Skip to main content

The IoT and Unpacking the Heffalump’s Trunk

  • Conference paper
  • First Online:
Proceedings of the Future Technologies Conference (FTC) 2018 (FTC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 880))

Included in the following conference series:

Abstract

In this paper we highlight design challenges that the Internet of Things (IoT) poses in relation to two of the guiding design paradigms of our time; Privacy by Design (PbD) and Human Centered Design (HCD). The terms IoT, PbD, and HCD are both suitcase terms, meaning that they have a variety of meanings packed within them. Depending on how the practices behind the terms are applied, notwithstanding their well-considered foundations, intentions, and theory, we explore how PbD and HCD can, if not considered carefully, become Heffalump traps and hence act in opposition to the very challenges they seek to address. In response to this assertion we introduce Object Oriented Ontology (OOO) and experiment with its theoretical framing order to articulate possible strategies for mitigating these challenges when designing for the Internet of Things.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    http://www.ontla.on.ca/library/repository/mon/10000/184530.pdf.

  2. 2.

    https://ico.org.uk/for-organisations/guide-to-data-protection/privacy-by-design/.

  3. 3.

    cf. https://en.wikipedia.org/wiki/E.T._the_Extra-Terrestrial_(video_game).

  4. 4.

    “A/B” is an excellent keyword based summary of the contrast between affirmative and speculative design [30].

  5. 5.

    Dunne and Raby’s book [9] provides a thorough overview of speculative design practice and Tonkinwise’s review of the book offers some useful critique of speculation tooå [39].

  6. 6.

    http://www.bbc.co.uk/news/world-europe-15260748.

  7. 7.

    cf. http://uk.pcmag.com/surveillance-cameras/77460/guide/the-best-smart-locks-of-2017.

  8. 8.

    https://youtu.be/A37SmnNFstA.

  9. 9.

    https://www.theverge.com/2017/10/25/16538834/amazon-key-in-home-delivery-unlock-door-prime-cloud-cam-smart-lock.

References

  1. Auger, J.: Speculative design: crafting the speculation. Dig. Creat. 24(1), 11–35 (2013). https://doi.org/10.1080/14626268.2013.767276

    Article  Google Scholar 

  2. Bevan, N.: How you could benefit from using ISO standards. In: Extended Abstracts of the ACM CHI 2015 Conference on Human Factors in Computing Systems, pp. 2503–2504 (2015). https://doi.org/10.1145/2559206.2567827

  3. Bogost, I.: Alien Phenomenology, or What It’s Like to Be a Thing. University of Minnesota Press, Minneapolis (2012)

    Book  Google Scholar 

  4. Bryant, L.R.: Democracy of Objects. Open Humanities Press, London (2011). https://doi.org/10.3998/ohp.9750134.0001.001

    Book  Google Scholar 

  5. Cavoukian, A.: Operationalizing privacy by design. Commun. ACM 55(9), 7 (2012). https://doi.org/10.1145/2330667.2330669

    Article  Google Scholar 

  6. Cavoukian, A., Jonas, J.L.: Privacy by Design in the Age of Big Data (2012)

    Google Scholar 

  7. Coulton, P., Lindley, J., Sturdee, M., Stead, M.: Design fiction as world building. In: Proceedings of the 3rd Biennial Research Through Design Conference (2017). https://doi.org/10.6084/m9.figshare.4746964

  8. Dunne, A.: Hertzian Tales: Electronic Products, Aesthetic Experience, and Critical Design. The MIT Press, London (2006)

    Google Scholar 

  9. Dunne, A., Raby, F.: Speculative Everything. The MIT Press, London (2013)

    Google Scholar 

  10. Frayling, C.: Research in art and design. R. Coll. Art Res Pap. 1(1), 1–9 (1993)

    Google Scholar 

  11. Gasson, S.: Human-centered vs. user-centered approaches to information system design. J. Inf. Technol. Theory Appl. 5(2), 29–46 (2003)

    Google Scholar 

  12. Gaver, W.: What should we expect from research through design? In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems - CHI 2012, p. 937 (2012). https://doi.org/10.1145/2207676.2208538

  13. Giacomin, J.: What is human centred design? Des. J. 17(4), 606–623 (2014). https://doi.org/10.2752/175630614X14056185480186

    Article  MathSciNet  Google Scholar 

  14. Von Grafenstein, M., Douka, C.: The “state of the art” of privacy- and security-by-design (measures). In: Proceedings of MyData (2017)

    Google Scholar 

  15. Gratton, P., Ennis, P.J.: The Meillassoux Dictionary. Edinburgh University Press, Edinburgh (2014)

    Google Scholar 

  16. Jokela, T., Iivari, N., Matero, J., Karukka, M.: The standard of user-centered design and the standard definition of usability. In: Proceedings of the Latin American Conference on Human-Computer Interaction - CLIHC 2003, pp. 53–60 (2003). https://doi.org/10.1145/944519.944525

  17. Kling, R., Star, S.L.: Human centered systems in the perspective of organizational and social informatics. ACM SIGCAS Comput. Soc. 28(1), 22–29 (1998). https://doi.org/10.1145/277351.277356

    Article  Google Scholar 

  18. Lindley, J., Coulton, P.: On the Internet No Everybody Knows You’re a Whatchamacallit (or a Thing). Making Home: Asserting Agency in the Age of IoT Workshop (2017). http://eprints.lancs.ac.uk/84761/1/On_the_Internet_Everybody_Knows_Youre_a_Thing.pdf

  19. Lindley, J., Coulton, P.: Back to the future: 10 years of design fiction. In: British HCI 2015 Proceedings of the 2015 British HCI Conference, pp. 210–211 (2015). https://doi.org/10.1145/2783446.2783592

  20. Lindley, J., Coulton, P., Cooper, R.: Why the Internet of Things needs object orientated ontology. Des. J. (2017). https://doi.org/10.1080/14606925.2017.1352796

    Article  Google Scholar 

  21. Lindley, J., Coulton, P., Cooper, R.: Informed by design. In: Living in the Internet of Things: PETRAS Conference (2018)

    Google Scholar 

  22. Lindley, J., Sharma, D., Potts, R.: Anticipatory ethnography: design fiction as an input to design ethnography. In: Ethnographic Praxis in Industry Conference Proceedings 2014, vol. 1, pp. 237–253 (2014). https://doi.org/10.1111/1559-8918.01030

    Article  Google Scholar 

  23. Macdonald, N., Reimann, R., Perks, M., Oppenheimer, A.: Beyond human-centered design? Interactions (2005). https://doi.org/10.1145/1013115.1013184

    Article  Google Scholar 

  24. Norman, D.A.: HCD Harmful? A Clarification - jnd.org. http://www.jnd.org/dn.mss/hcd_harmful_a_clari.html

  25. Norman, D.A.: The Invisible Computer: Why Good Products Can Fail, the Personal Computer is So Complex, and Information Appliances are the Solution. The MIT Press, London (1998)

    Google Scholar 

  26. Norman, D.A.: Human-centered design considered harmful. Interactions 12(4), 14 (2005). https://doi.org/10.1145/1070960.1070976

    Article  Google Scholar 

  27. Norman, D.A.: The Design of Everyday Things, Revised edn. Basic Books, New York (2013)

    Google Scholar 

  28. Obar, J.A., Oeldorf-Hirsch, A.: The biggest lie on the internet: ignoring the privacy policies and terms of service policies of social networking services. In: The 44th Research Conference on Communication, Information and Internet Policy (2016). https://doi.org/10.2139/ssrn.2757465

  29. Pierce, J., DiSalvo, C.: Dark clouds, Io $ #! +, and? [Crystal Ball Emoji]: projecting network anxieties with alternative design metaphors. In: Proceedings of the 2017 Conference on Designing Interactive Systems, DIS 2017, pp. 1383–1393 (2017). https://doi.org/10.1145/3064663.3064795

  30. Raby, F., Dunne, A.: A/B (2009). http://www.dunneandraby.co.uk/content/projects/476/0. Accessed 27 Oct 2014

  31. Schraefel, M.C., Gomer, R., Alan, A., Gerding, E., Maple, C.: The Internet of Things: interaction challenges to meaningful consent at scale. Interactions 24(6), 26–33 (2017). https://doi.org/10.1145/3149025

    Article  Google Scholar 

  32. Shapiro, S.S.: Privacy by design. Commun. ACM 53(6), 27 (2010). https://doi.org/10.1145/1743546.1743559

    Article  Google Scholar 

  33. Spiekermann, S.: The challenges of privacy by design. Commun. ACM 55(7), 38 (2012). https://doi.org/10.1145/2209249.2209263

    Article  Google Scholar 

  34. Steen, M.: Tensions in human-centred design. CoDesign 7(1), 45–60 (2011). https://doi.org/10.1080/15710882.2011.563314

    Article  Google Scholar 

  35. Sterling, B.: The Epic Struggle of the Internet of Things. Strelka Press, Moscow (2014)

    Google Scholar 

  36. Suchman, L.: Human-Machine Reconfigurations: Plans and Situated Actions. Cambridge University Press, Cambridge (2007)

    Google Scholar 

  37. Taylor, P., Allpress, S., Carr, M., Norton, J., Smith, L.: Internet of Things: Realising the Potential of a Trusted Smart World (2018). https://www.raeng.org.uk/publications/reports/internet-of-things-realising-the-potential-of-a-tr

  38. Thomas, V., Remy, C., Bates, O.: The limits of HCD. In: Proceedings of the 2017 Workshop on Computing Within Limits - LIMITS 2017, pp. 85–92 (2017). https://doi.org/10.1145/3080556.3080561

  39. Tonkinwise, C.: How we intend to future review of Anthony Dunne. Des. Philos. Pap. 12(2), 169–187 (2014). https://doi.org/10.2752/144871314X14159818597676

    Article  Google Scholar 

  40. Vollmer, N.: Article 25 EU General Data Protection Regulation (EU-GDPR) (2017) http://www.privacy-regulation.eu/en/article-25-data-protection-by-design-and-by-default-GDPR.htm. Accessed 15 Jan 2018

  41. Wakkary, R., Oogjes, D., Hauser, S., Lin, H., Cao, C., Ma, L., Duel, T.: Morse things: a design inquiry into the gap between things and us. In: Proceedings of the 2017 Conference on Designing Interactive Systems, pp. 503–514 (2017). https://doi.org/10.1145/3064663.3064734

  42. Summaries of Articles contained in the GDPR. http://www.eugdpr.org/article-summaries.html. Accessed 15 Sept 2017

  43. ISO 9241-210. Ergonomics of human-system interaction – Part 210: Human-centred design for interactive systems. International Organization for Standardization (2015). https://www.iso.org/standard/52075.html

Download references

Acknowledgements

This research was supported by the RCUK Cyber Security for the Internet of Things Research Hub PETRAS under EPSRC grant EP/N02334X/1.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joseph Lindley .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lindley, J., Coulton, P., Cooper, R. (2019). The IoT and Unpacking the Heffalump’s Trunk. In: Arai, K., Bhatia, R., Kapoor, S. (eds) Proceedings of the Future Technologies Conference (FTC) 2018. FTC 2018. Advances in Intelligent Systems and Computing, vol 880. Springer, Cham. https://doi.org/10.1007/978-3-030-02686-8_11

Download citation

Publish with us

Policies and ethics