SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Trust within Technology
Risk, Existential Trust, and Reflective Designs in Human-
                   Computer Interaction

                                  Mads Bødker
                   Ph.d defence, IT-University of Copenhagen
                              November 1. 2007
Outline
•   Conceptual work on the concept of trust - from trust in to trust within
    (existential trust)

•   “Backdrop”: the risk-society and the pervasiveness/ubiquity of computers

•   Ties these concepts to HCI as a discipline that not only enables faster and
    more efficient interaction with machines, but also (increasingly) makes the
    world available to us

•   HCI increasingly defines the ways in which we encounter the world and the
    ways in which we think about our relations to technology

•   HCI can and should supplement its focus on the design of efficiency and
    transparency with a focus on designing for openness, engagement, and
    interpretation (Reflective HCI)
•   Contribution: making a different perspective on the concepts of trust and
    trusting in relation to technology possible


•   Opening a new door towards an increased sensitivity to links between
    design and trust


•   Partial, tentative conclusions and results...


•   Not the final word on the matter, nor a complete theoretical rework of
    trust and trusting, but an attempt to create new figurations of trust, enabling
    new possible ways to talk about trust and trusting in HCI
Introduction
•   Big issues in HCI?

•   Critical HCI: how to reappraise some central assumptions in HCI:
    transparency, efficiency, experience, users, meaning etc.

•   Asserting the importance of HCI

    •   The cultural meaning of “the risky computer”

    •   The technological sublime of a world pervaded with computer
        technologies: we are not spectators to an amazing world of
        technologies, we are intimately involved in it

        •   elusiveness, the invisible

        •   ineffable space, the unspeakable
Risk society/culture
•   Risk society thesis applied on a world where computers are increasingly
    everywhere

•   Matters-of-fact / Matters-of-concern

•   Computers and computer networks are implied in more and more aspects
    of our daily activities

•   Risk not as a problem of the social (hierarchical, rule-bound, Gesällschafft) but
    a perspective within culture (vertical, symbolic value-based, Gemeinschafft):
    Risk Culture (Lash)

•   Reflective actors, knowledgeable agency - cognitive reflexivity

•   Aesthetic reflexivity: Signifiers of technological risk (ranging from the
    annoying to the cataclysmic) abound...
•   Technological culture: Technologies, to be effective, must withdraw from
    revealing themselves - they must take the form of obviousness.

•   Modernist ideal of control - by having technology disappear into the fabric of
    the everyday, we gain an increased control of our world

•   Disappearence as domestication

•   Technological risks contradict the “instrumental fidelity” of modernist
    assumptions about technology
Engagements in Risk

•   How do we approach trust when we cannot rely solely on an unproblematic
    consumption of institutionally sanctioned security and expertise?

•   Attempts: democratization of risk assessment (in various forms by e.g. Wynne,
    Sclove, Fischer, Beck etc.)

    •   Inspired by Habermasian discourse ethics

    •   Finding a communal basis for “reason” and for decisions

    •   Consensus conferences, Lay/Participatory Technology Assessment (PTA)
•   Democratizing risk engagement does not necessarily confront the kinds of
    “excess” or cultural risk tropes (narratives, stories, images, sounds)

•   It does engage with well-representable sources of risk - “we, the lay public,
    are concerned over an increasing amount of surveillance carried out in the
    work place, at home, on the move etc...”

•   People such as Wynne and Fischer have problematized the way “Lay
    Perspectives” are moderated, tamed by being ultimately grounded by
    scientific rationality - decisions are made more with respect to expert
    arguments than to the biased “reason” by an anxious, distrusting public
•   Another way to understand risks: The problem of agency and identity risk:
    Brian Wynne, Timothy Melley, Mary Douglas


•   Identity risks: rather than provable threats, risks can also be seen in the ways
    that the risk “subject” is performed, the way the subject is allowed to voice
    and utter concern and anxiety


•   “Agency panic”, the technological sublime


•   Risk as the pollution of categories (where does the technological end, where
    does the human begin...) - “matter out of place”


•   People’s stories, mass-mediated or popular depictions of risk in computers
    are not carriers of affective/aesthetic biases, but ways in which to make
    sense of an ineffable computer pervaded everyday...

•   How to engage in these forms of risk and distrust?
HCI and trust

•   Not a mainstream concept in HCI

•   It has been proposed (e.g. Shneiderman, Friedman et al) that in order to
    foster a trusting relationship between humans and their technologies, we
    need to make them “open for inspection”, allowing users to supervise and
    oversee that technologies and the institutions that support them function
    correctly and consistently

•   Or, design technologies to be domesticated, to become tacit infrastructures
•   The notion of trust that is traditionally applied within HCI (and also CMC) is
    what we could call a human-social/relational prototypical form of trust


    •   How can we trust in e-commerce sites, what cues do we need?

    •   How can we trust the integrity of our technologies?

    •   How can we trust that our computers perform correctly?

    •   ...etc.

•   Security design within HCI proposes: design interfaces to maximize prudent
    user behaviour, design for inspection that still allows for optimal efficiency


•   Key question: How do we design interfaces that allow us to trust in
    computers?
•   Mimics the directional trust that we all know in some form or another from our daily
    undertakings


•   Works from a prototypical form of trust that argues that trust is a relation between two or
    more actors who have some form of bounded agency to act in a relatively unpredictable way
    (i.e. the other can potentially act inconsistently or in ways that are destructive to our goals)


•   That trust has a behavioral correlate - a causal relation between use and trust: “if a user is
    using, he or she is also trusting”
•   I argue that trust in HCI (in the broadest sense) can be about more than a
    unidirectional relation that begins with the human and is directed towards
    the technology. The ways in which we design our computer technological
    environments can also be seen to potentially influence our experience of
    ourselves

•   HCI’s relevance can be grounded in certain cultural experience


•   How are users (people) supposed to relate to technology, how are they
    supposed to understand themselves and their activities as actors in a
    technological world?


•   Key question: How can HCI perhaps begin to adress the kinds of aesthetic,
    “excessive” forms of risk? How can the design of interactions provide
    people with the feeling that their own voices, their own concerns are made
    possible?
Existential Trust
•   Such a dialogue with computer pervaded environments, so I argue,
    potentially makes possible another kind of trust:

•   Existential trust, trust as an epistemological category - a certain aspect on
    knowing

•   The trust we have in our own ability to know the world

•   Self-trust: how to trust our own ways of making meaning, our own sense
    making, if scientific explanations and rationalities will often dominate or
    disregard “subjective” modes of interpretation

•   Trust within technology
Reflective HCI/design
•   Critical Technical Practice: question the fundamental assumptions about the
    nature of interaction btw. people and technology and the role of designers in
    mediating that interaction.

•   Interactions that invite reflection on the attitudes that underpin our ideas of
    technology and humanity

•   The interface and interaction as interesting sites of cultural expression and
    dialogue around social and cultural issues

•   For example: How can technologies begin to “appreciate” users
    interpretations of risk and the rich imaginaries that have grown up around
    them rather than discount them as flawed forms of reasoning?

•   Engagement with the aesthetic, excessive aspects of risk culture, not the
    designing out of risks
HALT




            Fig. 1: Ghost graphics on PDA, image by DELCA project, IT-University of Copenhagen
                                                      DELCA, IT-University 2005
In the following I will not be concerned with the dynamic ecology of the project, but primarily on
the narrative construction of the system and one of the ghost DELCA’s in particular. Many of the
ghosts in the DELCA project were “type cast” for the project including the Butler, a conventional
if somewhat arrogant way-finding assistant, Physical Joe, a grumpy “sarge” of a workout ghost
that urged people to use the stairs rather than the escalators, or Printer Jan who could be
•   The relation to existential forms of trust, self-trust, and the ability to “dwell”
    in a world where computer technologies permeate most aspects of our lives


    •   Possibility of voicing concerns over technology in subjective/aesthetic
        registers


    •   Reflective interactions that encourage/demand participation in a dialogue
        around designs, - they are open to interpretation and differing
        perspectives, subverting traditional hierarchies of user and designer/
        expert


    •   Designs that focus attention on the effects and implications of
        technology


    •   Interactions that take cultural concerns seriously and allow for
        “inspection” of these
•   An attempt to foresee and develop some conceptual insight into the
    moralizing and performative aspects of technology


•   A material ethics? Achterhuis argues that we should consider these
    aspects, even design for them sensibly


•   What Reflective HCI could potentially contribute with to such a material
    ethics, is the design of interactions that enable a disclosure of these
    efforts to perform users in specific ways


•   Enabling users to hold technologies accountable for the ways in which
    technologies narrate them...
...?

Mais conteúdo relacionado

Mais procurados

DeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain CollegeDeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain CollegeAnn DeMarle
 
Info design presentation-3
Info design presentation-3Info design presentation-3
Info design presentation-317elisem
 
Info design presentation2
Info design presentation2Info design presentation2
Info design presentation217elisem
 
Info design presentation[1]
Info design presentation[1]Info design presentation[1]
Info design presentation[1]17elisem
 
Engagement, Flow, Presence
Engagement, Flow, PresenceEngagement, Flow, Presence
Engagement, Flow, PresenceRiva Giuseppe
 
Applying Corporate Knowledge Management
Applying  Corporate  Knowledge  ManagementApplying  Corporate  Knowledge  Management
Applying Corporate Knowledge ManagementTri Aji Nugroho
 
Knowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl DitzlerKnowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl DitzlerCarl Ditzler
 

Mais procurados (13)

DeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain CollegeDeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain College
 
6. CMC
6. CMC6. CMC
6. CMC
 
Info design presentation-3
Info design presentation-3Info design presentation-3
Info design presentation-3
 
Info design presentation2
Info design presentation2Info design presentation2
Info design presentation2
 
Info design presentation[1]
Info design presentation[1]Info design presentation[1]
Info design presentation[1]
 
Social networks
Social networksSocial networks
Social networks
 
Engagement, Flow, Presence
Engagement, Flow, PresenceEngagement, Flow, Presence
Engagement, Flow, Presence
 
Applying Corporate Knowledge Management
Applying  Corporate  Knowledge  ManagementApplying  Corporate  Knowledge  Management
Applying Corporate Knowledge Management
 
Collective intel
Collective intelCollective intel
Collective intel
 
Knowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl DitzlerKnowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl Ditzler
 
Center4 Plain Language 6 2011 Handout
Center4 Plain Language 6 2011 HandoutCenter4 Plain Language 6 2011 Handout
Center4 Plain Language 6 2011 Handout
 
Educ6751(1)
Educ6751(1)Educ6751(1)
Educ6751(1)
 
Knowledge Agenda
Knowledge Agenda Knowledge Agenda
Knowledge Agenda
 

Destaque

Trust workshop
Trust workshopTrust workshop
Trust workshopSónia
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3Sónia
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1Sónia
 
Helping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsHelping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsThe Research Thing
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2Sónia
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3Sónia
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4Sónia
 
Literature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceLiterature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceClare Hooper
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5Sónia
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsSónia
 
Technology, Trust, & Transparency
Technology, Trust, & TransparencyTechnology, Trust, & Transparency
Technology, Trust, & TransparencyGeek Girls
 
Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Sónia
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7Sónia
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4Sónia
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Sónia
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6Sónia
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Finaljhustad1
 
Workshop 1
Workshop 1Workshop 1
Workshop 1Sónia
 

Destaque (20)

Trust workshop
Trust workshopTrust workshop
Trust workshop
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1
 
Helping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsHelping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviews
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2
 
Nettets genkomst?
Nettets genkomst?Nettets genkomst?
Nettets genkomst?
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3
 
Lesson 17
Lesson 17Lesson 17
Lesson 17
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4
 
Literature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceLiterature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer Science
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
 
Technology, Trust, & Transparency
Technology, Trust, & TransparencyTechnology, Trust, & Transparency
Technology, Trust, & Transparency
 
Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Final
 
Workshop 1
Workshop 1Workshop 1
Workshop 1
 

Semelhante a My ph.d Defence

Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1Salvatore Iaconesi
 
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...Jan Groenefeld
 
Essay On Computer.pdf
Essay On Computer.pdfEssay On Computer.pdf
Essay On Computer.pdfNikki Wheeler
 
Technology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX AustraliaTechnology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX AustraliaRachel Hinman
 
Mp copenhagen 2012
Mp copenhagen 2012Mp copenhagen 2012
Mp copenhagen 2012mpuech
 
Introduction to HCI (UCC)
Introduction to HCI (UCC)Introduction to HCI (UCC)
Introduction to HCI (UCC)apppsych
 
Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09adrian chan
 
KCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective IntelligenceKCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective IntelligenceAxel Bruns
 
Thesis hamouda hoda
Thesis hamouda hodaThesis hamouda hoda
Thesis hamouda hodaHoda Hamouda
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity Johannes Meier
 
Cybernetic Serendipity, reloaded
Cybernetic Serendipity, reloadedCybernetic Serendipity, reloaded
Cybernetic Serendipity, reloadedChen Dominique
 
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, ConnectedDachis Group
 
Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0is20090
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI Deskala
 
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging TechnologiesCLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging TechnologiesCLICKNL
 
Scenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshareScenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshareZhan Li
 

Semelhante a My ph.d Defence (20)

Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
 
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
 
Essay On Computer.pdf
Essay On Computer.pdfEssay On Computer.pdf
Essay On Computer.pdf
 
Technology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX AustraliaTechnology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX Australia
 
Mp copenhagen 2012
Mp copenhagen 2012Mp copenhagen 2012
Mp copenhagen 2012
 
Introduction to HCI (UCC)
Introduction to HCI (UCC)Introduction to HCI (UCC)
Introduction to HCI (UCC)
 
Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09
 
buy tesco hudl
buy tesco hudlbuy tesco hudl
buy tesco hudl
 
KCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective IntelligenceKCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
 
Thesis hamouda hoda
Thesis hamouda hodaThesis hamouda hoda
Thesis hamouda hoda
 
Jan-Wessel Hovingh
Jan-Wessel HovinghJan-Wessel Hovingh
Jan-Wessel Hovingh
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
 
Cybernetic Serendipity, reloaded
Cybernetic Serendipity, reloadedCybernetic Serendipity, reloaded
Cybernetic Serendipity, reloaded
 
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
 
Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
 
Introduction To HCI
Introduction To HCIIntroduction To HCI
Introduction To HCI
 
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging TechnologiesCLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
 
P2 Lecture 2
P2 Lecture 2P2 Lecture 2
P2 Lecture 2
 
Scenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshareScenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshare
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

My ph.d Defence

  • 1. Trust within Technology Risk, Existential Trust, and Reflective Designs in Human- Computer Interaction Mads Bødker Ph.d defence, IT-University of Copenhagen November 1. 2007
  • 2. Outline • Conceptual work on the concept of trust - from trust in to trust within (existential trust) • “Backdrop”: the risk-society and the pervasiveness/ubiquity of computers • Ties these concepts to HCI as a discipline that not only enables faster and more efficient interaction with machines, but also (increasingly) makes the world available to us • HCI increasingly defines the ways in which we encounter the world and the ways in which we think about our relations to technology • HCI can and should supplement its focus on the design of efficiency and transparency with a focus on designing for openness, engagement, and interpretation (Reflective HCI)
  • 3. Contribution: making a different perspective on the concepts of trust and trusting in relation to technology possible • Opening a new door towards an increased sensitivity to links between design and trust • Partial, tentative conclusions and results... • Not the final word on the matter, nor a complete theoretical rework of trust and trusting, but an attempt to create new figurations of trust, enabling new possible ways to talk about trust and trusting in HCI
  • 4. Introduction • Big issues in HCI? • Critical HCI: how to reappraise some central assumptions in HCI: transparency, efficiency, experience, users, meaning etc. • Asserting the importance of HCI • The cultural meaning of “the risky computer” • The technological sublime of a world pervaded with computer technologies: we are not spectators to an amazing world of technologies, we are intimately involved in it • elusiveness, the invisible • ineffable space, the unspeakable
  • 5. Risk society/culture • Risk society thesis applied on a world where computers are increasingly everywhere • Matters-of-fact / Matters-of-concern • Computers and computer networks are implied in more and more aspects of our daily activities • Risk not as a problem of the social (hierarchical, rule-bound, Gesällschafft) but a perspective within culture (vertical, symbolic value-based, Gemeinschafft): Risk Culture (Lash) • Reflective actors, knowledgeable agency - cognitive reflexivity • Aesthetic reflexivity: Signifiers of technological risk (ranging from the annoying to the cataclysmic) abound...
  • 6.
  • 7.
  • 8.
  • 9. Technological culture: Technologies, to be effective, must withdraw from revealing themselves - they must take the form of obviousness. • Modernist ideal of control - by having technology disappear into the fabric of the everyday, we gain an increased control of our world • Disappearence as domestication • Technological risks contradict the “instrumental fidelity” of modernist assumptions about technology
  • 10. Engagements in Risk • How do we approach trust when we cannot rely solely on an unproblematic consumption of institutionally sanctioned security and expertise? • Attempts: democratization of risk assessment (in various forms by e.g. Wynne, Sclove, Fischer, Beck etc.) • Inspired by Habermasian discourse ethics • Finding a communal basis for “reason” and for decisions • Consensus conferences, Lay/Participatory Technology Assessment (PTA)
  • 11. Democratizing risk engagement does not necessarily confront the kinds of “excess” or cultural risk tropes (narratives, stories, images, sounds) • It does engage with well-representable sources of risk - “we, the lay public, are concerned over an increasing amount of surveillance carried out in the work place, at home, on the move etc...” • People such as Wynne and Fischer have problematized the way “Lay Perspectives” are moderated, tamed by being ultimately grounded by scientific rationality - decisions are made more with respect to expert arguments than to the biased “reason” by an anxious, distrusting public
  • 12. Another way to understand risks: The problem of agency and identity risk: Brian Wynne, Timothy Melley, Mary Douglas • Identity risks: rather than provable threats, risks can also be seen in the ways that the risk “subject” is performed, the way the subject is allowed to voice and utter concern and anxiety • “Agency panic”, the technological sublime • Risk as the pollution of categories (where does the technological end, where does the human begin...) - “matter out of place” • People’s stories, mass-mediated or popular depictions of risk in computers are not carriers of affective/aesthetic biases, but ways in which to make sense of an ineffable computer pervaded everyday... • How to engage in these forms of risk and distrust?
  • 13. HCI and trust • Not a mainstream concept in HCI • It has been proposed (e.g. Shneiderman, Friedman et al) that in order to foster a trusting relationship between humans and their technologies, we need to make them “open for inspection”, allowing users to supervise and oversee that technologies and the institutions that support them function correctly and consistently • Or, design technologies to be domesticated, to become tacit infrastructures
  • 14. The notion of trust that is traditionally applied within HCI (and also CMC) is what we could call a human-social/relational prototypical form of trust • How can we trust in e-commerce sites, what cues do we need? • How can we trust the integrity of our technologies? • How can we trust that our computers perform correctly? • ...etc. • Security design within HCI proposes: design interfaces to maximize prudent user behaviour, design for inspection that still allows for optimal efficiency • Key question: How do we design interfaces that allow us to trust in computers?
  • 15. Mimics the directional trust that we all know in some form or another from our daily undertakings • Works from a prototypical form of trust that argues that trust is a relation between two or more actors who have some form of bounded agency to act in a relatively unpredictable way (i.e. the other can potentially act inconsistently or in ways that are destructive to our goals) • That trust has a behavioral correlate - a causal relation between use and trust: “if a user is using, he or she is also trusting”
  • 16. I argue that trust in HCI (in the broadest sense) can be about more than a unidirectional relation that begins with the human and is directed towards the technology. The ways in which we design our computer technological environments can also be seen to potentially influence our experience of ourselves • HCI’s relevance can be grounded in certain cultural experience • How are users (people) supposed to relate to technology, how are they supposed to understand themselves and their activities as actors in a technological world? • Key question: How can HCI perhaps begin to adress the kinds of aesthetic, “excessive” forms of risk? How can the design of interactions provide people with the feeling that their own voices, their own concerns are made possible?
  • 17. Existential Trust • Such a dialogue with computer pervaded environments, so I argue, potentially makes possible another kind of trust: • Existential trust, trust as an epistemological category - a certain aspect on knowing • The trust we have in our own ability to know the world • Self-trust: how to trust our own ways of making meaning, our own sense making, if scientific explanations and rationalities will often dominate or disregard “subjective” modes of interpretation • Trust within technology
  • 18. Reflective HCI/design • Critical Technical Practice: question the fundamental assumptions about the nature of interaction btw. people and technology and the role of designers in mediating that interaction. • Interactions that invite reflection on the attitudes that underpin our ideas of technology and humanity • The interface and interaction as interesting sites of cultural expression and dialogue around social and cultural issues • For example: How can technologies begin to “appreciate” users interpretations of risk and the rich imaginaries that have grown up around them rather than discount them as flawed forms of reasoning? • Engagement with the aesthetic, excessive aspects of risk culture, not the designing out of risks
  • 19. HALT Fig. 1: Ghost graphics on PDA, image by DELCA project, IT-University of Copenhagen DELCA, IT-University 2005 In the following I will not be concerned with the dynamic ecology of the project, but primarily on the narrative construction of the system and one of the ghost DELCA’s in particular. Many of the ghosts in the DELCA project were “type cast” for the project including the Butler, a conventional if somewhat arrogant way-finding assistant, Physical Joe, a grumpy “sarge” of a workout ghost that urged people to use the stairs rather than the escalators, or Printer Jan who could be
  • 20. The relation to existential forms of trust, self-trust, and the ability to “dwell” in a world where computer technologies permeate most aspects of our lives • Possibility of voicing concerns over technology in subjective/aesthetic registers • Reflective interactions that encourage/demand participation in a dialogue around designs, - they are open to interpretation and differing perspectives, subverting traditional hierarchies of user and designer/ expert • Designs that focus attention on the effects and implications of technology • Interactions that take cultural concerns seriously and allow for “inspection” of these
  • 21. An attempt to foresee and develop some conceptual insight into the moralizing and performative aspects of technology • A material ethics? Achterhuis argues that we should consider these aspects, even design for them sensibly • What Reflective HCI could potentially contribute with to such a material ethics, is the design of interactions that enable a disclosure of these efforts to perform users in specific ways • Enabling users to hold technologies accountable for the ways in which technologies narrate them...
  • 22. ...?