SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Sleeping with Cognitive
Capitalism
Digital Health Digital Capitalism Conference, Leeds Beckett University
4th of July
Christel De Maeyer, christel.demaeyer@arteveldehs.be, C.A.A.d.Maeyer@tue.nl
TU/e PhD candidate, User Centred Engineering Group, Department Industrial Design Eindhoven, Netherlands
Researcher and Lector at Artevelde University College Ghent, Belgium
Overview
• Personal Informatics A User Perspective
• The Concept of Data Doubles, Digital Personae – Mirror of Life
• Personal Informatics Classification or Typology (Lupton)
• The tension between the digital self – digital economy– digital
governance
• Suggestions for future design aspects
• Conclusion
Personal Informatics
In the Guardian 2nd June 2016
‘How a good night’s sleep became the ultimate status symbol’
Then there’s the rise of the quantified self through wearable technology. Our
bodies have become input/output devices that we monitor and optimize for
greater efficiency, and sleep has become another data set to be tracked and
hacked. What Huffington emphasizes about sleep, after all, is not that it rests
you but that it restores you. Sleep, she says, is the ultimate performance
enhancer.
Personal Informatics User Perspective
• Demographic: highly educated group of people.
• Rather younger population 20-30 (N44), 30-40 (N21), 40-50(N7),50-60(N7), +60 (N1)
• Temporary or periodic use (time, technology fail, bored, goal achieved, etc …)
• Reasons why?
• Out of Curiosity, Leisure, Health
• Which technology?
• Mobile apps, Wearable tech, Smartwatches (Passive-Active tracking concept)
• Sort of tracking?
• Steps, Exercise (age 40-50 more), Heart Rate and Sleep
Survey January – April 2016
The User and Behavior indications
• Just wearing the device is creating awareness
• The data is creating awareness
• It helps to create new habits and maintaining them.
• There seems to be a significant positive lineair relationship between age (surveyed in categories)
and the conviction that tracking helps in creating habits [r(57)=.67; p<.000], the older the more it
helps to create habits.
• We can see that women feel more controlled [M=m3.17, F=m3.63], stressed [M=m2.06, F=m2.58]
and motivated [M=m3.80, F=m4.04] by the device than man, but only concerning stress, this
difference almost attained marginal significance, F(1,57) = 4; p = 0.03
• As confirmed in other literature the tracking activity declines after 6 months of tracking.
Survey January – April 2016
The User and Data
Long Term Trackers
In depth interviews, Laddering Method (Reynolds, Gutman, 1988)– work in progress, De Maeyer, Markoupolos, 2016
Jean Baudrillard, Selected Writings, ed. Mark Poster (Stanford; Stanford University Press, 1988), pp.166-184
Attributes
• Mobile apps on smartphone -always with me,
is just tracking things
• Smart watch or wearable device.
- Always on me, never forget, is just tracking
things
• Concept of active and passive tracking
Consequences
• Convenience
• Periodic and continues tracking
• Goal oriented - competition
• Data lovers - analysers
• Data dependency
- First and second information
- Aggregation
• Sharing within app, not on Social Media
• No community feeling but group feeling
(Strava or other)
Values
• Towards a better lifestyle
-Consciousness in lifestyle
• Habits and routine creation
- Habit - automation
- Routines - planned and thoughtful, conscious
• Tracking gives confirmation
• Official status
- if I didn't measure it I didn't do it1.
• Track record - evolution - motivation
• Digital buddy
• Ingrained in daily live, a norm
User Design Typology
User Design Lens
De Maeyer – Dr. Prof. Markopoulous Work and research in progress 2016
Beginner
Periodic
Need
Explorer
Avid
By choice or prescribed
Lupton’s typology of self-tracking
Sociological Lens
Private
• Private use
Communal
• Sharing either in application
environment or on social
media
• Family, friends, care givers
Pushed
• Advised by
others
Imposed
• Forced upon
people
Exploited
• Repurposed for
others
Pushed
Imposed
Exploited
AIM
Surveillance and control
Self-surveillance
Mirror of life in exposure
• Data doubles (Haggerty, 2000)
• Detached no empathy – no context
Workplace Optimizing
productivity
Incentive for
health
insurance (US)
Health
Neo-liberal
model towards
self-care
Pro-active -
prevention
society
Role Models?
Who defines?
Insurance Risk
Assessment
Personalized
Insurance?
Government
Policy
Surveillance Social Sorting Reform
Reflecting on Lupton’s typology, more specific on pushed, imposed and
exploited modes of self-tracking.
Digital Economy/Capital Corporate Gain
• Zeo Inc. Sleep tracking – Out of Business (Data lost – unless backed up)
• Body Media Inc. – acquired by Jawbone Inc. (Data lost – unless backed up)
• Moves – acquired by Facebook
• Runkeeper – acquired by ACICS (no mail yet of changes)
Privacy disclaimer of Runkeeper an extract
Business Transfers: As we develop our business, we might sell or buy businesses or assets. In the event of a sale, merger, reorganization,
dissolution or similar event relating to all or a portion of our business or assets, Personal Data or other information may be part of the
transferred assets.
• Withings – acquired by Nokia
• LinkedIn acquired by Microsoft (backup on request)
What about the data?
• Companies get acquired for the data, not necessarily for the technology. ‘An analyst for Forrester Research,
said sports-apparel companies are hungry to access data about what consumers are doing in their day-to-
day lives, in hopes that they might be able to use that information to bolster their marketing efforts’
Future: Identity incorporated?
We are all data slaves - I Incorporated my identity – JLM is her own data broker.
http://jenniferlynmorone.com
Morone’s corporate status means that,
in her words, ‘any data that I create
That is linked to my name, IP address
and appearance is copyrighted or
trademarked and therefore subject to
litigation if used without permission…
So any photo I take, any email I write,
any call, text, web search, cctv footage
of me that is stored one someon else’s,
Company’s or goverment’s server
does not have the right to be there or
to be used, sold, leased or traded.
Harcourt (2015), Exposed, p. 264
Future Design Aspects according
User Design typology
Sociological
•Value-Sensitive Design (VSD), ‘accounts for human values in the design process (focus on a broad widely held-
human values such as well-being, welfare and human rights) a three step design process that examines
conceptual, empirical and technical issues’ Cummings, Science and Engineering Ethics (2006) 12 , 701-715
•Twelve specific human values to have ethical import that should be considered in the design process: human
welfare, ownership and property of, privacy, freedom of bias, universal usability, trust, autonomy, informed
consent, accountability, calmness, identity, and environmental sustainability. Cummings, Science and
Engineering Ethics (2006) 12 , 701-715
•Barriers in use:
•Example of imposed use of personal informatics devices in the workplace.
•Example of insurance companies giving Personal Informatics device as incentive, but at the same time
exploiting the data for risk management and personalized insurances.
•Aggregation of data, Interoperability between platforms (data silos), everywhere are bits of data.
Future Design Aspects according
User Design typology
Behavior Design
• Analyze the different Behavior Models Theory and apply
Positive Design
• How design can mediate, facilitate and foster user-
wellbeing
References
• Baudrillard J. (1988), Selected Writings, ed. Mark Poster (Stanford; Stanford University Press, 1988), pp.166-184
• Cummings M. (2006), Integrating Ethics in Design through the
Value-Sensitive Design Approach, Science and Engineering Ethics (2006) 12 , 701-715
• Desmet P. et al, (2015), Positive Design User Reference Guide, TUDelft
• Fogg, BJ, http://www.bjfogg.com
• Haggerty K., Ericson R. (2000), Surveillant assemblage, British Journal of Sociology Vol. No. 51 Issue No. 4 (December 2000) pp. 605–622
• Harcourt B. (2015), Exposed, Desire and Disobedience in the Digital Age, Harvard University Press
• Li, Ian, (2010), https://ianli.com
• http://jenniferlynmorone.com
• Lupton D. (2014), Self-tracking Cultures: Towards a Sociology of Personal Informatics, CHI '14 , December 02 - 05 2014, Sydney, NSW, Australia
• Rushkoff D., 2016, Throwing Rocks at The Google Bus, Penguin Random House LLC

Weitere ähnliche Inhalte

Ähnlich wie Sleeping with Cognitive Capital

UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024mikailaoh
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2ifi8106tlu
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Kandy Woodfield
 
Dissertation project
Dissertation projectDissertation project
Dissertation projectyoshisinha
 
Deep Customer Insights, Laurea, October 2015
Deep Customer Insights, Laurea, October 2015 Deep Customer Insights, Laurea, October 2015
Deep Customer Insights, Laurea, October 2015 Taneli Heinonen
 
Analysis of “what do you do with all this big data” –ted talk by susan etlinger
Analysis of “what do you do with all this big data” –ted talk by susan etlingerAnalysis of “what do you do with all this big data” –ted talk by susan etlinger
Analysis of “what do you do with all this big data” –ted talk by susan etlingerDarpan Deoghare
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Saurabh Mishra
 
Learning Data Analytics
Learning Data AnalyticsLearning Data Analytics
Learning Data AnalyticsLearnbay
 
Health information professionals and Artificial Intelligence
Health information professionals and Artificial IntelligenceHealth information professionals and Artificial Intelligence
Health information professionals and Artificial Intelligencecoxamcoxam
 
IRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media DataIRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media DataIRJET Journal
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Digital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes versionDigital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes versionMarilyn Herie
 
IIR 2017, Lugano Switzerland
IIR 2017, Lugano SwitzerlandIIR 2017, Lugano Switzerland
IIR 2017, Lugano SwitzerlandMarco Polignano
 
Creating the Evidence Base for mHealth
Creating the Evidence Base for mHealthCreating the Evidence Base for mHealth
Creating the Evidence Base for mHealthcraig lefebvre
 
Well-being A Sunset Conversation
Well-being A Sunset ConversationWell-being A Sunset Conversation
Well-being A Sunset ConversationMicah Altman
 

Ähnlich wie Sleeping with Cognitive Capital (20)

UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024UX Conference on UX Research Trends in 2024
UX Conference on UX Research Trends in 2024
 
2015-10-14 research seminar 2
2015-10-14 research seminar 22015-10-14 research seminar 2
2015-10-14 research seminar 2
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
Dissertation project
Dissertation projectDissertation project
Dissertation project
 
re
rere
re
 
BIG-DATAPPTFINAL.ppt
BIG-DATAPPTFINAL.pptBIG-DATAPPTFINAL.ppt
BIG-DATAPPTFINAL.ppt
 
Deep Customer Insights, Laurea, October 2015
Deep Customer Insights, Laurea, October 2015 Deep Customer Insights, Laurea, October 2015
Deep Customer Insights, Laurea, October 2015
 
Analysis of “what do you do with all this big data” –ted talk by susan etlinger
Analysis of “what do you do with all this big data” –ted talk by susan etlingerAnalysis of “what do you do with all this big data” –ted talk by susan etlinger
Analysis of “what do you do with all this big data” –ted talk by susan etlinger
 
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
Breakout 3. AI for Sustainable Development and Human Rights: Inclusion, Diver...
 
Learning Data Analytics
Learning Data AnalyticsLearning Data Analytics
Learning Data Analytics
 
Health information professionals and Artificial Intelligence
Health information professionals and Artificial IntelligenceHealth information professionals and Artificial Intelligence
Health information professionals and Artificial Intelligence
 
IRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media DataIRJET- Personality Recognition using Social Media Data
IRJET- Personality Recognition using Social Media Data
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
A.I.pptx
A.I.pptxA.I.pptx
A.I.pptx
 
4th Semester Project
4th Semester Project4th Semester Project
4th Semester Project
 
Digital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes versionDigital Communication Power Tools: Speakers Notes version
Digital Communication Power Tools: Speakers Notes version
 
IIR 2017, Lugano Switzerland
IIR 2017, Lugano SwitzerlandIIR 2017, Lugano Switzerland
IIR 2017, Lugano Switzerland
 
SMAG Evaluation
SMAG EvaluationSMAG Evaluation
SMAG Evaluation
 
Creating the Evidence Base for mHealth
Creating the Evidence Base for mHealthCreating the Evidence Base for mHealth
Creating the Evidence Base for mHealth
 
Well-being A Sunset Conversation
Well-being A Sunset ConversationWell-being A Sunset Conversation
Well-being A Sunset Conversation
 

Mehr von Quantifed Self Meetup Brussels (13)

Study trip SFO_IBM_2016_IEEC
Study trip SFO_IBM_2016_IEECStudy trip SFO_IBM_2016_IEEC
Study trip SFO_IBM_2016_IEEC
 
Het Niewe teamwerken - medewerker perspectief
Het Niewe teamwerken - medewerker perspectiefHet Niewe teamwerken - medewerker perspectief
Het Niewe teamwerken - medewerker perspectief
 
Presothestudios2012
Presothestudios2012Presothestudios2012
Presothestudios2012
 
Presothestudios combi2011
Presothestudios combi2011Presothestudios combi2011
Presothestudios combi2011
 
Digitalinfluence docfestdocville
Digitalinfluence docfestdocvilleDigitalinfluence docfestdocville
Digitalinfluence docfestdocville
 
Digitalinfluence groningen
Digitalinfluence groningenDigitalinfluence groningen
Digitalinfluence groningen
 
Game mechanics b2bb2c
Game mechanics b2bb2cGame mechanics b2bb2c
Game mechanics b2bb2c
 
21 10presothestudios
21 10presothestudios21 10presothestudios
21 10presothestudios
 
Presothestudios
Presothestudios Presothestudios
Presothestudios
 
8 Seconds Plugmedia
8 Seconds Plugmedia8 Seconds Plugmedia
8 Seconds Plugmedia
 
Plug Marketing Conversie 040209 Slideshare
Plug Marketing Conversie 040209 SlidesharePlug Marketing Conversie 040209 Slideshare
Plug Marketing Conversie 040209 Slideshare
 
Conversics
ConversicsConversics
Conversics
 
Design for persuasion
Design for persuasionDesign for persuasion
Design for persuasion
 

Kürzlich hochgeladen

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Sleeping with Cognitive Capital

  • 1. Sleeping with Cognitive Capitalism Digital Health Digital Capitalism Conference, Leeds Beckett University 4th of July Christel De Maeyer, christel.demaeyer@arteveldehs.be, C.A.A.d.Maeyer@tue.nl TU/e PhD candidate, User Centred Engineering Group, Department Industrial Design Eindhoven, Netherlands Researcher and Lector at Artevelde University College Ghent, Belgium
  • 2. Overview • Personal Informatics A User Perspective • The Concept of Data Doubles, Digital Personae – Mirror of Life • Personal Informatics Classification or Typology (Lupton) • The tension between the digital self – digital economy– digital governance • Suggestions for future design aspects • Conclusion
  • 3. Personal Informatics In the Guardian 2nd June 2016 ‘How a good night’s sleep became the ultimate status symbol’ Then there’s the rise of the quantified self through wearable technology. Our bodies have become input/output devices that we monitor and optimize for greater efficiency, and sleep has become another data set to be tracked and hacked. What Huffington emphasizes about sleep, after all, is not that it rests you but that it restores you. Sleep, she says, is the ultimate performance enhancer.
  • 4. Personal Informatics User Perspective • Demographic: highly educated group of people. • Rather younger population 20-30 (N44), 30-40 (N21), 40-50(N7),50-60(N7), +60 (N1) • Temporary or periodic use (time, technology fail, bored, goal achieved, etc …) • Reasons why? • Out of Curiosity, Leisure, Health • Which technology? • Mobile apps, Wearable tech, Smartwatches (Passive-Active tracking concept) • Sort of tracking? • Steps, Exercise (age 40-50 more), Heart Rate and Sleep Survey January – April 2016
  • 5. The User and Behavior indications • Just wearing the device is creating awareness • The data is creating awareness • It helps to create new habits and maintaining them. • There seems to be a significant positive lineair relationship between age (surveyed in categories) and the conviction that tracking helps in creating habits [r(57)=.67; p<.000], the older the more it helps to create habits. • We can see that women feel more controlled [M=m3.17, F=m3.63], stressed [M=m2.06, F=m2.58] and motivated [M=m3.80, F=m4.04] by the device than man, but only concerning stress, this difference almost attained marginal significance, F(1,57) = 4; p = 0.03 • As confirmed in other literature the tracking activity declines after 6 months of tracking. Survey January – April 2016
  • 6. The User and Data Long Term Trackers In depth interviews, Laddering Method (Reynolds, Gutman, 1988)– work in progress, De Maeyer, Markoupolos, 2016 Jean Baudrillard, Selected Writings, ed. Mark Poster (Stanford; Stanford University Press, 1988), pp.166-184 Attributes • Mobile apps on smartphone -always with me, is just tracking things • Smart watch or wearable device. - Always on me, never forget, is just tracking things • Concept of active and passive tracking Consequences • Convenience • Periodic and continues tracking • Goal oriented - competition • Data lovers - analysers • Data dependency - First and second information - Aggregation • Sharing within app, not on Social Media • No community feeling but group feeling (Strava or other) Values • Towards a better lifestyle -Consciousness in lifestyle • Habits and routine creation - Habit - automation - Routines - planned and thoughtful, conscious • Tracking gives confirmation • Official status - if I didn't measure it I didn't do it1. • Track record - evolution - motivation • Digital buddy • Ingrained in daily live, a norm
  • 7. User Design Typology User Design Lens De Maeyer – Dr. Prof. Markopoulous Work and research in progress 2016 Beginner Periodic Need Explorer Avid By choice or prescribed
  • 8. Lupton’s typology of self-tracking Sociological Lens Private • Private use Communal • Sharing either in application environment or on social media • Family, friends, care givers Pushed • Advised by others Imposed • Forced upon people Exploited • Repurposed for others Pushed Imposed Exploited AIM Surveillance and control Self-surveillance
  • 9. Mirror of life in exposure • Data doubles (Haggerty, 2000) • Detached no empathy – no context Workplace Optimizing productivity Incentive for health insurance (US) Health Neo-liberal model towards self-care Pro-active - prevention society Role Models? Who defines? Insurance Risk Assessment Personalized Insurance? Government Policy Surveillance Social Sorting Reform Reflecting on Lupton’s typology, more specific on pushed, imposed and exploited modes of self-tracking.
  • 10. Digital Economy/Capital Corporate Gain • Zeo Inc. Sleep tracking – Out of Business (Data lost – unless backed up) • Body Media Inc. – acquired by Jawbone Inc. (Data lost – unless backed up) • Moves – acquired by Facebook • Runkeeper – acquired by ACICS (no mail yet of changes) Privacy disclaimer of Runkeeper an extract Business Transfers: As we develop our business, we might sell or buy businesses or assets. In the event of a sale, merger, reorganization, dissolution or similar event relating to all or a portion of our business or assets, Personal Data or other information may be part of the transferred assets. • Withings – acquired by Nokia • LinkedIn acquired by Microsoft (backup on request) What about the data? • Companies get acquired for the data, not necessarily for the technology. ‘An analyst for Forrester Research, said sports-apparel companies are hungry to access data about what consumers are doing in their day-to- day lives, in hopes that they might be able to use that information to bolster their marketing efforts’
  • 11. Future: Identity incorporated? We are all data slaves - I Incorporated my identity – JLM is her own data broker. http://jenniferlynmorone.com Morone’s corporate status means that, in her words, ‘any data that I create That is linked to my name, IP address and appearance is copyrighted or trademarked and therefore subject to litigation if used without permission… So any photo I take, any email I write, any call, text, web search, cctv footage of me that is stored one someon else’s, Company’s or goverment’s server does not have the right to be there or to be used, sold, leased or traded. Harcourt (2015), Exposed, p. 264
  • 12. Future Design Aspects according User Design typology Sociological •Value-Sensitive Design (VSD), ‘accounts for human values in the design process (focus on a broad widely held- human values such as well-being, welfare and human rights) a three step design process that examines conceptual, empirical and technical issues’ Cummings, Science and Engineering Ethics (2006) 12 , 701-715 •Twelve specific human values to have ethical import that should be considered in the design process: human welfare, ownership and property of, privacy, freedom of bias, universal usability, trust, autonomy, informed consent, accountability, calmness, identity, and environmental sustainability. Cummings, Science and Engineering Ethics (2006) 12 , 701-715 •Barriers in use: •Example of imposed use of personal informatics devices in the workplace. •Example of insurance companies giving Personal Informatics device as incentive, but at the same time exploiting the data for risk management and personalized insurances. •Aggregation of data, Interoperability between platforms (data silos), everywhere are bits of data.
  • 13. Future Design Aspects according User Design typology Behavior Design • Analyze the different Behavior Models Theory and apply Positive Design • How design can mediate, facilitate and foster user- wellbeing
  • 14. References • Baudrillard J. (1988), Selected Writings, ed. Mark Poster (Stanford; Stanford University Press, 1988), pp.166-184 • Cummings M. (2006), Integrating Ethics in Design through the Value-Sensitive Design Approach, Science and Engineering Ethics (2006) 12 , 701-715 • Desmet P. et al, (2015), Positive Design User Reference Guide, TUDelft • Fogg, BJ, http://www.bjfogg.com • Haggerty K., Ericson R. (2000), Surveillant assemblage, British Journal of Sociology Vol. No. 51 Issue No. 4 (December 2000) pp. 605–622 • Harcourt B. (2015), Exposed, Desire and Disobedience in the Digital Age, Harvard University Press • Li, Ian, (2010), https://ianli.com • http://jenniferlynmorone.com • Lupton D. (2014), Self-tracking Cultures: Towards a Sociology of Personal Informatics, CHI '14 , December 02 - 05 2014, Sydney, NSW, Australia • Rushkoff D., 2016, Throwing Rocks at The Google Bus, Penguin Random House LLC