SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Trust within Technology
Risk, Existential Trust, and Reflective Designs in Human-
                   Computer Interaction

                                  Mads Bødker
                   Ph.d defence, IT-University of Copenhagen
                              November 1. 2007
Outline
•   Conceptual work on the concept of trust - from trust in to trust within
    (existential trust)

•   “Backdrop”: the risk-society and the pervasiveness/ubiquity of computers

•   Ties these concepts to HCI as a discipline that not only enables faster and
    more efficient interaction with machines, but also (increasingly) makes the
    world available to us

•   HCI increasingly defines the ways in which we encounter the world and the
    ways in which we think about our relations to technology

•   HCI can and should supplement its focus on the design of efficiency and
    transparency with a focus on designing for openness, engagement, and
    interpretation (Reflective HCI)
•   Contribution: making a different perspective on the concepts of trust and
    trusting in relation to technology possible


•   Opening a new door towards an increased sensitivity to links between
    design and trust


•   Partial, tentative conclusions and results...


•   Not the final word on the matter, nor a complete theoretical rework of
    trust and trusting, but an attempt to create new figurations of trust, enabling
    new possible ways to talk about trust and trusting in HCI
Introduction
•   Big issues in HCI?

•   Critical HCI: how to reappraise some central assumptions in HCI:
    transparency, efficiency, experience, users, meaning etc.

•   Asserting the importance of HCI

    •   The cultural meaning of “the risky computer”

    •   The technological sublime of a world pervaded with computer
        technologies: we are not spectators to an amazing world of
        technologies, we are intimately involved in it

        •   elusiveness, the invisible

        •   ineffable space, the unspeakable
Risk society/culture
•   Risk society thesis applied on a world where computers are increasingly
    everywhere

•   Matters-of-fact / Matters-of-concern

•   Computers and computer networks are implied in more and more aspects
    of our daily activities

•   Risk not as a problem of the social (hierarchical, rule-bound, Gesällschafft) but
    a perspective within culture (vertical, symbolic value-based, Gemeinschafft):
    Risk Culture (Lash)

•   Reflective actors, knowledgeable agency - cognitive reflexivity

•   Aesthetic reflexivity: Signifiers of technological risk (ranging from the
    annoying to the cataclysmic) abound...
•   Technological culture: Technologies, to be effective, must withdraw from
    revealing themselves - they must take the form of obviousness.

•   Modernist ideal of control - by having technology disappear into the fabric of
    the everyday, we gain an increased control of our world

•   Disappearence as domestication

•   Technological risks contradict the “instrumental fidelity” of modernist
    assumptions about technology
Engagements in Risk

•   How do we approach trust when we cannot rely solely on an unproblematic
    consumption of institutionally sanctioned security and expertise?

•   Attempts: democratization of risk assessment (in various forms by e.g. Wynne,
    Sclove, Fischer, Beck etc.)

    •   Inspired by Habermasian discourse ethics

    •   Finding a communal basis for “reason” and for decisions

    •   Consensus conferences, Lay/Participatory Technology Assessment (PTA)
•   Democratizing risk engagement does not necessarily confront the kinds of
    “excess” or cultural risk tropes (narratives, stories, images, sounds)

•   It does engage with well-representable sources of risk - “we, the lay public,
    are concerned over an increasing amount of surveillance carried out in the
    work place, at home, on the move etc...”

•   People such as Wynne and Fischer have problematized the way “Lay
    Perspectives” are moderated, tamed by being ultimately grounded by
    scientific rationality - decisions are made more with respect to expert
    arguments than to the biased “reason” by an anxious, distrusting public
•   Another way to understand risks: The problem of agency and identity risk:
    Brian Wynne, Timothy Melley, Mary Douglas


•   Identity risks: rather than provable threats, risks can also be seen in the ways
    that the risk “subject” is performed, the way the subject is allowed to voice
    and utter concern and anxiety


•   “Agency panic”, the technological sublime


•   Risk as the pollution of categories (where does the technological end, where
    does the human begin...) - “matter out of place”


•   People’s stories, mass-mediated or popular depictions of risk in computers
    are not carriers of affective/aesthetic biases, but ways in which to make
    sense of an ineffable computer pervaded everyday...

•   How to engage in these forms of risk and distrust?
HCI and trust

•   Not a mainstream concept in HCI

•   It has been proposed (e.g. Shneiderman, Friedman et al) that in order to
    foster a trusting relationship between humans and their technologies, we
    need to make them “open for inspection”, allowing users to supervise and
    oversee that technologies and the institutions that support them function
    correctly and consistently

•   Or, design technologies to be domesticated, to become tacit infrastructures
•   The notion of trust that is traditionally applied within HCI (and also CMC) is
    what we could call a human-social/relational prototypical form of trust


    •   How can we trust in e-commerce sites, what cues do we need?

    •   How can we trust the integrity of our technologies?

    •   How can we trust that our computers perform correctly?

    •   ...etc.

•   Security design within HCI proposes: design interfaces to maximize prudent
    user behaviour, design for inspection that still allows for optimal efficiency


•   Key question: How do we design interfaces that allow us to trust in
    computers?
•   Mimics the directional trust that we all know in some form or another from our daily
    undertakings


•   Works from a prototypical form of trust that argues that trust is a relation between two or
    more actors who have some form of bounded agency to act in a relatively unpredictable way
    (i.e. the other can potentially act inconsistently or in ways that are destructive to our goals)


•   That trust has a behavioral correlate - a causal relation between use and trust: “if a user is
    using, he or she is also trusting”
•   I argue that trust in HCI (in the broadest sense) can be about more than a
    unidirectional relation that begins with the human and is directed towards
    the technology. The ways in which we design our computer technological
    environments can also be seen to potentially influence our experience of
    ourselves

•   HCI’s relevance can be grounded in certain cultural experience


•   How are users (people) supposed to relate to technology, how are they
    supposed to understand themselves and their activities as actors in a
    technological world?


•   Key question: How can HCI perhaps begin to adress the kinds of aesthetic,
    “excessive” forms of risk? How can the design of interactions provide
    people with the feeling that their own voices, their own concerns are made
    possible?
Existential Trust
•   Such a dialogue with computer pervaded environments, so I argue,
    potentially makes possible another kind of trust:

•   Existential trust, trust as an epistemological category - a certain aspect on
    knowing

•   The trust we have in our own ability to know the world

•   Self-trust: how to trust our own ways of making meaning, our own sense
    making, if scientific explanations and rationalities will often dominate or
    disregard “subjective” modes of interpretation

•   Trust within technology
Reflective HCI/design
•   Critical Technical Practice: question the fundamental assumptions about the
    nature of interaction btw. people and technology and the role of designers in
    mediating that interaction.

•   Interactions that invite reflection on the attitudes that underpin our ideas of
    technology and humanity

•   The interface and interaction as interesting sites of cultural expression and
    dialogue around social and cultural issues

•   For example: How can technologies begin to “appreciate” users
    interpretations of risk and the rich imaginaries that have grown up around
    them rather than discount them as flawed forms of reasoning?

•   Engagement with the aesthetic, excessive aspects of risk culture, not the
    designing out of risks
HALT




            Fig. 1: Ghost graphics on PDA, image by DELCA project, IT-University of Copenhagen
                                                      DELCA, IT-University 2005
In the following I will not be concerned with the dynamic ecology of the project, but primarily on
the narrative construction of the system and one of the ghost DELCA’s in particular. Many of the
ghosts in the DELCA project were “type cast” for the project including the Butler, a conventional
if somewhat arrogant way-finding assistant, Physical Joe, a grumpy “sarge” of a workout ghost
that urged people to use the stairs rather than the escalators, or Printer Jan who could be
•   The relation to existential forms of trust, self-trust, and the ability to “dwell”
    in a world where computer technologies permeate most aspects of our lives


    •   Possibility of voicing concerns over technology in subjective/aesthetic
        registers


    •   Reflective interactions that encourage/demand participation in a dialogue
        around designs, - they are open to interpretation and differing
        perspectives, subverting traditional hierarchies of user and designer/
        expert


    •   Designs that focus attention on the effects and implications of
        technology


    •   Interactions that take cultural concerns seriously and allow for
        “inspection” of these
•   An attempt to foresee and develop some conceptual insight into the
    moralizing and performative aspects of technology


•   A material ethics? Achterhuis argues that we should consider these
    aspects, even design for them sensibly


•   What Reflective HCI could potentially contribute with to such a material
    ethics, is the design of interactions that enable a disclosure of these
    efforts to perform users in specific ways


•   Enabling users to hold technologies accountable for the ways in which
    technologies narrate them...
...?

Weitere ähnliche Inhalte

Was ist angesagt?

DeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain CollegeDeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain CollegeAnn DeMarle
 
Info design presentation-3
Info design presentation-3Info design presentation-3
Info design presentation-317elisem
 
Info design presentation2
Info design presentation2Info design presentation2
Info design presentation217elisem
 
Info design presentation[1]
Info design presentation[1]Info design presentation[1]
Info design presentation[1]17elisem
 
Engagement, Flow, Presence
Engagement, Flow, PresenceEngagement, Flow, Presence
Engagement, Flow, PresenceRiva Giuseppe
 
Applying Corporate Knowledge Management
Applying  Corporate  Knowledge  ManagementApplying  Corporate  Knowledge  Management
Applying Corporate Knowledge ManagementTri Aji Nugroho
 
Knowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl DitzlerKnowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl DitzlerCarl Ditzler
 

Was ist angesagt? (13)

DeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain CollegeDeMarle-MFAEmergent Media at Champlain College
DeMarle-MFAEmergent Media at Champlain College
 
6. CMC
6. CMC6. CMC
6. CMC
 
Info design presentation-3
Info design presentation-3Info design presentation-3
Info design presentation-3
 
Info design presentation2
Info design presentation2Info design presentation2
Info design presentation2
 
Info design presentation[1]
Info design presentation[1]Info design presentation[1]
Info design presentation[1]
 
Social networks
Social networksSocial networks
Social networks
 
Engagement, Flow, Presence
Engagement, Flow, PresenceEngagement, Flow, Presence
Engagement, Flow, Presence
 
Applying Corporate Knowledge Management
Applying  Corporate  Knowledge  ManagementApplying  Corporate  Knowledge  Management
Applying Corporate Knowledge Management
 
Collective intel
Collective intelCollective intel
Collective intel
 
Knowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl DitzlerKnowledge Management Applied to SARS - Carl Ditzler
Knowledge Management Applied to SARS - Carl Ditzler
 
Center4 Plain Language 6 2011 Handout
Center4 Plain Language 6 2011 HandoutCenter4 Plain Language 6 2011 Handout
Center4 Plain Language 6 2011 Handout
 
Educ6751(1)
Educ6751(1)Educ6751(1)
Educ6751(1)
 
Knowledge Agenda
Knowledge Agenda Knowledge Agenda
Knowledge Agenda
 

Andere mochten auch

Trust workshop
Trust workshopTrust workshop
Trust workshopSónia
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3Sónia
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1Sónia
 
Helping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsHelping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsThe Research Thing
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2Sónia
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3Sónia
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4Sónia
 
Literature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceLiterature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceClare Hooper
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5Sónia
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsSónia
 
Technology, Trust, & Transparency
Technology, Trust, & TransparencyTechnology, Trust, & Transparency
Technology, Trust, & TransparencyGeek Girls
 
Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Sónia
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7Sónia
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4Sónia
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Sónia
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6Sónia
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Finaljhustad1
 
Workshop 1
Workshop 1Workshop 1
Workshop 1Sónia
 

Andere mochten auch (20)

Trust workshop
Trust workshopTrust workshop
Trust workshop
 
Ifi7174 lesson3
Ifi7174 lesson3Ifi7174 lesson3
Ifi7174 lesson3
 
Ifi7174 lesson1
Ifi7174 lesson1Ifi7174 lesson1
Ifi7174 lesson1
 
Helping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviewsHelping users in assessing the trustworthiness of user-generated reviews
Helping users in assessing the trustworthiness of user-generated reviews
 
Ifi7174 lesson2
Ifi7174 lesson2Ifi7174 lesson2
Ifi7174 lesson2
 
Nettets genkomst?
Nettets genkomst?Nettets genkomst?
Nettets genkomst?
 
Ifi7184 lesson3
Ifi7184 lesson3Ifi7184 lesson3
Ifi7184 lesson3
 
Lesson 17
Lesson 17Lesson 17
Lesson 17
 
Ifi7184 lesson4
Ifi7184 lesson4Ifi7184 lesson4
Ifi7184 lesson4
 
Literature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer ScienceLiterature, Law and Learning: Excursions from Computer Science
Literature, Law and Learning: Excursions from Computer Science
 
Ifi7184 lesson5
Ifi7184 lesson5Ifi7184 lesson5
Ifi7184 lesson5
 
A key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactionsA key contribution for leveraging trustful interactions
A key contribution for leveraging trustful interactions
 
Technology, Trust, & Transparency
Technology, Trust, & TransparencyTechnology, Trust, & Transparency
Technology, Trust, & Transparency
 
Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective Trust from a Human Computer Interaction perspective
Trust from a Human Computer Interaction perspective
 
Ifi7184 lesson7
Ifi7184 lesson7Ifi7184 lesson7
Ifi7184 lesson7
 
Ifi7174 lesson4
Ifi7174 lesson4Ifi7174 lesson4
Ifi7174 lesson4
 
Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2Developing Interactive systems - lesson 2
Developing Interactive systems - lesson 2
 
Ifi7184 lesson6
Ifi7184 lesson6Ifi7184 lesson6
Ifi7184 lesson6
 
Technology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point FinalTechnology Trust 08 24 09 Power Point Final
Technology Trust 08 24 09 Power Point Final
 
Workshop 1
Workshop 1Workshop 1
Workshop 1
 

Ähnlich wie My ph.d Defence

Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1Salvatore Iaconesi
 
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...Jan Groenefeld
 
Essay On Computer.pdf
Essay On Computer.pdfEssay On Computer.pdf
Essay On Computer.pdfNikki Wheeler
 
Technology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX AustraliaTechnology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX AustraliaRachel Hinman
 
Mp copenhagen 2012
Mp copenhagen 2012Mp copenhagen 2012
Mp copenhagen 2012mpuech
 
Introduction to HCI (UCC)
Introduction to HCI (UCC)Introduction to HCI (UCC)
Introduction to HCI (UCC)apppsych
 
Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09adrian chan
 
KCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective IntelligenceKCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective IntelligenceAxel Bruns
 
Thesis hamouda hoda
Thesis hamouda hodaThesis hamouda hoda
Thesis hamouda hodaHoda Hamouda
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity Johannes Meier
 
Cybernetic Serendipity, reloaded
Cybernetic Serendipity, reloadedCybernetic Serendipity, reloaded
Cybernetic Serendipity, reloadedChen Dominique
 
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, ConnectedDachis Group
 
Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0is20090
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI Deskala
 
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging TechnologiesCLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging TechnologiesCLICKNL
 
Scenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshareScenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshareZhan Li
 

Ähnlich wie My ph.d Defence (20)

Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
Master of Exhibit Design at La Sapienza University, Introduction and Lesson 1
 
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
TestingTime - Guest Article - let’s save the world—democracy, inclusion and s...
 
Essay On Computer.pdf
Essay On Computer.pdfEssay On Computer.pdf
Essay On Computer.pdf
 
Technology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX AustraliaTechnology as a Cultural Practice - UX Australia
Technology as a Cultural Practice - UX Australia
 
Mp copenhagen 2012
Mp copenhagen 2012Mp copenhagen 2012
Mp copenhagen 2012
 
Introduction to HCI (UCC)
Introduction to HCI (UCC)Introduction to HCI (UCC)
Introduction to HCI (UCC)
 
Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09Adrian Chan, SNCR Newcomm09
Adrian Chan, SNCR Newcomm09
 
buy tesco hudl
buy tesco hudlbuy tesco hudl
buy tesco hudl
 
KCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective IntelligenceKCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
KCB201 Week 12 Lecture: Knowledge Structures and Collective Intelligence
 
Thesis hamouda hoda
Thesis hamouda hodaThesis hamouda hoda
Thesis hamouda hoda
 
Jan-Wessel Hovingh
Jan-Wessel HovinghJan-Wessel Hovingh
Jan-Wessel Hovingh
 
Seven types of ambiguity
Seven types of ambiguity Seven types of ambiguity
Seven types of ambiguity
 
Cybernetic Serendipity, reloaded
Cybernetic Serendipity, reloadedCybernetic Serendipity, reloaded
Cybernetic Serendipity, reloaded
 
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
2011 SBS Sydney | Martin Stewart-Weeks, The Resilient State: Smarter, Connected
 
Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0Economic, Social & Political Impact of Web 2.0
Economic, Social & Political Impact of Web 2.0
 
Introduction to HCI
Introduction to HCI Introduction to HCI
Introduction to HCI
 
Introduction To HCI
Introduction To HCIIntroduction To HCI
Introduction To HCI
 
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging TechnologiesCLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
CLICKNL DRIVE 2018 | 24 OCT | Designing with Future Emerging Technologies
 
P2 Lecture 2
P2 Lecture 2P2 Lecture 2
P2 Lecture 2
 
Scenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshareScenario planning and transmedia storytelling ocad july 31 slideshare
Scenario planning and transmedia storytelling ocad july 31 slideshare
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Kürzlich hochgeladen (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

My ph.d Defence

  • 1. Trust within Technology Risk, Existential Trust, and Reflective Designs in Human- Computer Interaction Mads Bødker Ph.d defence, IT-University of Copenhagen November 1. 2007
  • 2. Outline • Conceptual work on the concept of trust - from trust in to trust within (existential trust) • “Backdrop”: the risk-society and the pervasiveness/ubiquity of computers • Ties these concepts to HCI as a discipline that not only enables faster and more efficient interaction with machines, but also (increasingly) makes the world available to us • HCI increasingly defines the ways in which we encounter the world and the ways in which we think about our relations to technology • HCI can and should supplement its focus on the design of efficiency and transparency with a focus on designing for openness, engagement, and interpretation (Reflective HCI)
  • 3. Contribution: making a different perspective on the concepts of trust and trusting in relation to technology possible • Opening a new door towards an increased sensitivity to links between design and trust • Partial, tentative conclusions and results... • Not the final word on the matter, nor a complete theoretical rework of trust and trusting, but an attempt to create new figurations of trust, enabling new possible ways to talk about trust and trusting in HCI
  • 4. Introduction • Big issues in HCI? • Critical HCI: how to reappraise some central assumptions in HCI: transparency, efficiency, experience, users, meaning etc. • Asserting the importance of HCI • The cultural meaning of “the risky computer” • The technological sublime of a world pervaded with computer technologies: we are not spectators to an amazing world of technologies, we are intimately involved in it • elusiveness, the invisible • ineffable space, the unspeakable
  • 5. Risk society/culture • Risk society thesis applied on a world where computers are increasingly everywhere • Matters-of-fact / Matters-of-concern • Computers and computer networks are implied in more and more aspects of our daily activities • Risk not as a problem of the social (hierarchical, rule-bound, Gesällschafft) but a perspective within culture (vertical, symbolic value-based, Gemeinschafft): Risk Culture (Lash) • Reflective actors, knowledgeable agency - cognitive reflexivity • Aesthetic reflexivity: Signifiers of technological risk (ranging from the annoying to the cataclysmic) abound...
  • 6.
  • 7.
  • 8.
  • 9. Technological culture: Technologies, to be effective, must withdraw from revealing themselves - they must take the form of obviousness. • Modernist ideal of control - by having technology disappear into the fabric of the everyday, we gain an increased control of our world • Disappearence as domestication • Technological risks contradict the “instrumental fidelity” of modernist assumptions about technology
  • 10. Engagements in Risk • How do we approach trust when we cannot rely solely on an unproblematic consumption of institutionally sanctioned security and expertise? • Attempts: democratization of risk assessment (in various forms by e.g. Wynne, Sclove, Fischer, Beck etc.) • Inspired by Habermasian discourse ethics • Finding a communal basis for “reason” and for decisions • Consensus conferences, Lay/Participatory Technology Assessment (PTA)
  • 11. Democratizing risk engagement does not necessarily confront the kinds of “excess” or cultural risk tropes (narratives, stories, images, sounds) • It does engage with well-representable sources of risk - “we, the lay public, are concerned over an increasing amount of surveillance carried out in the work place, at home, on the move etc...” • People such as Wynne and Fischer have problematized the way “Lay Perspectives” are moderated, tamed by being ultimately grounded by scientific rationality - decisions are made more with respect to expert arguments than to the biased “reason” by an anxious, distrusting public
  • 12. Another way to understand risks: The problem of agency and identity risk: Brian Wynne, Timothy Melley, Mary Douglas • Identity risks: rather than provable threats, risks can also be seen in the ways that the risk “subject” is performed, the way the subject is allowed to voice and utter concern and anxiety • “Agency panic”, the technological sublime • Risk as the pollution of categories (where does the technological end, where does the human begin...) - “matter out of place” • People’s stories, mass-mediated or popular depictions of risk in computers are not carriers of affective/aesthetic biases, but ways in which to make sense of an ineffable computer pervaded everyday... • How to engage in these forms of risk and distrust?
  • 13. HCI and trust • Not a mainstream concept in HCI • It has been proposed (e.g. Shneiderman, Friedman et al) that in order to foster a trusting relationship between humans and their technologies, we need to make them “open for inspection”, allowing users to supervise and oversee that technologies and the institutions that support them function correctly and consistently • Or, design technologies to be domesticated, to become tacit infrastructures
  • 14. The notion of trust that is traditionally applied within HCI (and also CMC) is what we could call a human-social/relational prototypical form of trust • How can we trust in e-commerce sites, what cues do we need? • How can we trust the integrity of our technologies? • How can we trust that our computers perform correctly? • ...etc. • Security design within HCI proposes: design interfaces to maximize prudent user behaviour, design for inspection that still allows for optimal efficiency • Key question: How do we design interfaces that allow us to trust in computers?
  • 15. Mimics the directional trust that we all know in some form or another from our daily undertakings • Works from a prototypical form of trust that argues that trust is a relation between two or more actors who have some form of bounded agency to act in a relatively unpredictable way (i.e. the other can potentially act inconsistently or in ways that are destructive to our goals) • That trust has a behavioral correlate - a causal relation between use and trust: “if a user is using, he or she is also trusting”
  • 16. I argue that trust in HCI (in the broadest sense) can be about more than a unidirectional relation that begins with the human and is directed towards the technology. The ways in which we design our computer technological environments can also be seen to potentially influence our experience of ourselves • HCI’s relevance can be grounded in certain cultural experience • How are users (people) supposed to relate to technology, how are they supposed to understand themselves and their activities as actors in a technological world? • Key question: How can HCI perhaps begin to adress the kinds of aesthetic, “excessive” forms of risk? How can the design of interactions provide people with the feeling that their own voices, their own concerns are made possible?
  • 17. Existential Trust • Such a dialogue with computer pervaded environments, so I argue, potentially makes possible another kind of trust: • Existential trust, trust as an epistemological category - a certain aspect on knowing • The trust we have in our own ability to know the world • Self-trust: how to trust our own ways of making meaning, our own sense making, if scientific explanations and rationalities will often dominate or disregard “subjective” modes of interpretation • Trust within technology
  • 18. Reflective HCI/design • Critical Technical Practice: question the fundamental assumptions about the nature of interaction btw. people and technology and the role of designers in mediating that interaction. • Interactions that invite reflection on the attitudes that underpin our ideas of technology and humanity • The interface and interaction as interesting sites of cultural expression and dialogue around social and cultural issues • For example: How can technologies begin to “appreciate” users interpretations of risk and the rich imaginaries that have grown up around them rather than discount them as flawed forms of reasoning? • Engagement with the aesthetic, excessive aspects of risk culture, not the designing out of risks
  • 19. HALT Fig. 1: Ghost graphics on PDA, image by DELCA project, IT-University of Copenhagen DELCA, IT-University 2005 In the following I will not be concerned with the dynamic ecology of the project, but primarily on the narrative construction of the system and one of the ghost DELCA’s in particular. Many of the ghosts in the DELCA project were “type cast” for the project including the Butler, a conventional if somewhat arrogant way-finding assistant, Physical Joe, a grumpy “sarge” of a workout ghost that urged people to use the stairs rather than the escalators, or Printer Jan who could be
  • 20. The relation to existential forms of trust, self-trust, and the ability to “dwell” in a world where computer technologies permeate most aspects of our lives • Possibility of voicing concerns over technology in subjective/aesthetic registers • Reflective interactions that encourage/demand participation in a dialogue around designs, - they are open to interpretation and differing perspectives, subverting traditional hierarchies of user and designer/ expert • Designs that focus attention on the effects and implications of technology • Interactions that take cultural concerns seriously and allow for “inspection” of these
  • 21. An attempt to foresee and develop some conceptual insight into the moralizing and performative aspects of technology • A material ethics? Achterhuis argues that we should consider these aspects, even design for them sensibly • What Reflective HCI could potentially contribute with to such a material ethics, is the design of interactions that enable a disclosure of these efforts to perform users in specific ways • Enabling users to hold technologies accountable for the ways in which technologies narrate them...
  • 22. ...?