Value-Centered Design Issues in Ubiquitous Computing Steve Shafer r

Preview:

Citation preview

Value-Centered Design Value-Centered Design Issues in Ubiquitous Issues in Ubiquitous ComputingComputing

Steve ShaferSteve Shafer

Ubiquitous ComputingUbiquitous Computing

Ubiquitous ComputingUbiquitous Computing

The Ubiquitous Computing Equation:The Ubiquitous Computing Equation:Ubiquitous Computing =Ubiquitous Computing =

Mobile Computing +Mobile Computing +Intelligent EnvironmentIntelligent Environment

Desktop ComputingDesktop Computing

Mobile ComputingMobile Computing Intelligent EnvironmentIntelligent Environment

Disaggregated ComputingDisaggregated ComputingInvisible ComputingInvisible ComputingAugmented RealityAugmented Reality

EasyLiving “Smart Room” DemoEasyLiving “Smart Room” Demo

Automatic lights, computer wakeupAutomatic lights, computer wakeup Track keyboardTrack keyboard Automatic session migrationAutomatic session migration Move display around the roomMove display around the room Music player knows where you areMusic player knows where you are

Ubiquitous Computing Ubiquitous Computing ExamplesExamples

““Museum guide”Museum guide” Send message to nearest phoneSend message to nearest phone Hands-free user interfacesHands-free user interfaces Navigation aidsNavigation aids Bring desktop to your computerBring desktop to your computer Where is everybody?Where is everybody? Room of 1000 computersRoom of 1000 computers

““Invisible” or “calm” computingInvisible” or “calm” computing

Human Design IssuesHuman Design Issues The world is the interfaceThe world is the interface Privacy !!!Privacy !!! Shared ownership of informationShared ownership of information Mixed initiative interactionMixed initiative interaction

Human-computer interactionHuman-computer interaction Human-human interactionHuman-human interaction

All the data, all the timeAll the data, all the time How do you learn to use system?How do you learn to use system?

How does system learn what you want?How does system learn what you want?

Convenience – at what price?Convenience – at what price?

Our QuestOur Quest

DesirabilityDesirability

DesirabilityDesirability

TechnologyTechnology

Technology MaturationTechnology Maturation IntrospectionIntrospection Demo and DiscussionDemo and Discussion User StudiesUser Studies Business CaseBusiness Case MarketplaceMarketplace Literature & MediaLiterature & Media StandardizationStandardization Legislation & AdjudicationLegislation & Adjudication ??

Issue: LocationIssue: Location

Key data for ubiquitous computingKey data for ubiquitous computing Numerous technologies involvedNumerous technologies involved Who owns location information?Who owns location information? Local naming authoritiesLocal naming authorities Geo-dithering and geo-fencingGeo-dithering and geo-fencing Indirect inference of locationIndirect inference of location No standards for much of anythingNo standards for much of anything

Except latitude / longitude (?)Except latitude / longitude (?)

Issue: IdentificationIssue: Identification

Numerous technologiesNumerous technologies Passive v. active identificationPassive v. active identification

Who controls?Who controls? Who knows?Who knows?

Identified v. anonymous operationIdentified v. anonymous operation Gradations of information:Gradations of information:

point, group, anonymous, individualpoint, group, anonymous, individual Mobile v. environmental resourcesMobile v. environmental resources

Issue: ComplexityIssue: Complexity What does the system know about the world?What does the system know about the world?

What do you know about what the system knows?What do you know about what the system knows?

What can the system do?What can the system do? What do you know about what the system can do?What do you know about what the system can do?

What will the system do?What will the system do? Why will it do this? (instruction? example?)Why will it do this? (instruction? example?) How do you know what the system will do?How do you know what the system will do?

Issue: Touchy ApplicationsIssue: Touchy Applications

HealthcareHealthcare EldercareEldercare

Emergency servicesEmergency services Law enforcementLaw enforcement MilitaryMilitary

V alue-Laden Technological V alue-Laden Technological IssuesIssues

DistributionDistribution Bounded rationality (centralization)Bounded rationality (centralization) Replication in networkReplication in network Zero administrationZero administration LearningLearning Data miningData mining The illusion of privacy ?The illusion of privacy ?

OpportunitiesOpportunities

““Can we control legal and technical progress?”Can we control legal and technical progress?” How do we drive values together with these How do we drive values together with these

activities?activities?

New IEEE Pervasive Computing magazineNew IEEE Pervasive Computing magazine Ubicomp conferenceUbicomp conference

Workshop in September 2003 (Seattle)?Workshop in September 2003 (Seattle)?

New ACM SIGUBI under discussionNew ACM SIGUBI under discussion

ContactsContacts

Steve Shafer, Microsoft ResearchSteve Shafer, Microsoft Research stevensh@microsoft.comstevensh@microsoft.com http://www.research.microsoft.com/eashttp://www.research.microsoft.com/eas

yliving/yliving/

http://www.pervasive.computer.orghttp://www.pervasive.computer.org??

http://www.ubicomp.orghttp://www.ubicomp.org

Recommended