Professional Documents
Culture Documents
Interacting With Computers
Interacting With Computers
Interacting With Computers
net/publication/220299991
CITATIONS READS
29 492
5 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Albrecht Schmidt on 29 May 2014.
Interacting with
21st-Century Computers
This discussion reflects on four themes from Weiser’s original vision from
a human-computer interaction perspective: computing everywhere,
personal computing, the social dimension of computing, and privacy
implications. The authors review developments both in accordance with
and contrasting this vision.
O
ver the past 20 years, we’ve seen processors. When we talk about ubiquitous
how technology can become computing (ubicomp), we refer to all these
invisible and provide services types of developments. Even though mobile
that ease people’s lives, “invis- phones are ubiquitous, they’re only one, albeit
ibly enhancing the world that important, part in the ubicomp infrastructure
already exists.”1 While Mark Weiser’s vision currently emerging.
was formulated with the user at the center, Here, we discuss ubicomp’s impact on users
technical challenges still must be resolved to and their interaction with devices. Traditionally,
realize his vision. This becomes even more new technologies open up opportunities for
obvious when looking at the prototypes Weiser new types of applications and forms of human-
and his group created, the skill sets of the peo- computer interaction (HCI). 5 A prominent
ple involved at Xerox PARC, example was the transition from text-based user
Albrecht Schmidt,
and the resulting publications interfaces to graphical systems in the 1990s, and
Bastian Pfleging, Florian Alt,
and patents. At the same time, more recently the rise of tangible user interfaces.6
and Alireza Sahami Shirazi
the importance of designing In the last decade, ubicomp has similarly inspired
University of Stuttgart
for the “user experience” has and enabled new approaches to HCI.
Geraldine Fitzpatrick been widely acknowledged Focusing on four themes from Weiser’s
Vienna University of Technology both in research and industry, original article— computing everywhere,
including manufacturers of personal computing, computing beyond the
mobile devices and computers individual, and privacy implications—we
alike. 2,3 discuss these themes from an HCI perspective
Today, mobile phones are the prime and reflect on remaining research challenges.1
computing platform worldwide, 4 tablet
computers are a fast-growing market, and Computing Everywhere for Everyone
many schools are installing digital whiteboards Ubiquitous access to computing and mobile
in their classrooms. Furthermore, processors communication technologies and to the
have become a part of many devices. Some Internet hasn’t just enhanced the world but
TVs are now computers enhanced with hard also changed it. When Weiser wrote his article,
drives, networking capabilities, and special the World Wide Web as we know it didn’t
user interfaces, and smart home appliances exist, but the Web has significantly influenced
can be networked and wirelessly controlled. how people interact with computers and use
High-end cars also include many networked ubicomp technologies.
of multiple capabilities into one device The changes to many machines in In modern cars, for example, many
opens up a new version of ubicomp industry and the transformation of functions are nowadays being realized in
interaction. The phone, for example, manufacturing processes have been software.15
is one device that has seen a massive less visible in public but similarly
transition from an electronic device revolutionary. Ubicomp is fundamentally Increasingly Intimate
into a computer-based appliance, where changing many engineering disciplines Computing
many of the functionalities perceived in as mechanical and electrome chan Although for most people, the age of
a ubicomp scenario are now available ical devices and systems are being personal computing isn’t gone (yet),
within the smart phone—such as location replaced by computing technologies the nature of “personal” computing
awareness and embedded sensors. with multiple embedded capabilities. as envisioned by Weiser in the early
days of the PC has radically changed.16 The idea of a “personal” way of thinking about computers,
People nowadays have a much closer computer itself is misplaced and one that takes into account the
relationship with their personal … the vision of laptop machines human world and allows the
computing devices. In particular, [is] only a transitional step toward computers themselves to vanish
mobile phones—and increasingly other achieving the real potential of into the background.1
portable devices, such as pads and information technology. Such
tablets—have become ubiquitous and, machines cannot truly make The new form of personal comput
at the same time, very personal. This computing an integral, invisible ing that many users initially experienced
trend is in contrast to one of Weiser’s part of people’s lives. We are when they received their first smart
forecasts: therefore trying to conceive a new phone exemplifies how nontechnical
people now perceive and experience are also invisible in the way they seem to entries and logs of personal activities,
computing in the 21st century and blend into everyday practices of use and websites accessed, notes taken, and
how our understanding of “invisible” in how people have evolved practices various applications installed are all
has evolved. For ma ny people , around them. Typing emails on an examples of sensitive and valuable
smartphones are increasingly the iPhone might be viewed as inefficient personal information. 21 With current
“personal computer” that they rely owing to the slower typing speed. technologies, such as Near-Field
on the most—and they have become However, users have compensated by Communication (NFC) and other
an integral, highly visible part of their developing new email practices, such means for electronic payment 22
lives. The device itself and its many as shorter emails, thereby in a way and authentication, 23 phones have
converged functionalities have become increasing the efficiency of the overall become even more personal. Given this
part of people’s self-expression and medium. intimate link between the person and
even a status symbol in many cases. It’s Also seemingly contradicting the the device’s data, how much would
as though consumers have “fashioned” vision of the disappearing computer, you need to trust someone—a family
themselves with a particular phone advertising could become ubicomp’s member, friend, or colleague—before
as an accessory and—similar to the killer app.17 Pervasive advertising is lending them your mobile phone?
fashion industry—competing phone finally ready to leave the labs, and we’re Although many aspects of ubicomp
companies work hard to ensure that currently at a crossroad in terms of are embedded in everyday spaces
the latest smartphones are considered determining advertising’s future. On the and objects, there are other aspects
even more cutting edge and desirable Web, pop-up windows and unsolicited that have become more personal and
than the previous ones, and that the banners strive for user attention, as intimate than probably most people
devices themselves don’t vanish into do static displays. Initial experiments have imagined. Computing has become
the background. show that the use of traditional poster an integral part of life for many users
advertising can be combined with across the world. It has massively
Invisible Technologies mobile and context-aware devices to changed how people live. Being able
When considering the experience of create links between static content and to reach and be reached at any time
using new generations of personal dynamic information.18 as well as having immediate access to
devices, the “vanishing into the The potential for changing how information anytime, anywhere has
background” step Weiser predicted advertising is implemented in ubicomp had a significant impact on the way we
has been clearly made by the majority settings has also been explored with work as well as on domestic life. At the
of users. We recently conducted a a variety of options for interaction same time, phones have become a status
study of mobile-phone-camera use. with yard-scale computing and symbol, especially among the younger
As we asked users about their phone, public displays.19 Many visions of the generation, hence contributing to
we received answers that were mainly advertising future see personalized Weiser’s vision of ubicomp technologies
related to the mobile phone’s functional ads bombarding users with spam, fitting in well with the world.
capabilities (how they use the phone spying on them, and manipulating
for social networking or to show off them to make them buy products they Beyond the Individual
photos or access their favorite apps). don’t need. However, there’s also the Many ubicomp scenarios rely on some
They knew little about the phone’s positive future of calm and engaging forms of artificial intelligence (AI)
built-in processor or networking speci advertising where “advertisements and a representation of the world—
fications. Many users didn’t even know strike a balance between being calm recognizing contexts, understanding
the model of their phone. However, when we do not need them and being activities, and triggering or suggesting
hardware properties were better engaging and inspiring when we want applications are some examples. To
known if they directly impacted the to participate.”20 tackle this, Weiser suggested using AI
user experience (such as the camera or to make the problem easier to solve:
screen resolution). We suggest that the Extremely Personal Data
smartphone has enabled a major change Looking at the data many people Sal awakens; she smells coffee. A
in how we interact with computers, as it organize and store on their personal few minutes ago her alarm clock,
has become for many users, in Weiser’s devices, it’s also clear that these devices alerted by her restless rolling
words, “a pleasant and effective ‘place’ have become intimate companions. before waking, had quietly asked,
to get things done.”1 Cherished personal photos; intimate “Coffee?” and she had mumbled,
The interesting paradox is that in communication traces in SMS and “Yes.” “Yes” and “No” are the
being clearly visible as a device or email; contacts and interactions only words it [the computer]
“place,” the technologies and devices with those contacts; private calendar knows.1
Privacy and Profits undertone (“unpleasant use”). However, that have fundamentally changed how
Ubiquitous computing enables new today such products are successful in the we interact with computers and how
opportunities for tracking people’s market, ranging from location sharing we communicate. The cheap avail-
location and activities, which has to contextual search. Companies ability of technology and services, and
always been a sensitive issue. When profit from providing convenient of easy-to-use computing devices and
Olivetti Labs described their active services, and many users seem to value systems (especially mobile phones and
badge system, the responses in the convenience over privacy. At the same smartphones), means that computing
scientific community and press were time, it’s still an open question whether really is becoming ubiquitous and is al-
to picture a future of ubiquitous the reason for accepting this impact on ready impacting the everyday lives of
surveillance.30,31 These are issues that privacy is the consequence of a lack of people around the world. In particular,
still need to be addressed today. understanding or a result of products global, ubiquitous mobile-device use
successfully making “invisible” which has become the norm and is often seen
Acceptance and Perceived Value data they collect in the background. as the reality of ubicomp. But it’s only
User acceptance of technologies that Many researchers, especially in the one aspect of ubicomp. There are more
invade privacy is strongly correlated HCI field, view this loss of privacy as changes to come, as computers become
with the perceived value. For mobile a major risk. an integral part of many devices and
phones to work, the operator must appliances.
know where the user is. This form of Understanding Risks and
Y
ubiquitous location tracking hasn’t Opportunities
harmed the adoption of mobile Technologies (such as cryptography) et how we interact with the
communication technologies. Users alone won’t solve the privacy issues at “computer” in the 21st cen-
accept and usually don’t reflect much hand. We’ll need societal agreements tury remains a challenging
on the information they must give away on what’s acceptable and how data can question, precisely because
in return for the service. This trade-off be used, implemented within a legal there’s no longer a clear, single computer
between convenience and privacy had framework. We also need to clarify focus, as in the days of the desktop ma-
already emerged in Weiser’s initial for people, at least for “self-education” chine. Weiser set out a new vision for a
ubicomp work: purposes, what’s really possible with ubicomp world, and the emergence of
technology and the risks involved. As a new technologies are helping us realize
Even today the active badges and result, we must develop methodologies evolved versions of this vision. We have
self writing appointment diaries and approaches that help participants single devices that offer multiple ubi-
that offer all kinds of convenience become more informed in these debates comp functionalities and experiences,
could be a source of real harm and more knowledgeable about their and we have multiple networked and
in the wrong hands. Not only own personal choices. This should embedded devices that form part of the
corporate superiors or underlings affect the design process such that fabric of our daily lives. We also have
but also overzealous government systems are made more accountable to users who are becoming increasingly ac-
officials and even marketing firms and understandable by users. customed to having ubiquitous access to
could make unpleasant use of The privacy risks considered in early information and computing power, with
the same information that makes ubicomp research are still perceived as increasingly discerning expectations
invisible computers so convenient.1 risks today—in particular, the tracking about their experiences using these de-
of people and location.32 On the other vices. As designers and researchers, we
Increasingly over the last few years, hand, ubicomp research has yet to have the challenge and responsibility of
companies (such as Google and embrace the full potential of available creating this new world, while keeping
Facebook) have been successfully information. Here, it seems general people and their values and interests at
exploiting information volunteered by commercial use of available data has the center of the technologies.
the users (search queries, email content, moved much faster. More research is
activity and status messages, and required to understand the value of References
multimedia content) to provide targeted the information we create and own
services. So far, this has been more as individuals and as a society, as well 1. M. Weiser, “The Computer for the 21st
Century,” Scientific Am., vol. 265, no. 3,
related to Web services, but it’s apparent as what we can do with it and at what 1991, pp. pp. 66–75.
that such companies are moving into the costs.
mobile and ubicomp space. Reflecting on Weiser’s visions 20 years 2. M. Hassenzahl and N. Tractinsky, “User
Experience—A Research Agenda,” Behav-
Weiser commented on the use of later, it’s amazing how the vision fore- iour and Information Technology, vol. 25,
such information in a very negative saw many technological developments no. 2, 2006, pp. 91–97.
Bastian Pfleging is a research assistant for the Geraldine Fitzpatrick is a professor/Institute head
Human Computer Interaction group at the Univer- for technology design and assessment and leads the
sity of Stuttgart. His general research interests are HCI group at Vienna University of Technology in
multimodal and natural user interfaces. In particu- Austria. Her research is at the intersection of social
lar, he’s interested in human-computer interaction and computer sciences, particularly in the design
in the automotive context. Pfleging received his of pervasive, tangible, and Web 2.0 technologies
MSc in computer science from the Technical Uni- to fit in with everyday contexts of work, play, and
versity of Dortmund, Germany. He’s a member of daily life. Fitzpatrick received her PhD in computer
the ACM and the Association of German Engineers science and electrical engineering from University
(Verein Deutscher Ingenieure, or VDI). Contact of Queensland, Australia. She’s a member of IEEE
him at bastian.pfleging@vis.uni-stuttgart.de. and the ACM. Contact her at geraldine.fitzpatrick@
tuwien.ac.at.
Florian Alt is a researcher in the Human Com-
puter Interaction group at the University of
Stuttgart. The main focus of his research is on
context-sensitive advertising, implicit and ex-
plicit interaction with public displays, and explor-
ing pervasive displays as a future communication
medium. Florian received a diploma degree in
media informatics from the University of Munich,
Germany. He’s a member of the ACM. Contact
him florian.alt@vis.uni-stuttgart.de.
3. J. McCarthy and P. Wright, Technology 10. C. Beckmann, S. Consolvo, and A. Lamarca, Press, 2006, pp. 33–42; http://doi.acm.
as Experience, MIT Press, 2004. “Some Assembly Required: Supporting org/10.1145/1134285.1134292.
End-User Sensor Installation in Domestic
4. S. Teltscher et al., “The ICT Development Ubiquitous Computing Environments,” 16. A.K. Karlson et al., “Working Overtime:
Index,” Measuring the Information Society, Proc. Sixth Int’l Conf. Ubiquitous Com- Patterns of Smartphone and PC Usage in the
Int’l Telecommunication Union, 2009; www. puting (Ubicomp 04), LNCS 3205, Springer, Day of an Information Worker,” Proc. 7th
itu.int/net/pressoffice/backgrounders/ 2004, pp. 107–124. Int’l Conf. Pervasive Computing (Pervasive
general/pdf/5.pdf. 09), Springer-Verlag, 2009, pp. 398–405;
11. M. Kranz, P. Holleis, and A. Schmidt, http://dx.doi.org/10.1007/978-3-642-
5. A.B. Myers, “A Brief History of Human- “Embedded Interaction: Interacting with 01516-8_27.
Computer Interaction Technology,” Interac- the Internet of Things,” IEEE Internet
tions, vol. 5, no. 2, 1998, pp. 44–54; http:// Computing, vol. 14, no. 2, 2010, pp. 46–53. 17. J. Krumm, “Ubiquitous Advertising: The
doi.acm.org/10.1145/274430.274436. Killer Application for the 21st Century,”
12. D. Wigdor and D. Wixon, Brave NUI World: IEEE Pervasive Computing, vol. 10, no. 1,
6. H. Ishii and B. Ullmer, “Tangible Bits: Designing Natural User Interfaces for Touch 2011.
Towards Seamless Interfaces between Peo- and Gesture, Morgan Kaufmann, 2011.
ple, Bits and Atoms,” Proc. SIGCHI Conf. 18. E. Rukzio, A. Schmidt, and H. Hussmann,
Human Factors in Computing Systems 13. J.K. Robert et al., “Reality-Based Interaction: “Physical Posters as Gateways to Context-
(CHI 97), ACM Press, 1997, pp. 234–241; A Framework for Post-WIMP Interfaces,” Aware Services for Mobile Devices,” Proc.
http://doi.acm.org/10.1145/258549.258715. Proc. 26th Ann. SIGCHI Conf. Human Sixth IEEE Workshop on Mobile Comput-
Factors in Computing Systems (CHI 08), ing Systems and Applications (WMCSA
7. N. Mallat, M. Rossi, and V.K. Tuunainen, ACM Press, 2008, pp. 201–210; http://doi. 2004), IEEE Press, 2004, pp. 10–19.
“Mobile Banking Services,” Comm. ACM, acm.org/10.1145/1357054.1357089.
vol. 47, no. 5, 2004, pp. 42–46; http://doi. 19. J. Müller et al., “Requirements and Design
acm.org/10.1145/986213.986236. 14. M. Chalmers and A. Galani, “Seamful Space for Interactive Public Displays,”
Interweaving: Heterogeneity in the The- Proc. ACM Multimedia, ACM Press, 2010,
8. J. Robertson, “The Day Part of the ory and Design of Interactive Systems,” pp. 1285–1294.
Internet Died: Egypt Goes Dark,” The Proc. 5th Conf. Designing Interactive
Washington Times, 28 Jan. 2011; www. Systems: Processes, Practices, Methods, 20. J. Müller, F. Alt, and D. Michelis, Pervasive
washingtontimes.com/news/2011/jan/28/ and Techniques (DIS 04); ACM Press, Advertising, Springer, 2011; http://dx.doi.
day-part-internet-died-egypt-goes-dark. 2004, pp. 243–252; http://doi.acm.org/ org/10.1007/978-0-85729-352-7.
10.1145/1013115.1013149.
9. M. Beigl et al., “The UbicompBrowser,” Proc. 21. W. Odom, J. Zimmerman, and J. Forlizzi,
4th ERCIM Workshop on User Interfaces 15. M. Broy, “Challenges in Automotive “Teenagers and Their Virtual Posses-
for All, ERCIM, 1998, p. 12; www.teco. Software Engineering,” Proc. 28th Int’l sions: Design Opportunities and Issues,”
uni-karlsruhe.de/~michael/pub/ub. Conf. Software Eng. (ICSE 06), ACM Proc. 2011 Ann. Conf. Human Factors
in Computing Systems (CHI 11), ACM Computing (UIC 10), Springer-Verlag, 30. R. Want, “You’re Not Paranoid; They
Press, 2011, pp. 1491–1500; http://doi. 2010, pp. 4–18. Really Are Watching You!” IEEE Per-
acm.org/10.1145/1978942.1979161. vasive Computing, vol. 6, no. 4, 2007,
26. A.T. Campbell et al., “People-Centric pp. 2– 4; http://dx.doi.org /10.1109/
22. R.K. Balan and N. Ramasubbu, “The Urban Sensing,” Proc. 2nd Ann. Int’l MPRV.2007.90.
Digital Wallet: Opportunities and Proto- Workshop on Wireless Internet (WICON
types,” Computer, vol. 42, no. 4, 2009, 06), ACM Press, 2006; http://doi.acm. 31. L. Sloane, “Orwellian Dream Come
pp. 100–102; http://dx.doi.org/10.1109/ org/10.1145/1234161.1234179. True: A Badge That Pinpoints You,” The
MC.2009.134. New York Times, 12 Sept. 1992; www.
27. A. Schmidt, “Implicit Human Computer nytimes.com/1992/09/12/technology/
23. R. Steffen et al., “Near Field Communi- Interaction Through Context,” Personal orwellian-dream-come-true-a-badge-
cation (NFC) in an Automotive Environ- Technologies, vol. 4, nos. 2–3, Springer- that-pinpoints-you.html.
ment,” Proc. 2010 2nd Int’l Workshop Verlag, 2000, pp. 191–199.
on Near Field Comm. (NFC 10), IEEE 32. D. Goodin, “No, iPhone Location Track-
CS Press, 2010, pp. 15–20; http://dx.doi. 28. A. Schmidt, M. Langheinrich, and K. Ker- ing Isn’t Harmless and Here’s Why,” The
org/10.1109/NFC.2010.11. sting, “Perception Beyond the Here and Register, 22 Apr. 2011; www.theregister.
Now,” Computer, vol. 44, no. 2, 2011, co.uk/2011/04/22/apple_iphone_location_
24. L. A. Suchman, Plans and Situated pp. 86–88; http://dx.doi.org/10.1109/ tracking_analysis.
Actions, Cambridge Univ. Press, 1987. MC.2011.54.
25. D. Zhang et al., “Extracting Social and 29. A. Dieberger et al., “Social Navigation—
Community Intelligence from Digital Foot- Techniques for Building More Usable Sys- Selected CS articles and columns
prints: An Emerging Research Area,” Proc. tems,” Interactions, vol. 7, no. 6, 2000, are also available for free at
7th Int’l Conf. Ubiquitous Intelligence and pp. 36–45. http://ComputingNow.computer.org.