Upload
patrick-sanders
View
222
Download
0
Tags:
Embed Size (px)
Citation preview
Value-Centered Design Value-Centered Design Issues in Ubiquitous Issues in Ubiquitous ComputingComputing
Steve ShaferSteve Shafer
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingUbiquitous Computing
The Ubiquitous Computing Equation:The Ubiquitous Computing Equation:Ubiquitous Computing =Ubiquitous Computing =
Mobile Computing +Mobile Computing +Intelligent EnvironmentIntelligent Environment
Desktop ComputingDesktop Computing
Mobile ComputingMobile Computing Intelligent EnvironmentIntelligent Environment
Disaggregated ComputingDisaggregated ComputingInvisible ComputingInvisible ComputingAugmented RealityAugmented Reality
EasyLiving “Smart Room” DemoEasyLiving “Smart Room” Demo
Automatic lights, computer wakeupAutomatic lights, computer wakeup Track keyboardTrack keyboard Automatic session migrationAutomatic session migration Move display around the roomMove display around the room Music player knows where you areMusic player knows where you are
Ubiquitous Computing Ubiquitous Computing ExamplesExamples
““Museum guide”Museum guide” Send message to nearest phoneSend message to nearest phone Hands-free user interfacesHands-free user interfaces Navigation aidsNavigation aids Bring desktop to your computerBring desktop to your computer Where is everybody?Where is everybody? Room of 1000 computersRoom of 1000 computers
““Invisible” or “calm” computingInvisible” or “calm” computing
Human Design IssuesHuman Design Issues The world is the interfaceThe world is the interface Privacy !!!Privacy !!! Shared ownership of informationShared ownership of information Mixed initiative interactionMixed initiative interaction
Human-computer interactionHuman-computer interaction Human-human interactionHuman-human interaction
All the data, all the timeAll the data, all the time How do you learn to use system?How do you learn to use system?
How does system learn what you want?How does system learn what you want?
Convenience – at what price?Convenience – at what price?
Our QuestOur Quest
DesirabilityDesirability
DesirabilityDesirability
TechnologyTechnology
Technology MaturationTechnology Maturation IntrospectionIntrospection Demo and DiscussionDemo and Discussion User StudiesUser Studies Business CaseBusiness Case MarketplaceMarketplace Literature & MediaLiterature & Media StandardizationStandardization Legislation & AdjudicationLegislation & Adjudication ??
Issue: LocationIssue: Location
Key data for ubiquitous computingKey data for ubiquitous computing Numerous technologies involvedNumerous technologies involved Who owns location information?Who owns location information? Local naming authoritiesLocal naming authorities Geo-dithering and geo-fencingGeo-dithering and geo-fencing Indirect inference of locationIndirect inference of location No standards for much of anythingNo standards for much of anything
Except latitude / longitude (?)Except latitude / longitude (?)
Issue: IdentificationIssue: Identification
Numerous technologiesNumerous technologies Passive v. active identificationPassive v. active identification
Who controls?Who controls? Who knows?Who knows?
Identified v. anonymous operationIdentified v. anonymous operation Gradations of information:Gradations of information:
point, group, anonymous, individualpoint, group, anonymous, individual Mobile v. environmental resourcesMobile v. environmental resources
Issue: ComplexityIssue: Complexity What does the system know about the world?What does the system know about the world?
What do you know about what the system knows?What do you know about what the system knows?
What can the system do?What can the system do? What do you know about what the system can do?What do you know about what the system can do?
What will the system do?What will the system do? Why will it do this? (instruction? example?)Why will it do this? (instruction? example?) How do you know what the system will do?How do you know what the system will do?
Issue: Touchy ApplicationsIssue: Touchy Applications
HealthcareHealthcare EldercareEldercare
Emergency servicesEmergency services Law enforcementLaw enforcement MilitaryMilitary
V alue-Laden Technological V alue-Laden Technological IssuesIssues
DistributionDistribution Bounded rationality (centralization)Bounded rationality (centralization) Replication in networkReplication in network Zero administrationZero administration LearningLearning Data miningData mining The illusion of privacy ?The illusion of privacy ?
OpportunitiesOpportunities
““Can we control legal and technical progress?”Can we control legal and technical progress?” How do we drive values together with these How do we drive values together with these
activities?activities?
New IEEE Pervasive Computing magazineNew IEEE Pervasive Computing magazine Ubicomp conferenceUbicomp conference
Workshop in September 2003 (Seattle)?Workshop in September 2003 (Seattle)?
New ACM SIGUBI under discussionNew ACM SIGUBI under discussion
ContactsContacts
Steve Shafer, Microsoft ResearchSteve Shafer, Microsoft Research [email protected]@microsoft.com http://www.research.microsoft.com/eashttp://www.research.microsoft.com/eas
yliving/yliving/
http://www.pervasive.computer.orghttp://www.pervasive.computer.org??
http://www.ubicomp.orghttp://www.ubicomp.org