Professional Documents
Culture Documents
of Contents
Introduction
1.1
Values
1.2
1.3
Past
1.3.1
Present
1.3.2
Future
1.3.3
Concepts
1.4
Interaction layers
1.4.1
Connected objects
1.4.2
Connected literacy
1.4.3
1.4.4
Controlling privacy
1.4.5
Relationships
1.5
Hospitality
1.5.1
1.5.2
1.5.3
1.5.4
1.5.5
1.5.6
Research approaches
1.6
Sprints
1.6.1
Exhibitions
1.6.2
Research roadmap
1.7
1.7.1
Neighborhoods
1.7.2
1.8
Acknowledgments
1.9
Contact us
1.10
Introduction
Introduction
Introduction
Intro
1
In May 2015, science fiction author Bruce Sterling gave a keynote at ThingsCon . In his
2
talk he introduced a new research project he and his partner Jasmina Tesanovic have been
working on: Casa Jasmina3, the open source connected home of the future.
It's time to live the life. Just go ahead and build the products and see if you can survive
being in a room with them. Casa Jasmina is our test bed. Bruce Sterling at
ThingsCon
A few weeks later in June 2015, we flew to Turin, Italy along with Alexandra DeschampsSonsino4 to visit Casa Jasmina and spend some time with the team.
We were curious to see how it would be to live in and contribute to this home of the future,
and we're very grateful we got to experience it so early on.
Ever since visiting5 Casa Jasmina, some questions wouldn't leave us alone. There hasn't
been a day where the topic of connected homes hadn't come up, where we haven't been
trying to get closer to figuring out answers, or at least asking better questions.
How do we interact with a connected home? How does a space communicate what's
expected of the people who live in it? What are the ground rules and who has
permission to change them? What objects require interaction and what don't? How do
we know how to build and live in a connected home?
We asked a great number of smart and experienced people for their thoughts. It slowly
emerged that "the connected home" is an area that's not understood yetit is so new, with
so many unanswered questions and with so few connected homes actually in use.
We know that connectivity increasingly makes its way into our living rooms, kitchens and
bedrooms. The internet is coming into our smoke detectors, lights, door locks, kitchen scales
and ovens. We bring in more connectivity through fitness tracking wristbands and our
phones and tablets, and take it along when we get into the driving computers that are our
cars.
Understanding the connected homehow it can be designed, how we can engage
with it and control it, how we can live with it and still have agency over our datawill
be essential to address.
Connected homes will impact the lives of hundreds of millions people around the globe.
There are many challenges ahead, including designing interactions, privacy, user
empowerment in this new field. We hope this modest exploration will be of use to designers,
developers, entrepreneurs and policy makers as we figure this out together over the
Introduction
decades to come.
Welcome to version 2
We published version 1 of Understanding the Connected Home a few months after our visit
to Turin, in the fall of 2015.6
It turns out this collection of essays could not have been more timely. Just about every major
tech company has now entered the field of connected homes with a smart home hub, a wifienabled light bulb or thermostat or some other gadget.
We believe that understanding connected homes is even more urgent and relevant
now.
While there has been great progress in terms of user experience, manufacturing and
technology, there has not been much reflection about the implication of the connected
homes for our lives. How will ubiquitous connectedness and data change our domestic
lives? What are the powers currently shaping this landscape and what do they have to gain?
And more importantly, how can we as practitioners shape IoT to be a net positive for
society?
We wrote this book with practitioners in mind. We hope the people who read this will be the
people who make connected homes happen. That could include designers, developers,
strategists, entrepreneurs, researchers, activists, educators and many more.
The lens we bring is that of experience working with fellow IoT practitioners. We are involved
in many IoT conversations, and we're learning as we go, just like everyone in this field.
In this way, we see ourselves as part of a professional peer-learning community. It's an
informal, global network of designers, technologists, activists and more who collaborate with
one another and exchange insights and best practices so that collectively we can evolve the
IoT conversation and influence the state of the art.
Introduction
January 2016: Michelle took on a new role at Mozilla Foundation, leading the Open IoT
Studio with Jon Rogers, Professor of Creative Technology at the University of Dundee.9
March 2016: Peter co-chaired Interaction1610, a conference that gathered the global
interaction design community in Helsinki where many questions of designing connected
experiences, services and products were discussed indepth.
April 2016: The Good Home Project exhibited at Fuori Salone in Milan with Iohanna
Nicenboim11 and Michelle.
April 2016: Michelle curated a series of design sprints around privacy and the
connected home, notably the Mozilla Open IoT Design Sprint in Berlin.12
April 2016: The German government published a research report and set of policy
recommendations that Peter co-authored with Prof. Dr. Christoph Bieber on smart cities
and their implications for citizens.13
And throughout, ThingsCon hosted numerous local community events that explore the
techniques, design and ethics of connected products and services.
It has been a busy and productive year, with many touch points that are directly relevant to
Understanding the Connected Home. All of those activities evolved our thinking. That meant,
it was time to revisit the book.
For this new and updated version, we edited and revised the original essays, restructured
the whole bit, and added new content. We hope this makes for more accessible reading.
New chapters were added to bring the book up to date, offering fresh content for readers of
the first version.
As always, we look forward to hearing about your thinking and hope to talk to you online or
face-to-face.
Introduction
Values
Values
We believe that the connected home should respect several foundational values:
1. Privacy. We consider privacy a core value to be included throughout the design,
manufacture, usage and end of a connected product or service.
2. Read, write, participate. As a matter of empowerment, people should be able to read,
write and participate fully in their connected home.
3. Openness. Openness leads to more robust, resilient, and participatory products. For
creators of connected products, we advocate for open practices and technologies paired
with open reflection and documentation that can serve professional communities learning
how to make things with these values.
4. Diversity and inclusion. The connected home is a safe space and must be designed
with diversity and inclusivity in mind. This includes challenging assumptions about cultural
context as much as taking into account socio-economic factors, gender and other forms of
identity.
5. Security. Users and their data need to be protected from any party that might try to track,
spy, or hack. Aggregate data needs to be anonymized in a way that guarantees that data
cannot be traced back to identifiable users.
6. Sustainability. Sustainable sourcing and manufacturing as well as designing for end-oflifecycle are important ecological and social considerations as well as an opportunity to
position a connected home company better in the market place while saving their customers
money.
These values can guide makers of connected products and services. By building these
values directly into the products they make, designers and engineers can in aggregate
positively shape the Internet of Things landscape.1
1. Privacy
Our home needs to be a safe space. It must be respectful of its inhabitants, especially when
it comes to sensitive information and personal data. As the home becomes more connected,
data-driven services can put this safe space at risk.
Therefore, we must build safeguards such as:
strong privacy default settings
10
Values
Privacy by design
Connected home systems should be private by design2 by following measures such as:
Proactive not reactive; preventative not remedial
Privacy as the default setting
Privacy embedded into design
Full functionality positive-sum, not zero-sum
End-to-end security full lifecycle protection
Visibility and transparency keep it open
Respect for user privacy keep it user-centric
The best way of protecting data is to not collect it in the first place
Consent
Best practices around consent help build users' trust in connected products. So far, user
acceptance of smart home products has been limited, to say the least.
To foster trust, makers of connected products can ensure valid consent is explicit for
collecting as well as its usage. This consent must be verifiable. Data controllers must be
able to prove "consent" (opt-in), and consent may be withdrawn at any time.
Data breaches
Data breaches are a fact of digital life.
In Europe, there's already regulation in place to determine what happens in a breach.3 It
must be reported to a supervisory authority, and individuals have to be notified if adverse
impact is determined.
11
Values
The best companies will go way beyond the legal minimum and proactively seek out users
and propose actionable steps to remedy the situation.
Data deletion
Furthermore, users should always be able to delete their data. Again, the regulation in
Europe is already in place.
The data subject has the right to request erasure of personal data related to him on any
one of a number of grounds including non-compliance with article 6.1
(lawfulness)...where the legitimate interests of the controller is overridden by the
interests or fundamental rights and freedoms of the data subject which require
protection of personal data.
Of course, how deletion works with aggregated data and big data sets is tricky.
Nevertheless, these frameworks show how values around a user's control of their personal
data can be articulated and advocated.
Data portability
In addition to data deletion, users should be able to move their data across connected home
services. Portability should be guaranteed even as a user moves across different
companies' products.
As an innovation opportunity, connected products can offer easy data import and export
functions as well as adopt standards that build in portability.
Read
Users can see connected systems and understand how its parts interrelate. This includes
aspects like being able to see actionable, contextual data and visibility in what happens in
the system after certain actions are taken.
12
Values
In practice, "reading" the connected home may be about recognizing common visual cues.
Perhaps these cues are standardized symbols displayed on connected objects, or status
lights that indicate what's happening to your data, or whether an object is actively listening to
audio inputs.
The ability to "read" also applies to data that the home generates. These data sets could
include maintenance reports, electricity usage, connectivity maps and more.
Users in the home should be able to read, evaluate and manipulate these datasets as well
as understand the algorithms that create and compute with them.
Write
Users should be able to modify their connected home, including the data and algorithms in it,
as well as create new ones.
We should be able to query APIs in our home and to build bespoke services on top of them.
It should also be possible to identify data that has been modified by other members of the
household and to navigate permissions to accept or edit those changes.
Participate
Lastly, we should be empowered to fully participate in connected home and the data
infrastructure that powers and augments it. This touches on aspects like sharing,
collaborating, and open practices.
How can "connected home data" be documented and distributed to other households or
contributed to the commons? For example, a home might generate interesting data about
the local weather, which it can share with the neighborhood or national weather service.
People in the home should be able to understand these kinds of contributions and
participate in them when they choose.
Furthermore, how can people cultivate healthy relationships with the people they live with
and next to through (and sometimes in spite of) connected systems? How can preferences
be expressed and conflicts resolved in a way that gives individuals agency and control?
As our homes become more connected, we must preserve the ability to read, write and
participate fully in them.
An open source motto says: If you can't open it, you don't own it. We should all be able to
openand changethe things in our homes.
3. Openness
13
Values
Quality control
Especially the positive effects of increased transparency and decentralized quality control
can add essential additional security to connected homes.
Consider this as a rule of thumb: Bugs in proprietary software and apps are bad (or at least
annoying) but often users can work around them. Bugs and security holes in your home are
much worse, and due to the nature of networked complex computational systems, these
bugs tend to compound.
In other words, security, resilience, and strong code is key for the connected home.
14
Values
Where full open source is not an option, a strong and well documented API can offer
interconnectivity.
Values
5
How can we design for gender inclusivity and equality?
One way to designing for diversity and inclusion is to have a diverse team designing the
product as well as testing it.
Including ethnographers and anthropologists also can add a lot of value.
And finally, it's worth remembering that a product made with diversity and inclusivity in mind
also means it has a much larger potential user base, so it makes sense from a business
perspective as much as an ethics perspective.
5. Security
Computer systems are notoriously easy to attack once they are connected to the internet.
The connected home is no different.
Historically, because of the relatively low distribution of smart home devices, security was a
bit of a secondary concern.
Recently, with more and more reports of hacked internet-enabled baby phones, CCTV
cameras and fridges turned into email spamming machines6, security became more of a
priority both in the products' design process and communications.
We believe that tight security is absolutely essential. Users and their data need to be
protected from any party that might try to track, spy, or hackbe it criminals, commercial
entities or governments.7
Only then the home can be the safe space that is must be.
Aggregate data needs to be anonymized in a way that really guarantees that data cannot be
traced back to identifiable users. This includes when data sets are combined with other sets,
or in future big data scenarios.
Wherever possible, data should not be saved at all. The best way to prevent abuse of data is
not to have it in the first place.
6. Sustainability
Connected home products and infrastructure are computing infrastructure. As such, they
tend to be software-driven, and their life cycles are linked to the innovation cycles of the
processor industry.
To avoid connected homes becoming the next main contributor to hazardous e-waste piles,
we need to consider sustainability:
16
Values
Modularity in design can make it easier, cheaper, and more resource-friendly to replace
broken parts and those that need upgrades.
Open source, compliance to standards, and APIs can help connected products to do
their job longer, for example when a mobile operating system emerges or falls out of
fashion.
Better, more ecologically and socially conscious sourcing of material and manufacturing
can help reduce the footprint of a product.8
Recycling and end-of-lifecycle should be considerations through the design and
manufacturing process as well as ongoing user communications.9
Makers of connected home products need to make sustainability a priority.
We believe that companies strongly embracing sustainability ultimately put themselves in a
better position in the market10both from an ecological and social perspective (our planet
and society can only handle so much more abuse) and because it makes sense for their
customers (sustainability can lead to substantial savings in the medium and long term).
1. This set of values is likely to evolve over time as we explore more cases and
scenarios. As part of the Good Home project, we drafted a list of more concrete design
values, which we include here as a further inspiration: networked, communal,
interdependent, participatory, readable, open, humble, adaptable, hackable, diverse,
resilient, respectful, sustainable, perfect imperfection, one size does not fit all, local,
careful, provocative, post-capitalistic, constrictively critical. See
thegoodhome.org/values/
2. See en.wikipedia.org/wiki/Privacy_by_design
3. See the EU's General Data Protection
Regulationen.wikipedia.org/wiki/General_Data_Protection_Regulation
4. We explore this in more depth in the article on connected literacy
5. This starts from more straightforward solutions like dropping binary gender user
profiles (male/female should not be the only option) or not asking for gendered user
profiles to begin with (consider if they are really required for the core product), and goes
into much complex questions of roles and power dynamics surrounding gender in the
larger context of domesticity. Also, obviously, marketing.
6. For some up-to-date examples, just search online for the terms "iot" and "hacked".
You'll find plenty.
7. We touch upon these issues in more depth in the article on surveillance.
8
17
Values
8. For consumer electronics, this is notoriously hard, especially at the resource level.
Fairphone has been doing an exemplary job with their sourcing and the transparency
around making a smartphone ethical and sustainable: fairphone.com
9. For a great overview of the potential of closure experiences we recommend the
excellent work of Joe Macleod available at closureexperiences.com or as an
introductory talk recorded at Interaction16: vimeo.com/159666826
10. The B Corp structure is a promising way to encode values like sustainability in
corporate governance: bcorporation.net As a prominent example of a B Corporation
that does sustainable and fair production as well as recycling and end-of-lifecycle, look
no further than Patagonia's B Corp Annual report 2014):
patagonia.com/pdf/en_US/bcorp_annual_report_2014.pdf
18
19
Past
Past
In the past, human-to-machine interaction was modeled primarily on a single user interacting
with a single machine. The lifespans of our built environment were long. And most use cases
for the "home of the future" were about automation.
20
Past
21
Past
Long lifespans
Human-to-machine interaction changes quite quickly. In recent years, we've seen major
improvements to interfaces such as touch, voice and VR. Behind these innovations is the
availability of ever-increasing computing power.
Since the 1970s, computing power has effectively doubled every two years.5
Moore's Law as illustrated by "A plot of CPU transistor counts against dates of introduction;
note the logarithmic vertical scale; the line corresponds to exponential growth with transistor
count doubling every two years.6
However, while our computing environment moves at such a rapid rate, our built
environmentthat of our homes, places of work and leisure, our streets and urban
infrastructurehave historically changed at a much slower rate.7
Buildings can take years to construct and then stand for decades, if not centuries.
Renovating and retrofitting are important ways we maintain and repurpose our built
environment. These are all relatively lengthy and costly processes, as compared to updating
a digital service or personal devices.
22
Past
With that in mind, we have to consider how these different timescales and lifespans
intersect. Buildings and their infrastructure move at slower rates than computing. That
means new digital services and connected objects must play with structures that may be
hundreds of years old.
23
Past
24
Past
These ads showcase the companies' products and capture what these industries believed
was useful and desirable at the time.
There are notable similarities to how connected products are pitched today.
Then, just as now, these product showcases promise time-saving, ease of mind, and more
leisure. The home is viewed as a place of domestic labor and where efficiency is needed.
Therefore, much of the focus is given to automation.
Here we return to Engelbart. He noticed this emphasis on automation in human-machine
interaction, to which he responded: Augmentation not automation.13
There is great opportunity for technology to augment human intellect. However, challenges
remain as we move into a new era of human-machine interaction, where computing is
ubiquitous, where it more rapidly affects our built environment, and where corporations vie to
shape our domestic lives.
Now is the moment to go beyond automation and determine what augmentation we desire.
1. Card, Stuart K.; Thomas P. Moran; Allen Newell (July 1980). "The keystroke-level
model for user performance time with interactive systems". Communications of the
ACM 23 (7): 396410. doi:10.1145/358886.358895
2. Thanks to Scott Jensen for the pointer to Engelbart's work for this context: jenson.org
3. dougengelbart.org/firsts/mouse.html
4
25
Past
4. Watch Doug Engelbart's demo at youtube.com/playlist?
list=PL76DBC8D6718B8FD3&feature=plcp.
5. Moore's Law: en.wikipedia.org/wiki/Moore's_law
6. By WgsimonOwn work licensed under Creative Commons CC BY-SA 3.0
commons.wikimedia.org/w/index.php?curid=15193542
7. Thanks to Ame Elliot for articulating the differences in lifespans for architecture,
connected objects and digital services: simplysecure.org/blog/lessons-fromarchitecture-school-1
8. By Peter Bihr licensed under CC BY 2.0: creativecommons.org/licenses/by/2.0/
9. By Laura de Reynal licensed under CC BY-NC 2.0:
creativecommons.org/licenses/by-nc/2.0
10. Thanks to Alexandra Deschamps-Sonsino for the critique of past "homes of the
future."
11. en.wikipedia.org/wiki/Monsanto_House_of_the_Future
12. en.wikipedia.org/wiki/Design_for_Dreaming
13. dougengelbart.org/pubs/augment-3906.html
26
Present
Present
Today, multiple users interact with multiple machines to form complex computational
networks. Through simplified physical interfaces, IoT can offer users better understanding
and control of data. The foundation piece of digital augmentation is already in the hands of
billions of people thanks to their first IoT device: a smartphone.
27
Present
When these complex systems are visible and modifiable for everyday users, we learn about
about how they work. This visibility can lead us to knowingly change our own behavior to get
the outcomes we want. Rather than building vast surveillance machines, let's employ this to
build a learning cycle as a tool of user empowerment.
The Toyota Prius' dashboard is a useful example of a simple, actionable display of complex
data. It shows how the car uses and stores energy. Most users would be unfamiliar with how
electric car engines worked, let alone how their driving behavior affects energy consumption.
However, by reading this simplified real-time information, people can observe how their
behavior changes the system and adjust their driving accordingly.1
28
Present
examine how IoT might extend or replace the digital displays we have around us, further
augmenting our computational abilities while maintaining the users' understanding and
control of the system.
3
29
Present
3. Depending on how you slice and dice the data, current estimates of global
smartphone usage range somewhere between 2bn estimated by statista
(statista.com/statistics/330695/number-of-smartphone-users-worldwide/) and 2.4bn by
GSMA (gsma.com/mobilefordevelopment/programmes/connected-society) smart phone
users globally, with projections of around 6bn by 2020 from Ericsson
(ericsson.com/ericsson-mobility-report).
30
Future
Future
Smartphones are a sign of the speed of change that our homes may soon face. These rapid
lifecycles bring risks, such as security vulnerabilities and broken devices. There's an
urgency to address these issues now, as well as innovation opportunities, to ensure
throughout that the home remains a place that puts humans first.
31
Future
HTC Dream mobile phone with AZERTY keyboard for French market. By Akela NDE, CC
BY-SA 3.01
If anything, the last decade shows us how quickly new technologies can be picked up and
become mundane in their ubiquity. We anticipate a similar trajectory for the connected
home.
While today's connected objects can be clunky and exploratory, there will be some iconic
releases or "must have" devices that change how people see this space: The iPhone
moment of the connected home.
After this threshold, there will be electronics and connectivity in many of our everyday
objects. At this stage, the speed of change of our built environment will begin to resemble
that of our computing environment. The lifecycle of things in our homes will be shortened
dramatically.
Software will need to be patched. Devices will be rendered incompatible and obsolete. Entire
services will rise and fall in months.
Our homes will move at the speed of our smartphonesor faster. The era of the "disrupted
home" is coming.
32
Future
The risks
With this speed of innovation comes volatility and unpredictability. As a result, we will likely
see an increase in waste and exploitation. There will be vulnerabilities and security
breaches. If history teaches us anything, it is to expect these patterns, as we've seen them
with many technological advances before.
With that knowledge, we can approach the connected home with some understanding of
what is to come.
For example, let's look at security. As our built environment begins to change at the speed of
software, our homes may experience new kinds of security vulnerabilities.
A smart lock system is installed in your front door. The company who makes the locks goes
bankrupt. There is no longer a support service to maintain your locks. At some point, your
locks might get jammed, or hacked, or become incompatible with your smartphone's latest
update. You can no longer patch security bugs in your smart lock. And the lock on your front
door is no longer in your control.
These scenarios abound2 and serve as a reminder that how a product ends its lifecycle is
just as important as how it begins.3 Considerations such as security must be addressed not
only at the moment of purchase, but in anticipation for how the object will be used for years
to come.
From installment, to use and maintenance, to upgrading, to uninstalling and dismantling,
technology must be in service to humans and put our concerns and needs first.
Privacy as an opportunity
There aren't many connected homes today. Similar to smartphone proliferation, it might take
a decade for products to go from invention to widespread adoption.
Exceptions may be in some cities, such as in South Korea, where large-scale network
infrastructure is being installed directly into the new buildings. In other places, retro-fitting is
a more common path to connectedness, and that will likely move at a slower pace.
For a glimpse of what the connected home may be like, we can examine the trajectories of
other connected environments, such as retail spaces, office buildings, and hotels.
Already our behavior in these spaces is being tracked. As we move through the city, into
stores and offices, in transit and on our devices, many systems are recording what we look
at, what we click on and what we do.
33
Future
Due to the generally temporary and transactional nature of our interactions in those spaces,
we tend to use them with less emotional investment and critical thinking than our homes. For
example, in a high street store, we may be more accepting of privacy-diminishing
interactions4 if they come with financial gain or if they seem, frankly, unavoidable.
34
Future
We are seeing parallels in online tracking and behavior tracking in the physical world. As this
trend continues, we need to ensure we can make informed decisions whether to enter these
spaces and what information we consent to giving. Connected spaces, similar to websites,
should communicate what data they are collecting, how it's being used, and how to opt out.
Going forward, the tracking dilemmas we're facing in streets, stores and in our online lives
will confront us in the home.
For anyone making connected products today, there is a huge opportunity to build in better
privacy and control of personal data. Companies can innovate by offering higher default
settings, better controls over how personal data is collected and shared, as well as
assurances when data is deleted.
These privacy tools will be features that people increasingly seek out, as the prevailing
practices of tracking in our online lives and in public spaces encroaches into our home.
3. For more thinking about how products and services should end, see Joe Macleod's
Closure Experiences: closureexperiences.com
4
35
Future
4. EyeSee mannequins, for example, recognize retail customers' faces and record their
movements in a store. theverge.com/2012/11/20/3670222/almax-eyesee-dummy-retailfacial-recognition-privacy
5. By Colin Rose: flickr.com/photos/73416633@N00 Licensed CC BY 2.0:
creativecommons.org/licenses/by/2.0, available at
commons.wikimedia.org/w/index.php?curid=3214087.
6. The documentary "Do Not Track" by Brett Gaylor explains the perils of tracking and
practical measures to reducing it: donottrack-doc.com
7. There is a growing number of apps and services to offer unified interfaces. San
Francisco-based startup Thington (thington.com) offers a simple concierge-like
interface that aims to bring all smart home devices into one app based on their APIs.
It's an easy-to-use approach with intelligent, well-designed interactions. Other
approaches that are even more explicitly conversational include the smart home hubs
Amazon Echo and Google Home, both of which bring voice control into the home (and
fold their respective mother companies' services right in).
36
Concepts
Concepts
Interactions in the connected home happen at two layers: human-readable and machinereadable. By "readable" we mean a human or machine can easily understand, modify and
execute actions.
To engage in the human-readable layer, we may need to learn certain skills and
competencies so that we can be empowered in connected environments and able to read,
write and participate fully in them.
For machine-readable interactions, connected objects are equipped with the technical ability
to sense, think, and act. We see different categories of connected objects appearing in the
home.
The human-readable and machine-readable layers require mediation. That means we'll
need tools and protocols that translate between humans and machines, as well as
mechanisms to negotiate and resolve conflicts in and between these systems.
Looking at one area of conflict more closely, we see how controlling personal data is
complex, contextual, cultural, and fuzzy. We need to develop both human-readable tools,
such as vocabulary and metaphors, as well as machine-readable ones, like metadata, so
that humans can control their privacy across these layers of interaction.
37
Interaction layers
Interaction layers
Interactions in the connected home happen at two layers: human-readable and machinereadable. By "readable" we mean a human or machine can easily understand, modify and
execute actions. With the rise of more complex computational systems, new layers of
interaction may emerge.
Understanding "readability"
We use the term "readability" as shorthand for the broader ability to read, write and
participate fully. That encompasses the ability to view the source of an interaction, to
comprehend what's going on, to modify and execute it.
Human-readable layer
The human-readable layer contains interactions that humans can read and modify.
The purpose of this layer is for humans, regardless of their technical proficiency, to feel
confident in understanding what a connected object or service can do, and where desired,
modify or opt out of it.
As much as possible, this layer should convey things in simple iconography or text, or in
ways that are intuitive and build on behaviors that humans are already familiar and
comfortable with. Accessible control over machines is essential for people to live confidently
38
Interaction layers
Machine-readable layer
As connected devices enter the home, it is beneficial if the machines can talk to each other
to some degree. That means there will need to be a layer of interpretation and interaction
that is optimized for machines (such as APIs, etc.).
39
Interaction layers
Typically, this kind of layer is hard for a human to read. Nevertheless, by organizing and
structuring data following certain conventions,3 machines can read it effectively and that
information can then be translated into a more human-readable form.
There is a lot of technical work to be done designing this layer well. Through decades of
developing network technology and international standards, there are established tactics for
building interoperability among machines and their data.
If done correctly, the machine-readable layer can be incredibly powerful. However, since it is
hard for most humans to read it directly, we need to ensure that there are ways to trust and
verify what is happening at the machine-to-machine level even for non-experts. That way
devices can honor what the user wants and cooperates well with other devices, datasets
and systems.
New layers?
Possibly, given the complexity and ubiquity of connectivity ahead, there will be new
readability layers to consider.
For example, as embedded systems fill a space with sensors, computation and coordination,
does the resulting emergent system require the ability to read and modify the environment
as a completely different level?
Or do certain social relationships, such as neighborhoods or cities, gain the ability to read
and write collectively?
We're not sure what those new layers might be, but regardless there remains the need to
have human-readable and machine-readable layers so that humans and machines
respectively can understand the systems and engage in interaction.
1. Creative Commons licesening layers: creativecommons.org/licenses
2. Images from the Noun Project. Eye by Thomas Le Bas (thenounproject.com/search/?
q=eye&i=6186), Ear by Sren Michelsen (thenounproject.com/search/?q=ear&i=6200),
and Cloud by Aaron K. Kim: (thenounproject.com/search/?q=wifi&i=123908).
3. en.wikipedia.org/wiki/Data_model
40
Connected objects
Connected objects
A connected object is one that senses, thinks, and acts. The home has categories of
connected objects that tend not to be in other spaces, such as white goods and personal
memorabilia.
Sensing
An object that gathers information about its environment is sensing. Examples include
measuring temperature, sound, light, or movement. It can also mean receiving input from a
user, such as a button being pushed or a switch turned on.
Thinking
Thinking is the process of analyzing the input. Perhaps the incoming data is added to a
larger data set, or some computation is run using it. For connected objects, thinking
increasingly tends to happen "in the cloud", instead of locally on the device itself. This
increases the computational potential of the object, since cloud services are able to process
much more data than small, local hardware.
Acting
41
Connected objects
As a result of thinking, the object acts. It performs some kind of output, such as switching off
a light, turning down the temperature, unlocking a door, or sending a notification to a phone.
These actions can be physical or digital, visible or invisible.
Often, but not necessarily, these three behaviors (sensing, thinking, acting) happen in
chronological order. In larger systems, several of these processes might happen in parallel
or in ongoing loops. The interactions can be quite complex. Nevertheless, the basic pattern
holds.
42
Connected objects
What about a motion sensor that is connected to the internet? What about a learning
algorithm that doesn't act in a visible way at all, yet nevertheless learns about and adapts to
our behaviors?
The categories of active vs. passive data gathering objects are ripe with questions.
43
Connected objects
Here we outline a few further categories of objects in the home and how they might change
with connectivity:
Routers
First, routers might turn out to be the hub that controls all our smart home infrastructure. It's
not clear how it's going to play out, but it's a strong scenario. For example, Google's wifi
router On Hub2 comes with all the protocols equipped, plus microphones and speakers,
even though Google has a dedicated smart home hub in the market (Google Home).
Routers are already at the core of home connectivity, but also notoriously tricky to configure
and maintain. They might just be the least beloved of all tech objects in anyone's home. Do
we want these as hubs?
White goods
Second, white goods such as dishwashers, fridges, washing machines, and ovens have
been the connected fever dream of manufactures for years. (The internet-connected fridge
has become a running joke by itself.)3 There might be something there. Assume for a
second that a scenario where we have a home server in every house; a local cloud solution
of sorts. It's a long shot, but the fridge might not be the worst place to house this device, or
to double as a hub if integrated smartly.
We believe it's more likely that appliances will end up with minimum connectivity but with
voice-controls. A hands-free scenario is useful for cooking, whereas a fridge automatically
ordering groceries seems somewhat invasive.
This is purely hypothetical. We don't have much data on user acceptance. All it takes to
change the perception of a service or product is for one to get it just right. It would be an
"iPhone moment" for connected appliances that doesn't just improve an oven but redraws
the meaning and boundaries of the category entirely.
Home infrastructure
Third is infrastructure. What happens when existing infrastructure such as water pipes,
heating, electricity and the like get connected?
We see the first steps with smart meters that measure electricity consumption and make it
more transparent and actionable. There's still lots of previously dumb infrastructure to
explore.
44
Connected objects
But also, what about the infrastructure in a home we usually don't associate with
connectivity? Floor boards, wall paper, blinds? It seems to early to tell, but there might be
unexpected sensing, thinking and acting coming soon to our home infrastructure.
45
Connected literacy
Connected literacy
To be empowered in the connected home, we will need to learn certain skills and
competencies so that we can fully read, write and participate in these technologies.
46
Connected literacy
1
Mozilla's Web Literacy Map
The Web Literacy Map contains three main elements:
Reading on the web is a critical skill for engaging content online. They can be viewed
as exploring, or navigating the web. Just as traditional reading requires knowledge of
the text and concepts of print, reading online requires a basic understanding of web
mechanics.
Writing on the web enables one to build and create content to make meaning. New
genres that blend texts and tools have emerged on the open web and are often referred
to as making. Learning through making involves constructing new content.
Participating on the web includes connecting with the communities that share, build,
and sustain meaningful content online. A healthy online community requires knowledge
of how to create, publish and link content, and an understanding of security in order to
keep content, identity, and systems safe.
47
Connected literacy
Today as connectivity enters everyday objects and our physical environment in new ways,
we'll examine how web literacy can offer a framework for understanding the skills and
competencies needed to be empowered in the connected home and generally with IoT.
Some of these will have a direct counterpart for the home, some might not apply at all,
others yet are likely to at least lead to better questions. Let's go through them one at a time.
48
Connected literacy
49
Connected literacy
To be literate in connected spaces, you'll want to explain the ways in which unsolicited
third parties can track you across devices and environments. How will you control
metadata shared online, or identify the rights retained and removed in user
agreements? Also, there will definitely be a need to manage online identities.
Perhaps essential in all of these skills in an understanding of how and why to advocate
for healthy ecosystems and things that work for you, on your terms.
As connected homes come online, these might be some of the skills and competencies
required to be empowered in these new environments. These questions might also provide
interesting avenues of design and technical research, as well as considerations for future
lesson plans and courses.
1. See Mozilla Web Literacy Map: learning.mozilla.org/web-literacy
2. As an example, what would the reference look like for a digital artwork in a
connected picture frame like the Electric Object?
50
51
So what could that look like? What's the interface for negotiating these questions? What are
the social norms going to be? What kind of recourse might there be for cases of abuse?
We cannot yet answer these questions but can make some educated guesses:
Social norms might solve many of these questions before they even become
problematic. Most home owners might turn down "sniffing" levels to the lowest default,
while some early adopters turn it up. In both cases, their friends and peer group are
likely to self-select, exactly like it happens today. Some people use CCTV cameras on
their premises, others don't. Some have guns in their homes, others don't. Some play
loud music, others don't. No technological negotiations are at work here. Social
interactions, legal regulation and cultural norms are used to resolve these things.
Design principles that honor privacy will win the market. It makes sense to honor
privacy in the home and to make it an overwhelmingly strong default. The market might
simply solve this as users vote with their money. Different regions/markets might
produce different outcomes, as these preferences differ across countries.
Smart contracts could provide a technological backend. Unlike in software and web
services where users are routinely forced to accept End User License Agreements
(EULAs), there is a window of opportunity to create a better system for IoT in general
and the connected home in particular. Each person could store their personal
agreements on a digital ID that negotiates a deal with the connected environment. Say
Alice the visitor is fine to be sniffed for wifi devices, refuses to be captured by CCTV,
and doesn't have a strong preference around mood lighting. Bob the home owner has
similarly expressed his preferences. A relatively simple algorithm could match them up
so that the camera stops recording, while Bob's mood lighting preferences override
Alice's (since she doesn't care anyway) and the system does connect to Alice's wifi
devices because she agreed to it.2 For heightened security needs, the blockchain could
be used to verify these negotiations. This might seem like overkill now, but might turn
out to be relatively seamless and offer smooth sailing.
We need a Do Not Track for the physical space. As a lowest-common denominator,
we might need a Do Not Track3 for the physical world. Not just for connected homes,
but especially for smart cities and connected retails spaces. This could be a device or
service that allows us to reliably opt-out of marketing & advertising tracking as it enters
physical spaces.
These rules and types of interactions need to be human and machine readable. For any of
this to work, we need to come up with a way to communicate these rules in a format that is
legible by humans and machines alike, like Creative Commons licenses.4
Managing Conflict
52
User-to-user conflicts
In a multi-person household, the technology could easily be faced by conflicting goals. Think
a couple with different temperature preferences. These are things that technology won't be
able to solve elegantly. They are social challenges that require social solutions, not
technological ones.
User-to-agent conflicts
If the multi-user scenario challenge wasn't hard enough, think of example of friends
mentioned recently, in which only one partner uses the thermostat's app and the other
doesn't want to engage with it. In the latter case, thermostat doesn't recognize that person
as a user.
If the app user isn't at home, but the non-app user is, the thermostat reads the home as
empty. It doesn't turn on by itself but requires human intervention.
This is clearly a technological problem, and one that should have never appeared to begin
with. Technology, especially in the home, needs to be sensible about its demands on the
residents.
53
Agent-to-agent conflicts
When we introduce smart appliances to our home, we deal with software agents.
Individually, in isolation, these might do a good, or good enough, or even stellar job. But
combined into a complex and often unpredictable network, it can all get a little messy. Here
we need a systemic view. This is seriously challenging terrain for designers.
Good friend and excellent systems thinker/designer Louisa Heinrich articulated this perfectly
with an example of different appliances fighting over the blinds being open or closed based
on their respective goals: The coffee machine wants them closed so the milk keeps longer,
dishwasher wants them open to grab some solar power, the Nest wants them closed to keep
the temperature low, the plants want them open...
Who moderates these conflicts? What happens when youthe masterare not at home?5
In Louisa's words, "There is a narrow but very deep gap between assistance and
6
replacement."
54
As Scott points out starting around the 27 min mark, it's crucial to think about the legacy of
UX decisions, business models, etc., to explore the different cross-impacts, the implications.
"Can we find a way to surface and make legible the tensions and the frictions and the
conflicts that arise when new connected, data-collecting objects are introduced into our
world?"
For now, just assume that putting several smart agents/appliances to work side by side
might yield unintended consequences. These might not be devastatingmost likely they're
simply annoying, like lots of notifications on your phone or shutters that open and close
seemingly at random. But as more things are connected, the clashes could become more
dire.
56
Controlling privacy
Controlling privacy
Privacy is complex, contextual, cultural, fuzzy, and we need to develop the vocabulary and
tools to put people in control of their privacy.
Privacy is complex, contextual, cultural, fuzzy. It is hard to get right, especially in the context
of connected things. Really hard.
Our vocabulary has not evolved as quickly as technological and societal change has. We
are essentially stuckfor nowwith crutches, metaphorically speaking.
We try to describe and solve problems of connected privacy with terminology and metaphors
from non-connected privacy. This is as tricky and often misleading as trying to depict a fourdimensional figure in three-dimensional space. It's possible to a degree, but we simply are
not, as a society, fluent in doing it.
Yet controlling your privacy and making informed decisions about the factors that impact it
are absolutely essential going forward. How can anyone decide which
product/service/network/company to invite into that unique safe space of their home?
It might be helpful to think about privacy-related choices as consent rather than just
preferences.
57
Controlling privacy
58
Controlling privacy
Privacy is a spectrum
A light dimmer allows you to control the lighting of a room gradually. In the same way, a
Privacy Dimmer would give more gradual control over the amount of sensing/smartness/data
processing going on in the home at any given time. Privacy is a spectrum, and it is highly
contextual.
59
Controlling privacy
60
Controlling privacy
Privacy is a spectrum. We need to explore how to best express and refer to this spectrum.
61
Controlling privacy
However, in the evening you might want to enjoy a quiet dinner with your partner. Over
dinner and a glass of wine you might not want any alerts and notifications, any lights
switching on and off, any device listening to you, waiting for orders.
Turning the privacy dimmer would switch off all of these systems one by one. Starting with
the Amazon Echo, the security camera, the movement sensors, even the smart thermostat.
You'd have full privacy once more.
62
Controlling privacy
63
Controlling privacy
Like the Privacy Dimmer, the keyfob would also map preferences to types of services on a
spectrum (even if it would likely be a rather crude system). No sensing/full privacy would be
a self-sufficient description, but it might be hard to find any place that matched that
description, at least in urban centers.
Turning up sensing agreement (by turning down privacy requirements) on the keyfob's
spectrum, we might agree to types of sensing and data analysis like registering our
presence via our phone's wifi signal. Then (one more notch down on the privacy scale) we
would allow for CCTV, then (another notch down) agree to allow for an always-listening
device like certain types of smart home hub or controller.
For example, we might choose to set our default to agree to a minimum of sensing. But in a
close friend's home, we might not mind their smart home hub listening in on the
conversation, so we might adjust our privacy settings after a little alarm signal there rather
than leave.
On the other hand, if we are in a retail space or in, say, a colleague's or client's apartment
we might not want to share too much and adjust the keyfob setting accordingly to know
when sensing takes place.
64
Controlling privacy
Privacy Machines at the Mozilla Open IoT design sprint, Berlin April 2016.
65
Controlling privacy
One of these machines was the Wayback Machine. It's a little box that explored how to
control privacy in the home through the metaphor of time.
Concretely, it would switch off various media-related technologies one by onemuch like
the privacy dimmerin reverse chronological order in which they were introduced. Go back
to 2013 and most smart home products would have stopped working. Turn the dial back to
2004, and you would have lost access to Youtube, Facebook, Twitter. Go back to 1996 and
your internet access might be turned off.
Privacy Machines at the Mozilla Open IoT design sprint, Berlin April 2016.
66
Controlling privacy
Privacy Machines at the Mozilla Open IoT design sprint, Berlin April 2016.
The Wayback Machine plays with two notions:
First, the time angle makes it immensely relatable. While there are many issues with thisit
fosters nostalgia, it's technologically and historically tricky, it doesn't necessarily make a lot
of senseit does help start great discussions. Because it removes the technological barriers
and works with simple metaphors and examples we found that most people would much
more happily engage in this kind of debate than if you approached from a perspective of
privacy, policy, or surveillance.
Second, it underlines that media and communications technologies have evolved from oneway (broadcasting) to two-way (phone) to systems that are tracking the users' behaviors
through cookies, traffic analysis, meta data, etc.
Media and communications infrastructure since the advent of the modern web has turned
from something watched or consumed into a system that stares right back at the user.
Connected homes are extending this right into our living rooms.
What's next?
All of these examples are speculative, non-functional prototypes. Nevertheless, we do
believe they might offer valid starting points for real products and services.
As connected homes become a mainstream reality, we need to design and build products
that make it easy to make informed decision. Users should be empowered and in control of
their privacy, rather than relying companies to determine the settings for them.
67
Controlling privacy
As these products are built, our policies need to adjust as well. Rather than playing catch-up
(and failing to do their job well as they shoot at a moving target) or killing off innovation
through over-regulation (which would likely just drive the development of connected home
products outside our jurisdictions into less-strictly regulated regions), these policies need to
be sensible and forward-looking. This is no easy task, and law makers will need all of our
support.
In the mean time, the brunt of the burden is on the shoulders of UX designers. As a group,
they might be the best positioned professionals with both the skill sets and the mandate to
ensure users are empowered to control their own privacy.
1. thegoodhome.org/projects/privacy-dimmer/
2. thegoodhome.org/milan
3. Our group consisted of Rachel Uwa, Martin Skelly, Vladan Joler and Peter Bihr. You
can find photos and more descriptions of the various fictional privacy machines at
thewavingcat.com/2016/04/25/privacy-machines/
68
Relationships
Relationships
We believe that a home, whether connected or not, should primarily serve the humans in it.
Products and services we make should augment and respect human relationships. And, as
more computation enters the home, we must be aware of how some human interactions and
scenarios may take on new norms and considerations.
Hospitality. How does hospitality change in a connected environment? Certainly there are
timeless elements of etiquette. Nevertheless, there might be new ways we interact when
we're a guest in someone's connected home.
Sharing connected objects. In a household, it's common to share lots of objects. From
appliances to furniture to toys and media and more, what are the design opportunities that
await when we think about sharing connected objects?
Home & data. The connected home is a computer. What happens to its data when we
move? What does it look like for residents to use and maintain data about their home? What
role does connectivity play when buying and selling a home?
Who has control? As homes become more connected and software-based, questions
around access and rights control become acute. Who controls your home's infrastructure?
What rights does the city have, or the neighbors, or different members of a household? How
are those permission levels negotiated?
The connected things we surround ourselves with. What criteria do we use to decide
what connected objects to invite into our homes? How do we evaluate when we want to own
something or not?
The home as a target for commercial tracking and government surveillance. If a device
has the ability to track and record you, it's likely that it will, even when you don't want it to.
Advertisers, governments and criminals alike will use the Internet of Things to track our
behavior to an even greater degree than today. We need to build safeguards against
commercial and government surveillance and protections against abuse.
69
Hospitality
Hospitality
How does hospitality change in a connected environment? Certainly there are timeless
elements of etiquette. Nevertheless, there might be new considerations when we're a guest
in someone's connected home.
Being a house guest and host in a connected home will in many ways be similar to how
humans have socialized for centuries. But we expect there will also be some crucial aspects
that are new, or that need to be negotiated. What might that look like?
A good guest
If someone invites you to their connected home, there might be some things for you, as a
guest, to consider.1
Bring a gift. It's a common practice to bring a gift for your host, such as bottle of wine,
flowers or chocolates for your host. Of course, if you knew your host didn't like one of
those things, you would want to take that into account. In the connected home, would
there be other kinds of acceptable gifts? With these gifts, how can you respect your
hosts preferred level of connectivity, so that they are delighted and not annoyed or
upset by your gift.
Communicate your connectivity preferences. If someone invites you to dinner, you
might tell them in advance what your dietary preferences and needs are. Are you
vegetarian? Are you allergic to fish or have a gluten intolerance? In the connected
home, we may find that guests will also have to communicate their connectivity
preferences. Are you ok with devices knowing your location or transmitting your
movements to a third party service? Do you have an issue with your device connecting
to the home system, and what data will it be allowed to share? Knowing these
preferences in advance could help avoid awkward situations on arrival ("Sorry, I didn't
know you don't like active vital sign tracking!"). Save your host, or your guests, the
stress and address these things in advance.
Ask permission before modifying. A good house guest is considerate of the home
they are in. They leave the space tidy and they don't mess with any objects or
equipment without permission from the host. The same will likely apply in the connected
home. Ask permission before you change the smart thermostat, either actively by
pushing a button on the object, or passively by having your preferred settings override
the hosts.
Leave data dirt outside. In many homes, it's common to take off your shoes when you
70
Hospitality
arrive. This ensures that the dirt from the outside isn't tracked throughout the house.
There might be equivalents to this practice upon entering the connected home. Turn off
your connected services that might bring unwanted data or sensors into the home. If
you recently had a virus or security breach, take precautions and let your host know so
that they can protect themselves or accept the risk.
Understand the house rules. Every home has its way of doing things. Objects that
belong in certain places, rooms that aren't intended for guests, times of day when things
should be quiet. As a guest, ask your host about the house rules and respect them. As
a host, think about subtle ways of communicating these rules, especially until more
commonplace social norms have evolved.
All that said, as a guest, you certainly have some rights or courtesies afforded to you. For
example, you should be able to ask the host what monitoring is going on in the home or to
ask to have data logs deleted.
A good host
What does etiquette look like from the host's perspective?
Communicate your connectivity preferences. Just like your guests, it's good for you
to communicate your preferences in advance and then again upon arrival as a reminder.
This could mean asking for certain kinds of objects or sensors to be turned off or not
brought into the home. (A few years ago we saw this interaction play out with Google
Glass.) It could be the opposite, and a request for them to bring a certain kind of
connectivity because you need it to prepare the meal or heat the home to their preferred
temperature or some other function.
Prepare a guest information pack for guests who stay over. We've all experienced
what it's like to ask someone for the wifi password in their home. You can prepare an
info pack in advance or leave one in a prominent location in your home so that your
guests have all the access info they need. This could be guest passwords to your home
network or server, instructions for changing the settings on certain objects, apps you
need to download to interact with basic infrastructure, or other advice and logins for
your connected home.
Allow guests to opt-out. That said, it's always good form to allow your guests to have
the option of opting out. Your role is to make them feel comfortable and welcome. If you
have different preferences for going about connected spaces, give them a graceful way
to not take part. Don't presume consent: No means no, and consent should be given
explicitly.
Anticipate needs. It's an amazing feeling to have a host that provides something even
before you realized you needed it. Carry that forward and think of what your guest might
71
Hospitality
want or need during their visit and plan accordingly. This could be food, toiletries, and
linens. But it might just as well mean providing enough power outlets for them to
recharge their devices, lending them the adapters they might need,2 or getting those
permission levels for your fridge and blinds just right.
Brief your guests about the neighborhood. If your guests are visiting from another
area, it's a nice welcome gesture to let them know about your neighborhood. This
includes things like transportation options and local sights, as well as what the
connected environment is like. What are the rules and norms of the neighborhood
regarding data collection, sensors, tracking and other issues? Should your guests be
advised that most shops only accept payments with mobile NFC, or that the data
retention laws have changed and that they may want to turn off certain services when
they go for a walk? Do locals tend to be ok with their photos being taken? Being
knowledgeable about your area and sharing that information will help your guests avoid
unnecessary friction and have a more enjoyable stay.
72
When we add connectivity to an object, could we start to use physical objects in a non-rival
way?
When we imagine objects being shared, what if we consider usage beyond the household
neighbors, friends, the broader world? What if an object could even be used by several of
these groups at the same time?
How can we build and use objects in the connected home so that others can use them as
well? Is there a way to build shared resources in the connected home, for example through
pooling and sharing computational capacity when we don't need all of our processors' full
capacity?
There are many questions to further explore here. The early days of collaborative
consumption and the sharing economy can provide some useful pointers in the right
direction.3
Some of the key concerns we see:
Trust management. If we have pseudo-non-rival goods being shared thanks to their
connectivity, how do we facilitate trust among users?
Value add through usage. How do we design connected objects to improve, rather
than degrade, through use? Algorithmic learning seems to offer promising avenues to
explore.
Modularity. Because shared connected objects will get a lot of usage (hopefully), they
should be built to be easily maintained and repaired.4
Privacy. In connected objects, multiple users means that we need to firewall against
data leaks between users. If user or aggregate data is to be shared back into larger
services or the commons, that data needs to be squeaky clean5 to make sure it cannot
be linked back to individual users if they have opted out.
Decision-making and resource coordination. Do we need technological or design
solutions to make decision-making and allocation of shared resources easier, or is that
a social challenge in need of a social solution? Can a connected object be designed to
facilitate this resource coordination?6
Connected objects offer a great opportunity for designers and technologists to explore how
sharing could add value and increase usage and lifecycle of physical objects.
1. Supposedly. Citation needed. Sounds great, though, doesn't it? Kidding. Property
and Ownership by Stanford Encyclopedia of Philosophy is a fantastic resource around
the philosophy of ownership: plato.stanford.edu/entries/property
2
74
75
Computers crash
Not understanding your home (or not being understood by it) is bad enough. But what
happens in case of a more fundamental crash? What does the blue screen of death look like
for a home?
76
We don't know yet what kind of data will be common to be created in the apartment and
moved with us from one place to another. But we do know that moving with both data and
preference settings will be "a thing" we all do.
As a way of exploring mechanism that might help us with this process (independently from
the types of data), we created a bit of speculative design for The Good Home5, the Home
Totem6:
The Home Totem represents the owners privacy and sharing preferences. It also
serves as a link between the home and the owners secure data or profile on the
internet. Think dietary requirements, energy consumption profiles, records of former
home ownership and the like.
The Home Totem is a physical avatar that the owner moves from home to home. When
they move in, they set down the Home Totem and the home adjusts its privacy and
sharing preferences accordingly. By moving it from one connected home to another
they transfer their preferences to the new home and establish residency. In a sense, it
is the heart of the connected home as far as the residents are concerned.
The Home Totem is a piece of speculative design created by Peter Bihr for The Good Home
Project.
The core idea is to make it easy to establish residency by simply putting down this symbolic
object. It would hide the backend work of setting preferences, linking a digital ID to the place,
etc.
In the sketch you'll notice that the Home Totem consists of several pieces stacked on top of
one another. This might be a blunt, but intuitive way to allow for moving in and out of shared
living situations.
78
Factory Reset
So how does a factory reset work? Does it wipe all data completely? Are there parts of our
home's neural network that cannot be fully wiped, just like really old houses have grooves in
their wooden floors from generations of people walking the same beeline from bedroom to
bathroom?
When we arrive in a new place, do we start from scratch or do we transfer everything over to
the new place? (Think about the hassle it still is to move your data and settings to a new
computer!)
What if the location change is only part of what's new? For example, what happens if a
couple splits up, and their home's data sets were generated by two people, and now the new
place is for one? Will data from a bachelor pad seep into a new shared couple's space, like
some old Bob Marley poster? Will it be greeted by the other data set with a similar kind of
resentment as its physical counterpart? When children grow up and leave the home, do they
take their childhood data with them? Or does it get boxed up and stored as mementos, to be
recalled and possibly discarded at a later date, while meanwhile clogging up their parents'
basement?
79
When we think of the home in the UK, were talking about a living and breathing
infrastructure which moves and reacts to its environment. Ive lived in homes that have
leaked, had to replace boilers, flooring, tiles, grout. Its always felt like an endless battle,
and many moves in London have added to the feeling of unsteadiness. Every time I
move, I ask the same questions: the landlords details, where the meters are, how to
turn on the taps without burning myself. I get insurance policies moved over, making a
set of assumptions on information I dont have yet: when the building was built, whether
there has been subsidence recently. I bring in my own data but I also need a lot of
information that belongs to the home itself.
Home Sweet is a sketch of a digital service that captures and hosts a homes data
forever (presumably set up by the local council) enabling owners and tenants to come
and go with their own data but also leave something behind for the next person.
There is potentially great value to be gained by logging and unlocking this type of data and
building services around is.
Think about just how much easier it makes the life of residents to be able to tap into this kind
of maintenance log, find out who has in the past provided reliable maintenance and repair
services (or botched them up), to see if there are bits and pieces of infrastructure that have
been creating problems over and over.
When buying a home, this type of data is notoriously hard to find or verify, yet priceless. The
documentation on infrastructure in homes (especially older ones) is usually thin and bad.
This holds especially true in cities where there is a higher turnover of residents.
80
There is tremendous potential in figuring out how we handle data residue when moving in
and out, and how to unlock services built on top of this type of data. This goes for the
individual unit as much as for the neighborhood or city-wide level.
How do we merge our individual sets of "home data" when moving together, and divide it up
upon moving out?
What do failure modes in connected homes look like? Is there an off switch? How can we
build and design connected homes to be resilient and if they fail to do so gracefully?
1. As Cory Doctorow does here: wired.co.uk/magazine/archive/2015/07/features/stopspies
2. See the chapter Future or for earlier thoughts on this topic:
thewavingcat.com/2015/08/03/understanding-the-connected-home-ground-rules/
3. See the chapter on Negotiating, or for earlier thoughts
http://www.thewavingcat.com/2015/08/17/understanding-the-connected-homemanaging-conflict/
4
. Source: Wikipedia
commons.wikimedia.org/wiki/File:Windows_9X_BSOD.png#/media/File:Windows_9X_B
SOD.png, Licensed under Public Domain via Wikimedia Commons.
5. More about the Good Home project and the other exhibits we made for the Fuori
Salone at Milan see thegoodhome.org/projects
6. See thegoodhome.org/projects/home-totem/
7. For a more detailed presentation see thegoodhome.org/projects/home-sweet/
81
82
they click "buy now" in stores selling digital things (ebooks, games, music, videos, etc). In
short, it's not what they think.
So while there is certainly a need to raise consumer's media literacy here, it's also not
primarily their fault. The study shows that retailers use misleading language all along:2
"Retailers such as Apple and Amazon market digital media to consumers using the
familiar language of product ownership, including phrases like 'buy now,' 'own,' and
'purchase.'
Consumers may understandably associate such language with strong personal
property rights.
But the license agreements and terms of use associated with these transactions tell a
different story. They explain that ebooks, mp3 albums, digital movies, games, and
software are not sold, but merely licensed. The terms limit consumers' ability to resell,
lend, transfer, and even retain possession of the digital media they acquire. Moreover,
unlike physical media products, access to digital media is contingent-it depends on
shifting business models, the success and failure of platforms, and often on the
maintenance and availability of DRM authentication systems years after the consumer
clicked 'buy now.'"
83
84
We need to ask ourselves: Who controlsor should be able to controlaccess to and within
a home? Is it going to be the resident, landlord, owner, renter? An insurance, bank, or
Airbnb? What are the kind of legal frameworks that can ensure that residents are in charge
of their home?
The home is a space that needs special protections.
1. See Cory Doctorow's summary of the study: boingboing.net/2016/05/13/clicking-buynow-doesnt.html
2. Perzanowski, Aaron and Hoofnagle, Chris Jay, What We Buy When We 'Buy Now'
(May 13, 2016). 165 University of Pennsylvania Law Review (2017), Forthcoming.
Available at SSRN: ssrn.com/abstract=2778072
3. See Super User on Wikipedia: wikipedia.org/wiki/Superuser
4. We have already seen cases where leased cars won't start if the lease payments are
overduea truly malicious, out of proportion invasion of privacy and basic rights:
boingboing.net/2014/09/25/class-war-meets-the-war-on-gen.html
85
Mindful ownership
"You are what you eat," the saying goes. In the same spirit, you are what you own. Just like
one can be mindful about their diet in an effort to have a healthy, balanced body, one can
also be mindful about the objects one invites into their lives to ensure a healthy, balanced
environment.
The home is where we house most of our possessions. It matters what we choose to
surround ourselves with. A comfortable chair makes us feel at ease and supports us. A
cherished family memento makes us feel loved. A malfunctioning appliance causes
frustration.
Objects affect us. In the connected home, we should be mindful about what we invite in.
86
As we imagine the connected home, one that helps us be more human and that brings us
joy, we must explore a fuller set of selection criteria when deciding what objects to invite into
it.
Sterling explains how to assess the objects you own using these categories. He encourages
the mindful selection of the objects you surround yourself with everyday.
You are not "losing things" by acts of material hygiene. You are gaining time, health,
light and space. Also, the basic quality of your daily life will certainly soar. Because the
benefits of good design will accrue to you where they matterin the everyday.
88
Tracking and surveillance are a serious problem for digital communications, for the internet
of things, and especially for the connected home.
They hinder innovation as they undermine trust in these new technologies, and rightfully so.
More importantly, they undermine the social contract that our society runs on.
Increasingly, user rights equal citizens rights.
A recent study by the US Census Bureau1 found that nearly one in two internet users say
privacy and security concerns have now stopped them from doing basic things online:
"Americans are increasingly concerned about online security and privacy at a time
when data breaches, cybersecurity incidents, and controversies over the privacy of
online services have become more prominent."
The report suggest that this has reached a critical pointpeople stop using the internet
altogether. "The research suggests some consumers are reaching a tipping point where they
feel they can no longer trust using the internet for everyday activities."
The report provided a breakdown of internet users' biggest concerns:
Nearly two thirds listed identify theft (63%)
About a quarter was worried about data collection by online services (23%)
Just about one in five was concerned about loss of control over personal data (22%)
and data collection by government (18%).
It is this last point that is particularly concerning from a political and societal point of view, but
really it is the full package that means we are in trouble.
Now this study focused on internet use, not the internet of things. But it is safe to assume
that for IoT, and especially the connected home, these concerns will be as strong or
stronger.
90
More recently, James Clapper, the US director of national intelligence, stated that
"intelligence services might use the [internet of things] for identification, surveillance,
monitoring, location tracking, and targeting for recruitment, or to gain access to networks or
user credentials."3
The consequences to these developments were highlighted in a study by the Berkman
Center called Don't Panic: Making Progress on the "Going Dark" Debate.4 The internet of
thingsand again, this applies particularly in the connected homemight be a back door
that helps criminals and governments alike to work their way around all other defenses
(technological and legal alike) and towards a ubiquitous surveillance.
"Networked sensors and the Internet of Things are projected to grow substantially, and
this has the potential to drastically change surveillance. The still images, video, and
audio captured by these devices may enable real-time intercept and recording with
after-the fact access. Thus an inability to monitor and encrypt channels could be
mitigated by the ability to monitor from afar a person through a different channel."
It does not help at all that the majority of users find it difficult to figure out the right tools and
strategies to meaningfully enhance their privacy, as a 2015 Pew Research study found.5
Again, this is for online communicationsand it will apply to an even larger degree to IoT in
general and to connected homes in particular.
Yet, taking privacy in their own hands might be the only way for users to protect themselves
given the sad state of security in IoT these days. This is verified with a quick look at search
engine Shodan, which indexes thousands of unsecured web-connected devices.6
91
connected environments so they demand stronger privacy and data protection, and we
get to stronger regulation and market incentives for companies in the IoT market to
make security and privacy a priority for connected products and services.
These are significant, hard, and complex challenges. Yet they are essential for us to tackle.
We cannot, under any circumstances, afford to allow widespread surveillance into our
homes.
Yet at the same time, disconnecting is not an option either. The innovation happening
around IoT and connected homes has tremendous potential both commercially and
societally, and can improve the quality of life of hundreds of millions.
While the journey might not be easy, this is an endeavor worth fighting for.
1. The study is available online in full at: ntia.doc.gov/blog/2016/lack-trust-internetprivacy-and-security-may-deter-economic-and-other-online-activities. The Washington
Post has a summary of the results: washingtonpost.com/news/theswitch/wp/2016/05/13/new-government-data-shows-a-staggering-number-ofamericans-have-stopped-basic-online-activities/
2. See WIRED 2012 at wired.com/2012/03/petraeus-tv-remote/
3. See The Guardian (2016) at theguardian.com/technology/2016/feb/09/internet-ofthings-smart-home-devices-government-surveillance-james-clapper
4. The full study "Don't Panic: Making Progress on the 'Going Dark' Debate'" by the
Berkman Center (2016) is available online (PDF):
cyber.law.harvard.edu/pubrelease/dontpanic/Dont_Panic_Making_Progress_on_Going_Dark_Debate.pdf
5. For details, refer to this 2015 study by Pew Research: pewresearch.org/facttank/2015/04/14/why-some-americans-have-not-changed-their-privacy-and-securitybehaviors/
6. The search engine Shodan indexes thousands of unsecured web-connected devices,
incl. webcams and more: shodan.io
92
Research approaches
Approaches
Over the last year, we've experimented with various ways of exploring the questions
surrounding the connected home.
We're trying out a wide range of formats and research methods and are happy to share our
experiences with them so far, as well as learn about new approaches.
Content sprints are a great way to do a first quick collaborative deep-dive into a topic as
complex as connected homes.
Designing speculative prototypes is a worthwhile way to make complex, abstract issues
more graspable, and an exhibition can provide helpful deadlines and a platform for sharing
these ideas with the public.
We hope that this can be useful to others in their own investigations, and we'll certainly keep
experimenting with these and other formats.
93
Sprints
Sprints
Content sprints are a great way to do a first quick collaborative deep-dive into a topic as
complex as connected homes.
Content sprintssometimes also referred to as topic or book sprintsare heavily
condensed writing exercises with a focus on collaboration and peer review. A group comes
together and within a few days or weeks writes a chunk of content to be published by the
end of the sprint.
This very book was started as a content sprint back in 2015, and updated in another in 2016.
We believe that this is a great way to explore a new topic. While you will never get as deep
into the subject matter as with longer term academic research or the deep immersion that
comes with writing a book for a traditional publisher, great insights can be gained with this
faster format.
The trick is to get the framing and team right. Gather experts from different backgrounds.
Identify practitioners with a range of experiences who can draw on learnings and
publications without much reading or research as they write.
Frame the topic so they can be chunked into discreet pieces of writing. We found it's helpful
to start by writing the table of contents. Each chapter should have one sentence that
describes its main argument. And then each participant understands how the whole book
sits together and is able to pick up a piece.
We think of content sprints as a learning technique thats part workshop, part collaborative
writing exercise, part shared reflection. Combined with a strong bias towards shippinga
term from the software development word meaning output, or just getting stuff out the
doortopic sprints favor publishing over planning, producing copy over drafting outlines,
peer review over control through external established publishers.1
We have been involved in a number of similar sprints, from super quick one-day mini-reports
to large groups writing a full book over the course of a week. (With two authors and several
weeks of writing time in total, this book sits somewhere in the middle.)
If you plan to explore the connected home, we recommend you consider a content sprint.
Sprints have strengths and weaknesses. They can be great tools, but arent fit for every
context as they are built on principles that favor certain types of outcomes over others.
Within this framework, its relatively easy to fine-tune the process to match various needs.
2
These unshakable pillars of the sprint are:
94
Sprints
An emphasis on shipping. Done is better than perfect, as the saying goes. By the
end of the sprint, the result is going to be published, no matter what. (Or handed over to
a copy editor for final polishing, if thats more your thingbut no more work should
happen on the core content.)
Strong focus on collaboration. This is a team exercise that lives on collaboration,
sharing, and open exchange. Where there is too much ego at play, a sprint will not fulfill
its full potential. Credit where credit is due. In a highly collaborative environment it is
hard to give credit for any given word, sentence or paragraph. However, everyone
working on the sprint or any of its chapters should be visibly credited.
Peer review. No matter whos the leading expert of the group for any given topic,
chances are that others can add value and refine, both in substance and in style. Peer
review and co-editing are at the very heart of the sprint process.
To write this book, we used Github and Gitbook. These tools enabled us to collaborate
readily on texts and to have version control. It also meant our texts were published
immediately to the web, which somehow made us less precious about when something was
"done" or not.
We would love to see more writing on these issues. If this sounds like it might work for you,
we urge you do try out a topic sprint.
In recent months, we've also experimented with design sprints. In future writing, we'll share
our reflections from that format as well.
1. For an overview of strengths and weaknesses, as well as some hands-on pointers,
see Peter Bihr's article in E-180 magazine, Topic Sprintsthe fastest way to dive into a
topic: mag.e-180.com/en/2015/09/topic-sprints-the-fastest-way-to-deep-dive-into-atopic
2. Again, consider Peter's E-180 magazine article from which this is re-quoted.
95
Exhibitions
Exhibitions
Designing speculative prototypes is a worthwhile way to make complex, abstract issues
more graspable, and an exhibition can provide helpful deadlines and a platform to share
your work with the public.
In addition to the intellectual exploration of connected homes that has become this book, we
wanted to also proposing actual design solutions to the complex and often abstract
questions posed by increasingly connected homes.
Thus exhibiting became a regular tool in our projects, such as the Mozilla Open IoT Studio,
and new ones were born, namely the Good Home Project in collaboration with Alexandra
Deschamps-Sonsino.1
Our mission statement for the Good Home Project is as simple as it is ambitious:
The Good Home project explores ideas for 21st century urban living. In an on-going
series of installments it will explore what life for a technologically-savvy household
could look like while they are (and sometimes arent) at home in the near future. We will
showcase how flexible living interacts with the limitations of diminishing household
budgets, limited global resources, evolving concepts of privacy, the sharing economy,
and global migration.
We build prototypesoften purely conceptual or speculative, but increasingly also working
prototypesthat fill these questions of domesticity and the connected home with life. This
always considers the larger context, the mega trends shaping the world over the next few
decades.
This is an approach that inherently produces outcomes that are easy to criticize (and
criticized they should be!), that are likely to look dated quickly, and that in some cases will
turn out to seem pointless in the near future. However, in the short and medium turn lots and
lots of valuable insights can be gained this way both from the design process and the
conversations that follow.
The fact that there's an exhibition date also means the team works against a hard deadline.
This helps get things done, especially in contexts where the team is decentralized and has
other, more commercially viable obligations. It also is fun, and the importance of that cannot
be overstated in volunteer-driven projects.
To give a few examples of the role of physical prototyping, the Good Home's Privacy
Dimmer2 is both the basis for and the physical manifestation of the chapter on controlling
privacy in this book and The Wayback Machine that emerged out of Mozilla's Open IoT
3
96
Exhibitions
3
Design Sprint . In both cases, questions of privacy in the connected home and the
interactions surrounding privacy control were explored by different collaborators, with their
different background, and manifested in a speculative design object.
These conceptual prototypes essentially serve as narrative devices. Narratives can help fill
concepts as abstract and complex as privacy, empowerment, participation, or data
protection with life. This in turn lowers the barrier of joining the conversation. If a debate is
too abstract, technical, or just jargon-filled, many people will not feel like their contributions
are welcome. This means not all voices are heard, and inclusivity and diversity are at the
very core of what makes a home a home.
We also see prototypes serving a community-building function. This approach is deployed
regularly together with Jon Rogers at the Mozilla Open IoT sprints. By making a
collaborative prototype, new relationships are formed, peers learn with one another, and
skills are shared. This form of learning in action grows a professional community that learns
and makes together.
We strongly urge anyone exploring these topics to prototype heavily and frequently and
exhibit the results so others can engage with, and be inspired by, the results.
1. The Good Home Project is an initiative co-founded by Alexandra DeschampsSonsino and Peter Bihr that explores 21st century living to life through design solutions
(both speculative and real) exhibited around the world. For all exhibitions and
installments see thegoodhome.org.
2. See thegoodhome.org/projects/privacy-dimmer
3. See thewavingcat.com/2016/04/25/privacy-machines
97
Research roadmap
Research roadmap
Within this book we touched on a wide range of questions and some approaches. But by no
means can it be considered a comprehensive guide to the connected home.
In the following section, we list a few areas that deserve more research, as we expect them
to yield lots of insights. They are also topics we are likely to explore further, both within
future revisions of this book and in our other work.
98
99
100
What happens inside the home is part of the larger cityscape, and now it is measurable in
real time, too.
101
Neighborhoods
Neighborhoods
How can connected homes contribute to a healthier neighborhood, and how can it offer
residents a better ambient understanding of what's happening in the neighborhood?
When connected homes are networked together, we may see tremendous potential to
improve the neighborhood they're in. Here we outline some ideas.
102
Neighborhoods
We need to figure out models to use community and neighborhood data in a way where
neighbors are empowered to collect and use this data and better services can be built with
them, keeping privacy and security, as well as inclusivity and diversity in mind?
103
104
Acknowledgments
Acknowledgments
Alexandra Deschamps-Sonsino has been blogging about and building products for the
internet of things for over ten years. She has also instigated the Good Home project where
we put the words from this book into action. There's no one to whom we're more indebted for
helping us understand IoT and the connected home.
A huge thank you to Jasmina Tesanovic and Bruce Sterling for their kind hospitality at
Casa Jasmina and truly inspiring project. We are so grateful to play a part in it, however
small and remotely.
Grazie mille to the whole Arduino team especially Lorenzo Romagnoli and Davide Gomba
for hosting us and making us feel so welcome in Torino.
It's also such a pleasure to think about and tinker with connected homes together with Jon
Rogers from the University of Dundee. From facilitating workshops, to inviting us to Fife,
and to always bringing a collaborative, open spirit to everything he does, we can't wait to
keep exploring the future together.
A big thank you for lovely, inspiring and informative chats to Matt Webb, Matt Biddulph and
Tom Coates.
Louisa Heinrich has been doing tremendous work in this field. Conversations with her, as
well as her frequent talks, have been priceless.
Scott Smith and his team at Changeist have been an ongoing source of inspiration.
Especially their research project Thingclash and their outstanding critical IoT reading list are
priceless.
A big shoutout to the Max Krger, Simon Hher, and Emanuel Schwarz as partners in
crime for ThingsCon. Theay all are always thinking about how to make events around this
topic great. An amazing bunch to work with.
Conversations with Alper uun are always insightful and entertaining, but his thinking
around conversational interfaces has been especially helpful. We highly recommend you
seek out his upcoming book on the topic.
Thanks to Prof. Dr. Christoph Bieber. Writing a study and policy recommendations around
smart cities for the German federal government was just the perfect excuse to work together
once more, and the process was both full of learning opportunities and a lot of fun.
105
Acknowledgments
The importance of the work Marcel Schouwenaar and his network of collaborators across
the Netherlands and Belgium have been doing around ethics in IoT cannot be overstated,
from the IoT Design Manifesto to the new Just Things foundation.
106
Contact us
Contact us
This book is a work in progress. We plan to keep adding and revising articles. We always
welcome feedback.
If you'd like to work with the content of this book, it's licensed under Creative Commons (for
details see the introduction). If you'd like to explore a collaboration with us, please get in
touch:
Say hi to us on Twitter: @peterbihr and @thornet.
Contact us via the form provided by Gitbook: theconnectedhome.org.
107