Towards A New Conceptual Framework for Personal Computing

Page 1

Towards A New Conceptual Framework for Personal Computing

Candace Ellicott MDes 2011

Ellicott_Cover-v1.indd 1

4/8/11 3:04:48 AM



iii How can design help to solve issues of fragmentation, complexity, depersonalization and lack of synchronization for the personal computer user?

A thesis project presented to The School of Graduate Studies Nova Scotia College of Art & Design: NSCAD University by Candace Kelly Elise Ellicott in partial fulfillment of the requirements for the Master of Design

Copyright © 2011 Candace K.E. Ellicott. All rights reserved. No part of this book may be used or reproduced in any manner whatsoever without written permission except in the case of brief quotations embodied in critical articles or reviews.

NSCAD University Halifax, Nova Scotia Canada April 2011

Book design and illustrations by C. Ellicott Cover photo and chapter divide photos were licensed photos from Shutterstock and subsequently digitally manipulated by C.Ellicott. Photography throughout was provided by Stock.xchng, a royalty free library. Author has met Stock.xchng terms of use as specified on their website

Marlene Ivey Associate Professor Design NSCAD University

under their “Image license agreement” Retrieved April 04 20011, from

Halifax, Nova Scotia

http://www.sxc.hu/info.phtml?f=help&s=7_2

Canada

Thesis by: C. Ellicott, 04.08.2011


v

DEDICATION

“It is what we think we know

I dedicate this thesis to the Ellicott family, who have supported me through this long, arduous and slightly self-indulgent process. Thank you,

already that often prevents

Dylan, for being understanding of my tunnel vision and not being upset

us from learning.�

with the lack of communication this year. Thank you, Dad, for always being one of my biggest supporters.

~Claude Bernard To my mother: you were a vital part of me being able to achieve this final product. Your sleepless nights worrying about my project and my scattered writing style will always be remembered. Thank you for providing me the guidance, expertise and moral support during the whole process. You were my mentor, and always will be.

Thesis by: C. Ellicott, 04.08.2011


vi

vii

Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

ACKNOWLEDGEMENTS I would like to thank Marlene Ivey, who as a professor went above and beyond to ensure an energetically tangential mind like mine stayed focused. Oh, and my mother will also get another acknowledgement for that very same task as well as editing my thesis when no one should ever have seen it. And thank you, Charlotte, for editing it into readability!

I am indebted to all the probe participants who took on the probe questionnaire and interviews. I would name you all but then I would break our confidentiality agreement. So I’ll leave it at that, as you know who you are.

The inspiration for my thesis topic was from many sources, some of which are seen in the Reflection and Data Analysis section. But in part, it was also driven by a thought that I might travel part of the year and be able to design location-independently. However, during my biweekly thesis commute to and from the South Shore, it became very apparent that no matter how well-organized I was, I always left something important behind on a hard drive somewhere. Necessity is the mother of invention, or so they say.

Finally, I am grateful for Hayes’ ongoing support throughout the year. He saw me at my worst and willingly lent an ear to my endless barrage of questions and anecdotes around my thesis topic. He made his support available in a number of ways, including adding inspiration to this thesis

I wandered lonely as a cloud That floats on high o’er vales and hills, When all at once I saw a crowd, A host, of golden daffodils; Beside the lake, beneath the trees, Fluttering and dancing in the breeze. Continuous as the stars that shine And twinkle on the milky way, They stretched in never-ending line Along the margin of a bay: Ten thousand saw I at a glance, Tossing their heads in sprightly dance. The waves beside them danced; but they Out-did the sparkling waves in glee: A poet could not but be gay, In such a jocund company: I gazed---and gazed---but little thought What wealth the show to me had brought: For oft, when on my couch I lie In vacant or in pensive mood, They flash upon that inward eye Which is the bliss of solitude; And then my heart with pleasure fills, And dances with the daffodils.

topic. His innate drive to tinker with technology and follow technological trends proved very helpful. His interest and prior education in philosophy was an asset when I was toying with the concept of the Ghost in the Machine. He was just a good person to bounce ideas off. Thank you.

—William Wordsworth


viii

ix

Table of Contents and Figures ÂŤ Towards a New Conceptual Framework

TABLE OF CONTENTS

Abstract

03

1.0 Introduction

05

Introduction...................................................................................................................06

Thesis Structure........................................................................................................... 07

2.0 The Changing Digital Landscape:

An Evolution in the Personal Computing Paradigm

Introduction....................................................................................................................10

The Advent of the Personal Computing Paradigm....................................10

The Graphic User Interface, A Major Contributor in the Shift

Contextual Search & Review.................................................................................46

Cultural Probing........................................................................................................... 47

Questionnaire Survey...............................................................................................50

Figures and Data Visualization............................................................................. 51

Sketches........................................................................................................................... 52

Summary......................................................................................................................... 56

09

to Personal Computing .................................................................................... 12

The Pervasiveness of Personal Computing in North America ........... 14

Personal Computing may Transition to Cloud Technology................... 16

Issues Related to The Shift to Cloud Services.............................................. 18

Ownership....................................................................................................................... 19

Privacy and Security.................................................................................................20

Cost.................................................................................................................................... 22

The Shift from Inhabiting Physical Space to Dwelling

in a Virtual World................................................................................................. 23

5.0 Reflection and Analysis of Data and Design Experiment

57

Introduction................................................................................................................... 58

The Chosen Sample Group ..................................................................................60

Design of Cultural Probes and Questionnaire.............................................. 62

Cultural Probe Packs................................................................................................. 65

The E-mailed Questionnaire..................................................................................68

Interpreting the Results...........................................................................................68

Findings and Analysis...............................................................................................70

Memory, Filing and Subjectivity..........................................................................80

Downsizing the Physical and Up sizing the Digital.................................... 83

Importance of Location to the Home User:

Changing the Concept of Desk............................................................................88

Synchronization...........................................................................................................90

Attitudes on Computing are Mixed...................................................................90

25

Salient Concerns Mentioned About Technology....................................... 92

Introduction................................................................................................................... 26

What Participants Did Not Say: Reading Between the Lines.............. 93

Fragmentation ............................................................................................................ 28

Probing to Inform the Design Proposal...........................................................96

Synchronization ......................................................................................................... 32

Summary.........................................................................................................................96

Summary......................................................................................................................... 37

Summary......................................................................................................................... 24

3.0 The Impact of Technology on The Individual

6.0 An Analogy to Inform Design

99

35

Introduction.................................................................................................................. 40

Action Research Methodology........................................................................... 40

A Deeper Understanding: Reflection and Iteration .................................... 45

Open Source: A Good Philosophical Fit....................................................... 109

Methods of Research................................................................................................46

Summary........................................................................................................................ 110

4.0 Methods and Methodology

Introduction.................................................................................................................100 The Transition of Ownership, Copyright, and the Continued Physical Abstraction of Objects................................................................104

Thesis by: C. Ellicott, 04.08.2011


x

xi

Table of Contents and Figures « Towards a New Conceptual Framework

TABLE OF CONTENTS continued

LIST OF FIGURES

7.0

Building The Design Brief: A Design Scenario

107

Introduction...................................................................................................................112

2.02 The Advent of Personal Computing — A Historical Timeline: Part B................. 14

The Context In Which The Project Resides...................................................114

2.03 Many Canadian Households Own Several Computing Devices and Peripheral

The Design Brief

2.01

The Advent of Personal Computing — A Historical Timeline: Part A................. 12

Computing/Technological Gadgets .......................................................................... 16

A consumer target audience.........................................................................115

3.01 Data Storage ................................................................................................................................. 33

A New User Interface: Features of the System or Design

4.01 A Four Phase Iterative Design Process.............................................................................. 41

1. Any new product needs to be marketed well.......................... 116

4.02 Action Research Methodology & Design Methodology Overlap........................ 42

2. With the KISS (Keep it simple, stupid) Principle...........................122

4.03 Methods Used in Study Integrated on the Action Research Process .............43

3. Experience is more important than feature....................................122

4.04 - 4.05 Physical Cultural Probe Packs Mailed to Ten Participants..........................49

4. Unique data management needs to be accommodated..........122

4.06 Data Visualization of Cloud Apps......................................................................................... 53

5. The system will include a universal password................................122

4.07 Sketch of a Central Way to Manage all Ones Data–Called a Digital Husk......54

6. A hybrid solution for storage ...............................................................132

4.08 Sketches of the Initial Interface Design for the Control Panel System ........... 55

7. Centralized management...........................................................................132

5.01

8. The system will monitor an individuals data ghost

5.02 Proposed Probe Participant Group .................................................................................... 61

9. This system features both automation and user control..........137

5.03 Some Example Spreads From The Probe Pack Booklet/Diary, pp. 7-8.......... 62

Cloud Computing Activities Being Heavily Adopted in U.S.A.............................. 59

10. Open Source allows for ongoing modules to be added .......137

5.04 Probe Pack Booklet/Diary, pp. 9-10................................................................................... 63

11.The panel will manage social networking identities...................... 144

5.05 Probe Pack Booklet/Diary pp. 13-14................................................................................. 63

12. Synchronization of data ......................................................................... 144

5.06 Actual Probe Participant and Questionnaire Group Demographics.................64

Summary....................................................................................................................... 160

8.0 Conclusion & Suggestions

163

Introduction................................................................................................................. 164

Suggestions From The Thesis............................................................................ 168

9.0 Bibliography

10.0 Appendices

169

i

Appendix A: Probe Pack Custom Diary Design............................................. ii

Appendix B: Probe Pack Recipients Receive Questionnaire................vii

Appendix C: Ghosts Are “Un-sci-en-ti-fic”...................................................... xi

5.07 Digital Filing System of Ray..................................................................................................... 72 5.08 Digital Filing System of Shawn.............................................................................................. 74 5.09 Digital Filing System of Mario................................................................................................. 76 5.10 Digital Filing System on Ace’s iPod..................................................................................... 77 5.11

Digital Filing System of Sara................................................................................................... 77

5.13

Digital Filing System of Jay..................................................................................................... 78

5.14

Ace’s Digital Collection Manifested As A Physical One............................................ 79

5.15

Thesis Poster Image: Virtualization of the Desktop...................................................84

5.16

A Visual Interpretation of Key Probe Findings.............................................................. 87

6.01 An Individuals Fragmented Data Online And Across Multiple Devices ....... 105 6.02 An Individuals Unite Data, Their Data Ghost................................................................106

Thesis by: C. Ellicott, 04.08.2011


xii

xiii

Preface « Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

LIST OF FIGURES CONTINUED 7.02 Unite – A Proposed Logo for Testing.................................................................................116 7.03 Mind Mapping for the Control Panel System.................................................................118 7.04 Possible System Architecture for the Control Panel System............................... 120 7.05 Unite Install and Set Up Screens..........................................................................................123

Scenario #1 A busy single mother’s home computer dies..................... 125 7.06 - 7.07 A Four Step Set-Up Process for the Unite System.........................................128 7.08 - 7.09 A Four Step Set-Up Process for the Unite System.........................................129 7.10 - 7.11 Control Panel Examples of Data View and Sorting Options....................... 130 7.12 - 7.13 Control Panel Example of Data Views.......................................................................131 7.14 Login Screen with Required Retinal Scan and Optional Password entry......133 7.15 Hybrid Data Storage and What Data Should be Synchronized..........................135 7.16 Data Storage Pyramid..............................................................................................................136 7.17 - 7.18 Data Ghost Screen Views................................................................................................138

Scenario #2 A family with demanding computer needs.........................141 7.19 - 7.20 The Communication and Social Media Feeds Panel...................................... 145 7.21 Example of a Real-Time Synchronized Work Spaces. ................................................147

Scenario #3 Location-independence is all that Todd and Nancy Need.... 149 7.22 The Unite System is Both Browser Based and a Native Application................153 7.23 The Main Profiles That a Users Device Would Upload to the Cloud.................155

Scenario #4 Joan Out of a Job Needs Computer Access...................... 157

Design is thinking made visual. —Saul Bass


xiv

03

The Changing Digital Landscape « Towards a New Conceptual Framework

ABSTRACT The digital landscape has evolved rapidly since the advent of the internet and the world wide web. The subsequent introduction of the desktop analogy helped to launch personal computing for the average home user, literally creating a virtual revolution in the domestic domain. Since then, there has been little time for reflection on the overall impact of change on the personal computer user. As the digital landscape continues to evolve and the realm of computing precipitates a continued abstraction from the physical to the virtual, how will future domestic users organize their personal computing both online and offline?

The goal of this thesis is to reflect on the current technological impacts on the personal computer user. The outcome of the reflection will attempt to put the individual’s needs at the heart of research and

THESIS ISSUE:

design. As technologies and physical devices inundate us more and

How can design help to solve issues of

more, the consequence is a scattering of data across multiple devices,

fragmentation, complexity, depersonalization

leading to a ‘virtual fragmentation’ and lack of synchronization adds to the issue. This thesis utilizes action research methodology as well as a

and lack of synchronization for the personal

literature review, cultural probing and survey questionnaires to conceptualize

computer user?

people’s relationship with their data, computing devices, and environment. The need for a system to help mitigate this new phenomenon of fragmentation, lack of synchronization will be explored. In part by using the well-known and philosophical concept of the ‘ghost in the machine’ to represent a multi-dimensional version of a digital avatar it could allow more cohesion, control and ownership over a persons data. The final designed system will leverage new technologies, such as the Cloud, to help address these issues.

Thesis by: C. Ellicott, 04.08.2011


05

01

Introduction


06

07

Introduction « Towards a New Conceptual Framework

INTRODUCTION

landscape continues to evolve from a physical place to a virtual realm

Over the past few centuries, the world has been so caught up in the rush

beyond what even McLuhan imagined with his global village, boundaries

to embrace technological progress, some experts now contend that

are seemingly unpredictable, shifting, growing, shrinking and changing.

technology is controlling us (Mumford cited in Carr, 2008). As Thackara

In re-examining borders between physical and virtual and where

brain. Except a whole lot faster.

suggests in his book In The Bubble, the “rebound effect of innovation”

individuals digital lifestyles reside in that space, design and research

Computing

has allowed us little time to try things out, test them on a small scale,

can help better define them by responding to the changes in the

and then observe and reflect upon them. The process of engaging with

evolving landscape and, if necessary, re-defining ideas of place,

technology—that is, creating, consuming and acquiring it—has given us

location, ownership, and identity.

Personal Computer General-purpose device used to solve problems, remember stuff, and provide endless hours of entertainment? It’s just like your

Computing is using and improving computer technology, computer hardware and software. Once upon a time robots in television shows and movies used to say ‘does not compute’. That doesn’t happen very

Thesis by: C. Ellicott, 04.08.2011

Global Village Global Village was used to describe how the globe was becoming smaller with the advent to electric technology and what at this time they thought was the instantaneous movement of information. people tend to use the term now with the advent to the web. Digital lifestyle Being increasingly connected to online, non-physical services. Having more and more of the important things in your life exist online. Or,

little time to take stock of the impact of such drastic and pervasive

knowing e-mail addresses but not

often anymore. Just ask Ken Jennings.

change. Thackara urges us, as designers, not only to design “people back

To express the changing digital landscape as an analogy, imagine that

phone numbers, owning mp3s but

Virtual

into the picture, [but]... to design ourselves more time to paint it” (2006,

you have stayed in one place and, over time, that place has rapidly grown

FarmVille gold is listing among your

p. 4). Considering that we are now, as many technology prognosticators

up around you, from a small village to a city. Now apply that same

believe, on the cusp of an even greater revolution known as the Cloud,

concept to the changing digital landscape. Over the past 20 years with

Really. Or is it?

there has never been a better time to stop and think. The goal of this

the advent of the world wide web, we have been drawn into becoming

Virtual Reality

thesis is to investigate this field of rapid technological change and reflect

users of a form of advanced technology that has exponentially hastened

on what these changes mean for the individual user and the potential

growth and changes in the digital landscape, ‘invisibly’ growing up

together globally. The Web is one

impacts on the future of personal computing culture.

around us. It has substantially altered the way we work, play, and live.

the Internet. Other common ways

Something that exists in essence or effect, but not in a physical form. In computing, it is used of software that act as if it is hardware. Not real.

possessions in your will. World Wide Web vs Internet

A computer-simulated environment that imitates physical environments that exist in the real world. In the Matrix all these people were plugged

Thus, individuals have surrendered and unconditionally accepted

while robots harvested them for you died in real life too. That doesn’t happen with most virtual reality.

The adjective digital or virtual is used interchangeably in the context

technology as it is presented to them, with little regard to its impact

of this study. Digital or virtual suggests all things electronic existing on

on their lives or on themselves (Mumford cited in Carr, 2008).

Unless you get so mad that you died in a virtual reality that you punch

happened before. Virtualization The creation of a virtual version of something by using software to simulate hardware. Sometimes when you don’t have a girlfriend you just

replications of objects. For example, a book, previously only a physical

THESIS STRUCTURE

object, is now available as a virtual or digital artifact in the form of an

Theoretical underpinning establishes the nature and character of this

electronic e-book. Another object that transformed or virtualized

research, while a domain and design experiment is used to generate

was the telephone answer machine, from a physical object to a monthly

a design proposal that addresses the research question. Rather than

service. The shift from physical to virtual not only embodies the move

a treatise, the thesis reads more like a story comprised of a series of

from a physical to digital state but a transition from ownership to

separate essays, building up to a conclusion or hypothesis. In this series

membership, as the example of the answering machine exemplifies.

of essays, the literature review is not separated into its own section

As well as an ownership of rights also owned by others. As the digital

but instead is woven throughout the thesis to substantiate assertions

have to make a virtual one. Above sources adapted from Wikipedia: The Free Encyclopedia

the same as the Internet, this is not true. The Internet is a massive network of networks which connects millions of computers way of accessing the information on

Internet are through e-mail and instant messaging (which can, but don’t necessarily, use the Web). Thinking that the Internet is the same as the Web is like missing the forest for the trees.

a computing device or the internet, including non-physical electronic

your computer and electrocute yourself. But hopefully that’s never

While some think that the Web is

to access information using the

into a fake world to keep them busy energy. But if you died in the Matrix,

not CD’s or records, and when your

and assumptions made in the work.

Above sources adapted from Wikipedia: The Free Encyclopedia


08

Introduction ÂŤ Towards a New Conceptual Framework

09

This research study is divided into an exploration of four key areas, culminating with the final design brief and design proposal which evolved from the research. The areas of exploration can be generally described as:

1. The Changing Digital Landscape: an evolution in the personal

computing paradigm

2. The Impact of Technological Change on the Individual

3. Reflection and Analysis of Data and Design Experiment

4. A Proposed Analogy to Inform the Design

The final chapter builds on the characteristics drawn from the contextual search and review to help build the design brief and design proposal. That section is followed by the conclusion, bibliography and appendices.

02 The Changing Digital Landscape: An Evolution In The Personal Computing Paradigm


10

11

The Changing Digital Landscape « Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

Introduction

hardware but also in the type of users of the device. At their outset,

The following chapter explores a technology transition that has been

computing machines were housed in large organizations on permanent

underway for several decades. The aim is to describe and pinpoint the

mainframes and used primarily by experts such as professional math-

historical shifts that have led us to this moment in time as they relate

ematicians, whereas today personal computing is highly portable and

to the evolution of the personal computing paradigm. This will define

carried out virtually anywhere and by everyone, including non-experts.

the term is use to denote a high-end

which itself has been influenced by several factors. Below are six points

Douglas Englebart (b. 1925), an American inventor and early computer

Hyperlink

outlining the focus for discussion around the history of computing.

pioneer, was seen as a key figure in helping to shift users’ perceptions

Mainframe This term is not referring to Star Treks’ mainframe, but was used around the same time, referring to large computers in largely faceless boxes that contained the central processing unit and memory. Now commercial computer.

and contextualize the “changing digital landscape”, a phenomenon A reference to another document

and shape attitudes of computing devices. Englebart argued that, by

that can be easily clicked to bring up the source material easily. Makes navigating from one piece

• The advent of the personal computing paradigm

“augmenting the human intellect”, computers would not only be useful

of information to another as easy

• The introduction of the graphic user interface, a major component

to technicians, specialists, and academics, but to everyone (Allan, 2001).

openawholenewworldofinformation-

In 1968, Engelbart staged “The Mother of all Demos”, as it was later

as the click of a button. http://www.

withtheclickofabutton.com

in the shift to personal computing

Word-Processor

• The pervasiveness of personal computing in North America

termed, due to its significance in computing history (Erickson &

• The potential for personal computing to transition to Cloud technology

McDonald, 2008, p. 31). During the 90-minute live demo, Engelbart

of the early stand alone electric

• Issues related to the shift to Cloud technology

debuted new innovations such as hyperlinks, word-processing, drag

keyboard entry and a processor for

• The shift from inhabiting physical space to dwelling in a virtual world

and drop action, vector graphics, e-mail, videoconferencing and the

Is an application that was derivative typewriter and combined with a editing capabilities. These machines were in and out of offices in a blink of an eye.

computer mouse, the first of its kind. Considering the relatively primitive

The History of Digital Computing

state of technology in the 1960s and how prevalent Englebart’s ideas

The Advent of the Personal Computing Paradigm

have become today, the demo was indeed remarkable.

Despite popular perception, digital technology did not emerge abruptly

Vector Graphics Is a graphic format that represents the image using it’s outermost edges, points, lines, bezier curves etc. It is the farthest thing from a paint brush and paint as you can get.

in the late twentieth century. Computers of varying complexity have

In hindsight, Turing and Englebart have emerged as two key visionaries

been in use since at least the early 1900s. However, the English math-

and catalysts in personal computing history by helping to open people’s

ematician Alan Turing (1912-1954) is still considered the “father” of

minds to the possibility of personal networked computing systems. While

modern computer science, having invented in 1936 what today is

Englebart did pave the way for the reception of the personal computer

a virtual object like a file on their

regarded as the blueprint for the electronic digital computer (Mark &

by the general public, it was not until 1975 that Sphere 1, the first all-in-

user interface) and drag it from one

Wolf, 2008). Since then, more powerful and flexible computing devices

one personal computer, was manufactured for general sale for $650

have been introduced, gradually adding more features while shrinking in

as a hobby kit (Allan, 2001). Even though single-person computers were

size until becoming the omnipresent instruments surrounding us today.

already in the marketplace, very few people had the opportunity to

But just how did Turing’s arena-spanning behemoth morph into our

use them, as they were still too expensive for the ‘average’ person.

pocket-size iPhone? The shift involved not only a change in computer

Drag and Drop It couldn’t get much simpler, The term refers to exactly what it does, it gives users the ability to grab computer (which must have a graphic folder into another and drop it there. Above sources adapted from Wikipedia: The Free Encyclopedia


12 Graphic User Interface Often pronounced gooey, it is not some slime from a sci fi movie. Rather it is user interface for the computer that changes raw code or lines of code for telling the computer what to do into pretty little icons like folders and files

The Graphic User Interface, A Major Contributor In The Shift

for most of the world. Source adopted from Wikipedia: The Free Encyclopedia. WYSIWYG Is an acronym that gets made into an odd sounding word, wiz-ee-wig.

computer was going to become a staple consumer product, an assertion

During the late 1970s and into the 1980s, computers changed significantly: they became more sophisticated, prices were lowered, and not only

will print out the same as it views in its editing state on screen. Can you imagine having to write lines of code that needed to represent a

that most people at the time believed was ridiculous (Jobs as cited in D’Souza, 2011). According to Xerox PARC, their first personal computer

academics and experts but also computer hobbyists began purchasing them. The introduction of the desktop analogy, the graphic user interface (GUI), and software based on what you see is what you get WYSIWYG) by Xerox Parc, marked a significant turning point in the advancement

(PC) that used the desktop analogy was “The Alto” (Allan, 2001), which greatly influenced the design of other PCs. John (2005) explained: “Steve Jobs borrowed the idea for the computer mouse and GUI from Xerox PARC and created the Apple Macintosh computer. Then Bill Gates

of personal computing (Swedin & Ferro, 2005, p. 97; Allan, 2001). It

borrowed what Steve did and built Windows for PCs” (p. 139). The

changed the traditional blue/black and green prompt screens strewn

price and size reduction of the physical machine, as well as the graphic

It refers to how the content displayed in a page layout document for ex.,

Thesis by: C. Ellicott, 04.08.2011

Steve Jobs, the co-founder of Apple in the 1980s, predicted that the

To Personal Computing

and actions, like drag and drop that makes it easier to compute

13

The Changing Digital Landscape « Towards a New Conceptual Framework

with lines of code into an understandable desktop environment a layman could relate to. Now, not only computer experts but children could learn

desktop analogy and graphic user interface, were the final triggers in the success of the personal computing revolution.

to operate computers proficiently.

brochure or a image like the one right? This with GUI makes it much easier for the layperson to compute.

1977 Commodore 64 was the first mass marketed computer

Above sources adapted from Wikipedia: The Free Encyclopedia

Figure 2.01 The Advent of Personal Computing — A Historical Timeline: Part A

1968 Mother of all demos Englebart paves the way for the possibilities of personal computing

1937 Turing Machine, was an experiment that represented a, “intelligent machine”

1924 IBM formed from the Tabulating Machine Co.

1950 - 1970 Mainframe computers manufactured b y "IBM and the Seven Dwarfs" group of companies that represented a, “intelligent machine”

Source: Images Royalty Free. Compilation copyright 2011 by C.Ellicott . Facts are adapted from Carr, N., The Big Switch : Rewiring The World, From Edison To Google, 2008, pp.109, 122; Rifkin, The Age of Access, 2000, pp. 16, 17, 18; Allan, R. A. Personal Computing in the 1960s. A history of the personal computer: The people and the technology ; (2001). http://www.k-director.com/blog/wp-content/uploads/2008/06/bill-gates-timeline.jpg; “Macintosh”, (n.d.), In Wikipedia: The Free Encyclopedia, http://en.wikipedia.org/wiki/Macintosh; “ipod”, (n.d.), In Wikipedia: The Free Encyclopedia, http://en.wikipedia.org/wiki/IPod

1975 Shere 1 was said to be the first personal computer, said Byte Magazine

1973 Xerox PARK desktop analogy and GUI comes to life

1977 Apple II it’s first personal computer licenceses “Basic” from Microsoft

1984 The Macintosh 128K machine comes with GUI, mouse and keyboard

1981 Xerox PARK’s computer the ‘Star’ greatly influenced Apple, Microsoft And Sun.

1991 Utility “grid”computing for corporations, essentially Cloud computing

1990 Advent of world wide web Tim Berners -Lee

1993 Thin Client coined by by Tim Negris


14 Moore’s Law

15

The Changing Digital Landscape « Towards a New Conceptual Framework

The Pervasiveness of Personal Computing in North America

the traditional desktop computer is gradually being replaced by

Computers have become millions of times more powerful as well as

a selection of cheaper, smaller, easier-to-use computers such as PDAs,

immensely more common and connected over the past few decades.

smartphones, e-readers, tablets, netbooks and laptops. As well as

According to a 2006 Economist.com survey, Canadians owned 87.6

becoming cheaper, digital devices are also more powerful and portable.

computers for every 100 people, while the United States ranked sixth

Digital service carriers connect millions of wireless devices annually,

with 76.2 computers per 100 people. From the sale of the first PC in 1975,

according to a recent survey, with an American penetration of 95 percent

this represents quite an amazing acceptance of technology and under-

(Higginbotham, 2010). Yet people did not just own more devices; they

scores the rapid expansion and pervasiveness of digital technologies.

became increasingly connected to the internet.

Thesis by: C. Ellicott, 04.08.2011

The trend in computing hardware that says that the amount of transistors placed on an integrated circuit has doubled (and will continue to double) every two years. Computers are getting smaller and smaller by the year. But when will it end—Moore really means more.Oh, the year 2015 or 2020 by the looks of it. Source adapted from Wikipedia: The Free Encyclopedia.

Personal computing has grown at an exponential rate, with the average 2011 Google launches first Cloud Operating system

North American owning one or more personal computing devices. 2009 Cloud Computing starts to make an impression in personal computing with Web 2.0

Technological advancements and lowered manufacturing costs have made such devices more affordable for a greater number of people Figure 2.02 The Advent of Personal Computing — A Historical Timeline: Part B (Source on previous page)

(see Moores Law). Based on past trends, computers will likely increase

2002 BlackBerry’s first smartphone

in number and importance into the future. However, it appears that

1990 Advent of world wide web Tim Berners -Lee

1993 Thin Client coined by by Tim Negris

2010 500million Facebook users in the Cloud. That’s 1 in 13 people on earth are a user

2001 SaaS Software on demand is a corporate business phenomenon

1991 Utility “grid”computing for corporations, essentially Cloud computing

1995 Modem “dial-up” technology 56kb allows home users to connect to the Internet

2000-2001 Residential high speed access 1997 spiked in Canada Google search engine launched

2001 iPod launched 2001 The tablet concept was made popular as a concept by Microsoft

2004 Facebook launched

2007 iPod first public touch screen technology 2007 Facebook has 50 million users

2012-13 Microsoft Operating system will include Cloud functionality

2009 Web 2.0 the social web

2010 iPad tablet launched

2011 Web 3.0 the semantic web

2011 iPad 2 tablet sells 500,000 in first weekend


16

17

The Changing Digital Landscape « Towards a New Conceptual Framework

Mobile technology does not exist in isolation anymore but has the ability

Further, Carr suggests that “twenty or so years from now, the personal

to plug into a much larger computer—the internet. Internet access marks

computer [will] become a museum piece, a reminder of a curious time

another huge transition in the digital landscape. With wider access and

when all of us were forced to be amateur computer technicians” (p. 81).

availability, people are spending more of their lives connected online.

However, if Carr is correct, personal computing may change significantly

In 2000, 46.9 percent of users reported that they accessed the internet

in future, heralded by a move in part to ‘Cloud’ computing coupled with

from home. By 2005, home internet use had almost doubled to 78.6

other more mobile devices such as tablets, smartphones, netbooks and

percent (Campbell, 2005, para 2). This rate of internet adoption increased

thin clients. On the other hand, this could be viewed as too extreme an

as the number of compatible internet devices increased. At the same

idea that does not take social, economic and individuals’ fears into

time, individual devices have imposed limitations on users such as

account, as people may be hesitant to put all their data on the Cloud.

hardware storage, and the plethora of devices has led to an increase in files strewn across multiple devices, resulting in user confusion. A typical Canadian Personal Home/Work Computing scenario - for a couple

Part of a designer’s role is to identify and work with emerging trends. Some experts foremost in computer technology predict that Cloud computing is the next big paradigm shift. In 2007, Eric Schmidt of

+

+

+

+

Google voiced his excitement over the Cloud’s potential in an interview following a search engine conference. This marked the first high-profile

Television + Cable

Desktop computer

USB Storage Device

Analog and Mobile Phone

Mobile Phone

usage of the term ‘Cloud computing’, previously referred to as Utility or Grid Computing. Since then, the term Cloud computing has replaced

+ Printer/Scanning device

+

+

+ Digital Camera

MP3 player

Utility or Grid Computing in popularity. In the interview, Schmidt External Hardrive

Stereo

explains: It starts with the premise that the data services and architecture should be on servers. We call it Cloud computing.... it doesn’t

WWW Web access: Hi Speed

+ Figure 2.03 Many Canadian Households Own Several Computing Devices And Peripheral Computing/Technological Gadgets The following image shows an average number of devices and peripherals for a Canadian couple. Source from Probe data in this study.

The Potential for Personal Computing to Transition to Cloud Technology

matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what-have-you—or new devices still to be developed—you can get access to the Cloud. (Sullivan, interview, 2006, para. 8)

In this ever-shifting digital landscape, a new question arises: will the Typical Cloud Service useage

Gmail maintain its relevance? In his book The Big Switch, personal computer

Cloud computing provides access to shared servers (and, in turn, to

Carr (2008) predicts a radical new approach to computing, one that

hardware and software on demand), thus centralizing storage. It is

does away with the PC entirely, as the idea of “having files and software

usually a paid subscription or pay-as-you-go service and gives businesses

locked into PC hard drives will be an unnecessary nuisance” (p. 81).

and/or individuals the ability to use applications and storage without

Thesis by: C. Ellicott, 04.08.2011


18

19

The Changing Digital Landscape « Towards a New Conceptual Framework

ever needing to buy or own them outright. Some Cloud services, like

when they access and use sites such as Hotmail, Gmail, Yahoo mail,

Facebook, are free. All that is required for cloud computing is access

Facebook, Twitter, Flickr, and so on. One might question just how many

to a computing device and a browser with internet access. Enthusiasts

current users of webmail or social networking services are aware they

of the Cloud revolution use this analogy to describe it: “If you only need

are using Cloud services or are cognizant of the implications of such use.

milk, [why] would you buy a cow?” (Wikinvest, 2009, para 2), implying

What are the consequences of privatization and corporate control of

that it would be illogical to buy hardware and software if all that is

the web through Cloud-like services? Issues of ownership, privacy and

needed is internet access.

security, access and cost require serious consideration.

Utility Computing has been servicing the corporate domain since

Ownership

the early 1990s. It offered much the same overarching services as the

The impact of ownership could be overwhelming to the personal

Cloud currently offers individuals today—access to storage, hardware

computer user, with companies monitoring data, controlling data and

and ‘Software as a Service’ (SaaS). Cloud computing has now moved

perhaps controlling the voice of data creation. A question of who owns

to personal computing. This adjustment in focus mimics how PCs

the data could also threaten an individual’s democratic digital rights (i.e.,

came into existence, first taking root in business and academia and

the right to choose a product from an available selection). For example,

then pushing into the personal domain.

Apple has a stranglehold on applications it sells through its app store. If Apple does not like an application, for whatever reason, it can deny

In July of 2009, Google announced Chrome OS, its first operating

its availability on all its iDevices.

system that relies solely on the Cloud to function. Chrome OS is designed to run on computers that will ship with as little internal storage

Canadians have a long history of ownership of tangible physical assets:

as a phone. Google’s OS leverages the power of the Cloud to run on

What can be seen and held, can be owned. On the other hand, intangible

less powerful and less expensive hardware, such as netbooks or smart-

assets such as intellectual property have been mainly a concern for

phones. In December of 2010, Google began beta testing of its first

artists, writers, musicians, engineers, etc. There has been a transition of

CR-48 netbook, with only 16 gigabytes of onboard storage. Microsoft’s

late where intangible assets are becoming just as much a concern as

Office Suite installs in excess of 70 megabytes and therefore could not

one’s physical assets to both the individual and the business/professional

be installed on such a machine clearly, making the CR-48 primarily

person. People are publishing personal thoughts, content and images on

viable for Cloud computing.

public online environments such as Facebook, Flickr, blog sites, etc. with little regard to their rights or the consequences of losing their rights.

Issues Related to The Shift to Cloud Services

This disregard for consequences perhaps arises from the fact that, up

Unbeknownst to many users, webmail and social networking services

until now, few users had intellectual properties in need of protection.

have been utilizing the Cloud computing paradigm for quite some time

However, with the constant sharing of information and images on public

Thesis by: C. Ellicott, 04.08.2011


20

21

The Changing Digital Landscape « Towards a New Conceptual Framework

online spaces, the question of intellectual property rights could pose

the company’s fine-printed assertions of ownership. These issues may

a problem in the future.

likely increase in importance to individuals as they extend their Cloud services. As one journalist argues, “having a few huge corporations

If we examine the history of ownership and property, it seems hard to

control our outlets of expression could lead to less aggressive news

believe that people will relinquish their rights so easily. The concept of

coverage and a more muted marketplace of ideas” (Rosenwein,1999,

ownership and property, a man-made social construct, stretches as far

para. 4). This could mark a change in our fundamental online rights,

back as 3000 years ago to Plato and Aristotle (Clement, 1983; Pipes,

with Facebook setting a precedent that other companies may follow.

1999). Feudal England brought about a division of land/property in

This is a troubling concept, especially for a user whose entire data

which the King ruled and owned the land. However, when the feudal

collection is stored with a Cloud provider. Not only might there be

system ended, the allodial system (1650) ensured land ownership rights

privacy issues but it makes a lot of data vulnerable for loss or theft.

to the individual (though still involving constraints) in England. The above example pertains to land ownership but also encompasses ownership of

Moreover, what if the data hosting company that has all one’s data goes

objects and intangible assets that are jointly and/or individually owned.

out of business? Delicious, a free cloud-based social bookmarking web

A formalization of the concept of ownership with regards to private

service and the most popular service of its kind, is now in the process of

property has more recently been defined by laws that govern an individual’s

moving ownership. While they give the option to the user to migrate to

property (Clement, 1983).

other Cloud services, it is not an ideal situation.

Privacy and Security Privacy and security in the Cloud is a legitimate concern. People are becoming increasingly wary of privacy and security issues, and with good cause. Not too long ago, companies such as Facebook claimed all data posted on their site belonged to them. Facebook has been heavily criticized for changing privacy rights at their whim without making it overtly known to their users. The power that corporations have over what, in most cases, is assumed by users to be private interactions or experiences on an online system may be jeopardizing personal freedoms. Facebook is a good example of this tenuous (and for many consumers, confusing) concept that pits the public’s expectations of privacy against

Access is key, especially when using the Cloud, and will become even more imperative the more dependent we become on online status. It does seem that a shift in our language may suggest a shift in consumer behavior. The word ‘access’ was once confined to the noun form, referring to questions of admittance to physical spaces; now, access is a verb in the dictionary, signaling its new, more expansive use in our lives and becoming one of the most used words in contemporary society (Rifkin, 2000). Access not only depends on a change in ownership status, from ownership to membership (access) as Rifkin (2000) writes, but also deals with issues of politics as well as social and technical drivers. Access can affect the control of information.

Thesis by: C. Ellicott, 04.08.2011


22

23

The Changing Digital Landscape « Towards a New Conceptual Framework

Cost

a vested interest in the technology’s success. However, for personal

In Age of Access, Rifkin (2000) observed that there was a fundamental

users, factors such as ownership, privacy & security, access and cost

shift in consumer attitudes from ownership (i.e., ‘to have, to hold’ and ‘to

will be the main determinants of personal digital property and the

accumulate’) to membership. Increasingly, individuals pay for the experi-

viability of Cloud computing into the future.

ence of using things in the form of rent, subscriptions, memberships, leases, and retainers, rather than paying to own the things themselves.

The Shift from Inhabiting Physical Space to Dwelling in a Virtual World

For instance, Rifkin (2000) sees a trend of people giving up ownership

Another dimension of change, as Thackara describes it, is from “terra

of their automobiles in favor of leasing cars, or discarding answering

firma to terabytes”, a change that will continue “to transform the way

machines in favor of subscribing to monthly digital answering service

we live” (2000, p. 4). This infers that a continued physical abstraction

(Carr 2010). One might argue that the reason for obtaining a subscription,

is underway and has been for some time now. For instance, people used

lease, or retainer is mainly due to the fact that most were for purchases

to own songs on physical music albums; these evolved into cassette

of expensive items, which most individuals could not afford without a

and eight-track tapes, then CDs, and then mp3s on a computer or iPod.

monthly payment plan.

Today, many of these songs exist only in the Cloud with services like Grooveshark and iTunes. Digital tools and content can now be organized

How affordable will personal computing subscription services be for

into a virtual non-localized paradigm, which has sometimes been

the average user? It costs a lot more to pay for an answering machine

referred to as moving from “desktop to cloudtop”. Virtualisation is

subscription service than to buy the physical device outright. Indeed,

another word describing the transition from physical reality to a virtual

the cost of a physical answering machine is far less than the cost of a

one. It is fast becoming an industry standard word, as Carr suggests, and

first year’s subscription to a digital answering service. This new trend

“refers to the use of software to simulate hardware” (Carr, 2008, p. 96).

of moving to a subscription model online service may die out if it is proven not to be viable costing solution for the average user. The

A further aspect to this change is the “digital divide”, a term coined by

alternative may be a possible hybrid solution that people adopt,

Rifkin (2000, p. 13). It refers to the ‘divide’ between those who are

using some subscription services but not all.

moving their focus from a physical landscape to cyberspace and those who, for various reasons, are unable or unwilling to do so. This is but one

Due to the Cloud’s relative newness, there is no way of knowing for

perspective of the divide; it could be multi-dimensional, dividing generations,

certain where the concept of Cloud computing will go. Its most boisterous

have’s from have-not’s, new and emerging countries from wealthier and

corporate cheerleaders (e.g., Amazon, Microsoft and Google) have

more established ones, and creating socio-economic schisms.

Thesis by: C. Ellicott, 04.08.2011


24

The Changing Digital Landscape « Towards a New Conceptual Framework

25

Summary This chapter reflects on and outlines the history of change in computing technology, which is accelerating at an exponential rate. The Cloud is currently being touted as the latest shift in personal computing culture, but how it will be incorporated into the personal computing paradigm— or whether it is even feasible, let alone permanent—is yet to be seen. How it will be operationalized is also yet to be determined. When observing emerging trends, it is important for designers to examine and explore contexts of emergence, identify drivers for change, and assess economic, environmental, socio-cultural and technological impacts of that change. However, and more importantly, it is imperative that designers do something about all this, not as mere cultural observers and reflectors of the status quo but as visionaries and forgers of the future.

Based on what has been learned from an exploration of this domain, the following can be drawn upon to inform a design proposal: the power of analogy used in computing interface design; the impact of the proliferation of devices on the user and the devices’ inherent limitations; how design might help to close the digital divide; and, the feasibility of using the Cloud as a technology to leverage the design.

03 The Impact of Technology on the Individual


26

27

The Impact of Technology on the Individual « Towards a New Conceptual Framework

Introduction

more easily. With ease of access to ironing came a higher expectation

This study underlines the need to mitigate the negative effects of

of presentation and appearance, and so ironing became a morally good

technological developments on the personal computing experience,

thing to do. Smooth clothing was increasingly associated with respectability,

with specific regard to four potential areas that design could address

while wrinkles indicated slovenliness (Carr, 2008).

—fragmentation of data, lack of synchronization, and depersonalization of the computing experience. In addition to changing the concepts

The mass availability and consumption of electricity brought about

of ‘desk’ and ‘workspace’, details of personal digital behavioral habits

another shift—a post-war (i.e., 1940s-1950s) proliferation of household

inform a design proposal that engages with the idea of a multi-dimension-

technologies, which led to social change. However, instead of lightening

al digital avatar as a way of creating cohesion, control, and ownership of

workloads, as was advertised, appliances made tasks easier to perform

an individual’s data.

but increased the overall number of tasks per household. As Cowan (1976) explained in an article on the scourge of modern conveniences,

The previous chapter framed the numerous recent changes in digital

”some chores were eliminated—like hauling water, heating water on the

technology that affect North American industry and society in general.

stove, maintaining the kitchen fire—[but] other chores were added, most

Yet to be explored are how those technological changes impact the

notably the chore of keeping yet another room scrupulously clean” (p. 6).

individual. Assuming that broadband and the web are here to stay, some

This may in some way parallel our current technological situation, where

variation of the Cloud may continue to prevail. The question is: how will

the proliferation of communication devices is fragmenting our resources

this latest technology affect the individual? In this chapter, a quick scan

and thus further burdening us, financially and time-wise.

is made of some noteworthy technological advances that have profoundly affected societies in the past to compare those advances to the personal

The most prevalent of all modern day household appliances is our own

computing revolution and its impact on current society. More specifically,

personal computer, which is connected to a new type of grid—the world

this chapter will address the impact of today’s technological revolution

wide web. In just a few decades, this machine has dramatically altered

on individual users by examining the changing digital landscape’s rela-

the way we live. Like post-war modern conveniences, computers and the

tionship between people and data, people and computing, and people

internet were supposed to lighten work loads and enable people’s needs

and their environments.

to be met. Instead, these latest tools of convenience are draining people of time and energy (Pepperberg, 2010). This unintended impact of

According to Carr (2008), the advent of the electrical grid altered both

technological advances on the individual suggests that we need to

consumer behaviour and societal expectations. One example of this is

reflect on the ways in which technology is influencing society and what

how, with national electricity, a broader swath of the populace could iron

implications this has for our future.

Thesis by: C. Ellicott, 04.08.2011


28 Psychographics Attributes relating to the personality, values, attitudes, interests, or lifestyles of people. In contrast to demographics, which simply keep track of variables such as age and

29

The Impact of Technology on the Individual « Towards a New Conceptual Framework

For example, a growing number of middle-class North American youth

world’. This has led to people spending increasing amounts of time

are spending increasing amounts of time in front of computers from

online, where a plethora of services generate new wants and needs.

infancy onwards and feel most comfortable in these simulated environments.

In an article, We Are the Web, 2005, Wired Magazine’s Kevin Kelly

Taking their cue from previous generational labels, several authors and

expands on this assumption regarding people’s reliance on the

researchers (Rifkin, 2000; Thagard 2005; Friedmann, 2001) have

cyber world:

suggested new psychographic stereotypes for this electronics-savvy

What will most surprise us is how dependent we will be....

generations, such as protean generation, dot-coms, Generation Y,

We already find it easier to Google something a second or third time

and millennials.

rather than remember it ourselves. The more we teach this mega

gender. Psychographics are able to give a more in-depth sense of people than demographics. It’s not about being a 32-year-old white female. It’s about whether you like being a 32-year-old white female or not. Protean Being able and willing to change or

computer, the more it will assume responsibility for our knowing.

adapt. Because of the always advancing nature of technology, we

Moreover, Rifkin (2000) contends that this new computing and online

It will become our memory. Then it will become our identity. Many

activity is creating a new type of user. The “protean generation”

people, when divorced from the Machine, won’t feel like themselves—

is far more comfortable conducting business and engaging in social

as if they’d had a lobotomy. (Kelly, 2005, para 55)

are living in a protean world. And most people are protean boys/girls. Or, at least, they’d better be if they want to keep up. Dot-com A business that does most of its

activity in cyberspace, and adapts easily to simulated worlds. This preference for the virtual over the real (or the electronic over the

While Kelly’s observation may seem far-fetched to some people, many

physical) represents a significant shift in the way people interact with

users are becoming increasingly reliant on technology and often feel

their environments. Moreover, Rifkin argues that, for this generation,

‘lost’ without it. In You Are Not a Gadget, Lanier (2010) echoes Kelly’s

“access already is a way of life, and while property is important, being

thoughts, suggesting that “separation anxiety is assuaged by constant

connected is even more important” (p. 12). Technology, it seems is

connection.” People, especially young adults, constantly crave connec-

altering human consciousness as well as expectations; people are changing

tion and the stimulation associated with being connected. They avoid

cooler name.

what they do, how they behave, and how they view their life. In turn,

‘shutting off’ unless absolutely necessary. Many sleep by the glow of

Generation Y/Millennials

|their environmental focus is shifting from a physical reality to a virtual

their laptops with their cell phones, set on ‘vibrate’, tucked under their

one. The desktop computer is likewise evolving. Where once people had

pillow (p. 180).

business on the Internet. It can refer to present-day companies but also is used to specifically refer to online companies in the late 1990s. You know all those people who got rich very quickly in the late 90s and everybody kept saying, “I wish I had a company like that, I want a piece of the pie”. That’s what they were wishing for. Shame it didn’t have a

The generation following Generation X. Many of them are children of Baby Boomers and are characterized by increased use of communications, media, and digital technology. What do you call a generation that don’t

to sit at a desk to do their computing, they can now use a digital device almost anywhere, essentially making any environment their ‘desk’.

Fragmentation The main consequence of modern computing use is being on the receiving

fall under specific birth dates and have greatly varying characteristics? Source for all the above are adapted from Wikipedia: The Free Encyclopedia.

The proliferation of digital devices has led the home user to be depen-

end of a barrage of information. These may come in longer formats, like

dent on connectivity through those various devices. Connectivity to the

videos, or short bursts, like tweets. Ontologist, Richard Foreman suggests

internet gives constant access to information, shopping, advertisements,

that people are becoming “’pancake people’—spread wide and thin as

entertainment, people, experiences, social media, communication—in

[they] connect with that vast network of information accessed by the mere

other words, an alternative, and very compelling, living, breathing, ‘other

touch of a button” (Brockman, 2010, para 14). Similarly, Carr (2008) posits

Thesis by: C. Ellicott, 04.08.2011


30

31

The Impact of Technology on the Individual « Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

that the internet’s demand on people’s attention has changed them from

The internet and its attendant technologies may actually be changing

beings who participate in an information society to beings who inhabit

brain activity on a deep biological level (Margulis, 2010). As well, it may

an “interruption society”. One can see the evidence all around, with people

be affecting intelligence and fracturing attention span, possibly creating

to have come about just as computers

absorbing 140-character bytes of information or 60-second bursts of

complete generations of ADHD-challenged individuals. Is the internet

funny that. Now they have added

video, all the while scanning through e-mails and Instant Messages (IM).

really changing the way we think or, as Hillis (2010) suggests, “can we

ADHD or ADD Once known as ADD, attention deficit disorder, a rather new disorder, seems were hitting the younger generations, hyperactivity to the name , but it stills refers to an inattentive, distractible, disorganized, forgetful person

change the way the Internet thinks?” (“Early Responders”, para 7). Evidence for these observations and claims on the impact of new

Is this just another technological neophobia, like when TV was intro-

technologies and the internet are not merely anecdotal. According to a

duced into American households (Samuel, 2001)? Gopnik (2011) argues

recent report, people in 2008 consumed triple the daily information they

that people feel the internet puts them in a state of disassociation and

did in the 1960s. Moreover, as people take more information onboard, they

fragmentation. Previously, life was viewed as whole or stable; now, it is

are constantly shifting their attention, as illustrated by a New York Times

fragmented, multi-partite and unstable. This feeling of fractured living

technology analyst: “Computer users at work change windows or check

may be generational. As stated earlier, the new generation born into

e-mail or other programs nearly 37 times an hour” (Ritchel, 2010, para 14).

the high-tech environment may be more comfortable in this ‘splintered’

This demonstrates that people’s depth of focus is changing to shorter,

landscape, whereas for older generations, it takes a while to get used to

faster skimming while multi-tasking, which may have long-ranging affects.

this new reality.

with symptoms of hyperactivity or impulsiveness. That just about covers everyone now-a-days. Source adapted from Wikipedia: The Free Encyclopedia.

Ritchel (2010) also reports that multi-tasking is having an affect on our brains by triggering regular primitive impulses. For instance, if a person

Anderson (2010) from Wired magazine documented an average day

trains for a marathon after years of being sedentary, his or her muscles

of a technology user:

will reshape and change accordingly. Therefore, it should not be surprising

that our brain is reshaping and changing with different kinds of use. The

one app. During breakfast you browse Facebook, Twitter, and The

question here is whether these changes are beneficial or detrimental and

New York Times — three more apps. On the way to the office, you

how they are affecting each individual. Despite the accumulating scientific

listen to a podcast on your smartphone. Another app. At work, you

evidence , Dr. Pepperberg, a research scientist at the Massachusetts

scroll through RSS feeds in a reader and have Skype and IM conversa

Institute of Technology, is hesitant to accept the scientists’ suppositions

tions. More apps. At the end of the day, you come home, make dinner

from the created for smaller mobile

regarding brain alterations. She asks: “[c]an the internet [really] give

while listening to Pandora, play some games on Xbox Live, and watch

relatively cheap (.99-$9.99) Source

people ADD, does it really change the way people think, or just make

a movie on Netflix’s streaming service. (para. 1)

You wake up and check your e-mail on your bedside iPad — that’s Apps This has become a new term in its own right despite it being the shortened term for ‘applications’. This shorthand term has come to refer to applications downloaded devices which can be free or adapted from Wikipedia: The

it more difficult to have the time to think? There is always the ‘off’ button allowing a return to normalcy (Pepperberg, 2010, para. 8).

While Anderson’s recitation is more about apps usage, his laundry list of new technology does offer insight into how some people uses apps and services, and skips from activity to activity and amongst different

Free Encyclopedia.


32 Kilobyte (kB)

33

The Impact of Technology on the Individual « Towards a New Conceptual Framework

128 kilobyte(kb) onboard storage Macintosh computer

software. Now if one adds to the list a job that involves computing,

A unit of digital information equal

Thesis by: C. Ellicott, 04.08.2011 Figure 3.01 Data Storage Figure Shows how the cost of storage has drastically reduced as consumers need and usage of storage has increased.

1989

to 1000 bytes. Kilo meaning one thousand. Historically it was oddly 1,024 bytes, ambiguous yes, but thankfully people like exactness so its back to what it should be.

the ‘average user’ would have been connected to some form of digital

1990

device for most of the day. 1.44 Megabyte (MB) (2.0 MB unformatted) floppy drive

Megabyte (MB) Equals 1000 kilobytes of information Gigabyte (GB)

1 GB=$9000 (approx)

1997

1 Gigabyte (GB) storage was the size of a 500lb machine or the size of a refrigerator

As our bodies adopt sedentary lifestyles demanded by current digital

Equals 1000 megabytes of information Terabyte (TB)

dependence, the constant shifting from window to window and online

Equals 1000 gigabytes of information Petabyte (TB) Equals 1000 terabytes of information Exabytes (EB) A unit of information equal to one quintillion bytes (that’s 1,000,000,000,000,000,000 B).

activity to online activity may trigger a primal instinct to react upon those abrupt changes as opportunities and threats. Such reactions

8MB USB drive

2000

stimulate the part of the brain that provides dopamine, which can be

Bit Torrent File sharing system launches a (P2P) peer-to-peer protocol. Drives need for more personal storage capacity

2001

10GB Xbox The first game console with a built in hard drive

2002

1 GB = $7.30 (approx)

very addictive, so without the bursts of excitement, a sense of longing

It’s like when you make up a sound before illion because it’s so big and trillion. And so on...

malaise, will it be the job of a psychiatrist to prescribe drugs or help quell

Above sources adapted from

newly-formed technological habits, or might design be able to intervene?

Wikipedia: The Free Encyclopedia.

4.7GB to 8.5GB Dual layer DVDs now available allowing 12 CDs to fit neatly on a DVD

and boredom creeps in (Ritchel, 2010). In such a self-inflicted cyclical

you can’t think of anything beyond a

5GB iPod Classic holds 1000 songs or 75+ albums

CD/DVD life expectancy 2-5 years, ideal conditionss can last 10+ years

Some software companies have already addressed this issue by creating software that forces people to focus on one activity at a time.

MP3 compression 200 songs can fit on a CD

Nevertheless, however well intended, such a product might not succeed

speed diversions.

Synchronization Individuals are, for the most part, responsible for this digital dependency Figure 3.01 (Right) Source Images: w:User:Grm wnr, (2006). [Macintosh Image]. Reproduced from http://en.wikipedia. org/wiki/Macintosh; Kyro, (2009). [iPod Image]. Reproduced from http://en.wikipedia. org/wiki/Ipod; Yakov Lapitsky (2005). [You Tube Video]. Reproduced http://www. youtube.com/watch?v=jNQXAC9IVRw Source Facts: Adapted from “Decade of Storage: From USB to Cloud Storage”, by A.Davis, 2011, Rackspace, Retreived from http://www. rackspace.com/cloudblog/2011/01/18/ decade-of-storage-from-usb-tocloud/

and information deluge by creating more and more personal data all the time, whether as video, sound, imagery, writing, etc. Wozniak (2010)

45 terabytes (TB) of data is stored on YouTube, first video “Me at the Zoo” was uploaded

2006 6

Floppy drive dies for good

FaceBook & Flickr launch having large amounts of peoples data

2004

2005 1 GB= $1.94 (approx)

in a marketplace brimming with consumers who are hooked on high-

2003

1 GB=$2.58 (approx)

First 1 TB hard drive ships The largest available now = 1/10th of the storage of Library of Congress

reports that 70% of digital data is created by individuals (p. 8). The more Twitter launches

data individuals generate, the more they have to manage, and the more devices they own, the more data they have to manage across multiple devices and online space the more data is scattered amongst them with little or no synchronization.

2007 1 GB = $0.50 (approx)

3.6 Zetabytes per US home of information consumption

0 2008

First open source API for creating Private Clouds

2009

First wireless SD Card that can transmit stored data wirelessly

1 GB = $0.27 (approx) 1 GB= $0.6

2010


34 Hyperconnectivity

35

The Impact of Technology on the Individual « Towards a New Conceptual Framework

However, as individuals generate and consume more of the world’s

and in how many shapes and forms (e.g., physical or virtual). Data

digital content, they are slowly realizing that they have added yet

evolves with the person who creates it and can be divided into at

another task to their daily life. Much like the women in the 1950s and

least seven categories, as follows.

With all of the devices connected to a network exceeding the number of people in the network, people are more connected than ever. And to think, being hard to reach used to be a sign that you were busy and interesting. Source adapted from Wikipedia: The Free Encyclopedia

1960s overwhelmed by their accumulating ‘mod cons’, individuals today have to manage, archive and filter their own “information heirlooms”,

1. Personal data, generated purposefully by the user and mainly kept on

referred to here as a Personal information Collection (PIC) (Gantz, 2007).

personal PCs in a home environment. This would generally incorporate

Williams et al. (2009) defines a PIC as “a space we turn to first when

raw data such as digital photos, imagery, writings, files, documentations,

we need to do a task or pursue an interest… [or] informal diverse and

videos, sound collections and word processing documents. A less

expanding digital memory collections accumulated and maintained by

common form of known personal data is info in the form of bookmarks,

individuals [which] support their work and leisure needs” (p. 347).

contacts, e-mails, IMs, skype chats, cached pages, and so on (Williams et al., 2009).These are part of our data trail.

A fundamental aspect of computer-based activity is the management of people’s digital information, also referred to as Personal Information

2. Personal archived data, accumulated over time and generally kept off

Management (PIM) (Williams et al., 2009). Poorly synchronized devices

site or on external media. This would be the same raw data described

are creating numerous repositories for information, as are software and

above but not in use anymore. Most likely it has been backed up and

utilities. The diversity and proliferation of individual’s digital collections,

remotely stored on a computer, external hard drive, or on temporary

as Williams et al. (2009) suggests, is under-researched. Moreover,

media devices such as CDs and DVDs. The sole purpose of this data is

futurists are predicting that, by 2035, more than one trillion devices

for retrieval at a later date.

(most of them wireless) will be connected to global networks in what they term ‘hyperconnectivity’ (Nortel Networks, 2010). According to

3. Secondary or other digital device data. This data could either be a

Gantz (2007), storage in 2007 was 267 exabytes, a figure which included

replication or specific to the device. Although synching is getting better,

empty usable space on hard drives, tapes, CDs, DVDs and memory.

it is still far from seamless. With creative digital applications for secondary

However, the data created that year was 281 exabytes, which exceeded

devices, people are making and storing images, music, and documents on

the amount of actual storage space. This suggests that not everything

devices such as smartphones, e-books, mp3 players, video recorders,

that is created is kept. It was predicted that between 2007 and 2011,

digital cameras, etc.

people may require 1,800 exabytes of storage, a growth of 60% from 2007 (Gantz, 2007).

4. Personal data on Facebook, Gmail, Flickr, Twitter, Blogger and other communication and social media reside in the Cloud. It allows the ability

What is yet poorly understood is just how many locations are currently

to create new data, replicate data, and create avatars with personal

being used to store personal data, as well as where these locations exist

information.

Thesis by: C. Ellicott, 04.08.2011


36

37

The Impact of Technology on the Individual « Towards a New Conceptual Framework

5. Invisible and partially-visible data trails online as well as on metadata

7. Retrieval applications, tools and histories: These are “applications,

(Williams et al., 2009). This is data usually inaccessible by people but still

tools (such as a desktop search facility) and constructs (e.g., associated

part of their digital data creation. For example, it could include the data

properties, folders, etc.) that support the acquisition, storage, retrieval

trail of a person’s buying habits, search habits and website movements

and use of the information (Williams et al., 2009, p. 345).

kept by various companies such as Google or Ebay. As described by Williams et al. (2009), “metadata [is] system-generated data about a

While this list may not be exhaustive, it does offer an idea of how extensive

document’s creation, location, size, etc. [It] may also be considered part

personal data can be, underscoring Williams et al.’s (2009) contention

of a digital collection, as it may be required in retrieval, especially where

that deciding which artifacts constitute an individual’s meaningful digital

a vast amount of documentation is being generated — an extreme

collection can be philosophically challenging. We could also question

example being efforts to capture every moment of one’s life” (p. 345).

how far an individual’s data trail travels and when it ceases to belong to

For example, on these online trails, people can check their photos and

that individual, further blurring the demarcation lines between private

see data, file size, creation date, etc. Passwords are a more visible form

and public data. It can thus be difficult to know for certain where an

of data; however, they tend to be stored with companies one has created

individual’s identity and data starts and ends. Not only can the ambiguity

memberships with.

of ones data make it difficult to manage, but the sheer volume as well as number of places it exists makes it a big task.

6. Customized workspaces, system preferences, software preferences, cookies and settings involve, for instance, customized settings in an

Summary

application. Adobe allows the user to move palettes around, add and

From the research presented in this chapter, we can see there is an

subtract them, and then save the settings for next time. Taking this

obvious shift in the way people relate to their computer. Due mainly to

concept further, users usually modify or customize their software to

the growing number of devices, the computing experience is becoming

suit how they work (i.e., in Microsoft Word, users organize their palettes

increasingly fragmented, personal data is becoming multi-dimensional

according to personal preference, or Facebook users add different

and splintered, and limited synchronicity among devices and data forms

application to their accounts). These settings and modifications are

is hindering inter connectivity. Moreover, this has affected an individual’s

set up in such a way that they do not need to be re-set for each use.

environment, with a shift from the physical to virtual, where a ‘desk’ is

Similarly, cookies are stored on computers to ‘remember’ passwords,

now less a physical place and more a window onto a virtual world.

which the appropriate websites can access when prompted. Back-ups, software updates and virus scans are further examples of settings that

The end result of such radical change is that there appears to be

people set up to facilitate good PIM at a time that is convenient.

decreased relevance of the desktop. Even language is starting to signal

This data is also part of a PIC.

this mental shift: where once people worked at their desks, now they

Thesis by: C. Ellicott, 04.08.2011


38

The Impact of Technology on the Individual ÂŤ Towards a New Conceptual Framework

39

work at their computers. As we see with the proliferation of personal data, people are not only impacted by technology but, as individuals, are themselves impacting technology. It will therefore be important to involve the individual in helping to identify and meet his or her real needs. Issues related to fragmentation and synchronization of personal data collections provide fruitful ground for designers to explore. Based on what has been gleaned from a contextual search and review of the impact of personal computing technology on the individual, the following can be drawn upon to inform a design proposal to address issues of data fragmentation: the current abundance of data collections; where data collections start and end; synchronization; and the new workload of maintaining and organizing data as an alternative space.

04 Changing Methods and digital Methodology landscape


40

41

Methods and Methodology « Towards a New Conceptual Framework

INTRODUCTION

Thesis by: C. Ellicott, 04.08.2011

Starts Here

The purpose of this chapter is to describe the methodology and methods used in this exploratory study of how the changing digital landscape is shifting relationships between people and data, people and computing, and people and their environments. Action Research (AR) methodology

4.18 Evolve

4.16 Study & Measure

examine the effects of the technological revolution on the personal

4

Ph as e

>>

& rch

create a better digital environment for individual users.

1.2 Interviews

1>

>>

Ph as e

4.15 Launch

1.1 Re-define brief

a se Re

computing culture. It aims to determine how design may be used to

>

ch un La

ation valu E &

Refine

4.17 Evaluate

as design to reflect, re-iterate and re-evaluate. This study’s goal is to

1.0 Problem

Problem

was chosen to conduct this research because it mirrors the same need

tegy Stra

Solu

tion

Design Process:

3.14 Co-ordinate

is also examined. Each of the research methods used, as well as the data 3.13 Implementation

3.12 Production

2.5 Ideation & Brainstorming

ion

the precursor to the final “ghost in the machine” idea. Sample screens

t nta me

and figures are included to illustrate the ideas and iterations that were

&

and storyboards for a new type of system, as well as ideas for possible

o Pr

du c

scenarios of its use, have been included in this section.

tio

n

3.11 Testing

ACTION RESEARCH METHODOLOGY As its name implies, Action Research (AR) is a research methodology

1.4 Strategy & Plan

ig n

collection methods, are described in detail. A number of rough sketches

Iterative; the process is in constant review, amending, adaption, & refinement and renewal of the problem.

Phase 3< Imple

emphases on iteration and reflection. The rationale behind this methodology

es

In the following sections, the AR methodology process is discussed, with

1.3 Research & Analysis

2< Phase

& pt ce n Co

D

2.6 Concept & Sketches

2.7 Refine Concepts

3.10 Prototype 2.9 Evaluation

2.8 Mock Up

that emphasizes progressive problem-finding through reflective processes. As such, AR naturally mimics the cyclical process of design practice, making it an ideal methodology for this design proposal. As Cal Swann (2002) notes, AR follows a four-step process: plan, act, observe, and reflect, which mirrors the four-step process used in design (see Figure opposite and on next page) An integral part of AR is collaboration. In the design process, collaboration also occurs through a series of brainstorming sessions and meetings with stakeholders, but AR tends to be

Figure 4.01 A Four Phase Iterative Design Process The four phase design process is a very similar process taken by action research so makes this methodology an ideal choice for this study. Copyright 2010, by C. Ellicott.


43

Methods and Methodology « Towards a New Conceptual Framework

Starts Here

c

ig n

es D

Refine Contextual Research

ct ru t s on

Brainstorm “Project” Personal “Cloud” Pilot

ic

ge ed l ow n K

Pl an ic

te g

Write Personas

te g

or Idea

Problem

Re fle >

4 Ph as e

Ph as e

4

Refine Solutio n OR N ew Pro b

Re fle

> 4 Ph as e

e ledg now K ct tru ns o C

Cultural Probes

Sketching

fe re n

C Source: Adapted from Article “Action research and the practice of design,” by C. Swann, 2002, Design Issues: Vol. 18, Number 2, pp. 72-94. Copyright 2010, by C. Ellicott.

ng ni ea

Figure 4.02 Action Research Methodology & Design Methodology Overlap A cyclical four phase action research process is mapped to a similar 4 cycle design process

M

n

Diagramatics

f di

tio ta en m le mp ct: I Phase 2 < A

ra St of

egy trat &S

n

Write Outline Strategic Plan

ith w

ds

pt, nce Phase 2< Co

io at I de

Timeline Analysis

5 Why’s?

on cti

f di

et ho

n

Review

sis aly

o Pr

ith w

m

tio

&

>>

Record

a ate alu : Ev

&

on cti

du c

t.

tion

OBSERVE

ion

a ate alu : Ev

t nta me

Iterative; the process is in constant review, amending, adaption, & refinement and renewal of the problem.

>> Refine Contextual Research

Solu

Phase 3 < Observe

Phase 3< Imple

Phase 3 < Observe

Design Process:

Diagram & Sketch Findings

Scenario Building

PLAN

An

tion

egy trat &S

Solu

fe re n

sis aly

R

>>

REFLECT

em bl ro

1>

ng ni ea

Ph as e

M

>

Pl an :P

> Ph s& as New Problem u lt s e1 e r Write thesis e > t a Pl u Contextual Search an al v :P E : Prototype Diagramatics t

t uc tr

t uc tr

>

& Strategy sis a ly An

sed

as e1

h, rc

rop o

Ph

ea es

>>

>

Co ns

Discover or Propose Problem or Idea

search on re acti

An

ion luat Eva & h nc

Co ns

em bl ro

c

lem

Starts Here

>

AP

>

u La

and

>

t

u lt es er t a lu va :E

search on re acti

Thesis by: C. Ellicott, 04.08.2011

Pl an

42

Interview Conclusions ra Cloud App Mind Map St Probe Conclusions of n et ho tio Conduct Interviews ds nta e l em mp ct: I Phase 2 < A

tm

ACT

Source: Adapted from Article “Action research and the practice of design,” by C. Swann, 2002, Design Issues: Vol. 18, Number 2, pp. 72-94. Copyright 2010, by C. Ellicott.

Figure 4.03 Methods used in Study Integrated on the Action Research Process The figure above maps the design methods used in this thesis study as they pertain to a specific phase of the research process.


44

45

Methods and Methodology « Towards a New Conceptual Framework

more rigorous (Swann 2002). AR’s guideline to reflect and work iteratively

reviews and video as well as information gathered through the active

is essential and parallels the design process but, unlike AR, design does

participation of the end-user. By focusing on the end-user, active

not always allow or involve “reflection in action” (Swann 2002, p. 59).

researchers are able to improve the way they address an issue. Further, AR prompts designers to seek clues regarding the tacit dimension of

Swann (2002) suggests that AR begins with “a problem, dilemma, or

individual desire, as their desire might not be evident due to the partici-

ambiguity in the situation in which the practitioners find themselves,”

pants’ inability or unwillingness to adequately articulate them.

as a means to invite the end user to participate in the research process (p. 55). AR is primarily an active process that culminates in reflection or

A DEEPER UNDERSTANDING: REFLECTION AND ITERATION

synthesis, where collaboration and imagination give way to insight and

Critical reflection is an integral part of this methodology, as it helps to

discovery to create new meaning with the discovered data (p. 54).

build a better understanding of the materials reviewed and allows for more creative interpretations of data. CCAR (para. 4, 2010) describes

AR methodology is based on four overarching principles. These four

the action research methodology as a lived and unscripted performance,

principles state that the research must be:

“an iterative, cyclical process of reflecting on practice, taking an action, reflecting, and taking further action…. [T]he research takes shape while

1. situated in social practice to create change;

it is being performed.” The purpose of a reflective and iterative process is

2. collaborative and participatory;

to garner new information from old or newly-collected data that will lead

3. cyclical, iterative and reflective, to promote continual

to a new understanding of the dilemma and/or continual improvements.

Improvement; and 4. documented in a transparent manner, with results made public.

One of the central methods of reflection used in this study was contextual search and review. Once evaluated, the relevant material led to a new

The Center for Collaborative Action Research (CCAR, 2006) claims

understanding of the three areas of study; fragmentation, lack of

that action researchers engage in a more complex relationship and

synchronization and depersonalization of the computing experience and

deeper understanding of how social and environmental forces interplay.

their inter-relationship, which in turn produced a new set of questions,

Since, according to CCAR, these forces are dynamic, AR is a way to bring

data and avenues for research. As a result the research focus was refined

theory alive through practice. Action Research methodology is a relatively

over time. (See Figure 4.04 on the next page .)

new way of working for designers, who previously tended to employ an ‘open-and-closed’ project-by-project approach.

Critical questioning is another key reflective method that helped to guide this research process. CCAR (2010) contends that “good questions often

In addressing its subject, AR seeks to understand a situation through

arise from visions of improved practice and emerging theories about the

multiple lenses, using various methods such as sketching, literature

change that will move the researcher closer to the ideal state of working

Thesis by: C. Ellicott, 04.08.2011


46

47

Methods and Methodology « Towards a New Conceptual Framework

practices” (para 8). This level of questioning deepened the researcher’s

computer culture. Literature, video, cultural probing, interviews, newspaper

knowledge and understanding of the personal computing paradigm,

articles and industry analysts analysis all helped to get a ‘lay’ of the

technological advancements and the Cloud notion, demanding close

digital landscape and set up the background and context for understand-

examination of evidence garnered from varying perspectives. It also

ing. From it, trends could be discerned, and any flaws or gaps in the

sought to challenge conventional wisdom through critical reflection

information could be identified.

and iteration. Cultural Probing

METHODS OF RESEARCH

Cultural probing is a user-centered research method that can be used to

Some of the key design methods used in this research study included

augment contextual search and review. It was chosen as a method in this

cultural probing, questionnaire, contextual search and review, sketching,

research to enable the process of working with people in a new way and

mind maps, 3D modeling, persona building, reflective questioning,

“to create a dialogue between the designer and the user” (Mattelmaki,

and taxonomy. Utilizing a variety of methods was essential for refinement

2006 p. 42). In the design of a new computer paradigm and the need

and re-iteration of “an idea or possibility, in response to feedback or

for end-user involvement in its development, cultural probing is a way

new ideas” (Berger, p. 45). Further, using a variety of methods helps

of drawing people in and thus mirrors the methodology. It draws on

to illuminate new connections, insights and patterns while involving

people’s expertise, experiences and feelings to help shape new products,

the home computer user as well.

environments, technologies, systems and services.

Davies and Parrinder, authors of Limited Language (2010) argue that

In addition, cultural probing uses an empathetic model of capturing

it is important to bring people “into a more reciprocal relationship with

data in order to better understand and explore the uniqueness of the

their world” and the designer must empathize with the individual or

individual. Probes were inspired by the projective methods used in

as the authors proposes, “people are [the] primary subject matter, and

psychology as well as the thought and practice in contemporary art

people cannot be neatly defined and labeled. [They] are contradictory,

and design (Mattelmaki, 2006). Unlike very systematic and logical

volatile, always surprising” (p. 60). Action Research embraces this

questioning typically found in surveys, probes ask people to think

philosophy, as did this study. Cultural probing, followed by a questionnaire

further, create dream scenarios, draw their reality, and allow participants

and an interview, created a connection with participants/end-users and

to formulate their answers in a way that is comfortable to them. The

also developed a dialogue with them.

cultural probe kits designed for this study contained various materials for sketching, writing, cutting and labeling (with emoticons); photographic

Contextual Search & Review

documentation was encouraged as well. The packs’ most crucial piece

In this research, the contextual search and review provides a broad base

was a custom-designed diary with a few broad questions interspersed

of knowledge and an indication of what is already happening in personal

throughout, such as: “How do you relate to your desk?” and “What items

Thesis by: C. Ellicott, 04.08.2011


48

Methods and Methodology « Towards a New Conceptual Framework

49

Thesis by: C. Ellicott, 04.08.2011

would you take to your dream place?” The probe method encouraged participants to self-document in both visual and written ways.

This study used an approach similar to that of the originators of the probe concept. The approach was reminiscent of what designers do at the ‘concept’ stage of design, where the focus is open and “the challenge consists in finding new ideas rather than dealing with present Figures 4.04 - 4.05 (right) Physical Cultural Probe Packs Mailed To Ten Participants The pack contained various items to participate in the filling out of daily diary in a number of ways. A Camera was not included in the pack due to financial constraints but was a suggested tool to aid respondents in answering some of the extra questions.

problems and solutions” (Mattelmaki, 2006 p. 42).

The purpose of cultural probing in the context of this study was to explore the impact of personal computing and new technologies on the individual computer user. As well, it investigated home and work organizational habits and different notions of what the notion of organization implied and what the term ‘desktop’ meant to the user. The questions were purposefully abstract and encouraged a reflective process. The pack was sent both as a physical package mailed to ten people, and an electronic version e-mailed (including just the diary book and emoticons) that was sent to an additional thirty-five individuals, with a return response of 57%. As a follow up, each of the probe participants was also sent a 20-question survey, where most answers were short (e.g., either ‘yes’ or ‘no’) or check boxes. The questionnaire had an 80% return, with good results.

The use of the cultural probe pack with accompanying diary provided a collection of writings, drawings and images that gave a rich, deep, and personal breadth of information. It allowed the researcher to observe directly into the home of individuals and thereby to generate an intimate portrait, gain user-empathy and develop themes and currents that were later incorporated into the design project. As Mattelmaki (2006) suggests, the real “strength of the material is that it projects a vivid Copyright 2010, by C. Ellicott.


50

51

Methods and Methodology « Towards a New Conceptual Framework

image, offering a contact surface for designer associations and

as open as the probes. As well, perhaps because the questions appeared

empathies” (p. 62).

quicker and easier to answer, the respondent return rate was higher than

Thesis by: C. Ellicott, 04.08.2011

BBH (Bartle Bogle Hegarty) With a name like BBH, one can guess

the probe return rate. However, the survey questionnaire responses

that it is a company of British decent, especially with one of the founders having the title “Sir” preceding his name, Sir John Hegarty. This

Another very important strength of cultural probing is that sometimes the

did not provide much richness or personal detail. While surveys are

findings allow researchers to gain a pre-emptive understanding of design

useful for sourcing data to visualize, they provide little intimacy and

advertising Agency since 1982

issues before they are even articulated by the respondents. Mattelmaki

detail, elements that are required in strong user-centered design. Brace

boundaries. Source adapted from

(2006) underscores this by pointing out that “probes can demarcate fields

(2004) contends that “one of the consequences of the remoteness

of design solutions in the design space before the problem is known and

between researcher and respondent is the difficulty that the structured

produce reportable results for directing the definition of the design

questionnaires have in eliciting creative responses” (p. 5).

company has been a notable London producing “edgy” work that pushes Wikipedia: The Free Encyclopedia.

problem and the decision making about it” (p. 63). Sketches, Figures and Data Visualization: Nevertheless, and despite the many benefits of this method, there were

Through the use of sketches, figures and data visualization, a quicker and

some disadvantages as well. The problem with using the empathic probe

more effective method for reviewing data is created for a reflective process.

method was its subjective nature, which made it difficult to draw general conclusions. As well, this method can be time-consuming and onerous,

Figures and Data Visualization

both for the design researcher and for the respondents. Some participants

One of the older and more prolific designers of data visualization,

perceived the probes as an invasive approach to questioning and collecting

Manuel Lima from BBH (once known as Bartle Bogle Hegarty), published

data, with a few not wanting to participate for that reason and others

a manifesto after he spoke at Kingly Street, London, Eng. in 2009. One of

adopting pseudonyms.

his main points in the manifesto is that “Form Follows Revelation”, stating that “a core ability of Information Visualization is to translate information

Questionnaire Survey

into knowledge. It’s also to facilitate understanding and aid cognition...

A follow-up survey with semi-structured questioning was e-mailed

the purpose should always be centered on explanation and unveiling,

(see Appendix B for full questionnaire) to all probe participants. The

which in turn leads to discovery and insight” (Lima, 2009, “Form Follows

follow-up survey questions were formulated by the probe pack returns.

Revelation”) Figure 4.06 shows a rough visualization of Cloud services.

The probe pack dealt mainly with environmental and organizational aspects, whereas the survey questions dealt with personal computing

By abstracting data in a new format, in this case from a book written

and technology issues. The advantages of the survey were that it was

on the top 100 Cloud services, the final visualization can re-contextualize

much easier to administer and the information was more focused.

the original information and create unforeseeable patterns that lead to

The questions, designed to fill in gaps, were more structured and not

discovery. This was a method of analyzing data from the probes as well as from contextual search and review.


52

Methods and Methodology « Towards a New Conceptual Framework

53

Thesis by: C. Ellicott, 04.08.2011

Sketches Sketching was another method used to clarify issues and ideas in the research process. It captured and distilled concepts for project ideas and fleshed out possible scenarios for the design proposal. Sketching ‘awakens’ ideas stored away from the front of the mind and therefore serves as one of the first steps of a reflective and iterative process. By visualizing ideas, one is able to see them, communicate or present them, and critique them to generate new perspectives. This then gives way either to further refinements or abandonment of an idea, thus strengthening and directing the creative process.

Similarly, Oldach (1995) underlines the importance of doodling as being not only therapeutic but the best way to generate many unique ideas quickly. While allowing the mind to wander into new and uncharted territory, sketching generates more ideas because, not being a “precise technique”, it “leaves room for interpretation” (p. 76). Furthermore, sketching frees up a designer’s time by not having to commit to an idea before it is fully fleshed out. It also precludes the potential wasting of valuable time that results from taking an idea into software and refining it before it is ready.

Figure 4.06 Data Visualization of Cloud Apps Some of the more popular consumer Cloud Apps (Buckley, 2010) are shown here. A gap observed is that there isn’t much in the way of graphic applications, for the home enthusiast graphic designer, besides a light version of Photoshop called Photoshop Express. Perhaps, this is because the heftiness of the applications and their files are hard on processing power and bandwidth, so would show them off in a bad light by being sluggish. Another aspect missing from this Figure/selection of Apps is a way to manage all the new Apps flooding the marketplace. Data synchronizing seems to be in it’s infancy with only a few Apps doing it, and a very small portion of it.


54

Methods and Methodology ÂŤ Towards a New Conceptual Framework

55

Thesis by: C. Ellicott, 04.08.2011

Figure 4.07 Sketch Of A Central Way To Manage All Ones Data–Called A Digital Husk The digital essence of someone visualized as an external product as well as software allowing people to get closer to their data by using their body as an interface to activate

Figure 4.08 Sketches Of The Initial Interface Design For The Control Panel System A system that works as master, slave and partner with current operating systems, that unites all ones data, and is the digital essence of an

and interact with it. Copyright 2010,

by C. Ellicott.

by C. Ellicott.

individual online. Copyright 2010,


56

Methods and Methodology ÂŤ Towards a New Conceptual Framework

57

Summary: By blending the broader brushstrokes of the contextual search and review, history and theory are enlivened with the more granular detail of design data obtained from the probes and other user-centered methods. Moreover, these methods involved the individual in the design and research process, which created research results that were more realistic than theoretical. Based on what has been learned from employing Action Research methodology and design research methods while exploring the impact of personal computing technology on the individual, the specific needs of the individual and advancements in technology which can be used to inform the design proposal.

05 Reflection and Analysis of Data and Design Experiment


58

59

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

Introduction

recognized trend. It is being adopted en-masse because the Cloud’s

Reflection was a key tool in conceptualizing a framework to assess the

perceived positive benefits outweigh its negatives. The positive benefits

impact of the recent technological changes on personal computing. In

include enhanced ability to socialize, location-independence, convenience,

order to move forward, reflecting on the past is crucial, as it shows where

and ease of use, while its negative aspects are that it robs people of

personal computing has been. From this historical perspective, we can

time, exposes private information, is prone to technical glitches, and

then extrapolate and begin to envision where personal computing may

lacks security.

be going. Reflecting on the needs expressed by the participants contributes to this process. Thackara underscores the need for reflection, suggesting that it leads us “to do things differently…to perceive things differently. In discussing where we want to be, breakthrough ideas often come when people look at the world through a fresh lens” (Thackara, 2005 p. 6). The cross-section of Canadians represented in this study allowed intimate insight into their lives and activities, thus providing the recommended “fresh lens”.

69%

of all internet users have used one of the web-based software applications; Cloud services here

5%

pay for online storage

Labels such as the Information Age, the Digital Revolution, Modernism 2.0 (Bourriard), and the Third-Machine Age (Dunne) have been applied to the past two or more decades of technological changes. Seeking to

7%

store their videos online

40% of internet users having used at least two of the listed Cloud services

56%

29%

use Apps like Google docs or Photoshop express

34% store their photos online

5%

use Back up services online

use webmail services: Hotmail, Gmail, or Yahoo! mail

apply a label not only recognizes that a shift is taking place but also suggests the nuance of the shift as well as the era’s breadth and depth of change. The advent of cloud computing could introduce yet another paradigm shift in personal computing or, as several Cloud enthusiasts purport, may even mark a whole new era.

What is worth noting here is that, as people use more and more online services, with data scattered across multiple devices (on an average

Jonney Shih of Asustek Computers (ASUS), one such enthusiast, was

of three to six) and with more data being acquired and created daily,

asked what he felt the trend of this new year would be. He predicted a

Cloud computing may be able to harness this technology to help control

shift to a new era: “the past 30 years was the personal computing era.

scattering and data-overload. Data gleaned from the probe packs

The next stage is in personal cloud computing” (Shih cited in Nystedt,

underscores this need to simplify the complex and centralize the

2011, para 7). The question of whether or not we are entering a new era

fragmented. The computer, while undoubtedly a boon to productivity

is not as important as the fact that cloud computing is now a major

across personal, professional and industrial uses, has also added a

Thesis by: C. Ellicott, 04.08.2011

Figure 5.01 Cloud Computing Activites Being Heavily Adopted in U.S.A. This list is not meant to include all cloud computing activities but just to show a representation of some of the Cloud services people are using and to what degree. According to the paper this data is based on a survey of “2,251 adults between April 8, 2008 and May 11, 2008. Some 1,553 respondents in the survey were internet users” (Horrigan, 2008, p. 2). Source: Adapted from “Use Of Cloud Computing Applications and Services”, by J. Horrigan , 2008, Pew Internet & American Life Project of the Pew Research Center, pp. 1-2. Retreived from: http://computinginthecloud.files.wordpress.com/2008/09/ pip_cloudmemo.pdf


60

61

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

further burden to people’s lives as the technology, by its very nature,

cultural). However, one might argue that the socioeconomic status

prompts users to stay abreast of the latest models, programs and

of the group was not diverse, as all participants could afford several

applications. As well, it imposes space and location limitations on users

computing devices and online access. Of the final respondents, there

that the Cloud promises to overcome by offering ubiquitous access to

were 10 men and 11 women. The group ranged in age from 25 to 63 years.

people’s personal data, the ability to synchronize data between devices,

It would have been more diverse if some younger respondents had taken

and software to use the data.

part as initially had agreed to. (see Figure 5.06 for final group breakdown)

Thesis by: C. Ellicott, 04.08.2011

There was a good selection of occupations throughout the group that There are aspects of the Cloud which may be worth leveraging in order

included, amongst others, students, social workers, computer programmers,

to help create a system that would synchronize and address the fragmen-

designers, and a veterinarian, although it may have been a bit skewed in

tation of personal computing. Moreover, as people have either knowingly

that there were five graphic designers and three students. Moreover,

or unknowingly already dabbled in cloud computing (through web-based

trades people and other workers that normally would not use computers

e-mail services like Hotmail and Yahoo mail and social media sites such

during work hours (such as general labourers) were not represented at all.

Figure 5.02 Proposed Probe Participant Group In the end the full anticipated focus group did not participate leaving out teenagers as a core audience and an audience not anticipated were those of a low economic status which would be two groups worthy of further research. Copyright 2010, by C. Ellicott.

as Facebook, Twitter and My Space), it may require little effort to adapt.

Despite the Cloud’s many benefits, there are still some outstanding questions and concerns that need to be addressed. For instance, will personal computer users want to be dependent on a business in the Demographic A way to stereotype and grouping people through characteristics such as gender, age, race, income,

Cloud? Will they want to be perpetually at the mercy of wifi availability to access their data? Is the alternative (i.e., a hybrid model of computing) a more reasonable solution? Do people want pay-as-you-go online

disabilities, education, home ownership, employment status,

services? And if the computer is just a ‘necessary evil’, how will another

location, and mobility (commute time, number of cars etc.) Its a non-emotional engagement with the populace. Generational Cohorts Are groups of individuals who go through a major shift in life together during the same period of time. They share a common historical experience like the baby boomers. A boom only they could know and experience.

service make it any better? These are some of the questions the probes attempted to answer.

THE chosen sample group The majority of the sample group consisted of thirty-one hand-picked

Teenager

friends and family members. The aim was to have a wide demographic sampling that included a diversity of genders, ages, cultures, marital statuses and generational cohorts, and who were all computer-using

Above sources adapted from Wikipedia: The Free Encyclopedia.

VARYING DEMOGRAPHICS

Canadians (Canadians being defined as residing in Canada and multi-

VARYING PSYCHOGRAPHICS

VARYING PROFESSIONS

VARYING COMPUTING NEEDS & SKILLS

Parent Gaming Single Designers Baby Boomer Male Gen X Work Hetrosexual Pleasure Social Worker Nuclear Family Millennial Female Gen Y Entrepreneur Artist Veterinanrian Carpenter Communication French Single DINKS Young Family 37 yrs 14 yrs Teacher 42 yrs Adult Couples Entertainment Data Processing Hard core User 25 yrs Dot Coms Chinese English Graphic Designers 62 yrs Business Owner 51 yrs Computer Specialist 35 yrs Trades Canadians Title-Searcher Homosexual Self proclaimed Ludite Middle Class


62

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

Design of Cultural Probes and Questionnaire As mentioned previously, cultural probes helped to situate this research

63

Thesis by: C. Ellicott, 04.08.2011

Figure 5.04 Probe Pack Booklet/Diary pp. 9-10 Copyright 2010, by C. Ellicott.

in “social practice” and to create a human-centered focus, allowing for greater empathy with the end user. According to Steen’s (2003) research on human centered approaches, “one can argue that if one focuses on 10% of a person, then one can only create and capture 10% of the potential value” (p. 2). Although this may seem obvious, many a design has been completed in the total absence of the individual, while other methods focus only on particular aspects, as Steen suggested. The ability to focus on the whole living breathing person with a full range of emotions allows for an empathetic understanding and is likely to reveal more possibilities and result in better value. The intent for creating the cultural probes was to gain an intimate and empathetic knowledge of personal computer users beyond just the use of their devices.

Figure 5.03 Some Example Spreads From The Probe Pack Booklet/Diary, pp. 7-8 These images are the actual pages taken from the probe pack booklet Copyright 2010, by C. Ellicott.

Figure 5.05 Probe Pack Booklet/Diary pp. 13-14 Copyright 2010, by C. Ellicott.


64

65

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

Figure 5.06 Actual Probe Participant and Questionnaire Group Demographics

Mattelmaki (2006) states: “People are not necessarily capable of

Copyright 2010, by C. Ellicott.

demanding improvements or imagining possible futures” (p. 33). Sanders

11

10

(2001) shares a similar viewpoint about the power of probes, suggesting they bring out issues that cannot be seen or revealed through observation or in an interview setup: “Discovering what people know helps us to communicate with them. Understanding what they feel gives us the ability to empathize with them” (p. 3).

Cultural Probe Packs

Profession: Business Owner

Title-Searcher

Business—Sponsorhip

Profession:

Producer

While a 57% return rate is considered high, many of the probe packs

Developer Graphic Designer

Social Worker

Divorced/Separated

Optical Technologist

Student

were not fully filled out. Moreover, the efforts made to answer the

Veterinarian Married

Couples

Single

questions and maintain the five-day diary were, on the whole, uneven.

Have Children

Two of the richest results were probe packs that had been physically Age:

- 20yrs

21yrs -30yrs

31yrs-40yrs

41yrs-50yrs

51yrs-60yrs

mailed out to the respondents. Only those two respondents fully utilized

61yrs +

the extra drawing materials provided (e.g., coloured paper and pencils, glue, scissors, emoticon stickers, square and circular coloured stickers, Printer/Scanner

TV/Stereo

Full DVD’s

USB

Landline Video/Camera MP3

Smartphone

Tablet

Laptop/Netbook

Desktop

Game Console

Ownership:

Hard Drive

etc). Completion of the five-day diary was generally minimal and cursory; in some of cases, it was not done at all. Several participants wrote an initial detailed diary entry then became progressively less committed to writing complete entries for the remaining days. The tendency was to answer the extra questions, literally but briefly, without much elaboration

Computing for:

5-10 yrs

11-15yrs

16-20yrs

21-25yrs

26+yrs

or creativity. Forty-seven percent of respondents provided photographic records of their physical collections, which they currently manage, organize and store in their homes.

Adoption of new technologies:

Early Adopters//Early Majority

Late Majority// Laggards

On the whole, the lack of responses was reportedly due to repetition in the questions, which could be blamed on the actual design of the probes themselves. When the probe was being created, it was given to a few 4

4

7

6

students to obtain feedback on the quality of questions as well as their attitude toward the workload involved. The consensus was that the packs

Thesis by: C. Ellicott, 04.08.2011


66

67

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

were too time-consuming and intrusive. The pack was then simplified and paired down to a diary and a handful of questions. However, the general feedback from the study was that it was still too time-consuming. Moreover, due perhaps to the level of intimacy it required, two participants used a pseudonym. Nevertheless, to ensure confidentiality,

We are interpreters—not merely

pseudonyms were used for all participants featured in the thesis.

translators between sender and receiver. What we say

The cultural probe pack did not prove as fertile in gathering results as did the European packs, judging from Mattelmaki’s (2006) samples in

and how we say it makes a

her book Design Probes. One might blame the openness or perceived

difference. If we want to speak

intrusiveness of the questions, the five-day diary workload, or the

to people, we need to know

overall workload involved in completing the probes. The lack of detailed responses may also simply have been a cultural phenomenon.

their language. In order to

The precise reason for the probes’ lack of robust response is difficult

design for understanding, we

to pinpoint, especially since the probe method worked well in Europe,

need to understand design.

where it originated in the 1990s. Perhaps Canadians nowadays do not have the time or the desire or take open-ended questions or diary entries seriously? Nevertheless, even though the data was not fully completed, the probes, together with the subsequent questionnaire, did provide a rich, interesting and insightful data resource.

The main thrust of the probe was to gather information about how people organize, categorize and retrieve physical things in their life, such as clothing, sports equipment, kitchen wares, home office supplies, music and videos. The probe also aimed to gain a better understanding of the role of computing devices in the participants’ lives, and to see just how integrated and important these devices were to their daily activities (e.g., how many hours were spent computing compared to other activities). The transition from the physical to the virtual realm is greatly affecting people’s relationships with objects; thus, understanding how people

— Erik Spiekermann

Thesis by: C. Ellicott, 04.08.2011


68

69

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

interact with their personal physical domain might foster new ideas

The final categories were identified as pattern, commonalities,

and knowledge about people’s digital habits and behaviours. In some

exceptions, emotional response and strong themes. These categories

cases, additional follow-up e-mails or conversations helped to clarify

were mainly derived from questions proposed in the probe. During

the respondents’ probe content and also helped in drawing down

the reading of the raw data, other questions arose which were then

characteristics from the probes to use in the design project.

voiced through personal correspondence and through the subsequent questionnaire sent out to the responding group.

THE E-MAILED QUESTIONNAIRE The questionnaire acted as a complementary piece to the probe pack

Analysis of the probe returns required a certain amount of creativity

to better understand the role of digital devices and computing in the

compared to the questionnaire analysis, as the latter was more straight-

participants’ personal lives. This highlighted the importance of people’s

forward in its results. To be true to the voice of the participants, the

devices to them, the pros and cons of having these devices, and their

analyst had to be empathetic in order to read between the lines

usage and function to the user. General computing habits, online habits,

or to hear what was not being explicitly stated by the respondents.

learning mode preferences, and attitudes towards software purchasing

For instance, that the respondents were not able to finish their probes

were examined, as well as people’s general knowledge of and attitudes

and had brief and hurried hand-scratched responses might have been

towards apps, organization, privacy, and security. Reservations about

an indication that the respondents were overly busy. Further, why the

|the technology and usage of the Cloud concept were also investigated.

respondents who originally agreed to participate withdrew when they actually saw the probe would have been worth further investigation.

INTERPRETING THE RESULTS Mattelmaki (2006) stated that the difficulty and complexity of interpret-

Some interpretations of the probe packs relied less on what was said

ing the probe data was one of the more challenging aspects of the probe

and more on what was not said. Also, in some cases, how respondents

format, a standpoint that was confirmed by this present study. Open

physically filled out the packs provided rich information in itself. The

questions led to difficulties in quantifying data; indeed, the data was so

findings offered insights into people’s usage patterns or affirmed the

diverse, that decisions for classification could not take place until the

researcher’s initial suppositions regarding shifts the individual is experiencing

process of summarization. Instead of fitting the probe materials into

due to personal computer use in their everyday lives. As well, the probe

pre-determined categories, the probe format forced the researcher to

results revealed clues as to how design might forge a new approach in

let the probe materials give voice to the data and to be more open to

a changing digital landscape.

chance findings. This proved to be an illuminating but a daunting process, as it required a relinquishing of control (to a degree) over the data.

Thesis by: C. Ellicott, 04.08.2011


70

71

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

FINDINGS AND ANALYSIS

findings suggested that the respondents’ lives were generally filled with

While the main thrust of the probe pack data was examining people’s

thousands of objects both physical and virtual that needed to be continually

personal collections, the questionnaire went further into the management

organized and managed.

of digital assets. What the findings suggested is that people are managing many types of collections in their personal lives, some without even

The responses also suggested that the downside of managing collections

knowing to what extent. Gene (personal communication, Dec.04, 2010),

on and offline was having little time to manage them adequately, as well

one of the respondents, writes: “I don’t think of myself as a collector, but

as a lack of interest in doing so. This lack of time and interest tended to

after working through this paper for you and contemplating things,

be the overriding message with most of the probe respondents regarding

I [realize I] am a bit more of one than I thought, [though] perhaps not

the quality of managing things. For instance, while Jay (personal

of stuff that others would consider ‘a collection’.”

communication, Jan.06, 2011) enjoyed organizing his own belongings (particularly if it involved a new project), he nevertheless conceded that

From the physical to the digital, collections were many and varied.

“[o]rganization is work if it is someone else’s stuff or my own old stuff.”

The contextual search and review suggested this would be the case and,

This preference for organizing one’s own newly-acquired belongings

further, that little is known about how individuals manage their digital

was mentioned by both male and female participants across generations.

information other than that they are diverse at every point of a digital information cycle (Williams et al., 2009). A digital information cycle is

In the probe responses, the theme of time emerged as a major factor,

the management of electronic files which can be fit into three categories:

as did the willingness to spend the time needed to make collections

1. seeking or acquiring information;

more manageable. Time spent organizing versus time spent enjoying

2. passively receiving and collecting; and

one’s life or getting things done always had to be weighed. As Sara

3. creation, producing digital data oneself.

(personal communication, Jan. 8, 2011) so aptly put it: “I can be extremely

(Williams et al., 2009, p. 348).

organized but choose to get more done, which leaves less time to be organized”. Nana (personal communication, Jan.04, 2011) also

Some of the respondents’ more notable collections were of things such

addressed the issue of balance: “I’m not very organized. I try sometimes

as books, music and videos. There were also collections of everyday

but it doesn’t last very long…. Part of the reason is laziness, but I also

items such as clothing, shoes, purses, jewelry, spices and kitchen wares,

feel like there are more important things in life.”

as well as collections of items that pertain to hobbies or leisure activities, like journals, sporting goods, crafting artifacts, art, and rocks. Finally,

The respondents’ attitude towards disorganization was usually governed

there were also the hard-to-define sentimental collections that involved

by negative aspects. Not wanting the extra stress or anxiety or the

personal mementos such as a baby’s lock of hair or a ‘lucky’ coin. The

frustration of wasting time looking for things was what kept most people fairly well organized. Even Nana admitted she felt better and had a more

Thesis by: C. Ellicott, 04.08.2011


72 Figures 5.07 (left) Digital Filing System of Ray The following images are participants interpretations of how their digital filing systems. They appear to be just as varied as their physical filing and organizing systems. As well, how people like to view and customize their filing systems is also very unique from person to person. The image right shows the allocation of data and its parts on one of Ray’s computer hard drives.

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

positive attitude if she had a clean desk or environment, but this was not always possible when sharing a space. Patrick (personal communication, Dec.04, 2011), explained that he keeps organized “so as not to be caught with my pants down in a disorganized fashion.” Mia (personal communication, Dec.07, 2011), wrote: “I don’t think a messy desk is a sign of a messy mind. It’s just a product of a lack of storage/workable space in a critical zone of the house. It makes me stressed when I’m in a rush and I need to find my keys.” The interesting thing about computers is that there tends not to be a space issue for the most part; one can buy another hard |drive or rent some cloud space. Perhaps this is why respondents tended to be tidier in their digital lives then they were in their physical ones.

On the whole, most respondents felt they were fairly well organized. Nonetheless, some, like Ron (personal communication, Jan.07, 2011), suggested they could do better: “I am definitely feeling like I need to develop a new form of file organization in the near future... for work/ design/inspiration/personal projects... all that stuff.” Ron’s response was related to digital organization, and the probe data suggested that people tend to be more organized on their computers than they are in real life. One respondent, Ace (personal communication, Jan.11, 2011), liked both his “physical and digital objects” to be well organized, and so put “boxes within boxes, everything with a place”. Ace also admitted that, in the digital environment, he can be “OCD-ish” about his files: “Ideally, I would have a five-terabyte hard drive to hold ALL my files on and would be even more streamlined and organized.”

Ace may not be the only one becoming “OCD-ish” about files. Digital Obsessive Compulsive Disorder (OCD) is emerging as a new phenomenon, as confirmed in a recent article by TIME’s Joel Stein, who writes that, as we are “constantly confronting the onslaught of information, our brains

73

Thesis by: C. Ellicott, 04.08.2011


74 Figure 5.08 Digital Filing System of Shawn Shawn has a special shareware app that allows him to write to-do lists on his desktop. He has also has devised a set of meta symbols to aid in quicker communication to and for himself. His desktop acts as a “hot” space for things of utmost importance or that need to be done relatively quickly.

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

75

Thesis by: C. Ellicott, 04.08.2011


76 Figure 5.09 Digital Filing System of Mario Mario doesn’t like using the operating systems pre-made folders, but keeps his files and folders in the top level directory, naming them appropriate for him but obscurely for an onlooker.

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

77

Thesis by: C. Ellicott, 04.08.2011

Figure 5.10 Digital Filing System of Ace’s iPod There is no real filing structure on an iPod that people can see, other than organizing which screen apps are on, or making folders. The creative part, the files, are not in an accessible file structure unless the iPhone is jailbroken the device and get an app that allows you to see the obscure filing structure says Ace.

Figure 5.11 Digital Filing System of Sara To view her files she uses the newer OSX Viewing style calle “cover flow” derivative from Apples iTunes


78 Figure 5.13 Digital Filing System of Jay These folders are created by a developer. In their group, these folder names and ordering would actually make quite a bit of sense.

79

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

Figure 5.14 Ace’s Digital Collection Manifested As A Physical Collection This image represents the amount of space roughly that it would take to own and keep the physical items which Ace has a digital Items various on drives. Perhaps people aren’t going with less is more, perhaps they’re collections are just being converted to virtual ones.

Space of Physical Items Space of Digital Drives Space of Physical Items Space of Digital Drives

Copyright 2010 by C. Ellicott.

2.5 TB Digital Drives Ebooks/comics: 1000 -2000 files 2.5 TB Digital Drives = 20 GB(approx.) Ebooks/comics: 1000 -2000 files = 20 GB(approx.)

Photos/Images: 100’s files = 4-5 GB(approx.) Photos/Images: 100’s files = 4-5 GB(approx.)

Music: 1000 Cds = 70 GB(approx.) Music: 1000 Cds = 70 GB(approx.)

Video Collection: 1200 to 2400 Movies = 2 Terabytes (approx.) Video Collection: 1200 to 2400 Movies = 2 Terabytes (approx.)

Text files: 100 files = 50MB Text files: 100 files = 50MB


80

81

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

are trying to make patterns out of the randomness” (2010, para 2). Digital

This tendency seems to cross over into the digital realm as well, with

OCD can refer to how individuals constantly tag MP3s and Delicious

participants like Shawn leaving his to do lists on his desktop and Nana

bookmarks, or meticulously create music, video, photo inventories and

putting files to be sorted in an “organize folder” on her desktop. Shawn

folders, or sort and resort e-mail and Facebook inboxes. Struggling to

and Nana used the desktop as a HOT spot or, like the previous respon-

stay digitally neat is not uncommon and can bring just as much stress

dents, as a place of close proximity to remind them daily to do things.

and anxiety as physical cleaning; however, digital cleaning gives people

Sandy left e-mails in her inbox until they were dealt with and then filed

the satisfaction of cleaning without the unpleasant feeling of getting

them, while Vicky e-mailed “to do” lists to herself. As Williams et al.

up from their chairs (Stein, 2010). This could explain why some of the

(2008) suggested, document management is strongly related to

participants admit that they are tidier in their digital lives than their

“task management”, and involves using tags or labels such as “hot”

physical lives. The feelings of stress and anxiety affect people in their

(documents currently being worked on), “warm” (documents that may

use of both physical and virtual environments, but the digital environment

be worked on) and “cold” (documents that are no longer being used).

may be easier to rectify simply because it demands less of a physical investment.

Although the participants may have felt more or less organized, their filing systems were highly personal and subjective. Home users tended not to

Memory, Filing and Subjectivity.

employ the formal organizational methods used by large institutions.

An important part of filing, organizing and managing personal collections

As Patrick (personal communication, Dec.04, 2010) admitted, “I am fairly

is relying on memory for short-term and intermediate retention decisions.

organized, though I wouldn’t expect anyone else to jump into my world

The problem with utilizing one’s memory is that only so much can be

and understand.” Interpreting respondents’ screen grabs of their computer

retained, so people try to mitigate the lack of neural storage space

filing systems showed just how subjective and personal filing could really

through logic and trickery. For example, one respondent (Drew, personal

be. Likewise, Jay (personal communication, Jan.17, 2011) explained his

communication, Dec.16, 2010) wrote that he kept his “most important

basic file structure and suggested a possible improvement for the

tools in his truck, things like basic hand tools, wrenches, scissors, while the

Operating System Structure:

bigger stuff, like chain saws, jigsaws, etc. [he kept] in the barn.” Emily

I start with broad categories and gradually break those down into

(personal communication, Dec.16, 2010) put her most urgent papers next

smaller and smaller sub categories as I move up the directory

to her keyboard to keep them at the forefront of her mind, while another

structure. It would be nice if there was a file system that let you

respondent left her keys, iPhone and other must-haves for the next day on

organize files like you can organize music in your iTunes collection

a natural path out of the house, thus acting as a reminder. In both cases,

[so] you can find items based on their associations (e.g., on this

proximity was a factor in their filing, as was leaving articles in logical

album, or rock music, or written by this person) rather than just

places or in places they would frequent often.

remembering approximately where you stored it or what it was called.

Thesis by: C. Ellicott, 04.08.2011


82

83 Another pertinent example of how subjective filing can be and how knowledge affects the way one files is the organizational system employed in carrying out this research. At the beginning, keyword tags in Delicious tended to be quite broad as the topic was not yet fully defined. However, as the knowledge base developed, tags became more specific and refined, thus creating a need to re-file, re-tag and re-shuffle the earlier bookmarks so they would “fit” better. As most people do not use a formal filing system, most filing is done by memory, proximity and subjective classification. Therefore, if a control panel system were to be devised, a filing system as Jay suggests would perhaps be advantageous.

Downsizing the Physical and Up sizing the Digital Both in the physical and virtual domains, people have acquired numerous files, objects and artifacts, which are starting to overwhelm them. As Sandy lamented, once the job was only “to clean the house; now it’s to clean the hard drive. Just more and more stuff to maintain.” The trend towards downsizing one’s physical possessions in order to have greater manageability was also a common theme amongst several generations of the probe respondents, reflecting Rifkin’s (2000) contention that the protean generation believes in a world of less stuff but “more-access”. The probe data also underscores this ‘less-is-more’ approach to life. Probe respondent Ron (personal communication, Jan. 7, 2011) explained: I feel that I had a very rich experience of owning way more stuff than I needed, and later in life have found myself in more than enough instances where I had to sort through and throw away the excessive amount of possessions that were creating unwanted clutter.

In this regard, Ron and other respondents voiced similar sentiments. One could therefore suggest that the attraction to digital media might hypothetically be a way for people to own their “stuff” or experiences

Thesis by: C. Ellicott, 04.08.2011

Figure 5.15 Thesis Poster Image: Virtualizaion of the Desktop (left) The image used here was from the thesis poster. The imagery represents the shift in the personal computing environment where an abstraction is taking place, a move from the physical to virtual, or the desktop to Cloudtop. Copyright 2010 by C. Ellicott. & A. Serghiuta


84

85

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

without the visual clutter. However, the ugliness of some computer

the future. From the results, it seems that even with the Kindle and

systems with all their cabling can be a real “aesthetic turn off”, as one

iPad, books are the final frontier for digital conversion in the home.

respondent put it. To counteract this, she keeps her computer facing the

Respondents indicate that they are creating virtual collections and

wall and not in a highly trafficked area of the house. The average respondent

data all the time, all the while being inundated with more communication

had one or two computers, a smartphone, a USB flash drive, an mp3

then ever before.

player, a digital camera, a scanner and printer, a television, and a DVD player, with many of the respondents having specific uses for each

In terms of fragmentation, there are many virtual places where individuals

device. The questionnaire showed that more and more of people’s

can store their data. These options include social Networks sites like

collections are becoming virtual, especially in obvious areas like music,

Facebook, Twitter, YouTube and Flickr as well as webmail services such

photography and DVD video collections. Most respondents no longer

as Gmail and Yahoo. In addition, there are online banks, subscription

buy or use physical CDs, and many do not buy or rent physical movies,

services for magazines, associations, clubs, blogs, data storage sites,

either, but instead use services like NetFlix or Grooveshark for streaming

shareware sites, shopping sites, and so on. Nearly all respondents used

movies and music. Some less common moves into the digital realm were

Facebook, Flickr, or a webmail service like Gmail, but several respondents

sentimental items like old family photos, memorabilia and family trees.

did not realize these were Cloud applications. As one respondent wrote: (Ronda, personal communication, Jan. 12, 2011) “I hadn’t realized I was

All the respondents asserted that their usage and dependence on

already part of the cloud revolution for the past 10 years, with all my

computing devices had increased, particularly with regards to those

business and personal e-mail addresses on Yahoo.” To securely access

devices that were mobile. Personal computing now encompassed many

their various online accounts, participants had between 3 and 30 passwords.

activities that once were divided amongst many physical objects and places. For instance, where once people went to a physical bank, now

While not directly stated in the probes, a sense of fragmentation was

every respondent did their banking online; where once people had a

implied. This was caused by moving from device to device (e.g., from

TV in a TV room, now many of the participants stated they watched

computer to smart phone) and connecting to various online services,

it on their computer or one of their mobile devices (e.g., iPhone, iPod,

all housing different or similar data. Fragmentation as a hidden theme

iPad, Nook, etc.).

was further emphasized in that a number of the participants felt compelled to work in a fragmented way with many screens open at

As indicated earlier, most of the participants wanted fewer items to

one time, constantly cycling through and checking each one. (Bob

contend with. One participant, (Ace personal communication, Jan. 4,

Personal communication, Jan. 7, 2011) wrote: “Right now, I have seven

2011) a self-described “bookie”, stated that he loves books but rarely

programs open and ten tabs open in two browsers.” Similarly, while filling

wants to buy them any more, and may likely move to digital books in

out their probes, Ray had 20 to 40 windows open and Mia had 20 to 30. Fragmentation also infiltrated the participants’ hectic daily lives as there

Thesis by: C. Ellicott, 04.08.2011


86

Holiday Lighting Change of environment Comfort Noise Office is to work oriented Change scenery Leisure vs work

$0 - $750.00

Ownership Privacy/Security Behaviours altered Brain altered

87

Reflection and Analysis of Data and Design Experiment ÂŤ Towards a New Conceptual Framework

Stress

Why?

6-16 hours per day Daily hours ON

$$ Apps

Concerns

Computer/Life Integration

Back up Faulty Equipment Access Theft Breakage Biz goes down Power failure Battery failure Trust issues

Online Social Networks

Awkward

Drive

DVD

Archiving

Cloud

Digital

Onboard Smartphone

Only Creation

Onboard Devices

Photos Video Music Games

Patterns Classification

Physical

Food

Hoarding

House with technology Outside NO technology

Bring Work Home

Space Restrictions No Dewey Decimal Sys. Alphabetic

Organisation Messy Feelings

Clothing

Scanner Digital Pens Photo Camera Video Camera

Online Files

Dream Place

File: Stuff for Anticipated Need File: Stuff for Future Need File: Stuff for Immediate File: Nostalgia & Heirlooms Sports

Multitasking

iDevices Tablet SmartPhone NetBook Laptop Desktop

Storage & Creation

Many devices

Many files

Photos TV Music Video Games

Onboard External Drives

Many windows

Specialty Apps Crude Very Little Google Docs Mobile Me E-mail Music App

Work/ play blurring

Photos TV Games Music Video

Loss of Mind Laziness Clutter Frustration Stress Content Guilt Organised Anxiety Shit-storm

Time

Peace of mind

Life/Work Balance

Digital Organisation workload

Movie Tools

Why?

Books

Music

Tidy

De-clutter Comfort Memory Happier Create Efficiency & Collect Overwhelmed Stress-free Saves time Efficient Stress-free Proximity Streamlined Aesthetic Leave Clues Empowered Happy Photos Video Leave Notes On the ball Music Art Hot Zone Can handle life Games Illustration Voicemail Reminder Pre-planning E-mail Reminder Documents

Obnoxious features Explicit Interactions

Data Service Areas

Synchronization

Onboard iPod

Personal Collections

A Complexity of Devices & Software

Wifi Hubs

Files Music TV Photos Video

Onboard Computer

Unecessary Steps

Bedroom

Digital Fragmentation VimeoYou Tube Flickr My Space Mobile Me Facebook

Figure 5.16 A visual interpretation of key probe findings This diagram shows some of the major themes the respondents had voiced, with fragmentation, lack of synchronization and complexity as some of the big issues. As well filing habits and management showed a lot of ingenuity and subjectivity.

Undue features

Living Room

Relief Stress Withdrawl Lobotomy Loss Anxiety Feelings Video Frustration without Listening Mobile Solutions Reading Surfing Shopping Administration are Changing Social networking Recipes Watching Computing Work Creative hobby What for? Dictation Online Finances Communication Locations Create Documents

Reliability

Bad Design

Home Office

Personal Collection Management

Classified Groupings

Highly Subjective

Colour Groups

Use Groups Where is it kept

Common Traits

IM Chatting

Fragmentation of Working Habits

Thesis by: C. Ellicott, 04.08.2011

Eating


88

89

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

is no longer a clear divide between work and home. Respondents

for doing her freelance work, depending on the type of assignment and

admitted that, even though they did personal e-mails and checked

her current mood. By moving from the traditional confines of the desk,

Facebook at work, they also took work home more now. Some had

participants were able to shift their perception of their digital devices

work smartphones while others had work laptops, which became

from, for instance, a more work-orientated perception to a leisurely one.

shared home computers, further blurring the divide between work and personal time and space.

From the probe results data, it was observed that the computer was being used for entertainment streaming as well as home and work

Importance of Location to the Home User: Changing the Concept of Desk

computing activities. No longer confined to a TV room, the computing

Once viewed as a location-dependent large physical object, a place to

device enabled entertainment programs to be viewed on a laptop in a

work, a place with personal files and typewriter or computer, the desk

bedroom or on a portable smartphone on the bus. Probe respondent

is currently undergoing a radical change. Findings in the probe packs

Ace (personal communication, Jan.28, 2010) took advantage of this

suggested there is a trend towards computing in more relaxing places

particular accessibility innovation, explaining that “[f]ilm is OK on an

while at home. As Emily (personal communication, Dec. 6, 2010)

iPod, and in specific situations like driving in my car, it’s great. But better

commented, “I like to work on my laptop on my sofa in the lounge so

yet is watching a film on a Nook, and best yet is on a TV. But a TV isn’t

it feels less like work. I have a desk and office at home, but I never work

as mobile as a Nook, which itself isn’t as mobile as an iPod.” Thus, while

in there.” The idea of the desk is taking on different shapes and forms,

environment was important, so was the size and mobility of the devices.

mainly in that it is no longer confined to a physical space. As well, it is evolving to be more than just a workspace—it can be a creative space

Furthermore, with people taking their mobile digital devices with them

or even just a virtual space. In some instances, “desk” is synonymous

into more comfortable surroundings, they were also spending more time

with the computer itself. Nancy referred to her desk as being her laptop.

on them. Highly portable technology such as smartphones, iPods and

Mobile devices coupled with wireless technology are furthering the

tablets can follow people everywhere, and the expectation is that it will.

abstraction of the desk and thus enabling more choice.

A couple of respondents referred to just how ubiquitous computing was by stating that they checked their Facebook on their iPod in bed upon

What was important to some respondents was the ability to choose

waking, read news while using the washroom, sent personal e-mails on

the right environment for the activity. By “right environment”, they meant

their phones at lunch, and used a digital device to check e-mails or

mood-inducing locations and qualities such as room types, lighting and

search the internet while watching TV. This type of behavior was also

atmosphere. Some said that their preferred immediate surroundings

pointed out earlier in the literature. Some of the respondents who owned

even improved their mood and increased their efficiency, but that their

several mobile devices claimed to use their devices the most—upwards

preferences also changed according to the activity and current mood

of sixteen hours per day.

tendency. In this regard, Mia admits to having several zones in the house

Thesis by: C. Ellicott, 04.08.2011


90

91

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

Synchronization

space in the house”. Through her computer, Sandy connected with her

Theoretically, with the technology now available, synchronizing data,

grandchildren, had association meetings from coast to coast, monitored

applications and devices should be easy and seamless, but that is not

stock activity and kept track of health information. Then, at the end of

the case. This frustrating circumstance was articulated by probe respondent

her busy day, she burned off stress with an online game of scrabble.

Ace (personal communication, Jan. 14, 2011), who wrote: “I get frustrated

For participants in general, the core personal computing activities were,

in this day in age when I am working on one computer and need the content

in descending order: e-mailing, surfing, social networking, doing work,

from another, but have to physically get up and take the information off of

listening to music, watching TV/films and for creative work.

Thesis by: C. Ellicott, 04.08.2011

the other machine.” Ace is a Dropbox user. However, the free storage allowance of “2 Gigabytes is not adequate enough room” for all his files.

The relative importance that computers play in the participants’ lives was

As well, Ace said “the mirroring aspect of the application makes it not

made even clearer in their responses to the questions: “What do you do

suitable” for all of his devices. In contrast, virtual storage offers access to

if you lose access to your computer? What do you do if you lose access

centralized personal data, thereby enabling not only location-independent

to the internet?” One respondent simply wrote “worry” (Sara, personal

computing but synchronization as well. With Cloud computing as a data

communication, Jan. 12, 2011) , while another explained he felt “withdrawal

-storing option individuals won’t need to have their, “files and software

and a longing” (Sandy, personal communication, Jan. 12, 2011) for it.

locked into [their] PC’s hard drive [it] will [become] an unnecessary

Respondents who said they would cope if they did not have access to

nuisance” (Carr, 2008, p. 81). Echoing Ace’s and Carr’s sentiments,

their computer or internet “until it was up and running”, clearly had

97% respondents said it would it be useful to have their computers,

not pictured it as being a long-term scenario. This reveals an unspoken

smartphones and digital devices synched so that they would be able

expectation that services like the internet will persist. Gene (personal

to access all their data, photos, external devices, bookmarks, address

communication, Jan. 12, 2011) wrote: “I think it’s changing my behaviour

books, etc.

—I threw out my phone book the other day—realized just how reliant I was on it when our systems at work went down for 2 full days!” There

Early adopters 13.5% Somebody who is always on the cutting-edge when it comes to the latest and greatest advances in technology (and just about

Attitudes on Computing are Mixed

was a strong divide between respondents who embraced technology

everything else). The are respected

The average number of years the probe group used computers was

with all its hiccups and glitches and those who did not. The former group

often role models.

15 years, at an average usage time of 17 hours per week, mainly at home.

was sub-divided into early adopters but mainly early majority. These

Early majority 34%

This exceeds the number of usage hours previously stated in the litera-

two sub-groups owned the most digital devices and used them in

ture (13.5 hours a week). The respondents indicated that their computing

many aspects of their life, thus making them the most prolific users

devices enabled many functions in their lives. Sandy (personal commu-

with regards to number of usage hours daily. This group had a positive

and valued for their opinions,

Somebody who is very deliberate in

nication, Dec.18, 2011) wrote: “the computer centralizes stuff”, from

attitude towards technology, although some still got frustrated by its

work, to home administration, to banking, to communication, to leisure.

limitations and ‘hiccups’. Furthermore, they found upgrades in software

As well, “the desk centers around the computer and is the most used

and hardware easy to do, and adopted new software readily if it satisfied

what they do and buy. Adopting just before the average persona an with the number of this type of person, they re a major link for getting a trend out.


92 Innovators (2.5% of adopters)

93

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

a specific need. In contrast, the second group may be categorized as a

thoughts on privacy and security issues were stressed by many respon-

combination of late majority and laggards. This group viewed the computer

dents across generations and user types. The consensus was that if

as a fact of life but did not want to embrace every new update and

activity continued to move more online, privacy and security issues

gadget. They tended to use the computer less, and get much of their

would become a higher priority. Again, though, a number of respondents

advice (regarding, for instance, computer updates, what to buy, and what

showed apathy towards protecting their identity or data. For instance,

software is free and good) from the early adopters. This was even more

they had been using services like Facebook, Gmail or Online banking for

evident in the fact that this group of respondents did not include any of

some time with no thought to security or privacy issues regarding what

their digital devices as an item they would take to their dream place. For

they already had put online. Jay (personal communication, Jan.11, 2011)

this second group, the computer was seen as “a necessary evil”, and a tool

summarised the subject:

primarily used for work. This attitude was not generation-specific: One of

Online privacy seems to be a constant battle between what people

the oldest respondents had included a computer in her dream place.

know and what others (mainly corporations) are trying to find out

Innovation is for a mere few. Generally, this group are true risk takers and don’t mind failure. They are the people who leap before they look, oh and define a trend without necessarily intending to do so. As they tend to have an enormous network of friends, word gets out fast if people like what they are up to.

Early adopters 13.5% Somebody who is always on the cutting-edge when it comes to the latest and greatest advances in technology (and just about everything else). The are respected and valued for their opinions, often role models.

about them. And what they actually are trying to find out about Early majority 34%

Despite the often extreme differences in their attitudes towards comput-

people, but there’s a lot of misinformation. A good example of this

ing technology, both groups did share an overwhelming feeling that life

would be those wall posts people make every now and then on

was hectic, though the early adopter group seemed less overwhelmed

Facebook about some new feature whose sole aim is to open

trend out.

on the whole. However, when asked, “Would the ability to synchronize

up your information and make you lose your privacy.

Late majority 34%

all your devices to all your data files, images, memories, fonts, music,

Somebody who is very deliberate in what they do and buy. Adopting just before the average persona an with the number of this type of person, they re a major link for getting a

A skeptical bunch, this lot. They are more likely to adopt because of pressure more than anything else.

Laggards 16% Somebody that lags behind. A straggler. In terms of technology,

movies, archives and software through one control panel be useful?”,

He then went on to express his thoughts on security,

the reception was very good, especially from the early adopters. Both

Security is a mixed bag between the things you have to protect

groups very rarely bought software, although the tendency was, on the

yourself and your data—router/firewall, antivirus, etc. if you have a

part of early adopters, to either pirate software or to seek out shareware

PC and the measures you assume the companies you have entrusted

(free software) that solved a particular problem. This group then tended

your data to for storage “in the cloud” have enacted to keep your

to inform and supply the other group with tips and fixes.

data safe there, but in all of these things there’s always a loophole

those who aren’t exactly up to date with the latest gadgets. Like the people who still own Betamax players and think that the Internet is just a fad. Above sources adapted from Grant, A. E., & Meadows, J. H. (2010) p. 43-45

that someone didn’t think of because people are flawed and it’s in Salient Concerns Mentioned About Technology

our nature. So, the best way to be secure online is to be educated

While backing up personal data was a well-voiced concern amongst

and to be careful. If something is too good to be true, it probably is.

many participants, very few took any real action in this area. Some told tales of losing full hard drives of data, which is comparable to being

Echoing Jay’s sentiments, Donovan Colbert, a writer for Tech Republic,

robbed of everything. However, none of the participants did much to

affirmed that a further erosion of privacy is inevitable, with Facebook

address security until theirs had been compromised. Nonetheless,

already claiming that all data posted on their site is their property

Thesis by: C. Ellicott, 04.08.2011


94

95

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

(Colbert, 2010, TecRepublic). All probe respondents were aware

their daily lives, which could be made more implicit with better design.

of Facebook’s policy and, though concerned, still posted content.

For example, cell phones ring even while we are in a movie, or a skype

Is there no incentive to end digital security and privacy apathy?

messages interrupts a presentation. Even alarms will not go off, if they

Thesis by: C. Ellicott, 04.08.2011

Human-Computer Interaction The study of how people interact

are not set. Ju et al. further point out that these are problematic

with computers. Includes both software and hardware, like how they interact with objects displayed on their screens by software, and how they use peripherals like

What was evident was a general and pervasive low level fear amongst

interactions and symptoms of poor design and lack of technological

keyboards, mice, and touch screens.

many probe respondents regarding security and privacy, and whether it

sophistication. The designing of future “implicit interactions”, when

except when you push people’s

is due to misinformation or legitimate concerns, it is an area worth noting

creating human-computer interactions that extend beyond the desktop

nonetheless. For example, once robbers sought out the greatest source

computer into new arenas, will require more sophisticated design

for money; now, hackers do the same, as they seek out and congregate

(Ju et al., 2008, p. 71).

Computers are just like people, buttons and make commands, they usually don’t do what you want them to. Sources adapted from

around the greatest sources of useful information. The more people move online, the more hackers will congregate around and target them.

For instance, if you imagine a car was designed to make decisions for you, the car designer better know “you”, the individual, extremely well.

Sandy (personal communication, Jan.28, 2011) brought up a point

One of the questions asked in the questionnaire was: “If you were to die

about built-in obsolescence, the constant barrage of technologies that

tomorrow, would anyone you know be able to collect and shut down all

have built-in limited life spans or yearly upgrades designed on purpose

your personal data?” The resulting answer across the board was “No”.

by companies to force people to keep buying and upgrading. One would

Some felt this was a concern, some did not know how to deal with it, and

hope the frenzy should be dying down as computers have gotten more

others did not want it to be done. This is an interesting area, as it raises

and more powerful and faster than almost anybody needs for personal

issues of ownership and the question of just what will happen when a

computing. The need now to buy a faster device is not as paramount as

generation of computer users die (i.e., what will happen to all their data

it once was, especially just for word processing and e-mailing. However,

—will it leave a glut of dead or terminal data suspended in cyberspace?).

the concern is whether this frenzy will have a similar affect on the online

Although a fruitful area for discussion and debate, such inquiries are not

world, bringing in new devices and subsequent upgrades as well.

within the scope of this thesis.

What Participants Did Not Say: Reading Between the Lines

Another issue that was not explicitly raised was whether people realized

The barrage of computer technologies, devices and systems are

that they were creating data online without knowing it. Many corporate

demanding increasing amounts of our time and attention (Ju & Leifer,

sites put tracking software on their website so they can track people’s

2008). Yet, with all their capabilities, these devices still need to

movements, actions, pages cached, routes taken, location, etc. A good

be operated by people. Ju et al. (2008) believe that there is a certain

example of this is Facebook. For the sake of this study, such tracking will

level of intrusion and demand that computers place on the user in

be referred to as data trails. Data trails also include information captured

Wikipedia: The Free Encyclopedia.


96

97

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

by online credit card companies, search data, shopping and buying data,

from which several salient issues were raised, the most prominent being

etc. All this data resides somewhere and is being collected as individuals

fragmentation of people’s digital data across a number of devices.

Thesis by: C. Ellicott, 04.08.2011

surf the web. Another issue that arose was the lack of synchronization between data

PROBING TO INFORM THE DESIGN PROPOSAL

and devices, primarily due to the fact that most users’ data were localized

While the use of technology is clearly a complex issue, this does not

on those devices, making it difficult to access. This has become more of

suggest that technology is bad. Indeed, for the most part, the benefits

a problem as the number of activities people use computers for now has

of technology outweigh its negatives. A primary issue identified was just

greatly increased. Indeed, the computer is used in all facets of people’s

how fragmented study participants felt in relation to their devices, their

home lives today, including for work, play, fitness, dining, shopping, finances,

data, and the way they worked. A number of respondents suggested that

entertainment, and so on. This increased usage of computers in the home

a lack of synchronization further accentuated the problem of fragmentation.

environment has led to a dependence on these devices, with some feeling withdrawal symptoms without it.

In acknowledging that technology is a ‘mixed blessing’ and that no technology is perfect, this research has identified problems that make

As people’s digital lives increase, there is a corresponding increase in

for fertile design grounds. As Hillis remarked, the internet’s potential

digital chores for people to do, monitor, manage and organize. Further-

has barely begun to be explored and is still in a “very primitive form”

more, as physical artifacts become virtual artifacts (e.g., answering and

more and more of the important

(Hillis as cited in Brockman, 2011, para 9). Both the literature review and

banking services) and entertainment collections move to digital formats,

knowing e-mail addresses but not

the probe data point to the need for synchronized devices and easier

people’s digital lives will become significantly more complicated and

access to data. This might get us one step closer to de-fragmenting users’

time-consuming to manage. With every increase in the number of

digital lives. As Davies & Parrinder and (2010) argue, design changes

computing devices in the home, people experience an increase in data,

happen because technology allows them. But as the relationships

and the scattering across them is likely to result in a deepening sense

between people, technology and contexts evolve, a domino effect results

of fragmentation. The question therefore is: How can design unite the

in new ways of thinking theoretically and philosophically so that design

fragments of technology and data in people’s digital lives to better

might evolve and take new shapes (Davies & Parrinder, 2010).

serve the individual user?

Digital life Being increasingly connected to online, non-physical services. Having things in your life exist online. Or, phone numbers, owning mp3s but not CDs or records, and when your FarmVille gold is listing among your possesssions in your will.

Virtual Artifact A virtual artifact is an immaterial object that exists in a digital environment. So, instead of existing in a physical way, it exists on the Internet, virtual reality, cyberspace, etc. If a tree falls in a digital environment, does it make a sound?

Summary

The Cloud, a clear trend of the moment, could be the appropriate

The choice of participatory research was extremely important as it allowed

technology to help reduce the problem of fragmentation. However,

the voices of individual computer users to be heard and helped to create

people voiced deep concerns about issues of ownership and privacy

empathy for their individual situations. This led to rich and complex data.

in relation to known Cloud-type services such as Facebook. As well,

Reflection on and analysis of the data helped to inform the design proposal,

despite participants generally not acting on their security concerns, they

Or more importantly, can you chop it up and use it for firewood? Above sources adapted from Wikipedia: The Free Encyclopedia.


98

Reflection and Analysis of Data and Design Experiment « Towards a New Conceptual Framework

99

still worried about them. These issues would all have to be considered in a design proposal of a system using Cloud services owned by large corporations.

Dewey Decimal Classification Developed by guess who, Mr. Dewey himself in 1876. Although it has had 22 upgrades since then, it clearly is better than the average iece of software with an upgrade every year.

Another issue to be addressed in the design proposal is users’ subjectivity in organizing and managing data. There is no common governing organizational or classification system like the Dewey Decimal System used in library classification of books. Rather, each person collects, stores, files,

It attempts to organise all knowledge into 10 main groups, 100 divisions

classifies, and retrieves uniquely. People prefer choice, and think of their

and 1000 sections. The decimal part of the name is really what defines this

computer as another item to personalize and organize in their own way.

system and has made it such a good system. You can see why the average person does not devise a similar system for their own filing. It would take a long time. Source adapted from Wikipedia: The Free Encyclopedia.

Time, or lack thereof, was a factor in learning new software or doing appropriate “housekeeping”, so to speak. For some of the participants, the design of a system would have to be easy and intuitive and do some of the ‘ heavy lifting’ for them.

The analogy of the “ghost in the machine” (discussed in the next chapter) inspires the idea of unity between physical life and digital life, and creates harmony between users’ splintered and fragmented digital data and their devices. Just as the original desktop analogy helped to conceptualize the computer and inspire the design of a very important interface for personal computing, the hope is that the ghost in the machine will likewise inspire a new way of conceptualizing today’s computing devices. It will be used to re-conceptualize the idea of a user’s data being located on a physical computer to a computer that follows the user everywhere, virtually unseen but ubiquitously present via connectivity. The analogy will also serve as a metaphorical blueprint for the design proposal.

06 An Analogy to Inform Design


100

101

An Anology to Inform Design « Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

Introduction

leap from one analogy-bundle to another” (p. 500). Similarly, Lakoff

A crucial issue that arose in the previous chapter was how design

and Johnson (1980) also proposed that analogy is a “fundamental

can help resolve the fragmentation, complexity, synchronization and

mechanism of the mind” which allows people to communicate with ease

depersonalization of digital life. While today’s cloud computing services

with one another (p. 278), taking their physical and social experiences

changes raw code or lines of code for

do make it possible to unite and synchronize data, their solutions thus

and using them to describe new ideas.

pretty little icons like folders and files

Graphic User Interface Often pronounced gooey, it is not some slimey creature that exists in a sci fi movie. Rather it is user interface for the computer that telling the computer what to do into and actions, like drag and drop that

far rarely move beyond the reach of the company designing the services

makes it easier to compute for most of the world.

(i.e., core service offering or platform), which creates yet another kind

The desktop analogy has worked incredibly well thus far, having inspired

of fragmentation. To fill the need for a simplified and unified data source,

a revolutionary computer interface in the 1980s. To re-iterate, up until

this research proposes a system where users can view their digital data

the graphic user interface was designed (which itself was inspired by

with computers. Includes both

in an all-in-one, easy-to-reach virtual location. In order to conceptualize

the desktop as an analogy), computing was mainly performed by

they interact with objects displayed

this system, the analogy “ghost in the machine” is used, as analogy has

experts and hobbyists configuring lines of code to operate computers.

proven to be very powerful when explaining multi-dimensional concepts,

The desktop analogy was pivotal in contextualizing and simplifying the

especially in computing.

computer experience. This led to the subsequent acceptance of computers

Human-Computer Interaction The study of how people interact software and hardware, as in how on their screens by software, and how they use peripherals such as keyboards, mice, and touch screens.

into millions of homes as well as into the hands of non-experts. As philosopher and scholar Marshall McLuhan (2001) posited, “our ‘Age of Anxiety’ is, in great part, the result of trying to do today’s job with

Analogies have already assisted in the design of computers and in

yesterday’s tools—with yesterday’s concepts” (p. 9). This contention still

discussions of human-computer interaction (HCI). Examining the

holds true today, particularly with regard to advanced digital technology.

desktop analogy shows that, in essence, it contains a cluster of analogies.

To help move the personal computing experience forward, a new

The computer screen is meant to be like a physical desk where users

analogy, which will expand the idea of a user’s computer, will provide

can keep their documents and folders. When finished with a file, the

direction. The analogy of the ghost in the machine presented in this

user can store it in a folder or ‘throw’ it into the recycle bin. These

study aims to visualize, empower, personalize, unite, and synchronize the

options make the desktop environment analogous to the physical objects

idea of a user’s data, and to visualize and conceptualize the final design.

in an office environment, just as the word processor software now mimics the typewriters they once replaced (Thagard, 2005). Historically,

Analogies are powerful aids for conceptualization and expression of

the analogy has been very useful in conceptualizing all aspects of

human thoughts and communication. Hofstadter (2001) and Pinker

the computing experience and has been used to illuminate and clarify

(2001) proposed that analogies are a fundamental part of language

the multitude of functions the computer and software can offer. Now,

and the mind, and that “every concept we have is essentially nothing

however, the physical computer itself has become a limiting idea, along

but a tightly packaged bundle of analogies, and…. all we do when we

with the various analogies to describe it.

think is to move fluidly from concept to concept—in other words, to

Sources adapted from Wikipedia: The Free Encyclopedia.


102

103

An Anology to Inform Design « Towards a New Conceptual Framework

As the fundamental shift in computing technology progresses, it is

computer system, whether on a local hard-drive or somewhere in the

imperative that a new and intuitive conceptual framework replace the

Cloud, exists in a supernatural plane, it may not be conceivable to think

old one and, in so doing, reduce its limitations. Just as a computer is not

of the data as existing without a physical presence, and thus existing

literally a desktop, the “ghost in the machine” is not a literal ghost in a

somewhere in the Cloud.

literal machine (even though the analogy is the conceptual core of the control panel systems)—there is no ‘ghost’ and no real ‘machine’.

The proposed living, growing, personal data ghost may at first seem

Rather, the proposed conceptual framework for designing a new paradigm

a bit ghoulish or scary to a consumer or designer. However, once

is simply virtual data unified in a pooled cloud of information. As this

the cluster of ideas the analogy embodies is fully understood and

analogy rolls out and is given form, the following two questions should

the concept visualized, the positive aspects should outweigh the

be kept in mind: Is this conceptual framework the only possible one?

negative ones and it may instead become a comforting concept.

If not, is it the best one? Given the infinite flexibility and creativity of the human mind, the answer is most likely ‘no’ to the first question, but the

One might argue that the concept of uniting one’s data into a single

framework and its attendant analogy at least provide a strong starting

representation of oneself may be better suited to an avatar. However,

point for debate, discussion and action.

when the idea of an avatar was explored, it was felt to be more limiting than the ghost in the machine analogy. Moreover, the avatar idea already

The term “ghost in the machine” was coined by the British philosopher

exists in general computing language, and so with it comes a set of

Gilbert Ryle (1900-1976) to describe Descartes’ mind-body dualism

preconceived ideas that can be restricting. One of the main restrictions is

(Ryle, 1949). Far from being the obscure musings of a philosopher, the

that many people already have several avatars, most of which are aliases

idea of mind-body dualism is so entrenched in human thought that, even

or façades, not true representations of the owner. Indeed, the plethora

for people who do not accept the division, it is still a naturally intuitive

of avatars and data associated with them is also in danger of becoming

way to speak. Pinker (2002) pointed out that “Gilbert’s brain presupposes

fragmented. As well, the concept of the ghost in the machine or ‘dataw

an owner that is somehow separate from the brain it owns” (p. 14). If the

ghost’ (the term which will be used here to refer to a user’s specific

brain and body are the same thing, it is odd to talk about one belonging

ghost) can span a person’s lifetime. The idea here is that there would

to the other, whereas if they are different things, it makes perfect sense.

only ever be one data ghost per person. Further, the ghost would

The way we naturally talk about these substances implies a dualistic

have the ability to harness all of a user’s online avatars and data over

point of view. The concepts of mind, soul, spirit, and ghost are fairly

time and thereby allow management of individuals’ online reputations and

easy to understand. Utilizing the analogies inherent in this concept

identities. In this regard, the idea of an avatar does not convey the strong

should enable the abstract ideas at the heart of this project’s conceptual

notion of centralizing, synchronizing and personalization necessary to this

framework to be understood more intuitively. While it might not be

conceptual framework, nor does it provide multi-dimensionality.

acceptable to everyone to suggest that the data which exists in a

Thesis by: C. Ellicott, 04.08.2011


104

105

An Anology to Inform Design « Towards a New Conceptual Framework

In contrast to the rather limiting notion of avatar, the ghost in the

Location: Cloud

machine offers the depth, multi-dimensionality and cohesion needed to represent a new computing environment with an ever-expanding archive of personal data. It would manifest as a system with a control panel,

Entertainment data:

Location: Cloud

Digital Music Mos Def Amy Winehouse PJ Harvey Ratatat Portishead Tom Waits

Location: 2155 South Street Halifax Nova Scotia

which would begin to solve the problem of fragmentation, synchronization and depersonalization. The analogy embodies dualism, such as mind/

Digtal Movies Digtal TV shows Withnail and I Big Love Big Lebowski 30 Rock Cider House Sopranos Tank Girl Dexter Objectified Sunny in Philedelphia Helvetica Holmes on Homes The Genius Changing Spaces of Design uckleberry Fin Sleeping Dogs Lie Cyrus

6800 Leblanc 6900 Ivey MDes Courses Project briefs Communication Omnia Attalia Saija Sun Patrick Foster

helps to free up the notion of location and underpins the immateriality

addressed through the systems control panel.

Banking data

Online Banking TD Account Mastercar CIBC Account Emerald Vis RBC Account Waterhouse ING Paypal Barclays Acco

Location: Eaglehead Liverpool Nova Scotia

Thesis work Class references Class readings References Pdf books Presentations Book Design Poster Design

Location: Cloud Location: 2155 South Street Halifax Nova Scotia Location: Eaglehead Liverpool Nova Scotia

Personal data Passwords Image libraries Bank acounts Subscriptions Software Freeware Social Networking Apple

Location: 2155 South Street Halifax Nova Scotia

Location: NSCAD University 2244 Duke St. Halifax Nova Scotia

Location: 2155 South Street Halifax Nova Scotia

A further abstraction of the ghost in the machine duality exists between the physical users themselves and their new virtual persona, the ghost. The data ghost would unite one’s data in its totality. Once one’s data Communication data Gmail address1 Gmail address2 Yahoo address Gmail video Mac Mail

ghost is united as a single entity, it would then co-exist with the data’s owner, like a shadow linked but not tied to the person – an abstracted

Archive conversat Skype FaceTime Yahoo Mail Location: Cloud

identity. Perhaps one day the ghost will have similar rights to that of its

Location: 2155 South Street Halifax Nova Scotia Location: NSCAD webmail 2244 Duke Street Halifax

physical owner and become a Cloud citizen. A question that may become more of an issue is just how much the concept of a data ghost overlaps with one’s identity presented in the physical world. The data ghost could help compartmentalize various aspects of a user’s online life so that

Cloud Services Dropbox Evernote Carbonite Facebook Twitter Gmail

Yahoo Mail Lostpedia Forum Linked In Siamese Forum Flickr You Tube Location: Cloud Plaxo Delicious You send it

Location: Eaglehead Liverpool Nova Scotia

people could feel free to have different levels of openness for their uploaded data and personas.

The transition of ownership, copyright, and the continued physical abstraction of objects What rights users have (and can expect to have) over their own online

Applications

Location: Lahave Bridgewater Nova Scotia

Adobe Dreamweaver Flash Fireworks Bridge Version Cue

InDesign Photoshop Acrobat Illustrator Microsoft Offic Word Powerpoint Excel

Location: Cloud Location: 2155 South Street Halifax Nova Scotia Location: NSCAD webmail 2244 Duke Street Halifax

data is an important and topical issue. The probes results indicated that, while it is currently a concern, not one respondent had taken much Social Networking

action to protect their ownership over their online data. Perhaps this

Figure 6.01 An Individuals Fragmented Data Online And Across Multiple Devices This shows just how vast and far reaching ones persons data can get. Seen here is is scattered across different machines, all over the web in various formats, and even in places people have forgotten about of didn’t know that their data trail was being collected. Source: Copyright 2011 C.Ellicott

School documents

body dualism, data/computer duality, and physical/virtual duality. It also

of data even while personalizing it. All these ideas are features to be

Location: 2155 South Street Halifax Nova Scotia

Thesis by: C. Ellicott, 04.08.2011

Facebook Flickr Twitter You Tube Linked In Delicious

Location: Cloud


106

107

An Anology to Inform Design « Towards a New Conceptual Framework

lack of concern was because the transference of data ownership has not

Figure 6.02 An Individuals Unite Data, Their Data Ghost This image helps to visualize the concept of ghost in the machine as it pertains to this study. It is merely a concept to show how the system will be unite an individuals data, which is currently fragmented into what appears to be a easy to read cohesive

yet been used against anyone yet (for instance, Facebook has not used, modified or sub-licensed people’s data, even though they claim they can). Or perhaps the notion of data ownership in a public online venue is too complex for the average user to contemplate. Centuries ago, the

whole. Copyright 2011 C.Ellicott Recipes + 300 cal

Passwords Image libraries Bank acounts Photos Subscriptions Banking Family Software Email transfer Relationship Withdrawls Freeware To Do List Siamese cats Documents Social Networking Creative ideas Apple Imagery Documents Illustration Google Creative ideas Business ideas Storage Resume Car alarm Thoughts House alarm

Personal data

- 200 cal + 200 cal Chicken Soup vegetable Soup - 200 cal

Visual reference material Google Calendar Photography Address Book: Contacts Character / Toys Friends Family Ad campaigns Clients Websites Aquaintances Businesses Graphics Emergency Illustrations Doctor artists Veterinarian Garage packaging Cyc ling Shopping /Ex Take Away e r cise Videos School dat Entertainment data a Hear Rates Music collection Exercise routing Mos Def Cyclling CV Amy Winehouse Races Work data PJ Harvet Special Diets Clients Ratatat Inspirational sites TORQ Portishead Pink Bike Paramount Entertainment Tom Waits Tri Rudy La Soyarie Beatles Cycling contacts Cyclesmith Mayer Haythorne Robert Pope Foundation Nina Simone Packaging Macy Grey Posters Letterhead Website

School data Projects Thesis Class references Class readings Reference material Pdf books Presentations Book Design poster Design

Creation data Software

Adobe Dreamweaver Flash Fireworks Bridge Version Cue

Adobe InDesign Photoshop Acrobat Illustrator

Microsoft Office Word Powerpoint Excel

Gmail Mac Mail Dropbox

Online shopping Ebay Kijji Howies Etsy Paul Frank Threadless

Communication Gmail Skype Mac Mail Yahoo mail Facebook Twitter Linked In

Social Networking Facebook Flickr Twitter You Tube Linked In Delicious

Evernote iLife Growl Garage Band Abby OCR imovie Drop Stuff iphoto Toast Titanium Suitcase Cyberduck Widgets Diggable Planets Weather Dictionary Word of thh day Buck 62 Cicero

uTorrent MGMT

Livescribe Pen Tips

CBC PodCast

Preview TextEdit

copyright system grew out of the printing industry and was relatively easy to understand and manage, as it involved a physical manifestation of intellectual property; however, digital data that can be copied and easily shared puts a new spin on copyright infringement and rights. Einstein once mused on this very issue, saying: “If I give you a penny, you are one penny richer, and I’m one penny poorer. But of I give you an idea, you have a new idea but I still have my own” (Ingo, 2008). This not only speaks to the idea of ownership, but also to ownership of ideas, the different perceptions of physical versus virtual, and the issue of copyright.

In essence, and by virtue of its nature, just using the data ghost system encourages people to take ownership of their data as well as of their privacy and security. At its core, the concept of the ghost in the machine is meant to empower people, allowing them greater control over their online identities and information. If knowledge is power, then ownership of knowledge (i.e., data) consigns even more power. Perhaps the data ghost can actually help individual users push back against increasing corporate control, like the example cited earlier with Facebook. While the envisioned system aims to regain some rights for people’s digital identity,

Cloud Services Dropbox Evernote Carbonite Facebook Twitter Gmail Yahoo Mail Linked In Flickr You Tube Plaxo Delicious You send it Lost Forum Siamese Forum

a full exploration of this idea is beyond the scope of this thesis.

New technologies, such as cloud computing, are making it less important for the everyday user to consider where their data physically exists. For some, it may be counter-intuitive to own things that do not seem to exist physically. The data ghost helps people to visualize the invisible. As

Thesis by: C. Ellicott, 04.08.2011


108

109

An Anology to Inform Design « Towards a New Conceptual Framework

suggested above by Einstein, our perception of objects and ownership

communication programs) all within one login. This type of service would

has had to evolve as technologies transform old realities. We tend to take

have to be accepted by these institutions in order for their firewalls to

ideas like ownership for granted as being self-evident, but the truth is

open to the data ghost service; but, once this were done, people of all

that ownership is a man-made concept that varies according to time and

socio-economic classes could compute to the same extent.

place. In addressing the data ownership issue, probe respondents voiced their uneasiness over how the concentration and centralization of personal

OPEN SOURCE: A GOOD PHILOSOPHICAL FIT

data online might make it easier for governments, corporations or

Open Source is a free software movement not controlled by corpora-

subversive groups to steal or use personal data and information;

tions. It frees up the restrictions of copyright on software and allows

the control panel does address this concern.

users to copy, edit, study and use their software open and freely. Open Source was created by many volunteers working together without

The ghost in the machine concept frees up a user’s files, floating them

monetary incentive, a model which encourages the spirit of voluntary

in the Cloud yet uniting them through a personalized data ghost known

cooperation. For the data ghost system, this model would be ideal,

as a control panel. It helps to re-conceptualize the metaphor of location,

allowing people to feel confident that the system is created by the

where various aspects of ownership drop away and files are no longer

people and for the people. The software would not be for commercial

located on a user’s physical computer, as that may be too limiting.

gain, but would instead have the interest of people’s security and well-

This is why taking ownership in the form of a personal data ghost is so

being as a guiding feature. Companies such as FireFox, Linux, Wikipedia

important. It allows the individual to conceptualize and own data as

and Google are currently using Open Source code in products like

an entity, but one which is no longer bound by a specific location.

Chrome and Android, which are for commercial gain. However, this indicates that the code is robust enough to use for major operating

While the ghost in the machine’s system was created to counteract the

systems and products in the mainstream. Ingo (2006), author of Open

scattering of people’s data across multiple digital devices, this concept

Life: The Philosophy of Open Source, argues that in recent years, Open

could also work for those people who own no computing devices at all.

Source software has become just as good or better than its competing

By having a data ghost, an individual could enjoy a robust computing

closed source software.

experience without needing to own a computer. Currently, most libraries in Canada allow free access to public computers but limit what people can do on them. With a data ghost, users would have all the particular programs they use and love (e.g., their font collections, games and

Thesis by: C. Ellicott, 04.08.2011


110

An Anology to Inform Design « Towards a New Conceptual Framework

111

SUMMARY The use of analogy in computing design has proven to be a powerful tool over the years. In the case of the ghost in the machine, analogy is also a fertile mechanism to develop a new conceptual framework that supports the design proposal and project. Specifically, the use of the analogy ‘ghost in the machine’ helps the user to reframe the idea of a computer by visualizing data as not residing in one particular physical location. It also allows the blending of identities residing in the physical body and digital world, and gives those people without a computing device the chance to have a virtual computing environment. The ghost in the machine can therefore potentially democratize access to the computer experience. Nevertheless, above and beyond these enormous potentialities, the data ghost’s most powerful and revolutionary feature is that it unifies, personalizes and synchronizes a user’s data and various devices, rendering many of today’s “must-have” technologies redundant.

07 Building the Design Brief: A Design Scenario


112

Building the Design Brief « Towards a New Conceptual Framework

INTRODUCTION Figure 7.01 Design Quote By J. Gruber Although Thakara suggests that an air traffic controller, can be “in the bubble” , a mind set, amongst all their controls, Gruber suggests the design look and feel does not aim to mimic such a complex system.

Thackara (2005) uses the term “in the bubble” to refer to what air traffic

“If your UI even vaguely resembles an airplane cockpit, you’re doing

controllers describe as their state of mind when being enclosed in their computer control rooms, barraged by data. The phrase indicates that they are in total control despite being surrounded by active technology. Just as the air traffic controllers have found their control bubble, the

Coyier, C. (2011). [Quotes on Design] Retreived from http://quotesondesign.com/john-gruber/

Thesis by: C. Ellicott, 04.08.2011

ghost in the machine system may help the average computer user find his or her data bubble. When the questionnaire participants were asked: “Would it be useful to you to have all your computers, smartphones and external devices synchronized and be able to access all of your data, photos, bookmarks, address books, etc?”, 97% of respondents agreed it would be useful, with some remarking “sure, but it sounds impossible.”

The core functionality of the proposed control panel system will focus on addressing fragmentation and synchronization of personal data and identities. As fragmentation has, in part, been driven by the proliferation of devices, one of the major benefits of this control panel is that it would also provide independence from owning a device. It changes the idea of “your” computer from meaning the computer that you own to meaning your virtual computer in the Cloud. Technological advancements have removed much of the inconvenience of needing to be at a fixed location, whether in the home or on a specific device. Technology already exists to allow a system, like the one proposed here, to provide a centralized and united computing experience. However, it has yet to be created. Instead, a lot of companies are tackling little pieces of the problem, which results in further fragmenting people’s computing experiences.

The following chapter explores the development of a control panel system utilizing the explicit and implicit findings from the study participants. A glimpse into how the system would work is provided through

it wrong.” —J. Gruber


114

115

Building the Design Brief « Towards a New Conceptual Framework

the scenarios based on amalgamations of the probe participants’

Competing commercial companies will want their software and

responses. The design features of the proposed system are based on

operating systems to work with the Unite system because so many

issues raised in the cultural probes and questionnaires as well as those

people and institutions would be adopting it.

Thesis by: C. Ellicott, 04.08.2011

raised in the literature review. Each scenario addresses one or two of the system’s features. The scenarios are mini stories and are interwoven

The Unite system screens are designed with multiple devices in mind

within the design brief to help illustrate both the rationale for the

but recognizing that mobile devices will predominate in future. However,

Early adopters

features, as well as the features themselves.

many of the screens would be built specifically for a Netbook or similar

cutting-edge when it comes to

Somebody who is always on the the latest and greatest advances

device with minimal hard drive space. The Mac Air was the model for

in technology (and just about everything else). You know how

THE CONTEXT IN WHICH THE PROJECT RESIDES

this project but the Unite system would have to work across a variety

This project is set in the not-so-distant future, at a time when the

of devices, both new and old, portable and not, as well as be operating-

Government has increased democratization of access to computing

system neutral. The assumption is that this system is both technologically

services. There has also been a renaissance of the Internet café, providing

and legally achievable.

more likely to adopt because of

THE DESIGN BRIEF

Laggards

A consumer target audience, driven by probe participant specifics

straggler. In terms of technology,

you’re always trying to keep up with the Joneses? These are the Joneses. Late majority A skeptical bunch, this lot. They are pressure more than anything else

more availability to computers as portals to access people’s united data ghosts, data and applications. Firewalls have been lifted on the downloadUnite* is a name for the proposed system which is discussed in more detail on page 112 of this study.

ing of the Unite* control panel system and thus any computer terminal can be set up to their synchronized pre-existing working profiles on other devices. This also presumes that copyright and licensing issues have been dealt with in regards to software, and that legal and copyright issues have been resolved in favour of the Unite system as a way to give ownership over personal digital data. The cost of data storage has been considerably reduced, as per Moore’s law.

The trend in computing hardware that says that the amount of transistors placed on an integrated circuit has doubled (and will continue to double) every two years. Computers are getting smaller and smaller by the year. But when will it end?! Perhaps,

and adopting their philosophy of “by the people, for the people”. It would not be corporately owned. A similar business model that is consumer-driven and non-commercial (such as Wikipedia’s) could provide guidance. Most people want to support a product that is not

Source adapted from Wikipedia: The Free Encyclopedia.

the Unite system will be designed for two opposite ends-of-the-computing-spectrum users: the laggards/late majority and the early adopters, both of whom were participants in the study. By designing for both extremes of computer users (with regards to computer literacy and usage), the design should appeal to a continuum of users and provide

The control panel system would be built using an open source language

the year 2015 or 2020 but by the looks of it, it could go even longer.

those who aren’t exactly up to date

Rather than being designed for the “average” user, as can be common,

greater responsiveness to the needs and habits of a variety of groups.

Moore’s Law

corporately owned and offers more personal control over their own data.

Somebody that lags behind. A

The early adopter group represented in the study encompassed those who are engaged by and can afford to acquire the latest technologies. They tend to use computers as an integral part of their work and have embraced them in various aspects of their home life. This group sees their computers as an essential part of everyday life and their high computer literacy and early adoption of new technologies reflect that. The other users are the laggards, of which there were only a few

with the latest gadgets. Like the people who still own Betamax players and think that the Internet is just a fad. Above sources adapted from Grant, A. E., & Meadows, J. H. (2010) p. 43-45


116

117

Building the Design Brief « Towards a New Conceptual Framework

amongst the probe participants. This type of user has a broad computer

2. The system will act as master, partner and slave to existing devices

literacy (i.e., from beginner to functionally literate) and their usage

and operating systems, thus being device agnostic. While this is a

ranged from quite a lot to very little. Within the laggard group, but not

complex system, it does not interfere or demand that one gives up

represented in the study, was a sub-group. These are users who, whether

preferred applications to learn new ones associated with the control

for financial or other reasons, do not own a computer but need or would

panel. It merely augments and synchronizes what already exists.

like access to one. A future research direction could involve investigating this untapped group through collaborative research. This could help

MASTER: In some instances, this system will need to exert control over

bridge the digital divide mentioned earlier, where giving people equality

the operation systems governing the devices within its domain, serving

of computer access is likened to giving people access to information or

as an overlord or master.

a democratization of information and knowledge. PARTNER: At times, it will be running parallel to those operating A New User Interface: Features of the System or Design Considerations

systems, tackling different tasks but still working with the operating

1. Any new product needs to be marketed well. A strong name

systems of those devices as a partner to create a seamless experience

for a product can be a powerful influence on consumer behaviour,

for the user.

acceptance, understanding and uptake. Some alternative concepts for the original system name of ‘Data Ghost’ are Unite or Younite.

SLAVE: Sometimes the operating systems will have to be allowed to do

These would need to be tested with focus groups to see the response.

their jobs and will therefore need to be able to override and control the

However, the prototype will use the title “Unite” while employing the

interface, making it their slave.

underlying analogy of a data ghost. Figure 7.02 Unite – A Proposed Logo for Testing This is an identity for the working prototype of the system with control panel views. Copyright 2011 C.Ellicott

Thesis by: C. Ellicott, 04.08.2011


118

119

Building the Design Brief « Towards a New Conceptual Framework

OCD-ADD Protean Gen

Figure 7.03 Mind Mapping for the Control Panel System This Figure shows in broad strokes what the system should include, what drove the design to this solution, what the system needs to do and how it needs to work. As well it touches on what issues have to be contended with in design, specific to the Cloud. Copyright 2011 C.Ellicott .

Subjective organization methods Digital chores Data hoards

Computer Integrated lives Brain is changing

Non Computer Synchronize owners useful multiple 3rd world devices countries

Findings

Only web browser specific

Unites fragmented data

Probes

contextual user research

Company has tech issues

Isreal Case in point

The value of the OS

Cons

use HTML 5

Unites fragmented data

Why a Control Panel

Individual Copyright

Technical Limitations

Owner -ship

What if the Corporately drip owned by runneth few dry?

fre ice v e

Monitor Learn

Sync

Devices

Data

Control Panel System

Most used Apps Usage

Pass- Settings Backup words Automation

Data Ghost Macro View

Profiles Add Avatars

Storage

Collect

Apps

Collect

Sugg Web estions Sugg estions

Open Source Native App

Harness Data Ghost

Phased Approach

May be distracting for an interface

Responsive Design

Provide defaults

Data Documents

Colour Blind Elderly

Analogies help users "get" a conceptual model. For example, "This is just like reading a book."

Global Nav Sync Live Workspaces

Music Share

Search

People reconstruct memories so they are always changing

Memory

Memory can absorb 3-4 items at a time. What holds attention determines action. - William James

Data Ghost? Digital Shadow

Applying Human Factors

Visual Hierarchy -A System

Mental Models

Files like Files To aid mental model

Analogy

Extreme Users

Attention

Bite-Sized Chunks Of Info Are Best Buttons need to look like buttons

Design Values

Early Adopters

Panel includes

Login

Improvements can be slow and flawed

Only give users what they need-declutter

Affordances

Simplicity K.I.S.S No computer Visually Impaired

Images Video

Cons

Progressive disclosure

Experience over features

Unconscious knowledge & action

CONTROLS

UNITE all Data Devices

Corporation Free Improvements are community lead based on real use

Roll features out over time to keep interface simple

Recent activity

archived Add work this one spaces Upload

Power to the people

e

free ice ev Searches

Streams

Net neutrality

Browser based App

Software

tio loca n free• d

Cloud issues

Privacy Issues

Most used Files

Don’t need to install on devices

Cloud

Freedom of speech

Security Issues

Corporate exposing data

Pros

Pros

tion fre loca e• d

Hackers

Accessible anywhere

No Wifi Bandwidth

Censor -ship

Corporate Ownership

Power of browser in Q?

Pros Universal programming language

Lots of Data Fragmented data

Powerful programming language

Thesis by: C. Ellicott, 04.08.2011

Novelty vs change blindness

Affected by pictures

Inate brain Grouping

Grids Colour Font Peripheral Vision

To help focus lots of info Alerts the eye

Can affect mood Make fonts big enough

Best recognized shapes Distractable -a canonical perspective Use the senses Used to scan pages to grab attention People miss changes

Emotional brain

People pics & Stories

Food Propagation Danger/Survival

Framing

“People's behaviour is greatly affected by factors that they aren't even aware of. The words "retired", "Florida," and "tired" can make even young people walk down the hall slower. We will always ascribe a rational, conscious-brain reason to our decision, but it's never the whole reason why we take an action, and often the rational reason isn't even part of the reason.” (Weinschenk, S. (2010) para 8)


120 Figure 7.04 Possible System Architecture for the Control Panel System This Figure shows an initial draft of what would be a working site map of the current System. Copyright 2011 C.Ellicott

Sort by: Batches Suffix Alphabetic Date File Size Most recent Colour Faces Buildings

View

Sort by: Batches Suffix Alphabetic Date File Size View UNITE & MANAGE Most recent Colour Faces Buildings Communication

Add

121

Building the Design Brief « Towards a New Conceptual Framework

Install

Set Up

Set Up

Retinal Scan & Login

Retinal Scan & Login

UNITE UNITE Sync Live Sync Live Search META OS/CONTROL PANEL META OS/CONTROL PANEL John Doe | SignIn Workspaces Workspaces

Search

Add Delete UNITE View & MANAGE

Install

Delete

View

Add

WATCHMEN

Delete Add

RECENT ACTIVITY

Communication

WATCHMEN DATA GHOST Add Delete RECENT ACTIVITY A viewing profile Data Trails

Email

IM

Text

Voice R Email

IM

Text

Documents

Music

APPS MOST USED

DeleteAPPS Add

Create New Category Music Videos

Shared Images

Create New Category

Close Add Site

SOCIAL Feeds

Upload SOCIAL

Feeds

Activity

DATA GHOST

CONTROLS

CONTROLS

AUTOMATION

AUTOMATION

Delete

A viewing profile Data Trails

Searches

Activity

Close

Delete

Fully Automated

Shopping History

Shopping History

Data concentration log My FEEDS

Data concentration log

Shared

My FEEDS Add Site

MOST USED

My FILES

Videos Documents Images

Searches

John Doe | SignIn

Voice R Add

My FILES

Delete Add

Thesis by: C. Ellicott, 04.08.2011

Upload

Gallery

Gallery Files/Folders

Semi AutomatedFully NOT AutomatedSemi Automated Automated

NOT Automated

Learn

Learn

INTERFACE SETTINGS

INTERFACE SETTINGS

Navigation Order Background Colour Set home page Order Navigation Files/Folders

Background

Colour

Set home page

NEW USES OF YOUR AVATARS NEW USES OF YOUR AVATARS Active Sites

Secondary sites

Active Sites

Places

Secondary sites

Places

BACKUP Add device Duplicate on device My APPS

Duplicate on device

Add app Add device

Upload Display My APPS

Add app

Upload

Display Add

My FILES

Delete Add

My FILES

Delete Fully Automated

Txt Profiles of apps per device

Txt Profiles ofTxt all apps Profiles of apps of all •Current ProfilesTxt of apps TxtallProfiles apps working Txt Profiles of all apps per device per device per device per device environmentper device

Add

MY STORAGE Automated

Delete Add

MY STORAGE

ACCOUNT

OTHER

Automate

Add

App installs across devices

Move

Locate my data? Find storage

Automate MY DEVICES

Delete Add

Contacts

Add

MISC

Move

Bookmarks

PASSWORDS

Delete Add

Calendar Contacts

Delete Add

ACCOUNT

Password

Delete Account Email Prefs

Autofill Password

Delete Account

Autofill

Locate my data?

Synch MY DEVICES

Delete

SynchMISC

Bookmarks

PASSWORDS

Delete

Calendar

Delete

Sync

Sync

Apply app profile

Choose which devices Apply app profile

Synch

App installs across devices

Add

NOT Automated

Delete Email Prefs

Find storage

Semi AutomatedFully NOT AutomatedSemi Automated Automated

•Current working environment

OTHER Automated

BACKUP

Synch

Choose which devices


122

Building the Design Brief « Towards a New Conceptual Framework

123

Thesis by: C. Ellicott, 04.08.2011

2. With the KISS (Keep it simple, stupid) Principle, which is a cruder but more evocative take on Maeda’s [2006] framing of good design as just being ‘simple’, the user interface would borrow heavily from familiar conventions, one of which is analogy. While it would not be prudent or practical design practice to give up the standard computing conventions completely, the data ghost could add to the understanding of the new identity-specific computing experience. When the questionnaire participants were asked how they would feel about learning new software from scratch, they gave two main responses: the software would have to be useful or involve an area of interest, and the software would have to be fairly simple and relevant, otherwise there would be little motivation to learn it. A simple four-step set-up and installation process for the system adheres to this principle, keeping the set up to a minimum and automating as much of the process as possible.

3. Experience is more important than features, so making the interface simple, inviting and accessible will determine the system’s failure or success. Thus, if some of the features need to be rolled out over time to keep it simple, that will take precedence. Designing an uncluttered environment to reinforce the idea of de-fragmentation will also be of utmost importance.

Figure 7.05 Unite Install and Set Up Screens This Figure shows the initial install screen on a computer what the system should include, what drove the design to this solution, what the system needs to do and how it needs to work. As well it touches on what issues have to be contended with in design, specific to the Cloud. Source: Image of woman’s head used in system interface design by Dan Mountford (2010) http://www.flickr. com/photos/danmount-

4. As was made clear in the research the idiosyncratic ways in which users manage data and collections needs to be accommodated. Users will need to be able to customize their control panels (within reason) to personalize and create their own environment.

5. The system will include a universal password, that will have the ability to unlock all of an individual’s passwords, or specific passwords

ford/5239110479/in/set72157625371295037 Reproduced under Creative Commons Attribution 3.0 Source: Copyright 2011 C.Ellicott


Scenario #1:

124

The Changing Digital Landscape ÂŤ Towards a New Conceptual Framework

Persona #1: Tonya & Claire Bartoloni Age 48 and 8

Owner of Design Business Always five things on the go.

A busy single mother’s home computer dies125 Thesis by: C. Ellicott, 04.08.2011 during exams and a birthday: critical times Netbook Spare media computer iPhone main phone Laptop Work computer

Tonya owns her own small Design Studio, where she is jack of all trades, writer, business owner, manager, book keeper, and forever busy. Recently divorced, she finds it difficult juggling work, home life, and motherhood. Tonya does it well but she has had to give up caring about some things, such as imperfect housekeeping or organising in general in favour of getting things done.

Desktop Home computer iPod

Overlapping work and home computer usage is common for Tonya, as she is busy. She uses her laptop mainly for work while the home desktop she also uses to store family heirlooms and it is what Claire does her homework on.

Tonya has to g always one file need, and this to fix she need as images to m and invites. Th Cloud storage

On Tuesday, Jan. 11, 2016: when Tonya attempted to upgrade a driver on her PC, it just up and konked out. Tonya has a full life with little time to fuss over things, especially her home computer.

At Kinkos, Tony all the images As Tonya had i files through h copy and then while she waite

Spending time with her daughter, who is an avid gymnast and running herself, is pretty much where all of Tonya’s spare time goes, besides keeping her business going.


Scenario #1: cont. 126

The Changing Digital Landscape ÂŤ Towards a New Conceptual Framework

He suggested she tried the Unite system for synchronizing her data with her devices.

Tonya has to get the computer fixed because there is always one file on the computer that goes down that you need, and this was one of those cases. As it take a week to fix she needs to get her daughter's homework, as well as images to make Claire a Hannah Montana birthday card and invites. Thankfully the technician put all their data in Cloud storage so she could access it easily.

Great, it can also automate a back up as well!

Tonya was willing to give the Unite system a go, even though she has no patience for software aggravation. A quick 4 step install process was needed on one of her devices and then a simple additional step for all her other devices. Tonya was then able to access her data. After the retinal scan she decided to leave the password set-up until a later date.

Happy Birthday Claire

At Kinkos, Tonya realizes she forgot her netbook with all the images she had downloaded for Claire's card. As Tonya had installed Unite she was able to get her files through her interface on her iPhone, add some copy and then e-mail it to Kinkos and have it printed while she waited.

Tonya tried and loved the fully automated file management feature, as she has little time to file and organise. Her files are here there and everywhere, but whatever file view Tonya chooses, the system will display her smattering of files in that view. This is a powerful feature of the Unite System. She can even add different view styles, if she new how to program open source. The views create a new lens or filter with which to look at her digital clutter. Yay!! Source: Copyright 2011 C.Ellicott

127

Thesis by: C. Ellicott, 04.08.2011


128 Figures 7.06 - 7.07 A Four Step Set-Up Process For The Unite System. Step#1: Sets up a personal login with a retinal scan and a password. However the password, can be checked to be over ridden if the user is confident their retinal scan is enough.

Step#2: This sets up the users personal data which will be used for identification as well as filling out forms and profiles in the future. There is an advanced feature for those who want to add social networking, dating and activity profiles specifically for other sites. The users cookie information is used to fill out this screen, but allows the user to double check the information is correct. Copyright 2010 by C. Ellicott.

Building the Design Brief ÂŤ Towards a New Conceptual Framework

129

Thesis by: C. Ellicott, 04.08.2011

Figures 7.08 - 7.09 Step #3 and Step #4 Step# 3 This step is crucial in telling the Unite system what a persons individual working set-ups are on each of their devices. It collects crucial working information about the devices, their software, their customised preferences, as well as any meta data on their data and creates a profile of each. This then gets uploaded to the Cloud. This step can be skipped if the user does not have time to immediately scan all devices and can be preformed later either directly from the persons devices or through the control panel. Step#4 This final step allows the control panel to navigate through all the users stored onboard data and online data to unite it. It also allows the user to choose the easiest solution, upload all data in the cloud and create a back-up or those more savvy or budget conscious to choose if they want to completely mirror all their data in the cloud or parts of it. The panel provides suggestions for free or affordable Cloud storage services, once the system calculates all their data. Copyright 2010 by C. Ellicott.


130 Figures 7.10 - 7.11 Control Panel Examples of Data View and Sorting Options Individuals can view their data in many different ways no matter how scattered or disorganised it is. Each view tries to create some order and hierarchy for the user. In the first image the information has been grouped by file type as well as by where the data exists, on which drivers it resides. The next data view is a more familiar tree view, which also can be customised to add more or less columns of information. Copyright 2010 by C. Ellicott.

Building the Design Brief ÂŤ Towards a New Conceptual Framework

131

Thesis by: C. Ellicott, 04.08.2011

Figures 7.12 - 7.13 Control Panel Example of Data Views Left shows an upload screen for all file types. Alternatively, the user can drag and drop their files right onto their virtual Unite hard drive. Below is an icon view of images. The user can choose how many to load on per screen what meta data they want to see with the photos and how they want to sort them, in this case by faces. There is an on/off enlarge feature, so as users roll over the image they can get a bigger view.Copyright 2010 by C. Ellicott.


132

Building the Design Brief « Towards a New Conceptual Framework

can be opened on launch, and not others. The one-password entry would be protected by a retinal scan of the owner at login, and the application would log out automatically if the device lost sight of the user’s retina.

6. A hybrid solution for storage allows access and availability to data with or without WIFI. The best model for the near future of personal computing is a hybrid, using both Cloud and local storage on an

133

Thesis by: C. Ellicott, 04.08.2011

Figure 7.14 Login Screen With Required Retinal Scan And Optional Password Entry There is no need for an on off button on the software as the Unite system uses biometrics to sense an individuals presence at the computer and turns on or off automatically once they have left their computer. It logs in the same way if the individual chooses the override password option. Copyright 2010 by C. Ellicott.

individual’s own devices. This would appeal to the less computer literate end of the participant continuum and would also allow a transition for those who still want to own their computers and devices. As well, it could provide reassurance for those respondents who were wary of putting all their data in the Cloud. The ability to mirror data in the Cloud and on a local disk will allow an extra copy of individual’s key data to be duplicated both for access and back-up purposes. The added profiles of an Individual’s devices would allow the system the ability to know where all the data is without the user needing to know that information.

7. Fragmentation of peoples data is addressed with synchronized centralized management of data, storage and devices through one interface—the control panel. It will let users see and work with all their files from various devices, online accounts and cloud services without having to jump from window to window. It will facilitate drag and drop action of files between accounts and uploading of files and folders as well as editing of documents from the control panel or desktop. Other useful features will include viewing specific types of files across these services and managing and creating new folders that can be synced to the device being used.


134

135

Building the Design Brief « Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

Figure 7.15 Hybrid Data Storage And What Data Should Be Synchronized

Synchronized devices – Application Install Mirrored / synchronized – All data

cloud

Mirrored / synchronized – Only specific files

1 access panel

Upload files/data to Cloud

Devices with little storage capacity, it doesn’t make sense to mirror all one’s data on those drives, however this does not prevent synchronizing of data. It just means large files like movies get streamed or smaller files are downloaded as and when they are called for. Copyright 2010 by C. Ellicott.

Download files/data to device

16 Gig

: Netb

ook Dropbox: Ex. Cloud Storage 2 Gigabytes

Cloud Only

Cloud Only

Cloud Only

On board

Cloud Only

Cloud & Onboard

Cloud & Onbord Mirrored

Cloud Only


136

137

Building the Design Brief « Towards a New Conceptual Framework

8. The system would constantly monitor the individuals data ghost’s

Figure 7.16 Data Storage Pyramid

contents at a macro level. These would involve different data visualiza-

This pyramid shows approximately how the individual might allocate priority to their data and thus its duplicated storage in the Cloud.

tions of a user’s activities, searches, data amounts, etc. Through close monitoring, the system would notify the owner of any new appearances

wThe First tier contains the most important data and can be stored for free with most data storage companies.

of a person’s name/avatar or suspicious data creation. It would also allow DATA STORAGE PRIORITIES

STORAGE QUANTITY & LOCATION

people to see if someone has gained control of their identity, credit etc., and enable them to view the specific kind of activity that is occurring.

The second tier may be data that an individdual decides to pay for, but some individuals won’t create this much data.

Tier 1 data

The 3rd tier is data like music and movies that people can download again if need be and an individual may decide not to pay to have this storage duplicated in the cloud, but will still want access to it through

All meta data, profiles and personal information

10-20 Gigs

Text files, e-mail records, IM conversations, avatar profiles, meta data about all data.

their control panel. Copyright 2010

9. This system features both automation and user control. As it would

Stored in Cloud and mirrored locally for back up

cater to different ability levels, the control panel would allow the user to choose how much control he or she wants to have over data automation. The options would range from a purely automated setting (the default

Profies of customized workspaces system preferences, online buying records, cookies, settings, data storage profiles. Bookmarks, contact lists, data bases, avatar profiles, etc.

by C. Ellicott.

setting) for users who do not want to think about how to organize their filing and managing, to a semi-automated setting, to no automation whatsoever. There would also be a learn feature that, when in the semi-

Tier 2 data

Purposefully created personal data Personal documents, digital photos, imagery, writings, files, documentations, videos, sound collections. Personal Archived collections of the above.

30-100 Gigs Stored in Cloud and mirrored locally for back up

Irreplaceable personal files. these are a more bulky set of files than the above ones, hence the need for a considerable amount of storage

automated setting, could ‘learn’ peoples filing habits and patterns and begin to replicate them on the command of the user.

10. Open Source allows for ongoing modules to be added to the core program in order to enable people to volunteer and add modules to the

Tier 3 data

Replaceable Bulky Data This could be redundant work files, media collections such as: movie libraries, digital TV series, audio book files, music collections, etc. All these files are linked to collection profiles which if the data was lost, the profile would re-locate it and download it for the user.

75+ Gigs Stored in Cloud only

system. This may include moving into the domain of the house so that one can control house activities, or may sync with sporting computers to allow for more integration and assessment of activities.

Thesis by: C. Ellicott, 04.08.2011


138 Figures 7.17 - 7.18 Data Ghost Screen Views These have more granular views of a persons data, so they can see what kind of digital hoards they are, or look at other habits, like computer usage, window—multi-tasking activities, shopping habits, searches, pages viewed etc. Copyright 2010 by C. Ellicott.

Building the Design Brief ÂŤ Towards a New Conceptual Framework

139

Thesis by: C. Ellicott, 04.08.2011

Music activity Hip Hop

1 week of activity

Brit Pop

Online Banking

Indie

FaceBooking

Soul

iTunes Activity

Blues

E-mail Activity Creative Activity

The Beautiful South Carry on Up the Charts

Throw his song Away Old Red Eyes Love Wars We Are Each Other Love Wars 36D Norway Each Other You Keep It All In Bell Bottom Tear Little Time Good as Gold My Book

Adobe Illustrator 1 Hour: 9.08-4.15 July 10 2015 Race Car diagram.eps


Scenario #2: 140

The Changing Digital Landscape « Towards a New Conceptual Framework

A family with demanding computer needs 141

Thesis by: C. Ellicott, 04.08.2011

Smartphone

Media Pr

iPhone

Desktop

Laptop

iPods

Persona: A family and teenagers Sue & John Taylor, children Kelly & Jesse, Jack Ages 48 and 52, 17 and 13, 15

The Taylors have used computers in their lives for awhile now, however, the kids and Sue haven’t a clue how John makes them all work. John installed the Unite system for the family to help the family better share their limited number of computers. John sets up each of the family members their own Unite hard drive for their data and a profile.

Sue is a Social Worker, while John is a Marketing director at a Computer Co. which makes security software for businesses.

The Taylors won’t pay for movies and TV shows as t data. The Unite media pr the family’s scattered dat work from. If the family w their Unite meta data prof to retrieve them again?

Sue’s Phone Profile

Sue’s Profile

As Sue and John both work full time, so their children are left to their own devices a couple hours each day when they get home from school. The family has two main computers however, there can be a real battle for the machines when the whole family is home. The family has been using the unite system to make it easy to separate and control all their individualistic working habits/profiles and to keep data separate while they all use the same machines.

The Taylors have also synched up their media centre using a Unite media centre profile that unites their widespread movie and game files from their various smart phones, Xbox, external drives and computers.

All of Sues data (files and and mirrored in the Cloud on any of the family mach or even her office machin from home.


Scenario #2: cont. 142

143

The Changing Digital Landscape « Towards a New Conceptual Framework

Thesis by: C. Ellicott, 04.08.2011

Media Profile Media Profile

Meta DataMeta Data Media Profile Media Profile Kelly’s Profile Dad has a Dad has a Kelly’s Profile ban on certain ban on certain sites on Kelly’s Profile sites on Kelly’s Profile

Kelly, Jesse use the computers Thewon’t Taylors won’t pay for Cloud for storage for games all their games Kelly, Jesse and Jackand useJack the computers to listen to to listen and to and The Taylors pay for Cloud storage all their download music, use Facebook and do their homework. movies and TV shows as they have several terabytes of download music, use Facebook and do their homework. movies and TV shows as they have several terabytes of Because John doesn’t want the kids deleting any of his data. The Unite media profile John set up is able to unite Because John doesn’t want the kids deleting any of his data. The Unite media profile John set up is able to unite and Sue’s important files he has set up separate the family’s scattered data in one synchronised panel to and Sue’s important files he has set up separate profiles profiles the family’s scattered data in one synchronised panel to each of them. However as he is the administrator, he work from. If the family were to lose all their media files for each for of them. However as he is the administrator, he work from. If the family were to lose all their media files has access to all profiles, and has set up off-limit websites. their Unite meta data profile file contains all the information has access to all profiles, and has set up off-limit websites. their Unite meta data profile file contains all the information to them retrieve them again? to retrieve again?

Sue’s Phone Profile

Sue’sSue’s Phone Profile Profile

Sue’s Profile

John’s Work John’s Work & Home Profile & Home Profile

John, up working home a lota so has a work All data of Sues data and apps) areUnite on the Unite system John, ends up ends working at homeat a lot so has work All of Sues (files and(files apps) are on the system profile set up so there is no problem with files, missing files, and mirrored in the Cloud for extra back up. She can jump profile set up so there is no problem with missing and mirrored in the Cloud for extra back up. She can jump fonts, or programs. Thishim allows him to be at home on any of the family machines as can anyone in the family, fonts, or programs. This allows to be at home on any of the family machines as can anyone in the family, and at at the work at the same time. or even her office machine andaccess quicklyall access all her data and at work same time. or even her office machine and quickly her data from home. from home.

John’s Work, Home John’s Work, Home Media Profile and Media and Profile

Johnfor travels work fairhis bit, so his company Thelike Taylors like the idea data of their datagrowing, ghosts growing, not John travels workfor a fair bit,aso company loan out loan outThe Taylors the idea of their ghosts not an assortment of to laptops to their staff, however only check do they to see how but it looks but see if they an assortment of laptops their staff, however they are they are only do they tocheck see how it looks to see if to they mainly set upcomputer for the computer developers. With Unite are John are close getting their driveAnother space. Another mainly set up for the developers. With Unite John getting to close using to upusing their up drive space. able setlaptop up thewith laptop withofa the click of the He button. He feature of the data that itthem allows to monitor is able toisset uptothe a click button. feature of the data ghost is ghost that it is allows to them monitor have a full working environment within minutes. computer computer usage, shopping ascredit well as credit card activity, can havecan a full working environment within minutes. usage, shopping , as well ,as card activity, asmuch well as much more. as well as more. Source: Copyright 2011 C.Ellicott


144

Building the Design Brief « Towards a New Conceptual Framework

Figures 7.19 - 7.20 (right) The Communication and Social Media Feeds Panel

11. In addition, to further address fragmentation, the panel will manage

Not only does this panel unite all ones communication and social sources but it allows various sort features for viewing the communications as well as The ability to manage the data. A user can upload images from here to Facebook, for example, or delete old view, search old status updates and delete irrelevant or silly

spoken words are preserved only in the fading memory of the people

posts. Copyright 2010 by C. Ellicott.

social networking identities and online avatars. In the physical world,

who hear them, whereas online, those comments can remain current for years. For instance, the expletive-laden childish rantings of the now conservative adult job seeker may be just one Google search away and have serious ramifications for years to come.

As the probe and questionnaire responses suggest, social media is at the core of much of today’s online activity. However, one of the many limitations of social media is that there is no way to manage it cohesively or even to just sort, search, archive and control one’s online personas. As the presumption is that there is only one data ghost (and it presumes a long existence), this singularity would allow individuals better control of social media feeds. The tool could search message boards and other accounts and allow individuals to delete, for example, entire accounts or messages threads. While deleting data, it would also allow the information to be backed up to a cloud storage tagged to indicate that it no longer exists online.

12. Synchronization of data has been made possible with the Cloud and will be made even easier once people’s data is more centralized. Some might argue there is already a fairly comprehensive degree of synchronization available between data with devices today with products such as Drop box or Mobile Me. Certainly, some synchronization does currently exist, but only for fragments of data and devices, and therefore perpetuates a splintered solution. In contrast, the Cloud system allows for synchronization of:

145

Thesis by: C. Ellicott, 04.08.2011


146 Figure 7.21 (right) Example of a Real-Time Synchronized Work Spaces. By hitting the live synchronise button the user is able to synch their live works paces with other devices. If the device doesn’t support all the functionality of the previous device, an alert message will let the user know which apps could not be opened on the current device.

Building the Design Brief ÂŤ Towards a New Conceptual Framework

1. all devices and data 2. real-time (dynamic) work spaces 3. pre-scanned profiles of (static) work spaces

13. The system will create real-time (dynamic) seamless computing work spaces, so that a current work environment can be mirrored in

Copyright 2010 by C. Ellicott.

real-time across any computing device for use on another one. Therefore, if a user got tired of working at his or her desktop, but would like to carry on with the same activities on another device elsewhere, they could do so simply by hitting the real-time synchronize button and choosing which device they want it to synchronize to.

14. Uploading various working profiles into the Cloud would enable quick set-up of other devices as well as fast emergency repair, replacement or upgrading. The ability to re-install all the apps and customized preferences of each app would allow a desktop environment on one computer to be transported to another machine with settings and software synced across machines with various levels of control. The same would hold true for OS X or Linux. The technology would also be able to remember several profiles for different work environments and record all the apps an individual has installed from any app store, automatically installing them on any new device.

Another benefit of locating working profiles in the cloud would be to allow users access to their own work environments (recorded in their working profile) on computers that are not their own. Say, for example, users who do not own a computer may have set up a working profile over time with their favourite desktop, music, videos, video player and applications. When they use a communal computer, such as at an Internet cafĂŠ, they would have their own virtual computer set up exactly

147

Thesis by: C. Ellicott, 04.08.2011


Scenario #3: 148

The Changing Digital LandscapePersona: « Towards a New Conceptual Framework

Travelling Couple Todd & Nancy Hardy Age 27 and 25

Location-independence and a good trusty149 Thesis by: C. Ellicott, 04.08.2011 resource is all that Todd and Nancy need

Journalist and Developer iPhone

Todd and Nancy are computer lovers. They couldn’t imagine their lives without them. They use them in every facet they can to help make their lives more efficient. The Unite system is something Todd has been wanting for sometime now, so when was mentioned, he signed on to be one of the beta testers for it. Todd likes to be able to tinker with computers to make them just right for him, always jail-breaking devices to set them up in a more customised fashion. So the unite advanced customization with no automated settings was the first thing Todd checked for him.

Nook

MacBook Air

Laptop

Smartphone iPod Touch

Todd and Nancy are fitted out, with files and software they need for work, entertainment, and communication.

Item

One day they decided to pick up and go. To abandon the normal working week schedules in favour or travelling a bit and working a bit. Both of them had the kind of job they that translated to being able to do on the road provided they had access to decent wifi access along the way. With bag in tow, but kited out with their main computer devices, they set off for the sky.

With Unite fully in and synched up t business and dail All movie files, m

Fol

Fol

F

It

It

F Packed away in their digital devices and synched up with Unite Todd & Nancy took 675 comic books, 210 novels, 25 games, 527 music CDs, 25 Boxset TV Series, 180 movie DVD’s, 40 audio cassette books, boxes of photos and a lot of software and extra hardware. But luckily, besides Todd’s skateboard it all fit in a suitcase and a carry-on. If Todd and Nancy were to pack the physical items they were taking with them digitally they would need a small Uhaul to carry them.

F

Fol

Fol

Item

They both really It alerted them to had not been acc


Scenario #3: cont. 150

151

The Changing Digital Landscape « Towards a New Conceptual Framework

Customize Interface Customize Interface Add background

IM

Todd (IM) Todd (IM) Hey, Bob, Its Hey, raining, Bob, Its raining, I need to move to my I need to move to my hotel, I’ll catch up, asap. hotel, I’ll catch up, asap.

IM

Create custom folders Add background Create custom folders

Choose home pageChoose home Upload page new view Upload new view Choose label colour backed up filesTag backed up files Choose labelTag colour Fully Automated

Fully Automated

Semi Automate

Semi Automate

No Automation

No Automation

IM

IM

Thesis by: C. Ellicott, 04.08.2011

IM

IM IM

IM

Real-time synched synched environments Real-time environments With Unite fully installed on all their devices and customized With the advanced settings Toddsettings & Nancy customized With Unite fully installed on all their devices and customized With the advanced Todd & Nancy customized and synchedand up to Cloud storage, theystorage, were able to were carry able out to all carry the settings, looksettings, and feel,look to work with to their situation. synched up to Cloud they out all the and feel, work with their situation. business andbusiness daily lifeand as ifdaily they life hadasnot left home almost. allow full location but also not to if they had not left homeTo almost. To allow independence full location independence butbreak also not to break All movie files, documents at their finger bank by storing too in Cloud storage. Theystorage. chose They chose Allmusic, movieTV, files, music, TV,was documents was attips. their the finger tips. the bank bymuch storing too much in Cloud not to back uo files, instance, andinstance, had them notmedia to back uofor media files, for and had them running off arunning hard drive home. They didn’t want off at a hard drive atalso home. They also didn’t want the Nook, and idevices having mirrored drives. the Nook, and idevices having mirrored drives.

Item

Item

Folder

Folder

Folder

Folder

!!!ALERT!!!

A feature Todd and Nancy a Nancy lot is the real-time Todd was outside a cafe, starting his day off byhis answering A feature Todduse and use a lot is the real-time Todd in was outside in a cafe, starting day off by answering synchedenvironments, just one of the many e-mails, reading RSS feeds, and having an (IM) conversation synchedenvironments, just one types of the of many types of e-mails, reading RSS feeds, and having an (IM) conversation synching features. They both thoroughly all the enjoy all with a discussing project while reviewing their Google their Google synching features. They bothenjoy thoroughly theBob discussing with Bob a project while reviewing seamless synching features the system spreadsheet. The heavens opened up seamless synching featuresoffers. the system offers. document and document and spreadsheet. The heavenssoopened up so

Source: Copyright 2011 C.Ellicott

IM

!!!ALERT!!!

Folder Folder These files have NOT been accessed These files have NOT been accessedSMS Item Item since 2003 since Choose item 2003 Choose item Item Item likeWould to delete FolderWould you you them like to delete them Folder

IM

SMS

Would you likeWould a reminder in 1a year you like reminder in 1 year Folder Never delete these Neverfiles. delete these files.

Folder Folder

Todd fled to Todd his hotel jumped netbook. fledroom to hisand hotel room on andhis jumped on his netbook. The real-timeThe sync feature lets Todd hit a button real-time sync feature lets Todd and hit a button and automagically synch up where he up leftwhere off. he left off. automagically synch

Folder

Folder

Folder

Item

Item

They both really littleliked ‘digital alert. Linking up allLinking their communication sources into one stream Theyliked boththe really the hoarder” little ‘digital hoarder” alert. up all their communication sources into one stream It alerted them to the fact that a number of a their files of their files or panel made easy conversation tracking: from e-mail, from e-mail, It alerted them to the fact that number or for panel made for easy conversation tracking: had not beenhad accessed for accessed a long time, didtime, they and ... did they to...Twitter, Facebook, Skype, Instant Messenger, This is a etc. This is a not been for and a long to Twitter, Facebook, Skype, Instantetc. Messenger, feature that they both love, with different ways to sort ways and to sort and feature that they both love, with different view the communications allows for an allows ease offor keeping view the communications an easetrack of keeping track of wanderingofconversations from IM to e-mail, to.... wandering conversations from IM to e-mail, to....


152 Thin Client A thin client (or lean/slim client) is a computer or computer program that depends on a server to fulfill its traditional computation roles. That means that it doesn’t have

Building the Design Brief ÂŤ Towards a New Conceptual Framework

as they like it. All or any chosen native applications would download to the computer on login when the profile is downloaded. On logout, the

leaving it as it was (all of this is customizable, so if the access time is limited, a user may not choose to download the full working profile).

to eat everything you want without gaining any weight. Instead, some other person gets to pack on the pounds. Source adapted from Wikipedia: The Free Encyclopedia.

Thesis by: C. Ellicott, 04.08.2011

Figure 7.22 The Unite System is Both Browser Based and a Native Application Copyright 2010 by C. Ellicott.

profile would delete anything installed on the local drive of the computer

to locally store everything it needs, and instead Imagine being able

153

Note: At the very extreme and most ideal situation the user would be able to sit at any computer or thin client and within minutes have their main working environment downloaded, complete with their favourite operating system and set up.

15. The control panel would locate storage space and give options based on the data the control panel retrieves and unites from an individual’s computing and storage devices. It would allow users to mirror and duplicate whatever data they want in the Cloud. A further feature is that the control panel would look for storage services to accommodate data, which would be especially applicable to users who have so much data, they need to pay a monthly fee for it. The panel would find the most economical storage solutions. This would be particularly relevant for the high-use and literate participants.

16. This system will come as an installable application as well as a browser-based application. While the Unite system could work solely in a web browser environment, the more powerful application would be recommended. This would then help the application circumvent any bandwidth problems that could arise from it being solely browser-based. Another feature is that it would give the option to automatically install the application across all other devices, thus saving time and energy on multiple installations and upgrades


154

155

Building the Design Brief ÂŤ Towards a New Conceptual Framework

Figure 7.23 The Main Profiles That a Users Device Would Upload to the Cloud.

Operating System Setting Profile Apps and Application Profile Bookmark Profile Mail Setting Profiles Contact Profiles Aliase Profiles Data Storage Profile

Thesis by: C. Ellicott, 04.08.2011

cloud

Working profiles of each device saved to the Cloud makes for easy access—they allow the computer small access files in order to make the system more efficient. They help the computer prioritize so it can put secondary needs in the background working. Copyright 2010 by C. Ellicott.


Scenario #4: 156

The Changing Digital LandscapePersona: « Towards a New Conceptual Framework

Widowed Wife Joan Whynott Age 62

Joan now out of a job doesn’t own a computer, 157 Thesis by: C. Ellicott, 04.08.2011 but does have computer needs.

Office Administrator Joan was just let go from her office job, due to downsizing and to her surprise, much earlier than she had anticipated.

iPod Touch

She will need to look for a new job to keep her quality of lifestyle. Joan is a vibrant woman, actively involved in associations, gardens, walks regularly, as well as does pilates. She loves bowling with her young grandchildren and often takes them or a friend to a a sunny destination for a vacation every year.

Joan, basically is not big into computers, at least not at home. She uses her desktop at work for a few personal e-mails and storage as they are so few and far between. Joan isn’t a luddite, but would most likely be considered a beginner. Her work demands that she use some limited programs, e-mail, Word, Excel.

Joan is not intimidated by the new computers, but does admit she is not very proficient, even sometimes her grandchildren can show her a thing or two.

Joan has been let go from her job and it was suggested that she sign up and upload any of her personal her files to the Unite system. She did have a few files she’d like to save, recipes from work mates, photos, resume, e-mail addresses, etc.


Scenario #4: cont. 158

The Changing Digital Landscape « Towards a New Conceptual Framework

As Joan has to update her resume she also needs access to her old files from her work computer that are now in the Unite system, in this case an internet cafe. Unite found Joan 20GB free storage, more than enough room for her files. At the cafe Joan downloads her old work environment right down to apps and her old desktop pattern.

However, as Joan doesn’t own a license for Word, Unite alerts her to this and suggests she download a 30 day trial or use Google docs (free). After using the system a few times, Joannotices that it has a page that records all the last programs and files she’s used. This makes things quicker for her.

A feature that has become useful but is new for Joan is the ability to access her recipe files from her iPod Touch, She uses dictation to put her shopping list on the iPod, but on occasion, if she sees a special on at the grocers and will look up an appropriate recipe by synching with her Unite data.

As Joan has been spending more time at the Internet cafe, she has realized there is a digital world opening up to her, especially having her own data ghost, Unite sys. Downloading podcasts and music while she works makes for a comfortable environment which she then synch with her iPod to walk to. Source: Copyright 2011 C.Ellicott

159

Thesis by: C. Ellicott, 04.08.2011


160

161

Building the Design Brief « Towards a New Conceptual Framework

SUMMARY

I call it the Internet of One. I want it to be mine, and I don’t want to work

The design of a system like Unite would enable users to more effectively

too hard to get what I need. In a way, I want it to be HAL. I want it to learn

control and manage all their data. United together, individuals could own

about me, to be me, and cull through the massive amount of information

a vast virtual computer that is now merely analogous to the original

that’s out there to find exactly what I want. (Fussman, 2010. para. 32)

ownership over personal data. As all online accounts and online identities

been proposed here, she does summarize much of what this design

would be administered through a single control, it would be easier to

brief intends to accomplish.

delete and archive at the touch of a button. The proposed control panel will attempt to personalize and simplify the The design of a system that appears simple at the outset but, over time,

computing experience for a variety of Canadian computer users. Such

makes its depth and complexity more apparent to the user, was based

an outcome should cut down on privacy and ownership issues as well as

on the simplicity principle that designers like John Maeda apply to their

feelings of stress, disconnection and anxiety as it helps individuals become

creations. Such a simple system would give users the ability to sit at any

substantially less fragmented in their virtual lives.

devices, digital life and data. By changing the emphasis from the computer to the person and creating a unified computing experience which travels with the person like a ghost, some of the affects of the demanding machine on the individual will be mitigated.

To unite working environments, data and devices into one cohesive whole is something people have been dreaming of for years. The current computing paradigm with its inconsistent bandwidth can create bottlenecks preventing efficient work environments and seamless personal computing experiences. The words of Yahoo CEO Carol Bartz echo many of the needs expressed by the probe respondents. In an Esquire interview, Bartz mentioned wanting a more personalized computing experience:

from the Space Odyssey films and books. Hal interacts with the crew and helps them through their travels. He appeared more human than did to help them out? Source adapted

While Bartz’s vision may even be a little more futuristic than what has

users would be able to take more control over their computing experience,

lived on the Discovery One spaceship

the crew. Who wouldn’t want a HAL

independence, synchronization and mobility and might also provide

inconvenience. Rather than being controlled by the computing devices,

HAL A conscious, feeling computer that

physical one. This would allow for greater freedom in terms of location-

computer and synchronize their experience with a minimum amount of

Thesis by: C. Ellicott, 04.08.2011

from Wikipedia: The Free Encyclopedia.


163

08 Conclusion & Suggestions


164

165

Conclusions and Suggestions ÂŤ Towards a New Conceptual Framework

INTRODUCTION

on the benefits of computing products it produces. This can be done

This study describes and explores the rapidly changing digital landscape

by consciously reflecting on the larger context of computer usage

and its impact on the personal computer user. The landscape has grown

(i.e., historical, environmental and social) and by truly listening to

out of a business-dominated model, with the interests of experts and

the individual personal computer user. As in this study, using people-

corporations dominating those of the individual. The study confirms that

focused methodologies would be a good place to start.

the rapid evolution of technology and lack of synchronization have contributed to fragmentation, depersonalization, and a new level of

This study applied Action Research methodology in order to ensure

complexity in people’s lives. Although computers were intended to

a fluid motion of input and analysis, and to keep the study accurate

enhance daily activities and make tasks easier, this is not always the case.

and relevant. Personal computer users were involved in the design

From the literature review, it is evident that we are at a turning point in

process from the outset through participatory and collaborative research

the computing evolution. The scattering of data across multiple devices

methods. This produced rich and authentic results, however vast and

(many of which do not or simply cannot communicate with each other)

varied. One of the drawbacks of this approach is that it is very time-

is reaching near-crisis proportions. Now is the time for design to make a

consuming with regards to results interpretation. The assumption is

difference. Tech-savvy designers need to re-examine the type of products

that, unlike what happened in this study (due to time constraints),

and services that are being produced and not only come up with something

the consumer would be involved in the full process, both research

better but something that resolves the multiple devices dilemma. For the

and design. Ideally moving forward, a continued interactive process

most part, current design has been caught up in a directionless frenzy,

and an increase in the size of the participant pool would help to make

producing numerous apps and devices for the booming mobile phone

an extremely relevant and valuable system design.

industry. As a consequence, there are a large number of products on the market that are of little real benefit to the consumer.

At its core, this study addressed the salient and user-driven issue of data fragmentation in a theoretical way and also revived the analogy of the

If, instead of following the herd and the fast buck, designers took their

ghost in the machine as a viable solution to data scattering and multiple

cue from researchers outside the corporate enclosure, products of real

devices. The ghost in the machine is a philosophical mechanism to show

value to the consumer could emerge. From their unique vantage point

the current technological shift from something that was previously

of being both creator and enhancer, designers have the ability to pose

physical to something that is a virtual extension of both the technology

the question as well as the power to impact the answer. How people will

and the user. At this point, the ghost in the machine analogy has been

personally compute into the future is a pivotal question that requires

not explored to its full potential. While the use of this analogy was key in

urgent and in-depth investigation leading to a people-friendly answer.

the development of the system, it was not introduced to the participants

In this investigation, design needs to take a more active role in reflecting

nor was it part of the analysis study research. Nevertheless, it proved

Thesis by: C. Ellicott, 04.08.2011


166

167

Conclusions and Suggestions « Towards a New Conceptual Framework

helpful in conceptualizing a unifying framework for designing the system

In exploring the above issues and problems, one talking point could be

and should therefore be part of future participatory research, if indeed

whether the computer divides people or brings them closer together,

such research were to proceed. The analogy’s reception by the general

as was alluded to in the literature review. The Unite system attempts

public remains to be seen, but its usefulness in describing a shift from

to address this potential division by increasing access to computing

the physically real to the virtually real should be explored.

experiences for all people, regardless of socio-economic conditions or

The ghost in the machine concept helped the designer to:

user abilities. The system is truly democratic, being neither hardware nor

1. Conceptualize the computer as an idea as opposed to

location dependant, universally accessible, and based on an open source

a piece of hardware

platform. The major value of this project and thesis study is that its findings

2. See the vastness of individuals’ digital collections

have opened up the possibility to a more person-centered form of

3. Unify data into an extension of an individual as opposed

computing that simplifies rather than complicates people’s lives. As such,

to a machine

this people-friendly system belongs in the realm of a social invention, like Wikipedia, open source, etc. The technology exists already to create such

The purpose of the new control panel system, as an application, is to unite multiple data and identities across several devices. It aims to address some of the specific issues raised by participants in the study, most notably fragmentation and lack of synchronization caused by too many devices and data sources. A control panel that allows users to access their scattered data through one portal will simplify the computing experience and help them manage all their data from one point.

To reduce complexity, the system includes simplifying features such as a retinal scan that will allow for quicker and simpler entry. It also includes self-organizing data management controls and views plus a self-modifying habit inclusion. The system is based on the study of the participants and was designed to appeal to a wide range of users, right down to personalizing one’s data with the data ghost view of an individual’s living breathing data. If this control panel were to get to the production stage, it would revolutionize personal computing.

a unifying computer experience, and this thesis confirms its need.

Thesis by: C. Ellicott, 04.08.2011


168

Conclusions and Suggestions « Towards a New Conceptual Framework

169

SUGGESTIONS FROM THE THESIS A gap identified in the thesis process was the absence of non-computer owners in the participant study. Including this group in another collaborative study would serve to extend the social capacity of this design, as this group may represent different socio-economic backgrounds and education levels.

Furthermore, since the system platform is based on a non-commercial technology, more in-depth research on altruism in technology would be useful. Access to computing is becoming much like access to fresh water, clean air, libraries, etc., in its commonality and necessity. (See Elinor Ostrom’s Collective Action and the Evolution of Social Norms, Revisiting the Commons: Local Lessons, Global Challenges.)

Personal digital curation is another topic for future study, as there is little research in this area to date and its findings could positively impact this system. Currently, there is a vast amount of subjectivity in how users collect, manage and file data, and cataloguing of personal preferences could contribute to the system’s feature options.

Finally, design schools could offer Participatory Research Method courses to generate a culture that strives towards an interactive design process.

09 Bibliography


170

Bibliography « Towards a New Conceptual Framework

Akst, D. (2005). On the contrary; unbundles of joy. New York Times. Retrieved 9/11/2010, 2010, From http://query.nytimes.com/gst/fullpage.html?res=9501e 4dc1131f932a25751c1a9639c8b63 Aldersey,W, H. (1990). Cranbrook design : the new discourse. New York: Rizzoli. Allan, R. A. (2001). Personal Computing in the 1960s. A history of the personal computer: The people and the technology (pp. xxxiii-xlviii). London, Ont.: Allan Pub. Anderson, C. & Wolff, M. (2010, August). The Web Is Dead. Long Live the Internet. Wired Magazine. Retrieved August 29, 2010, from http://www.wired.com/ magazine/2010/08/ff_webrip/all/1 Anderson, R. (2011). Average Time Spent Online Per U.S. Visitor In 2010, ComScore Data Mine. Retrieved 2/15/2011, 2011, From http://www.comscoredatamine. com/2011/01/average-time-spent-online-per-u-s-visitor-in-2010/ Ballmer, S. (2010). [Speech At Uw: “We’re All In” For Cloud Computing]. Seattle Times. Retrieved January 22, 2011, from http://blog.seattletimes.nwsource.com/ techtracks/2010/03/04/Steve_ballmer_speech_at_uw_were_all_in_for_ cloud_c.html BBC News, (2010) First human ‘infected with computer virus’. British Broadcasting (BBC). Retrieved 11/1/2010, 2010, From Http://Www.Bbc.Co.Uk/ News/10158517

Thesis by: C. Ellicott, 04.08.2011

171

Bruce, H. (2010) Personal anticipated information need. (Paper) Retrieved 11/1/2010, from Information Research website: http://informationr.net/ir/10-3/paper232.html Buchanan, M. (2010). Why aren’t i the center of the apple universe? Gizmodo. Retrieved 7/7/2010, 2010, From http://gizmodo.com/5552953/why-arent-i-thecenter-of-the-apple-universe Buckley, P. (2010). The rough guide to cloud computing. London [England: Rough Guides. Campbell, S. (2006, January 11). USC Study Finds Broadband to be Most Popular Type of Internet Connection. World’s Largest Communications And Technology Community. Retrieved January 12, 2011, from http://news.tmcnet.com/news/2006/ jan/1277873.htm Carr, N. G. (2008). The big switch : rewiring the world, from edison to Google (1st Ed.). New York: W.W. Norton & Co. Carr, N. (2010) Be Everywhere Now. [Web log post]. Retrieved 11/1/2010, 2010, from http://www.roughtype.com/archives/2009/11/be_everywhere_n_1.php Clement, W. (1983). Class, power, and property: essays on Canadian society. Toronto: Methuen.

Berger, W. (1999, Feb.). Lost in Space. Wired Magazine . Retrieved August 28, 2010, from http://www.wired.com/wired/archive/7.02/chiat.html

Colbert, D. (2010, May 26). Facebook proves that the erosion of privacy is inevitable. TechRepublic - A Resource for IT Professionals. Retrieved October 12, 2010, from http://www.techrepublic.com/blog/tr-out-loud/facebook-proves-that-theerosion-of-privacy-is-inevitable/2053

Berger, W, & Mau, B.(2009) Glimmer: How design can transform your life, and maybe even the world. New York: Penguin Press.

Coates, T. (2011). The importance of making things technology. The Atlantic, Retrieved 8/16/2010, 2010, from http://www.Wikinvest.Com/Concept/Cloud_computing

Bijker, W. E. (1995). Of bicycles, bakelites, and bulbs : toward a theory of sociotechnical change. CambRidge, Mass.: Mit Press.

Concept: Cloud Computing. (n.d.). Wikinvest. Retrieved July 7, 2010, from www. wikinvest.com/concept/Cloud_Computing

Bourne, C. P. & Hahn, T. B. (2003). Early Research A history of online information services (pp. 11-23), 1963-1976. Cambridge, Mass.: MIT Press.

Cowan, R. S. (1976). The “industrial revolution” in the home: household technology and social change in the 20th century. Technology And Culture Magazine, Vol. 17 (No. 1), Nov 15 2010.

Brace, I. (2004). Questionnaire design : how to plan, structure, and write survey material for effective market research. London ; Sterling, Va: Kogan Page.

Cross, N. (2006). Designerly Ways Of Knowing. London: Springer.

Brockman, J., & Pepperberg, I. M. (2010) The world question center “How is the internet changing the way you think?” (pp. 10). EDGE, by Neiman Reports. Retrieved March 8, 2011, from http://www.edge.org/q2010/q10_10.html

D’Souza, L., & Sculley. (2011). The steve jobs guide to creating successful products. The Edge of Internet Marketing | Marketing Bones . Retrieved Nov 8, 2010, from http:// marketingbones.com/the-steve-jobs-guide-to-creating-successful-products/


172

Bibliography « Towards a New Conceptual Framework

Davies, C., & Parrinder, M. (2010). This Page Is No Longer On This Server 2 . Limited Language. Retrieved 10/26/2010, 2010, from http://www.limitedlanguage.org/ discussion/index.php/archive/This-Page-Is-No-Longer-On-This-Server-2/ Davies, C., & Parrinder, M. (2010). Tactile Graphics : Emerging Methodologies. Limited Language. Retrieved 10/26/2010, 2010, from http://www.limitedlanguage.org/discussion/index.php/archive/tactile-graphics-emergingmethodologies/

Thesis by: C. Ellicott, 04.08.2011

173

Gopnik, A. (2011, February 14). How the Internet Gets Inside Us. The New Yorker. Retrieved February 18, 2011, from http://www.newyorker.com/arts/critics/ atlarge/2011/02/14/110214crat_atlarge_gopnik#ixzz1DwfcfRG4 Grant, A. E., & Meadows, J. H. (2010). Communication technology update and fundamentals (12th ed.). Amsterdam: Focal Press/Elsevier. Gruber, J. (2011). John Gruber | Quotes on Design. Quotes on Design. Retrieved March 28, 2011, from http://quotesondesign.com/john-gruber/

Davies, C., & Parrinder, M. (2010). Multiverso. Limited Language. Retrieved 10/26/2010, 2010, from http://www.limitedlanguage.org/discussion/index. php/archive/multiverso/

Hansen, E. (2008). Charting The Future Of Cloud Computing. Wired Magazine. Retrieved 8/13/2010, 2010, From Http://Www.Wired.Com/Epicenter/2008/12/ Charting-The-Fu/

Economist. (n.d.). Pocket world in figures: computer ownership. The Economist. Retrieved September 8, 2010, from http://www.economist.com/research/ articlesBySubject/displayStory.cfm?story_id=12758865&subjectID=348909&f src=nwl

Hillis, D. (2010). Early Responders: In John Brockman (Ed.), EDGE, by Neiman Reports. Retrieved January 17, 2011, from http://www.edge.org/q2010/q10_10.html

Erickson, T., & Mcdonald, D. W. (Eds.). (2008). HCI Remixed : essays on works that have influenced the HCI community. Cambridge, Mass.: Mit Press. Flosi, S. L. (2011). Comment On Top Mobile Activities In The U.S. ComScore Data Mine. Retrieved 2/15/2011, 2011, From http://www.comscoredatamine. com/2011/01/Comment On Top Mobile Activities In The U.S.htm Friedmann, A. (2001). Writing for visual media. Boston: Focal P. Fussman, C. (2010, May 3). Carol Bartz bio - Quotes by Yahoo CEO Carol Bartz Esquire. Retrieved July 14, 2010, from http://www.esquire.com/women/ women-issue/carol-bartz-bio-0510 Gantz, J. F. (2007). The Diverse and Exploding Digital Universe. EMC-Analyst Reports. Retrieved October 1, 2010, from www.emc.com/collateral/analystreports/diverse-exploding-digital-universe.pdf Gilder, G. (2010). The information factories. Wired Magazine. Retrieved October 10, 2010, from http://www.wired.com/wired/archive/14.10/cloudware. html?pg=1&topic=cloudware&topic_set= Goldstein, E. (2010) Software to help with our web addictions: dealing with stress and anxiety management. Mental Help. Retrieved 7/7/2010, from http://www. mentalhelp.net/poc/view_doc.php?type=doc&id=38246&cn=117

Higginbotham, S. (2010, August). Stats: The Age of the Internet of Things Has Dawned. Technology News, Analysis and Trends. Retrieved January 12, 2011, from http://gigaom.com/2010/08/10/stats-the-age-of-the-internet-of-things-hasdawned/ Hoffman, D. (1994). Architecture Studio : Cranbrook Academy Of Art, 1986-1993. New York: RiZzoli. Hofstadter, D., Kokinov, B. N., Holyoak, K. J., & Gentner, D. (2001). The analogical mind: perspectives from cognitive science. Cambridge, Mass.: MIT Press. Ingo, H. (2006). Open life: the philosophy of Open Source (1. Engl. language ed.). S.l.: Lulu.com. John, R. (2005). Stupid, ugly, unlucky, and rich: spike’s guide to success : what really leads to success, and it’s not smarts, looks, or luck. Toronto: Train of Thought Arts. Ju, W. (2010) In Traction » Proactive. Retrieved 11/1/2010, From http://blog.jozilla.net/ tag/proactive/ Ju, W. & Leifer, L. (Summer 2008). The design of implicit interactions: making interactive systems less obnoxious. Design Issues: Vol. 24, Number 3, pp. 72-94. Retreived from http://interruptions.net/literature/Ju-DesignIssues08p.pdf Ju, W., Lee, B. & Klemmer, S. (November 8–12, 2008). Range: exploring implicit interaction through electronic whiteboard design. Paper presented at (CSCW) Computer Supported Cooperative Work Conference, San Diego FL. Abstract retrieved from http://portal.acm.org/citation.cfm?id=1460569&dl=acm&coll=dl&c


174

Bibliography « Towards a New Conceptual Framework

fid=16544834&cftoken=50251376

Thesis by: C. Ellicott, 04.08.2011

175

effects. Toronto: Penguin Canada.

Kelly, K. (2005). We Are The Web. Wired Magazine, 08(13), Retreived 12/15/2010 from http://www.wired.com/wired/archive/13.08/tech.html.

Norman, D. Affordance, Conventions And Design (Part 2). Retrieved 7/7/2010, 2010, from http://jnd.org/dn.mss/affordance_conventions_and_design_part_2.html

Klanten, R. (2008). Data Flow : Visualising Information In Graphic Design. Berlin: Gestalten.

Norman, D. Affordances And Design. Retrieved 7/7/2010, 2010,from http://jnd.org/ dn.mss/affordances_and_design.html

Kuniavskya. M, (2009). Information shadows: how ubiquitous computing serializes everyday things. Informa Ltd: Mortimer House, London UK: Routledge.

Norman, D. (2007). The Complexity Of Everyday Life. Retrieved 7/9/2010, 2010, from http://jnd.org/dn.mss/the_complexity_of_everyday_life.html

Lakoff, G., & Johnson, M. (1980). Metaphors We Live By. Chicago: University Of Chicago Press.

Oldach, M. (1995). Creativity For Graphic Designers. Cincinnati, Oh: North Lights Books.

Lanier, J. (2010). You Are Not A Gadget. Random House Of Canada.

Parr, B. (2010, February 16). Facebook is the web’s ultimate timesink [stats]. Mashable: The Social Media Guide. Retrieved February 15, 2011, from http:// mashable.com/2010/02/16/Facebook-Nielsen-Stats/

Lenin, V. I., & Žižek, S. (Eds.). (2002). Revolution At The Gates : A Selection Of Writings From February To October 1917; Selections. English. 2002. London ; New York: Verso. Lima, M. (2009). Information visualization manifesto. [Web Log Post]. Retrieved 07/22/2010, 2010, From http://www.visualcomplexity.com/vc/blog/?p=644

Pepperberg, D. (2010). I think, therefore i am — still me: In Michael Shermer (Ed.), EDGE, World Question Centre. Retrieved January 17, 2011, from http://www.edge. org/q2010/q10_10.html#pepperberg Pinker, S. (2002). The blank slate : the modern denial of human nature. New York: Viking.

Lucchetti, S. (2010). Cloud computing: what will we lose to it? Technorati. Retrieved 10/26/2010, 2010, from http://technorati.com/technology/it/article/ cloud-computing-what-will-we-lose/ Madrigal, A. (2010, August). What’s Wrong With ‘X Is Dead’. The Atlantic. Retrieved August 20, 2010, from http://www.theatlantic.com/technology/ archive/2010/08/whats-wrong-with-x-is-dead/61663/ Maeda, J. (2006). The Laws Of Simplicity: Design Technology, Business, Life. Cambridge, Massachusetts: The Mit Press. Margulis, L. (2010). By affording me new worldwide scientific communication access: In Michael Shermer (Ed.), EDGE, World Question Centre. Retrieved January 17, 2011, from http://www.edge.org/q2010/q10_10.html#pepperberg Mark, J., & Wolf, P. (2008). The video game explosion: A history from pong to playstation and beyond. Westport, conn.: Greenwood press. Mattelmaki, T. (2006). Design probes. Vaajakoski, Finland,: Gummerus Printing. Retrieved from www.uiah.fi/publications. Mcluhan, M. & Fiore, Q. (2003). The medium is the massage : an inventory of

Pinker, S. (2008). The stuff of thought : language as a window into human nature. New York: Penguin. Pipes, R. (1999). Property And Freedom. New York: Alfred A. Knopf. Pirsig, R. M. (1974). Zen and the art of motorcycle maintenance : an inquiry into values. New York: Morrow. Richtel, M. (2010, May). Your brain on computers - Attached to technology and paying a price. The New York Times. Retrieved July 7, 2010, from http://www.nytimes. com/2010/06/07/technology/07brain.html?src=me&ref=technology Rifkin, J. (2000). The age of access : the new culture of hypercapitalism, where all of life is a paid-for experience. New York: J.P. Tarcher/Putnam. Riley, T., & Museum Of Modern Art. (1999). The un-private house. New York : Museum Of Modern Art: Distributed By Harry N. Abrams.


176

Bibliography « Towards a New Conceptual Framework

Rivera, J. (2010). Cloud computing for personal use. The Epoch Times. Retrieved 10/26/2010, 2010, from http://www.theepochtimes.com/n2/content/ view/29794/ Rosenwein, R. (1999) Why Media Mergers Matter. Brill’s Content, Retrieved from http://www.brillscontent.com/1999dec/features/bigmedia_mergers.shtml Rowan, D. (2011, March). Rentalship is the new ownership in the networked age. Wired Magazine. Retrieved March 11, 2011, From http://www.wired.com/ epicenter/2011/02/rentalship-the-new-ownership/ Samuel, L. R. (2001). Brought to you by: postwar television advertising and the American dream. Austin: University Of Texas Press. Ryle, G. (1981). Gilbert Ryle’s Descates myth. In Morick, H. (Ed), Introduction to the Philosophy of Mind: Readings from Descartes to Strawson (pp. 27-39). New Jersey: Humaanities Press. Schmidt,E. (2006, August 9). [Conversation at a Search Engine Strategies Conference]. Retrieved Dec 8, 2010, from http://www.google.com/press/ podium/ses2006.html Shah, A. (n.d.). Media conglomerates, mergers, concentration of ownership. Global Issues. Retrieved January 8, 2011, from http://www.globalissues.org/ article/159/media-conglomerates-mergers-concentration-of-ownership Smeagol Studios. (n.d.). The mother of all demos. [Video file]. Retrieved February 8, 2011, from http://www.youtube.com/watch?v=jnwppf6hLiA&feature=related

Thesis by: C. Ellicott, 04.08.2011

Swann, C. (Winter 2002). Action research and the practice of design. Design Issues: Vol. 18, Number 2, pp. 72-94. Swedin, E. G., & Ferro, D. L. (2005). Computers : the life story of a technology. Westport, Cn: Greenwood Press. Thackara, J. (2005). In the bubble : designing in a complex world. Cambridge, Mass.: Mit Press. Thagard, P. (2005). Mind : introduction to cognitive science (2nd Ed.). Cambridge, Mass.: Mit Press. Tsao, J. Y. (2009). Curious Displays. [Video File]. Retrieved July 4, 2010, from vimeo. com/9486977 Weinschenk, S. (2010). The Psychologist’s View of UX Design. UX Magazine | Defining and Informing the Complex Field of User Experience (UX). Retrieved Dec 17, 2010, from http://uxmag.com/design/the-psychologists-view-of-ux-design Williams,P., Leighton ,J., & Rowland, I. (2009). The personal curation of digital objects, a lifecycle approach. Aslib Proceedings: New Information Perspectives, 61(4), 340--363 Retreived from http://www.emeraldinsight.com/journals.htm?articleid= 1800798&show=abstract Yan, L. (Ed.). (2008). The internet of things from RFID to the next-generation pervasive networked systems. New York: Auerbach Publications.

Stallman, R. (n.d.). Why software should not have owners. Free Software Foundation (FSF). The GNU Operating System. Retrieved March 8, 2011, from http://www.gnu.org/philosophy/why-free.html Steen, M. (2003, Sept.). Exploring ‘human centred’ approaches to market research and concept development for creating more value with ICT. Paper presented at COST269 conference Good Bad Irrelevant, Helsinki. Abstract retrieved from http://www.mozaiek.dds.nl/docs/cost269humancentred.pdf Schmidt,E. (2006, August 9). [Conversation at a Search Engine Strategies Conference]. Retrieved Dec 8, 2010, from http://www.google.com/press/ podium/ses2006.html Sterling, B. (2005). Shaping things. Cambridge, Mass.: Mit Press.

The easier you make it for people to go, the more likely they are to stay. — DAVE WINER


i

10 Appendices


ii

iii

Appendix A « Towards a New Conceptual Framework

Appendix A: Probe PAck CUSTOM DIARY DESIGN

Your user-centered diary pack

Q. Tell me a bit about yourself.

How & where do you watch videos, listen to music, read books?

Q. Tell me about yourself. (more room. if necessary..)

What would you take with you to your dream place? Is this place real or virtual?

PHOTOS PLEASE

Q. Tell me about yourself. (more room to write...)

This is me

Name: Address: Employment: Married, Single, Separated, Divorced, Widowed: How do you mainly commute and get around: Children:

Your dream place and why?

Year Born: Extracurricular activities: How & how often do you listen to music: How often do you read books: How & how often do you watch films: Other: Number of personal & work computers, mobile and external devices: How & where do you watch videos, listen to music, read books?

PHOTOS PLEASE

Your dream place and why?

What would you take with you to your dream place? Is this place real or virtual?

more room for thoughts over....

This diary-survey is based on user participation by means of evaluating self-documentation. So the user–that’s you– collects and documents daily thoughts and creates materials, working as an active participant in this design process.

Q.

INSTRUCTIONS: SUBMIT BY: November 21st Document your routines and feelings (centered around your use of your personalcollections like; clothes, kitchen, artifacts, music, video....) for 5 days. Describe what you have been up to, how you organise, manage and retrieve your “stuff”, and any emotions associated with those activities.... HOW: There is no wrong way to document or answer these questions. Use coloured pencils, scraps of paper, a camera, your computer, to help document your diary. It can be a series of stories or anecdotes, sketches, rough notes, bullet points. Or if you are more adventurous, try video, collage materials, post-its, random findings even found drawings. The more creative, descriptive and truthful the better.

PHOTOS PLEASE

How do you create, organise, manage, use and retrieve your physical and digital collections or things?

SEND ME YOUR FILES: Send me your scraps of paper or scans or photos. I will pay for postage, should you want to just send physical materials back. OR Email me at candace004@gmail.com Vid Ingelevics - hunter / gatherer/image #1 (Oct.29 2010) http://www.web.net/artinfact/Hunter_Gatherer-1.htm

Can you tell me or map out the spaces you like to work, rest and think in. How do you feel in them? What’s impor- tant about them?

Thesis by: C. Ellicott, 04.08.2011


DAY 1: of a 5 day diary

DAY 2:

(does not have to be consecutive)

Today (Use the basis of day 1 to write about each of the week’s daily entries, plus any other thoughts or questions you may want to add)

Date:

Date:

Woke up....

v

Appendix A « Towards a New Conceptual Framework

How often do you misplace items in your day? What are they?

Do you know what you want to wear ahead of time? How do you find and choose clothes, shoes, etc...

Had to look for...

Needed to bring...

Used _________________computer/smartphone for ______ hours at work

Used_________________computer/smartphone for ______ hours at home

Organised, retreived my....

How do you put things away yet keep them top of mind when you need them? Draw, photograph, explain.

Filed...

Finished work and...

Listened/watched/read...

Q. How do you relate to your desk? What does the “desk” or the “desktop” mean to you?

Some Examples:

DAY 3:

DAY 4:

I work at home

Date:

Date:

I work in my car

Today....

Today....

My desk is my iphone I work in StarBucks

Pens Pencils Ruler Computer Light Umbrella k work work work work work wor Files inet Cab g Filin & much much more

Thesis by: C. Ellicott, 04.08.2011

Photograph or record some of your personal collections. How do you organise them, and keep them? PHOTOS PLEASE

iv

Would you say you were organized, disorganized? What does that mean to you? Take a photo of your most annoying space in your place, and why? How often do you misplace stuff? The most common items?

mes, music, for play- ga sk-ICK My desk is is a work de at th KOR NEVER W

Do you think a messy desk is a sign of a messy mind?


vi

vii

Appendix A ÂŤ Towards a New Conceptual Framework

Appendix B: Probe PAck RECIPIENTS

DAY 5: of 5 days...

phew finally done this invasive diary, what do I win?

Date:

amplse: An Ex My Collection

8 were en my parents not a saver. Wh through all my Generally, I am house, I sor ted new ir -old the out to it moving most of stuff and threw all of old high school I have archived letters and all. er boyfriend love I sent each oth and d ban hus k that the emails my I have a big boo e married, and before we wer playing. nis ten my s chronicle keeping to buying and I am attracted As a librarian, t too much. The tha do to not sharing books, but I try for getting and nderful place Grantas library is a wo exceptions, the few a of are re a little treasure books. The se. Granta is like something new being one of tho find pick it up and scan tran You ays g. readin and ess time. The stories to read every er places. por t you to oth par t n unwilling to tion I have bee y and Kid Another collec a Stewar t Bab rth Ma se, old the my ing with is publish y are no longer magazines. The e fun of hav I lth and wea old ones for the hung on to the t are contained s, and ideas tha projects, recipe ly m. within the jects are insane some of her pro of a way to make It is true that k my I can usually thin de but ma x, e ple com es. We onc for our purpos them simpler een costume ind eagle Hallow bal yon cra ely, lov lted a me son We of her designs. cookie spired by one as favors. And r shapes to give bits into heart l a crowd please shapes are stil ich dw san cutter with the kids. of good collection assing a pretty I seem to be am

August 2, 200

Today....

How do you feel in a messy space, clean space, dirty space, outdoors, a cafe...

Tell me a story about managing your personal collections...

RECEIVE QUESTIONNAIRE

Questions Asked via E-mail I was hoping I might just ask a few more questions of you, if possible?

1. How many years have you owned and operated a computer? 2. Do you use a different computer for work than at home, or do you

share files so you can work at home?

3. How many hours total do you operate a computer/smartphone/e-

reader per day?

4. How much has it changed from your usage today as opposed to

10 years ago?

5. I’m on the computer at least 5 hour more than 10 years ago. 6. What technologies/media do you use?

Thank You very much.

Sorry the prize is a trip to Guadalupe with me. Ack. The thesis trench!

- PC

- laptop

- smartphone

- with dataconnection or wifi only

- ipod touch with wifi

- ipad/tablet wifi (or not)

- external devices

- television

- cable

- stereo

-other

7. How often do you use each of these devices per day? 8. What do you use each of these for?

- smartphone - calls, games, texting

- with dataconnection - work | wifi only - home

Thesis by: C. Ellicott, 04.08.2011


viii

ix

Appendix B ÂŤ Towards a New Conceptual Framework

9. How do you feel about online privacy issues? Security?

23. Do you have different computers containing different stuff/software

10. Do you use any of these services:?

so have to use specific computers in order to do certain tasks?

- Gmail/yahoo mail

24. Would it be useful to you to have ALL your computers/smartphones/

- Flickr

devices synched be able to access all of your data/photos, external

- Facebook

devices, bookmarks, address books, etc

- Google apps (which ones)

25. Are you willing to pay for online storage space, now or eventually?

- Dropbox (or other online storage)

If so what would you be willing to pay?

- Post on You Tube/Vimeo

27. Have you ever used Netflix? or Do you rent video? Or Download?

- Blog software

28. Do you read books online or physical books or both?

- Digg, reddedit, tumblr, delicious

Magazines

- Or any other online services?

29. What do you do if you loose access to your computer?

11. Would you like a computer device that simplified and organized your

30. What do you do when you loose internet access?

files based on a pattern you established?

31. Have you bought an iphone/ipod app ever?

12. Would the ability to synchronies all your devices TO ALL YOUR data

If no, where do you get apps if you have an I-product?

files, images, memories, fonts, music, movies, archives and software

32. Do you own a physical cd and video collection?

through 1 control panel be useful?

Or do you have any/all of your music on an online source?

13. Do you know what cloud services are? have you heard of the term

33. Which music collection is bigger, digital vs physical? Which is more

before now?

convenient or better?

14. Do you ever listen to Music or videos online, with what?

34. Would you be willing to pay for music on a music service like

15. Do you use Skype or use Facetime, or another video conferencing

Grooveshark?

software?

35. Would it be a useful to be able to shut off and play your music,

16. How long do you spend organizing and sorting email

stream movies and television, queue reminders on your way out the

17. Do you pay for extra online services with Skype, Flickr, Dropbox, etc?

door, alarm house and awake and bake times turn lights , heat, oven,

18. Do you ever download movies/televsion/software online? what? how?

fridge on and off via a central computer?

Paid or free?

36. Do you have bookmarks? Do you use them often?

19. Do you do online banking?

37. Have you ever used delicious or Evernote? Do you know what these

20. Do you have a paypal account?

programs are for?

21. Do you shop online such as Ebay, etc?

38. What would you need to start you using these services or not?

22. How many passwords do you think you have?

39. How do you categorize and save bookmarks/files? Can you send

Thesis by: C. Ellicott, 04.08.2011


x

xi

Appendix B « Towards a New Conceptual Framework

screenshots of a few examples of your bookmark or computer file

structures? - by function, purpose, or title (see attachments)

Appendix c: GHOSTS ARE “un-sci-en-ti-fic”

Thesis by: C. Ellicott, 04.08.2011

Pirsig Exerpt: (1974) Zen and the Art of Motor Cycle Maintenance. (p. 13-17) -On the concept of ghosts -Explained as a philosophical idea

40. Do you feel you have a good categorizing and file retrieval system on your computers? 41. Do you have a specific space set up to use your computers? 42. Is there anything you would improve about your current computer experiences? 43. Do you like the shape and material of computers?- i-pod, i-phones? 44. How do you feel about learning the new software versions? 45. How about learning a new piece of software from scratch? 46. Do you pay for any of your home software? If so what ones? 47. If you were to die tomorrow, would anyone you know be able to collect and shut down all your personal data?

Thank You for all your help. Candace

“You look like you’d seen a ghost.” John and Chris look at me and I turn away from them to the door. It is still raining hard, but we make a run for it to the rooms. The gear on the cycles is protected and we wait until the storm passes over before removing it. After the rain stops, the sky lightens a little. But from the motel courtyard, I see past the cottonwoods that a second darkness, that of night, is about to come on. We walk into town, have supper, and by the time we get back, the fatigue of the day is really on me.

in people’s minds.” The whiskey, the fatigue and the wind in the trees start mixing in my mind. “Of course,” I add, “the laws of science contain no matter and have no energy either and therefore do not exist except in people’s minds. It’s best to be completely scientific about the whole thing and refuse to believe in either ghosts or the laws of science. That way you’re safe. That doesn’t leave you very much to believe in, but that’s scientific too.” “I don’t know what you’re talking about,” Chris says.

We rest, almost motionless, in the metal armchairs of the motel courtyard, slowly working down a pint of whiskey that John brought with some mix from the motel cooler. It goes down slowly and agreeably. A cool night wind rattles the leaves of the cottonwoods along the road. Chris wonders what we should do next. Nothing tires this kid. The newness and strangeness of the motel surroundings excite him and he wants us to sing songs as they did at camp.

“I’m being kind of facetious.”

“We’re not very good at songs,” John says.

“No, he wasn’t. He said that when people haven’t been buried right, their ghosts come back to haunt people. He really believes in that.”

“Let’s tell stories then,” Chris says. He thinks for a while. “Do you know any good ghost stories? All the kids in our cabin used to tell ghost stories at night.”

Chris gets frustrated when I talk like this, but I don’t think it hurts him. “One of the kids at YMCA camp says he believes in ghosts.” “He was just spoofing you.”

“He was just spoofing you,” I repeat.

“You tell us some,” John says.

“What’s his name?” Sylvia says.

And he does. They are kind of fun to hear. Some of them I haven’t heard since I was his age. I tell him so, and Chris wants to hear some of mine, but I can’t remember any. After a while he says,

“Tom White Bear.”

“Do you believe in ghosts?” “No,” I say

I laugh. “I guess I’m going to have to take that back a little,” I say. “I was thinking of European ghosts.” “What’s the difference?”

“Why not?”

John roars with laughter. “He’s got you,” he says.

“Because they are un-sci-en-ti-fic.”

I think a little and say, “Well, Indians sometimes have a different way of looking at things, which I’m not saying is completely wrong.

The way I say this makes John smile. “They contain no matter,” I continue, “and have no energy and therefore, according to the laws of science, do not exist except

John and I exchange looks, suddenly recognizing the same thing. “Ohhh, Indian!” he says.

Science isn’t part of the Indian tradition.”


xii “Tom White Bear said his mother and dad told him not to believe all that stuff. But he said his grandmother whispered it was true anyway, so he believes it.”

Appendix C « Towards a New Conceptual Framework

“Of course.” “So when did this law start? Has it always existed?”

“You mean the teacher is hypnotizing the kids into believing the law of gravity?” “Sure.”

John is frowning, wondering what I am getting at. He looks at me pleadingly. He really does want to know things sometimes. Being facetious is not being a very good father. “Sure,” I say, reversing myself, “I believe in ghosts too.” Now John and Sylvia look at me peculiarly. I see I’m not going to get out of this one easily and brace myself for a long explanation. “It’s completely natural,” I say, “to think of Europeans who believed in ghosts or Indians who believed in ghosts as ignorant. The scientific point of view has wiped out every other view to a point where they all seem primitive, so that if a person today talks about ghosts or spirits he is considered ignorant or maybe nutty. It’s just all but completely impossible to imagine a world where ghosts can actually exist.” John nods affirmatively and I continue. “My own opinion is that the intellect of modern man isn’t that superior. IQs aren’t that much different. Those Indians and medieval men were just as intelligent as we are, but the context in which they thought was completely different. Within that context of thought, ghosts and spirits are quite as real as atoms, particles, photons and quants are to a modern man.

“Sure.” “Sitting there, having no mass of its own, no energy of its own, not in anyone’s mind because there wasn’t anyone, not in space because there was no space either, not anywhere this law of gravity still existed?” Now John seems not so sure. “If that law of gravity existed,” I say, “I honestly don’t know what a thing has to do to be nonexistent. It seems to me that law of gravity has passed every test of nonexistence there is. You cannot think of a single attribute of nonexistence that that law of gravity didn’t have. Or a single scientific attribute of existence it did have. And yet it is still ‘common sense’ to believe that it existed.”

“What?”

No other conclusion makes sense.

“Oh, the laws of physics and of logic—the number system—the principle of algebraic substitution. These are ghosts. We just believe in them so thoroughly they seem real.

“And what that means,” I say before he can interrupt, “and what that means is that the law of gravity exists nowhere except in people’s heads! It’s a ghost! We are all of us very arrogant and conceited about running down other people’s ghosts but just as ignorant and barbaric and superstitious about our own.”

“I don’t get it,” says Chris. So I go on. “For example, it seems completely natural to presume that gravitation and the law of gravitation existed before Isaac Newton. It would sound nutty to think that until the seventeenth century there was no gravity.”

“You’ve heard of the importance of eye contact in the classroom? Every educationist emphasizes it. No educationist explains it.” John shakes his head and pours me another drink. He puts his hand over his mouth and in a mock aside says to Sylvia, “You know, most of the time he seems like such a normal guy.” I counter, “That’s the first normal thing I’ve said in weeks. The rest of the time I’m feigning twentieth century lunacy just like you are. So as not to draw attention to myself. “But I’ll repeat it for you,” I say. “We believe the disembodied words of Sir Isaac Newton were sitting in the middle of nowhere billions of years before he was born and that magically he discovered these words. They were always there, even when they applied to nothing. Gradually the world came into being and then they applied to it. In fact, those words themselves were what formed the world.

John looks too much in thought to speak. But Sylvia is excited. “Where do you get all these ideas?” she asks. I am about to answer them but then do not. I have a feeling of having already pushed it to the limit, maybe beyond, and it is time to drop it. After a while John says, “It’ll be good to see the mountains again.” “Yes, it will,” I agree. “one last drink to that!” We finish it and are off to our rooms. I see that Chris brushes his teeth, and let him get by with a promise that he’ll shower in the morning. I pull seniority and take the bed by the window. After the lights are out he says, “Now, tell me a ghost story.” “I just did, out there.” “I mean a real ghost story.” “That was the realest ghost story you’ll ever hear.”

John says, “I guess I’d have to think about it.”

Modern man has his ghosts and spirits too, you know.”

“They seem real to me,” John says.

best. Your common sense is nothing more than the voices of thousands and thousands of these ghosts from the past. Ghosts and more ghosts. Ghosts trying to find their place among the living.”

“That’s absurd.” “What I’m driving at,” I say, “is the notion that before the beginning of the earth, before the sun and the stars were formed, before the primal generation of anything, the law of gravity existed.”

“Well, I predict that if you think about it long enough you will find yourself going round and round and round and round until you finally reach only one possible, rational, intelligent conclusion. The law of gravity and gravity itself did not exist before Isaac Newton.

In that sense I believe in ghosts.

xiii

Thesis by: C. Ellicott, 04.08.2011

“Why does everybody believe in the law of gravity then?” “Mass hypnosis. In a very orthodox form known as ‘education.”

That, John, is ridiculous.

“You know what I mean. The other kind.”

“The problem, the contradiction the scientists are stuck with, is that of mind. Mind has no matter or energy but they can’t escape its predominance over everything they do. Logic exists in the mind. Numbers exist only in the mind. I don’t get upset when scientists say that ghosts exist in the mind. It’s that only that gets me. Science is only in your mind too, it’s just that that doesn’t make it bad. Or ghosts either.”

I try to think of some conventional ones. “I used to know so many of them when I was a kid, Chris, but they’re all forgotten,” I say.

They are just looking at me so I continue: “Laws of nature are human inventions, like ghosts. Laws of logic, of mathematics are also human inventions, like ghosts. The whole blessed thing is a human invention, including the idea that it isn’t a human invention. The world has no existence whatsoever outside the human imagination. It’s all a ghost, and in antiquity was so recognized as a ghost, the whole blessed world we live in. It’s run by ghosts. We see what we see because these ghosts show it to us, ghosts of Moses and Christ and the Buddha, and Plato, and Descartes, and Rousseau and Jefferson and Lincoln, on and on and on. Isaac Newton is a very good ghost. One of the

“It’s time to go to sleep. We’ve all got to get up early tomorrow.” Except for the wind through the screens of the motel window it is quiet. The thought of all that wind sweeping toward us across the open fields of the prairie is a tranquil one and I feel lulled by it. The wind rises and then falls, then rises and sighs, and falls again—from so many miles away. “Did you ever know a ghost?” Chris asks. I am half asleep. “Chris,” I say, “I knew a fellow once who spent all his whole life doing nothing but hunting for a ghost, and it was just a waste of time. So go to sleep.”


xiv I realize my mistake too late. “Did he find him?” “Yes, he found him, Chris.” I keep wishing Chris would just listen to the wind and not ask questions. “What did he do then?”

Appendix C « Towards a New Conceptual Framework

A half hour later he is breathing sleepfully, and the wind is still strong as ever and I am wide-awake. There, out the window in the dark...this cold wind crossing the road into the trees, the leaves shimmering flecks of moonlight...there is no question about it, Phædrus saw all of this. What he was doing here I have no idea. Why he came this way I will probably never know. But he has been here, steered us onto this strange road, has been with us all along. There is no escape.

“He thrashed him good.” “Then what?” “Then he became a ghost himself.” Somehow I had the thought this was going to put Chris to sleep, but it’s not and it’s just waking me up. “What is his name?” “No one you know.”

I wish I could say that I don’t know why he is here, but I’m afraid I must now confess that I do. The ideas, the things I was saying about science and ghosts, and even that idea this afternoon about caring and technology...they are not my own. I haven’t really had a new idea in years. They are stolen from him. And he has been watching. And that is why he is here. With that confession, I hope he will now allow me some sleep.

“But what is it?” “It doesn’t matter.”

Poor Chris. “Do you know any ghost stories?” he asked. I could have told him one but even the thought of that is frightening.

“Well, what is it anyway?” “His name, Chris, since it doesn’t matter, is Phædrus. It’s not a name you know.”

I really must go to sleep.

“Did you see him on the motorcycle in the storm?” “What makes you say that?” “Sylvia said she thought you saw a ghost.” “That’s just an expression.” “Dad?” “This had better be the last question, Chris, or I’m going to become angry.” “I was just going to say you sure don’t talk like anyone else.” “Yes, Chris, I know that,” I say. “It’s a problem. Now go to sleep.” “Good night, Dad.” “Good night.”


Towards a New Conceptual Framework

Ellicott_Cover-v1.indd 4

4/8/11 3:04:50 AM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.