skip to main content
10.1145/2470654.2466467acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

"Everybody knows what you're doing": a critical design approach to personal informatics

Published: 27 April 2013 Publication History

Abstract

We present an alternative approach to the design of personal informatics systems: instead of motivating people to examine their own behaviors, this approach promotes awareness of and reflection on the infrastructures behind personal informatics and the modes of engagement that they promote. Specifically, this paper presents an interface that displays personal web browsing data. The interface aims to reveal underlying infrastructure using several methods: drawing attention to the scope of mined data by displaying deliberately selected sensitive data, using purposeful malfunction as a way to encourage reverse engineering, and challenging normative expectations around data mining by displaying information in unconventional ways. Qualitative results from a two-week deployment show that these strategies can raise people's awareness about data mining, promote efficacy and control over personal data, and inspire reflection on the goals and assumptions embedded in infrastructures for personal data analytics.

References

[1]
Bell, G., Blythe, M. and Sengers, P. Making by making strange: Defamiliarization and the design of domestic technologies. ACM Trans. Computer-Human Interaction 12, 2 (June 2005), 149--173.
[2]
Box, G. E. P. and Draper, N. R. Empirical model building and response surfaces. Wiley, Hoboken, NJ, 1987.
[3]
Carver, C. and Scheier, M. F. On the self-regulation of behavior. Cambridge University Press, Cambridge, UK, 2001.
[4]
Chalmers, M., MacColl, I. and Bell, M. (2003). Seamful design: Showing the seams in wearable computing. Proc Eurowearable, IEE (2003), 11--16.
[5]
Collusion. http://www.mozilla.org/en-US/collusion/
[6]
Deterding, S., Sicart, M., Nacke, L., O'Hara, K. and Dixon, D. (2011). Gamification: Using game-design elements in non-gaming contexts. Ext. Abstracts CHI '11, ACM Press (2011), 2425--2428.
[7]
DiSalvo, C. Adversarial Design. MIT Press, Cambridge, MA, 2012.
[8]
Dunne, A., and Raby, F. Design noir: The secret life of electronic objects. Birkhäuser, Basel, Switzerland, 2001.
[9]
Endsley, M. R. The Role of Situation Awareness in Naturalistic Decision Making. In Zsambok, C. E. and Klein, G. A. (Eds.), Naturalistic decision making. Erlbaum, Hillsdale, NJ, 1997, 269--282.
[10]
Fogg, B. J. Persuasive computers: Perspectives and research directions. Proc. CHI '98, ACM Press (1998), 225--232.
[11]
Friedman, B. Value-sensitive design. interactions 3, 6 (1996), 16--23.
[12]
Gaver, W. W. (2002). Designing for Homo Ludens. I3 Magazine, 12 (June 2002).
[13]
Jones, W. and Teevan, J. Personal information management. UW Press, Seattle, 2007.
[14]
Leahu, L., Schwenk, S. and Sengers, P. Subjective objectivity: Negotiating emotional meaning. Proc. DIS '08 ACM Press (2008), 425--434.
[15]
Li, I., Dey, A. K. and Forlizzi, J. A stage-based model of personal informatics systems. Proc. CHI 2010, ACM Press (2010), 557--566.
[16]
Li, I., Dey, A. K. and Forlizzi, J. Know thyself: Monitoring and reflecting on facets of one's life. Ext. Abstracts CHI '10, ACM Press (2010), 4489--4492.
[17]
Li, I., Dey, A. K. and Forlizzi, J. Understanding my data, myself: Supporting self-reflection with ubicomp technologies. Proc. UbiComp '11, ACM Press (2011), 405--414.
[18]
Mandiberg, M. Oil Standard (2006), http://turbulence.org/works/oil/
[19]
Peesapati, S. T., Schwanda, V., Schultz, J., Lepage, M., Jeong, S. and Cosley, D. Pensieve: Supporting everyday reminiscence. Proc. CHI '10, ACM Press (2010), 2027-- 2036.
[20]
Redström, J., Jaksefic, P. and Ljungstrand, P. The ChatterBox. Proc. HandheM and Ubiquitous Comp. '99, Springer, 1999.
[21]
Sengers, P. and Gaver, B. Design for Interpretation. Proc. HCII '05. Lawrence Erlbaum Associates (2005).
[22]
Sengers, P., Boehner, K., David, S. and Kaye, J. Reflective design. Proc. Critical Computing, ACM Press (2005), 49--58.
[23]
Sosik, V. S., Zhao, X. and Cosley, D. See friendship, sort of: How conversation and digital traces might support reflection on friendships. Proc. CSCW '12, ACM Press (2012), 1145--1154.
[24]
Star, S. L. The ethnography of infrastructure. American Behavioral Scientist, 43, 3 (1999), 377--391.
[25]
Tang, K. P., Hong, J. I. and Siewiorek, D. P. Understanding how visual representations of location feeds affect end-user privacy concerns. Proc. UbiComp '11, ACM Press (2011), 207--216.
[26]
Top 5 Browsers. StatCounter (2012). http://gs.statcounter.com/#browser-ww-monthly201107-201206
[27]
Wilson, T. D. and Dunn, E. W. Self-knowledge: Its limits, value, and potential for improvement. Annual Review of Psychology, 55 (2004), 493--518.

Cited By

View all

Index Terms

  1. "Everybody knows what you're doing": a critical design approach to personal informatics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2013
    3550 pages
    ISBN:9781450318990
    DOI:10.1145/2470654
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 April 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. critical design
    2. design strategies
    3. personal informatics

    Qualifiers

    • Research-article

    Conference

    CHI '13
    Sponsor:

    Acceptance Rates

    CHI '13 Paper Acceptance Rate 392 of 1,963 submissions, 20%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)97
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media