Abstract
Through sensors carried by people and sensors embedded in the environment, personal data is being processed to try to understand activity patterns and people's internal states in the context of human-building interaction. This data is used to actuate adaptive buildings to make them more comfortable, convenient, and accessible or information rich. In a series of envisioning workshops, we queried the future relationships between people, personal data and the built environment, when there are no technical limits to the availability of personal data to buildings. Our analysis of created designs and user experience fictions allows us to contribute a systematic exposition of the emerging design space for adaptive architecture that draws on personal data. This is being situated within the context of the new European information privacy legislation, the EU General Data Protection Regulation 2016. Drawing on the tension space analysis method, we conclude with the illustration of the tensions in the temporal, spatial, and inhabitation-related relationships of personal data and adaptive buildings, re-usable for the navigation of the emerging, complex issues by future designers.
- N. Thrift. 2006. Movement-space: The changing domain of thinking resulting from the development of new kinds of spatial awareness. Economy and Society 33, 4 (2006), 582--604.Google ScholarCross Ref
- J. Berry and J. Thornton. 2002. Design for green—Jubilee Campus, Nottingham. In Ingenia Online. The Royal Academy of Engineering, London, UK, 35--40.Google Scholar
- S. Roaf, M. Fuentes, and S. Thomas. 2007. EcoHouse: A Design Guide (3rd ed.). Architectural Press, Oxford, UK, 352.Google Scholar
- A. McGibney, S. Rea, and J. Ploennigs. 2016. Open BMS—IoT driven architecture for the internet of buildings. In 42nd Annual Conference of the IEEE Industrial Electronics Society (IECON’16). IEEE, Florence, Italy.Google Scholar
- The Stan Project. 2015. Pynchon's Wall. Retrieved from http://frequency.org.uk/artist-focus-the-stan-project/.Google Scholar
- H. Schnädelbach, K. Glover, and A. Irune. 2010. ExoBuilding—Breathing Life into Architecture. In 6th Nordic Conference on Human-Computer Interaction (NordiCHI ’10). ACM Press, Reykjavik, Iceland, 442--451. Google ScholarDigital Library
- A. Small. 2011. Anyone Who Has A Heart. Retrieved from https://www.axisweb.org/p/andrewsmall/workset/36457-anyone-who-has-a-heart/.Google Scholar
- A. Haw and C. Ratti. 2012. Living bits and bricks. Architectural Review 231, 1383 (2012), 89--93.Google Scholar
- C. Ratti and M. Claudel. 2014. The rise of the ‘Invisible Detail’. Architectural Design 84, 4 (2014), 86--91.Google ScholarCross Ref
- S. Iaconesi and O. Persico. 2017. Digital Urban Acupuncture. Springer, Cham, Switzerland, 123--147.Google Scholar
- R. Kitchin and M. Dodge. 2011. Code/Space: Software and Everyday Life. MIT Press, Cambridge. Google ScholarDigital Library
- M. Weiser. 1991. The computer for the twenty-first century. Scientific American 265, 3 (1991), 94--104.Google ScholarCross Ref
- M. Weiser and J. S. Brown. 1996. Designing calm technology. PowerGrid Journal 1, 1 (1996), 75--85.Google Scholar
- N. A. Streitz, J. Geißler, and T. Holmer. 1998. Roomware for cooperative buildings: Integrated design of architectural spaces and information spaces. In International Workshop on Cooperative Buildings. Springer, Darmstadt, Germany. Google ScholarDigital Library
- D. J. Cook, J. C. Augusto, and V. R. Jakkula. 2009. Ambient intelligence: Technologies, applications, and opportunities. Pervasive and Mobile Computing 5, 4 (2009), 277--298. Google ScholarDigital Library
- M. McCullough. 2004. Digital Ground: Architecture, Pervasive Computing, and Environmental Knowing. MIT Press, Cambridge, MA, xvi, 272. Google ScholarDigital Library
- Y. Rogers. 2006. Moving on from Weiser's vision of calm computing: Engaging UbiComp experiences. In UbiComp. Springer, Orange County. Google ScholarDigital Library
- G. Bell and P. Dourish. 2007. Yesterday's tomorrows: Notes on ubiquitous computing's dominant vision. Personal and Ubiquitous Computing 11, 2 (2007), 133--143. Google ScholarDigital Library
- A. Greenfield. 2006. Everyware: The Dawning Age of Ubiquitous Computing. New Riders, Berkeley, iii, 267. Google ScholarDigital Library
- E. Aarts and F. Grotenhuis. 2011. Ambient intelligence 2.0: Towards synergetic prosperity. Journal of Ambient Intelligence and Smart Environments 3, 1 (2011), 3--11. Google ScholarDigital Library
- J. G. Ballard. 1971. The thousand dreams of Stellavista. In Vermilion Sands. Vintage Random House, London, 185--208.Google Scholar
- S. North, H. Schnädelbach, A. Fatah, W. Motta, L. Ye, M. Behrens, and E. Kostopoulou. 2013. Tension space analysis: Exploring community requirements for networked urban screens. In Human-Computer Interaction (INTERACT’13), P. Kotzé et al. (Eds.). Springer, Berlin, 81--98.Google Scholar
- H. Schnädelbach. 2010. Adaptive architecture—A conceptual framework. In MediaCity, J. Geelhaar et al. (Eds.). Bauhaus-Universität Weimar, Germany, 523--555.Google Scholar
- M. Meagher. 2015. Designing for change The poetic potential of responsive architecture. Frontiers of Architectural Research 4 (2015), 159--165.Google ScholarCross Ref
- L. Bullivant (Ed.). 2005. 4dspace: Interactive Architecture (Architectural Design). Wiley-Academy, 128. Google ScholarDigital Library
- K. E. Green. 2016. Architectural Robotics: Ecosystems of Bits, Bytes, and Biology. MIT Press, Cambridge, 288. Google ScholarDigital Library
- R. Harper. 2003. Inside the Smart Home. Springer, New York, London, xi, 264. Google ScholarDigital Library
- I. Van Zijl and B. Mulder. 2000. The Rietveld Schroder House. Princeton Architectural Press, New York, 48.Google Scholar
- D. Lupton. 2016. The Quantified Self: A Sociology of Self-Tracking. Polity, Cambridge, UK, viii, 183. Google ScholarDigital Library
- M. Shepard. 2011. Sentient City: Ubiquitous Computing, Architecture, and the Future of Urban Space. MIT Press, Cambridge, 229. Google ScholarDigital Library
- A. Greenfield. 2013. Against the Smart City (The City is Here for You to Use). Do Projects, New York.Google Scholar
- D. Wang. 2016. HCI, policy and the smart city. In 30th International BCS Human Computer Interaction Conference: Fusion! BCS Learning 8 Development Ltd, Poole, UK. Google ScholarDigital Library
- L. Edwards. 2016. Privacy, security and data protection in smart cities: A critical EU law perspective. European Data Protection Law Review 2 (2016), 28.Google ScholarCross Ref
- E. Papadopoulou, S. Gallacher, N. K. Taylor, and M. H. Williams. 2012. A personal smart space approach to realising ambient ecologies. Pervasive and Mobile Computing 8, 4 (2012), 485--499. Google ScholarDigital Library
- G. T. Marx. 2003. A tack in the shoe: Neutralizing and resisting the new surveillance. Journal of Social Issues 59, 2 (2003), 369--390.Google ScholarCross Ref
- M. W. Steenson. 2015. Microworld and mesoscale. Interactions 22, 4 (2015), 58--60. Google ScholarDigital Library
- M. Addington. 2015. Smart architecture, dumb buildings. In Building Dynamics. B. Kolarevic and V. Parlac (eds.), Routledge, London, UK.Google Scholar
- U. Varshney. 2007. Pervasive healthcare and wireless health monitoring. Mobile Networks and Applications 12, 2--3 (2007), 113--127. Google ScholarDigital Library
- H. Busta. 2015. ThyssenKrupp and Microsoft are Making the Elevator Smart. Retrieved from http://www.architectmagazine.com/technology/products/thyssenkrupp-and-microsoft-are-making-the-elevator-smart_o.Google Scholar
- E. S. Poulsen, H. J. Andersen, and O. B. Jensen. 2012. Full scale experiment with interactive urban lighting. In Designing Interactive Lighting Workshop at ACM DIS. ACM Press, Newcastle, UK.Google Scholar
- O. Khan. 2010. Open columns: a carbon dioxide (CO2) responsive architecture. In CHI 2010. ACM, Atlanta, 4789--4792. Google ScholarDigital Library
- K. Eng, A. Baebler, U. Bernardet, M. Blanchard, M. Costa, T. Delbrück, R. Douglas, K. Hepp, D. Klein, J. Manzolli, M. Mintz, F. Roth, U. Rutishauser, K. Wassermann, A. M. Whatley, A. Wittmann, R. Wyss, and P. F. M. J. Verschure. 2003. Ada—intelligent space: An artificial creature for the Swiss Expo.02. In IEEE International Conference on Robotics and Automation (ICRA ’03). IEEE, Taipei, Taiwan.Google Scholar
- H. Schnädelbach, A. Irune, D. Kirk, K. Glover, and P. Brundell. 2012. ExoBuilding: Physiologically driven adaptive architecture. ACM Transactions in Computer Human Interaction 19, 4 (2012), 1--22. Google ScholarDigital Library
- N. Jäger, H. Schnädelbach, J. Hale, D. Kirk, and K. Glover. 2017. Reciprocal control in adaptive environments. Interacting with Computers 29, 4 (2017), 512--529.Google Scholar
- B. Das, D. J. Cook, N. C. Krishnan, and M. Schmitter-Edgecombe. 2016. One-class classification-based real-time activity error detection in smart homes. IEEE Journal of Selected Topics in Signal Processing 10, 5 (2016), 914--923.Google ScholarCross Ref
- W. Lau. 2016. Lessons from a Living Building: The Brock Environmental Center. Retrieved January 9, 2017 from http://www.architectmagazine.com/technology/lessons-from-a-living-building-the-brock-environmental-center_o.Google Scholar
- H. Schnädelbach. 2010. Conceptual Framework of Adaptive Architecture. Retrieved March 15, 2016 from http://www.adaptivearchitectureframework.org.Google Scholar
- H. Hecht, M. Mayier, and C. Perakslis. 2014. Pervasive connectivity: The thriving hotel of the future. In Pervasive Computing and Communications Workshops (PERCOM ’14). IEEE, Budapest, Hungary.Google Scholar
- C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin. 2015. Smart homes and their users: A systematic analysis and key challenges. Personal and Ubiquitous Computing 19, 2 (2015), 463--476. Google ScholarDigital Library
- D. Wright, S. Gutwirth, M. Friedewald, E. Vildjiounaite, and Y. Punie. (Eds.). 2008. Safeguards in a World of Ambient Intelligence. Springer, Dordrecht, The Netherlands, XXXIV, 292. Google ScholarDigital Library
- D. Garland. 2001. The Culture of Control: Crime and Social Order in Contemporary Society. University of Chicago Press, Chicago, 336.Google Scholar
- A. Von Hirsch, D. Garland, and A. Wakefield (Eds.). 2000. Ethical and Social Perspectives on Situational Crime Prevention. Hart, Cambridge, UK, 240.Google Scholar
- R. I. Mawby. 1977. Defensible space: A theoretical and empirical appraisal. Urban Studies 14, 2 (1977), 169--179.Google ScholarCross Ref
- C. Norris and M. McCahill. 2006. CCTV: Beyond penal modernism? British Journal of Criminology 46, 1 (2006), 97--118.Google ScholarCross Ref
- D. Neyland and N. Möllers. 2017. Algorithmic IF … THEN rules and the conditions and consequences of power. Information Communication and Society 20, 1 (2017), 45--62.Google ScholarCross Ref
- R. Kitchin. 2015. The promise and perils of smart cities. In Computers 8 Law. Scottish Society for Computers and Law, Edingburgh, Scotland.Google Scholar
- S. Graham and D. Wood. 2003. Digitizing surveillance: Categorization, space. Inequality. Critical Social Policy 23, 2 (2003), 227--248.Google ScholarCross Ref
- S. Graham. 2009. Cities as battlespace: The new military urbanism. City 13, 4 (2009), 383--402.Google ScholarCross Ref
- S. Jones, S. Hara, and J. C. Augusto. 2015. eFRIEND: An ethical framework for intelligent environments development. Ethics and Information Technology 17, 1 (2015), 11--25. Google ScholarDigital Library
- E. Tapia, S. Intille, and K. Larson. 2004. Activity recognition in the home setting using simple and ubiquitous sensors. In Pervasive Computing. A. Ferscha and F. Mattern (eds.), Springer, 158--175.Google Scholar
- R. W. Picard. 1997. Affective Computing. MIT Press, Cambridge, xii, 292. Google ScholarDigital Library
- Information Commissioner's Office. 2017. Guide to the General Data Protection Regulation (GDPR). Retrieved from https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/.Google Scholar
- L. Sweeney. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine 8 Ethics: A Journal of the American Society of Law, Medicine 8 Ethics 25, 2--3 (1997), 98--110, 82.Google Scholar
- P. Ohm. 2010. Broken promises of privacy: Responding to the surprising failure of anonymization. UCLA Law Review 57, 6 (2010), 1701--1777.Google Scholar
- Article 29 Working Party, Opinion 05/2014 on Anonymisation Techniques (2014).Google Scholar
- A. Narayanan and V. Shmatikov. 2008. Robust de-anonymization of large sparse datasets. In IEEE Symposium on Security and Privacy. IEEE, Oakland. Google ScholarDigital Library
- H. Schnädelbach. 2016. Adaptive Architecture. Interactions. 23, 2 (2016), 62--65. Google ScholarDigital Library
- J. Lehikoinen and V. Koistinen. 2014. In big data we trust? Interactions 21, 5 (2014). 38--41. Google ScholarDigital Library
- S. Nicholls. 2018. The Facebook data leak: What happend and what's next. Economy (2018). Retrieved June 20, 2018 from http://www.euronews.com/2018/04/09/the-facebook-data-leak-what-happened-and-what-s-next.Google Scholar
- S. Reeves. 2012. Envisioning ubiquitous computing. In SIGCHI Conference on Human Factors in Computing Systems. ACM, Austin, TX, 1573--1582. Google ScholarDigital Library
- M. Smyth and I. Helgason. 2013. Tangible possibilities—Envisioning interactions in public space. Digital Creativity 24, 1 (2013), 75--87.Google ScholarCross Ref
- G. Graham. 2014. Is Anyone Asking People What They Want from the Smart Cities of the Future? Retrieved from https://theconversation.com/is-anyone-asking-people-what-they-want-from-the-smart-cities-of-the-future-23855Google Scholar
- E. Luger, L. Urquhart, T. Rodden, and M. Golembewski. 2015. Playing the legal card: Using ideation cards to raise data protection issues within the design process. In 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, Seoul, South Korea, 457--466. Google ScholarDigital Library
- D. Tatar. 2007. The design tensions framework. Human-Computer Interaction 22, 4 (2007), 413--451. Google ScholarDigital Library
- S. Brand. 1994. How Buildings Learn: What Happens after they're Built. Viking, New York, viii, 243.Google Scholar
- J. O'Connor. 2004. Survey on actual service lives for North American buildings. In Woodframe Housing Durability and Disaster Issues Conference. 1--9.Google Scholar
- G. Liu, K. Xu, X. Zhang, and G. Zhang. 2014. Factors influencing the service lifespan of buildings: An improved hedonic model. Habitat International 43 (2014), 274--282.Google ScholarCross Ref
- C. Beanland. 2012. Temporary buildings: Should they stay, or should they go? Independent (2012). Retrieved August 9, 2012 from http://www.independent.co.uk/arts-entertainment/architecture/temporary-buildings-should-they-stay-or-should-they-go-8022696.html.Google Scholar
- Research Councils UK. 2015. Guidance on Best Practice in the Management of Research Data. Research Councils UK.Google Scholar
- K. Kooroshy. 2017. Amazon: Verstöße gegen Mitarbeiterrechte. Retrieved from https://www.ndr.de/fernsehen/sendungen/panorama3/Amazon-Verstoesse-gegen-Mitarbeiterrechte,amazon278.html.Google Scholar
- L. Urquhart, N. Sailaja, and D. McAuley. 2017. Realising the right to data portability for the domestic Internet of things. Personal and Ubiquitous Computing 22, 2 (2018), 317--332. Google ScholarDigital Library
- J. Vidyarthi, B. E. Riecke, and D. Gromala. 2012. Sonic cradle: Designing for an immersive experience of meditation by connecting respiration to music. In Designing Interactive Systems. ACM, Newcastle Upon Tyne, 408--417. Google ScholarDigital Library
- M. Milenkovic. 2015. A case for interoperable iot sensor data and meta-data formats: The internet of things. In Ubiquity 2015 (2015), 7. Google ScholarDigital Library
- US Government. 2015. Privacy Shield. Retrieved January 16, 2018 from https://www.privacyshield.gov/welcome.Google Scholar
- C. J. Millard (Ed.). 2013. Cloud Computing Law. Oxford University Press, Oxford, UK, 436.Google Scholar
- Article 29 Data Protection Working Party WP 223. 2014. Opinion 8/2014 on Recent Developments on the Internet of Things. European Commission, Brussels, 1--24.Google Scholar
- Office of the Privacy Commissioner of Canada. 2017. Privacy Enhancing Technologies—A Review of Tools and Techniques. Quebec, Canada.Google Scholar
- F. Brunton and H. Nissenbaum. 2015. Obfuscation: A User's Guide for Privacy and Protest. MIT Press, Cambridge, 123. Google ScholarDigital Library
- M. Dennedy, J. Fox, and T. Finneran. 2014. Privacy Engineer's Manifesto. Apress, Berkeley, 362.Google Scholar
- L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-Marshall, and J. Reagle. 2002. The platform for privacy preferences 1.0 (P3P1.0) specification. W3C 2002. 1--76.Google Scholar
- W. Zheng, A. Dave, J. G. Beekman, R. A. Popa, J. E. Gonzalez, and I. Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. In NSDI. Boston. Google ScholarDigital Library
- R. Mortier, J. Zhao, J. Crowcroft, Q. Li, L. Wang, H. Haddadi, Y. Amar, A. Crabtree, J. Colley, and T. Lodge. 2016. Personal data management with the Databox: What's inside the box? In Workshop on Cloud-Assisted Networking. Irvine, 49--54. Google ScholarDigital Library
- L. Urquhart and D. McAuley. 2018. Avoiding the internet of insecure industrial things. Computer Law and Security Review 34, 3 (2018), 450--466.Google ScholarCross Ref
- L. Edwards and L. Urquhart. 2016. Privacy in public spaces: What expectations of privacy do we have in social media intelligence? International Journal of Law and Information Technology 24, 3 (2016), 279--310.Google ScholarCross Ref
- L. Taylor, L. Floridi, and B. V. D. Sloot, eds. 2017. Group Privacy: New Challenges of Data Technologies. Springer, XIII, 237. Google ScholarDigital Library
- H. Nissenbaum. 2009. Privacy in Context: Technology Policy and the Integrity of Social Life. Stanford University Press, Redwood City, 304. Google ScholarDigital Library
- A. Crabtree, P. Tolmie, and W. Knight. 2017. Repacking ‘Privacy’ for a networked world. Computer Supported Cooperative Work: An International Journal 26, 4--6 (2017), 453--488. Google ScholarDigital Library
- M. Goulden, P. Tolmie, R. Mortier, T. Lodge, A.-K. Pietilainen, and R. Teixeira. 2017. Living with interpersonal data: Observability and accountability in the age of pervasive ICT. New Media 8 Society 20, 4 (2017), 1580--1599.Google Scholar
- The UK Government. 2017. Renting Out Your Property (England and Wales). Retrieved from https://www.gov.uk/renting-out-a-property.Google Scholar
- Citizens Advice. 2018. Duty to Make Reasonable Adjustments for Disabled People. Retrieved from https://www.citizensadvice.org.uk/law-and-courts/discrimination/what-are-the-different-types-of-discrimination/duty-to-make-reasonable-adjustments-for-disabled-people/.Google Scholar
- L. Urquhart, T. Lodge, and A. Crabtree. 2018. Demonstrably doing accountability for the internet of things. International Journal of Law and Information Technology 27 (2018), 1--27.Google ScholarCross Ref
- T. Randall. 2015. The Edge Is the Greenest, Most Intelligent Building in the World. Retrieved from https://www.bloomberg.com/features/2015-the-edge-the-worlds-greenest-building/.Google Scholar
Index Terms
- Adaptive Architecture and Personal Data
Recommendations
Gifting Interpretations of Personal Data
CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing SystemsResearch on physical representations of data has often used personal data as its focus. Core aim of making personal data physical is to provoke self-reflections through a felt experience. In this paper, we present a preliminary study which employs the ...
Self-Reflection and Personal Physicalization Construction
CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing SystemsSelf-reflection is a central goal of personal informatics systems, and constructing visualizations from physical tokens has been found to help people reflect on data. However, so far, constructive physicalization has only been studied in lab ...
An Interview Method for Engaging Personal Data
Whether investigating research questions or designing systems, many researchers and designers need to engage users with their personal data. However, it is difficult to successfully design user-facing tools for interacting with personal data without ...
Comments