Co-designing Community-based Sharing of Smarthome Devices for the Purpose of Co-monitoring In-home EmergenciesWe conducted 26 co-design interviews with 50 smarthome device owners to understand the perceived benefits, drawbacks, and design considerations for developing a smarthome system that facilitates co-monitoring with emergency contacts who live outside of one's home. Participants felt that such a system would help ensure their personal safety, safeguard from material loss, and give them peace of mind by ensuring quick response and verifying potential threats. However, they also expressed concerns regarding privacy, overburdening others, and other potential threats, such as unauthorized access and security breaches. To alleviate these concerns, participants designed flexible and granular access control and fail-safe back-up features. Our study reveals why peer-based co-monitoring of smarthomes for emergencies may be beneficial but also difficult to implement. Based on the insights gained from our study, we provide recommendations for designing technologies that facilitate such co-monitoring while mitigating its risks.2023LALeena Alghamdi et al.University of Central FloridaSmart Home Interaction DesignSmart Home Privacy & SecurityParticipatory DesignCHI
From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy Together?Our research aims to highlight and alleviate the complex tensions around online safety, privacy, and smartphone usage in families so that parents and teens can work together to better manage mobile privacy and security-related risks. We developed a mobile application ("app") for Community Oversight of Privacy and Security(“CO-oPS”) and had parents and teens assess whether it would be applicable for use with their families. CO-oPS is an Android app that allows a group of users to co-monitor the apps installed on one another’s devices and the privacy permissions granted to those apps. We conducted a study with 19 parent-teen (ages 13-17)pairs to understand how they currently managed mobile safety and app privacy within their family and then had them install, use, and evaluate the CO-oPS app. We found that both parents and teens gave little consideration to online safety and privacy before installing new apps or granting privacy permissions. When using CO-oPS, participants liked how the app increased transparency into one another’s devices in a way that facilitated communication, but were less inclined to use features for in-app messaging or to hide apps from one another. Key themes related to power imbalances between parents and teens surfaced that made co-management challenging. Parents were more open to collaborative oversight than teens, who felt that it was not their place to monitor their parents, even though both often believed parents lacked the technological expertise to monitor themselves. Our study sheds light on why collaborative practices for managing online safety and privacy within families may be beneficial but also quite difficult to implement in practice. We provide recommendations for overcoming these challenges based on the insights gained from our study.2022MAMamtaj Akter et al.Privacy at Various Life Stages; Privacy at Various Life StagesCSCW
One Week in the Future: Previs Design Futuring for HCI ResearchWe explore the use of cinematic "pre-visualization" (previs) techniques as a rapid ideation and design futuring method for human computer interaction (HCI) research. Previs approaches, which are widely used in animation and film production, use digital design tools to create medium-fidelity videos that capture richer interaction, motion, and context than sketches or static illustrations. When used as a design futuring method, previs can facilitate rapid, iterative discussions that reveal tensions, challenges, and opportunities for new research. We performed eight one-week design futuring sprints, in which individual HCI researchers collaborated with a lead designer to produce concept sketches, storyboards, and videos that examined future applications of their research. From these experiences, we identify recurring themes and challenges and present a One Week Futuring Workbook that other researchers can use to guide their own futuring sprints. We also highlight how variations of our approach could support other speculative design practices.2022AIAlexander Ivanov et al.University of CalgaryDesign FictionInteractive Narrative & Immersive StorytellingCHI
Methodological Reflections on Ways of SeeingThe computer as a creative medium has largely influenced how we make, use, and share images. This study investigates how similarly or distinctively human designers and the computers see (i.e., process visual information from the activity of seeing) in creative practice. Based on the review of the perspectives relevant to seeing (e.g., visual experience, visual creativity, visual computing), we practiced a visual inquiry by marking how we see photographic images in comparison to what computer vision processes from the same images. Taking a researcher-introspective approach, two authors reflectively analyzed the processes and outcomes of the inquiry. The findings revealed that during the creative practice, the activity of seeing is a meaning-making process that is guided, shifted, and diffracted through visual conversations between visible and invisible qualities suggested by compositional rules and computer vision. We discuss potentials of computational visual intelligence as creative agents and conclude with methodological and practical implications.2022HJHeekyoung Jung et al.University of CincinnatiGenerative AI (Text, Image, Music, Video)Visualization Perception & CognitionCHI
Examining Collaborative Support for Privacy and Security in the Broader Context of Tech CaregivingManaging digital privacy and security is often a collaborative process, where groups of individuals work together to share information and give one another advice. Yet, this collaborative process is not always reciprocal or equally shared. In many cases, individuals with more expertise help others without receiving help in return. Therefore, we studied the phenomenon of “Tech Caregiving" by surveying 20 groups (112 individuals) comprised of friends, family members, and/or co-workers who identified at least one member of their group as a someone who provides informal technical support to the people they know. We found that tech caregivers reported significantly higher levels of power use and self-efficacy for digital privacy and security, compared to tech caregivees. However, caregivers and caregivees did not differ based on their self-reported community collective efficacy for collaboratively managing privacy and security together as a group. This finding demonstrates the importance of tech caregiving and community belonging in building community collective efficacy for digital privacy and security. We also found that caregivers and caregivees most often communicated via text message or phone when coordinating support, which was most frequently needed when troubleshooting or setting up new devices. Meanwhile, discussions specific to privacy and security represented only a small fraction of the issues for which participants gave or received tech care. Thus, we conclude that educating tech caregivers on how to provide privacy and security-focused support, as well as designing technologies that facilitate such support, has the potential to create positive networks effects towards the collective management of digital privacy and security.2021JKJess Kropczynski et al.Privacy and SecurityCSCW
Exploring Generative Reflection by Agency of Visual PracticeThis study explores generative dimensions of reflection, shifting the focus of inquiry from tracking data to generating insights by visual practice. Two authors conducted autoethnographic research through visual exercises and analyzed structural elements and outcomes of the practice. Five generative reflection stages were developed by thematic analysis of written reflection notes: 1) notice and focus, 2) translate and frame, 3) make with materials, 4) interpret, and 5) continue and connect. Themes and styles of resulting images were interpreted through compositional analysis. Based on the study findings, we discuss some types of agency found by visual practice in generating visual insights: 1) making the invisible visible, 2) de/re-constructing with visual elements, 3) filling with compositional integrity, and 4) re-styling and re-mixing. We conclude with implications of visual inquiry as a means of noticing and investigating agency in design research and creative practice for reflection.2021HJHeekyoung Jung et al.Digital Art Installations & Interactive PerformanceInteractive Narrative & Immersive StorytellingDIS
Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult CommunitiesOlder adults are increasingly becoming adopters of digital technologies, such as smartphones; however, this population remains particularly vulnerable to digital privacy and security threats. To date, most research on technology used among older adults focuses on helping individuals overcome their discomfort or lack of expertise with technology to protect them from such threats. Instead, we are interested in how communities of older adults work together to collectively manage their digital privacy and security. To do this, we surveyed 67 individuals across two older adult communities (59 older adults and eight employees or volunteers) and found that the community's collective efficacy for privacy and security was significantly correlated with the individuals' self-efficacy, power usage of technology, and their sense of community belonging. Community collective efficacy is a group's mutual belief in its ability to achieve a shared goal. Using social network analysis, we further unpacked these relationships to show that many older adults interact with others who have similar technological expertise, and closer-knit older adult communities that have low technology expertise (i.e., low power usage and self-efficacy) may increase their community collective efficacy for privacy and security by embedding facilitators (e.g., employees or volunteers) who have more technical expertise within their communities. Our work demonstrates how both peer influence and outside expertise can be leveraged to support older adults in managing their digital privacy and security.2020JKJess Kropczynski et al.Privacy and SecurityCSCW
Smart Home Beyond the Home: A Case for Community-Based Access ControlAs smart devices are becoming commonplace in homes, we need to explore the needs of not just the residents of the home, but also of secondary stakeholders who may be granted access to these devices from outside of the home. We conducted a mixed methods study, which included a survey of 163 smart home device owners and a follow-up interview with 13 individuals who currently share their smart home devices with others outside of their home. Nearly half (47.8%) of our survey participants shared at least one smart home device with someone that did not live with them. Individuals sought greater safety and security by providing remote access to trusted family members or friends. By understanding users' perspectives about privacy and trust in relation to sharing smart home devices beyond the home, we build a case for community-based access control of smart home devices in the Internet of Things.2020MTMadiha Tabassum et al.University of North Carolina at CharlotteSmart Home Interaction DesignHome Energy ManagementSmart Home Privacy & SecurityCHI
In Search of Forms for Evocative and Generative Reflection: Exploratory Studies and a Design ProposalToday an increasing number of personal informatics tools and platforms support intended behavior change and goal achievement through data-based self-reflection. The scope of self-reflection expands with emerging sources, goals, and challenges of human well-being, demanding for reframing recent computer-mediated reflective practice. This study investigates a broader range of contexts and forms of self-reflection that support navigating one's mind and goals beyond achieving preset goals. This paper describes contemporary issues on human well-being and two exploratory studies—one conducted in a traveling artists' residency and the other in a design studio class—which surveyed various triggers, contexts, and forms of self-reflection. By connecting the insights from the two studies, I propose evocative and generative reflection as an alternative perspective to tracking-based, goal-oriented reflection and discuss implications for the design for reflection with a focus on the creative dimension of human well-being.2020HJHeekyoung JungUniversity of CincinnatiUniversal & Inclusive DesignUser Research Methods (Interviews, Surveys, Observation)Prototyping & User TestingCHI
Understanding Life Transitions: A Case Study of Support Needs of Low-Income MothersLife transitions are an integral part of the human experience. However, research shows that lack of support during life transitions can result in adverse health outcomes. To better understand the support needs and structures of low-income women during transition to motherhood, we interviewed 10 women and their 14 supporters during the transition. Our findings suggest that support needs and structures of mothers evolve during transition, and that they also vary by socio-economic contexts. In this paper, we detail our study design and findings. Informed by our findings, we posit that all life-transitions are not the same, and that therefore, the optimal support intervention point varies for different life transitions. Currently there are no tools available to identify optimal support intervention points during life transitions. To this end, we also introduce a preliminary framework - the Strength-Stress-Analysis (SSA) framework - to identify optimal support intervention points during life-transitions.2019APAnnu Sible Prabhakar et al.University of Cincinnati & Indiana UniversityAugmentative & Alternative Communication (AAC)Participatory DesignCHI
Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions TogetherCollective feedback can support an individual’s decision-making process. For instance, individuals often seek the advice of friends, family, and co-workers to help them make privacy decisions. However, current technologies often do not provide mechanisms for this type of collaborative interaction. To address this gap, we propose a novel model of Community Oversight for Privacy and Security (“CO-oPS”), which identifies mechanisms for users to interact with people they trust to help one another make digital privacy and security decisions. We apply our CO-oPS model in the context of mobile applications (“apps”). To interrogate and refine this model, we conducted participatory design sessions with 32 participants in small groups of 2-4 people who know one another, with the goal of designing a mobile app that facilitates collaborative privacy and security decision-making. We describe and reflect on the opportunities and challenges that arise from the unequal motivation and trust in seeking support and giving support within and beyond a community. Through this research, we contribute a novel framework for collaborative digital privacy and security decision-making and provide empirical evidence towards how researchers and designers might translate this framework into design-based features.2019CCChhaya Chouhan et al.Privacy and SecurityCSCW
Explaining Viewers’ Emotional, Instrumental, and Financial Support Provision for Live StreamersOn live streams, viewers can support streamers through various methods ranging from well-wishing text messages to money. In this study (N=230) we surveyed viewers who had given money to a streamer. We identified six motivations for why they gave money to their favorite live streamer. We then examined how factors related to viewer, streamer, and viewer-streamer interaction were associated with three forms of social support provision: emotional, instrumental, and financial support. Our main findings are: parasocial relationship was consistently correlated with all three types of social support, while social presence was only related with instrumental and financial support; interpersonal attractiveness was associated with emotional and instrumental support and lonely people were more likely to give instrumental support. Our focus on various types of social support in a live streaming masspersonal platform adds a more detailed understanding to the existing literature of mediated social support. Furthermore, it suggests potential directions for designing more supportive and interactive live streaming platforms.2018DWDonghee Yvette Wohn et al.New Jersey Institute of TechnologyMultiplayer & Social GamesLive Streaming & Spectating ExperienceSocial Platform Design & User BehaviorCHI
Keppi: A Tangible User Interface for Self-Reporting PainMotivated by the need to support those managing chronic pain, we report on the iterative design, development, and evaluation of Keppi, a novel pressure-based tangible user interface (TUI) for the self-report of pain intensity. In-lab studies with 28 participants found individuals were able to use Keppi to reliably report low, medium, and high pain as well as map squeeze pressure to pain level. Based on insights from these evaluations, we ultimately created a wearable version of Keppi with multiple form factors, including a necklace, bracelet, and keychain. Interviews indicated high receptivity to the wearable design, which satisfied additional user-identified needs (e.g., discreet and convenient) and highlighted key directions for the continued refinement of tangible devices for pain assessment.2018AAJean Costa et al.Cornell UniversityForce Feedback & Pseudo-Haptic WeightHaptic WearablesMotor Impairment Assistive Input TechnologiesCHI
Bottom-Up Imaginaries: The Cultural-Technical Practice of Inventing Regional Advantage through IT R&DRecent HCI research on social creativity and bottom-up innovation has highlighted how concerted efforts by the government policy and business communities to develop innovation ecosystems are increasingly intertwined with IT research and development. We note that many such efforts focus on cultivating regional advantage [20] in the form of innovation hubs that are situated in and leverage distinct sociocultural histories and geographies. Cultivating regional advantage entails achieving broad consensus about what that region’s advantage might be, that is, the construction of a regional advantage imaginary beyond the policies, IT supports, and practices to make it happen. Here, we document how an ongoing public debate among makers and manufacturers in Taiwan as a region—distinguished by direct engagement with design, fabrication, prototyping, and manufacturing processes—are proposing pathways toward a regional advantage that both reflects Taiwan’s recent sociocultural and economic histories and also its near future aspirations.2018GFGuo Freeman et al.University of CincinattiMakerspace CultureDeveloping Countries & HCI for Development (HCI4D)CHI