skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: On the Making of Alternative Data Encounters: The Odd Interpreters
While data are the backbone for home Internet of Things’ (IoT) functional and economic model, data remain elusive and abstract for home dwellers. In response, we present the Odd Interpreters (OIs): a collection of three artifacts that materialize alternative ways of engaging with IoT data in home environments. The OIs recast home data as imaginative sounds (Broadcast), fading fabric (Soft Fading), and cookie recipes (Data Bakery) with the intent to reveal the hidden human labor and material infrastructures of data and to critique data's assumed objectivity. Following a Research-through-Design approach, we unpack design events that mark our process for making the Odd Interpreters. We conclude with a discussion around the need for pluralizing data encounters, the tactic of designing between illusion and precision, and a reflection on living with the prototypes while designing.  more » « less
Award ID(s):
1947696
PAR ID:
10465941
Author(s) / Creator(s):
; ; ; ; ; ;
Date Published:
Journal Name:
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems
Page Range / eLocation ID:
1 to 20
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The Internet-of-things (IoT) embeds computing in everyday objects, but has largely focused on new devices while ignoring the home's many existing possessions. We present a field study with 10 American families to understand how these possessions could be included in the smart home through upcycling. We describe three patterns for how families collaborate around home responsibilities; we explore families' mental models of home that may be in tension with existing IoT systems; and we identify ways that families can more easily imagine a smart home that includes their existing possessions. These insights can help us design an upcycled approach to IoT that supports users in reconfiguring objects (and social roles as mediated by objects) in a way that is sensitive to what will be displaced, discarded, or made obsolete. Our findings inform the design of future lightweight systems for the upcycled home. 
    more » « less
  2. Reinforcement learning (RL) presents numerous benefits compared to rule-based approaches in various applications. Privacy concerns have grown with the widespread use of RL trained with privacy- sensitive data in IoT devices, especially for human-in-the-loop systems. On the one hand, RL methods enhance the user experience by trying to adapt to the highly dynamic nature of humans. On the other hand, trained policies can leak the user’s private information. Recent attention has been drawn to designing privacy-aware RL algorithms while maintaining an acceptable system utility. A central challenge in designing privacy-aware RL, especially for human-in-the-loop systems, is that humans have intrinsic variability, and their preferences and behavior evolve. The effect of one privacy leak mitigation can differ for the same human or across different humans over time. Hence, we can not design one fixed model for privacy-aware RL that fits all. To that end, we propose adaPARL, an adaptive approach for privacy-aware RL, especially for human-in-the-loop IoT systems. adaPARL provides a personalized privacy-utility trade-off depend- ing on human behavior and preference. We validate the proposed adaPARL on two IoT applications, namely (i) Human-in-the-Loop Smart Home and (ii) Human-in-the-Loop Virtual Reality (VR) Smart Classroom. Results obtained on these two applications validate the generality of adaPARL and its ability to provide a personalized privacy-utility trade-off. On average, adaPARL improves the utility by 57% while reducing the privacy leak by 23% on average. 
    more » « less
  3. Many consumer Internet Things (IoT) devices involve spatial sensors such as cameras and microphones. These affect the privacy of nearby people. A prime example is smart home security cameras. We present our work developing scenarios, use cases, and design proposals for addressing smart camera privacy. Preliminary findings from a concept evaluation with 11 participants is presented. The outcomes of this research through design project foreground the importance and challenges of designing to support the privacy of nearby users. We outline actionable design responses while also raising limitations of technology approaches alone to address these issues. 
    more » « less
  4. Internet of Things (IoT) devices have been increasingly deployed in smart homes to automatically monitor and control their environments. Unfortunately, extensive recent research has shown that on-path external adversaries can infer and further fingerprint people’s sensitive private information by analyzing IoT network traffic traces. In addition, most recent approaches that aim to defend against these malicious IoT traffic analytics cannot adequately protect user privacy with reasonable traffic overhead. In particular, these approaches often did not consider practical traffic reshaping limitations, user daily routine permitting, and user privacy protection preference in their design. To address these issues, we design a new low-cost, open source user-centric defense system—PrivacyGuard—that enables people to regain the privacy leakage control of their IoT devices while still permitting sophisticated IoT data analytics that is necessary for smart home automation. In essence, our approach employs intelligent deep convolutional generative adversarial network assisted IoT device traffic signature learning, long short-term memory based artificial traffic signature injection, and partial traffic reshaping to obfuscate private information that can be observed in IoT device traffic traces. We evaluate PrivacyGuard using IoT network traffic traces of 31 IoT devices from five smart homes and buildings. We find that PrivacyGuard can effectively prevent a wide range of state-of-the-art adversarial machine learning and deep learning based user in-home activity inference and fingerprinting attacks and help users achieve the balance between their IoT data utility and privacy preserving. 
    more » « less
  5. null (Ed.)
    In this paper, we use fiction as a method to complicate the commonplace narratives of data as intangible and objective, in the particular context of Internet of Things (IoT) in the home. We, a team of two design researchers, partnered with a fiction writer and a single IoT enthusiast, Susan, to create The Data Epics: four short stories based on Susan's monthly home IoT data logs. The Data Epics revealed new imaginaries for data, showing new world-views and lively data, but also surfaced data's entanglement in meshes and hierarchies, and concerns about control and power. Our work also examines the labor of tending to and interpreting data and a particular interest in anomalies. We conclude with discussions of how data imaginaries from fiction might be imperfect, but are uniquely generative, offering a path to get closer to IoT data by trying things on and zooming in and slowing down. 
    more » « less