The work to make a home network work
Loading...
Fulltext URI
Document type
Text
Files
Additional Information
Date
Journal Title
Journal ISSN
Volume Title
Publisher
Springer, London
Abstract
Recently, households have begun to adopt networking technologies to interconnect devices within the home. Yet little is known about the consequences for households of setting up and living with these complex networks, nor the impact of such technologies on the routines of the home. In this paper, we report findings from an empirical study of households containing complex networks of computer and audio/visual technologies. Our study finds that home networks require significant household effort not just to coordinate their use, but also their set up and maintenance. We also show how the coordination around networking has to be worked into the routines of the home and the householders.
Description
Keywords
Citation
URI
URI
Endorsement
Review
Supplemented By
Referenced By
Number of citations to item: 73
- Marshini Chetty, Ja-Young Sung, Rebecca E. Grinter (2000): How Smart Homes Learn: The Evolution of the Networked Home and Household, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-74853-3_8
- Gloria Mark, Norman Makoto Su (2010): Making infrastructure visible for nomadic work, In: Pervasive and Mobile Computing 3(6), doi:10.1016/j.pmcj.2009.12.004
- Erika Shehan Poole (2007): Using Visual Tools to Close the Home Networking Digital Divide, In: IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2007), doi:10.1109/vlhcc.2007.51
- Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou (2009): A service-layer diagnostic approach for the OSGi framework, In: IEEE Transactions on Consumer Electronics 4(55), doi:10.1109/tce.2009.5373758
- Maia Jacobs, Henriette Cramer, Louise Barkhuus (2016): Caring About Sharing, In: Proceedings of the 19th International Conference on Supporting Group Work, doi:10.1145/2957276.2957296
- Joel E. Fischer, Andy Crabtree, Tom Rodden, James A. Colley, Enrico Costanza, Michael O. Jewell, Sarvapali D. Ramchurn (2016): "Just whack it on until it gets hot", In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858518
- Michael O. Jewell, Enrico Costanza, Jacob Kittley-Davies (2015): Connecting the things to the internet, In: Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, doi:10.1145/2750858.2807535
- Guangyuan Huang, Yong Zhang, Xiangping Chen (2012): Using Touchable Tabletop as Unified Control Platform in Digital Home, In: 2012 Fourth International Conference on Digital Home, doi:10.1109/icdh.2012.73
- Edwin A. Heredia, Shailendra Kumar, Jun Nishimura, George Hsieh, Alan Messer (2014): Contextual proactivity for media sharing scenarios in proximity networks, In: 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), doi:10.1109/ccnc.2014.6866611
- Yusuf Perwej, Firoj Parwej, Mumdouh Mirghani Mohamed Hassan, Nikhat Akhtar (2019): The Internet-of-Things (IoT) Security : A Technological Perspective and Review, In: International Journal of Scientific Research in Computer Science, Engineering and Information Technology, doi:10.32628/cseit195193
- Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, Sunny Consolvo (2016): "She'll just grab any device that's closer", In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858051
- Jolynna Sinanan, Heather A Horst (2021): Gendered and generational dynamics of domestic automations, In: Convergence: The International Journal of Research into New Media Technologies 5(27), doi:10.1177/13548565211030451
- Jason Chen Zhao, Richard C. Davis, Pin Sym Foong, Shengdong Zhao (2015): CoFaçade, In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, doi:10.1145/2702123.2702588
- Shruti Sannon, Mihaela Vorvoreanu, Kathleen Walker, Adam Fourney (2020): "Am I doing this all wrong?", In: Proceedings of the ACM on Human-Computer Interaction CSCW2(4), doi:10.1145/3415209
- Petros Belimpasakis, Vlad Stirbu (2012): A survey of techniques for remote access to home networks and resources, In: Multimedia Tools and Applications 3(70), doi:10.1007/s11042-012-1221-y
- Erika S. Poole, Rob Comber, Jettie Hoonhout (2014): Disruption as a Research Method for Studying Technology Use in Homes, In: Interacting with Computers 1(27), doi:10.1093/iwc/iwu035
- Helene Fiane Teigen (2024): Troubleshooting the connected home: Exploring the perspectives of non-initiators, In: Convergence: The International Journal of Research into New Media Technologies, doi:10.1177/13548565241268062
- Mikael Wiberg (2000): On Mobility and Interaction Landscapes, In: Advances in Wireless Technologies and Telecommunication, doi:10.4018/978-1-4666-8583-3.ch001
- Timo Jakobi, Sameer Patil, Dave Randall, Gunnar Stevens, Volker Wulf (2019): It Is About What They Could Do with the Data, In: ACM Transactions on Computer-Human Interaction 1(26), doi:10.1145/3281444
- Hee Rin Lee, Selma Šabanović (2013): Weiser's dream in the Korean home, In: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, doi:10.1145/2493432.2493499
- Gunnar Stevens, Sebastian Draxler (2010): Appropriation of the Eclipse Ecosystem: Local Integration of Global Network Production, In: Proceedings of COOP 2010, doi:10.1007/978-1-84996-211-7_16
- A. Jalooli, Nor Azlina Bt Abd Rahman, Khalida Shajaratuddur Bt Harun, Nurul Haniza Bt Mohtar (2013): A troubleshooting home Internet connection framework for Malaysian Service Providers, In: 2013 Computing, Communications and IT Applications Conference (ComComAp), doi:10.1109/comcomap.2013.6533599
- Nitin Arvind Shelke, Sahil Ahuja, Avishek Banarjee, Navneet Pratap Singh, Singara Singh Kasana, Sonal Kukreja (2022): AI-enabled IoT based multimodal authentication system for securing the hardware and software clients, In: 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), doi:10.1109/com-it-con54601.2022.9850797
- Yi-Zeng Hsieh, Yu-Lin Jeng (2018): Development of Home Intelligent Fall Detection IoT System Based on Feedback Optical Flow Convolutional Neural Network, In: IEEE Access, doi:10.1109/access.2017.2771389
- Susan Wyche, Phoebe Sengers, Rebecca E. Grinter (2006): Historical Analysis: Using the Past to Design the Future, In: Lecture Notes in Computer Science, doi:10.1007/11853565_3
- Erman Hamid, Mei Choo Ang, Azizah Jaafar (2021): A Comparative Study on Visualization Technique for Home Network, In: Advances in Intelligent Systems and Computing, doi:10.1007/978-3-030-66501-2_6
- Jani Suomalainen, Seamus Moloney, Juha Koivisto, Kari Keinänen (2008): OpenHouse: A Secure Platform for Distributed Home Services, In: 2008 Sixth Annual Conference on Privacy, Security and Trust, doi:10.1109/pst.2008.11
- Heather Horst, Jolynna Sinanan (2021): Digital housekeeping: Living with data, In: New Media & Society 4(23), doi:10.1177/1461444820953535
- Antonio Manzalini, Roberto Minerva, Corrado Moiso (2009): Autonomics in the home, In: 2009 13th International Conference on Intelligence in Next Generation Networks, doi:10.1109/icin.2009.5357074
- Edward Anstead, Steve Benford, Robert Houghton (2016): MarathOn Multiscreen, In: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, doi:10.1145/2818048.2820003
- Mikołaj P. Woźniak, Sarah Vöge, Ronja Krüger, Heiko Müller, Marion Koelle, Susanne Boll (2023): Inhabiting Interconnected Spaces: How Users Shape and Appropriate Their Smart Home Ecosystems, In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3544548.3581497
- Dimosthenis Pediaditakis, Anandha Gopalan, Naranker Dulay, Morris Sloman, Tom Lodge (2012): Home Network Management Policies: Putting the User in the Loop, In: 2012 IEEE International Symposium on Policies for Distributed Systems and Networks, doi:10.1109/policy.2012.12
- George Chalhoub, Martin J Kraemer, Norbert Nthala, Ivan Flechais (2021): “It did not give me an option to decline”: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products, In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3411764.3445691
- Yuxi Wu, W. Keith Edwards, Sauvik Das (2022): SoK: Social Cybersecurity, In: 2022 IEEE Symposium on Security and Privacy (SP), doi:10.1109/sp46214.2022.9833757
- Catharina Ochsner, Jesse David Dinneen (2024): Power in the Home: Digital Housekeeping and Its Relevance to Information Behaviour, <scp>PIM</scp>, and Information Ethics, In: Proceedings of the Association for Information Science and Technology 1(61), doi:10.1002/pra2.1184
- Bryan Semaan, Bryan Dosono, Lauren M. Britton (2017): Impression Management in High Context Societies, In: Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, doi:10.1145/2998181.2998222
- Jenny Kennedy, Bjorn Nansen, Michael Arnold, Rowan Wilken, Martin Gibbs (2015): Digital housekeepers and domestic expertise in the networked home, In: Convergence: The International Journal of Research into New Media Technologies 4(21), doi:10.1177/1354856515579848
- R. Mortier, T. Rodden, T. Lodge, D. McAuley, C. Rotsos, A.W. Moore, A. Koliousis, J. Sventek (2012): Control and understanding: Owning your home network, In: 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), doi:10.1109/comsnets.2012.6151322
- Mark W. Newman, Ame Elliott, Trevor F. Smith (2008): Providing an Integrated User Experience of Networked Media, Devices, and Services through End-User Composition, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-79576-6_13
- Mikael Wiberg (2012): Landscapes, Long Tails and Digital Materialities, In: International Journal of Mobile Human Computer Interaction 1(4), doi:10.4018/jmhci.2012010103
- Emma Nicol, Mark Dunlop, Andreas Komninos, Marilyn McGee-Lennon, Lynne Baillie, Parisa Eslambolchilar, Pin Sym Foong, Paul Gault, Lilit Hakobyan, Jo Lumsden, Fáber Danilo Giraldo Velàsquez, Ann-Marie Horcher (2015): 2nd Workshop on Designing with Older Adults, In: Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, doi:10.1145/2786567.2795395
- Nils Ehrenberg (2024): Smart Home Technologies: Convenience and Control, In: Humane Autonomous Technology, doi:10.1007/978-3-031-66528-8_8
- Sarita Yardi, Amy Bruckman (2011): Social and technical challenges in parenting teens' social media use, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1978942.1979422
- A. J. Bernheim Brush, Kori M. Inkpen (2000): Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-74853-3_7
- Nico Castelli, Corinna Ogonowski, Timo Jakobi, Martin Stein, Gunnar Stevens, Volker Wulf (2017): What Happened in my Home?, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3025453.3025485
- Hee Rin Lee, EunJeong Cheon, Chaeyun Lim, Kerstin Fischer (2022): Configuring Humans: What Roles Humans Play in HRI Research, In: 2022 17th ACM/IEEE International Conference on Human-Robot Interaction (HRI), doi:10.1109/hri53351.2022.9889496
- Simon Mayer, Florian Michahelles (2017): HoloInteractions, In: Proceedings of the Seventh International Conference on the Internet of Things, doi:10.1145/3131542.3140278
- Jess Kropczynski, Reza Ghaiumy Anaraky, Mamtaj Akter, Amy J. Godfrey, Heather Lipford, Pamela J. Wisniewski (2021): Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving, In: Proceedings of the ACM on Human-Computer Interaction CSCW2(5), doi:10.1145/3479540
- Nico Castelli, Aparecido Fabiano Pinatti de Carvalho, Nico Vitt, Sebastian Taugerbeck, Dave Randall, Peter Tolmie, Gunnar Stevens, Volker Wulf (2021): On technology-assisted energy saving: challenges of digital plumbing in industrial settings, In: Human–Computer Interaction 4(37), doi:10.1080/07370024.2020.1855589
- Christian Greiffenhagen, Xinzhi Xu, Stuart Reeves (2023): The Work to Make Facial Recognition Work, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(7), doi:10.1145/3579531
- Timo Jakobi, Corinna Ogonowski, Nico Castelli, Gunnar Stevens, Volker Wulf (2017): The Catch(es) with Smart Home, In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3025453.3025799
- Joel E. Fischer, Andy Crabtree, James A. Colley, Tom Rodden, Enrico Costanza (2017): Data Work: How Energy Advisors and Clients Make IoT Data Accountable, In: Computer Supported Cooperative Work (CSCW) 4-6(26), doi:10.1007/s10606-017-9293-x
- Peter Tolmie, Andy Crabtree, Stefan Egglestone, Jan Humble, Chris Greenhalgh, Tom Rodden (2009): Digital plumbing: the mundane work of deploying UbiComp in the home, In: Personal and Ubiquitous Computing 3(14), doi:10.1007/s00779-009-0260-5
- Neelima Sailaja, Andy Crabtree, Thomas Lodge, Alan Chamberlain, Paul Coulton, Matthew Pilling, Ian Forrester (2024): Making of an Adaptive Podcast that Engenders Trust through Data Negotiability, In: ACM International Conference on Interactive Media Experiences, doi:10.1145/3639701.3663634
- Allison Sall, Rebecca E. Grinter (2007): Let’s Get Physical! In, Out and Around the Gaming Circle of Physical Gaming at Home, In: Computer Supported Cooperative Work (CSCW) 1-2(16), doi:10.1007/s10606-007-9047-2
- Leah Zhang-Kennedy, Christine Mekhail, Yomna Abdelaziz, Sonia Chiasson (2016): From Nosy Little Brothers to Stranger-Danger, In: Proceedings of the The 15th International Conference on Interaction Design and Children, doi:10.1145/2930674.2930716
- Jennifer A. Rode, Erika Shehan Poole (2018): Putting the gender back in digital housekeeping, In: Proceedings of the 4th Conference on Gender & IT - GenderIT '18, doi:10.1145/3196839.3196845
- Ahmad Kamil Abdul Hamid, Wei Zhu, Yoshihiro Kawahara, Asami Tohru (2011): Design and Implementation of an AR-Assisted Tool for Basic Home Network Management, In: 2011 IEEE/IPSJ International Symposium on Applications and the Internet, doi:10.1109/saint.2011.37
- Jeonghwa Yang, W. Keith Edwards (2007): ICEbox: Toward Easy-to-Use Home Networking, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-74800-7_15
- Vinay Koshy, Joon Sung Sung Park, Ti-Chung Cheng, Karrie Karahalios (2021): “We Just Use What They Give Us”: Understanding Passenger User Perspectives in Smart Homes, In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3411764.3445598
- Savanthi Murthy, Karthik S. Bhat, Sauvik Das, Neha Kumar (2021): Individually Vulnerable, Collectively Safe, In: Proceedings of the ACM on Human-Computer Interaction CSCW1(5), doi:10.1145/3449212
- Kristin Williams, Rajitha Pulivarthy, Scott E. Hudson, Jessica Hammer (2020): The Upcycled Home: Removing Barriers to Lightweight Modification of the Home's Everyday Objects, In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, doi:10.1145/3313831.3376314
- John V.H. Bonner (2009): Adding critical sensibilities to domestic communication technologies, In: International Journal of Human-Computer Studies 2(67), doi:10.1016/j.ijhcs.2008.09.003
- Allison Woodruff, Ken Anderson, Scott D. Mainwaring, Ryan Aipperspach (2000): Portable, But Not Mobile: A Study of Wireless Laptops in the Home, In: Lecture Notes in Computer Science, doi:10.1007/978-3-540-72037-9_13
- Leah Zhang-Kennedy, Sonia Chiasson, Robert Biddle (2016): The Role of Instructional Design in Persuasion: A Comics Approach for Improving Cybersecurity, In: International Journal of Human-Computer Interaction 3(32), doi:10.1080/10447318.2016.1136177
- David Smahel, Lenka Dedkova, Lydia Kraus, Vaclav Matyas, Vlasta Stavova (2022): Investigating Installers of Security Software in 20 Countries: Individual- and Country-Level Differences, In: Human Behavior and Emerging Technologies, doi:10.1155/2022/1230344
- Joakim Formo, Marcus Nyberg, Marcus Gårdman, Cristian Norlin (2009): Human-system behavioral gaps, In: IEEE Vehicular Technology Magazine 1(4), doi:10.1109/mvt.2009.931995
- Kuai Xu, Feng Wang, Lin Gu, Jianhua Gao, Yaohui Jin (2013): Characterizing home network traffic: an inside view, In: Personal and Ubiquitous Computing 4(18), doi:10.1007/s00779-013-0711-x
- Neelima Sailaja, Abigail Fowler (2022): An Exploration of Account Sharing Practices on Media Platforms, In: ACM International Conference on Interactive Media Experiences, doi:10.1145/3505284.3529974
- David S. Kirk, David Chatting, Paulina Yurman, Jo-Anne Bichard (2016): Ritual Machines I & II, In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, doi:10.1145/2858036.2858424
- Rajat Sharma, Vishal Kumar (2019): The Multidimensional Venture of developing a Smart City, In: 2019 International Conference on Big Data and Computational Intelligence (ICBDCI), doi:10.1109/icbdci.2019.8686101
- Neha Tunk, A. Arun Kumar (2022): Work from home - A new virtual reality, In: Current Psychology 34(42), doi:10.1007/s12144-021-02660-0
- Adele E. Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, Zinta Byrne (2012): The Psychology of Security for the Home Computer User, In: 2012 IEEE Symposium on Security and Privacy, doi:10.1109/sp.2012.23