77]
Donald A. Schön. 1979. Generative Metaphor: a perspective on problem-setting in social policy. In Metpahor and Thought, Andrew Ortony (ed.). Cambridge University Press, Cambridge, 254--283.
[78]
Donald A. Schön and Martin Rein. 1994. Frame Reflection: Toward the Resolution of Intractable Policy Controversies. Basic Books, New York.
[79]
Phoebe Sengers, Kirsten Boehner, Michael Mateas, and Geri Gay. 2007. The disenchantment of affect. Personal and Ubiquitous Computing 12, 5: 347--358.
[80]
Meredith M Skeels and Jonathan Grudin. 2009. When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn. In Proc Group, 95--103.
[81]
L.A. Suchman. 1987. Plans and Situated Actions: The problem of human-machine communication. Cambridge University Press, Cambridge.
[82]
8Latanya Sweeney. 2013. Discrimination in online ad delivery. Communications of the ACM 56, 5: 44--54.
[83]
Alex Taylor. 2011. Out There. In Proc CHI, 685--694.
[84]
Alex Taylor. 2015. After Interaction. interactions 22, 5: 48--53.
[85]
Diane Zimmerman Umble. 1996. Holding the Line: The Telephone in Old Order Mennonite and Amish Life. Johns Hopkins University Press, Baltimore, MD.
[86]
Ron Wakkary and Karen Tanenbaum. 2009. A sustainable identity: the creativity of an everyday designer. In Proc CHI, 365--374.
[87]
M. Weiser. 1991. The Computer for the 21st Century. Scientific American 265, 3: 94--110.
[88]
Steve Whittaker, Vaiva Kalnikaite, Daniela Petrelli, Abigail Sellen, Nicolas Villar, Ofer Bergman, Paul Clough, and Jens Brockmeier. 2012. Socio-technical lifelogging: Deriving design principles for a future proof digital past. Human-Computer Interaction 27, 1--2: 37--62.
[89]
Julie R. Williamson and John Williamson. 2014. Analysing Pedestrian Traffic Around Public Displays. In Proc PerDis, 13--18.
[90]
Steve Woolgar. 1991. Configuring the user: the case of usability trials. In A Sociology of Monsters: Essays on Power, Technology and Domination, John Law (ed.). Routledge, London, 58--99.
[91]
Peter Wright and John Mccarthy. 2008. Empathy and Experience in HCI. In Proc CHI, 637--646.
[92]
Sally Wyatt. 2003. Non-Users Also Matter: The Construction of Users and Non-Users of the Internet. In How Users Matter: The Co-construction of Users and Technology, Nelly Oudshoorn and Trevor Pinch (eds.). MIT Press, Cambridge, MA, 67--79.
[93]
S. Wyche and E. P. S. Baumer. 2016. Imagined Facebook: An exploratory study of non-users perceptions of social media in Rural Zambia. New Media & Society.
[94]
Rayoung Yang and Mark W Newman. 2012. Living with an Intelligent Thermostat?: Advanced Control for Heating and Cooling Systems. In Proc Ubicomp, 1102--1107.
[95]
Allow someone else to manage your mail and calendar. Retrieved January 1, 2017 from https://support.office.com/en-us/article/Allow-someone-else-to-manage-your-mail-and-calendar-41c40c04--3bd1--4d22--963a-28eafec25926
[96]
2010. Delegate Access in Exchange 2010. Retrieved January 1, 2017 from https://msdn.microsoft.com/en-us/library/office/bb204081(v=exchg.140).aspx

Cited By

View all
  • (2024)Algorithmic SubjectivitiesACM Transactions on Computer-Human Interaction10.1145/366034431:3(1-34)Online publication date: 27-Apr-2024
  • (2024)Empowering End-Users Toward Roles in Sustainable ComputingCompanion Publication of the 2024 ACM Designing Interactive Systems Conference10.1145/3656156.3665131(55-58)Online publication date: 1-Jul-2024
  • (2024)A Playbook to be Proud of: Making the Case for LGBTQ+ Inclusive User Account DesignProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642784(1-22)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Post-userism

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems
    May 2017
    7138 pages
    ISBN:9781450346559
    DOI:10.1145/3025453
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. hci
    2. interaction design
    3. post-user
    4. post-userism
    5. theory
    6. use

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CHI '17
    Sponsor:

    Acceptance Rates

    CHI '17 Paper Acceptance Rate 600 of 2,400 submissions, 25%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI '25
    CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)329
    • Downloads (Last 6 weeks)51
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Algorithmic SubjectivitiesACM Transactions on Computer-Human Interaction10.1145/366034431:3(1-34)Online publication date: 27-Apr-2024
    • (2024)Empowering End-Users Toward Roles in Sustainable ComputingCompanion Publication of the 2024 ACM Designing Interactive Systems Conference10.1145/3656156.3665131(55-58)Online publication date: 1-Jul-2024
    • (2024)A Playbook to be Proud of: Making the Case for LGBTQ+ Inclusive User Account DesignProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642784(1-22)Online publication date: 11-May-2024
    • (2024)Co-design Partners as Transformative Learners: Imagining Ideal Technology for Schools by Centering Speculative RelationshipsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642559(1-15)Online publication date: 11-May-2024
    • (2024)Encountering Autonomous Robots on Public StreetsProceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction10.1145/3610977.3634936(561-571)Online publication date: 11-Mar-2024
    • (2023)Justicia algorítmica y autodeterminación deliberativaIsegoría10.3989/isegoria.2023.68.23(e23)Online publication date: 24-Aug-2023
    • (2023)Digital Legacy: A Systematic Literature ReviewProceedings of the ACM on Human-Computer Interaction10.1145/36100597:CSCW2(1-26)Online publication date: 4-Oct-2023
    • (2023)Beyond Hiding and Revealing: Exploring Effects of Visibility and Form of Interaction on the Witness ExperienceProceedings of the ACM on Human-Computer Interaction10.1145/36042477:MHCI(1-23)Online publication date: 13-Sep-2023
    • (2023)"I like to See the Ups and Downs of My Own Journey": Motivations for and Impacts of Returning to Past Content About Weight Related Journeys on Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/35794947:CSCW1(1-41)Online publication date: 16-Apr-2023
    • (2023)Borrowing, Poking and Entangling. In Search of Shared Spaces Between Science and Technology Studies and Human-Robot InteractionCompanion of the 2023 ACM/IEEE International Conference on Human-Robot Interaction10.1145/3568294.3580033(21-29)Online publication date: 13-Mar-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media