Aarhus Series on Human Centered Computing
Latest Publications


TOTAL DOCUMENTS

41
(FIVE YEARS 0)

H-INDEX

10
(FIVE YEARS 0)

Published By Aarhus University Library

2445-7221

2015 ◽  
Vol 1 (1) ◽  
pp. 4 ◽  
Author(s):  
Airi Lampinen

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>Synthesizing prior work, this paper provides conceptual grounding for understanding the dialectic of challenges and opportunities that social network sites present to social life. With the help of the framework of interpersonal boundary regulation, this paper casts privacy as something people do, together, instead of depicting it as a characteristic or a possession. I illustrate interpersonal aspects of networked privacy by outlining four perspectives to ‘sharing’. These perspectives call for a rethink of networked privacy beyond an individual’s online endeavors.</span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 4 ◽  
Author(s):  
Martin Murer ◽  
Verena Fuchsberger ◽  
Manfred Tscheligi

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>In this paper, we propose </span><span>deconstructivist interaction design </span><span>in order to facilitate the differentiation of an expressional vo- cabulary in interaction design. Based on examples that illus- trate how interaction design critically explores (i.e., decon- structs) its own expressional repertoire, we argue that there are commonalities with deconstructivist phases in related de- sign disciplines to learn from. Therefore, we draw on the role and characteristics of deconstructivism in the history of archi- tecture, graphic design, and fashion. Afterwards, we reflect on how interaction design is already a means of deconstruc- tion (e.g., in critical design). Finally, we discuss the potential of deconstructivism for form-giving practices, resulting in a proposal to extend interaction design’s expressional vocabu- lary of giving form to computational material by substantiat- ing a deconstructivist perspective. </span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 4 ◽  
Author(s):  
Omar Sosa-Tzec ◽  
Erik Stolterman ◽  
Martin A. Siegel

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>By examining application software as a type of rhetorical artifact, it is possible to highlight its social, ethical and moral implications. In this paper, we explore one possibility for such a lens: application software functioning as a </span><span>visual enthymeme</span><span>. To explore the applicability of that concept in HCI, we analyze one web application as a first step. In our analysis, we observe that interaction and usability are two features that support an application in functioning as a visu- al enthymeme. Also, online sharing could help the user take the role of the arguer. Our analysis allows us to outline the elements of a user-centric persuasive experience and shows promise for further explorations regarding the applicability of rhetoric in HCI. </span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 4 ◽  
Author(s):  
Joanna Saad-Sulonen ◽  
Kim Halskov ◽  
Liesbeth Huybrechts ◽  
John Vines ◽  
Eva Eriksson ◽  
...  

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>The aim of the Unfolding Participation workshop is to outline an agenda for the next 10 years of participatory design (PD) and participatory human computer interaction (HCI) research. We will do that through a double strategy: 1) by critically interrogating the concept of participation (</span><span>unfolding the concept itself</span><span>), while at the same time, 2) reflecting on the way that </span><span>participation unfolds </span><span>across different participatory configurations. We invite researchers and practitioners from PD and HCI and fields in which information technology mediated participation is embedded (e.g. in political studies, urban planning, participatory arts, business, science and technology studies) to bring a plurality of perspectives and expertise related to participation. </span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 4 ◽  
Author(s):  
Amir Chaudhry ◽  
Jon Crowcroft ◽  
Heidi Howard ◽  
Anil Madhavapeddy ◽  
Richard Mortier ◽  
...  

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>We are in a ‘personal data gold rush’ driven by advertising being the primary revenue source for most online companies. These companies accumulate extensive personal data about individuals with minimal concern for us, the subjects of this process. This can cause many harms: privacy infringement, personal and professional embarrassment, restricted access to labour markets, restricted access to highest value pricing, and many others. There is a critical need to provide technologies that enable alternative practices, so that individuals can par- ticipate in the collection, management and consumption of their personal data. In this paper we discuss the Databox, a personal networked device (and associated services) that col- lates and mediates access to personal data, allowing us to re- cover control of our online lives. We hope the Databox is a first step to re-balancing power between us, the data subjects, and the corporations that collect and use our data. </span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 4 ◽  
Author(s):  
Batya Friedman ◽  
David G. Hendry ◽  
Alina Huldtgren ◽  
Catholijn Jonker ◽  
Jeroen Van den Hoven ◽  
...  

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>In the 2010’s it is widely recognized by computer and information scientists, social scientists, designers, and philosophers of technology that the design of information systems is not value neutral [5-8,11]. Rather, such systems are value laden in part because societal values are major factors in shaping systems, and at the same time the design of the technology reinforces, restructures or uproots societal value structures. Of the many theories and methods to design for this phenomenon one continues to gain traction for its systematic and overarching consideration of values in the design process: Value Sensitive Design (VSD) [5-7]. The aim of this multidisciplinary workshop is to bring together scholars and practitioners interested in ways values can be made to bear upon design and to help continue to build a community by sharing experiences, insights, and criticism. </span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 3 ◽  
Author(s):  
Marko Jurmu ◽  
Johanna Ylipulli ◽  
Anna Luusua

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>In this workshop, we reflect on and share the fun and frustrations of working in interdisciplinary research. We ask participants to openly reflect on their experiences of interdisciplinarity. What approaches have worked and what have failed? In addition to identifying phenomena, we aim to sketch out the next decade of interdisciplinary research in computing, especially in HCI. The third paradigm of Human-Computer Interaction focuses on the qualitative aspects of use experience and the situatedness of technologies. This new orientation has drawn in researchers from various other research and arts backgrounds and traditions, including the social sciences, architecture and industrial design among others. Therefore, we consider this third paradigm to be inherently interdisciplinary. Through workshop participants’ reflection of their own experiences, we strive to identify the common problems and pitfalls of interdisciplinary research, and to celebrate successes, as well as share best practices. </span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 2
Author(s):  
Alex Lamar ◽  
Timmy Meyer ◽  
Loran Steinberger ◽  
Steve Harrison

<p>Legere is a work of critical technology-art that examines the intersection between novels and visual media as two different forms of entertainment. It is set to mimic television -- the program, displayed on an old television set, has a set number of channels that the user can flip through with a remote. Each channel concurrently plays a long-running audiobook, and using speech-recognition, the program flashes the book's text at the user in sync with the narration. The exhibit is meant to mock a living room atmosphere by adding a couch, coffee table, and other peripherals like a rug, to the project space.</p>


2015 ◽  
Vol 1 (1) ◽  
pp. 12 ◽  
Author(s):  
Paul Dourish

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>What is the Internet like, and how do we know? Less tendentiously, how can we make general statements about the Internet without reference to alternatives that help us to understand what the space of network design possibilities might be? This paper presents a series of cases of network alternatives which provide a vantage point from which to reflect upon the ways that the Internet does or does not uphold both its own design goals and our collective imaginings of what it does and how. The goal is to provide a framework for understanding how technologies embody promises, and how these both come to evolve. </span></p></div></div></div>


2015 ◽  
Vol 1 (1) ◽  
pp. 2
Author(s):  
Artur Aguiar ◽  
Bryan Malyn ◽  
Evan Lobeto ◽  
Steve Harrison

<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p><span>We approach performance as fundamentally a hybrid situ- ation: that performer and technology are united in a post- phenomenological embrace. </span><span>Light is Loud </span><span>takes this as a starting point: the form of the performer is subsumed into an array of lights that takes the temporal shape of a self- referential text. The loss of the human form in the piece be- comes a critical statement on the ambiguity of hybridity. </span></p><p><span>In a completely darkened space, a figure with some strips of LEDs speaks a short poem overtly on the nature of “loud”. While the title of the piece, </span><span>Light is Loud</span><span>, suggests “daz- zling”, the effect is a meditation on the nature of quiet. </span></p></div></div></div>


Sign in / Sign up

Export Citation Format

Share Document