Project Overview
Research Institute: University of Washington, University of California Berkeley
Duration: 1/2021- 09/2021
Contributions: Contributing author for Association Computing Machinery Human-Computer Interaction Journal, primary and secondary source researcher, written ideation, video and photo production
Team: Dr. James Pierce, Dr. Richmond Wong, Dr. Neilly Than, Nathaniel Gray (MHCI+D), Ashten Alexander, Tsai-Shan Chiang, Lavi Tang, Olivia Quesada, Sandra Yao
I was invited to join a research group led by Dr. James Pierce, a speculative critical designer, and researcher. Ubiquitous computation in Information of Things (IoT) has surfaced issues of consent, surveillance, power dynamics, misuse of technology, and bad actors. We explored these issues using emerging co-design methods. 
The team generated a video that was submitted and accepted to the Society for Social Studies of Science (4S) conference. We built off these findings by creating a booklet with various speculative use cases of IoT, crafting a study guide to explore expert and non-expert responses to these speculative uses, and submitting a paper to ACM Conference on Human Factors in Computing Systems (CHI)- acceptance pending. 

This video is a compilation of self-probes from the research team. This was submitted and accepted to the Society for 4S Conference.

This is a summation page covering one domain of our co-design workbook.

Cameras, Cameras, Everywhere!
This image is pulled directly from the SG Home website. Arrows to outline hidden cameras and microphones. 
The research group had one weekly check-in. We reported findings collected from online forums. These were delivered as presentations using video, pictures, app mock-ups, written form, etc. During this exploratory phase, we analyzed artifacts while taking notes of themes. This later helped us define parameters as we generated our research methods and materials.  
Phase 1.1: Literature Review
These frameworks are subjective. Positivist objectivity has been presupposed by historical scientific paradigms, and potentially falsely so. All designs have an implicit style in hypotheses embedded in their responses to opportunities. As we crafted our research- impressions left from technology described in our research- were the brush strokes that painted our final brochure. These could be simultaneously heartwarming and creepy.
Phase 1.2: Netnographics 
Primary Use Cases
We started by looking at primary use cases from homeowners, landlords and rental hosts, tenants, and guests, and interviews from the news. These were collected from various forums online: Reddit, Yelp, reviews on Airbnb, Seniorsonly, Bing, YouTube, Lawnforum, blogs, comments spurred from original postings, etc. We compiled quotes, stories, impressions, uses, understanding, consent or lack thereof, policies around technology mentioned in these scenarios, and other information.
Advertised Use Cases
After researching primary use cases, we looked at non-primary use cases in advertisements. We collected functions of various IoT, who the targeted consumers might be, and pulled quotes.

Compiled advertised use cases

Non-Primary Advertised Use Cases
We shared reactions to specific prompts on this content. This surfaced ethical concerns, cultural reflection, and questions that would serve to drive deeper understandings of functionality, and benefits. 

Compiled advertised use cases

Phase 1.3: Quick and Dirty
Information from our findings would fuel our quick and dirty interviews. In these interviews, we were looking for information specific to where interview participants live, how they use IoT within the context of their home, how these devices might record or transcribe information from primary and non-primary users, and what delight or problems they found in their usage. 

Quick and dirty interviews

Phase 1.4: Retrospective Analysis
Next, we took a step back and looked at historical predictions about technology. We compiled evocative images, summarized advertised use cases, and pulled quotes from these use cases. These captured themes, interfaces, and their respective inputs, outputs, uses, placement, etc. 

Screenshots taken from (top to bottom): home computing in "The Challenge of Change," 1961, 2-way door answering in "Westinghouse All-Electric House," mid-1950s, Internet shopping in "60s/70s retro-futurism, Predicting Internet Shopping and Skype- Archive Footage," year unknown.

Phase 1.5: Self-Probes

Self probe exploring audio obfuscation- an ultrasonic sensor detects the proximity of people to the camera. "Bleeps and bloops" sound when someone triggers the camera. 

At this stage, we wanted to generate new questions, uses, and re-examine use through placing specific IoT within our households. For this, we did self-probes. We placed two Wyze cameras around our homes and responded to various prompts. 
As we conducted our self probes we explored who and what might be captured. We experimented with audio and visual obfuscation methods obscuring automatically triggered recording functionality.

In the above video, the "found footage," is from this configuration of camera placement. 

In summation of this leg of research, our critical making project repurposed commercial “smart home” cameras to interrogate the cameras’ workings, and the social meaning they produce as an information technology and media artifact. By repurposing and deploying commercially available smart cameras in our own personal environments, we intentionally and playfully created disruptions, misuses, and breakdowns to help us learn about the current capabilities of the cameras, and highlight new junctures that emerge from their use.

We were prompted to generated an image with "where the data lives." I generated this imagery from my self-probe outlining where data is stored and extracted.  

After compiling and refining our most intriguing footage, we wrote descriptions, and submitted Material Experiments and Playful Disruptions: Interrogating Boundaries, Meanings, and Aesthetics of the Smart Camera to the Society for Social Studies of Science (4S). This was accepted to the 4s conference for 2021. 
Personal Findings
1. There is a spectrum of privacy that exists both online and in-person.  There is a range of considerations around what constitutes "eavesdropping" or voyeuristic behavior for research. 
2. Ubiquitous computation is obfuscated by form. It's hard to know what sensing technology might be embedded in various products.
3. Repurposing and playing with technology can be a generative form of research. It can generate a range of behaviors from resistant obfuscation and distortion, to better understandings of form and data collection, the dynamics of placement, etc.  

Design-led Inquiry: Perceptions of IoT
Phase 2.1: Artifacts from Real Use Cases

Here are various artifacts from around the internet. These are collected from IOT devices and include domestic workers (this extends to people who work from home during the pandemic and employers who can observe their behavior)

With a rich contextual understanding of people's attitudes toward IoT, we wanted to find actual artifacts of use. These informed our final iterations of the scenarios booklets. As part of the content team, I would use these findings to generate written sketches of use cases as the visual team brought them to life through illustrations. These were analyzed and re-worked as the booklet evolved towards its final form. 
Phase 2.2: Iterations of the Workbook

This shows iterations of scenarios used within the finalized pamphlet. I was responsible for written content.

Phase 2.3: Final Workbook and Primary Research
As we refined the written and visual content for the booklet, I also gave feedback on the research guide. We came to the following design for our final iterations for the workbook:
For our research, we conducted preliminary semi-structured interviews to learn about what types of IoT our participants use, job and income status, and where they were located. We used this data to help the flow of the activities when needed. Then we met to synthesize and discuss data. 
Research Findings
1. Fictional scenarios present the opportunity to learn more about people's life experiences with technology and their understandings of trends and issues. An unintended consequence of presenting possible scenarios was participants relating the scenarios to their own experiences with different IoT.
1. The social relationships between primary and non-primary users may make it difficult for non-primary users to “opt out” of surveillance. Social arrangements lead to different privacy considerations in the smart home  as compared to device owners and technology manufacturers. 
2.Low-tech or no-tech alternatives could remove surveillance technologies and instead rely on other forms of communication to address underlying problems. This indicates possible unforeseen consequences to be weighed against potential uses of technology. 
Looking Back and Looking Forward
“psychologists who write sharp and uncrossable distinctions between man’s emotions and those of other living organisms and the responses of the modern type of automatic mechanisms, should be just as careful in their denials as I am in my assertions.” -Norbert Weiner
This research used a variety of methods and demonstrates how IoTs intersect ethical issues. Algorithms, data and uses shape the experiences of individuals who use, or are subjected to, IoT. The underlying relationships and information architecture amplify patterns that have historical and contemporary concerns from national to interpersonal scale: attention economy, data mining, consent, race, profiling, abuse, foreign manipulation and intelligence, social fallout, etc. My dive into this space has equipped me to think critically, methodically, and creatively in the craft of research.

Other projects

Back to Top