Towards A New Conceptual Framework for Personal Computing
Candace Ellicott MDes 2011
Ellicott_Cover-v1.indd 1
4/8/11 3:04:48 AM
iii How can design help to solve issues of fragmentation, complexity, depersonalization and lack of synchronization for the personal computer user?
A thesis project presented to The School of Graduate Studies Nova Scotia College of Art & Design: NSCAD University by Candace Kelly Elise Ellicott in partial fulfillment of the requirements for the Master of Design
Copyright © 2011 Candace K.E. Ellicott. All rights reserved. No part of this book may be used or reproduced in any manner whatsoever without written permission except in the case of brief quotations embodied in critical articles or reviews.
NSCAD University Halifax, Nova Scotia Canada April 2011
Book design and illustrations by C. Ellicott Cover photo and chapter divide photos were licensed photos from Shutterstock and subsequently digitally manipulated by C.Ellicott. Photography throughout was provided by Stock.xchng, a royalty free library. Author has met Stock.xchng terms of use as specified on their website
Marlene Ivey Associate Professor Design NSCAD University
under their “Image license agreement” Retrieved April 04 20011, from
Halifax, Nova Scotia
http://www.sxc.hu/info.phtml?f=help&s=7_2
Canada
Thesis by: C. Ellicott, 04.08.2011
v
DEDICATION
“It is what we think we know
I dedicate this thesis to the Ellicott family, who have supported me through this long, arduous and slightly self-indulgent process. Thank you,
already that often prevents
Dylan, for being understanding of my tunnel vision and not being upset
us from learning.�
with the lack of communication this year. Thank you, Dad, for always being one of my biggest supporters.
~Claude Bernard To my mother: you were a vital part of me being able to achieve this final product. Your sleepless nights worrying about my project and my scattered writing style will always be remembered. Thank you for providing me the guidance, expertise and moral support during the whole process. You were my mentor, and always will be.
Thesis by: C. Ellicott, 04.08.2011
vi
vii
Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
ACKNOWLEDGEMENTS I would like to thank Marlene Ivey, who as a professor went above and beyond to ensure an energetically tangential mind like mine stayed focused. Oh, and my mother will also get another acknowledgement for that very same task as well as editing my thesis when no one should ever have seen it. And thank you, Charlotte, for editing it into readability!
I am indebted to all the probe participants who took on the probe questionnaire and interviews. I would name you all but then I would break our confidentiality agreement. So I’ll leave it at that, as you know who you are.
The inspiration for my thesis topic was from many sources, some of which are seen in the Reflection and Data Analysis section. But in part, it was also driven by a thought that I might travel part of the year and be able to design location-independently. However, during my biweekly thesis commute to and from the South Shore, it became very apparent that no matter how well-organized I was, I always left something important behind on a hard drive somewhere. Necessity is the mother of invention, or so they say.
Finally, I am grateful for Hayes’ ongoing support throughout the year. He saw me at my worst and willingly lent an ear to my endless barrage of questions and anecdotes around my thesis topic. He made his support available in a number of ways, including adding inspiration to this thesis
I wandered lonely as a cloud That floats on high o’er vales and hills, When all at once I saw a crowd, A host, of golden daffodils; Beside the lake, beneath the trees, Fluttering and dancing in the breeze. Continuous as the stars that shine And twinkle on the milky way, They stretched in never-ending line Along the margin of a bay: Ten thousand saw I at a glance, Tossing their heads in sprightly dance. The waves beside them danced; but they Out-did the sparkling waves in glee: A poet could not but be gay, In such a jocund company: I gazed---and gazed---but little thought What wealth the show to me had brought: For oft, when on my couch I lie In vacant or in pensive mood, They flash upon that inward eye Which is the bliss of solitude; And then my heart with pleasure fills, And dances with the daffodils.
topic. His innate drive to tinker with technology and follow technological trends proved very helpful. His interest and prior education in philosophy was an asset when I was toying with the concept of the Ghost in the Machine. He was just a good person to bounce ideas off. Thank you.
—William Wordsworth
viii
ix
Table of Contents and Figures ÂŤ Towards a New Conceptual Framework
TABLE OF CONTENTS
Abstract
03
1.0 Introduction
05
Introduction...................................................................................................................06
Thesis Structure........................................................................................................... 07
2.0 The Changing Digital Landscape:
An Evolution in the Personal Computing Paradigm
Introduction....................................................................................................................10
The Advent of the Personal Computing Paradigm....................................10
The Graphic User Interface, A Major Contributor in the Shift
Contextual Search & Review.................................................................................46
Cultural Probing........................................................................................................... 47
Questionnaire Survey...............................................................................................50
Figures and Data Visualization............................................................................. 51
Sketches........................................................................................................................... 52
Summary......................................................................................................................... 56
09
to Personal Computing .................................................................................... 12
The Pervasiveness of Personal Computing in North America ........... 14
Personal Computing may Transition to Cloud Technology................... 16
Issues Related to The Shift to Cloud Services.............................................. 18
Ownership....................................................................................................................... 19
Privacy and Security.................................................................................................20
Cost.................................................................................................................................... 22
The Shift from Inhabiting Physical Space to Dwelling
in a Virtual World................................................................................................. 23
5.0 Reflection and Analysis of Data and Design Experiment
57
Introduction................................................................................................................... 58
The Chosen Sample Group ..................................................................................60
Design of Cultural Probes and Questionnaire.............................................. 62
Cultural Probe Packs................................................................................................. 65
The E-mailed Questionnaire..................................................................................68
Interpreting the Results...........................................................................................68
Findings and Analysis...............................................................................................70
Memory, Filing and Subjectivity..........................................................................80
Downsizing the Physical and Up sizing the Digital.................................... 83
Importance of Location to the Home User:
Changing the Concept of Desk............................................................................88
Synchronization...........................................................................................................90
Attitudes on Computing are Mixed...................................................................90
25
Salient Concerns Mentioned About Technology....................................... 92
Introduction................................................................................................................... 26
What Participants Did Not Say: Reading Between the Lines.............. 93
Fragmentation ............................................................................................................ 28
Probing to Inform the Design Proposal...........................................................96
Synchronization ......................................................................................................... 32
Summary.........................................................................................................................96
Summary......................................................................................................................... 37
Summary......................................................................................................................... 24
3.0 The Impact of Technology on The Individual
6.0 An Analogy to Inform Design
99
35
Introduction.................................................................................................................. 40
Action Research Methodology........................................................................... 40
A Deeper Understanding: Reflection and Iteration .................................... 45
Open Source: A Good Philosophical Fit....................................................... 109
Methods of Research................................................................................................46
Summary........................................................................................................................ 110
4.0 Methods and Methodology
Introduction.................................................................................................................100 The Transition of Ownership, Copyright, and the Continued Physical Abstraction of Objects................................................................104
Thesis by: C. Ellicott, 04.08.2011
x
xi
Table of Contents and Figures « Towards a New Conceptual Framework
TABLE OF CONTENTS continued
LIST OF FIGURES
7.0
Building The Design Brief: A Design Scenario
107
Introduction...................................................................................................................112
2.02 The Advent of Personal Computing — A Historical Timeline: Part B................. 14
The Context In Which The Project Resides...................................................114
2.03 Many Canadian Households Own Several Computing Devices and Peripheral
The Design Brief
2.01
The Advent of Personal Computing — A Historical Timeline: Part A................. 12
Computing/Technological Gadgets .......................................................................... 16
A consumer target audience.........................................................................115
3.01 Data Storage ................................................................................................................................. 33
A New User Interface: Features of the System or Design
4.01 A Four Phase Iterative Design Process.............................................................................. 41
1. Any new product needs to be marketed well.......................... 116
4.02 Action Research Methodology & Design Methodology Overlap........................ 42
2. With the KISS (Keep it simple, stupid) Principle...........................122
4.03 Methods Used in Study Integrated on the Action Research Process .............43
3. Experience is more important than feature....................................122
4.04 - 4.05 Physical Cultural Probe Packs Mailed to Ten Participants..........................49
4. Unique data management needs to be accommodated..........122
4.06 Data Visualization of Cloud Apps......................................................................................... 53
5. The system will include a universal password................................122
4.07 Sketch of a Central Way to Manage all Ones Data–Called a Digital Husk......54
6. A hybrid solution for storage ...............................................................132
4.08 Sketches of the Initial Interface Design for the Control Panel System ........... 55
7. Centralized management...........................................................................132
5.01
8. The system will monitor an individuals data ghost
5.02 Proposed Probe Participant Group .................................................................................... 61
9. This system features both automation and user control..........137
5.03 Some Example Spreads From The Probe Pack Booklet/Diary, pp. 7-8.......... 62
Cloud Computing Activities Being Heavily Adopted in U.S.A.............................. 59
10. Open Source allows for ongoing modules to be added .......137
5.04 Probe Pack Booklet/Diary, pp. 9-10................................................................................... 63
11.The panel will manage social networking identities...................... 144
5.05 Probe Pack Booklet/Diary pp. 13-14................................................................................. 63
12. Synchronization of data ......................................................................... 144
5.06 Actual Probe Participant and Questionnaire Group Demographics.................64
Summary....................................................................................................................... 160
8.0 Conclusion & Suggestions
163
Introduction................................................................................................................. 164
Suggestions From The Thesis............................................................................ 168
9.0 Bibliography
10.0 Appendices
169
i
Appendix A: Probe Pack Custom Diary Design............................................. ii
Appendix B: Probe Pack Recipients Receive Questionnaire................vii
Appendix C: Ghosts Are “Un-sci-en-ti-fic”...................................................... xi
5.07 Digital Filing System of Ray..................................................................................................... 72 5.08 Digital Filing System of Shawn.............................................................................................. 74 5.09 Digital Filing System of Mario................................................................................................. 76 5.10 Digital Filing System on Ace’s iPod..................................................................................... 77 5.11
Digital Filing System of Sara................................................................................................... 77
5.13
Digital Filing System of Jay..................................................................................................... 78
5.14
Ace’s Digital Collection Manifested As A Physical One............................................ 79
5.15
Thesis Poster Image: Virtualization of the Desktop...................................................84
5.16
A Visual Interpretation of Key Probe Findings.............................................................. 87
6.01 An Individuals Fragmented Data Online And Across Multiple Devices ....... 105 6.02 An Individuals Unite Data, Their Data Ghost................................................................106
Thesis by: C. Ellicott, 04.08.2011
xii
xiii
Preface « Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
LIST OF FIGURES CONTINUED 7.02 Unite – A Proposed Logo for Testing.................................................................................116 7.03 Mind Mapping for the Control Panel System.................................................................118 7.04 Possible System Architecture for the Control Panel System............................... 120 7.05 Unite Install and Set Up Screens..........................................................................................123
Scenario #1 A busy single mother’s home computer dies..................... 125 7.06 - 7.07 A Four Step Set-Up Process for the Unite System.........................................128 7.08 - 7.09 A Four Step Set-Up Process for the Unite System.........................................129 7.10 - 7.11 Control Panel Examples of Data View and Sorting Options....................... 130 7.12 - 7.13 Control Panel Example of Data Views.......................................................................131 7.14 Login Screen with Required Retinal Scan and Optional Password entry......133 7.15 Hybrid Data Storage and What Data Should be Synchronized..........................135 7.16 Data Storage Pyramid..............................................................................................................136 7.17 - 7.18 Data Ghost Screen Views................................................................................................138
Scenario #2 A family with demanding computer needs.........................141 7.19 - 7.20 The Communication and Social Media Feeds Panel...................................... 145 7.21 Example of a Real-Time Synchronized Work Spaces. ................................................147
Scenario #3 Location-independence is all that Todd and Nancy Need.... 149 7.22 The Unite System is Both Browser Based and a Native Application................153 7.23 The Main Profiles That a Users Device Would Upload to the Cloud.................155
Scenario #4 Joan Out of a Job Needs Computer Access...................... 157
Design is thinking made visual. —Saul Bass
xiv
03
The Changing Digital Landscape « Towards a New Conceptual Framework
ABSTRACT The digital landscape has evolved rapidly since the advent of the internet and the world wide web. The subsequent introduction of the desktop analogy helped to launch personal computing for the average home user, literally creating a virtual revolution in the domestic domain. Since then, there has been little time for reflection on the overall impact of change on the personal computer user. As the digital landscape continues to evolve and the realm of computing precipitates a continued abstraction from the physical to the virtual, how will future domestic users organize their personal computing both online and offline?
The goal of this thesis is to reflect on the current technological impacts on the personal computer user. The outcome of the reflection will attempt to put the individual’s needs at the heart of research and
THESIS ISSUE:
design. As technologies and physical devices inundate us more and
How can design help to solve issues of
more, the consequence is a scattering of data across multiple devices,
fragmentation, complexity, depersonalization
leading to a ‘virtual fragmentation’ and lack of synchronization adds to the issue. This thesis utilizes action research methodology as well as a
and lack of synchronization for the personal
literature review, cultural probing and survey questionnaires to conceptualize
computer user?
people’s relationship with their data, computing devices, and environment. The need for a system to help mitigate this new phenomenon of fragmentation, lack of synchronization will be explored. In part by using the well-known and philosophical concept of the ‘ghost in the machine’ to represent a multi-dimensional version of a digital avatar it could allow more cohesion, control and ownership over a persons data. The final designed system will leverage new technologies, such as the Cloud, to help address these issues.
Thesis by: C. Ellicott, 04.08.2011
05
01
Introduction
06
07
Introduction « Towards a New Conceptual Framework
INTRODUCTION
landscape continues to evolve from a physical place to a virtual realm
Over the past few centuries, the world has been so caught up in the rush
beyond what even McLuhan imagined with his global village, boundaries
to embrace technological progress, some experts now contend that
are seemingly unpredictable, shifting, growing, shrinking and changing.
technology is controlling us (Mumford cited in Carr, 2008). As Thackara
In re-examining borders between physical and virtual and where
brain. Except a whole lot faster.
suggests in his book In The Bubble, the “rebound effect of innovation”
individuals digital lifestyles reside in that space, design and research
Computing
has allowed us little time to try things out, test them on a small scale,
can help better define them by responding to the changes in the
and then observe and reflect upon them. The process of engaging with
evolving landscape and, if necessary, re-defining ideas of place,
technology—that is, creating, consuming and acquiring it—has given us
location, ownership, and identity.
Personal Computer General-purpose device used to solve problems, remember stuff, and provide endless hours of entertainment? It’s just like your
Computing is using and improving computer technology, computer hardware and software. Once upon a time robots in television shows and movies used to say ‘does not compute’. That doesn’t happen very
Thesis by: C. Ellicott, 04.08.2011
Global Village Global Village was used to describe how the globe was becoming smaller with the advent to electric technology and what at this time they thought was the instantaneous movement of information. people tend to use the term now with the advent to the web. Digital lifestyle Being increasingly connected to online, non-physical services. Having more and more of the important things in your life exist online. Or,
little time to take stock of the impact of such drastic and pervasive
knowing e-mail addresses but not
often anymore. Just ask Ken Jennings.
change. Thackara urges us, as designers, not only to design “people back
To express the changing digital landscape as an analogy, imagine that
phone numbers, owning mp3s but
Virtual
into the picture, [but]... to design ourselves more time to paint it” (2006,
you have stayed in one place and, over time, that place has rapidly grown
FarmVille gold is listing among your
p. 4). Considering that we are now, as many technology prognosticators
up around you, from a small village to a city. Now apply that same
believe, on the cusp of an even greater revolution known as the Cloud,
concept to the changing digital landscape. Over the past 20 years with
Really. Or is it?
there has never been a better time to stop and think. The goal of this
the advent of the world wide web, we have been drawn into becoming
Virtual Reality
thesis is to investigate this field of rapid technological change and reflect
users of a form of advanced technology that has exponentially hastened
on what these changes mean for the individual user and the potential
growth and changes in the digital landscape, ‘invisibly’ growing up
together globally. The Web is one
impacts on the future of personal computing culture.
around us. It has substantially altered the way we work, play, and live.
the Internet. Other common ways
Something that exists in essence or effect, but not in a physical form. In computing, it is used of software that act as if it is hardware. Not real.
possessions in your will. World Wide Web vs Internet
A computer-simulated environment that imitates physical environments that exist in the real world. In the Matrix all these people were plugged
Thus, individuals have surrendered and unconditionally accepted
while robots harvested them for you died in real life too. That doesn’t happen with most virtual reality.
The adjective digital or virtual is used interchangeably in the context
technology as it is presented to them, with little regard to its impact
of this study. Digital or virtual suggests all things electronic existing on
on their lives or on themselves (Mumford cited in Carr, 2008).
Unless you get so mad that you died in a virtual reality that you punch
happened before. Virtualization The creation of a virtual version of something by using software to simulate hardware. Sometimes when you don’t have a girlfriend you just
replications of objects. For example, a book, previously only a physical
THESIS STRUCTURE
object, is now available as a virtual or digital artifact in the form of an
Theoretical underpinning establishes the nature and character of this
electronic e-book. Another object that transformed or virtualized
research, while a domain and design experiment is used to generate
was the telephone answer machine, from a physical object to a monthly
a design proposal that addresses the research question. Rather than
service. The shift from physical to virtual not only embodies the move
a treatise, the thesis reads more like a story comprised of a series of
from a physical to digital state but a transition from ownership to
separate essays, building up to a conclusion or hypothesis. In this series
membership, as the example of the answering machine exemplifies.
of essays, the literature review is not separated into its own section
As well as an ownership of rights also owned by others. As the digital
but instead is woven throughout the thesis to substantiate assertions
have to make a virtual one. Above sources adapted from Wikipedia: The Free Encyclopedia
the same as the Internet, this is not true. The Internet is a massive network of networks which connects millions of computers way of accessing the information on
Internet are through e-mail and instant messaging (which can, but don’t necessarily, use the Web). Thinking that the Internet is the same as the Web is like missing the forest for the trees.
a computing device or the internet, including non-physical electronic
your computer and electrocute yourself. But hopefully that’s never
While some think that the Web is
to access information using the
into a fake world to keep them busy energy. But if you died in the Matrix,
not CD’s or records, and when your
and assumptions made in the work.
Above sources adapted from Wikipedia: The Free Encyclopedia
08
Introduction ÂŤ Towards a New Conceptual Framework
09
This research study is divided into an exploration of four key areas, culminating with the final design brief and design proposal which evolved from the research. The areas of exploration can be generally described as:
1. The Changing Digital Landscape: an evolution in the personal
computing paradigm
2. The Impact of Technological Change on the Individual
3. Reflection and Analysis of Data and Design Experiment
4. A Proposed Analogy to Inform the Design
The final chapter builds on the characteristics drawn from the contextual search and review to help build the design brief and design proposal. That section is followed by the conclusion, bibliography and appendices.
02 The Changing Digital Landscape: An Evolution In The Personal Computing Paradigm
10
11
The Changing Digital Landscape « Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
Introduction
hardware but also in the type of users of the device. At their outset,
The following chapter explores a technology transition that has been
computing machines were housed in large organizations on permanent
underway for several decades. The aim is to describe and pinpoint the
mainframes and used primarily by experts such as professional math-
historical shifts that have led us to this moment in time as they relate
ematicians, whereas today personal computing is highly portable and
to the evolution of the personal computing paradigm. This will define
carried out virtually anywhere and by everyone, including non-experts.
the term is use to denote a high-end
which itself has been influenced by several factors. Below are six points
Douglas Englebart (b. 1925), an American inventor and early computer
Hyperlink
outlining the focus for discussion around the history of computing.
pioneer, was seen as a key figure in helping to shift users’ perceptions
Mainframe This term is not referring to Star Treks’ mainframe, but was used around the same time, referring to large computers in largely faceless boxes that contained the central processing unit and memory. Now commercial computer.
and contextualize the “changing digital landscape”, a phenomenon A reference to another document
and shape attitudes of computing devices. Englebart argued that, by
that can be easily clicked to bring up the source material easily. Makes navigating from one piece
• The advent of the personal computing paradigm
“augmenting the human intellect”, computers would not only be useful
of information to another as easy
• The introduction of the graphic user interface, a major component
to technicians, specialists, and academics, but to everyone (Allan, 2001).
openawholenewworldofinformation-
In 1968, Engelbart staged “The Mother of all Demos”, as it was later
as the click of a button. http://www.
withtheclickofabutton.com
in the shift to personal computing
Word-Processor
• The pervasiveness of personal computing in North America
termed, due to its significance in computing history (Erickson &
• The potential for personal computing to transition to Cloud technology
McDonald, 2008, p. 31). During the 90-minute live demo, Engelbart
of the early stand alone electric
• Issues related to the shift to Cloud technology
debuted new innovations such as hyperlinks, word-processing, drag
keyboard entry and a processor for
• The shift from inhabiting physical space to dwelling in a virtual world
and drop action, vector graphics, e-mail, videoconferencing and the
Is an application that was derivative typewriter and combined with a editing capabilities. These machines were in and out of offices in a blink of an eye.
computer mouse, the first of its kind. Considering the relatively primitive
The History of Digital Computing
state of technology in the 1960s and how prevalent Englebart’s ideas
The Advent of the Personal Computing Paradigm
have become today, the demo was indeed remarkable.
Despite popular perception, digital technology did not emerge abruptly
Vector Graphics Is a graphic format that represents the image using it’s outermost edges, points, lines, bezier curves etc. It is the farthest thing from a paint brush and paint as you can get.
in the late twentieth century. Computers of varying complexity have
In hindsight, Turing and Englebart have emerged as two key visionaries
been in use since at least the early 1900s. However, the English math-
and catalysts in personal computing history by helping to open people’s
ematician Alan Turing (1912-1954) is still considered the “father” of
minds to the possibility of personal networked computing systems. While
modern computer science, having invented in 1936 what today is
Englebart did pave the way for the reception of the personal computer
a virtual object like a file on their
regarded as the blueprint for the electronic digital computer (Mark &
by the general public, it was not until 1975 that Sphere 1, the first all-in-
user interface) and drag it from one
Wolf, 2008). Since then, more powerful and flexible computing devices
one personal computer, was manufactured for general sale for $650
have been introduced, gradually adding more features while shrinking in
as a hobby kit (Allan, 2001). Even though single-person computers were
size until becoming the omnipresent instruments surrounding us today.
already in the marketplace, very few people had the opportunity to
But just how did Turing’s arena-spanning behemoth morph into our
use them, as they were still too expensive for the ‘average’ person.
pocket-size iPhone? The shift involved not only a change in computer
Drag and Drop It couldn’t get much simpler, The term refers to exactly what it does, it gives users the ability to grab computer (which must have a graphic folder into another and drop it there. Above sources adapted from Wikipedia: The Free Encyclopedia
12 Graphic User Interface Often pronounced gooey, it is not some slime from a sci fi movie. Rather it is user interface for the computer that changes raw code or lines of code for telling the computer what to do into pretty little icons like folders and files
The Graphic User Interface, A Major Contributor In The Shift
for most of the world. Source adopted from Wikipedia: The Free Encyclopedia. WYSIWYG Is an acronym that gets made into an odd sounding word, wiz-ee-wig.
computer was going to become a staple consumer product, an assertion
During the late 1970s and into the 1980s, computers changed significantly: they became more sophisticated, prices were lowered, and not only
will print out the same as it views in its editing state on screen. Can you imagine having to write lines of code that needed to represent a
that most people at the time believed was ridiculous (Jobs as cited in D’Souza, 2011). According to Xerox PARC, their first personal computer
academics and experts but also computer hobbyists began purchasing them. The introduction of the desktop analogy, the graphic user interface (GUI), and software based on what you see is what you get WYSIWYG) by Xerox Parc, marked a significant turning point in the advancement
(PC) that used the desktop analogy was “The Alto” (Allan, 2001), which greatly influenced the design of other PCs. John (2005) explained: “Steve Jobs borrowed the idea for the computer mouse and GUI from Xerox PARC and created the Apple Macintosh computer. Then Bill Gates
of personal computing (Swedin & Ferro, 2005, p. 97; Allan, 2001). It
borrowed what Steve did and built Windows for PCs” (p. 139). The
changed the traditional blue/black and green prompt screens strewn
price and size reduction of the physical machine, as well as the graphic
It refers to how the content displayed in a page layout document for ex.,
Thesis by: C. Ellicott, 04.08.2011
Steve Jobs, the co-founder of Apple in the 1980s, predicted that the
To Personal Computing
and actions, like drag and drop that makes it easier to compute
13
The Changing Digital Landscape « Towards a New Conceptual Framework
with lines of code into an understandable desktop environment a layman could relate to. Now, not only computer experts but children could learn
desktop analogy and graphic user interface, were the final triggers in the success of the personal computing revolution.
to operate computers proficiently.
brochure or a image like the one right? This with GUI makes it much easier for the layperson to compute.
1977 Commodore 64 was the first mass marketed computer
Above sources adapted from Wikipedia: The Free Encyclopedia
Figure 2.01 The Advent of Personal Computing — A Historical Timeline: Part A
1968 Mother of all demos Englebart paves the way for the possibilities of personal computing
1937 Turing Machine, was an experiment that represented a, “intelligent machine”
1924 IBM formed from the Tabulating Machine Co.
1950 - 1970 Mainframe computers manufactured b y "IBM and the Seven Dwarfs" group of companies that represented a, “intelligent machine”
Source: Images Royalty Free. Compilation copyright 2011 by C.Ellicott . Facts are adapted from Carr, N., The Big Switch : Rewiring The World, From Edison To Google, 2008, pp.109, 122; Rifkin, The Age of Access, 2000, pp. 16, 17, 18; Allan, R. A. Personal Computing in the 1960s. A history of the personal computer: The people and the technology ; (2001). http://www.k-director.com/blog/wp-content/uploads/2008/06/bill-gates-timeline.jpg; “Macintosh”, (n.d.), In Wikipedia: The Free Encyclopedia, http://en.wikipedia.org/wiki/Macintosh; “ipod”, (n.d.), In Wikipedia: The Free Encyclopedia, http://en.wikipedia.org/wiki/IPod
1975 Shere 1 was said to be the first personal computer, said Byte Magazine
1973 Xerox PARK desktop analogy and GUI comes to life
1977 Apple II it’s first personal computer licenceses “Basic” from Microsoft
1984 The Macintosh 128K machine comes with GUI, mouse and keyboard
1981 Xerox PARK’s computer the ‘Star’ greatly influenced Apple, Microsoft And Sun.
1991 Utility “grid”computing for corporations, essentially Cloud computing
1990 Advent of world wide web Tim Berners -Lee
1993 Thin Client coined by by Tim Negris
14 Moore’s Law
15
The Changing Digital Landscape « Towards a New Conceptual Framework
The Pervasiveness of Personal Computing in North America
the traditional desktop computer is gradually being replaced by
Computers have become millions of times more powerful as well as
a selection of cheaper, smaller, easier-to-use computers such as PDAs,
immensely more common and connected over the past few decades.
smartphones, e-readers, tablets, netbooks and laptops. As well as
According to a 2006 Economist.com survey, Canadians owned 87.6
becoming cheaper, digital devices are also more powerful and portable.
computers for every 100 people, while the United States ranked sixth
Digital service carriers connect millions of wireless devices annually,
with 76.2 computers per 100 people. From the sale of the first PC in 1975,
according to a recent survey, with an American penetration of 95 percent
this represents quite an amazing acceptance of technology and under-
(Higginbotham, 2010). Yet people did not just own more devices; they
scores the rapid expansion and pervasiveness of digital technologies.
became increasingly connected to the internet.
Thesis by: C. Ellicott, 04.08.2011
The trend in computing hardware that says that the amount of transistors placed on an integrated circuit has doubled (and will continue to double) every two years. Computers are getting smaller and smaller by the year. But when will it end—Moore really means more.Oh, the year 2015 or 2020 by the looks of it. Source adapted from Wikipedia: The Free Encyclopedia.
Personal computing has grown at an exponential rate, with the average 2011 Google launches first Cloud Operating system
North American owning one or more personal computing devices. 2009 Cloud Computing starts to make an impression in personal computing with Web 2.0
Technological advancements and lowered manufacturing costs have made such devices more affordable for a greater number of people Figure 2.02 The Advent of Personal Computing — A Historical Timeline: Part B (Source on previous page)
(see Moores Law). Based on past trends, computers will likely increase
2002 BlackBerry’s first smartphone
in number and importance into the future. However, it appears that
1990 Advent of world wide web Tim Berners -Lee
1993 Thin Client coined by by Tim Negris
2010 500million Facebook users in the Cloud. That’s 1 in 13 people on earth are a user
2001 SaaS Software on demand is a corporate business phenomenon
1991 Utility “grid”computing for corporations, essentially Cloud computing
1995 Modem “dial-up” technology 56kb allows home users to connect to the Internet
2000-2001 Residential high speed access 1997 spiked in Canada Google search engine launched
2001 iPod launched 2001 The tablet concept was made popular as a concept by Microsoft
2004 Facebook launched
2007 iPod first public touch screen technology 2007 Facebook has 50 million users
2012-13 Microsoft Operating system will include Cloud functionality
2009 Web 2.0 the social web
2010 iPad tablet launched
2011 Web 3.0 the semantic web
2011 iPad 2 tablet sells 500,000 in first weekend
16
17
The Changing Digital Landscape « Towards a New Conceptual Framework
Mobile technology does not exist in isolation anymore but has the ability
Further, Carr suggests that “twenty or so years from now, the personal
to plug into a much larger computer—the internet. Internet access marks
computer [will] become a museum piece, a reminder of a curious time
another huge transition in the digital landscape. With wider access and
when all of us were forced to be amateur computer technicians” (p. 81).
availability, people are spending more of their lives connected online.
However, if Carr is correct, personal computing may change significantly
In 2000, 46.9 percent of users reported that they accessed the internet
in future, heralded by a move in part to ‘Cloud’ computing coupled with
from home. By 2005, home internet use had almost doubled to 78.6
other more mobile devices such as tablets, smartphones, netbooks and
percent (Campbell, 2005, para 2). This rate of internet adoption increased
thin clients. On the other hand, this could be viewed as too extreme an
as the number of compatible internet devices increased. At the same
idea that does not take social, economic and individuals’ fears into
time, individual devices have imposed limitations on users such as
account, as people may be hesitant to put all their data on the Cloud.
hardware storage, and the plethora of devices has led to an increase in files strewn across multiple devices, resulting in user confusion. A typical Canadian Personal Home/Work Computing scenario - for a couple
Part of a designer’s role is to identify and work with emerging trends. Some experts foremost in computer technology predict that Cloud computing is the next big paradigm shift. In 2007, Eric Schmidt of
+
+
+
+
Google voiced his excitement over the Cloud’s potential in an interview following a search engine conference. This marked the first high-profile
Television + Cable
Desktop computer
USB Storage Device
Analog and Mobile Phone
Mobile Phone
usage of the term ‘Cloud computing’, previously referred to as Utility or Grid Computing. Since then, the term Cloud computing has replaced
+ Printer/Scanning device
+
+
+ Digital Camera
MP3 player
Utility or Grid Computing in popularity. In the interview, Schmidt External Hardrive
Stereo
explains: It starts with the premise that the data services and architecture should be on servers. We call it Cloud computing.... it doesn’t
WWW Web access: Hi Speed
+ Figure 2.03 Many Canadian Households Own Several Computing Devices And Peripheral Computing/Technological Gadgets The following image shows an average number of devices and peripherals for a Canadian couple. Source from Probe data in this study.
The Potential for Personal Computing to Transition to Cloud Technology
matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what-have-you—or new devices still to be developed—you can get access to the Cloud. (Sullivan, interview, 2006, para. 8)
In this ever-shifting digital landscape, a new question arises: will the Typical Cloud Service useage
Gmail maintain its relevance? In his book The Big Switch, personal computer
Cloud computing provides access to shared servers (and, in turn, to
Carr (2008) predicts a radical new approach to computing, one that
hardware and software on demand), thus centralizing storage. It is
does away with the PC entirely, as the idea of “having files and software
usually a paid subscription or pay-as-you-go service and gives businesses
locked into PC hard drives will be an unnecessary nuisance” (p. 81).
and/or individuals the ability to use applications and storage without
Thesis by: C. Ellicott, 04.08.2011
18
19
The Changing Digital Landscape « Towards a New Conceptual Framework
ever needing to buy or own them outright. Some Cloud services, like
when they access and use sites such as Hotmail, Gmail, Yahoo mail,
Facebook, are free. All that is required for cloud computing is access
Facebook, Twitter, Flickr, and so on. One might question just how many
to a computing device and a browser with internet access. Enthusiasts
current users of webmail or social networking services are aware they
of the Cloud revolution use this analogy to describe it: “If you only need
are using Cloud services or are cognizant of the implications of such use.
milk, [why] would you buy a cow?” (Wikinvest, 2009, para 2), implying
What are the consequences of privatization and corporate control of
that it would be illogical to buy hardware and software if all that is
the web through Cloud-like services? Issues of ownership, privacy and
needed is internet access.
security, access and cost require serious consideration.
Utility Computing has been servicing the corporate domain since
Ownership
the early 1990s. It offered much the same overarching services as the
The impact of ownership could be overwhelming to the personal
Cloud currently offers individuals today—access to storage, hardware
computer user, with companies monitoring data, controlling data and
and ‘Software as a Service’ (SaaS). Cloud computing has now moved
perhaps controlling the voice of data creation. A question of who owns
to personal computing. This adjustment in focus mimics how PCs
the data could also threaten an individual’s democratic digital rights (i.e.,
came into existence, first taking root in business and academia and
the right to choose a product from an available selection). For example,
then pushing into the personal domain.
Apple has a stranglehold on applications it sells through its app store. If Apple does not like an application, for whatever reason, it can deny
In July of 2009, Google announced Chrome OS, its first operating
its availability on all its iDevices.
system that relies solely on the Cloud to function. Chrome OS is designed to run on computers that will ship with as little internal storage
Canadians have a long history of ownership of tangible physical assets:
as a phone. Google’s OS leverages the power of the Cloud to run on
What can be seen and held, can be owned. On the other hand, intangible
less powerful and less expensive hardware, such as netbooks or smart-
assets such as intellectual property have been mainly a concern for
phones. In December of 2010, Google began beta testing of its first
artists, writers, musicians, engineers, etc. There has been a transition of
CR-48 netbook, with only 16 gigabytes of onboard storage. Microsoft’s
late where intangible assets are becoming just as much a concern as
Office Suite installs in excess of 70 megabytes and therefore could not
one’s physical assets to both the individual and the business/professional
be installed on such a machine clearly, making the CR-48 primarily
person. People are publishing personal thoughts, content and images on
viable for Cloud computing.
public online environments such as Facebook, Flickr, blog sites, etc. with little regard to their rights or the consequences of losing their rights.
Issues Related to The Shift to Cloud Services
This disregard for consequences perhaps arises from the fact that, up
Unbeknownst to many users, webmail and social networking services
until now, few users had intellectual properties in need of protection.
have been utilizing the Cloud computing paradigm for quite some time
However, with the constant sharing of information and images on public
Thesis by: C. Ellicott, 04.08.2011
20
21
The Changing Digital Landscape « Towards a New Conceptual Framework
online spaces, the question of intellectual property rights could pose
the company’s fine-printed assertions of ownership. These issues may
a problem in the future.
likely increase in importance to individuals as they extend their Cloud services. As one journalist argues, “having a few huge corporations
If we examine the history of ownership and property, it seems hard to
control our outlets of expression could lead to less aggressive news
believe that people will relinquish their rights so easily. The concept of
coverage and a more muted marketplace of ideas” (Rosenwein,1999,
ownership and property, a man-made social construct, stretches as far
para. 4). This could mark a change in our fundamental online rights,
back as 3000 years ago to Plato and Aristotle (Clement, 1983; Pipes,
with Facebook setting a precedent that other companies may follow.
1999). Feudal England brought about a division of land/property in
This is a troubling concept, especially for a user whose entire data
which the King ruled and owned the land. However, when the feudal
collection is stored with a Cloud provider. Not only might there be
system ended, the allodial system (1650) ensured land ownership rights
privacy issues but it makes a lot of data vulnerable for loss or theft.
to the individual (though still involving constraints) in England. The above example pertains to land ownership but also encompasses ownership of
Moreover, what if the data hosting company that has all one’s data goes
objects and intangible assets that are jointly and/or individually owned.
out of business? Delicious, a free cloud-based social bookmarking web
A formalization of the concept of ownership with regards to private
service and the most popular service of its kind, is now in the process of
property has more recently been defined by laws that govern an individual’s
moving ownership. While they give the option to the user to migrate to
property (Clement, 1983).
other Cloud services, it is not an ideal situation.
Privacy and Security Privacy and security in the Cloud is a legitimate concern. People are becoming increasingly wary of privacy and security issues, and with good cause. Not too long ago, companies such as Facebook claimed all data posted on their site belonged to them. Facebook has been heavily criticized for changing privacy rights at their whim without making it overtly known to their users. The power that corporations have over what, in most cases, is assumed by users to be private interactions or experiences on an online system may be jeopardizing personal freedoms. Facebook is a good example of this tenuous (and for many consumers, confusing) concept that pits the public’s expectations of privacy against
Access is key, especially when using the Cloud, and will become even more imperative the more dependent we become on online status. It does seem that a shift in our language may suggest a shift in consumer behavior. The word ‘access’ was once confined to the noun form, referring to questions of admittance to physical spaces; now, access is a verb in the dictionary, signaling its new, more expansive use in our lives and becoming one of the most used words in contemporary society (Rifkin, 2000). Access not only depends on a change in ownership status, from ownership to membership (access) as Rifkin (2000) writes, but also deals with issues of politics as well as social and technical drivers. Access can affect the control of information.
Thesis by: C. Ellicott, 04.08.2011
22
23
The Changing Digital Landscape « Towards a New Conceptual Framework
Cost
a vested interest in the technology’s success. However, for personal
In Age of Access, Rifkin (2000) observed that there was a fundamental
users, factors such as ownership, privacy & security, access and cost
shift in consumer attitudes from ownership (i.e., ‘to have, to hold’ and ‘to
will be the main determinants of personal digital property and the
accumulate’) to membership. Increasingly, individuals pay for the experi-
viability of Cloud computing into the future.
ence of using things in the form of rent, subscriptions, memberships, leases, and retainers, rather than paying to own the things themselves.
The Shift from Inhabiting Physical Space to Dwelling in a Virtual World
For instance, Rifkin (2000) sees a trend of people giving up ownership
Another dimension of change, as Thackara describes it, is from “terra
of their automobiles in favor of leasing cars, or discarding answering
firma to terabytes”, a change that will continue “to transform the way
machines in favor of subscribing to monthly digital answering service
we live” (2000, p. 4). This infers that a continued physical abstraction
(Carr 2010). One might argue that the reason for obtaining a subscription,
is underway and has been for some time now. For instance, people used
lease, or retainer is mainly due to the fact that most were for purchases
to own songs on physical music albums; these evolved into cassette
of expensive items, which most individuals could not afford without a
and eight-track tapes, then CDs, and then mp3s on a computer or iPod.
monthly payment plan.
Today, many of these songs exist only in the Cloud with services like Grooveshark and iTunes. Digital tools and content can now be organized
How affordable will personal computing subscription services be for
into a virtual non-localized paradigm, which has sometimes been
the average user? It costs a lot more to pay for an answering machine
referred to as moving from “desktop to cloudtop”. Virtualisation is
subscription service than to buy the physical device outright. Indeed,
another word describing the transition from physical reality to a virtual
the cost of a physical answering machine is far less than the cost of a
one. It is fast becoming an industry standard word, as Carr suggests, and
first year’s subscription to a digital answering service. This new trend
“refers to the use of software to simulate hardware” (Carr, 2008, p. 96).
of moving to a subscription model online service may die out if it is proven not to be viable costing solution for the average user. The
A further aspect to this change is the “digital divide”, a term coined by
alternative may be a possible hybrid solution that people adopt,
Rifkin (2000, p. 13). It refers to the ‘divide’ between those who are
using some subscription services but not all.
moving their focus from a physical landscape to cyberspace and those who, for various reasons, are unable or unwilling to do so. This is but one
Due to the Cloud’s relative newness, there is no way of knowing for
perspective of the divide; it could be multi-dimensional, dividing generations,
certain where the concept of Cloud computing will go. Its most boisterous
have’s from have-not’s, new and emerging countries from wealthier and
corporate cheerleaders (e.g., Amazon, Microsoft and Google) have
more established ones, and creating socio-economic schisms.
Thesis by: C. Ellicott, 04.08.2011
24
The Changing Digital Landscape « Towards a New Conceptual Framework
25
Summary This chapter reflects on and outlines the history of change in computing technology, which is accelerating at an exponential rate. The Cloud is currently being touted as the latest shift in personal computing culture, but how it will be incorporated into the personal computing paradigm— or whether it is even feasible, let alone permanent—is yet to be seen. How it will be operationalized is also yet to be determined. When observing emerging trends, it is important for designers to examine and explore contexts of emergence, identify drivers for change, and assess economic, environmental, socio-cultural and technological impacts of that change. However, and more importantly, it is imperative that designers do something about all this, not as mere cultural observers and reflectors of the status quo but as visionaries and forgers of the future.
Based on what has been learned from an exploration of this domain, the following can be drawn upon to inform a design proposal: the power of analogy used in computing interface design; the impact of the proliferation of devices on the user and the devices’ inherent limitations; how design might help to close the digital divide; and, the feasibility of using the Cloud as a technology to leverage the design.
03 The Impact of Technology on the Individual
26
27
The Impact of Technology on the Individual « Towards a New Conceptual Framework
Introduction
more easily. With ease of access to ironing came a higher expectation
This study underlines the need to mitigate the negative effects of
of presentation and appearance, and so ironing became a morally good
technological developments on the personal computing experience,
thing to do. Smooth clothing was increasingly associated with respectability,
with specific regard to four potential areas that design could address
while wrinkles indicated slovenliness (Carr, 2008).
—fragmentation of data, lack of synchronization, and depersonalization of the computing experience. In addition to changing the concepts
The mass availability and consumption of electricity brought about
of ‘desk’ and ‘workspace’, details of personal digital behavioral habits
another shift—a post-war (i.e., 1940s-1950s) proliferation of household
inform a design proposal that engages with the idea of a multi-dimension-
technologies, which led to social change. However, instead of lightening
al digital avatar as a way of creating cohesion, control, and ownership of
workloads, as was advertised, appliances made tasks easier to perform
an individual’s data.
but increased the overall number of tasks per household. As Cowan (1976) explained in an article on the scourge of modern conveniences,
The previous chapter framed the numerous recent changes in digital
”some chores were eliminated—like hauling water, heating water on the
technology that affect North American industry and society in general.
stove, maintaining the kitchen fire—[but] other chores were added, most
Yet to be explored are how those technological changes impact the
notably the chore of keeping yet another room scrupulously clean” (p. 6).
individual. Assuming that broadband and the web are here to stay, some
This may in some way parallel our current technological situation, where
variation of the Cloud may continue to prevail. The question is: how will
the proliferation of communication devices is fragmenting our resources
this latest technology affect the individual? In this chapter, a quick scan
and thus further burdening us, financially and time-wise.
is made of some noteworthy technological advances that have profoundly affected societies in the past to compare those advances to the personal
The most prevalent of all modern day household appliances is our own
computing revolution and its impact on current society. More specifically,
personal computer, which is connected to a new type of grid—the world
this chapter will address the impact of today’s technological revolution
wide web. In just a few decades, this machine has dramatically altered
on individual users by examining the changing digital landscape’s rela-
the way we live. Like post-war modern conveniences, computers and the
tionship between people and data, people and computing, and people
internet were supposed to lighten work loads and enable people’s needs
and their environments.
to be met. Instead, these latest tools of convenience are draining people of time and energy (Pepperberg, 2010). This unintended impact of
According to Carr (2008), the advent of the electrical grid altered both
technological advances on the individual suggests that we need to
consumer behaviour and societal expectations. One example of this is
reflect on the ways in which technology is influencing society and what
how, with national electricity, a broader swath of the populace could iron
implications this has for our future.
Thesis by: C. Ellicott, 04.08.2011
28 Psychographics Attributes relating to the personality, values, attitudes, interests, or lifestyles of people. In contrast to demographics, which simply keep track of variables such as age and
29
The Impact of Technology on the Individual « Towards a New Conceptual Framework
For example, a growing number of middle-class North American youth
world’. This has led to people spending increasing amounts of time
are spending increasing amounts of time in front of computers from
online, where a plethora of services generate new wants and needs.
infancy onwards and feel most comfortable in these simulated environments.
In an article, We Are the Web, 2005, Wired Magazine’s Kevin Kelly
Taking their cue from previous generational labels, several authors and
expands on this assumption regarding people’s reliance on the
researchers (Rifkin, 2000; Thagard 2005; Friedmann, 2001) have
cyber world:
suggested new psychographic stereotypes for this electronics-savvy
What will most surprise us is how dependent we will be....
generations, such as protean generation, dot-coms, Generation Y,
We already find it easier to Google something a second or third time
and millennials.
rather than remember it ourselves. The more we teach this mega
gender. Psychographics are able to give a more in-depth sense of people than demographics. It’s not about being a 32-year-old white female. It’s about whether you like being a 32-year-old white female or not. Protean Being able and willing to change or
computer, the more it will assume responsibility for our knowing.
adapt. Because of the always advancing nature of technology, we
Moreover, Rifkin (2000) contends that this new computing and online
It will become our memory. Then it will become our identity. Many
activity is creating a new type of user. The “protean generation”
people, when divorced from the Machine, won’t feel like themselves—
is far more comfortable conducting business and engaging in social
as if they’d had a lobotomy. (Kelly, 2005, para 55)
are living in a protean world. And most people are protean boys/girls. Or, at least, they’d better be if they want to keep up. Dot-com A business that does most of its
activity in cyberspace, and adapts easily to simulated worlds. This preference for the virtual over the real (or the electronic over the
While Kelly’s observation may seem far-fetched to some people, many
physical) represents a significant shift in the way people interact with
users are becoming increasingly reliant on technology and often feel
their environments. Moreover, Rifkin argues that, for this generation,
‘lost’ without it. In You Are Not a Gadget, Lanier (2010) echoes Kelly’s
“access already is a way of life, and while property is important, being
thoughts, suggesting that “separation anxiety is assuaged by constant
connected is even more important” (p. 12). Technology, it seems is
connection.” People, especially young adults, constantly crave connec-
altering human consciousness as well as expectations; people are changing
tion and the stimulation associated with being connected. They avoid
cooler name.
what they do, how they behave, and how they view their life. In turn,
‘shutting off’ unless absolutely necessary. Many sleep by the glow of
Generation Y/Millennials
|their environmental focus is shifting from a physical reality to a virtual
their laptops with their cell phones, set on ‘vibrate’, tucked under their
one. The desktop computer is likewise evolving. Where once people had
pillow (p. 180).
business on the Internet. It can refer to present-day companies but also is used to specifically refer to online companies in the late 1990s. You know all those people who got rich very quickly in the late 90s and everybody kept saying, “I wish I had a company like that, I want a piece of the pie”. That’s what they were wishing for. Shame it didn’t have a
The generation following Generation X. Many of them are children of Baby Boomers and are characterized by increased use of communications, media, and digital technology. What do you call a generation that don’t
to sit at a desk to do their computing, they can now use a digital device almost anywhere, essentially making any environment their ‘desk’.
Fragmentation The main consequence of modern computing use is being on the receiving
fall under specific birth dates and have greatly varying characteristics? Source for all the above are adapted from Wikipedia: The Free Encyclopedia.
The proliferation of digital devices has led the home user to be depen-
end of a barrage of information. These may come in longer formats, like
dent on connectivity through those various devices. Connectivity to the
videos, or short bursts, like tweets. Ontologist, Richard Foreman suggests
internet gives constant access to information, shopping, advertisements,
that people are becoming “’pancake people’—spread wide and thin as
entertainment, people, experiences, social media, communication—in
[they] connect with that vast network of information accessed by the mere
other words, an alternative, and very compelling, living, breathing, ‘other
touch of a button” (Brockman, 2010, para 14). Similarly, Carr (2008) posits
Thesis by: C. Ellicott, 04.08.2011
30
31
The Impact of Technology on the Individual « Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
that the internet’s demand on people’s attention has changed them from
The internet and its attendant technologies may actually be changing
beings who participate in an information society to beings who inhabit
brain activity on a deep biological level (Margulis, 2010). As well, it may
an “interruption society”. One can see the evidence all around, with people
be affecting intelligence and fracturing attention span, possibly creating
to have come about just as computers
absorbing 140-character bytes of information or 60-second bursts of
complete generations of ADHD-challenged individuals. Is the internet
funny that. Now they have added
video, all the while scanning through e-mails and Instant Messages (IM).
really changing the way we think or, as Hillis (2010) suggests, “can we
ADHD or ADD Once known as ADD, attention deficit disorder, a rather new disorder, seems were hitting the younger generations, hyperactivity to the name , but it stills refers to an inattentive, distractible, disorganized, forgetful person
change the way the Internet thinks?” (“Early Responders”, para 7). Evidence for these observations and claims on the impact of new
Is this just another technological neophobia, like when TV was intro-
technologies and the internet are not merely anecdotal. According to a
duced into American households (Samuel, 2001)? Gopnik (2011) argues
recent report, people in 2008 consumed triple the daily information they
that people feel the internet puts them in a state of disassociation and
did in the 1960s. Moreover, as people take more information onboard, they
fragmentation. Previously, life was viewed as whole or stable; now, it is
are constantly shifting their attention, as illustrated by a New York Times
fragmented, multi-partite and unstable. This feeling of fractured living
technology analyst: “Computer users at work change windows or check
may be generational. As stated earlier, the new generation born into
e-mail or other programs nearly 37 times an hour” (Ritchel, 2010, para 14).
the high-tech environment may be more comfortable in this ‘splintered’
This demonstrates that people’s depth of focus is changing to shorter,
landscape, whereas for older generations, it takes a while to get used to
faster skimming while multi-tasking, which may have long-ranging affects.
this new reality.
with symptoms of hyperactivity or impulsiveness. That just about covers everyone now-a-days. Source adapted from Wikipedia: The Free Encyclopedia.
Ritchel (2010) also reports that multi-tasking is having an affect on our brains by triggering regular primitive impulses. For instance, if a person
Anderson (2010) from Wired magazine documented an average day
trains for a marathon after years of being sedentary, his or her muscles
of a technology user:
will reshape and change accordingly. Therefore, it should not be surprising
that our brain is reshaping and changing with different kinds of use. The
one app. During breakfast you browse Facebook, Twitter, and The
question here is whether these changes are beneficial or detrimental and
New York Times — three more apps. On the way to the office, you
how they are affecting each individual. Despite the accumulating scientific
listen to a podcast on your smartphone. Another app. At work, you
evidence , Dr. Pepperberg, a research scientist at the Massachusetts
scroll through RSS feeds in a reader and have Skype and IM conversa
Institute of Technology, is hesitant to accept the scientists’ suppositions
tions. More apps. At the end of the day, you come home, make dinner
from the created for smaller mobile
regarding brain alterations. She asks: “[c]an the internet [really] give
while listening to Pandora, play some games on Xbox Live, and watch
relatively cheap (.99-$9.99) Source
people ADD, does it really change the way people think, or just make
a movie on Netflix’s streaming service. (para. 1)
You wake up and check your e-mail on your bedside iPad — that’s Apps This has become a new term in its own right despite it being the shortened term for ‘applications’. This shorthand term has come to refer to applications downloaded devices which can be free or adapted from Wikipedia: The
it more difficult to have the time to think? There is always the ‘off’ button allowing a return to normalcy (Pepperberg, 2010, para. 8).
While Anderson’s recitation is more about apps usage, his laundry list of new technology does offer insight into how some people uses apps and services, and skips from activity to activity and amongst different
Free Encyclopedia.
32 Kilobyte (kB)
33
The Impact of Technology on the Individual « Towards a New Conceptual Framework
128 kilobyte(kb) onboard storage Macintosh computer
software. Now if one adds to the list a job that involves computing,
A unit of digital information equal
Thesis by: C. Ellicott, 04.08.2011 Figure 3.01 Data Storage Figure Shows how the cost of storage has drastically reduced as consumers need and usage of storage has increased.
1989
to 1000 bytes. Kilo meaning one thousand. Historically it was oddly 1,024 bytes, ambiguous yes, but thankfully people like exactness so its back to what it should be.
the ‘average user’ would have been connected to some form of digital
1990
device for most of the day. 1.44 Megabyte (MB) (2.0 MB unformatted) floppy drive
Megabyte (MB) Equals 1000 kilobytes of information Gigabyte (GB)
1 GB=$9000 (approx)
1997
1 Gigabyte (GB) storage was the size of a 500lb machine or the size of a refrigerator
As our bodies adopt sedentary lifestyles demanded by current digital
Equals 1000 megabytes of information Terabyte (TB)
dependence, the constant shifting from window to window and online
Equals 1000 gigabytes of information Petabyte (TB) Equals 1000 terabytes of information Exabytes (EB) A unit of information equal to one quintillion bytes (that’s 1,000,000,000,000,000,000 B).
activity to online activity may trigger a primal instinct to react upon those abrupt changes as opportunities and threats. Such reactions
8MB USB drive
2000
stimulate the part of the brain that provides dopamine, which can be
Bit Torrent File sharing system launches a (P2P) peer-to-peer protocol. Drives need for more personal storage capacity
2001
10GB Xbox The first game console with a built in hard drive
2002
1 GB = $7.30 (approx)
very addictive, so without the bursts of excitement, a sense of longing
It’s like when you make up a sound before illion because it’s so big and trillion. And so on...
malaise, will it be the job of a psychiatrist to prescribe drugs or help quell
Above sources adapted from
newly-formed technological habits, or might design be able to intervene?
Wikipedia: The Free Encyclopedia.
4.7GB to 8.5GB Dual layer DVDs now available allowing 12 CDs to fit neatly on a DVD
and boredom creeps in (Ritchel, 2010). In such a self-inflicted cyclical
you can’t think of anything beyond a
5GB iPod Classic holds 1000 songs or 75+ albums
CD/DVD life expectancy 2-5 years, ideal conditionss can last 10+ years
Some software companies have already addressed this issue by creating software that forces people to focus on one activity at a time.
MP3 compression 200 songs can fit on a CD
Nevertheless, however well intended, such a product might not succeed
speed diversions.
Synchronization Individuals are, for the most part, responsible for this digital dependency Figure 3.01 (Right) Source Images: w:User:Grm wnr, (2006). [Macintosh Image]. Reproduced from http://en.wikipedia. org/wiki/Macintosh; Kyro, (2009). [iPod Image]. Reproduced from http://en.wikipedia. org/wiki/Ipod; Yakov Lapitsky (2005). [You Tube Video]. Reproduced http://www. youtube.com/watch?v=jNQXAC9IVRw Source Facts: Adapted from “Decade of Storage: From USB to Cloud Storage”, by A.Davis, 2011, Rackspace, Retreived from http://www. rackspace.com/cloudblog/2011/01/18/ decade-of-storage-from-usb-tocloud/
and information deluge by creating more and more personal data all the time, whether as video, sound, imagery, writing, etc. Wozniak (2010)
45 terabytes (TB) of data is stored on YouTube, first video “Me at the Zoo” was uploaded
2006 6
Floppy drive dies for good
FaceBook & Flickr launch having large amounts of peoples data
2004
2005 1 GB= $1.94 (approx)
in a marketplace brimming with consumers who are hooked on high-
2003
1 GB=$2.58 (approx)
First 1 TB hard drive ships The largest available now = 1/10th of the storage of Library of Congress
reports that 70% of digital data is created by individuals (p. 8). The more Twitter launches
data individuals generate, the more they have to manage, and the more devices they own, the more data they have to manage across multiple devices and online space the more data is scattered amongst them with little or no synchronization.
2007 1 GB = $0.50 (approx)
3.6 Zetabytes per US home of information consumption
0 2008
First open source API for creating Private Clouds
2009
First wireless SD Card that can transmit stored data wirelessly
1 GB = $0.27 (approx) 1 GB= $0.6
2010
34 Hyperconnectivity
35
The Impact of Technology on the Individual « Towards a New Conceptual Framework
However, as individuals generate and consume more of the world’s
and in how many shapes and forms (e.g., physical or virtual). Data
digital content, they are slowly realizing that they have added yet
evolves with the person who creates it and can be divided into at
another task to their daily life. Much like the women in the 1950s and
least seven categories, as follows.
With all of the devices connected to a network exceeding the number of people in the network, people are more connected than ever. And to think, being hard to reach used to be a sign that you were busy and interesting. Source adapted from Wikipedia: The Free Encyclopedia
1960s overwhelmed by their accumulating ‘mod cons’, individuals today have to manage, archive and filter their own “information heirlooms”,
1. Personal data, generated purposefully by the user and mainly kept on
referred to here as a Personal information Collection (PIC) (Gantz, 2007).
personal PCs in a home environment. This would generally incorporate
Williams et al. (2009) defines a PIC as “a space we turn to first when
raw data such as digital photos, imagery, writings, files, documentations,
we need to do a task or pursue an interest… [or] informal diverse and
videos, sound collections and word processing documents. A less
expanding digital memory collections accumulated and maintained by
common form of known personal data is info in the form of bookmarks,
individuals [which] support their work and leisure needs” (p. 347).
contacts, e-mails, IMs, skype chats, cached pages, and so on (Williams et al., 2009).These are part of our data trail.
A fundamental aspect of computer-based activity is the management of people’s digital information, also referred to as Personal Information
2. Personal archived data, accumulated over time and generally kept off
Management (PIM) (Williams et al., 2009). Poorly synchronized devices
site or on external media. This would be the same raw data described
are creating numerous repositories for information, as are software and
above but not in use anymore. Most likely it has been backed up and
utilities. The diversity and proliferation of individual’s digital collections,
remotely stored on a computer, external hard drive, or on temporary
as Williams et al. (2009) suggests, is under-researched. Moreover,
media devices such as CDs and DVDs. The sole purpose of this data is
futurists are predicting that, by 2035, more than one trillion devices
for retrieval at a later date.
(most of them wireless) will be connected to global networks in what they term ‘hyperconnectivity’ (Nortel Networks, 2010). According to
3. Secondary or other digital device data. This data could either be a
Gantz (2007), storage in 2007 was 267 exabytes, a figure which included
replication or specific to the device. Although synching is getting better,
empty usable space on hard drives, tapes, CDs, DVDs and memory.
it is still far from seamless. With creative digital applications for secondary
However, the data created that year was 281 exabytes, which exceeded
devices, people are making and storing images, music, and documents on
the amount of actual storage space. This suggests that not everything
devices such as smartphones, e-books, mp3 players, video recorders,
that is created is kept. It was predicted that between 2007 and 2011,
digital cameras, etc.
people may require 1,800 exabytes of storage, a growth of 60% from 2007 (Gantz, 2007).
4. Personal data on Facebook, Gmail, Flickr, Twitter, Blogger and other communication and social media reside in the Cloud. It allows the ability
What is yet poorly understood is just how many locations are currently
to create new data, replicate data, and create avatars with personal
being used to store personal data, as well as where these locations exist
information.
Thesis by: C. Ellicott, 04.08.2011
36
37
The Impact of Technology on the Individual « Towards a New Conceptual Framework
5. Invisible and partially-visible data trails online as well as on metadata
7. Retrieval applications, tools and histories: These are “applications,
(Williams et al., 2009). This is data usually inaccessible by people but still
tools (such as a desktop search facility) and constructs (e.g., associated
part of their digital data creation. For example, it could include the data
properties, folders, etc.) that support the acquisition, storage, retrieval
trail of a person’s buying habits, search habits and website movements
and use of the information (Williams et al., 2009, p. 345).
kept by various companies such as Google or Ebay. As described by Williams et al. (2009), “metadata [is] system-generated data about a
While this list may not be exhaustive, it does offer an idea of how extensive
document’s creation, location, size, etc. [It] may also be considered part
personal data can be, underscoring Williams et al.’s (2009) contention
of a digital collection, as it may be required in retrieval, especially where
that deciding which artifacts constitute an individual’s meaningful digital
a vast amount of documentation is being generated — an extreme
collection can be philosophically challenging. We could also question
example being efforts to capture every moment of one’s life” (p. 345).
how far an individual’s data trail travels and when it ceases to belong to
For example, on these online trails, people can check their photos and
that individual, further blurring the demarcation lines between private
see data, file size, creation date, etc. Passwords are a more visible form
and public data. It can thus be difficult to know for certain where an
of data; however, they tend to be stored with companies one has created
individual’s identity and data starts and ends. Not only can the ambiguity
memberships with.
of ones data make it difficult to manage, but the sheer volume as well as number of places it exists makes it a big task.
6. Customized workspaces, system preferences, software preferences, cookies and settings involve, for instance, customized settings in an
Summary
application. Adobe allows the user to move palettes around, add and
From the research presented in this chapter, we can see there is an
subtract them, and then save the settings for next time. Taking this
obvious shift in the way people relate to their computer. Due mainly to
concept further, users usually modify or customize their software to
the growing number of devices, the computing experience is becoming
suit how they work (i.e., in Microsoft Word, users organize their palettes
increasingly fragmented, personal data is becoming multi-dimensional
according to personal preference, or Facebook users add different
and splintered, and limited synchronicity among devices and data forms
application to their accounts). These settings and modifications are
is hindering inter connectivity. Moreover, this has affected an individual’s
set up in such a way that they do not need to be re-set for each use.
environment, with a shift from the physical to virtual, where a ‘desk’ is
Similarly, cookies are stored on computers to ‘remember’ passwords,
now less a physical place and more a window onto a virtual world.
which the appropriate websites can access when prompted. Back-ups, software updates and virus scans are further examples of settings that
The end result of such radical change is that there appears to be
people set up to facilitate good PIM at a time that is convenient.
decreased relevance of the desktop. Even language is starting to signal
This data is also part of a PIC.
this mental shift: where once people worked at their desks, now they
Thesis by: C. Ellicott, 04.08.2011
38
The Impact of Technology on the Individual ÂŤ Towards a New Conceptual Framework
39
work at their computers. As we see with the proliferation of personal data, people are not only impacted by technology but, as individuals, are themselves impacting technology. It will therefore be important to involve the individual in helping to identify and meet his or her real needs. Issues related to fragmentation and synchronization of personal data collections provide fruitful ground for designers to explore. Based on what has been gleaned from a contextual search and review of the impact of personal computing technology on the individual, the following can be drawn upon to inform a design proposal to address issues of data fragmentation: the current abundance of data collections; where data collections start and end; synchronization; and the new workload of maintaining and organizing data as an alternative space.
04 Changing Methods and digital Methodology landscape
40
41
Methods and Methodology « Towards a New Conceptual Framework
INTRODUCTION
Thesis by: C. Ellicott, 04.08.2011
Starts Here
The purpose of this chapter is to describe the methodology and methods used in this exploratory study of how the changing digital landscape is shifting relationships between people and data, people and computing, and people and their environments. Action Research (AR) methodology
4.18 Evolve
4.16 Study & Measure
examine the effects of the technological revolution on the personal
4
Ph as e
>>
& rch
create a better digital environment for individual users.
1.2 Interviews
1>
>>
Ph as e
4.15 Launch
1.1 Re-define brief
a se Re
computing culture. It aims to determine how design may be used to
>
ch un La
ation valu E &
Refine
4.17 Evaluate
as design to reflect, re-iterate and re-evaluate. This study’s goal is to
1.0 Problem
Problem
was chosen to conduct this research because it mirrors the same need
tegy Stra
Solu
tion
Design Process:
3.14 Co-ordinate
is also examined. Each of the research methods used, as well as the data 3.13 Implementation
3.12 Production
2.5 Ideation & Brainstorming
ion
the precursor to the final “ghost in the machine” idea. Sample screens
t nta me
and figures are included to illustrate the ideas and iterations that were
&
and storyboards for a new type of system, as well as ideas for possible
o Pr
du c
scenarios of its use, have been included in this section.
tio
n
3.11 Testing
ACTION RESEARCH METHODOLOGY As its name implies, Action Research (AR) is a research methodology
1.4 Strategy & Plan
ig n
collection methods, are described in detail. A number of rough sketches
Iterative; the process is in constant review, amending, adaption, & refinement and renewal of the problem.
Phase 3< Imple
emphases on iteration and reflection. The rationale behind this methodology
es
In the following sections, the AR methodology process is discussed, with
1.3 Research & Analysis
2< Phase
& pt ce n Co
D
2.6 Concept & Sketches
2.7 Refine Concepts
3.10 Prototype 2.9 Evaluation
2.8 Mock Up
that emphasizes progressive problem-finding through reflective processes. As such, AR naturally mimics the cyclical process of design practice, making it an ideal methodology for this design proposal. As Cal Swann (2002) notes, AR follows a four-step process: plan, act, observe, and reflect, which mirrors the four-step process used in design (see Figure opposite and on next page) An integral part of AR is collaboration. In the design process, collaboration also occurs through a series of brainstorming sessions and meetings with stakeholders, but AR tends to be
Figure 4.01 A Four Phase Iterative Design Process The four phase design process is a very similar process taken by action research so makes this methodology an ideal choice for this study. Copyright 2010, by C. Ellicott.
43
Methods and Methodology « Towards a New Conceptual Framework
Starts Here
c
ig n
es D
Refine Contextual Research
ct ru t s on
Brainstorm “Project” Personal “Cloud” Pilot
ic
ge ed l ow n K
Pl an ic
te g
Write Personas
te g
or Idea
Problem
Re fle >
4 Ph as e
Ph as e
4
Refine Solutio n OR N ew Pro b
Re fle
> 4 Ph as e
e ledg now K ct tru ns o C
Cultural Probes
Sketching
fe re n
C Source: Adapted from Article “Action research and the practice of design,” by C. Swann, 2002, Design Issues: Vol. 18, Number 2, pp. 72-94. Copyright 2010, by C. Ellicott.
ng ni ea
Figure 4.02 Action Research Methodology & Design Methodology Overlap A cyclical four phase action research process is mapped to a similar 4 cycle design process
M
n
Diagramatics
f di
tio ta en m le mp ct: I Phase 2 < A
ra St of
egy trat &S
n
Write Outline Strategic Plan
ith w
ds
pt, nce Phase 2< Co
io at I de
Timeline Analysis
5 Why’s?
on cti
f di
et ho
n
Review
sis aly
o Pr
ith w
m
tio
&
>>
Record
a ate alu : Ev
&
on cti
du c
t.
tion
OBSERVE
ion
a ate alu : Ev
t nta me
Iterative; the process is in constant review, amending, adaption, & refinement and renewal of the problem.
>> Refine Contextual Research
Solu
Phase 3 < Observe
Phase 3< Imple
Phase 3 < Observe
Design Process:
Diagram & Sketch Findings
Scenario Building
PLAN
An
tion
egy trat &S
Solu
fe re n
sis aly
R
>>
REFLECT
em bl ro
1>
ng ni ea
Ph as e
M
>
Pl an :P
> Ph s& as New Problem u lt s e1 e r Write thesis e > t a Pl u Contextual Search an al v :P E : Prototype Diagramatics t
t uc tr
t uc tr
>
& Strategy sis a ly An
sed
as e1
h, rc
rop o
Ph
ea es
>>
>
Co ns
Discover or Propose Problem or Idea
search on re acti
An
ion luat Eva & h nc
Co ns
em bl ro
c
lem
Starts Here
>
AP
>
u La
and
>
t
u lt es er t a lu va :E
search on re acti
Thesis by: C. Ellicott, 04.08.2011
Pl an
42
Interview Conclusions ra Cloud App Mind Map St Probe Conclusions of n et ho tio Conduct Interviews ds nta e l em mp ct: I Phase 2 < A
tm
ACT
Source: Adapted from Article “Action research and the practice of design,” by C. Swann, 2002, Design Issues: Vol. 18, Number 2, pp. 72-94. Copyright 2010, by C. Ellicott.
Figure 4.03 Methods used in Study Integrated on the Action Research Process The figure above maps the design methods used in this thesis study as they pertain to a specific phase of the research process.
44
45
Methods and Methodology « Towards a New Conceptual Framework
more rigorous (Swann 2002). AR’s guideline to reflect and work iteratively
reviews and video as well as information gathered through the active
is essential and parallels the design process but, unlike AR, design does
participation of the end-user. By focusing on the end-user, active
not always allow or involve “reflection in action” (Swann 2002, p. 59).
researchers are able to improve the way they address an issue. Further, AR prompts designers to seek clues regarding the tacit dimension of
Swann (2002) suggests that AR begins with “a problem, dilemma, or
individual desire, as their desire might not be evident due to the partici-
ambiguity in the situation in which the practitioners find themselves,”
pants’ inability or unwillingness to adequately articulate them.
as a means to invite the end user to participate in the research process (p. 55). AR is primarily an active process that culminates in reflection or
A DEEPER UNDERSTANDING: REFLECTION AND ITERATION
synthesis, where collaboration and imagination give way to insight and
Critical reflection is an integral part of this methodology, as it helps to
discovery to create new meaning with the discovered data (p. 54).
build a better understanding of the materials reviewed and allows for more creative interpretations of data. CCAR (para. 4, 2010) describes
AR methodology is based on four overarching principles. These four
the action research methodology as a lived and unscripted performance,
principles state that the research must be:
“an iterative, cyclical process of reflecting on practice, taking an action, reflecting, and taking further action…. [T]he research takes shape while
1. situated in social practice to create change;
it is being performed.” The purpose of a reflective and iterative process is
2. collaborative and participatory;
to garner new information from old or newly-collected data that will lead
3. cyclical, iterative and reflective, to promote continual
to a new understanding of the dilemma and/or continual improvements.
Improvement; and 4. documented in a transparent manner, with results made public.
One of the central methods of reflection used in this study was contextual search and review. Once evaluated, the relevant material led to a new
The Center for Collaborative Action Research (CCAR, 2006) claims
understanding of the three areas of study; fragmentation, lack of
that action researchers engage in a more complex relationship and
synchronization and depersonalization of the computing experience and
deeper understanding of how social and environmental forces interplay.
their inter-relationship, which in turn produced a new set of questions,
Since, according to CCAR, these forces are dynamic, AR is a way to bring
data and avenues for research. As a result the research focus was refined
theory alive through practice. Action Research methodology is a relatively
over time. (See Figure 4.04 on the next page .)
new way of working for designers, who previously tended to employ an ‘open-and-closed’ project-by-project approach.
Critical questioning is another key reflective method that helped to guide this research process. CCAR (2010) contends that “good questions often
In addressing its subject, AR seeks to understand a situation through
arise from visions of improved practice and emerging theories about the
multiple lenses, using various methods such as sketching, literature
change that will move the researcher closer to the ideal state of working
Thesis by: C. Ellicott, 04.08.2011
46
47
Methods and Methodology « Towards a New Conceptual Framework
practices” (para 8). This level of questioning deepened the researcher’s
computer culture. Literature, video, cultural probing, interviews, newspaper
knowledge and understanding of the personal computing paradigm,
articles and industry analysts analysis all helped to get a ‘lay’ of the
technological advancements and the Cloud notion, demanding close
digital landscape and set up the background and context for understand-
examination of evidence garnered from varying perspectives. It also
ing. From it, trends could be discerned, and any flaws or gaps in the
sought to challenge conventional wisdom through critical reflection
information could be identified.
and iteration. Cultural Probing
METHODS OF RESEARCH
Cultural probing is a user-centered research method that can be used to
Some of the key design methods used in this research study included
augment contextual search and review. It was chosen as a method in this
cultural probing, questionnaire, contextual search and review, sketching,
research to enable the process of working with people in a new way and
mind maps, 3D modeling, persona building, reflective questioning,
“to create a dialogue between the designer and the user” (Mattelmaki,
and taxonomy. Utilizing a variety of methods was essential for refinement
2006 p. 42). In the design of a new computer paradigm and the need
and re-iteration of “an idea or possibility, in response to feedback or
for end-user involvement in its development, cultural probing is a way
new ideas” (Berger, p. 45). Further, using a variety of methods helps
of drawing people in and thus mirrors the methodology. It draws on
to illuminate new connections, insights and patterns while involving
people’s expertise, experiences and feelings to help shape new products,
the home computer user as well.
environments, technologies, systems and services.
Davies and Parrinder, authors of Limited Language (2010) argue that
In addition, cultural probing uses an empathetic model of capturing
it is important to bring people “into a more reciprocal relationship with
data in order to better understand and explore the uniqueness of the
their world” and the designer must empathize with the individual or
individual. Probes were inspired by the projective methods used in
as the authors proposes, “people are [the] primary subject matter, and
psychology as well as the thought and practice in contemporary art
people cannot be neatly defined and labeled. [They] are contradictory,
and design (Mattelmaki, 2006). Unlike very systematic and logical
volatile, always surprising” (p. 60). Action Research embraces this
questioning typically found in surveys, probes ask people to think
philosophy, as did this study. Cultural probing, followed by a questionnaire
further, create dream scenarios, draw their reality, and allow participants
and an interview, created a connection with participants/end-users and
to formulate their answers in a way that is comfortable to them. The
also developed a dialogue with them.
cultural probe kits designed for this study contained various materials for sketching, writing, cutting and labeling (with emoticons); photographic
Contextual Search & Review
documentation was encouraged as well. The packs’ most crucial piece
In this research, the contextual search and review provides a broad base
was a custom-designed diary with a few broad questions interspersed
of knowledge and an indication of what is already happening in personal
throughout, such as: “How do you relate to your desk?” and “What items
Thesis by: C. Ellicott, 04.08.2011
48
Methods and Methodology « Towards a New Conceptual Framework
49
Thesis by: C. Ellicott, 04.08.2011
would you take to your dream place?” The probe method encouraged participants to self-document in both visual and written ways.
This study used an approach similar to that of the originators of the probe concept. The approach was reminiscent of what designers do at the ‘concept’ stage of design, where the focus is open and “the challenge consists in finding new ideas rather than dealing with present Figures 4.04 - 4.05 (right) Physical Cultural Probe Packs Mailed To Ten Participants The pack contained various items to participate in the filling out of daily diary in a number of ways. A Camera was not included in the pack due to financial constraints but was a suggested tool to aid respondents in answering some of the extra questions.
problems and solutions” (Mattelmaki, 2006 p. 42).
The purpose of cultural probing in the context of this study was to explore the impact of personal computing and new technologies on the individual computer user. As well, it investigated home and work organizational habits and different notions of what the notion of organization implied and what the term ‘desktop’ meant to the user. The questions were purposefully abstract and encouraged a reflective process. The pack was sent both as a physical package mailed to ten people, and an electronic version e-mailed (including just the diary book and emoticons) that was sent to an additional thirty-five individuals, with a return response of 57%. As a follow up, each of the probe participants was also sent a 20-question survey, where most answers were short (e.g., either ‘yes’ or ‘no’) or check boxes. The questionnaire had an 80% return, with good results.
The use of the cultural probe pack with accompanying diary provided a collection of writings, drawings and images that gave a rich, deep, and personal breadth of information. It allowed the researcher to observe directly into the home of individuals and thereby to generate an intimate portrait, gain user-empathy and develop themes and currents that were later incorporated into the design project. As Mattelmaki (2006) suggests, the real “strength of the material is that it projects a vivid Copyright 2010, by C. Ellicott.
50
51
Methods and Methodology « Towards a New Conceptual Framework
image, offering a contact surface for designer associations and
as open as the probes. As well, perhaps because the questions appeared
empathies” (p. 62).
quicker and easier to answer, the respondent return rate was higher than
Thesis by: C. Ellicott, 04.08.2011
BBH (Bartle Bogle Hegarty) With a name like BBH, one can guess
the probe return rate. However, the survey questionnaire responses
that it is a company of British decent, especially with one of the founders having the title “Sir” preceding his name, Sir John Hegarty. This
Another very important strength of cultural probing is that sometimes the
did not provide much richness or personal detail. While surveys are
findings allow researchers to gain a pre-emptive understanding of design
useful for sourcing data to visualize, they provide little intimacy and
advertising Agency since 1982
issues before they are even articulated by the respondents. Mattelmaki
detail, elements that are required in strong user-centered design. Brace
boundaries. Source adapted from
(2006) underscores this by pointing out that “probes can demarcate fields
(2004) contends that “one of the consequences of the remoteness
of design solutions in the design space before the problem is known and
between researcher and respondent is the difficulty that the structured
produce reportable results for directing the definition of the design
questionnaires have in eliciting creative responses” (p. 5).
company has been a notable London producing “edgy” work that pushes Wikipedia: The Free Encyclopedia.
problem and the decision making about it” (p. 63). Sketches, Figures and Data Visualization: Nevertheless, and despite the many benefits of this method, there were
Through the use of sketches, figures and data visualization, a quicker and
some disadvantages as well. The problem with using the empathic probe
more effective method for reviewing data is created for a reflective process.
method was its subjective nature, which made it difficult to draw general conclusions. As well, this method can be time-consuming and onerous,
Figures and Data Visualization
both for the design researcher and for the respondents. Some participants
One of the older and more prolific designers of data visualization,
perceived the probes as an invasive approach to questioning and collecting
Manuel Lima from BBH (once known as Bartle Bogle Hegarty), published
data, with a few not wanting to participate for that reason and others
a manifesto after he spoke at Kingly Street, London, Eng. in 2009. One of
adopting pseudonyms.
his main points in the manifesto is that “Form Follows Revelation”, stating that “a core ability of Information Visualization is to translate information
Questionnaire Survey
into knowledge. It’s also to facilitate understanding and aid cognition...
A follow-up survey with semi-structured questioning was e-mailed
the purpose should always be centered on explanation and unveiling,
(see Appendix B for full questionnaire) to all probe participants. The
which in turn leads to discovery and insight” (Lima, 2009, “Form Follows
follow-up survey questions were formulated by the probe pack returns.
Revelation”) Figure 4.06 shows a rough visualization of Cloud services.
The probe pack dealt mainly with environmental and organizational aspects, whereas the survey questions dealt with personal computing
By abstracting data in a new format, in this case from a book written
and technology issues. The advantages of the survey were that it was
on the top 100 Cloud services, the final visualization can re-contextualize
much easier to administer and the information was more focused.
the original information and create unforeseeable patterns that lead to
The questions, designed to fill in gaps, were more structured and not
discovery. This was a method of analyzing data from the probes as well as from contextual search and review.
52
Methods and Methodology « Towards a New Conceptual Framework
53
Thesis by: C. Ellicott, 04.08.2011
Sketches Sketching was another method used to clarify issues and ideas in the research process. It captured and distilled concepts for project ideas and fleshed out possible scenarios for the design proposal. Sketching ‘awakens’ ideas stored away from the front of the mind and therefore serves as one of the first steps of a reflective and iterative process. By visualizing ideas, one is able to see them, communicate or present them, and critique them to generate new perspectives. This then gives way either to further refinements or abandonment of an idea, thus strengthening and directing the creative process.
Similarly, Oldach (1995) underlines the importance of doodling as being not only therapeutic but the best way to generate many unique ideas quickly. While allowing the mind to wander into new and uncharted territory, sketching generates more ideas because, not being a “precise technique”, it “leaves room for interpretation” (p. 76). Furthermore, sketching frees up a designer’s time by not having to commit to an idea before it is fully fleshed out. It also precludes the potential wasting of valuable time that results from taking an idea into software and refining it before it is ready.
Figure 4.06 Data Visualization of Cloud Apps Some of the more popular consumer Cloud Apps (Buckley, 2010) are shown here. A gap observed is that there isn’t much in the way of graphic applications, for the home enthusiast graphic designer, besides a light version of Photoshop called Photoshop Express. Perhaps, this is because the heftiness of the applications and their files are hard on processing power and bandwidth, so would show them off in a bad light by being sluggish. Another aspect missing from this Figure/selection of Apps is a way to manage all the new Apps flooding the marketplace. Data synchronizing seems to be in it’s infancy with only a few Apps doing it, and a very small portion of it.
54
Methods and Methodology ÂŤ Towards a New Conceptual Framework
55
Thesis by: C. Ellicott, 04.08.2011
Figure 4.07 Sketch Of A Central Way To Manage All Ones Dataâ&#x20AC;&#x201C;Called A Digital Husk The digital essence of someone visualized as an external product as well as software allowing people to get closer to their data by using their body as an interface to activate
Figure 4.08 Sketches Of The Initial Interface Design For The Control Panel System A system that works as master, slave and partner with current operating systems, that unites all ones data, and is the digital essence of an
and interact with it. Copyright 2010,
by C. Ellicott.
by C. Ellicott.
individual online. Copyright 2010,
56
Methods and Methodology ÂŤ Towards a New Conceptual Framework
57
Summary: By blending the broader brushstrokes of the contextual search and review, history and theory are enlivened with the more granular detail of design data obtained from the probes and other user-centered methods. Moreover, these methods involved the individual in the design and research process, which created research results that were more realistic than theoretical. Based on what has been learned from employing Action Research methodology and design research methods while exploring the impact of personal computing technology on the individual, the specific needs of the individual and advancements in technology which can be used to inform the design proposal.
05 Reflection and Analysis of Data and Design Experiment
58
59
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
Introduction
recognized trend. It is being adopted en-masse because the Cloud’s
Reflection was a key tool in conceptualizing a framework to assess the
perceived positive benefits outweigh its negatives. The positive benefits
impact of the recent technological changes on personal computing. In
include enhanced ability to socialize, location-independence, convenience,
order to move forward, reflecting on the past is crucial, as it shows where
and ease of use, while its negative aspects are that it robs people of
personal computing has been. From this historical perspective, we can
time, exposes private information, is prone to technical glitches, and
then extrapolate and begin to envision where personal computing may
lacks security.
be going. Reflecting on the needs expressed by the participants contributes to this process. Thackara underscores the need for reflection, suggesting that it leads us “to do things differently…to perceive things differently. In discussing where we want to be, breakthrough ideas often come when people look at the world through a fresh lens” (Thackara, 2005 p. 6). The cross-section of Canadians represented in this study allowed intimate insight into their lives and activities, thus providing the recommended “fresh lens”.
69%
of all internet users have used one of the web-based software applications; Cloud services here
5%
pay for online storage
Labels such as the Information Age, the Digital Revolution, Modernism 2.0 (Bourriard), and the Third-Machine Age (Dunne) have been applied to the past two or more decades of technological changes. Seeking to
7%
store their videos online
40% of internet users having used at least two of the listed Cloud services
56%
29%
use Apps like Google docs or Photoshop express
34% store their photos online
5%
use Back up services online
use webmail services: Hotmail, Gmail, or Yahoo! mail
apply a label not only recognizes that a shift is taking place but also suggests the nuance of the shift as well as the era’s breadth and depth of change. The advent of cloud computing could introduce yet another paradigm shift in personal computing or, as several Cloud enthusiasts purport, may even mark a whole new era.
What is worth noting here is that, as people use more and more online services, with data scattered across multiple devices (on an average
Jonney Shih of Asustek Computers (ASUS), one such enthusiast, was
of three to six) and with more data being acquired and created daily,
asked what he felt the trend of this new year would be. He predicted a
Cloud computing may be able to harness this technology to help control
shift to a new era: “the past 30 years was the personal computing era.
scattering and data-overload. Data gleaned from the probe packs
The next stage is in personal cloud computing” (Shih cited in Nystedt,
underscores this need to simplify the complex and centralize the
2011, para 7). The question of whether or not we are entering a new era
fragmented. The computer, while undoubtedly a boon to productivity
is not as important as the fact that cloud computing is now a major
across personal, professional and industrial uses, has also added a
Thesis by: C. Ellicott, 04.08.2011
Figure 5.01 Cloud Computing Activites Being Heavily Adopted in U.S.A. This list is not meant to include all cloud computing activities but just to show a representation of some of the Cloud services people are using and to what degree. According to the paper this data is based on a survey of “2,251 adults between April 8, 2008 and May 11, 2008. Some 1,553 respondents in the survey were internet users” (Horrigan, 2008, p. 2). Source: Adapted from “Use Of Cloud Computing Applications and Services”, by J. Horrigan , 2008, Pew Internet & American Life Project of the Pew Research Center, pp. 1-2. Retreived from: http://computinginthecloud.files.wordpress.com/2008/09/ pip_cloudmemo.pdf
60
61
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
further burden to people’s lives as the technology, by its very nature,
cultural). However, one might argue that the socioeconomic status
prompts users to stay abreast of the latest models, programs and
of the group was not diverse, as all participants could afford several
applications. As well, it imposes space and location limitations on users
computing devices and online access. Of the final respondents, there
that the Cloud promises to overcome by offering ubiquitous access to
were 10 men and 11 women. The group ranged in age from 25 to 63 years.
people’s personal data, the ability to synchronize data between devices,
It would have been more diverse if some younger respondents had taken
and software to use the data.
part as initially had agreed to. (see Figure 5.06 for final group breakdown)
Thesis by: C. Ellicott, 04.08.2011
There was a good selection of occupations throughout the group that There are aspects of the Cloud which may be worth leveraging in order
included, amongst others, students, social workers, computer programmers,
to help create a system that would synchronize and address the fragmen-
designers, and a veterinarian, although it may have been a bit skewed in
tation of personal computing. Moreover, as people have either knowingly
that there were five graphic designers and three students. Moreover,
or unknowingly already dabbled in cloud computing (through web-based
trades people and other workers that normally would not use computers
e-mail services like Hotmail and Yahoo mail and social media sites such
during work hours (such as general labourers) were not represented at all.
Figure 5.02 Proposed Probe Participant Group In the end the full anticipated focus group did not participate leaving out teenagers as a core audience and an audience not anticipated were those of a low economic status which would be two groups worthy of further research. Copyright 2010, by C. Ellicott.
as Facebook, Twitter and My Space), it may require little effort to adapt.
Despite the Cloud’s many benefits, there are still some outstanding questions and concerns that need to be addressed. For instance, will personal computer users want to be dependent on a business in the Demographic A way to stereotype and grouping people through characteristics such as gender, age, race, income,
Cloud? Will they want to be perpetually at the mercy of wifi availability to access their data? Is the alternative (i.e., a hybrid model of computing) a more reasonable solution? Do people want pay-as-you-go online
disabilities, education, home ownership, employment status,
services? And if the computer is just a ‘necessary evil’, how will another
location, and mobility (commute time, number of cars etc.) Its a non-emotional engagement with the populace. Generational Cohorts Are groups of individuals who go through a major shift in life together during the same period of time. They share a common historical experience like the baby boomers. A boom only they could know and experience.
service make it any better? These are some of the questions the probes attempted to answer.
THE chosen sample group The majority of the sample group consisted of thirty-one hand-picked
Teenager
friends and family members. The aim was to have a wide demographic sampling that included a diversity of genders, ages, cultures, marital statuses and generational cohorts, and who were all computer-using
Above sources adapted from Wikipedia: The Free Encyclopedia.
VARYING DEMOGRAPHICS
Canadians (Canadians being defined as residing in Canada and multi-
VARYING PSYCHOGRAPHICS
VARYING PROFESSIONS
VARYING COMPUTING NEEDS & SKILLS
Parent Gaming Single Designers Baby Boomer Male Gen X Work Hetrosexual Pleasure Social Worker Nuclear Family Millennial Female Gen Y Entrepreneur Artist Veterinanrian Carpenter Communication French Single DINKS Young Family 37 yrs 14 yrs Teacher 42 yrs Adult Couples Entertainment Data Processing Hard core User 25 yrs Dot Coms Chinese English Graphic Designers 62 yrs Business Owner 51 yrs Computer Specialist 35 yrs Trades Canadians Title-Searcher Homosexual Self proclaimed Ludite Middle Class
62
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
Design of Cultural Probes and Questionnaire As mentioned previously, cultural probes helped to situate this research
63
Thesis by: C. Ellicott, 04.08.2011
Figure 5.04 Probe Pack Booklet/Diary pp. 9-10 Copyright 2010, by C. Ellicott.
in “social practice” and to create a human-centered focus, allowing for greater empathy with the end user. According to Steen’s (2003) research on human centered approaches, “one can argue that if one focuses on 10% of a person, then one can only create and capture 10% of the potential value” (p. 2). Although this may seem obvious, many a design has been completed in the total absence of the individual, while other methods focus only on particular aspects, as Steen suggested. The ability to focus on the whole living breathing person with a full range of emotions allows for an empathetic understanding and is likely to reveal more possibilities and result in better value. The intent for creating the cultural probes was to gain an intimate and empathetic knowledge of personal computer users beyond just the use of their devices.
Figure 5.03 Some Example Spreads From The Probe Pack Booklet/Diary, pp. 7-8 These images are the actual pages taken from the probe pack booklet Copyright 2010, by C. Ellicott.
Figure 5.05 Probe Pack Booklet/Diary pp. 13-14 Copyright 2010, by C. Ellicott.
64
65
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
Figure 5.06 Actual Probe Participant and Questionnaire Group Demographics
Mattelmaki (2006) states: “People are not necessarily capable of
Copyright 2010, by C. Ellicott.
demanding improvements or imagining possible futures” (p. 33). Sanders
11
10
(2001) shares a similar viewpoint about the power of probes, suggesting they bring out issues that cannot be seen or revealed through observation or in an interview setup: “Discovering what people know helps us to communicate with them. Understanding what they feel gives us the ability to empathize with them” (p. 3).
Cultural Probe Packs
Profession: Business Owner
Title-Searcher
Business—Sponsorhip
Profession:
Producer
While a 57% return rate is considered high, many of the probe packs
Developer Graphic Designer
Social Worker
Divorced/Separated
Optical Technologist
Student
were not fully filled out. Moreover, the efforts made to answer the
Veterinarian Married
Couples
Single
questions and maintain the five-day diary were, on the whole, uneven.
Have Children
Two of the richest results were probe packs that had been physically Age:
- 20yrs
21yrs -30yrs
31yrs-40yrs
41yrs-50yrs
51yrs-60yrs
mailed out to the respondents. Only those two respondents fully utilized
61yrs +
the extra drawing materials provided (e.g., coloured paper and pencils, glue, scissors, emoticon stickers, square and circular coloured stickers, Printer/Scanner
TV/Stereo
Full DVD’s
USB
Landline Video/Camera MP3
Smartphone
Tablet
Laptop/Netbook
Desktop
Game Console
Ownership:
Hard Drive
etc). Completion of the five-day diary was generally minimal and cursory; in some of cases, it was not done at all. Several participants wrote an initial detailed diary entry then became progressively less committed to writing complete entries for the remaining days. The tendency was to answer the extra questions, literally but briefly, without much elaboration
Computing for:
5-10 yrs
11-15yrs
16-20yrs
21-25yrs
26+yrs
or creativity. Forty-seven percent of respondents provided photographic records of their physical collections, which they currently manage, organize and store in their homes.
Adoption of new technologies:
Early Adopters//Early Majority
Late Majority// Laggards
On the whole, the lack of responses was reportedly due to repetition in the questions, which could be blamed on the actual design of the probes themselves. When the probe was being created, it was given to a few 4
4
7
6
students to obtain feedback on the quality of questions as well as their attitude toward the workload involved. The consensus was that the packs
Thesis by: C. Ellicott, 04.08.2011
66
67
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
were too time-consuming and intrusive. The pack was then simplified and paired down to a diary and a handful of questions. However, the general feedback from the study was that it was still too time-consuming. Moreover, due perhaps to the level of intimacy it required, two participants used a pseudonym. Nevertheless, to ensure confidentiality,
We are interpreters—not merely
pseudonyms were used for all participants featured in the thesis.
translators between sender and receiver. What we say
The cultural probe pack did not prove as fertile in gathering results as did the European packs, judging from Mattelmaki’s (2006) samples in
and how we say it makes a
her book Design Probes. One might blame the openness or perceived
difference. If we want to speak
intrusiveness of the questions, the five-day diary workload, or the
to people, we need to know
overall workload involved in completing the probes. The lack of detailed responses may also simply have been a cultural phenomenon.
their language. In order to
The precise reason for the probes’ lack of robust response is difficult
design for understanding, we
to pinpoint, especially since the probe method worked well in Europe,
need to understand design.
where it originated in the 1990s. Perhaps Canadians nowadays do not have the time or the desire or take open-ended questions or diary entries seriously? Nevertheless, even though the data was not fully completed, the probes, together with the subsequent questionnaire, did provide a rich, interesting and insightful data resource.
The main thrust of the probe was to gather information about how people organize, categorize and retrieve physical things in their life, such as clothing, sports equipment, kitchen wares, home office supplies, music and videos. The probe also aimed to gain a better understanding of the role of computing devices in the participants’ lives, and to see just how integrated and important these devices were to their daily activities (e.g., how many hours were spent computing compared to other activities). The transition from the physical to the virtual realm is greatly affecting people’s relationships with objects; thus, understanding how people
— Erik Spiekermann
Thesis by: C. Ellicott, 04.08.2011
68
69
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
interact with their personal physical domain might foster new ideas
The final categories were identified as pattern, commonalities,
and knowledge about people’s digital habits and behaviours. In some
exceptions, emotional response and strong themes. These categories
cases, additional follow-up e-mails or conversations helped to clarify
were mainly derived from questions proposed in the probe. During
the respondents’ probe content and also helped in drawing down
the reading of the raw data, other questions arose which were then
characteristics from the probes to use in the design project.
voiced through personal correspondence and through the subsequent questionnaire sent out to the responding group.
THE E-MAILED QUESTIONNAIRE The questionnaire acted as a complementary piece to the probe pack
Analysis of the probe returns required a certain amount of creativity
to better understand the role of digital devices and computing in the
compared to the questionnaire analysis, as the latter was more straight-
participants’ personal lives. This highlighted the importance of people’s
forward in its results. To be true to the voice of the participants, the
devices to them, the pros and cons of having these devices, and their
analyst had to be empathetic in order to read between the lines
usage and function to the user. General computing habits, online habits,
or to hear what was not being explicitly stated by the respondents.
learning mode preferences, and attitudes towards software purchasing
For instance, that the respondents were not able to finish their probes
were examined, as well as people’s general knowledge of and attitudes
and had brief and hurried hand-scratched responses might have been
towards apps, organization, privacy, and security. Reservations about
an indication that the respondents were overly busy. Further, why the
|the technology and usage of the Cloud concept were also investigated.
respondents who originally agreed to participate withdrew when they actually saw the probe would have been worth further investigation.
INTERPRETING THE RESULTS Mattelmaki (2006) stated that the difficulty and complexity of interpret-
Some interpretations of the probe packs relied less on what was said
ing the probe data was one of the more challenging aspects of the probe
and more on what was not said. Also, in some cases, how respondents
format, a standpoint that was confirmed by this present study. Open
physically filled out the packs provided rich information in itself. The
questions led to difficulties in quantifying data; indeed, the data was so
findings offered insights into people’s usage patterns or affirmed the
diverse, that decisions for classification could not take place until the
researcher’s initial suppositions regarding shifts the individual is experiencing
process of summarization. Instead of fitting the probe materials into
due to personal computer use in their everyday lives. As well, the probe
pre-determined categories, the probe format forced the researcher to
results revealed clues as to how design might forge a new approach in
let the probe materials give voice to the data and to be more open to
a changing digital landscape.
chance findings. This proved to be an illuminating but a daunting process, as it required a relinquishing of control (to a degree) over the data.
Thesis by: C. Ellicott, 04.08.2011
70
71
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
FINDINGS AND ANALYSIS
findings suggested that the respondents’ lives were generally filled with
While the main thrust of the probe pack data was examining people’s
thousands of objects both physical and virtual that needed to be continually
personal collections, the questionnaire went further into the management
organized and managed.
of digital assets. What the findings suggested is that people are managing many types of collections in their personal lives, some without even
The responses also suggested that the downside of managing collections
knowing to what extent. Gene (personal communication, Dec.04, 2010),
on and offline was having little time to manage them adequately, as well
one of the respondents, writes: “I don’t think of myself as a collector, but
as a lack of interest in doing so. This lack of time and interest tended to
after working through this paper for you and contemplating things,
be the overriding message with most of the probe respondents regarding
I [realize I] am a bit more of one than I thought, [though] perhaps not
the quality of managing things. For instance, while Jay (personal
of stuff that others would consider ‘a collection’.”
communication, Jan.06, 2011) enjoyed organizing his own belongings (particularly if it involved a new project), he nevertheless conceded that
From the physical to the digital, collections were many and varied.
“[o]rganization is work if it is someone else’s stuff or my own old stuff.”
The contextual search and review suggested this would be the case and,
This preference for organizing one’s own newly-acquired belongings
further, that little is known about how individuals manage their digital
was mentioned by both male and female participants across generations.
information other than that they are diverse at every point of a digital information cycle (Williams et al., 2009). A digital information cycle is
In the probe responses, the theme of time emerged as a major factor,
the management of electronic files which can be fit into three categories:
as did the willingness to spend the time needed to make collections
1. seeking or acquiring information;
more manageable. Time spent organizing versus time spent enjoying
2. passively receiving and collecting; and
one’s life or getting things done always had to be weighed. As Sara
3. creation, producing digital data oneself.
(personal communication, Jan. 8, 2011) so aptly put it: “I can be extremely
(Williams et al., 2009, p. 348).
organized but choose to get more done, which leaves less time to be organized”. Nana (personal communication, Jan.04, 2011) also
Some of the respondents’ more notable collections were of things such
addressed the issue of balance: “I’m not very organized. I try sometimes
as books, music and videos. There were also collections of everyday
but it doesn’t last very long…. Part of the reason is laziness, but I also
items such as clothing, shoes, purses, jewelry, spices and kitchen wares,
feel like there are more important things in life.”
as well as collections of items that pertain to hobbies or leisure activities, like journals, sporting goods, crafting artifacts, art, and rocks. Finally,
The respondents’ attitude towards disorganization was usually governed
there were also the hard-to-define sentimental collections that involved
by negative aspects. Not wanting the extra stress or anxiety or the
personal mementos such as a baby’s lock of hair or a ‘lucky’ coin. The
frustration of wasting time looking for things was what kept most people fairly well organized. Even Nana admitted she felt better and had a more
Thesis by: C. Ellicott, 04.08.2011
72 Figures 5.07 (left) Digital Filing System of Ray The following images are participants interpretations of how their digital filing systems. They appear to be just as varied as their physical filing and organizing systems. As well, how people like to view and customize their filing systems is also very unique from person to person. The image right shows the allocation of data and its parts on one of Ray’s computer hard drives.
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
positive attitude if she had a clean desk or environment, but this was not always possible when sharing a space. Patrick (personal communication, Dec.04, 2011), explained that he keeps organized “so as not to be caught with my pants down in a disorganized fashion.” Mia (personal communication, Dec.07, 2011), wrote: “I don’t think a messy desk is a sign of a messy mind. It’s just a product of a lack of storage/workable space in a critical zone of the house. It makes me stressed when I’m in a rush and I need to find my keys.” The interesting thing about computers is that there tends not to be a space issue for the most part; one can buy another hard |drive or rent some cloud space. Perhaps this is why respondents tended to be tidier in their digital lives then they were in their physical ones.
On the whole, most respondents felt they were fairly well organized. Nonetheless, some, like Ron (personal communication, Jan.07, 2011), suggested they could do better: “I am definitely feeling like I need to develop a new form of file organization in the near future... for work/ design/inspiration/personal projects... all that stuff.” Ron’s response was related to digital organization, and the probe data suggested that people tend to be more organized on their computers than they are in real life. One respondent, Ace (personal communication, Jan.11, 2011), liked both his “physical and digital objects” to be well organized, and so put “boxes within boxes, everything with a place”. Ace also admitted that, in the digital environment, he can be “OCD-ish” about his files: “Ideally, I would have a five-terabyte hard drive to hold ALL my files on and would be even more streamlined and organized.”
Ace may not be the only one becoming “OCD-ish” about files. Digital Obsessive Compulsive Disorder (OCD) is emerging as a new phenomenon, as confirmed in a recent article by TIME’s Joel Stein, who writes that, as we are “constantly confronting the onslaught of information, our brains
73
Thesis by: C. Ellicott, 04.08.2011
74 Figure 5.08 Digital Filing System of Shawn Shawn has a special shareware app that allows him to write to-do lists on his desktop. He has also has devised a set of meta symbols to aid in quicker communication to and for himself. His desktop acts as a “hot” space for things of utmost importance or that need to be done relatively quickly.
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
75
Thesis by: C. Ellicott, 04.08.2011
76 Figure 5.09 Digital Filing System of Mario Mario doesn’t like using the operating systems pre-made folders, but keeps his files and folders in the top level directory, naming them appropriate for him but obscurely for an onlooker.
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
77
Thesis by: C. Ellicott, 04.08.2011
Figure 5.10 Digital Filing System of Ace’s iPod There is no real filing structure on an iPod that people can see, other than organizing which screen apps are on, or making folders. The creative part, the files, are not in an accessible file structure unless the iPhone is jailbroken the device and get an app that allows you to see the obscure filing structure says Ace.
Figure 5.11 Digital Filing System of Sara To view her files she uses the newer OSX Viewing style calle “cover flow” derivative from Apples iTunes
78 Figure 5.13 Digital Filing System of Jay These folders are created by a developer. In their group, these folder names and ordering would actually make quite a bit of sense.
79
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
Figure 5.14 Ace’s Digital Collection Manifested As A Physical Collection This image represents the amount of space roughly that it would take to own and keep the physical items which Ace has a digital Items various on drives. Perhaps people aren’t going with less is more, perhaps they’re collections are just being converted to virtual ones.
Space of Physical Items Space of Digital Drives Space of Physical Items Space of Digital Drives
Copyright 2010 by C. Ellicott.
2.5 TB Digital Drives Ebooks/comics: 1000 -2000 files 2.5 TB Digital Drives = 20 GB(approx.) Ebooks/comics: 1000 -2000 files = 20 GB(approx.)
Photos/Images: 100’s files = 4-5 GB(approx.) Photos/Images: 100’s files = 4-5 GB(approx.)
Music: 1000 Cds = 70 GB(approx.) Music: 1000 Cds = 70 GB(approx.)
Video Collection: 1200 to 2400 Movies = 2 Terabytes (approx.) Video Collection: 1200 to 2400 Movies = 2 Terabytes (approx.)
Text files: 100 files = 50MB Text files: 100 files = 50MB
80
81
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
are trying to make patterns out of the randomness” (2010, para 2). Digital
This tendency seems to cross over into the digital realm as well, with
OCD can refer to how individuals constantly tag MP3s and Delicious
participants like Shawn leaving his to do lists on his desktop and Nana
bookmarks, or meticulously create music, video, photo inventories and
putting files to be sorted in an “organize folder” on her desktop. Shawn
folders, or sort and resort e-mail and Facebook inboxes. Struggling to
and Nana used the desktop as a HOT spot or, like the previous respon-
stay digitally neat is not uncommon and can bring just as much stress
dents, as a place of close proximity to remind them daily to do things.
and anxiety as physical cleaning; however, digital cleaning gives people
Sandy left e-mails in her inbox until they were dealt with and then filed
the satisfaction of cleaning without the unpleasant feeling of getting
them, while Vicky e-mailed “to do” lists to herself. As Williams et al.
up from their chairs (Stein, 2010). This could explain why some of the
(2008) suggested, document management is strongly related to
participants admit that they are tidier in their digital lives than their
“task management”, and involves using tags or labels such as “hot”
physical lives. The feelings of stress and anxiety affect people in their
(documents currently being worked on), “warm” (documents that may
use of both physical and virtual environments, but the digital environment
be worked on) and “cold” (documents that are no longer being used).
may be easier to rectify simply because it demands less of a physical investment.
Although the participants may have felt more or less organized, their filing systems were highly personal and subjective. Home users tended not to
Memory, Filing and Subjectivity.
employ the formal organizational methods used by large institutions.
An important part of filing, organizing and managing personal collections
As Patrick (personal communication, Dec.04, 2010) admitted, “I am fairly
is relying on memory for short-term and intermediate retention decisions.
organized, though I wouldn’t expect anyone else to jump into my world
The problem with utilizing one’s memory is that only so much can be
and understand.” Interpreting respondents’ screen grabs of their computer
retained, so people try to mitigate the lack of neural storage space
filing systems showed just how subjective and personal filing could really
through logic and trickery. For example, one respondent (Drew, personal
be. Likewise, Jay (personal communication, Jan.17, 2011) explained his
communication, Dec.16, 2010) wrote that he kept his “most important
basic file structure and suggested a possible improvement for the
tools in his truck, things like basic hand tools, wrenches, scissors, while the
Operating System Structure:
bigger stuff, like chain saws, jigsaws, etc. [he kept] in the barn.” Emily
I start with broad categories and gradually break those down into
(personal communication, Dec.16, 2010) put her most urgent papers next
smaller and smaller sub categories as I move up the directory
to her keyboard to keep them at the forefront of her mind, while another
structure. It would be nice if there was a file system that let you
respondent left her keys, iPhone and other must-haves for the next day on
organize files like you can organize music in your iTunes collection
a natural path out of the house, thus acting as a reminder. In both cases,
[so] you can find items based on their associations (e.g., on this
proximity was a factor in their filing, as was leaving articles in logical
album, or rock music, or written by this person) rather than just
places or in places they would frequent often.
remembering approximately where you stored it or what it was called.
Thesis by: C. Ellicott, 04.08.2011
82
83 Another pertinent example of how subjective filing can be and how knowledge affects the way one files is the organizational system employed in carrying out this research. At the beginning, keyword tags in Delicious tended to be quite broad as the topic was not yet fully defined. However, as the knowledge base developed, tags became more specific and refined, thus creating a need to re-file, re-tag and re-shuffle the earlier bookmarks so they would “fit” better. As most people do not use a formal filing system, most filing is done by memory, proximity and subjective classification. Therefore, if a control panel system were to be devised, a filing system as Jay suggests would perhaps be advantageous.
Downsizing the Physical and Up sizing the Digital Both in the physical and virtual domains, people have acquired numerous files, objects and artifacts, which are starting to overwhelm them. As Sandy lamented, once the job was only “to clean the house; now it’s to clean the hard drive. Just more and more stuff to maintain.” The trend towards downsizing one’s physical possessions in order to have greater manageability was also a common theme amongst several generations of the probe respondents, reflecting Rifkin’s (2000) contention that the protean generation believes in a world of less stuff but “more-access”. The probe data also underscores this ‘less-is-more’ approach to life. Probe respondent Ron (personal communication, Jan. 7, 2011) explained: I feel that I had a very rich experience of owning way more stuff than I needed, and later in life have found myself in more than enough instances where I had to sort through and throw away the excessive amount of possessions that were creating unwanted clutter.
In this regard, Ron and other respondents voiced similar sentiments. One could therefore suggest that the attraction to digital media might hypothetically be a way for people to own their “stuff” or experiences
Thesis by: C. Ellicott, 04.08.2011
Figure 5.15 Thesis Poster Image: Virtualizaion of the Desktop (left) The image used here was from the thesis poster. The imagery represents the shift in the personal computing environment where an abstraction is taking place, a move from the physical to virtual, or the desktop to Cloudtop. Copyright 2010 by C. Ellicott. & A. Serghiuta
84
85
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
without the visual clutter. However, the ugliness of some computer
the future. From the results, it seems that even with the Kindle and
systems with all their cabling can be a real “aesthetic turn off”, as one
iPad, books are the final frontier for digital conversion in the home.
respondent put it. To counteract this, she keeps her computer facing the
Respondents indicate that they are creating virtual collections and
wall and not in a highly trafficked area of the house. The average respondent
data all the time, all the while being inundated with more communication
had one or two computers, a smartphone, a USB flash drive, an mp3
then ever before.
player, a digital camera, a scanner and printer, a television, and a DVD player, with many of the respondents having specific uses for each
In terms of fragmentation, there are many virtual places where individuals
device. The questionnaire showed that more and more of people’s
can store their data. These options include social Networks sites like
collections are becoming virtual, especially in obvious areas like music,
Facebook, Twitter, YouTube and Flickr as well as webmail services such
photography and DVD video collections. Most respondents no longer
as Gmail and Yahoo. In addition, there are online banks, subscription
buy or use physical CDs, and many do not buy or rent physical movies,
services for magazines, associations, clubs, blogs, data storage sites,
either, but instead use services like NetFlix or Grooveshark for streaming
shareware sites, shopping sites, and so on. Nearly all respondents used
movies and music. Some less common moves into the digital realm were
Facebook, Flickr, or a webmail service like Gmail, but several respondents
sentimental items like old family photos, memorabilia and family trees.
did not realize these were Cloud applications. As one respondent wrote: (Ronda, personal communication, Jan. 12, 2011) “I hadn’t realized I was
All the respondents asserted that their usage and dependence on
already part of the cloud revolution for the past 10 years, with all my
computing devices had increased, particularly with regards to those
business and personal e-mail addresses on Yahoo.” To securely access
devices that were mobile. Personal computing now encompassed many
their various online accounts, participants had between 3 and 30 passwords.
activities that once were divided amongst many physical objects and places. For instance, where once people went to a physical bank, now
While not directly stated in the probes, a sense of fragmentation was
every respondent did their banking online; where once people had a
implied. This was caused by moving from device to device (e.g., from
TV in a TV room, now many of the participants stated they watched
computer to smart phone) and connecting to various online services,
it on their computer or one of their mobile devices (e.g., iPhone, iPod,
all housing different or similar data. Fragmentation as a hidden theme
iPad, Nook, etc.).
was further emphasized in that a number of the participants felt compelled to work in a fragmented way with many screens open at
As indicated earlier, most of the participants wanted fewer items to
one time, constantly cycling through and checking each one. (Bob
contend with. One participant, (Ace personal communication, Jan. 4,
Personal communication, Jan. 7, 2011) wrote: “Right now, I have seven
2011) a self-described “bookie”, stated that he loves books but rarely
programs open and ten tabs open in two browsers.” Similarly, while filling
wants to buy them any more, and may likely move to digital books in
out their probes, Ray had 20 to 40 windows open and Mia had 20 to 30. Fragmentation also infiltrated the participants’ hectic daily lives as there
Thesis by: C. Ellicott, 04.08.2011
86
Holiday Lighting Change of environment Comfort Noise Office is to work oriented Change scenery Leisure vs work
$0 - $750.00
Ownership Privacy/Security Behaviours altered Brain altered
87
Reflection and Analysis of Data and Design Experiment ÂŤ Towards a New Conceptual Framework
Stress
Why?
6-16 hours per day Daily hours ON
$$ Apps
Concerns
Computer/Life Integration
Back up Faulty Equipment Access Theft Breakage Biz goes down Power failure Battery failure Trust issues
Online Social Networks
Awkward
Drive
DVD
Archiving
Cloud
Digital
Onboard Smartphone
Only Creation
Onboard Devices
Photos Video Music Games
Patterns Classification
Physical
Food
Hoarding
House with technology Outside NO technology
Bring Work Home
Space Restrictions No Dewey Decimal Sys. Alphabetic
Organisation Messy Feelings
Clothing
Scanner Digital Pens Photo Camera Video Camera
Online Files
Dream Place
File: Stuff for Anticipated Need File: Stuff for Future Need File: Stuff for Immediate File: Nostalgia & Heirlooms Sports
Multitasking
iDevices Tablet SmartPhone NetBook Laptop Desktop
Storage & Creation
Many devices
Many files
Photos TV Music Video Games
Onboard External Drives
Many windows
Specialty Apps Crude Very Little Google Docs Mobile Me E-mail Music App
Work/ play blurring
Photos TV Games Music Video
Loss of Mind Laziness Clutter Frustration Stress Content Guilt Organised Anxiety Shit-storm
Time
Peace of mind
Life/Work Balance
Digital Organisation workload
Movie Tools
Why?
Books
Music
Tidy
De-clutter Comfort Memory Happier Create Efficiency & Collect Overwhelmed Stress-free Saves time Efficient Stress-free Proximity Streamlined Aesthetic Leave Clues Empowered Happy Photos Video Leave Notes On the ball Music Art Hot Zone Can handle life Games Illustration Voicemail Reminder Pre-planning E-mail Reminder Documents
Obnoxious features Explicit Interactions
Data Service Areas
Synchronization
Onboard iPod
Personal Collections
A Complexity of Devices & Software
Wifi Hubs
Files Music TV Photos Video
Onboard Computer
Unecessary Steps
Bedroom
Digital Fragmentation VimeoYou Tube Flickr My Space Mobile Me Facebook
Figure 5.16 A visual interpretation of key probe findings This diagram shows some of the major themes the respondents had voiced, with fragmentation, lack of synchronization and complexity as some of the big issues. As well filing habits and management showed a lot of ingenuity and subjectivity.
Undue features
Living Room
Relief Stress Withdrawl Lobotomy Loss Anxiety Feelings Video Frustration without Listening Mobile Solutions Reading Surfing Shopping Administration are Changing Social networking Recipes Watching Computing Work Creative hobby What for? Dictation Online Finances Communication Locations Create Documents
Reliability
Bad Design
Home Office
Personal Collection Management
Classified Groupings
Highly Subjective
Colour Groups
Use Groups Where is it kept
Common Traits
IM Chatting
Fragmentation of Working Habits
Thesis by: C. Ellicott, 04.08.2011
Eating
88
89
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
is no longer a clear divide between work and home. Respondents
for doing her freelance work, depending on the type of assignment and
admitted that, even though they did personal e-mails and checked
her current mood. By moving from the traditional confines of the desk,
Facebook at work, they also took work home more now. Some had
participants were able to shift their perception of their digital devices
work smartphones while others had work laptops, which became
from, for instance, a more work-orientated perception to a leisurely one.
shared home computers, further blurring the divide between work and personal time and space.
From the probe results data, it was observed that the computer was being used for entertainment streaming as well as home and work
Importance of Location to the Home User: Changing the Concept of Desk
computing activities. No longer confined to a TV room, the computing
Once viewed as a location-dependent large physical object, a place to
device enabled entertainment programs to be viewed on a laptop in a
work, a place with personal files and typewriter or computer, the desk
bedroom or on a portable smartphone on the bus. Probe respondent
is currently undergoing a radical change. Findings in the probe packs
Ace (personal communication, Jan.28, 2010) took advantage of this
suggested there is a trend towards computing in more relaxing places
particular accessibility innovation, explaining that “[f]ilm is OK on an
while at home. As Emily (personal communication, Dec. 6, 2010)
iPod, and in specific situations like driving in my car, it’s great. But better
commented, “I like to work on my laptop on my sofa in the lounge so
yet is watching a film on a Nook, and best yet is on a TV. But a TV isn’t
it feels less like work. I have a desk and office at home, but I never work
as mobile as a Nook, which itself isn’t as mobile as an iPod.” Thus, while
in there.” The idea of the desk is taking on different shapes and forms,
environment was important, so was the size and mobility of the devices.
mainly in that it is no longer confined to a physical space. As well, it is evolving to be more than just a workspace—it can be a creative space
Furthermore, with people taking their mobile digital devices with them
or even just a virtual space. In some instances, “desk” is synonymous
into more comfortable surroundings, they were also spending more time
with the computer itself. Nancy referred to her desk as being her laptop.
on them. Highly portable technology such as smartphones, iPods and
Mobile devices coupled with wireless technology are furthering the
tablets can follow people everywhere, and the expectation is that it will.
abstraction of the desk and thus enabling more choice.
A couple of respondents referred to just how ubiquitous computing was by stating that they checked their Facebook on their iPod in bed upon
What was important to some respondents was the ability to choose
waking, read news while using the washroom, sent personal e-mails on
the right environment for the activity. By “right environment”, they meant
their phones at lunch, and used a digital device to check e-mails or
mood-inducing locations and qualities such as room types, lighting and
search the internet while watching TV. This type of behavior was also
atmosphere. Some said that their preferred immediate surroundings
pointed out earlier in the literature. Some of the respondents who owned
even improved their mood and increased their efficiency, but that their
several mobile devices claimed to use their devices the most—upwards
preferences also changed according to the activity and current mood
of sixteen hours per day.
tendency. In this regard, Mia admits to having several zones in the house
Thesis by: C. Ellicott, 04.08.2011
90
91
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
Synchronization
space in the house”. Through her computer, Sandy connected with her
Theoretically, with the technology now available, synchronizing data,
grandchildren, had association meetings from coast to coast, monitored
applications and devices should be easy and seamless, but that is not
stock activity and kept track of health information. Then, at the end of
the case. This frustrating circumstance was articulated by probe respondent
her busy day, she burned off stress with an online game of scrabble.
Ace (personal communication, Jan. 14, 2011), who wrote: “I get frustrated
For participants in general, the core personal computing activities were,
in this day in age when I am working on one computer and need the content
in descending order: e-mailing, surfing, social networking, doing work,
from another, but have to physically get up and take the information off of
listening to music, watching TV/films and for creative work.
Thesis by: C. Ellicott, 04.08.2011
the other machine.” Ace is a Dropbox user. However, the free storage allowance of “2 Gigabytes is not adequate enough room” for all his files.
The relative importance that computers play in the participants’ lives was
As well, Ace said “the mirroring aspect of the application makes it not
made even clearer in their responses to the questions: “What do you do
suitable” for all of his devices. In contrast, virtual storage offers access to
if you lose access to your computer? What do you do if you lose access
centralized personal data, thereby enabling not only location-independent
to the internet?” One respondent simply wrote “worry” (Sara, personal
computing but synchronization as well. With Cloud computing as a data
communication, Jan. 12, 2011) , while another explained he felt “withdrawal
-storing option individuals won’t need to have their, “files and software
and a longing” (Sandy, personal communication, Jan. 12, 2011) for it.
locked into [their] PC’s hard drive [it] will [become] an unnecessary
Respondents who said they would cope if they did not have access to
nuisance” (Carr, 2008, p. 81). Echoing Ace’s and Carr’s sentiments,
their computer or internet “until it was up and running”, clearly had
97% respondents said it would it be useful to have their computers,
not pictured it as being a long-term scenario. This reveals an unspoken
smartphones and digital devices synched so that they would be able
expectation that services like the internet will persist. Gene (personal
to access all their data, photos, external devices, bookmarks, address
communication, Jan. 12, 2011) wrote: “I think it’s changing my behaviour
books, etc.
—I threw out my phone book the other day—realized just how reliant I was on it when our systems at work went down for 2 full days!” There
Early adopters 13.5% Somebody who is always on the cutting-edge when it comes to the latest and greatest advances in technology (and just about
Attitudes on Computing are Mixed
was a strong divide between respondents who embraced technology
everything else). The are respected
The average number of years the probe group used computers was
with all its hiccups and glitches and those who did not. The former group
often role models.
15 years, at an average usage time of 17 hours per week, mainly at home.
was sub-divided into early adopters but mainly early majority. These
Early majority 34%
This exceeds the number of usage hours previously stated in the litera-
two sub-groups owned the most digital devices and used them in
ture (13.5 hours a week). The respondents indicated that their computing
many aspects of their life, thus making them the most prolific users
devices enabled many functions in their lives. Sandy (personal commu-
with regards to number of usage hours daily. This group had a positive
and valued for their opinions,
Somebody who is very deliberate in
nication, Dec.18, 2011) wrote: “the computer centralizes stuff”, from
attitude towards technology, although some still got frustrated by its
work, to home administration, to banking, to communication, to leisure.
limitations and ‘hiccups’. Furthermore, they found upgrades in software
As well, “the desk centers around the computer and is the most used
and hardware easy to do, and adopted new software readily if it satisfied
what they do and buy. Adopting just before the average persona an with the number of this type of person, they re a major link for getting a trend out.
92 Innovators (2.5% of adopters)
93
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
a specific need. In contrast, the second group may be categorized as a
thoughts on privacy and security issues were stressed by many respon-
combination of late majority and laggards. This group viewed the computer
dents across generations and user types. The consensus was that if
as a fact of life but did not want to embrace every new update and
activity continued to move more online, privacy and security issues
gadget. They tended to use the computer less, and get much of their
would become a higher priority. Again, though, a number of respondents
advice (regarding, for instance, computer updates, what to buy, and what
showed apathy towards protecting their identity or data. For instance,
software is free and good) from the early adopters. This was even more
they had been using services like Facebook, Gmail or Online banking for
evident in the fact that this group of respondents did not include any of
some time with no thought to security or privacy issues regarding what
their digital devices as an item they would take to their dream place. For
they already had put online. Jay (personal communication, Jan.11, 2011)
this second group, the computer was seen as “a necessary evil”, and a tool
summarised the subject:
primarily used for work. This attitude was not generation-specific: One of
Online privacy seems to be a constant battle between what people
the oldest respondents had included a computer in her dream place.
know and what others (mainly corporations) are trying to find out
Innovation is for a mere few. Generally, this group are true risk takers and don’t mind failure. They are the people who leap before they look, oh and define a trend without necessarily intending to do so. As they tend to have an enormous network of friends, word gets out fast if people like what they are up to.
Early adopters 13.5% Somebody who is always on the cutting-edge when it comes to the latest and greatest advances in technology (and just about everything else). The are respected and valued for their opinions, often role models.
about them. And what they actually are trying to find out about Early majority 34%
Despite the often extreme differences in their attitudes towards comput-
people, but there’s a lot of misinformation. A good example of this
ing technology, both groups did share an overwhelming feeling that life
would be those wall posts people make every now and then on
was hectic, though the early adopter group seemed less overwhelmed
Facebook about some new feature whose sole aim is to open
trend out.
on the whole. However, when asked, “Would the ability to synchronize
up your information and make you lose your privacy.
Late majority 34%
all your devices to all your data files, images, memories, fonts, music,
Somebody who is very deliberate in what they do and buy. Adopting just before the average persona an with the number of this type of person, they re a major link for getting a
A skeptical bunch, this lot. They are more likely to adopt because of pressure more than anything else.
Laggards 16% Somebody that lags behind. A straggler. In terms of technology,
movies, archives and software through one control panel be useful?”,
He then went on to express his thoughts on security,
the reception was very good, especially from the early adopters. Both
Security is a mixed bag between the things you have to protect
groups very rarely bought software, although the tendency was, on the
yourself and your data—router/firewall, antivirus, etc. if you have a
part of early adopters, to either pirate software or to seek out shareware
PC and the measures you assume the companies you have entrusted
(free software) that solved a particular problem. This group then tended
your data to for storage “in the cloud” have enacted to keep your
to inform and supply the other group with tips and fixes.
data safe there, but in all of these things there’s always a loophole
those who aren’t exactly up to date with the latest gadgets. Like the people who still own Betamax players and think that the Internet is just a fad. Above sources adapted from Grant, A. E., & Meadows, J. H. (2010) p. 43-45
that someone didn’t think of because people are flawed and it’s in Salient Concerns Mentioned About Technology
our nature. So, the best way to be secure online is to be educated
While backing up personal data was a well-voiced concern amongst
and to be careful. If something is too good to be true, it probably is.
many participants, very few took any real action in this area. Some told tales of losing full hard drives of data, which is comparable to being
Echoing Jay’s sentiments, Donovan Colbert, a writer for Tech Republic,
robbed of everything. However, none of the participants did much to
affirmed that a further erosion of privacy is inevitable, with Facebook
address security until theirs had been compromised. Nonetheless,
already claiming that all data posted on their site is their property
Thesis by: C. Ellicott, 04.08.2011
94
95
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
(Colbert, 2010, TecRepublic). All probe respondents were aware
their daily lives, which could be made more implicit with better design.
of Facebook’s policy and, though concerned, still posted content.
For example, cell phones ring even while we are in a movie, or a skype
Is there no incentive to end digital security and privacy apathy?
messages interrupts a presentation. Even alarms will not go off, if they
Thesis by: C. Ellicott, 04.08.2011
Human-Computer Interaction The study of how people interact
are not set. Ju et al. further point out that these are problematic
with computers. Includes both software and hardware, like how they interact with objects displayed on their screens by software, and how they use peripherals like
What was evident was a general and pervasive low level fear amongst
interactions and symptoms of poor design and lack of technological
keyboards, mice, and touch screens.
many probe respondents regarding security and privacy, and whether it
sophistication. The designing of future “implicit interactions”, when
except when you push people’s
is due to misinformation or legitimate concerns, it is an area worth noting
creating human-computer interactions that extend beyond the desktop
nonetheless. For example, once robbers sought out the greatest source
computer into new arenas, will require more sophisticated design
for money; now, hackers do the same, as they seek out and congregate
(Ju et al., 2008, p. 71).
Computers are just like people, buttons and make commands, they usually don’t do what you want them to. Sources adapted from
around the greatest sources of useful information. The more people move online, the more hackers will congregate around and target them.
For instance, if you imagine a car was designed to make decisions for you, the car designer better know “you”, the individual, extremely well.
Sandy (personal communication, Jan.28, 2011) brought up a point
One of the questions asked in the questionnaire was: “If you were to die
about built-in obsolescence, the constant barrage of technologies that
tomorrow, would anyone you know be able to collect and shut down all
have built-in limited life spans or yearly upgrades designed on purpose
your personal data?” The resulting answer across the board was “No”.
by companies to force people to keep buying and upgrading. One would
Some felt this was a concern, some did not know how to deal with it, and
hope the frenzy should be dying down as computers have gotten more
others did not want it to be done. This is an interesting area, as it raises
and more powerful and faster than almost anybody needs for personal
issues of ownership and the question of just what will happen when a
computing. The need now to buy a faster device is not as paramount as
generation of computer users die (i.e., what will happen to all their data
it once was, especially just for word processing and e-mailing. However,
—will it leave a glut of dead or terminal data suspended in cyberspace?).
the concern is whether this frenzy will have a similar affect on the online
Although a fruitful area for discussion and debate, such inquiries are not
world, bringing in new devices and subsequent upgrades as well.
within the scope of this thesis.
What Participants Did Not Say: Reading Between the Lines
Another issue that was not explicitly raised was whether people realized
The barrage of computer technologies, devices and systems are
that they were creating data online without knowing it. Many corporate
demanding increasing amounts of our time and attention (Ju & Leifer,
sites put tracking software on their website so they can track people’s
2008). Yet, with all their capabilities, these devices still need to
movements, actions, pages cached, routes taken, location, etc. A good
be operated by people. Ju et al. (2008) believe that there is a certain
example of this is Facebook. For the sake of this study, such tracking will
level of intrusion and demand that computers place on the user in
be referred to as data trails. Data trails also include information captured
Wikipedia: The Free Encyclopedia.
96
97
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
by online credit card companies, search data, shopping and buying data,
from which several salient issues were raised, the most prominent being
etc. All this data resides somewhere and is being collected as individuals
fragmentation of people’s digital data across a number of devices.
Thesis by: C. Ellicott, 04.08.2011
surf the web. Another issue that arose was the lack of synchronization between data
PROBING TO INFORM THE DESIGN PROPOSAL
and devices, primarily due to the fact that most users’ data were localized
While the use of technology is clearly a complex issue, this does not
on those devices, making it difficult to access. This has become more of
suggest that technology is bad. Indeed, for the most part, the benefits
a problem as the number of activities people use computers for now has
of technology outweigh its negatives. A primary issue identified was just
greatly increased. Indeed, the computer is used in all facets of people’s
how fragmented study participants felt in relation to their devices, their
home lives today, including for work, play, fitness, dining, shopping, finances,
data, and the way they worked. A number of respondents suggested that
entertainment, and so on. This increased usage of computers in the home
a lack of synchronization further accentuated the problem of fragmentation.
environment has led to a dependence on these devices, with some feeling withdrawal symptoms without it.
In acknowledging that technology is a ‘mixed blessing’ and that no technology is perfect, this research has identified problems that make
As people’s digital lives increase, there is a corresponding increase in
for fertile design grounds. As Hillis remarked, the internet’s potential
digital chores for people to do, monitor, manage and organize. Further-
has barely begun to be explored and is still in a “very primitive form”
more, as physical artifacts become virtual artifacts (e.g., answering and
more and more of the important
(Hillis as cited in Brockman, 2011, para 9). Both the literature review and
banking services) and entertainment collections move to digital formats,
knowing e-mail addresses but not
the probe data point to the need for synchronized devices and easier
people’s digital lives will become significantly more complicated and
access to data. This might get us one step closer to de-fragmenting users’
time-consuming to manage. With every increase in the number of
digital lives. As Davies & Parrinder and (2010) argue, design changes
computing devices in the home, people experience an increase in data,
happen because technology allows them. But as the relationships
and the scattering across them is likely to result in a deepening sense
between people, technology and contexts evolve, a domino effect results
of fragmentation. The question therefore is: How can design unite the
in new ways of thinking theoretically and philosophically so that design
fragments of technology and data in people’s digital lives to better
might evolve and take new shapes (Davies & Parrinder, 2010).
serve the individual user?
Digital life Being increasingly connected to online, non-physical services. Having things in your life exist online. Or, phone numbers, owning mp3s but not CDs or records, and when your FarmVille gold is listing among your possesssions in your will.
Virtual Artifact A virtual artifact is an immaterial object that exists in a digital environment. So, instead of existing in a physical way, it exists on the Internet, virtual reality, cyberspace, etc. If a tree falls in a digital environment, does it make a sound?
Summary
The Cloud, a clear trend of the moment, could be the appropriate
The choice of participatory research was extremely important as it allowed
technology to help reduce the problem of fragmentation. However,
the voices of individual computer users to be heard and helped to create
people voiced deep concerns about issues of ownership and privacy
empathy for their individual situations. This led to rich and complex data.
in relation to known Cloud-type services such as Facebook. As well,
Reflection on and analysis of the data helped to inform the design proposal,
despite participants generally not acting on their security concerns, they
Or more importantly, can you chop it up and use it for firewood? Above sources adapted from Wikipedia: The Free Encyclopedia.
98
Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework
99
still worried about them. These issues would all have to be considered in a design proposal of a system using Cloud services owned by large corporations.
Dewey Decimal Classification Developed by guess who, Mr. Dewey himself in 1876. Although it has had 22 upgrades since then, it clearly is better than the average iece of software with an upgrade every year.
Another issue to be addressed in the design proposal is users’ subjectivity in organizing and managing data. There is no common governing organizational or classification system like the Dewey Decimal System used in library classification of books. Rather, each person collects, stores, files,
It attempts to organise all knowledge into 10 main groups, 100 divisions
classifies, and retrieves uniquely. People prefer choice, and think of their
and 1000 sections. The decimal part of the name is really what defines this
computer as another item to personalize and organize in their own way.
system and has made it such a good system. You can see why the average person does not devise a similar system for their own filing. It would take a long time. Source adapted from Wikipedia: The Free Encyclopedia.
Time, or lack thereof, was a factor in learning new software or doing appropriate “housekeeping”, so to speak. For some of the participants, the design of a system would have to be easy and intuitive and do some of the ‘ heavy lifting’ for them.
The analogy of the “ghost in the machine” (discussed in the next chapter) inspires the idea of unity between physical life and digital life, and creates harmony between users’ splintered and fragmented digital data and their devices. Just as the original desktop analogy helped to conceptualize the computer and inspire the design of a very important interface for personal computing, the hope is that the ghost in the machine will likewise inspire a new way of conceptualizing today’s computing devices. It will be used to re-conceptualize the idea of a user’s data being located on a physical computer to a computer that follows the user everywhere, virtually unseen but ubiquitously present via connectivity. The analogy will also serve as a metaphorical blueprint for the design proposal.
06 An Analogy to Inform Design
100
101
An Anology to Inform Design « Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
Introduction
leap from one analogy-bundle to another” (p. 500). Similarly, Lakoff
A crucial issue that arose in the previous chapter was how design
and Johnson (1980) also proposed that analogy is a “fundamental
can help resolve the fragmentation, complexity, synchronization and
mechanism of the mind” which allows people to communicate with ease
depersonalization of digital life. While today’s cloud computing services
with one another (p. 278), taking their physical and social experiences
changes raw code or lines of code for
do make it possible to unite and synchronize data, their solutions thus
and using them to describe new ideas.
pretty little icons like folders and files
Graphic User Interface Often pronounced gooey, it is not some slimey creature that exists in a sci fi movie. Rather it is user interface for the computer that telling the computer what to do into and actions, like drag and drop that
far rarely move beyond the reach of the company designing the services
makes it easier to compute for most of the world.
(i.e., core service offering or platform), which creates yet another kind
The desktop analogy has worked incredibly well thus far, having inspired
of fragmentation. To fill the need for a simplified and unified data source,
a revolutionary computer interface in the 1980s. To re-iterate, up until
this research proposes a system where users can view their digital data
the graphic user interface was designed (which itself was inspired by
with computers. Includes both
in an all-in-one, easy-to-reach virtual location. In order to conceptualize
the desktop as an analogy), computing was mainly performed by
they interact with objects displayed
this system, the analogy “ghost in the machine” is used, as analogy has
experts and hobbyists configuring lines of code to operate computers.
proven to be very powerful when explaining multi-dimensional concepts,
The desktop analogy was pivotal in contextualizing and simplifying the
especially in computing.
computer experience. This led to the subsequent acceptance of computers
Human-Computer Interaction The study of how people interact software and hardware, as in how on their screens by software, and how they use peripherals such as keyboards, mice, and touch screens.
into millions of homes as well as into the hands of non-experts. As philosopher and scholar Marshall McLuhan (2001) posited, “our ‘Age of Anxiety’ is, in great part, the result of trying to do today’s job with
Analogies have already assisted in the design of computers and in
yesterday’s tools—with yesterday’s concepts” (p. 9). This contention still
discussions of human-computer interaction (HCI). Examining the
holds true today, particularly with regard to advanced digital technology.
desktop analogy shows that, in essence, it contains a cluster of analogies.
To help move the personal computing experience forward, a new
The computer screen is meant to be like a physical desk where users
analogy, which will expand the idea of a user’s computer, will provide
can keep their documents and folders. When finished with a file, the
direction. The analogy of the ghost in the machine presented in this
user can store it in a folder or ‘throw’ it into the recycle bin. These
study aims to visualize, empower, personalize, unite, and synchronize the
options make the desktop environment analogous to the physical objects
idea of a user’s data, and to visualize and conceptualize the final design.
in an office environment, just as the word processor software now mimics the typewriters they once replaced (Thagard, 2005). Historically,
Analogies are powerful aids for conceptualization and expression of
the analogy has been very useful in conceptualizing all aspects of
human thoughts and communication. Hofstadter (2001) and Pinker
the computing experience and has been used to illuminate and clarify
(2001) proposed that analogies are a fundamental part of language
the multitude of functions the computer and software can offer. Now,
and the mind, and that “every concept we have is essentially nothing
however, the physical computer itself has become a limiting idea, along
but a tightly packaged bundle of analogies, and…. all we do when we
with the various analogies to describe it.
think is to move fluidly from concept to concept—in other words, to
Sources adapted from Wikipedia: The Free Encyclopedia.
102
103
An Anology to Inform Design « Towards a New Conceptual Framework
As the fundamental shift in computing technology progresses, it is
computer system, whether on a local hard-drive or somewhere in the
imperative that a new and intuitive conceptual framework replace the
Cloud, exists in a supernatural plane, it may not be conceivable to think
old one and, in so doing, reduce its limitations. Just as a computer is not
of the data as existing without a physical presence, and thus existing
literally a desktop, the “ghost in the machine” is not a literal ghost in a
somewhere in the Cloud.
literal machine (even though the analogy is the conceptual core of the control panel systems)—there is no ‘ghost’ and no real ‘machine’.
The proposed living, growing, personal data ghost may at first seem
Rather, the proposed conceptual framework for designing a new paradigm
a bit ghoulish or scary to a consumer or designer. However, once
is simply virtual data unified in a pooled cloud of information. As this
the cluster of ideas the analogy embodies is fully understood and
analogy rolls out and is given form, the following two questions should
the concept visualized, the positive aspects should outweigh the
be kept in mind: Is this conceptual framework the only possible one?
negative ones and it may instead become a comforting concept.
If not, is it the best one? Given the infinite flexibility and creativity of the human mind, the answer is most likely ‘no’ to the first question, but the
One might argue that the concept of uniting one’s data into a single
framework and its attendant analogy at least provide a strong starting
representation of oneself may be better suited to an avatar. However,
point for debate, discussion and action.
when the idea of an avatar was explored, it was felt to be more limiting than the ghost in the machine analogy. Moreover, the avatar idea already
The term “ghost in the machine” was coined by the British philosopher
exists in general computing language, and so with it comes a set of
Gilbert Ryle (1900-1976) to describe Descartes’ mind-body dualism
preconceived ideas that can be restricting. One of the main restrictions is
(Ryle, 1949). Far from being the obscure musings of a philosopher, the
that many people already have several avatars, most of which are aliases
idea of mind-body dualism is so entrenched in human thought that, even
or façades, not true representations of the owner. Indeed, the plethora
for people who do not accept the division, it is still a naturally intuitive
of avatars and data associated with them is also in danger of becoming
way to speak. Pinker (2002) pointed out that “Gilbert’s brain presupposes
fragmented. As well, the concept of the ghost in the machine or ‘dataw
an owner that is somehow separate from the brain it owns” (p. 14). If the
ghost’ (the term which will be used here to refer to a user’s specific
brain and body are the same thing, it is odd to talk about one belonging
ghost) can span a person’s lifetime. The idea here is that there would
to the other, whereas if they are different things, it makes perfect sense.
only ever be one data ghost per person. Further, the ghost would
The way we naturally talk about these substances implies a dualistic
have the ability to harness all of a user’s online avatars and data over
point of view. The concepts of mind, soul, spirit, and ghost are fairly
time and thereby allow management of individuals’ online reputations and
easy to understand. Utilizing the analogies inherent in this concept
identities. In this regard, the idea of an avatar does not convey the strong
should enable the abstract ideas at the heart of this project’s conceptual
notion of centralizing, synchronizing and personalization necessary to this
framework to be understood more intuitively. While it might not be
conceptual framework, nor does it provide multi-dimensionality.
acceptable to everyone to suggest that the data which exists in a
Thesis by: C. Ellicott, 04.08.2011
104
105
An Anology to Inform Design « Towards a New Conceptual Framework
In contrast to the rather limiting notion of avatar, the ghost in the
Location: Cloud
machine offers the depth, multi-dimensionality and cohesion needed to represent a new computing environment with an ever-expanding archive of personal data. It would manifest as a system with a control panel,
Entertainment data:
Location: Cloud
Digital Music Mos Def Amy Winehouse PJ Harvey Ratatat Portishead Tom Waits
Location: 2155 South Street Halifax Nova Scotia
which would begin to solve the problem of fragmentation, synchronization and depersonalization. The analogy embodies dualism, such as mind/
Digtal Movies Digtal TV shows Withnail and I Big Love Big Lebowski 30 Rock Cider House Sopranos Tank Girl Dexter Objectified Sunny in Philedelphia Helvetica Holmes on Homes The Genius Changing Spaces of Design uckleberry Fin Sleeping Dogs Lie Cyrus
6800 Leblanc 6900 Ivey MDes Courses Project briefs Communication Omnia Attalia Saija Sun Patrick Foster
helps to free up the notion of location and underpins the immateriality
addressed through the systems control panel.
Banking data
Online Banking TD Account Mastercar CIBC Account Emerald Vis RBC Account Waterhouse ING Paypal Barclays Acco
Location: Eaglehead Liverpool Nova Scotia
Thesis work Class references Class readings References Pdf books Presentations Book Design Poster Design
Location: Cloud Location: 2155 South Street Halifax Nova Scotia Location: Eaglehead Liverpool Nova Scotia
Personal data Passwords Image libraries Bank acounts Subscriptions Software Freeware Social Networking Apple
Location: 2155 South Street Halifax Nova Scotia
Location: NSCAD University 2244 Duke St. Halifax Nova Scotia
Location: 2155 South Street Halifax Nova Scotia
A further abstraction of the ghost in the machine duality exists between the physical users themselves and their new virtual persona, the ghost. The data ghost would unite one’s data in its totality. Once one’s data Communication data Gmail address1 Gmail address2 Yahoo address Gmail video Mac Mail
ghost is united as a single entity, it would then co-exist with the data’s owner, like a shadow linked but not tied to the person – an abstracted
Archive conversat Skype FaceTime Yahoo Mail Location: Cloud
identity. Perhaps one day the ghost will have similar rights to that of its
Location: 2155 South Street Halifax Nova Scotia Location: NSCAD webmail 2244 Duke Street Halifax
physical owner and become a Cloud citizen. A question that may become more of an issue is just how much the concept of a data ghost overlaps with one’s identity presented in the physical world. The data ghost could help compartmentalize various aspects of a user’s online life so that
Cloud Services Dropbox Evernote Carbonite Facebook Twitter Gmail
Yahoo Mail Lostpedia Forum Linked In Siamese Forum Flickr You Tube Location: Cloud Plaxo Delicious You send it
Location: Eaglehead Liverpool Nova Scotia
people could feel free to have different levels of openness for their uploaded data and personas.
The transition of ownership, copyright, and the continued physical abstraction of objects What rights users have (and can expect to have) over their own online
Applications
Location: Lahave Bridgewater Nova Scotia
Adobe Dreamweaver Flash Fireworks Bridge Version Cue
InDesign Photoshop Acrobat Illustrator Microsoft Offic Word Powerpoint Excel
Location: Cloud Location: 2155 South Street Halifax Nova Scotia Location: NSCAD webmail 2244 Duke Street Halifax
data is an important and topical issue. The probes results indicated that, while it is currently a concern, not one respondent had taken much Social Networking
action to protect their ownership over their online data. Perhaps this
Figure 6.01 An Individuals Fragmented Data Online And Across Multiple Devices This shows just how vast and far reaching ones persons data can get. Seen here is is scattered across different machines, all over the web in various formats, and even in places people have forgotten about of didn’t know that their data trail was being collected. Source: Copyright 2011 C.Ellicott
School documents
body dualism, data/computer duality, and physical/virtual duality. It also
of data even while personalizing it. All these ideas are features to be
Location: 2155 South Street Halifax Nova Scotia
Thesis by: C. Ellicott, 04.08.2011
Facebook Flickr Twitter You Tube Linked In Delicious
Location: Cloud
106
107
An Anology to Inform Design « Towards a New Conceptual Framework
lack of concern was because the transference of data ownership has not
Figure 6.02 An Individuals Unite Data, Their Data Ghost This image helps to visualize the concept of ghost in the machine as it pertains to this study. It is merely a concept to show how the system will be unite an individuals data, which is currently fragmented into what appears to be a easy to read cohesive
yet been used against anyone yet (for instance, Facebook has not used, modified or sub-licensed people’s data, even though they claim they can). Or perhaps the notion of data ownership in a public online venue is too complex for the average user to contemplate. Centuries ago, the
whole. Copyright 2011 C.Ellicott Recipes + 300 cal
Passwords Image libraries Bank acounts Photos Subscriptions Banking Family Software Email transfer Relationship Withdrawls Freeware To Do List Siamese cats Documents Social Networking Creative ideas Apple Imagery Documents Illustration Google Creative ideas Business ideas Storage Resume Car alarm Thoughts House alarm
Personal data
- 200 cal + 200 cal Chicken Soup vegetable Soup - 200 cal
Visual reference material Google Calendar Photography Address Book: Contacts Character / Toys Friends Family Ad campaigns Clients Websites Aquaintances Businesses Graphics Emergency Illustrations Doctor artists Veterinarian Garage packaging Cyc ling Shopping /Ex Take Away e r cise Videos School dat Entertainment data a Hear Rates Music collection Exercise routing Mos Def Cyclling CV Amy Winehouse Races Work data PJ Harvet Special Diets Clients Ratatat Inspirational sites TORQ Portishead Pink Bike Paramount Entertainment Tom Waits Tri Rudy La Soyarie Beatles Cycling contacts Cyclesmith Mayer Haythorne Robert Pope Foundation Nina Simone Packaging Macy Grey Posters Letterhead Website
School data Projects Thesis Class references Class readings Reference material Pdf books Presentations Book Design poster Design
Creation data Software
Adobe Dreamweaver Flash Fireworks Bridge Version Cue
Adobe InDesign Photoshop Acrobat Illustrator
Microsoft Office Word Powerpoint Excel
Gmail Mac Mail Dropbox
Online shopping Ebay Kijji Howies Etsy Paul Frank Threadless
Communication Gmail Skype Mac Mail Yahoo mail Facebook Twitter Linked In
Social Networking Facebook Flickr Twitter You Tube Linked In Delicious
Evernote iLife Growl Garage Band Abby OCR imovie Drop Stuff iphoto Toast Titanium Suitcase Cyberduck Widgets Diggable Planets Weather Dictionary Word of thh day Buck 62 Cicero
uTorrent MGMT
Livescribe Pen Tips
CBC PodCast
Preview TextEdit
copyright system grew out of the printing industry and was relatively easy to understand and manage, as it involved a physical manifestation of intellectual property; however, digital data that can be copied and easily shared puts a new spin on copyright infringement and rights. Einstein once mused on this very issue, saying: “If I give you a penny, you are one penny richer, and I’m one penny poorer. But of I give you an idea, you have a new idea but I still have my own” (Ingo, 2008). This not only speaks to the idea of ownership, but also to ownership of ideas, the different perceptions of physical versus virtual, and the issue of copyright.
In essence, and by virtue of its nature, just using the data ghost system encourages people to take ownership of their data as well as of their privacy and security. At its core, the concept of the ghost in the machine is meant to empower people, allowing them greater control over their online identities and information. If knowledge is power, then ownership of knowledge (i.e., data) consigns even more power. Perhaps the data ghost can actually help individual users push back against increasing corporate control, like the example cited earlier with Facebook. While the envisioned system aims to regain some rights for people’s digital identity,
Cloud Services Dropbox Evernote Carbonite Facebook Twitter Gmail Yahoo Mail Linked In Flickr You Tube Plaxo Delicious You send it Lost Forum Siamese Forum
a full exploration of this idea is beyond the scope of this thesis.
New technologies, such as cloud computing, are making it less important for the everyday user to consider where their data physically exists. For some, it may be counter-intuitive to own things that do not seem to exist physically. The data ghost helps people to visualize the invisible. As
Thesis by: C. Ellicott, 04.08.2011
108
109
An Anology to Inform Design « Towards a New Conceptual Framework
suggested above by Einstein, our perception of objects and ownership
communication programs) all within one login. This type of service would
has had to evolve as technologies transform old realities. We tend to take
have to be accepted by these institutions in order for their firewalls to
ideas like ownership for granted as being self-evident, but the truth is
open to the data ghost service; but, once this were done, people of all
that ownership is a man-made concept that varies according to time and
socio-economic classes could compute to the same extent.
place. In addressing the data ownership issue, probe respondents voiced their uneasiness over how the concentration and centralization of personal
OPEN SOURCE: A GOOD PHILOSOPHICAL FIT
data online might make it easier for governments, corporations or
Open Source is a free software movement not controlled by corpora-
subversive groups to steal or use personal data and information;
tions. It frees up the restrictions of copyright on software and allows
the control panel does address this concern.
users to copy, edit, study and use their software open and freely. Open Source was created by many volunteers working together without
The ghost in the machine concept frees up a user’s files, floating them
monetary incentive, a model which encourages the spirit of voluntary
in the Cloud yet uniting them through a personalized data ghost known
cooperation. For the data ghost system, this model would be ideal,
as a control panel. It helps to re-conceptualize the metaphor of location,
allowing people to feel confident that the system is created by the
where various aspects of ownership drop away and files are no longer
people and for the people. The software would not be for commercial
located on a user’s physical computer, as that may be too limiting.
gain, but would instead have the interest of people’s security and well-
This is why taking ownership in the form of a personal data ghost is so
being as a guiding feature. Companies such as FireFox, Linux, Wikipedia
important. It allows the individual to conceptualize and own data as
and Google are currently using Open Source code in products like
an entity, but one which is no longer bound by a specific location.
Chrome and Android, which are for commercial gain. However, this indicates that the code is robust enough to use for major operating
While the ghost in the machine’s system was created to counteract the
systems and products in the mainstream. Ingo (2006), author of Open
scattering of people’s data across multiple digital devices, this concept
Life: The Philosophy of Open Source, argues that in recent years, Open
could also work for those people who own no computing devices at all.
Source software has become just as good or better than its competing
By having a data ghost, an individual could enjoy a robust computing
closed source software.
experience without needing to own a computer. Currently, most libraries in Canada allow free access to public computers but limit what people can do on them. With a data ghost, users would have all the particular programs they use and love (e.g., their font collections, games and
Thesis by: C. Ellicott, 04.08.2011
110
An Anology to Inform Design « Towards a New Conceptual Framework
111
SUMMARY The use of analogy in computing design has proven to be a powerful tool over the years. In the case of the ghost in the machine, analogy is also a fertile mechanism to develop a new conceptual framework that supports the design proposal and project. Specifically, the use of the analogy ‘ghost in the machine’ helps the user to reframe the idea of a computer by visualizing data as not residing in one particular physical location. It also allows the blending of identities residing in the physical body and digital world, and gives those people without a computing device the chance to have a virtual computing environment. The ghost in the machine can therefore potentially democratize access to the computer experience. Nevertheless, above and beyond these enormous potentialities, the data ghost’s most powerful and revolutionary feature is that it unifies, personalizes and synchronizes a user’s data and various devices, rendering many of today’s “must-have” technologies redundant.
07 Building the Design Brief: A Design Scenario
112
Building the Design Brief « Towards a New Conceptual Framework
INTRODUCTION Figure 7.01 Design Quote By J. Gruber Although Thakara suggests that an air traffic controller, can be “in the bubble” , a mind set, amongst all their controls, Gruber suggests the design look and feel does not aim to mimic such a complex system.
Thackara (2005) uses the term “in the bubble” to refer to what air traffic
“If your UI even vaguely resembles an airplane cockpit, you’re doing
controllers describe as their state of mind when being enclosed in their computer control rooms, barraged by data. The phrase indicates that they are in total control despite being surrounded by active technology. Just as the air traffic controllers have found their control bubble, the
Coyier, C. (2011). [Quotes on Design] Retreived from http://quotesondesign.com/john-gruber/
Thesis by: C. Ellicott, 04.08.2011
ghost in the machine system may help the average computer user find his or her data bubble. When the questionnaire participants were asked: “Would it be useful to you to have all your computers, smartphones and external devices synchronized and be able to access all of your data, photos, bookmarks, address books, etc?”, 97% of respondents agreed it would be useful, with some remarking “sure, but it sounds impossible.”
The core functionality of the proposed control panel system will focus on addressing fragmentation and synchronization of personal data and identities. As fragmentation has, in part, been driven by the proliferation of devices, one of the major benefits of this control panel is that it would also provide independence from owning a device. It changes the idea of “your” computer from meaning the computer that you own to meaning your virtual computer in the Cloud. Technological advancements have removed much of the inconvenience of needing to be at a fixed location, whether in the home or on a specific device. Technology already exists to allow a system, like the one proposed here, to provide a centralized and united computing experience. However, it has yet to be created. Instead, a lot of companies are tackling little pieces of the problem, which results in further fragmenting people’s computing experiences.
The following chapter explores the development of a control panel system utilizing the explicit and implicit findings from the study participants. A glimpse into how the system would work is provided through
it wrong.” —J. Gruber
114
115
Building the Design Brief « Towards a New Conceptual Framework
the scenarios based on amalgamations of the probe participants’
Competing commercial companies will want their software and
responses. The design features of the proposed system are based on
operating systems to work with the Unite system because so many
issues raised in the cultural probes and questionnaires as well as those
people and institutions would be adopting it.
Thesis by: C. Ellicott, 04.08.2011
raised in the literature review. Each scenario addresses one or two of the system’s features. The scenarios are mini stories and are interwoven
The Unite system screens are designed with multiple devices in mind
within the design brief to help illustrate both the rationale for the
but recognizing that mobile devices will predominate in future. However,
Early adopters
features, as well as the features themselves.
many of the screens would be built specifically for a Netbook or similar
cutting-edge when it comes to
Somebody who is always on the the latest and greatest advances
device with minimal hard drive space. The Mac Air was the model for
in technology (and just about everything else). You know how
THE CONTEXT IN WHICH THE PROJECT RESIDES
this project but the Unite system would have to work across a variety
This project is set in the not-so-distant future, at a time when the
of devices, both new and old, portable and not, as well as be operating-
Government has increased democratization of access to computing
system neutral. The assumption is that this system is both technologically
services. There has also been a renaissance of the Internet café, providing
and legally achievable.
more likely to adopt because of
THE DESIGN BRIEF
Laggards
A consumer target audience, driven by probe participant specifics
straggler. In terms of technology,
you’re always trying to keep up with the Joneses? These are the Joneses. Late majority A skeptical bunch, this lot. They are pressure more than anything else
more availability to computers as portals to access people’s united data ghosts, data and applications. Firewalls have been lifted on the downloadUnite* is a name for the proposed system which is discussed in more detail on page 112 of this study.
ing of the Unite* control panel system and thus any computer terminal can be set up to their synchronized pre-existing working profiles on other devices. This also presumes that copyright and licensing issues have been dealt with in regards to software, and that legal and copyright issues have been resolved in favour of the Unite system as a way to give ownership over personal digital data. The cost of data storage has been considerably reduced, as per Moore’s law.
The trend in computing hardware that says that the amount of transistors placed on an integrated circuit has doubled (and will continue to double) every two years. Computers are getting smaller and smaller by the year. But when will it end?! Perhaps,
and adopting their philosophy of “by the people, for the people”. It would not be corporately owned. A similar business model that is consumer-driven and non-commercial (such as Wikipedia’s) could provide guidance. Most people want to support a product that is not
Source adapted from Wikipedia: The Free Encyclopedia.
the Unite system will be designed for two opposite ends-of-the-computing-spectrum users: the laggards/late majority and the early adopters, both of whom were participants in the study. By designing for both extremes of computer users (with regards to computer literacy and usage), the design should appeal to a continuum of users and provide
The control panel system would be built using an open source language
the year 2015 or 2020 but by the looks of it, it could go even longer.
those who aren’t exactly up to date
Rather than being designed for the “average” user, as can be common,
greater responsiveness to the needs and habits of a variety of groups.
Moore’s Law
corporately owned and offers more personal control over their own data.
Somebody that lags behind. A
The early adopter group represented in the study encompassed those who are engaged by and can afford to acquire the latest technologies. They tend to use computers as an integral part of their work and have embraced them in various aspects of their home life. This group sees their computers as an essential part of everyday life and their high computer literacy and early adoption of new technologies reflect that. The other users are the laggards, of which there were only a few
with the latest gadgets. Like the people who still own Betamax players and think that the Internet is just a fad. Above sources adapted from Grant, A. E., & Meadows, J. H. (2010) p. 43-45
116
117
Building the Design Brief « Towards a New Conceptual Framework
amongst the probe participants. This type of user has a broad computer
2. The system will act as master, partner and slave to existing devices
literacy (i.e., from beginner to functionally literate) and their usage
and operating systems, thus being device agnostic. While this is a
ranged from quite a lot to very little. Within the laggard group, but not
complex system, it does not interfere or demand that one gives up
represented in the study, was a sub-group. These are users who, whether
preferred applications to learn new ones associated with the control
for financial or other reasons, do not own a computer but need or would
panel. It merely augments and synchronizes what already exists.
like access to one. A future research direction could involve investigating this untapped group through collaborative research. This could help
MASTER: In some instances, this system will need to exert control over
bridge the digital divide mentioned earlier, where giving people equality
the operation systems governing the devices within its domain, serving
of computer access is likened to giving people access to information or
as an overlord or master.
a democratization of information and knowledge. PARTNER: At times, it will be running parallel to those operating A New User Interface: Features of the System or Design Considerations
systems, tackling different tasks but still working with the operating
1. Any new product needs to be marketed well. A strong name
systems of those devices as a partner to create a seamless experience
for a product can be a powerful influence on consumer behaviour,
for the user.
acceptance, understanding and uptake. Some alternative concepts for the original system name of ‘Data Ghost’ are Unite or Younite.
SLAVE: Sometimes the operating systems will have to be allowed to do
These would need to be tested with focus groups to see the response.
their jobs and will therefore need to be able to override and control the
However, the prototype will use the title “Unite” while employing the
interface, making it their slave.
underlying analogy of a data ghost. Figure 7.02 Unite – A Proposed Logo for Testing This is an identity for the working prototype of the system with control panel views. Copyright 2011 C.Ellicott
Thesis by: C. Ellicott, 04.08.2011
118
119
Building the Design Brief « Towards a New Conceptual Framework
OCD-ADD Protean Gen
Figure 7.03 Mind Mapping for the Control Panel System This Figure shows in broad strokes what the system should include, what drove the design to this solution, what the system needs to do and how it needs to work. As well it touches on what issues have to be contended with in design, specific to the Cloud. Copyright 2011 C.Ellicott .
Subjective organization methods Digital chores Data hoards
Computer Integrated lives Brain is changing
Non Computer Synchronize owners useful multiple 3rd world devices countries
Findings
Only web browser specific
Unites fragmented data
Probes
contextual user research
Company has tech issues
Isreal Case in point
The value of the OS
Cons
use HTML 5
Unites fragmented data
Why a Control Panel
Individual Copyright
Technical Limitations
Owner -ship
What if the Corporately drip owned by runneth few dry?
fre ice v e
Monitor Learn
Sync
Devices
Data
Control Panel System
Most used Apps Usage
Pass- Settings Backup words Automation
Data Ghost Macro View
Profiles Add Avatars
Storage
Collect
Apps
Collect
Sugg Web estions Sugg estions
Open Source Native App
Harness Data Ghost
Phased Approach
May be distracting for an interface
Responsive Design
Provide defaults
Data Documents
Colour Blind Elderly
Analogies help users "get" a conceptual model. For example, "This is just like reading a book."
Global Nav Sync Live Workspaces
Music Share
Search
People reconstruct memories so they are always changing
Memory
Memory can absorb 3-4 items at a time. What holds attention determines action. - William James
Data Ghost? Digital Shadow
Applying Human Factors
Visual Hierarchy -A System
Mental Models
Files like Files To aid mental model
Analogy
Extreme Users
Attention
Bite-Sized Chunks Of Info Are Best Buttons need to look like buttons
Design Values
Early Adopters
Panel includes
Login
Improvements can be slow and flawed
Only give users what they need-declutter
Affordances
Simplicity K.I.S.S No computer Visually Impaired
Images Video
Cons
Progressive disclosure
Experience over features
Unconscious knowledge & action
CONTROLS
UNITE all Data Devices
Corporation Free Improvements are community lead based on real use
Roll features out over time to keep interface simple
Recent activity
archived Add work this one spaces Upload
Power to the people
e
free ice ev Searches
Streams
Net neutrality
Browser based App
Software
tio loca n free• d
Cloud issues
Privacy Issues
Most used Files
Don’t need to install on devices
Cloud
Freedom of speech
Security Issues
Corporate exposing data
Pros
Pros
tion fre loca e• d
Hackers
Accessible anywhere
No Wifi Bandwidth
Censor -ship
Corporate Ownership
Power of browser in Q?
Pros Universal programming language
Lots of Data Fragmented data
Powerful programming language
Thesis by: C. Ellicott, 04.08.2011
Novelty vs change blindness
Affected by pictures
Inate brain Grouping
Grids Colour Font Peripheral Vision
To help focus lots of info Alerts the eye
Can affect mood Make fonts big enough
Best recognized shapes Distractable -a canonical perspective Use the senses Used to scan pages to grab attention People miss changes
Emotional brain
People pics & Stories
Food Propagation Danger/Survival
Framing
“People's behaviour is greatly affected by factors that they aren't even aware of. The words "retired", "Florida," and "tired" can make even young people walk down the hall slower. We will always ascribe a rational, conscious-brain reason to our decision, but it's never the whole reason why we take an action, and often the rational reason isn't even part of the reason.” (Weinschenk, S. (2010) para 8)
120 Figure 7.04 Possible System Architecture for the Control Panel System This Figure shows an initial draft of what would be a working site map of the current System. Copyright 2011 C.Ellicott
Sort by: Batches Suffix Alphabetic Date File Size Most recent Colour Faces Buildings
View
Sort by: Batches Suffix Alphabetic Date File Size View UNITE & MANAGE Most recent Colour Faces Buildings Communication
Add
121
Building the Design Brief « Towards a New Conceptual Framework
Install
Set Up
Set Up
Retinal Scan & Login
Retinal Scan & Login
UNITE UNITE Sync Live Sync Live Search META OS/CONTROL PANEL META OS/CONTROL PANEL John Doe | SignIn Workspaces Workspaces
Search
Add Delete UNITE View & MANAGE
Install
Delete
View
Add
WATCHMEN
Delete Add
RECENT ACTIVITY
Communication
WATCHMEN DATA GHOST Add Delete RECENT ACTIVITY A viewing profile Data Trails
IM
Text
Voice R Email
IM
Text
Documents
Music
APPS MOST USED
DeleteAPPS Add
Create New Category Music Videos
Shared Images
Create New Category
Close Add Site
SOCIAL Feeds
Upload SOCIAL
Feeds
Activity
DATA GHOST
CONTROLS
CONTROLS
AUTOMATION
AUTOMATION
Delete
A viewing profile Data Trails
Searches
Activity
Close
Delete
Fully Automated
Shopping History
Shopping History
Data concentration log My FEEDS
Data concentration log
Shared
My FEEDS Add Site
MOST USED
My FILES
Videos Documents Images
Searches
John Doe | SignIn
Voice R Add
My FILES
Delete Add
Thesis by: C. Ellicott, 04.08.2011
Upload
Gallery
Gallery Files/Folders
Semi AutomatedFully NOT AutomatedSemi Automated Automated
NOT Automated
Learn
Learn
INTERFACE SETTINGS
INTERFACE SETTINGS
Navigation Order Background Colour Set home page Order Navigation Files/Folders
Background
Colour
Set home page
NEW USES OF YOUR AVATARS NEW USES OF YOUR AVATARS Active Sites
Secondary sites
Active Sites
Places
Secondary sites
Places
BACKUP Add device Duplicate on device My APPS
Duplicate on device
Add app Add device
Upload Display My APPS
Add app
Upload
Display Add
My FILES
Delete Add
My FILES
Delete Fully Automated
Txt Profiles of apps per device
Txt Profiles ofTxt all apps Profiles of apps of all •Current ProfilesTxt of apps TxtallProfiles apps working Txt Profiles of all apps per device per device per device per device environmentper device
Add
MY STORAGE Automated
Delete Add
MY STORAGE
ACCOUNT
OTHER
Automate
Add
App installs across devices
Move
Locate my data? Find storage
Automate MY DEVICES
Delete Add
Contacts
Add
MISC
Move
Bookmarks
PASSWORDS
Delete Add
Calendar Contacts
Delete Add
ACCOUNT
Password
Delete Account Email Prefs
Autofill Password
Delete Account
Autofill
Locate my data?
Synch MY DEVICES
Delete
SynchMISC
Bookmarks
PASSWORDS
Delete
Calendar
Delete
Sync
Sync
Apply app profile
Choose which devices Apply app profile
Synch
App installs across devices
Add
NOT Automated
Delete Email Prefs
Find storage
Semi AutomatedFully NOT AutomatedSemi Automated Automated
•Current working environment
OTHER Automated
BACKUP
Synch
Choose which devices
122
Building the Design Brief « Towards a New Conceptual Framework
123
Thesis by: C. Ellicott, 04.08.2011
2. With the KISS (Keep it simple, stupid) Principle, which is a cruder but more evocative take on Maeda’s [2006] framing of good design as just being ‘simple’, the user interface would borrow heavily from familiar conventions, one of which is analogy. While it would not be prudent or practical design practice to give up the standard computing conventions completely, the data ghost could add to the understanding of the new identity-specific computing experience. When the questionnaire participants were asked how they would feel about learning new software from scratch, they gave two main responses: the software would have to be useful or involve an area of interest, and the software would have to be fairly simple and relevant, otherwise there would be little motivation to learn it. A simple four-step set-up and installation process for the system adheres to this principle, keeping the set up to a minimum and automating as much of the process as possible.
3. Experience is more important than features, so making the interface simple, inviting and accessible will determine the system’s failure or success. Thus, if some of the features need to be rolled out over time to keep it simple, that will take precedence. Designing an uncluttered environment to reinforce the idea of de-fragmentation will also be of utmost importance.
Figure 7.05 Unite Install and Set Up Screens This Figure shows the initial install screen on a computer what the system should include, what drove the design to this solution, what the system needs to do and how it needs to work. As well it touches on what issues have to be contended with in design, specific to the Cloud. Source: Image of woman’s head used in system interface design by Dan Mountford (2010) http://www.flickr. com/photos/danmount-
4. As was made clear in the research the idiosyncratic ways in which users manage data and collections needs to be accommodated. Users will need to be able to customize their control panels (within reason) to personalize and create their own environment.
5. The system will include a universal password, that will have the ability to unlock all of an individual’s passwords, or specific passwords
ford/5239110479/in/set72157625371295037 Reproduced under Creative Commons Attribution 3.0 Source: Copyright 2011 C.Ellicott
Scenario #1:
124
The Changing Digital Landscape ÂŤ Towards a New Conceptual Framework
Persona #1: Tonya & Claire Bartoloni Age 48 and 8
Owner of Design Business Always five things on the go.
A busy single motherâ&#x20AC;&#x2122;s home computer dies125 Thesis by: C. Ellicott, 04.08.2011 during exams and a birthday: critical times Netbook Spare media computer iPhone main phone Laptop Work computer
Tonya owns her own small Design Studio, where she is jack of all trades, writer, business owner, manager, book keeper, and forever busy. Recently divorced, she finds it difficult juggling work, home life, and motherhood. Tonya does it well but she has had to give up caring about some things, such as imperfect housekeeping or organising in general in favour of getting things done.
Desktop Home computer iPod
Overlapping work and home computer usage is common for Tonya, as she is busy. She uses her laptop mainly for work while the home desktop she also uses to store family heirlooms and it is what Claire does her homework on.
Tonya has to g always one file need, and this to fix she need as images to m and invites. Th Cloud storage
On Tuesday, Jan. 11, 2016: when Tonya attempted to upgrade a driver on her PC, it just up and konked out. Tonya has a full life with little time to fuss over things, especially her home computer.
At Kinkos, Tony all the images As Tonya had i files through h copy and then while she waite
Spending time with her daughter, who is an avid gymnast and running herself, is pretty much where all of Tonyaâ&#x20AC;&#x2122;s spare time goes, besides keeping her business going.
Scenario #1: cont. 126
The Changing Digital Landscape ÂŤ Towards a New Conceptual Framework
He suggested she tried the Unite system for synchronizing her data with her devices.
Tonya has to get the computer fixed because there is always one file on the computer that goes down that you need, and this was one of those cases. As it take a week to fix she needs to get her daughter's homework, as well as images to make Claire a Hannah Montana birthday card and invites. Thankfully the technician put all their data in Cloud storage so she could access it easily.
Great, it can also automate a back up as well!
Tonya was willing to give the Unite system a go, even though she has no patience for software aggravation. A quick 4 step install process was needed on one of her devices and then a simple additional step for all her other devices. Tonya was then able to access her data. After the retinal scan she decided to leave the password set-up until a later date.
Happy Birthday Claire
At Kinkos, Tonya realizes she forgot her netbook with all the images she had downloaded for Claire's card. As Tonya had installed Unite she was able to get her files through her interface on her iPhone, add some copy and then e-mail it to Kinkos and have it printed while she waited.
Tonya tried and loved the fully automated file management feature, as she has little time to file and organise. Her files are here there and everywhere, but whatever file view Tonya chooses, the system will display her smattering of files in that view. This is a powerful feature of the Unite System. She can even add different view styles, if she new how to program open source. The views create a new lens or filter with which to look at her digital clutter. Yay!! Source: Copyright 2011 C.Ellicott
127
Thesis by: C. Ellicott, 04.08.2011
128 Figures 7.06 - 7.07 A Four Step Set-Up Process For The Unite System. Step#1: Sets up a personal login with a retinal scan and a password. However the password, can be checked to be over ridden if the user is confident their retinal scan is enough.
Step#2: This sets up the users personal data which will be used for identification as well as filling out forms and profiles in the future. There is an advanced feature for those who want to add social networking, dating and activity profiles specifically for other sites. The users cookie information is used to fill out this screen, but allows the user to double check the information is correct. Copyright 2010 by C. Ellicott.
Building the Design Brief ÂŤ Towards a New Conceptual Framework
129
Thesis by: C. Ellicott, 04.08.2011
Figures 7.08 - 7.09 Step #3 and Step #4 Step# 3 This step is crucial in telling the Unite system what a persons individual working set-ups are on each of their devices. It collects crucial working information about the devices, their software, their customised preferences, as well as any meta data on their data and creates a profile of each. This then gets uploaded to the Cloud. This step can be skipped if the user does not have time to immediately scan all devices and can be preformed later either directly from the persons devices or through the control panel. Step#4 This final step allows the control panel to navigate through all the users stored onboard data and online data to unite it. It also allows the user to choose the easiest solution, upload all data in the cloud and create a back-up or those more savvy or budget conscious to choose if they want to completely mirror all their data in the cloud or parts of it. The panel provides suggestions for free or affordable Cloud storage services, once the system calculates all their data. Copyright 2010 by C. Ellicott.
130 Figures 7.10 - 7.11 Control Panel Examples of Data View and Sorting Options Individuals can view their data in many different ways no matter how scattered or disorganised it is. Each view tries to create some order and hierarchy for the user. In the first image the information has been grouped by file type as well as by where the data exists, on which drivers it resides. The next data view is a more familiar tree view, which also can be customised to add more or less columns of information. Copyright 2010 by C. Ellicott.
Building the Design Brief ÂŤ Towards a New Conceptual Framework
131
Thesis by: C. Ellicott, 04.08.2011
Figures 7.12 - 7.13 Control Panel Example of Data Views Left shows an upload screen for all file types. Alternatively, the user can drag and drop their files right onto their virtual Unite hard drive. Below is an icon view of images. The user can choose how many to load on per screen what meta data they want to see with the photos and how they want to sort them, in this case by faces. There is an on/off enlarge feature, so as users roll over the image they can get a bigger view.Copyright 2010 by C. Ellicott.
132
Building the Design Brief « Towards a New Conceptual Framework
can be opened on launch, and not others. The one-password entry would be protected by a retinal scan of the owner at login, and the application would log out automatically if the device lost sight of the user’s retina.
6. A hybrid solution for storage allows access and availability to data with or without WIFI. The best model for the near future of personal computing is a hybrid, using both Cloud and local storage on an
133
Thesis by: C. Ellicott, 04.08.2011
Figure 7.14 Login Screen With Required Retinal Scan And Optional Password Entry There is no need for an on off button on the software as the Unite system uses biometrics to sense an individuals presence at the computer and turns on or off automatically once they have left their computer. It logs in the same way if the individual chooses the override password option. Copyright 2010 by C. Ellicott.
individual’s own devices. This would appeal to the less computer literate end of the participant continuum and would also allow a transition for those who still want to own their computers and devices. As well, it could provide reassurance for those respondents who were wary of putting all their data in the Cloud. The ability to mirror data in the Cloud and on a local disk will allow an extra copy of individual’s key data to be duplicated both for access and back-up purposes. The added profiles of an Individual’s devices would allow the system the ability to know where all the data is without the user needing to know that information.
7. Fragmentation of peoples data is addressed with synchronized centralized management of data, storage and devices through one interface—the control panel. It will let users see and work with all their files from various devices, online accounts and cloud services without having to jump from window to window. It will facilitate drag and drop action of files between accounts and uploading of files and folders as well as editing of documents from the control panel or desktop. Other useful features will include viewing specific types of files across these services and managing and creating new folders that can be synced to the device being used.
134
135
Building the Design Brief « Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
Figure 7.15 Hybrid Data Storage And What Data Should Be Synchronized
Synchronized devices – Application Install Mirrored / synchronized – All data
cloud
Mirrored / synchronized – Only specific files
1 access panel
Upload files/data to Cloud
Devices with little storage capacity, it doesn’t make sense to mirror all one’s data on those drives, however this does not prevent synchronizing of data. It just means large files like movies get streamed or smaller files are downloaded as and when they are called for. Copyright 2010 by C. Ellicott.
Download files/data to device
16 Gig
: Netb
ook Dropbox: Ex. Cloud Storage 2 Gigabytes
Cloud Only
Cloud Only
Cloud Only
On board
Cloud Only
Cloud & Onboard
Cloud & Onbord Mirrored
Cloud Only
136
137
Building the Design Brief « Towards a New Conceptual Framework
8. The system would constantly monitor the individuals data ghost’s
Figure 7.16 Data Storage Pyramid
contents at a macro level. These would involve different data visualiza-
This pyramid shows approximately how the individual might allocate priority to their data and thus its duplicated storage in the Cloud.
tions of a user’s activities, searches, data amounts, etc. Through close monitoring, the system would notify the owner of any new appearances
wThe First tier contains the most important data and can be stored for free with most data storage companies.
of a person’s name/avatar or suspicious data creation. It would also allow DATA STORAGE PRIORITIES
STORAGE QUANTITY & LOCATION
people to see if someone has gained control of their identity, credit etc., and enable them to view the specific kind of activity that is occurring.
The second tier may be data that an individdual decides to pay for, but some individuals won’t create this much data.
Tier 1 data
The 3rd tier is data like music and movies that people can download again if need be and an individual may decide not to pay to have this storage duplicated in the cloud, but will still want access to it through
All meta data, profiles and personal information
10-20 Gigs
Text files, e-mail records, IM conversations, avatar profiles, meta data about all data.
their control panel. Copyright 2010
9. This system features both automation and user control. As it would
Stored in Cloud and mirrored locally for back up
cater to different ability levels, the control panel would allow the user to choose how much control he or she wants to have over data automation. The options would range from a purely automated setting (the default
Profies of customized workspaces system preferences, online buying records, cookies, settings, data storage profiles. Bookmarks, contact lists, data bases, avatar profiles, etc.
by C. Ellicott.
setting) for users who do not want to think about how to organize their filing and managing, to a semi-automated setting, to no automation whatsoever. There would also be a learn feature that, when in the semi-
Tier 2 data
Purposefully created personal data Personal documents, digital photos, imagery, writings, files, documentations, videos, sound collections. Personal Archived collections of the above.
30-100 Gigs Stored in Cloud and mirrored locally for back up
Irreplaceable personal files. these are a more bulky set of files than the above ones, hence the need for a considerable amount of storage
automated setting, could ‘learn’ peoples filing habits and patterns and begin to replicate them on the command of the user.
10. Open Source allows for ongoing modules to be added to the core program in order to enable people to volunteer and add modules to the
Tier 3 data
Replaceable Bulky Data This could be redundant work files, media collections such as: movie libraries, digital TV series, audio book files, music collections, etc. All these files are linked to collection profiles which if the data was lost, the profile would re-locate it and download it for the user.
75+ Gigs Stored in Cloud only
system. This may include moving into the domain of the house so that one can control house activities, or may sync with sporting computers to allow for more integration and assessment of activities.
Thesis by: C. Ellicott, 04.08.2011
138 Figures 7.17 - 7.18 Data Ghost Screen Views These have more granular views of a persons data, so they can see what kind of digital hoards they are, or look at other habits, like computer usage, windowâ&#x20AC;&#x201D;multi-tasking activities, shopping habits, searches, pages viewed etc. Copyright 2010 by C. Ellicott.
Building the Design Brief ÂŤ Towards a New Conceptual Framework
139
Thesis by: C. Ellicott, 04.08.2011
Music activity Hip Hop
1 week of activity
Brit Pop
Online Banking
Indie
FaceBooking
Soul
iTunes Activity
Blues
E-mail Activity Creative Activity
The Beautiful South Carry on Up the Charts
Throw his song Away Old Red Eyes Love Wars We Are Each Other Love Wars 36D Norway Each Other You Keep It All In Bell Bottom Tear Little Time Good as Gold My Book
Adobe Illustrator 1 Hour: 9.08-4.15 July 10 2015 Race Car diagram.eps
Scenario #2: 140
The Changing Digital Landscape « Towards a New Conceptual Framework
A family with demanding computer needs 141
Thesis by: C. Ellicott, 04.08.2011
Smartphone
Media Pr
iPhone
Desktop
Laptop
iPods
Persona: A family and teenagers Sue & John Taylor, children Kelly & Jesse, Jack Ages 48 and 52, 17 and 13, 15
The Taylors have used computers in their lives for awhile now, however, the kids and Sue haven’t a clue how John makes them all work. John installed the Unite system for the family to help the family better share their limited number of computers. John sets up each of the family members their own Unite hard drive for their data and a profile.
Sue is a Social Worker, while John is a Marketing director at a Computer Co. which makes security software for businesses.
The Taylors won’t pay for movies and TV shows as t data. The Unite media pr the family’s scattered dat work from. If the family w their Unite meta data prof to retrieve them again?
Sue’s Phone Profile
Sue’s Profile
As Sue and John both work full time, so their children are left to their own devices a couple hours each day when they get home from school. The family has two main computers however, there can be a real battle for the machines when the whole family is home. The family has been using the unite system to make it easy to separate and control all their individualistic working habits/profiles and to keep data separate while they all use the same machines.
The Taylors have also synched up their media centre using a Unite media centre profile that unites their widespread movie and game files from their various smart phones, Xbox, external drives and computers.
All of Sues data (files and and mirrored in the Cloud on any of the family mach or even her office machin from home.
Scenario #2: cont. 142
143
The Changing Digital Landscape « Towards a New Conceptual Framework
Thesis by: C. Ellicott, 04.08.2011
Media Profile Media Profile
Meta DataMeta Data Media Profile Media Profile Kelly’s Profile Dad has a Dad has a Kelly’s Profile ban on certain ban on certain sites on Kelly’s Profile sites on Kelly’s Profile
Kelly, Jesse use the computers Thewon’t Taylors won’t pay for Cloud for storage for games all their games Kelly, Jesse and Jackand useJack the computers to listen to to listen and to and The Taylors pay for Cloud storage all their download music, use Facebook and do their homework. movies and TV shows as they have several terabytes of download music, use Facebook and do their homework. movies and TV shows as they have several terabytes of Because John doesn’t want the kids deleting any of his data. The Unite media profile John set up is able to unite Because John doesn’t want the kids deleting any of his data. The Unite media profile John set up is able to unite and Sue’s important files he has set up separate the family’s scattered data in one synchronised panel to and Sue’s important files he has set up separate profiles profiles the family’s scattered data in one synchronised panel to each of them. However as he is the administrator, he work from. If the family were to lose all their media files for each for of them. However as he is the administrator, he work from. If the family were to lose all their media files has access to all profiles, and has set up off-limit websites. their Unite meta data profile file contains all the information has access to all profiles, and has set up off-limit websites. their Unite meta data profile file contains all the information to them retrieve them again? to retrieve again?
Sue’s Phone Profile
Sue’sSue’s Phone Profile Profile
Sue’s Profile
John’s Work John’s Work & Home Profile & Home Profile
John, up working home a lota so has a work All data of Sues data and apps) areUnite on the Unite system John, ends up ends working at homeat a lot so has work All of Sues (files and(files apps) are on the system profile set up so there is no problem with files, missing files, and mirrored in the Cloud for extra back up. She can jump profile set up so there is no problem with missing and mirrored in the Cloud for extra back up. She can jump fonts, or programs. Thishim allows him to be at home on any of the family machines as can anyone in the family, fonts, or programs. This allows to be at home on any of the family machines as can anyone in the family, and at at the work at the same time. or even her office machine andaccess quicklyall access all her data and at work same time. or even her office machine and quickly her data from home. from home.
John’s Work, Home John’s Work, Home Media Profile and Media and Profile
Johnfor travels work fairhis bit, so his company Thelike Taylors like the idea data of their datagrowing, ghosts growing, not John travels workfor a fair bit,aso company loan out loan outThe Taylors the idea of their ghosts not an assortment of to laptops to their staff, however only check do they to see how but it looks but see if they an assortment of laptops their staff, however they are they are only do they tocheck see how it looks to see if to they mainly set upcomputer for the computer developers. With Unite are John are close getting their driveAnother space. Another mainly set up for the developers. With Unite John getting to close using to upusing their up drive space. able setlaptop up thewith laptop withofa the click of the He button. He feature of the data that itthem allows to monitor is able toisset uptothe a click button. feature of the data ghost is ghost that it is allows to them monitor have a full working environment within minutes. computer computer usage, shopping ascredit well as credit card activity, can havecan a full working environment within minutes. usage, shopping , as well ,as card activity, asmuch well as much more. as well as more. Source: Copyright 2011 C.Ellicott
144
Building the Design Brief « Towards a New Conceptual Framework
Figures 7.19 - 7.20 (right) The Communication and Social Media Feeds Panel
11. In addition, to further address fragmentation, the panel will manage
Not only does this panel unite all ones communication and social sources but it allows various sort features for viewing the communications as well as The ability to manage the data. A user can upload images from here to Facebook, for example, or delete old view, search old status updates and delete irrelevant or silly
spoken words are preserved only in the fading memory of the people
posts. Copyright 2010 by C. Ellicott.
social networking identities and online avatars. In the physical world,
who hear them, whereas online, those comments can remain current for years. For instance, the expletive-laden childish rantings of the now conservative adult job seeker may be just one Google search away and have serious ramifications for years to come.
As the probe and questionnaire responses suggest, social media is at the core of much of today’s online activity. However, one of the many limitations of social media is that there is no way to manage it cohesively or even to just sort, search, archive and control one’s online personas. As the presumption is that there is only one data ghost (and it presumes a long existence), this singularity would allow individuals better control of social media feeds. The tool could search message boards and other accounts and allow individuals to delete, for example, entire accounts or messages threads. While deleting data, it would also allow the information to be backed up to a cloud storage tagged to indicate that it no longer exists online.
12. Synchronization of data has been made possible with the Cloud and will be made even easier once people’s data is more centralized. Some might argue there is already a fairly comprehensive degree of synchronization available between data with devices today with products such as Drop box or Mobile Me. Certainly, some synchronization does currently exist, but only for fragments of data and devices, and therefore perpetuates a splintered solution. In contrast, the Cloud system allows for synchronization of:
145
Thesis by: C. Ellicott, 04.08.2011
146 Figure 7.21 (right) Example of a Real-Time Synchronized Work Spaces. By hitting the live synchronise button the user is able to synch their live works paces with other devices. If the device doesnâ&#x20AC;&#x2122;t support all the functionality of the previous device, an alert message will let the user know which apps could not be opened on the current device.
Building the Design Brief ÂŤ Towards a New Conceptual Framework
1. all devices and data 2. real-time (dynamic) work spaces 3. pre-scanned profiles of (static) work spaces
13. The system will create real-time (dynamic) seamless computing work spaces, so that a current work environment can be mirrored in
Copyright 2010 by C. Ellicott.
real-time across any computing device for use on another one. Therefore, if a user got tired of working at his or her desktop, but would like to carry on with the same activities on another device elsewhere, they could do so simply by hitting the real-time synchronize button and choosing which device they want it to synchronize to.
14. Uploading various working profiles into the Cloud would enable quick set-up of other devices as well as fast emergency repair, replacement or upgrading. The ability to re-install all the apps and customized preferences of each app would allow a desktop environment on one computer to be transported to another machine with settings and software synced across machines with various levels of control. The same would hold true for OS X or Linux. The technology would also be able to remember several profiles for different work environments and record all the apps an individual has installed from any app store, automatically installing them on any new device.
Another benefit of locating working profiles in the cloud would be to allow users access to their own work environments (recorded in their working profile) on computers that are not their own. Say, for example, users who do not own a computer may have set up a working profile over time with their favourite desktop, music, videos, video player and applications. When they use a communal computer, such as at an Internet cafĂŠ, they would have their own virtual computer set up exactly
147
Thesis by: C. Ellicott, 04.08.2011
Scenario #3: 148
The Changing Digital LandscapePersona: « Towards a New Conceptual Framework
Travelling Couple Todd & Nancy Hardy Age 27 and 25
Location-independence and a good trusty149 Thesis by: C. Ellicott, 04.08.2011 resource is all that Todd and Nancy need
Journalist and Developer iPhone
Todd and Nancy are computer lovers. They couldn’t imagine their lives without them. They use them in every facet they can to help make their lives more efficient. The Unite system is something Todd has been wanting for sometime now, so when was mentioned, he signed on to be one of the beta testers for it. Todd likes to be able to tinker with computers to make them just right for him, always jail-breaking devices to set them up in a more customised fashion. So the unite advanced customization with no automated settings was the first thing Todd checked for him.
Nook
MacBook Air
Laptop
Smartphone iPod Touch
Todd and Nancy are fitted out, with files and software they need for work, entertainment, and communication.
Item
One day they decided to pick up and go. To abandon the normal working week schedules in favour or travelling a bit and working a bit. Both of them had the kind of job they that translated to being able to do on the road provided they had access to decent wifi access along the way. With bag in tow, but kited out with their main computer devices, they set off for the sky.
With Unite fully in and synched up t business and dail All movie files, m
Fol
Fol
F
It
It
F Packed away in their digital devices and synched up with Unite Todd & Nancy took 675 comic books, 210 novels, 25 games, 527 music CDs, 25 Boxset TV Series, 180 movie DVD’s, 40 audio cassette books, boxes of photos and a lot of software and extra hardware. But luckily, besides Todd’s skateboard it all fit in a suitcase and a carry-on. If Todd and Nancy were to pack the physical items they were taking with them digitally they would need a small Uhaul to carry them.
F
Fol
Fol
Item
They both really It alerted them to had not been acc
Scenario #3: cont. 150
151
The Changing Digital Landscape « Towards a New Conceptual Framework
Customize Interface Customize Interface Add background
IM
Todd (IM) Todd (IM) Hey, Bob, Its Hey, raining, Bob, Its raining, I need to move to my I need to move to my hotel, I’ll catch up, asap. hotel, I’ll catch up, asap.
IM
Create custom folders Add background Create custom folders
Choose home pageChoose home Upload page new view Upload new view Choose label colour backed up filesTag backed up files Choose labelTag colour Fully Automated
Fully Automated
Semi Automate
Semi Automate
No Automation
No Automation
IM
IM
Thesis by: C. Ellicott, 04.08.2011
IM
IM IM
IM
Real-time synched synched environments Real-time environments With Unite fully installed on all their devices and customized With the advanced settings Toddsettings & Nancy customized With Unite fully installed on all their devices and customized With the advanced Todd & Nancy customized and synchedand up to Cloud storage, theystorage, were able to were carry able out to all carry the settings, looksettings, and feel,look to work with to their situation. synched up to Cloud they out all the and feel, work with their situation. business andbusiness daily lifeand as ifdaily they life hadasnot left home almost. allow full location but also not to if they had not left homeTo almost. To allow independence full location independence butbreak also not to break All movie files, documents at their finger bank by storing too in Cloud storage. Theystorage. chose They chose Allmusic, movieTV, files, music, TV,was documents was attips. their the finger tips. the bank bymuch storing too much in Cloud not to back uo files, instance, andinstance, had them notmedia to back uofor media files, for and had them running off arunning hard drive home. They didn’t want off at a hard drive atalso home. They also didn’t want the Nook, and idevices having mirrored drives. the Nook, and idevices having mirrored drives.
Item
Item
Folder
Folder
Folder
Folder
!!!ALERT!!!
A feature Todd and Nancy a Nancy lot is the real-time Todd was outside a cafe, starting his day off byhis answering A feature Todduse and use a lot is the real-time Todd in was outside in a cafe, starting day off by answering synchedenvironments, just one of the many e-mails, reading RSS feeds, and having an (IM) conversation synchedenvironments, just one types of the of many types of e-mails, reading RSS feeds, and having an (IM) conversation synching features. They both thoroughly all the enjoy all with a discussing project while reviewing their Google their Google synching features. They bothenjoy thoroughly theBob discussing with Bob a project while reviewing seamless synching features the system spreadsheet. The heavens opened up seamless synching featuresoffers. the system offers. document and document and spreadsheet. The heavenssoopened up so
Source: Copyright 2011 C.Ellicott
IM
!!!ALERT!!!
Folder Folder These files have NOT been accessed These files have NOT been accessedSMS Item Item since 2003 since Choose item 2003 Choose item Item Item likeWould to delete FolderWould you you them like to delete them Folder
IM
SMS
Would you likeWould a reminder in 1a year you like reminder in 1 year Folder Never delete these Neverfiles. delete these files.
Folder Folder
Todd fled to Todd his hotel jumped netbook. fledroom to hisand hotel room on andhis jumped on his netbook. The real-timeThe sync feature lets Todd hit a button real-time sync feature lets Todd and hit a button and automagically synch up where he up leftwhere off. he left off. automagically synch
Folder
Folder
Folder
Item
Item
They both really littleliked ‘digital alert. Linking up allLinking their communication sources into one stream Theyliked boththe really the hoarder” little ‘digital hoarder” alert. up all their communication sources into one stream It alerted them to the fact that a number of a their files of their files or panel made easy conversation tracking: from e-mail, from e-mail, It alerted them to the fact that number or for panel made for easy conversation tracking: had not beenhad accessed for accessed a long time, didtime, they and ... did they to...Twitter, Facebook, Skype, Instant Messenger, This is a etc. This is a not been for and a long to Twitter, Facebook, Skype, Instantetc. Messenger, feature that they both love, with different ways to sort ways and to sort and feature that they both love, with different view the communications allows for an allows ease offor keeping view the communications an easetrack of keeping track of wanderingofconversations from IM to e-mail, to.... wandering conversations from IM to e-mail, to....
152 Thin Client A thin client (or lean/slim client) is a computer or computer program that depends on a server to fulfill its traditional computation roles. That means that it doesnâ&#x20AC;&#x2122;t have
Building the Design Brief ÂŤ Towards a New Conceptual Framework
as they like it. All or any chosen native applications would download to the computer on login when the profile is downloaded. On logout, the
leaving it as it was (all of this is customizable, so if the access time is limited, a user may not choose to download the full working profile).
to eat everything you want without gaining any weight. Instead, some other person gets to pack on the pounds. Source adapted from Wikipedia: The Free Encyclopedia.
Thesis by: C. Ellicott, 04.08.2011
Figure 7.22 The Unite System is Both Browser Based and a Native Application Copyright 2010 by C. Ellicott.
profile would delete anything installed on the local drive of the computer
to locally store everything it needs, and instead Imagine being able
153
Note: At the very extreme and most ideal situation the user would be able to sit at any computer or thin client and within minutes have their main working environment downloaded, complete with their favourite operating system and set up.
15. The control panel would locate storage space and give options based on the data the control panel retrieves and unites from an individualâ&#x20AC;&#x2122;s computing and storage devices. It would allow users to mirror and duplicate whatever data they want in the Cloud. A further feature is that the control panel would look for storage services to accommodate data, which would be especially applicable to users who have so much data, they need to pay a monthly fee for it. The panel would find the most economical storage solutions. This would be particularly relevant for the high-use and literate participants.
16. This system will come as an installable application as well as a browser-based application. While the Unite system could work solely in a web browser environment, the more powerful application would be recommended. This would then help the application circumvent any bandwidth problems that could arise from it being solely browser-based. Another feature is that it would give the option to automatically install the application across all other devices, thus saving time and energy on multiple installations and upgrades
154
155
Building the Design Brief ÂŤ Towards a New Conceptual Framework
Figure 7.23 The Main Profiles That a Users Device Would Upload to the Cloud.
Operating System Setting Profile Apps and Application Profile Bookmark Profile Mail Setting Profiles Contact Profiles Aliase Profiles Data Storage Profile
Thesis by: C. Ellicott, 04.08.2011
cloud
Working profiles of each device saved to the Cloud makes for easy accessâ&#x20AC;&#x201D;they allow the computer small access files in order to make the system more efficient. They help the computer prioritize so it can put secondary needs in the background working. Copyright 2010 by C. Ellicott.
Scenario #4: 156
The Changing Digital LandscapePersona: « Towards a New Conceptual Framework
Widowed Wife Joan Whynott Age 62
Joan now out of a job doesn’t own a computer, 157 Thesis by: C. Ellicott, 04.08.2011 but does have computer needs.
Office Administrator Joan was just let go from her office job, due to downsizing and to her surprise, much earlier than she had anticipated.
iPod Touch
She will need to look for a new job to keep her quality of lifestyle. Joan is a vibrant woman, actively involved in associations, gardens, walks regularly, as well as does pilates. She loves bowling with her young grandchildren and often takes them or a friend to a a sunny destination for a vacation every year.
Joan, basically is not big into computers, at least not at home. She uses her desktop at work for a few personal e-mails and storage as they are so few and far between. Joan isn’t a luddite, but would most likely be considered a beginner. Her work demands that she use some limited programs, e-mail, Word, Excel.
Joan is not intimidated by the new computers, but does admit she is not very proficient, even sometimes her grandchildren can show her a thing or two.
Joan has been let go from her job and it was suggested that she sign up and upload any of her personal her files to the Unite system. She did have a few files she’d like to save, recipes from work mates, photos, resume, e-mail addresses, etc.
Scenario #4: cont. 158
The Changing Digital Landscape « Towards a New Conceptual Framework
As Joan has to update her resume she also needs access to her old files from her work computer that are now in the Unite system, in this case an internet cafe. Unite found Joan 20GB free storage, more than enough room for her files. At the cafe Joan downloads her old work environment right down to apps and her old desktop pattern.
However, as Joan doesn’t own a license for Word, Unite alerts her to this and suggests she download a 30 day trial or use Google docs (free). After using the system a few times, Joannotices that it has a page that records all the last programs and files she’s used. This makes things quicker for her.
A feature that has become useful but is new for Joan is the ability to access her recipe files from her iPod Touch, She uses dictation to put her shopping list on the iPod, but on occasion, if she sees a special on at the grocers and will look up an appropriate recipe by synching with her Unite data.
As Joan has been spending more time at the Internet cafe, she has realized there is a digital world opening up to her, especially having her own data ghost, Unite sys. Downloading podcasts and music while she works makes for a comfortable environment which she then synch with her iPod to walk to. Source: Copyright 2011 C.Ellicott
159
Thesis by: C. Ellicott, 04.08.2011
160
161
Building the Design Brief « Towards a New Conceptual Framework
SUMMARY
I call it the Internet of One. I want it to be mine, and I don’t want to work
The design of a system like Unite would enable users to more effectively
too hard to get what I need. In a way, I want it to be HAL. I want it to learn
control and manage all their data. United together, individuals could own
about me, to be me, and cull through the massive amount of information
a vast virtual computer that is now merely analogous to the original
that’s out there to find exactly what I want. (Fussman, 2010. para. 32)
ownership over personal data. As all online accounts and online identities
been proposed here, she does summarize much of what this design
would be administered through a single control, it would be easier to
brief intends to accomplish.
delete and archive at the touch of a button. The proposed control panel will attempt to personalize and simplify the The design of a system that appears simple at the outset but, over time,
computing experience for a variety of Canadian computer users. Such
makes its depth and complexity more apparent to the user, was based
an outcome should cut down on privacy and ownership issues as well as
on the simplicity principle that designers like John Maeda apply to their
feelings of stress, disconnection and anxiety as it helps individuals become
creations. Such a simple system would give users the ability to sit at any
substantially less fragmented in their virtual lives.
devices, digital life and data. By changing the emphasis from the computer to the person and creating a unified computing experience which travels with the person like a ghost, some of the affects of the demanding machine on the individual will be mitigated.
To unite working environments, data and devices into one cohesive whole is something people have been dreaming of for years. The current computing paradigm with its inconsistent bandwidth can create bottlenecks preventing efficient work environments and seamless personal computing experiences. The words of Yahoo CEO Carol Bartz echo many of the needs expressed by the probe respondents. In an Esquire interview, Bartz mentioned wanting a more personalized computing experience:
from the Space Odyssey films and books. Hal interacts with the crew and helps them through their travels. He appeared more human than did to help them out? Source adapted
While Bartz’s vision may even be a little more futuristic than what has
users would be able to take more control over their computing experience,
lived on the Discovery One spaceship
the crew. Who wouldn’t want a HAL
independence, synchronization and mobility and might also provide
inconvenience. Rather than being controlled by the computing devices,
HAL A conscious, feeling computer that
physical one. This would allow for greater freedom in terms of location-
computer and synchronize their experience with a minimum amount of
Thesis by: C. Ellicott, 04.08.2011
from Wikipedia: The Free Encyclopedia.
163
08 Conclusion & Suggestions
164
165
Conclusions and Suggestions ÂŤ Towards a New Conceptual Framework
INTRODUCTION
on the benefits of computing products it produces. This can be done
This study describes and explores the rapidly changing digital landscape
by consciously reflecting on the larger context of computer usage
and its impact on the personal computer user. The landscape has grown
(i.e., historical, environmental and social) and by truly listening to
out of a business-dominated model, with the interests of experts and
the individual personal computer user. As in this study, using people-
corporations dominating those of the individual. The study confirms that
focused methodologies would be a good place to start.
the rapid evolution of technology and lack of synchronization have contributed to fragmentation, depersonalization, and a new level of
This study applied Action Research methodology in order to ensure
complexity in peopleâ&#x20AC;&#x2122;s lives. Although computers were intended to
a fluid motion of input and analysis, and to keep the study accurate
enhance daily activities and make tasks easier, this is not always the case.
and relevant. Personal computer users were involved in the design
From the literature review, it is evident that we are at a turning point in
process from the outset through participatory and collaborative research
the computing evolution. The scattering of data across multiple devices
methods. This produced rich and authentic results, however vast and
(many of which do not or simply cannot communicate with each other)
varied. One of the drawbacks of this approach is that it is very time-
is reaching near-crisis proportions. Now is the time for design to make a
consuming with regards to results interpretation. The assumption is
difference. Tech-savvy designers need to re-examine the type of products
that, unlike what happened in this study (due to time constraints),
and services that are being produced and not only come up with something
the consumer would be involved in the full process, both research
better but something that resolves the multiple devices dilemma. For the
and design. Ideally moving forward, a continued interactive process
most part, current design has been caught up in a directionless frenzy,
and an increase in the size of the participant pool would help to make
producing numerous apps and devices for the booming mobile phone
an extremely relevant and valuable system design.
industry. As a consequence, there are a large number of products on the market that are of little real benefit to the consumer.
At its core, this study addressed the salient and user-driven issue of data fragmentation in a theoretical way and also revived the analogy of the
If, instead of following the herd and the fast buck, designers took their
ghost in the machine as a viable solution to data scattering and multiple
cue from researchers outside the corporate enclosure, products of real
devices. The ghost in the machine is a philosophical mechanism to show
value to the consumer could emerge. From their unique vantage point
the current technological shift from something that was previously
of being both creator and enhancer, designers have the ability to pose
physical to something that is a virtual extension of both the technology
the question as well as the power to impact the answer. How people will
and the user. At this point, the ghost in the machine analogy has been
personally compute into the future is a pivotal question that requires
not explored to its full potential. While the use of this analogy was key in
urgent and in-depth investigation leading to a people-friendly answer.
the development of the system, it was not introduced to the participants
In this investigation, design needs to take a more active role in reflecting
nor was it part of the analysis study research. Nevertheless, it proved
Thesis by: C. Ellicott, 04.08.2011
166
167
Conclusions and Suggestions « Towards a New Conceptual Framework
helpful in conceptualizing a unifying framework for designing the system
In exploring the above issues and problems, one talking point could be
and should therefore be part of future participatory research, if indeed
whether the computer divides people or brings them closer together,
such research were to proceed. The analogy’s reception by the general
as was alluded to in the literature review. The Unite system attempts
public remains to be seen, but its usefulness in describing a shift from
to address this potential division by increasing access to computing
the physically real to the virtually real should be explored.
experiences for all people, regardless of socio-economic conditions or
The ghost in the machine concept helped the designer to:
user abilities. The system is truly democratic, being neither hardware nor
1. Conceptualize the computer as an idea as opposed to
location dependant, universally accessible, and based on an open source
a piece of hardware
platform. The major value of this project and thesis study is that its findings
2. See the vastness of individuals’ digital collections
have opened up the possibility to a more person-centered form of
3. Unify data into an extension of an individual as opposed
computing that simplifies rather than complicates people’s lives. As such,
to a machine
this people-friendly system belongs in the realm of a social invention, like Wikipedia, open source, etc. The technology exists already to create such
The purpose of the new control panel system, as an application, is to unite multiple data and identities across several devices. It aims to address some of the specific issues raised by participants in the study, most notably fragmentation and lack of synchronization caused by too many devices and data sources. A control panel that allows users to access their scattered data through one portal will simplify the computing experience and help them manage all their data from one point.
To reduce complexity, the system includes simplifying features such as a retinal scan that will allow for quicker and simpler entry. It also includes self-organizing data management controls and views plus a self-modifying habit inclusion. The system is based on the study of the participants and was designed to appeal to a wide range of users, right down to personalizing one’s data with the data ghost view of an individual’s living breathing data. If this control panel were to get to the production stage, it would revolutionize personal computing.
a unifying computer experience, and this thesis confirms its need.
Thesis by: C. Ellicott, 04.08.2011
168
Conclusions and Suggestions « Towards a New Conceptual Framework
169
SUGGESTIONS FROM THE THESIS A gap identified in the thesis process was the absence of non-computer owners in the participant study. Including this group in another collaborative study would serve to extend the social capacity of this design, as this group may represent different socio-economic backgrounds and education levels.
Furthermore, since the system platform is based on a non-commercial technology, more in-depth research on altruism in technology would be useful. Access to computing is becoming much like access to fresh water, clean air, libraries, etc., in its commonality and necessity. (See Elinor Ostrom’s Collective Action and the Evolution of Social Norms, Revisiting the Commons: Local Lessons, Global Challenges.)
Personal digital curation is another topic for future study, as there is little research in this area to date and its findings could positively impact this system. Currently, there is a vast amount of subjectivity in how users collect, manage and file data, and cataloguing of personal preferences could contribute to the system’s feature options.
Finally, design schools could offer Participatory Research Method courses to generate a culture that strives towards an interactive design process.
09 Bibliography
170
Bibliography « Towards a New Conceptual Framework
Akst, D. (2005). On the contrary; unbundles of joy. New York Times. Retrieved 9/11/2010, 2010, From http://query.nytimes.com/gst/fullpage.html?res=9501e 4dc1131f932a25751c1a9639c8b63 Aldersey,W, H. (1990). Cranbrook design : the new discourse. New York: Rizzoli. Allan, R. A. (2001). Personal Computing in the 1960s. A history of the personal computer: The people and the technology (pp. xxxiii-xlviii). London, Ont.: Allan Pub. Anderson, C. & Wolff, M. (2010, August). The Web Is Dead. Long Live the Internet. Wired Magazine. Retrieved August 29, 2010, from http://www.wired.com/ magazine/2010/08/ff_webrip/all/1 Anderson, R. (2011). Average Time Spent Online Per U.S. Visitor In 2010, ComScore Data Mine. Retrieved 2/15/2011, 2011, From http://www.comscoredatamine. com/2011/01/average-time-spent-online-per-u-s-visitor-in-2010/ Ballmer, S. (2010). [Speech At Uw: “We’re All In” For Cloud Computing]. Seattle Times. Retrieved January 22, 2011, from http://blog.seattletimes.nwsource.com/ techtracks/2010/03/04/Steve_ballmer_speech_at_uw_were_all_in_for_ cloud_c.html BBC News, (2010) First human ‘infected with computer virus’. British Broadcasting (BBC). Retrieved 11/1/2010, 2010, From Http://Www.Bbc.Co.Uk/ News/10158517
Thesis by: C. Ellicott, 04.08.2011
171
Bruce, H. (2010) Personal anticipated information need. (Paper) Retrieved 11/1/2010, from Information Research website: http://informationr.net/ir/10-3/paper232.html Buchanan, M. (2010). Why aren’t i the center of the apple universe? Gizmodo. Retrieved 7/7/2010, 2010, From http://gizmodo.com/5552953/why-arent-i-thecenter-of-the-apple-universe Buckley, P. (2010). The rough guide to cloud computing. London [England: Rough Guides. Campbell, S. (2006, January 11). USC Study Finds Broadband to be Most Popular Type of Internet Connection. World’s Largest Communications And Technology Community. Retrieved January 12, 2011, from http://news.tmcnet.com/news/2006/ jan/1277873.htm Carr, N. G. (2008). The big switch : rewiring the world, from edison to Google (1st Ed.). New York: W.W. Norton & Co. Carr, N. (2010) Be Everywhere Now. [Web log post]. Retrieved 11/1/2010, 2010, from http://www.roughtype.com/archives/2009/11/be_everywhere_n_1.php Clement, W. (1983). Class, power, and property: essays on Canadian society. Toronto: Methuen.
Berger, W. (1999, Feb.). Lost in Space. Wired Magazine . Retrieved August 28, 2010, from http://www.wired.com/wired/archive/7.02/chiat.html
Colbert, D. (2010, May 26). Facebook proves that the erosion of privacy is inevitable. TechRepublic - A Resource for IT Professionals. Retrieved October 12, 2010, from http://www.techrepublic.com/blog/tr-out-loud/facebook-proves-that-theerosion-of-privacy-is-inevitable/2053
Berger, W, & Mau, B.(2009) Glimmer: How design can transform your life, and maybe even the world. New York: Penguin Press.
Coates, T. (2011). The importance of making things technology. The Atlantic, Retrieved 8/16/2010, 2010, from http://www.Wikinvest.Com/Concept/Cloud_computing
Bijker, W. E. (1995). Of bicycles, bakelites, and bulbs : toward a theory of sociotechnical change. CambRidge, Mass.: Mit Press.
Concept: Cloud Computing. (n.d.). Wikinvest. Retrieved July 7, 2010, from www. wikinvest.com/concept/Cloud_Computing
Bourne, C. P. & Hahn, T. B. (2003). Early Research A history of online information services (pp. 11-23), 1963-1976. Cambridge, Mass.: MIT Press.
Cowan, R. S. (1976). The “industrial revolution” in the home: household technology and social change in the 20th century. Technology And Culture Magazine, Vol. 17 (No. 1), Nov 15 2010.
Brace, I. (2004). Questionnaire design : how to plan, structure, and write survey material for effective market research. London ; Sterling, Va: Kogan Page.
Cross, N. (2006). Designerly Ways Of Knowing. London: Springer.
Brockman, J., & Pepperberg, I. M. (2010) The world question center “How is the internet changing the way you think?” (pp. 10). EDGE, by Neiman Reports. Retrieved March 8, 2011, from http://www.edge.org/q2010/q10_10.html
D’Souza, L., & Sculley. (2011). The steve jobs guide to creating successful products. The Edge of Internet Marketing | Marketing Bones . Retrieved Nov 8, 2010, from http:// marketingbones.com/the-steve-jobs-guide-to-creating-successful-products/
172
Bibliography « Towards a New Conceptual Framework
Davies, C., & Parrinder, M. (2010). This Page Is No Longer On This Server 2 . Limited Language. Retrieved 10/26/2010, 2010, from http://www.limitedlanguage.org/ discussion/index.php/archive/This-Page-Is-No-Longer-On-This-Server-2/ Davies, C., & Parrinder, M. (2010). Tactile Graphics : Emerging Methodologies. Limited Language. Retrieved 10/26/2010, 2010, from http://www.limitedlanguage.org/discussion/index.php/archive/tactile-graphics-emergingmethodologies/
Thesis by: C. Ellicott, 04.08.2011
173
Gopnik, A. (2011, February 14). How the Internet Gets Inside Us. The New Yorker. Retrieved February 18, 2011, from http://www.newyorker.com/arts/critics/ atlarge/2011/02/14/110214crat_atlarge_gopnik#ixzz1DwfcfRG4 Grant, A. E., & Meadows, J. H. (2010). Communication technology update and fundamentals (12th ed.). Amsterdam: Focal Press/Elsevier. Gruber, J. (2011). John Gruber | Quotes on Design. Quotes on Design. Retrieved March 28, 2011, from http://quotesondesign.com/john-gruber/
Davies, C., & Parrinder, M. (2010). Multiverso. Limited Language. Retrieved 10/26/2010, 2010, from http://www.limitedlanguage.org/discussion/index. php/archive/multiverso/
Hansen, E. (2008). Charting The Future Of Cloud Computing. Wired Magazine. Retrieved 8/13/2010, 2010, From Http://Www.Wired.Com/Epicenter/2008/12/ Charting-The-Fu/
Economist. (n.d.). Pocket world in figures: computer ownership. The Economist. Retrieved September 8, 2010, from http://www.economist.com/research/ articlesBySubject/displayStory.cfm?story_id=12758865&subjectID=348909&f src=nwl
Hillis, D. (2010). Early Responders: In John Brockman (Ed.), EDGE, by Neiman Reports. Retrieved January 17, 2011, from http://www.edge.org/q2010/q10_10.html
Erickson, T., & Mcdonald, D. W. (Eds.). (2008). HCI Remixed : essays on works that have influenced the HCI community. Cambridge, Mass.: Mit Press. Flosi, S. L. (2011). Comment On Top Mobile Activities In The U.S. ComScore Data Mine. Retrieved 2/15/2011, 2011, From http://www.comscoredatamine. com/2011/01/Comment On Top Mobile Activities In The U.S.htm Friedmann, A. (2001). Writing for visual media. Boston: Focal P. Fussman, C. (2010, May 3). Carol Bartz bio - Quotes by Yahoo CEO Carol Bartz Esquire. Retrieved July 14, 2010, from http://www.esquire.com/women/ women-issue/carol-bartz-bio-0510 Gantz, J. F. (2007). The Diverse and Exploding Digital Universe. EMC-Analyst Reports. Retrieved October 1, 2010, from www.emc.com/collateral/analystreports/diverse-exploding-digital-universe.pdf Gilder, G. (2010). The information factories. Wired Magazine. Retrieved October 10, 2010, from http://www.wired.com/wired/archive/14.10/cloudware. html?pg=1&topic=cloudware&topic_set= Goldstein, E. (2010) Software to help with our web addictions: dealing with stress and anxiety management. Mental Help. Retrieved 7/7/2010, from http://www. mentalhelp.net/poc/view_doc.php?type=doc&id=38246&cn=117
Higginbotham, S. (2010, August). Stats: The Age of the Internet of Things Has Dawned. Technology News, Analysis and Trends. Retrieved January 12, 2011, from http://gigaom.com/2010/08/10/stats-the-age-of-the-internet-of-things-hasdawned/ Hoffman, D. (1994). Architecture Studio : Cranbrook Academy Of Art, 1986-1993. New York: RiZzoli. Hofstadter, D., Kokinov, B. N., Holyoak, K. J., & Gentner, D. (2001). The analogical mind: perspectives from cognitive science. Cambridge, Mass.: MIT Press. Ingo, H. (2006). Open life: the philosophy of Open Source (1. Engl. language ed.). S.l.: Lulu.com. John, R. (2005). Stupid, ugly, unlucky, and rich: spike’s guide to success : what really leads to success, and it’s not smarts, looks, or luck. Toronto: Train of Thought Arts. Ju, W. (2010) In Traction » Proactive. Retrieved 11/1/2010, From http://blog.jozilla.net/ tag/proactive/ Ju, W. & Leifer, L. (Summer 2008). The design of implicit interactions: making interactive systems less obnoxious. Design Issues: Vol. 24, Number 3, pp. 72-94. Retreived from http://interruptions.net/literature/Ju-DesignIssues08p.pdf Ju, W., Lee, B. & Klemmer, S. (November 8–12, 2008). Range: exploring implicit interaction through electronic whiteboard design. Paper presented at (CSCW) Computer Supported Cooperative Work Conference, San Diego FL. Abstract retrieved from http://portal.acm.org/citation.cfm?id=1460569&dl=acm&coll=dl&c
174
Bibliography « Towards a New Conceptual Framework
fid=16544834&cftoken=50251376
Thesis by: C. Ellicott, 04.08.2011
175
effects. Toronto: Penguin Canada.
Kelly, K. (2005). We Are The Web. Wired Magazine, 08(13), Retreived 12/15/2010 from http://www.wired.com/wired/archive/13.08/tech.html.
Norman, D. Affordance, Conventions And Design (Part 2). Retrieved 7/7/2010, 2010, from http://jnd.org/dn.mss/affordance_conventions_and_design_part_2.html
Klanten, R. (2008). Data Flow : Visualising Information In Graphic Design. Berlin: Gestalten.
Norman, D. Affordances And Design. Retrieved 7/7/2010, 2010,from http://jnd.org/ dn.mss/affordances_and_design.html
Kuniavskya. M, (2009). Information shadows: how ubiquitous computing serializes everyday things. Informa Ltd: Mortimer House, London UK: Routledge.
Norman, D. (2007). The Complexity Of Everyday Life. Retrieved 7/9/2010, 2010, from http://jnd.org/dn.mss/the_complexity_of_everyday_life.html
Lakoff, G., & Johnson, M. (1980). Metaphors We Live By. Chicago: University Of Chicago Press.
Oldach, M. (1995). Creativity For Graphic Designers. Cincinnati, Oh: North Lights Books.
Lanier, J. (2010). You Are Not A Gadget. Random House Of Canada.
Parr, B. (2010, February 16). Facebook is the web’s ultimate timesink [stats]. Mashable: The Social Media Guide. Retrieved February 15, 2011, from http:// mashable.com/2010/02/16/Facebook-Nielsen-Stats/
Lenin, V. I., & Žižek, S. (Eds.). (2002). Revolution At The Gates : A Selection Of Writings From February To October 1917; Selections. English. 2002. London ; New York: Verso. Lima, M. (2009). Information visualization manifesto. [Web Log Post]. Retrieved 07/22/2010, 2010, From http://www.visualcomplexity.com/vc/blog/?p=644
Pepperberg, D. (2010). I think, therefore i am — still me: In Michael Shermer (Ed.), EDGE, World Question Centre. Retrieved January 17, 2011, from http://www.edge. org/q2010/q10_10.html#pepperberg Pinker, S. (2002). The blank slate : the modern denial of human nature. New York: Viking.
Lucchetti, S. (2010). Cloud computing: what will we lose to it? Technorati. Retrieved 10/26/2010, 2010, from http://technorati.com/technology/it/article/ cloud-computing-what-will-we-lose/ Madrigal, A. (2010, August). What’s Wrong With ‘X Is Dead’. The Atlantic. Retrieved August 20, 2010, from http://www.theatlantic.com/technology/ archive/2010/08/whats-wrong-with-x-is-dead/61663/ Maeda, J. (2006). The Laws Of Simplicity: Design Technology, Business, Life. Cambridge, Massachusetts: The Mit Press. Margulis, L. (2010). By affording me new worldwide scientific communication access: In Michael Shermer (Ed.), EDGE, World Question Centre. Retrieved January 17, 2011, from http://www.edge.org/q2010/q10_10.html#pepperberg Mark, J., & Wolf, P. (2008). The video game explosion: A history from pong to playstation and beyond. Westport, conn.: Greenwood press. Mattelmaki, T. (2006). Design probes. Vaajakoski, Finland,: Gummerus Printing. Retrieved from www.uiah.fi/publications. Mcluhan, M. & Fiore, Q. (2003). The medium is the massage : an inventory of
Pinker, S. (2008). The stuff of thought : language as a window into human nature. New York: Penguin. Pipes, R. (1999). Property And Freedom. New York: Alfred A. Knopf. Pirsig, R. M. (1974). Zen and the art of motorcycle maintenance : an inquiry into values. New York: Morrow. Richtel, M. (2010, May). Your brain on computers - Attached to technology and paying a price. The New York Times. Retrieved July 7, 2010, from http://www.nytimes. com/2010/06/07/technology/07brain.html?src=me&ref=technology Rifkin, J. (2000). The age of access : the new culture of hypercapitalism, where all of life is a paid-for experience. New York: J.P. Tarcher/Putnam. Riley, T., & Museum Of Modern Art. (1999). The un-private house. New York : Museum Of Modern Art: Distributed By Harry N. Abrams.
176
Bibliography « Towards a New Conceptual Framework
Rivera, J. (2010). Cloud computing for personal use. The Epoch Times. Retrieved 10/26/2010, 2010, from http://www.theepochtimes.com/n2/content/ view/29794/ Rosenwein, R. (1999) Why Media Mergers Matter. Brill’s Content, Retrieved from http://www.brillscontent.com/1999dec/features/bigmedia_mergers.shtml Rowan, D. (2011, March). Rentalship is the new ownership in the networked age. Wired Magazine. Retrieved March 11, 2011, From http://www.wired.com/ epicenter/2011/02/rentalship-the-new-ownership/ Samuel, L. R. (2001). Brought to you by: postwar television advertising and the American dream. Austin: University Of Texas Press. Ryle, G. (1981). Gilbert Ryle’s Descates myth. In Morick, H. (Ed), Introduction to the Philosophy of Mind: Readings from Descartes to Strawson (pp. 27-39). New Jersey: Humaanities Press. Schmidt,E. (2006, August 9). [Conversation at a Search Engine Strategies Conference]. Retrieved Dec 8, 2010, from http://www.google.com/press/ podium/ses2006.html Shah, A. (n.d.). Media conglomerates, mergers, concentration of ownership. Global Issues. Retrieved January 8, 2011, from http://www.globalissues.org/ article/159/media-conglomerates-mergers-concentration-of-ownership Smeagol Studios. (n.d.). The mother of all demos. [Video file]. Retrieved February 8, 2011, from http://www.youtube.com/watch?v=jnwppf6hLiA&feature=related
Thesis by: C. Ellicott, 04.08.2011
Swann, C. (Winter 2002). Action research and the practice of design. Design Issues: Vol. 18, Number 2, pp. 72-94. Swedin, E. G., & Ferro, D. L. (2005). Computers : the life story of a technology. Westport, Cn: Greenwood Press. Thackara, J. (2005). In the bubble : designing in a complex world. Cambridge, Mass.: Mit Press. Thagard, P. (2005). Mind : introduction to cognitive science (2nd Ed.). Cambridge, Mass.: Mit Press. Tsao, J. Y. (2009). Curious Displays. [Video File]. Retrieved July 4, 2010, from vimeo. com/9486977 Weinschenk, S. (2010). The Psychologist’s View of UX Design. UX Magazine | Defining and Informing the Complex Field of User Experience (UX). Retrieved Dec 17, 2010, from http://uxmag.com/design/the-psychologists-view-of-ux-design Williams,P., Leighton ,J., & Rowland, I. (2009). The personal curation of digital objects, a lifecycle approach. Aslib Proceedings: New Information Perspectives, 61(4), 340--363 Retreived from http://www.emeraldinsight.com/journals.htm?articleid= 1800798&show=abstract Yan, L. (Ed.). (2008). The internet of things from RFID to the next-generation pervasive networked systems. New York: Auerbach Publications.
Stallman, R. (n.d.). Why software should not have owners. Free Software Foundation (FSF). The GNU Operating System. Retrieved March 8, 2011, from http://www.gnu.org/philosophy/why-free.html Steen, M. (2003, Sept.). Exploring ‘human centred’ approaches to market research and concept development for creating more value with ICT. Paper presented at COST269 conference Good Bad Irrelevant, Helsinki. Abstract retrieved from http://www.mozaiek.dds.nl/docs/cost269humancentred.pdf Schmidt,E. (2006, August 9). [Conversation at a Search Engine Strategies Conference]. Retrieved Dec 8, 2010, from http://www.google.com/press/ podium/ses2006.html Sterling, B. (2005). Shaping things. Cambridge, Mass.: Mit Press.
The easier you make it for people to go, the more likely they are to stay. — DAVE WINER
i
10 Appendices
ii
iii
Appendix A « Towards a New Conceptual Framework
Appendix A: Probe PAck CUSTOM DIARY DESIGN
Your user-centered diary pack
Q. Tell me a bit about yourself.
How & where do you watch videos, listen to music, read books?
Q. Tell me about yourself. (more room. if necessary..)
What would you take with you to your dream place? Is this place real or virtual?
PHOTOS PLEASE
Q. Tell me about yourself. (more room to write...)
This is me
Name: Address: Employment: Married, Single, Separated, Divorced, Widowed: How do you mainly commute and get around: Children:
Your dream place and why?
Year Born: Extracurricular activities: How & how often do you listen to music: How often do you read books: How & how often do you watch films: Other: Number of personal & work computers, mobile and external devices: How & where do you watch videos, listen to music, read books?
PHOTOS PLEASE
Your dream place and why?
What would you take with you to your dream place? Is this place real or virtual?
more room for thoughts over....
This diary-survey is based on user participation by means of evaluating self-documentation. So the user–that’s you– collects and documents daily thoughts and creates materials, working as an active participant in this design process.
Q.
INSTRUCTIONS: SUBMIT BY: November 21st Document your routines and feelings (centered around your use of your personalcollections like; clothes, kitchen, artifacts, music, video....) for 5 days. Describe what you have been up to, how you organise, manage and retrieve your “stuff”, and any emotions associated with those activities.... HOW: There is no wrong way to document or answer these questions. Use coloured pencils, scraps of paper, a camera, your computer, to help document your diary. It can be a series of stories or anecdotes, sketches, rough notes, bullet points. Or if you are more adventurous, try video, collage materials, post-its, random findings even found drawings. The more creative, descriptive and truthful the better.
PHOTOS PLEASE
How do you create, organise, manage, use and retrieve your physical and digital collections or things?
SEND ME YOUR FILES: Send me your scraps of paper or scans or photos. I will pay for postage, should you want to just send physical materials back. OR Email me at candace004@gmail.com Vid Ingelevics - hunter / gatherer/image #1 (Oct.29 2010) http://www.web.net/artinfact/Hunter_Gatherer-1.htm
Can you tell me or map out the spaces you like to work, rest and think in. How do you feel in them? What’s impor- tant about them?
Thesis by: C. Ellicott, 04.08.2011
DAY 1: of a 5 day diary
DAY 2:
(does not have to be consecutive)
Today (Use the basis of day 1 to write about each of the week’s daily entries, plus any other thoughts or questions you may want to add)
Date:
Date:
Woke up....
v
Appendix A « Towards a New Conceptual Framework
How often do you misplace items in your day? What are they?
Do you know what you want to wear ahead of time? How do you find and choose clothes, shoes, etc...
Had to look for...
Needed to bring...
Used _________________computer/smartphone for ______ hours at work
Used_________________computer/smartphone for ______ hours at home
Organised, retreived my....
How do you put things away yet keep them top of mind when you need them? Draw, photograph, explain.
Filed...
Finished work and...
Listened/watched/read...
Q. How do you relate to your desk? What does the “desk” or the “desktop” mean to you?
Some Examples:
DAY 3:
DAY 4:
I work at home
Date:
Date:
I work in my car
Today....
Today....
My desk is my iphone I work in StarBucks
Pens Pencils Ruler Computer Light Umbrella k work work work work work wor Files inet Cab g Filin & much much more
Thesis by: C. Ellicott, 04.08.2011
Photograph or record some of your personal collections. How do you organise them, and keep them? PHOTOS PLEASE
iv
Would you say you were organized, disorganized? What does that mean to you? Take a photo of your most annoying space in your place, and why? How often do you misplace stuff? The most common items?
mes, music, for play- ga sk-ICK My desk is is a work de at th KOR NEVER W
Do you think a messy desk is a sign of a messy mind?
vi
vii
Appendix A ÂŤ Towards a New Conceptual Framework
Appendix B: Probe PAck RECIPIENTS
DAY 5: of 5 days...
phew finally done this invasive diary, what do I win?
Date:
amplse: An Ex My Collection
8 were en my parents not a saver. Wh through all my Generally, I am house, I sor ted new ir -old the out to it moving most of stuff and threw all of old high school I have archived letters and all. er boyfriend love I sent each oth and d ban hus k that the emails my I have a big boo e married, and before we wer playing. nis ten my s chronicle keeping to buying and I am attracted As a librarian, t too much. The tha do to not sharing books, but I try for getting and nderful place Grantas library is a wo exceptions, the few a of are re a little treasure books. The se. Granta is like something new being one of tho find pick it up and scan tran You ays g. readin and ess time. The stories to read every er places. por t you to oth par t n unwilling to tion I have bee y and Kid Another collec a Stewar t Bab rth Ma se, old the my ing with is publish y are no longer magazines. The e fun of hav I lth and wea old ones for the hung on to the t are contained s, and ideas tha projects, recipe ly m. within the jects are insane some of her pro of a way to make It is true that k my I can usually thin de but ma x, e ple com es. We onc for our purpos them simpler een costume ind eagle Hallow bal yon cra ely, lov lted a me son We of her designs. cookie spired by one as favors. And r shapes to give bits into heart l a crowd please shapes are stil ich dw san cutter with the kids. of good collection assing a pretty I seem to be am
August 2, 200
Today....
How do you feel in a messy space, clean space, dirty space, outdoors, a cafe...
Tell me a story about managing your personal collections...
RECEIVE QUESTIONNAIRE
Questions Asked via E-mail I was hoping I might just ask a few more questions of you, if possible?
1. How many years have you owned and operated a computer? 2. Do you use a different computer for work than at home, or do you
share files so you can work at home?
3. How many hours total do you operate a computer/smartphone/e-
reader per day?
4. How much has it changed from your usage today as opposed to
10 years ago?
5. Iâ&#x20AC;&#x2122;m on the computer at least 5 hour more than 10 years ago. 6. What technologies/media do you use?
Thank You very much.
Sorry the prize is a trip to Guadalupe with me. Ack. The thesis trench!
- PC
- laptop
- smartphone
- with dataconnection or wifi only
- ipod touch with wifi
- ipad/tablet wifi (or not)
- external devices
- television
- cable
- stereo
-other
7. How often do you use each of these devices per day? 8. What do you use each of these for?
- smartphone - calls, games, texting
- with dataconnection - work | wifi only - home
Thesis by: C. Ellicott, 04.08.2011
viii
ix
Appendix B ÂŤ Towards a New Conceptual Framework
9. How do you feel about online privacy issues? Security?
23. Do you have different computers containing different stuff/software
10. Do you use any of these services:?
so have to use specific computers in order to do certain tasks?
- Gmail/yahoo mail
24. Would it be useful to you to have ALL your computers/smartphones/
- Flickr
devices synched be able to access all of your data/photos, external
devices, bookmarks, address books, etc
- Google apps (which ones)
25. Are you willing to pay for online storage space, now or eventually?
- Dropbox (or other online storage)
If so what would you be willing to pay?
- Post on You Tube/Vimeo
27. Have you ever used Netflix? or Do you rent video? Or Download?
- Blog software
28. Do you read books online or physical books or both?
- Digg, reddedit, tumblr, delicious
Magazines
- Or any other online services?
29. What do you do if you loose access to your computer?
11. Would you like a computer device that simplified and organized your
30. What do you do when you loose internet access?
files based on a pattern you established?
31. Have you bought an iphone/ipod app ever?
12. Would the ability to synchronies all your devices TO ALL YOUR data
If no, where do you get apps if you have an I-product?
files, images, memories, fonts, music, movies, archives and software
32. Do you own a physical cd and video collection?
through 1 control panel be useful?
Or do you have any/all of your music on an online source?
13. Do you know what cloud services are? have you heard of the term
33. Which music collection is bigger, digital vs physical? Which is more
before now?
convenient or better?
14. Do you ever listen to Music or videos online, with what?
34. Would you be willing to pay for music on a music service like
15. Do you use Skype or use Facetime, or another video conferencing
Grooveshark?
software?
35. Would it be a useful to be able to shut off and play your music,
16. How long do you spend organizing and sorting email
stream movies and television, queue reminders on your way out the
17. Do you pay for extra online services with Skype, Flickr, Dropbox, etc?
door, alarm house and awake and bake times turn lights , heat, oven,
18. Do you ever download movies/televsion/software online? what? how?
fridge on and off via a central computer?
Paid or free?
36. Do you have bookmarks? Do you use them often?
19. Do you do online banking?
37. Have you ever used delicious or Evernote? Do you know what these
20. Do you have a paypal account?
programs are for?
21. Do you shop online such as Ebay, etc?
38. What would you need to start you using these services or not?
22. How many passwords do you think you have?
39. How do you categorize and save bookmarks/files? Can you send
Thesis by: C. Ellicott, 04.08.2011
x
xi
Appendix B « Towards a New Conceptual Framework
screenshots of a few examples of your bookmark or computer file
structures? - by function, purpose, or title (see attachments)
Appendix c: GHOSTS ARE “un-sci-en-ti-fic”
Thesis by: C. Ellicott, 04.08.2011
Pirsig Exerpt: (1974) Zen and the Art of Motor Cycle Maintenance. (p. 13-17) -On the concept of ghosts -Explained as a philosophical idea
40. Do you feel you have a good categorizing and file retrieval system on your computers? 41. Do you have a specific space set up to use your computers? 42. Is there anything you would improve about your current computer experiences? 43. Do you like the shape and material of computers?- i-pod, i-phones? 44. How do you feel about learning the new software versions? 45. How about learning a new piece of software from scratch? 46. Do you pay for any of your home software? If so what ones? 47. If you were to die tomorrow, would anyone you know be able to collect and shut down all your personal data?
Thank You for all your help. Candace
“You look like you’d seen a ghost.” John and Chris look at me and I turn away from them to the door. It is still raining hard, but we make a run for it to the rooms. The gear on the cycles is protected and we wait until the storm passes over before removing it. After the rain stops, the sky lightens a little. But from the motel courtyard, I see past the cottonwoods that a second darkness, that of night, is about to come on. We walk into town, have supper, and by the time we get back, the fatigue of the day is really on me.
in people’s minds.” The whiskey, the fatigue and the wind in the trees start mixing in my mind. “Of course,” I add, “the laws of science contain no matter and have no energy either and therefore do not exist except in people’s minds. It’s best to be completely scientific about the whole thing and refuse to believe in either ghosts or the laws of science. That way you’re safe. That doesn’t leave you very much to believe in, but that’s scientific too.” “I don’t know what you’re talking about,” Chris says.
We rest, almost motionless, in the metal armchairs of the motel courtyard, slowly working down a pint of whiskey that John brought with some mix from the motel cooler. It goes down slowly and agreeably. A cool night wind rattles the leaves of the cottonwoods along the road. Chris wonders what we should do next. Nothing tires this kid. The newness and strangeness of the motel surroundings excite him and he wants us to sing songs as they did at camp.
“I’m being kind of facetious.”
“We’re not very good at songs,” John says.
“No, he wasn’t. He said that when people haven’t been buried right, their ghosts come back to haunt people. He really believes in that.”
“Let’s tell stories then,” Chris says. He thinks for a while. “Do you know any good ghost stories? All the kids in our cabin used to tell ghost stories at night.”
Chris gets frustrated when I talk like this, but I don’t think it hurts him. “One of the kids at YMCA camp says he believes in ghosts.” “He was just spoofing you.”
“He was just spoofing you,” I repeat.
“You tell us some,” John says.
“What’s his name?” Sylvia says.
And he does. They are kind of fun to hear. Some of them I haven’t heard since I was his age. I tell him so, and Chris wants to hear some of mine, but I can’t remember any. After a while he says,
“Tom White Bear.”
“Do you believe in ghosts?” “No,” I say
I laugh. “I guess I’m going to have to take that back a little,” I say. “I was thinking of European ghosts.” “What’s the difference?”
“Why not?”
John roars with laughter. “He’s got you,” he says.
“Because they are un-sci-en-ti-fic.”
I think a little and say, “Well, Indians sometimes have a different way of looking at things, which I’m not saying is completely wrong.
The way I say this makes John smile. “They contain no matter,” I continue, “and have no energy and therefore, according to the laws of science, do not exist except
John and I exchange looks, suddenly recognizing the same thing. “Ohhh, Indian!” he says.
Science isn’t part of the Indian tradition.”
xii “Tom White Bear said his mother and dad told him not to believe all that stuff. But he said his grandmother whispered it was true anyway, so he believes it.”
Appendix C « Towards a New Conceptual Framework
“Of course.” “So when did this law start? Has it always existed?”
“You mean the teacher is hypnotizing the kids into believing the law of gravity?” “Sure.”
John is frowning, wondering what I am getting at. He looks at me pleadingly. He really does want to know things sometimes. Being facetious is not being a very good father. “Sure,” I say, reversing myself, “I believe in ghosts too.” Now John and Sylvia look at me peculiarly. I see I’m not going to get out of this one easily and brace myself for a long explanation. “It’s completely natural,” I say, “to think of Europeans who believed in ghosts or Indians who believed in ghosts as ignorant. The scientific point of view has wiped out every other view to a point where they all seem primitive, so that if a person today talks about ghosts or spirits he is considered ignorant or maybe nutty. It’s just all but completely impossible to imagine a world where ghosts can actually exist.” John nods affirmatively and I continue. “My own opinion is that the intellect of modern man isn’t that superior. IQs aren’t that much different. Those Indians and medieval men were just as intelligent as we are, but the context in which they thought was completely different. Within that context of thought, ghosts and spirits are quite as real as atoms, particles, photons and quants are to a modern man.
“Sure.” “Sitting there, having no mass of its own, no energy of its own, not in anyone’s mind because there wasn’t anyone, not in space because there was no space either, not anywhere this law of gravity still existed?” Now John seems not so sure. “If that law of gravity existed,” I say, “I honestly don’t know what a thing has to do to be nonexistent. It seems to me that law of gravity has passed every test of nonexistence there is. You cannot think of a single attribute of nonexistence that that law of gravity didn’t have. Or a single scientific attribute of existence it did have. And yet it is still ‘common sense’ to believe that it existed.”
“What?”
No other conclusion makes sense.
“Oh, the laws of physics and of logic—the number system—the principle of algebraic substitution. These are ghosts. We just believe in them so thoroughly they seem real.
“And what that means,” I say before he can interrupt, “and what that means is that the law of gravity exists nowhere except in people’s heads! It’s a ghost! We are all of us very arrogant and conceited about running down other people’s ghosts but just as ignorant and barbaric and superstitious about our own.”
“I don’t get it,” says Chris. So I go on. “For example, it seems completely natural to presume that gravitation and the law of gravitation existed before Isaac Newton. It would sound nutty to think that until the seventeenth century there was no gravity.”
“You’ve heard of the importance of eye contact in the classroom? Every educationist emphasizes it. No educationist explains it.” John shakes his head and pours me another drink. He puts his hand over his mouth and in a mock aside says to Sylvia, “You know, most of the time he seems like such a normal guy.” I counter, “That’s the first normal thing I’ve said in weeks. The rest of the time I’m feigning twentieth century lunacy just like you are. So as not to draw attention to myself. “But I’ll repeat it for you,” I say. “We believe the disembodied words of Sir Isaac Newton were sitting in the middle of nowhere billions of years before he was born and that magically he discovered these words. They were always there, even when they applied to nothing. Gradually the world came into being and then they applied to it. In fact, those words themselves were what formed the world.
John looks too much in thought to speak. But Sylvia is excited. “Where do you get all these ideas?” she asks. I am about to answer them but then do not. I have a feeling of having already pushed it to the limit, maybe beyond, and it is time to drop it. After a while John says, “It’ll be good to see the mountains again.” “Yes, it will,” I agree. “one last drink to that!” We finish it and are off to our rooms. I see that Chris brushes his teeth, and let him get by with a promise that he’ll shower in the morning. I pull seniority and take the bed by the window. After the lights are out he says, “Now, tell me a ghost story.” “I just did, out there.” “I mean a real ghost story.” “That was the realest ghost story you’ll ever hear.”
John says, “I guess I’d have to think about it.”
Modern man has his ghosts and spirits too, you know.”
“They seem real to me,” John says.
best. Your common sense is nothing more than the voices of thousands and thousands of these ghosts from the past. Ghosts and more ghosts. Ghosts trying to find their place among the living.”
“That’s absurd.” “What I’m driving at,” I say, “is the notion that before the beginning of the earth, before the sun and the stars were formed, before the primal generation of anything, the law of gravity existed.”
“Well, I predict that if you think about it long enough you will find yourself going round and round and round and round until you finally reach only one possible, rational, intelligent conclusion. The law of gravity and gravity itself did not exist before Isaac Newton.
In that sense I believe in ghosts.
xiii
Thesis by: C. Ellicott, 04.08.2011
“Why does everybody believe in the law of gravity then?” “Mass hypnosis. In a very orthodox form known as ‘education.”
That, John, is ridiculous.
“You know what I mean. The other kind.”
“The problem, the contradiction the scientists are stuck with, is that of mind. Mind has no matter or energy but they can’t escape its predominance over everything they do. Logic exists in the mind. Numbers exist only in the mind. I don’t get upset when scientists say that ghosts exist in the mind. It’s that only that gets me. Science is only in your mind too, it’s just that that doesn’t make it bad. Or ghosts either.”
I try to think of some conventional ones. “I used to know so many of them when I was a kid, Chris, but they’re all forgotten,” I say.
They are just looking at me so I continue: “Laws of nature are human inventions, like ghosts. Laws of logic, of mathematics are also human inventions, like ghosts. The whole blessed thing is a human invention, including the idea that it isn’t a human invention. The world has no existence whatsoever outside the human imagination. It’s all a ghost, and in antiquity was so recognized as a ghost, the whole blessed world we live in. It’s run by ghosts. We see what we see because these ghosts show it to us, ghosts of Moses and Christ and the Buddha, and Plato, and Descartes, and Rousseau and Jefferson and Lincoln, on and on and on. Isaac Newton is a very good ghost. One of the
“It’s time to go to sleep. We’ve all got to get up early tomorrow.” Except for the wind through the screens of the motel window it is quiet. The thought of all that wind sweeping toward us across the open fields of the prairie is a tranquil one and I feel lulled by it. The wind rises and then falls, then rises and sighs, and falls again—from so many miles away. “Did you ever know a ghost?” Chris asks. I am half asleep. “Chris,” I say, “I knew a fellow once who spent all his whole life doing nothing but hunting for a ghost, and it was just a waste of time. So go to sleep.”
xiv I realize my mistake too late. “Did he find him?” “Yes, he found him, Chris.” I keep wishing Chris would just listen to the wind and not ask questions. “What did he do then?”
Appendix C « Towards a New Conceptual Framework
A half hour later he is breathing sleepfully, and the wind is still strong as ever and I am wide-awake. There, out the window in the dark...this cold wind crossing the road into the trees, the leaves shimmering flecks of moonlight...there is no question about it, Phædrus saw all of this. What he was doing here I have no idea. Why he came this way I will probably never know. But he has been here, steered us onto this strange road, has been with us all along. There is no escape.
“He thrashed him good.” “Then what?” “Then he became a ghost himself.” Somehow I had the thought this was going to put Chris to sleep, but it’s not and it’s just waking me up. “What is his name?” “No one you know.”
I wish I could say that I don’t know why he is here, but I’m afraid I must now confess that I do. The ideas, the things I was saying about science and ghosts, and even that idea this afternoon about caring and technology...they are not my own. I haven’t really had a new idea in years. They are stolen from him. And he has been watching. And that is why he is here. With that confession, I hope he will now allow me some sleep.
“But what is it?” “It doesn’t matter.”
Poor Chris. “Do you know any ghost stories?” he asked. I could have told him one but even the thought of that is frightening.
“Well, what is it anyway?” “His name, Chris, since it doesn’t matter, is Phædrus. It’s not a name you know.”
I really must go to sleep.
“Did you see him on the motorcycle in the storm?” “What makes you say that?” “Sylvia said she thought you saw a ghost.” “That’s just an expression.” “Dad?” “This had better be the last question, Chris, or I’m going to become angry.” “I was just going to say you sure don’t talk like anyone else.” “Yes, Chris, I know that,” I say. “It’s a problem. Now go to sleep.” “Good night, Dad.” “Good night.”
Towards a New Conceptual Framework
Ellicott_Cover-v1.indd 4
4/8/11 3:04:50 AM