[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-030-66504-3_3guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Creative Toolkits for TIPS

Published: 14 September 2020 Publication History

Abstract

We present a survey of toolkits employed in research workshop approaches within TIPS (Trust, Identity, Privacy and Security) domains. Our survey was developed within wider design research to develop digital service prototypes that support people in evaluating whether to trust that an online actor’s identity is not recently faked, and that a service they are registering personal information with is legitimate; and a subsequent project involving a tool that invites people to reflect on the cumulative risks of sharing apparently harmless personal information online. The radically multidisciplinary nature of both these TIPS projects has determined that we create a research space to promote exchange to, as design researchers, better understand the ‘opaque’ immediate and longer term implications of our proposed services and invite cross-disciplinary discussion towards interdisciplinary understandings. This paper is intended as an at-a-glance resource for researchers from a range of disciplinary backgrounds working on TIPS research to inform on various different material engagements, with research stakeholders, through creative workshop approaches. Our survey focused on the literature from Design (especially Participatory Design or PD, and Codesign), Human Computer Interaction (HCI) and cyber related security research. It comprises 30 papers or toolkit examples organised across: review papers; example toolkits; case studies reporting relevant toolkit use; applied toolkits for learning/knowledge exchange; research toolkits focused on demonstrating a methodological-conceptual approach (some problematising emergent or near-future technologies); and two papers that straddled the latter two categories, focusing on future practical application. We begin with an overview of our rationale and method before presenting each group of texts in a table alongside a summary discussion. We go on to discuss the various material components, affordances and terminology of the toolkits along with core concerns often left out of the reporting of research; before going on to recognise toolkits not so much as things that diagnose and fix things, but as a loose collection of readily available material and wider resources, used in particular participatory approaches, which together help account for techno-relational differences and contingencies in TIPS-related fields.

References

[1]
Electronic Frontier’s Surveillance Self Defence Kit. https://ssd.eff.org/enfoundational
[2]
Andersen, K., Wakkary, R.: The magic machine workshops: making personal design knowledge. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, New York, NY, USA, pp. 1–13. Association for Computing Machinery (2019).
[3]
Ashenden, D., Benque, D., Houldsworth, A.: ‘It fauna’ and ‘crime pays’: using critical design to envision cyber security futures. In: Praxis & Poetics, Research Through Design, RTD 2013 (2013)
[4]
Berger, A., Ambe, A.H., Soro, A., De Roeck, D., Brereton, M.: The stories people tell about the home through IoT toolkits. In: Proceedings of the 2019 on Designing Interactive Systems Conference, DIS 2019, New York, NY, USA, pp. 7–19. Association for Computing Machinery (2019).
[5]
Blythe, M., Andersen, K., Clarke, R., Wright, P.: Anti-solutionist strategies: seriously silly design fiction. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, CHI 2016, New York, NY, USA, pp. 4968–4978. Association for Computing Machinery (2016).
[6]
Blythe, M., Encinas, E., Kaye, J., Avery, M.L., McCabe, R., Andersen, K.: Imaginary design workbooks: constructive criticism and practical provocation. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, New York, NY, USA, pp. 1–12. Association for Computing Machinery (2018).
[7]
Bowyer, A., Montague, K., Wheater, S., McGovern, R., Lingam, R., Balaam, M.: Understanding the family perspective on the storage, sharing and handling of family civic data. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, New York, NY, USA, pp. 1–13. Association for Computing Machinery (2018).
[8]
Brandt, E., Binder, T., Sanders, E.: Tools and techniques: ways to engage telling, making and enacting, pp. 145–181. Routledge International Handbooks, Routledge (2012)
[9]
Bratteteig, T., Verne, G.: Does AI make PD obsolete? Exploring challenges from artificial intelligence to participatory design. In: Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial - Volume 2, PDC 2018, New York, NY, USA. Association for Computing Machinery (2018).
[10]
Clarke, R.E., Briggs, J., Armstrong, A., MacDonald, A., Vines, J., Flynn, E.,Salt, K.: Socio-materiality of trust: co-design with a resource limited community organisation. CoDesign (0), 1–20 (2019).
[11]
Coles-Kemp, L., Ashenden, A.: Community-centric engagement: lessons learned from privacy awareness intervention design. In: The 26th BCS Conference on Human Computer Interaction (HCI), pp. 1–4, September 2012.
[12]
Coles Kemp, L., Heath, C., NCSC: You Shape Security Toolkit. https://www.ncsc.gov.uk/collection/you-shape-security
[13]
Coles-kemp, L., Holloway, R., Holloway, R., Heath, C.P.R., Arts, M., Holloway, R.: Too much information: questioning security in a post-digital society. In: Proceedings of the CHI 2020 Conference on Human Factors in Computing Systems, pp. 1–14 (2020)
[14]
Dourish P and Anderson K Collective information practice: exploring privacy and security as social and cultural phenomena Hum. Comput. Interact. 2006 21 3 319-342
[15]
Dove, G., Halskov, K., Forlizzi, J., Zimmerman, J.: UX design innovation: challenges for working with machine learning as a design material. In: Proceedings of the CHI 2017 Conference on Human Factors in Computing Systems, pp. 278–288 (2017)
[16]
Drajic, D., et al.: User engagement for large scale pilots in the Internet of Things. In: Proceedings of TELSIKS 2019 14th International Conference on Advanced Technologies, Systems and Services in Telecommunications, pp. 46–53 (2019).
[17]
Dunphy, P., et al.: Understanding the experience-centeredness of privacy and security technologies. In: Proceedings of the 2014 New Security Paradigms Workshop, NSPW 2014, New York, NY, USA, pp. 83–94. Association for Computing Machinery (2014).
[18]
Durrant AC, Kirk DS, Moncur W, Orzech KM, Taylor R, and Trujillo Pisanty D Rich pictures for stakeholder dialogue: a polyphonic picture book Des. Stud. 2018 56 122-148
[19]
EPSRC: Trust, Identity, Privacy and Security in the Digital Economy 2.0 (2017). https://www.epsrc.ukri.org/funding/calls/tips2/
[20]
Fox, S., Merrill, N., Wong, R., Pierce, J.: Differential vulnerabilities and a diversity of tactics: what toolkits teach us about cybersecurity. In: Proceedings of the ACM on Human-Computer Interaction (2 CSCW) (2018).
[21]
Gatehouse, C., Wood, M., Briggs, J., Pickles, J., Lawson, S.: Troubling vulnerability: designing with LGBT young people’s ambivalence towards hate crime reporting. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, New York, NY, USA, pp. 1–13. Association for Computing Machinery (2018).
[22]
Heath, C.P.R., Crivellaro, C., Coles-Kemp, L.: Relations are more than bytes: re-thinking the benefits of smart services through people and things. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, CHI 2019, New York, NY, USA, pp. 1–12. Association for Computing Machinery (2019).
[23]
Jensen, R.B., Coles-Kemp, L., Wendt, N., Lewis, M.: Digital liminalities: understanding isolated communities on the edge. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI 2020, New York, NY, USA, pp. 1–14. Association for Computing Machinery (2020).
[24]
Kelly K The Inevitable: Understanding the 12 Technological Forces That Will Shape Our Future 2016 USA Viking Press
[25]
Khairuddin, I.E., Sas, C., Speed, C.: Blockit: a physical kit for materializing and designing for blockchain infrastructure. In: Proceedings of the 2019 on Designing Interactive Systems Conference, DIS 2019, New York, NY, USA, pp. 1449–1462. Association for Computing Machinery (2019).
[26]
Lane, G.: UnBias Fairness Toolkit (2018). https://unbias.wp.horizon.ac.uk/fairness-toolkit/
[27]
Le Guin UK The Carrier Bag Theory of Fiction, the Ecocriticism Reader: Landmarks in Literacy Ecology 1996 Athens University of Georgia Press
[28]
Ledo, D., Houben, S., Vermeulen, J., Marquardt, N., Oehlberg, L., Greenberg, S.: Evaluation strategies for HCI toolkit research. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, New York, NY, USA, pp. 1–17. Association for Computing Machinery (2018).
[29]
Lewis, M.M., Coles-Kemp, L.: Who says personas can’t dance? The use of comic strips to design information security personas. In: CHI ’14 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2014, New York, NY, USA, pp. 2485–2490. Association for Computing Machinery (2014).
[30]
Light, A., Luckin, R.: Designing for social justice: people, technology, learning (2008)
[31]
Light, A.: Democratising technology: making transformation using designing, performance and props. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, New York, NY, USA, pp. 2239–2242. Association for Computing Machinery (2011).
[32]
Manohar, A., Briggs, J.: Designing in with black box technologies and PD, pp. 2294–2307. Design Research Society (2018).
[33]
Mathiasen, N.R., Bødker, S.: Experiencing security in interaction design. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, New York, NY, USA, pp. 2325–2334. Association for Computing Machinery (2011).
[34]
Maxwell, D., Speed, C., Campbell, D.: ‘Effing’ the ineffable: Opening up understandings of the blockchain. In: Proceedings of the 2015 British HCI Conference, British HCI 2015, New York, NY, USA, pp. 208–209. Association for Computing Machinery (2015).
[35]
Morozov, E.: To Save Everything, Click Here: The Folly of Technological Solutionism. Public Affairs (2013)
[36]
Pasquale, F.: The Black Box Society. Harvard Universty Press (2015).
[37]
Sanders, E.B.N., Brandt, E., Binder, T.: A framework for organizing the tools and techniques of participatory design. In: Proceedings of the 11th Biennial Participatory Design Conference, PDC 2010, New York, NY, USA, pp. 195–198. Association for Computing Machinery (2010).
[38]
Sanders EB and Stappers PJ Probes, toolkits and prototypes: three approaches to making in codesigning CoDesign 2014 10 1 5-14
[39]
Slocum, N.: Participatory Methods Toolkit: A practitioner’s manual. King Baudouin Foundation and the Flemish Institute for Science and Technology Assessment (viWTA) (UNU/CRIS) (2003). www.kbs-frb.be
[40]
Stembert, N.: Co-Creative Workshop Methodology. U4IoT Consortium, Horizon 2020 European research project. https://u4iot.eu/pdf/U4IoT_CoCreativeWorkshopMethodology_Handbook.pdf
[41]
Sterling B Shaping Things 2005 Cambridge MIT Press
[42]
Sturdee, M., Coulton, P., Lindley, J.G., Stead, M., Ali, H., Hudson-Smith, a.: design fiction: how to build a Voight-Kampff machine. In: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, CHI EA 2016, New York, NY, USA, pp. 375–386. Association for Computing Machinery (2016).
[43]
Sturdee, M., Lindley, J.: Sketching and drawing as future inquiry in HCI. In: Proceedings of the Halfway to the Future Symposium 2019, HTTF 2019, New York, NY, USA. Association for Computing Machinery (2019).
[44]
Vines, J., Blythe, M., Lindsay, S., Dunphy, P., Monk, A., Olivier, P.: Questionable concepts: critique as a resource for designing with eighty somethings. In: Conference on Human Factors in Computing Systems - Proceedings, pp. 1169–1178 (2012).
[45]
Zurko, M.E., Simon, R.T.: User-centered security. In: Proceedings of the 1996 Workshop on New Security Paradigms, NSPW 1996, New York, NY, USA, pp. 27–33. Association for Computing Machinery (1996).

Index Terms

  1. Creative Toolkits for TIPS
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        Computer Security: ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers
        Sep 2020
        348 pages
        ISBN:978-3-030-66503-6
        DOI:10.1007/978-3-030-66504-3

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 14 September 2020

        Author Tags

        1. Toolkits
        2. Creative workshops
        3. TIPS
        4. Interdisciplinarity
        5. Participatory design

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 14 Jan 2025

        Other Metrics

        Citations

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media