skip to main content
research-article

Adaptive Architecture and Personal Data

Authors Info & Claims
Published:13 March 2019Publication History
Skip Abstract Section

Abstract

Through sensors carried by people and sensors embedded in the environment, personal data is being processed to try to understand activity patterns and people's internal states in the context of human-building interaction. This data is used to actuate adaptive buildings to make them more comfortable, convenient, and accessible or information rich. In a series of envisioning workshops, we queried the future relationships between people, personal data and the built environment, when there are no technical limits to the availability of personal data to buildings. Our analysis of created designs and user experience fictions allows us to contribute a systematic exposition of the emerging design space for adaptive architecture that draws on personal data. This is being situated within the context of the new European information privacy legislation, the EU General Data Protection Regulation 2016. Drawing on the tension space analysis method, we conclude with the illustration of the tensions in the temporal, spatial, and inhabitation-related relationships of personal data and adaptive buildings, re-usable for the navigation of the emerging, complex issues by future designers.

References

  1. N. Thrift. 2006. Movement-space: The changing domain of thinking resulting from the development of new kinds of spatial awareness. Economy and Society 33, 4 (2006), 582--604.Google ScholarGoogle ScholarCross RefCross Ref
  2. J. Berry and J. Thornton. 2002. Design for green—Jubilee Campus, Nottingham. In Ingenia Online. The Royal Academy of Engineering, London, UK, 35--40.Google ScholarGoogle Scholar
  3. S. Roaf, M. Fuentes, and S. Thomas. 2007. EcoHouse: A Design Guide (3rd ed.). Architectural Press, Oxford, UK, 352.Google ScholarGoogle Scholar
  4. A. McGibney, S. Rea, and J. Ploennigs. 2016. Open BMS—IoT driven architecture for the internet of buildings. In 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON’16). IEEE, Florence, Italy.Google ScholarGoogle Scholar
  5. The Stan Project. 2015. Pynchon's Wall. Retrieved from http://frequency.org.uk/artist-focus-the-stan-project/.Google ScholarGoogle Scholar
  6. H. Schnädelbach, K. Glover, and A. Irune. 2010. ExoBuilding—Breathing Life into Architecture. In 6th Nordic Conference on Human-Computer Interaction (NordiCHI ’10). ACM Press, Reykjavik, Iceland, 442--451. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Small. 2011. Anyone Who Has A Heart. Retrieved from https://www.axisweb.org/p/andrewsmall/workset/36457-anyone-who-has-a-heart/.Google ScholarGoogle Scholar
  8. A. Haw and C. Ratti. 2012. Living bits and bricks. Architectural Review 231, 1383 (2012), 89--93.Google ScholarGoogle Scholar
  9. C. Ratti and M. Claudel. 2014. The rise of the ‘Invisible Detail’. Architectural Design 84, 4 (2014), 86--91.Google ScholarGoogle ScholarCross RefCross Ref
  10. S. Iaconesi and O. Persico. 2017. Digital Urban Acupuncture. Springer, Cham, Switzerland, 123--147.Google ScholarGoogle Scholar
  11. R. Kitchin and M. Dodge. 2011. Code/Space: Software and Everyday Life. MIT Press, Cambridge. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Weiser. 1991. The computer for the twenty-first century. Scientific American 265, 3 (1991), 94--104.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. Weiser and J. S. Brown. 1996. Designing calm technology. PowerGrid Journal 1, 1 (1996), 75--85.Google ScholarGoogle Scholar
  14. N. A. Streitz, J. Geißler, and T. Holmer. 1998. Roomware for cooperative buildings: Integrated design of architectural spaces and information spaces. In International Workshop on Cooperative Buildings. Springer, Darmstadt, Germany. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. J. Cook, J. C. Augusto, and V. R. Jakkula. 2009. Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing 5, 4 (2009), 277--298. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. McCullough. 2004. Digital Ground: Architecture, Pervasive Computing, and Environmental Knowing. MIT Press, Cambridge, MA, xvi, 272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Y. Rogers. 2006. Moving on from Weiser's vision of calm computing: Engaging UbiComp experiences. In UbiComp. Springer, Orange County. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Bell and P. Dourish. 2007. Yesterday's tomorrows: Notes on ubiquitous computing's dominant vision. Personal and Ubiquitous Computing 11, 2 (2007), 133--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. A. Greenfield. 2006. Everyware: The Dawning Age of Ubiquitous Computing. New Riders, Berkeley, iii, 267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. E. Aarts and F. Grotenhuis. 2011. Ambient intelligence 2.0: Towards synergetic prosperity. Journal of Ambient Intelligence and Smart Environments 3, 1 (2011), 3--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. G. Ballard. 1971. The thousand dreams of Stellavista. In Vermilion Sands. Vintage Random House, London, 185--208.Google ScholarGoogle Scholar
  22. S. North, H. Schnädelbach, A. Fatah, W. Motta, L. Ye, M. Behrens, and E. Kostopoulou. 2013. Tension space analysis: Exploring community requirements for networked urban screens. In Human-Computer Interaction (INTERACT’13), P. Kotzé et al. (Eds.). Springer, Berlin, 81--98.Google ScholarGoogle Scholar
  23. H. Schnädelbach. 2010. Adaptive architecture—A conceptual framework. In MediaCity, J. Geelhaar et al. (Eds.). Bauhaus-Universität Weimar, Germany, 523--555.Google ScholarGoogle Scholar
  24. M. Meagher. 2015. Designing for change The poetic potential of responsive architecture. Frontiers of Architectural Research 4 (2015), 159--165.Google ScholarGoogle ScholarCross RefCross Ref
  25. L. Bullivant (Ed.). 2005. 4dspace: Interactive Architecture (Architectural Design). Wiley-Academy, 128. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. K. E. Green. 2016. Architectural Robotics: Ecosystems of Bits, Bytes, and Biology. MIT Press, Cambridge, 288. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Harper. 2003. Inside the Smart Home. Springer, New York, London, xi, 264. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. I. Van Zijl and B. Mulder. 2000. The Rietveld Schroder House. Princeton Architectural Press, New York, 48.Google ScholarGoogle Scholar
  29. D. Lupton. 2016. The Quantified Self: A Sociology of Self-Tracking. Polity, Cambridge, UK, viii, 183. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Shepard. 2011. Sentient City: Ubiquitous Computing, Architecture, and the Future of Urban Space. MIT Press, Cambridge, 229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Greenfield. 2013. Against the Smart City (The City is Here for You to Use). Do Projects, New York.Google ScholarGoogle Scholar
  32. D. Wang. 2016. HCI, policy and the smart city. In 30th International BCS Human Computer Interaction Conference: Fusion! BCS Learning 8 Development Ltd, Poole, UK. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. L. Edwards. 2016. Privacy, security and data protection in smart cities: A critical EU law perspective. European Data Protection Law Review 2 (2016), 28.Google ScholarGoogle ScholarCross RefCross Ref
  34. E. Papadopoulou, S. Gallacher, N. K. Taylor, and M. H. Williams. 2012. A personal smart space approach to realising ambient ecologies. Pervasive and Mobile Computing 8, 4 (2012), 485--499. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. G. T. Marx. 2003. A tack in the shoe: Neutralizing and resisting the new surveillance. Journal of Social Issues 59, 2 (2003), 369--390.Google ScholarGoogle ScholarCross RefCross Ref
  36. M. W. Steenson. 2015. Microworld and mesoscale. Interactions 22, 4 (2015), 58--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. M. Addington. 2015. Smart architecture, dumb buildings. In Building Dynamics. B. Kolarevic and V. Parlac (eds.), Routledge, London, UK.Google ScholarGoogle Scholar
  38. U. Varshney. 2007. Pervasive healthcare and wireless health monitoring. Mobile Networks and Applications 12, 2--3 (2007), 113--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. H. Busta. 2015. ThyssenKrupp and Microsoft are Making the Elevator Smart. Retrieved from http://www.architectmagazine.com/technology/products/thyssenkrupp-and-microsoft-are-making-the-elevator-smart_o.Google ScholarGoogle Scholar
  40. E. S. Poulsen, H. J. Andersen, and O. B. Jensen. 2012. Full scale experiment with interactive urban lighting. In Designing Interactive Lighting Workshop at ACM DIS. ACM Press, Newcastle, UK.Google ScholarGoogle Scholar
  41. O. Khan. 2010. Open columns: a carbon dioxide (CO2) responsive architecture. In CHI 2010. ACM, Atlanta, 4789--4792. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. K. Eng, A. Baebler, U. Bernardet, M. Blanchard, M. Costa, T. Delbrück, R. Douglas, K. Hepp, D. Klein, J. Manzolli, M. Mintz, F. Roth, U. Rutishauser, K. Wassermann, A. M. Whatley, A. Wittmann, R. Wyss, and P. F. M. J. Verschure. 2003. Ada—intelligent space: An artificial creature for the Swiss Expo.02. In IEEE International Conference on Robotics and Automation (ICRA ’03). IEEE, Taipei, Taiwan.Google ScholarGoogle Scholar
  43. H. Schnädelbach, A. Irune, D. Kirk, K. Glover, and P. Brundell. 2012. ExoBuilding: Physiologically driven adaptive architecture. ACM Transactions in Computer Human Interaction 19, 4 (2012), 1--22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. N. Jäger, H. Schnädelbach, J. Hale, D. Kirk, and K. Glover. 2017. Reciprocal control in adaptive environments. Interacting with Computers 29, 4 (2017), 512--529.Google ScholarGoogle Scholar
  45. B. Das, D. J. Cook, N. C. Krishnan, and M. Schmitter-Edgecombe. 2016. One-class classification-based real-time activity error detection in smart homes. IEEE Journal of Selected Topics in Signal Processing 10, 5 (2016), 914--923.Google ScholarGoogle ScholarCross RefCross Ref
  46. W. Lau. 2016. Lessons from a Living Building: The Brock Environmental Center. Retrieved January 9, 2017 from http://www.architectmagazine.com/technology/lessons-from-a-living-building-the-brock-environmental-center_o.Google ScholarGoogle Scholar
  47. H. Schnädelbach. 2010. Conceptual Framework of Adaptive Architecture. Retrieved March 15, 2016 from http://www.adaptivearchitectureframework.org.Google ScholarGoogle Scholar
  48. H. Hecht, M. Mayier, and C. Perakslis. 2014. Pervasive connectivity: The thriving hotel of the future. In Pervasive Computing and Communications Workshops (PERCOM ’14). IEEE, Budapest, Hungary.Google ScholarGoogle Scholar
  49. C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin. 2015. Smart homes and their users: A systematic analysis and key challenges. Personal and Ubiquitous Computing 19, 2 (2015), 463--476. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. D. Wright, S. Gutwirth, M. Friedewald, E. Vildjiounaite, and Y. Punie. (Eds.). 2008. Safeguards in a World of Ambient Intelligence. Springer, Dordrecht, The Netherlands, XXXIV, 292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. D. Garland. 2001. The Culture of Control: Crime and Social Order in Contemporary Society. University of Chicago Press, Chicago, 336.Google ScholarGoogle Scholar
  52. A. Von Hirsch, D. Garland, and A. Wakefield (Eds.). 2000. Ethical and Social Perspectives on Situational Crime Prevention. Hart, Cambridge, UK, 240.Google ScholarGoogle Scholar
  53. R. I. Mawby. 1977. Defensible space: A theoretical and empirical appraisal. Urban Studies 14, 2 (1977), 169--179.Google ScholarGoogle ScholarCross RefCross Ref
  54. C. Norris and M. McCahill. 2006. CCTV: Beyond penal modernism? British Journal of Criminology 46, 1 (2006), 97--118.Google ScholarGoogle ScholarCross RefCross Ref
  55. D. Neyland and N. Möllers. 2017. Algorithmic IF … THEN rules and the conditions and consequences of power. Information Communication and Society 20, 1 (2017), 45--62.Google ScholarGoogle ScholarCross RefCross Ref
  56. R. Kitchin. 2015. The promise and perils of smart cities. In Computers 8 Law. Scottish Society for Computers and Law, Edingburgh, Scotland.Google ScholarGoogle Scholar
  57. S. Graham and D. Wood. 2003. Digitizing surveillance: Categorization, space. Inequality. Critical Social Policy 23, 2 (2003), 227--248.Google ScholarGoogle ScholarCross RefCross Ref
  58. S. Graham. 2009. Cities as battlespace: The new military urbanism. City 13, 4 (2009), 383--402.Google ScholarGoogle ScholarCross RefCross Ref
  59. S. Jones, S. Hara, and J. C. Augusto. 2015. eFRIEND: An ethical framework for intelligent environments development. Ethics and Information Technology 17, 1 (2015), 11--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. E. Tapia, S. Intille, and K. Larson. 2004. Activity recognition in the home setting using simple and ubiquitous sensors. In Pervasive Computing. A. Ferscha and F. Mattern (eds.), Springer, 158--175.Google ScholarGoogle Scholar
  61. R. W. Picard. 1997. Affective Computing. MIT Press, Cambridge, xii, 292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Information Commissioner's Office. 2017. Guide to the General Data Protection Regulation (GDPR). Retrieved from https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.Google ScholarGoogle Scholar
  63. L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine 8 Ethics: A Journal of the American Society of Law, Medicine 8 Ethics 25, 2--3 (1997), 98--110, 82.Google ScholarGoogle Scholar
  64. P. Ohm. 2010. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review 57, 6 (2010), 1701--1777.Google ScholarGoogle Scholar
  65. Article 29 Working Party, Opinion 05/2014 on Anonymisation Techniques (2014).Google ScholarGoogle Scholar
  66. A. Narayanan and V. Shmatikov. 2008. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy. IEEE, Oakland. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. H. Schnädelbach. 2016. Adaptive Architecture. Interactions. 23, 2 (2016), 62--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. J. Lehikoinen and V. Koistinen. 2014. In big data we trust? Interactions 21, 5 (2014). 38--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. S. Nicholls. 2018. The Facebook data leak: What happend and what's next. Economy (2018). Retrieved June 20, 2018 from http://www.euronews.com/2018/04/09/the-facebook-data-leak-what-happened-and-what-s-next.Google ScholarGoogle Scholar
  70. S. Reeves. 2012. Envisioning ubiquitous computing. In SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, TX, 1573--1582. Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. M. Smyth and I. Helgason. 2013. Tangible possibilities—Envisioning interactions in public space. Digital Creativity 24, 1 (2013), 75--87.Google ScholarGoogle ScholarCross RefCross Ref
  72. G. Graham. 2014. Is Anyone Asking People What They Want from the Smart Cities of the Future? Retrieved from https://theconversation.com/is-anyone-asking-people-what-they-want-from-the-smart-cities-of-the-future-23855Google ScholarGoogle Scholar
  73. E. Luger, L. Urquhart, T. Rodden, and M. Golembewski. 2015. Playing the legal card: Using ideation cards to raise data protection issues within the design process. In 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, South Korea, 457--466. Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. D. Tatar. 2007. The design tensions framework. Human-Computer Interaction 22, 4 (2007), 413--451. Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. S. Brand. 1994. How Buildings Learn: What Happens after they're Built. Viking, New York, viii, 243.Google ScholarGoogle Scholar
  76. J. O'Connor. 2004. Survey on actual service lives for North American buildings. In Woodframe Housing Durability and Disaster Issues Conference. 1--9.Google ScholarGoogle Scholar
  77. G. Liu, K. Xu, X. Zhang, and G. Zhang. 2014. Factors influencing the service lifespan of buildings: An improved hedonic model. Habitat International 43 (2014), 274--282.Google ScholarGoogle ScholarCross RefCross Ref
  78. C. Beanland. 2012. Temporary buildings: Should they stay, or should they go? Independent (2012). Retrieved August 9, 2012 from http://www.independent.co.uk/arts-entertainment/architecture/temporary-buildings-should-they-stay-or-should-they-go-8022696.html.Google ScholarGoogle Scholar
  79. Research Councils UK. 2015. Guidance on Best Practice in the Management of Research Data. Research Councils UK.Google ScholarGoogle Scholar
  80. K. Kooroshy. 2017. Amazon: Verstöße gegen Mitarbeiterrechte. Retrieved from https://www.ndr.de/fernsehen/sendungen/panorama3/Amazon-Verstoesse-gegen-Mitarbeiterrechte,amazon278.html.Google ScholarGoogle Scholar
  81. L. Urquhart, N. Sailaja, and D. McAuley. 2017. Realising the right to data portability for the domestic Internet of things. Personal and Ubiquitous Computing 22, 2 (2018), 317--332. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. J. Vidyarthi, B. E. Riecke, and D. Gromala. 2012. Sonic cradle: Designing for an immersive experience of meditation by connecting respiration to music. In Designing Interactive Systems. ACM, Newcastle Upon Tyne, 408--417. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. M. Milenkovic. 2015. A case for interoperable iot sensor data and meta-data formats: The internet of things. In Ubiquity 2015 (2015), 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. US Government. 2015. Privacy Shield. Retrieved January 16, 2018 from https://www.privacyshield.gov/welcome.Google ScholarGoogle Scholar
  85. C. J. Millard (Ed.). 2013. Cloud Computing Law. Oxford University Press, Oxford, UK, 436.Google ScholarGoogle Scholar
  86. Article 29 Data Protection Working Party WP 223. 2014. Opinion 8/2014 on Recent Developments on the Internet of Things. European Commission, Brussels, 1--24.Google ScholarGoogle Scholar
  87. Office of the Privacy Commissioner of Canada. 2017. Privacy Enhancing Technologies—A Review of Tools and Techniques. Quebec, Canada.Google ScholarGoogle Scholar
  88. F. Brunton and H. Nissenbaum. 2015. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, Cambridge, 123. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. M. Dennedy, J. Fox, and T. Finneran. 2014. Privacy Engineer's Manifesto. Apress, Berkeley, 362.Google ScholarGoogle Scholar
  90. L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle. 2002. The platform for privacy preferences 1.0 (P3P1.0) specification. W3C 2002. 1--76.Google ScholarGoogle Scholar
  91. W. Zheng, A. Dave, J. G. Beekman, R. A. Popa, J. E. Gonzalez, and I. Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In NSDI. Boston. Google ScholarGoogle ScholarDigital LibraryDigital Library
  92. R. Mortier, J. Zhao, J. Crowcroft, Q. Li, L. Wang, H. Haddadi, Y. Amar, A. Crabtree, J. Colley, and T. Lodge. 2016. Personal data management with the Databox: What's inside the box? In Workshop on Cloud-Assisted Networking. Irvine, 49--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. L. Urquhart and D. McAuley. 2018. Avoiding the internet of insecure industrial things. Computer Law and Security Review 34, 3 (2018), 450--466.Google ScholarGoogle ScholarCross RefCross Ref
  94. L. Edwards and L. Urquhart. 2016. Privacy in public spaces: What expectations of privacy do we have in social media intelligence? International Journal of Law and Information Technology 24, 3 (2016), 279--310.Google ScholarGoogle ScholarCross RefCross Ref
  95. L. Taylor, L. Floridi, and B. V. D. Sloot, eds. 2017. Group Privacy: New Challenges of Data Technologies. Springer, XIII, 237. Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. H. Nissenbaum. 2009. Privacy in Context: Technology Policy and the Integrity of Social Life. Stanford University Press, Redwood City, 304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. A. Crabtree, P. Tolmie, and W. Knight. 2017. Repacking ‘Privacy’ for a networked world. Computer Supported Cooperative Work: An International Journal 26, 4--6 (2017), 453--488. Google ScholarGoogle ScholarDigital LibraryDigital Library
  98. M. Goulden, P. Tolmie, R. Mortier, T. Lodge, A.-K. Pietilainen, and R. Teixeira. 2017. Living with interpersonal data: Observability and accountability in the age of pervasive ICT. New Media 8 Society 20, 4 (2017), 1580--1599.Google ScholarGoogle Scholar
  99. The UK Government. 2017. Renting Out Your Property (England and Wales). Retrieved from https://www.gov.uk/renting-out-a-property.Google ScholarGoogle Scholar
  100. Citizens Advice. 2018. Duty to Make Reasonable Adjustments for Disabled People. Retrieved from https://www.citizensadvice.org.uk/law-and-courts/discrimination/what-are-the-different-types-of-discrimination/duty-to-make-reasonable-adjustments-for-disabled-people/.Google ScholarGoogle Scholar
  101. L. Urquhart, T. Lodge, and A. Crabtree. 2018. Demonstrably doing accountability for the internet of things. International Journal of Law and Information Technology 27 (2018), 1--27.Google ScholarGoogle ScholarCross RefCross Ref
  102. T. Randall. 2015. The Edge Is the Greenest, Most Intelligent Building in the World. Retrieved from https://www.bloomberg.com/features/2015-the-edge-the-worlds-greenest-building/.Google ScholarGoogle Scholar

Index Terms

  1. Adaptive Architecture and Personal Data

          Recommendations

          Reviews

          Barrett Hazeltine

          This paper focuses on the implications of sensors embedded in buildings to make the buildings responsive to people. An important issue is privacy. One reason these privacy issues are important is the European Union's General Data Protection Regulation (GDPR). The paper is oriented toward Europe. It presents questions and ideas rather than answers, and should be of particular interest to building designers. The approach is based on design tensions, for example, the difficulty in designing for both "in the moment adaptivity" and future interactions. Star-like radar charts illustrate the design tensions, showing several tensions radiating from a common point. Three such charts are presented, dealing with temporal aspects, spatial aspects, and inhabitation. Temporal tensions include lifetime of data versus lifetime of building, and an individual's rights versus an organization's needs. One spatial tension concerns sensors carried by the individual versus sensors embedded in the structure. Another spatial tension is where the data is stored, in the building or off-site. Tensions related to habitation are multiple people sharing space, the need for building operations to use personal data, and who controls the data (for example, the building management or the technology provider). So, must a person entering a building give consent to having personal data collected If so, how What recourse is available to a person who does not want a record kept of access to a building The tensions described were selected from responses at three workshops, with about 60 total selected participants. The paper presents many ideas and is readable.

          Access critical reviews of Computing literature here

          Become a reviewer for Computing Reviews.

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Computer-Human Interaction
            ACM Transactions on Computer-Human Interaction  Volume 26, Issue 2
            Special Issue on Human-Building Interaction
            April 2019
            217 pages
            ISSN:1073-0516
            EISSN:1557-7325
            DOI:10.1145/3319806
            Issue’s Table of Contents

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 March 2019
            • Accepted: 1 December 2018
            • Revised: 1 November 2018
            • Received: 1 January 2018
            Published in tochi Volume 26, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format