Auster: A service designed for an increasingly connected world

75
A service designed on the context of a surveillance society in an increasingly connected world Dorien Koelemeijer August 2015 Thesis Project – Interaction Design Master’s Programme K3, Malmö University, Sweden

description

The privacy and surveillance issues that are consequences of the Internet of Things are the motivation and grounding for this thesis project. The Internet of Things (IoT) is a scenario in which physical objects are able to communicate to each other and the environment, by transferring data over communication networks. The IoT allows technology to become smaller and more ubiquitous, and by being integrated in the environment around us, the world is becoming increasingly connected. Even though these developments will generally make our lives easier and more enjoyable, the Internet of Things also faces some challenges. One of these are the aforementioned privacy and surveillance issues that are the results of transferring sensitive data over communication networks. The aim of this thesis project is therefore to answer, both in a theoretical, as well as in a practical way, the following research question: How can the Internet of Things be more accessible and safe for the everyday user? Acc

Transcript of Auster: A service designed for an increasingly connected world

Page 1: Auster: A service designed for an increasingly connected world

A service designed on the context of a surveillance society in an increasingly connected world

Dorien Koelemeijer

August 2015

Thesis Project – Interaction Design Master’s Programme

K3, Malmö University, Sweden

Page 2: Auster: A service designed for an increasingly connected world

Date of Examination: 20th of August, 2015

Dorien Koelemeijer

Interaction Design (M. Sc.)

[email protected]

Supervisor:

Linda Hilf ling

Examiner:

Susan Kozel

Page 3: Auster: A service designed for an increasingly connected world

1

The privacy and surveillance issues that are consequences of the Internet of Things are the

motivation and grounding for this thesis project. The Internet of Things (IoT) is a scenario

in which physical objects are able to communicate to each other and the environment, by

transferring data over communication networks. The IoT allows technology to become smaller

and more ubiquitous, and by being integrated in the environment around us, the world is

becoming increasingly connected. Even though these developments will generally make our

lives easier and more enjoyable, the Internet of Things also faces some challenges. One of

these are the aforementioned privacy and surveillance issues that are the results of transferring

sensitive data over communication networks. The aim of this thesis project is therefore to

answer, both in a theoretical, as well as in a practical way, the following research question:

How can the Internet of Things be more accessible and safe for the everyday user?

Accordingly, the Auster online platform, the Auster app and the Data Obfuscation Kit were

developed to provide people with the tools and knowledge to construct home automation

projects themselves, as an alternative for using applications from governments and

corporations alike. The aim is to create a way to endow people with the capability to exploit

their talents, realise their visions and share this with a community joining forces. By enabling

people to create their own home automation projects, personal data is kept in the user’s

possession and the collection of data by governments and companies alike is prevented.

Moreover, by giving the control over technology back to the user, creativity and innovation in

the field of the Internet of Things in domestic environments are expected to increase.

Abstract

Page 4: Auster: A service designed for an increasingly connected world

2

Acknowledgements

Over the course of this thesis project I have received support and encouragement from a number

of people. First of all, I would like to thank my supervisor Linda Hilfling for her assistance

and guidance throughout the process of writing this thesis. I also wish to express my gratitude

to my dear friend Nadine Kuipers for her loyalty and proofreading of my draft. In addition, I

want to thank Kim Antonissen, Emma Raben and Franziska Tachtler for sharing their vision and

opinions on the design related aspects of this thesis project and for lifting my spirits when I was

in need of it. Lastly, I would like to thank my parents and sister for always supporting me.

Page 5: Auster: A service designed for an increasingly connected world

3

1. Introduction2. Background 2.1 From a network of computers to a connected world 2.2 Architecture of the Internet of Things 2.3 Inf luence of the Internet of Things 2.4 A user’s inf luence on the Internet of Things3. Problem domain and grounding 3.1 Privacy and security issues 3.2 Breadth and scope4. Conceptual discovery 4.1 Sousveillance 4.2 Becoming fog 4.3 Hacktivism and hacking 4.4 Do-It-Yourself5. Related work 5.1 Home automation products and services 5.2 Data sousveillance 5.3 Online (DiY) platforms6. Role of the interaction designer7. Research methods 7.1 Research Through Design 7.2 Design process8. Auster 8.1 The concept 8.2 The Auster platform 8.3 The Data Obfuscation Kit 8.4 The Auster app9. Use cases 9.1 Andreas 9.2 Emma10. Discussion and conclusion 10.1 Discussion 10.2 ConclusionReferencesImage creditsAppendices Structure of the Auster platform Analysis of the hardware base of the Data Obfuscation Kit

47789

101111161717171819202022242526262632323435394141475151555662636371

Table of contents

Page 6: Auster: A service designed for an increasingly connected world

4

At the moment I’m writing, there are no technical restraints to keep humans from turning

science fiction into reality. Inventions that once seemed to come from another world -

described and presented in so many sci-fi books, films and series - progressively start to look

like our own. Last year the company Arx Pax has developed a fully functioning prototype,

called the Hendo Hoverboard (Pax, 2014-2015), inspired by the fictional levitating device

used by Marty McFly in the film Back to the Future II (Zemeckis, 1989). Even though new

technologies are used to create a range of products and services, most of these products are

generally becoming smaller and more ubiquitous, making the world around us progressively

connected. The emerging Internet of Things (henceforth IoT) will have a big inf luence on this

development. The IoT is a network of physical objects and systems, embedded with electronics,

software, sensors and connectivity. These connected devices and systems interact with each

other and the environment, by transferring big amounts of data over communication networks

(Wong & Kim, 2014). Mark Weiser already predicted this development of technology in 1991:

“The most profound technologies are those that disappear. They weave themselves

into the fabric of everyday life until they are indistinguishable from it. My colleagues and I

at PARC think that the idea of a ‘personal’ computer itself is misplaced, and that the vision

of laptop machines, dynabooks and ‘knowledge navigators’ is only a transitional step toward

achieving the real potential of information technology. Such machines cannot truly make

computing an integral, invisible part of the way people live their lives. Therefore we are trying

to conceive a new way of thinking about computers in the world, one that takes into account

the natural human environment and allows the computers themselves to vanish into the

background” (Weiser, 1991, p. 78).

The fact that technology has become ubiquitous is making our lives easier and often more

pleasant. There are, however, consequences of these rapidly evolving technologies, such as the

privacy and surveillance issues, that have also long been envisioned in the past. Ten years ago

Steven Spielberg directed Minority Report (Spielberg, 2002), based on a short story by Philip

K. Dick (Dick, 1998), showing a futuristic world in which the government is all-seeing and all-

knowing. The story is set in Washington D.C. in 2054, where no murder has been committed

for six years. This is due to the fact that the surveillance state uses behaviour prediction

technologies to prevent crimes before they happen. However, this technology predicts that

the Chief of the Department of Pre-Crime will become a future criminal. He f lees and is

forced to take measures in order to prevent a surveillance state that uses biometric data and

1. Introduction

Page 7: Auster: A service designed for an increasingly connected world

5

sophisticated computer networks to track its citizens. Current technology has developed so

fast, that this futuristic setting is no longer in the realm of science fiction, but has become

reality fourty years before it was anticipated. Nowadays, governments and corporations alike

are using technologies such as iris scanners, enormous databases and behaviour prediction

software that are incorporated into a cyber network, to track people’s lives, predict their

thoughts and control their behaviour by collecting personal data.1 The exploitation of this data

can lead to discrimination by insurers, employers and in the future it can even lead to genetic

spying. The Circle by Dave Eggers (Eggers, 2014), which could be described as a modern take

on George Orwell’s 1984 (Orwell, 1949), also hints at the dark side of pervasive surveillance,

and suggests that the pleasures of the consumer society will lead people to walk willingly into

their chains. The Circle, as described in the book, has taken over all the big Silicon Valley

tech companies, linking users’ personal emails, social media, banking and purchasing with

their universal operating system, resulting in one online identity and a new age of civility

and transparency. “A couple of quick mergers could make it so. Eggers’ novel reads more like

journalism and critique than like fiction. 1984 presents a disturbing vision of what might

eventually be; The Circle pretty much describes what already is, and where it’s surely headed”

(Cowlishaw, 2014, para. 3).

The fast development of technology, as well as the increasing ease of sourcing technological

parts, has contributed to the emerging popularity of the maker culture, which can be described

as a technology-based extension of the Do-It-Yourself (DiY) culture (Dougherty, 2012). The

increasing importance of the maker culture has prompted me to reconsider the role of the

interaction designer: where it was once the task of an interaction designer to create ideas,

products, and services for the future society, I believe it has transformed to understand the

context of these ideas and to create a fitting environment or platform for these to exist in.

This thesis project aims to propose a solution for the possible scenarios that are able to occur

in the context of the Internet of Things in a surveillance society. The transferring of data is

what IoT technologies rely on; however, it is also the core of the issues. The emerging Internet

of Things will cause an increase in connected devices, mostly sensors, which function by

1 Personal data concerns any information relating to an individual who is or can be identified by data or from the data in

conjunction with other information regarding his physical, physiological, mental, economic, cultural or social identity (Office of

the Data Protection Commissioner, 2015).

Page 8: Auster: A service designed for an increasingly connected world

6

receiving and transmitting data. “No one really understood how the Internet was going to

affect things, and the impact of the IoT will probably be more pervasive, rolling out over

time, but affecting us more immediately and in more profound ways” (Bradbury, 2015, A

Big Brother made of little things section, para. 3). One thing is for sure: data generation will

only increase and the conclusions that can be obtained from it will become more precise and

more intrusive. Edward Snowden has warned that unless we challenge the status quo, future

surveillance will be in the hands of countries, companies and criminals (Ingham, 2015).

The problems regarding surveillance and privacy, alongside the lack of involvement of the

everyday user in the development of new technology, which substantiates Snowden’s warning,

have made me realise that the power over IoT technologies should be with everyday users. I

think the transforming role of the interaction designer can provide possibilities to improve the

engagement of the everyday user with technology, such as the IoT. Therefore, the aim of this

thesis project is to answer and find a solution to the following research question: how can the

Internet of Things be more accessible and safe for the everyday user?

Page 9: Auster: A service designed for an increasingly connected world

7

2.1 From a network of computers to a connected world

The first version of what is known today as the Internet was created in the 1960s by a group of

idealists that saw opportunities in connecting computers to each other. As a result ARPANET,

the first computer network, was developed to connect four major computers (Salus, 1995). The

Internet has evolved greatly after this, by becoming ubiquitous, faster and more accessible to the

general public (Pletikosa Cvijikj & Michahelles, 2011). Instead of only connecting computers to

each other, and allowing humans to interact with them, the newest development of the Internet

has established a network connecting digital information to real world physical items.

The exchange of information between systems or devices, by automatically transferring

data over communication networks (wired or wireless) without any manual input is the main

purpose of this integrated version of the Internet, called the Internet of Things (Wong & Kim,

2014) (Borgohain, Kumar, & Sanyal, 2015). The IoT provides the embedding of physical reality

into the Internet, and information into the physical reality. Physical objects are connected by

using sensors, computer chips, actuators, and other smart technologies to other computing

devices, such as cloud servers, computers, laptops and smartphones (daCosta, 2013). By

seamlessly integrating these physical objects into the information network, the IoT allows not

only person-to-object communication, but also object-to-object communication (Uckelmann,

Harrison, & Michahelles, 2011).

Moreover, the Internet of Things provides possibilities to exchange data not only between

devices but also between systems, enabling them to interact with each other, increasing their

efficiency, reliability and sustainability (Mukhopadhyay & Suryadevara, 2014). However,

multiple challenges still need to be addressed before the vision of IoT becomes a comfortable

reality: “The central issues are how to achieve full interoperability between interconnected

devices, and how to provide them with a high degree of smartness by enabling their adaptation

and autonomous behaviour, while guaranteeing trust, security, and privacy of the users and

their data” (Bandyopadhyay & Sen, 2011, p. 50).

2. Background

Page 10: Auster: A service designed for an increasingly connected world

8

2.2 Architecture of the Internet of Things

The IoT relies on devices or systems that share data with other devices or systems, by being

connected to communication networks. This process is achieved by an architecture consisting

of five layers, separating two different divisions with an Internet layer in between. The first

division contributes to data capturing, while the second division is responsible for data

utilisation and the distribution of applications (fig. 1).

The first division includes an edge technology layer and an access gateway layer. The edge

technology layer is the hardware layer, consisting of sensor networks, embedded systems,

RFID tags and readers, providing identification and information storage, information

collection, information processing, communication, control and actuation. The edge

technology layer is the layer a user would generally hack into in order to, for instance, create

own home automation applications. The access gateway layer handles the first stage of data,

by taking care of message routing, publishing and subscribing.

The second division consists of the middleware layer and the application layer. The

middleware layer can be envisioned as a mediator between the edge layer and the applications

layer. Functions of this layer include managing the device and information, filtering and

collection of data, accessing control and retrieving information. In other words, this layer has

the function to make sense of the data that is sent from the edge layer to the application layer.

Fig. 1: The different layers of the architecture of the Internet of Things

Page 11: Auster: A service designed for an increasingly connected world

9

Personal data protection is most needed in the middleware layer, since this data could be

sensitive and permits user profiling by governments or corporations alike. The application

layer is responsible for distributing various applications to IoT users, in the different

application domains (Bandyopadhyay & Sen, 2011). This is the only layer users get in touch

with or have control over when buying IoT applications from companies.

2.3 Influence of the Internet of Things

The aim of the Internet of Things is to enable communication between different systems and

devices, along with streamlining the interaction between humans and the virtual environment

(Borgohain, Kumar, & Sanyal, 2015). The IoT creates the possibility to connect almost

anything to the Internet, from paperclips to airplanes. Therefore, this technology finds its

application in almost any field, which makes the domain enormous. IoT technology will

provide benefits in application domains such as the automotive industry, the connected home,

the telecommunications industry, the medical and healthcare industry, the retail, logistics

and supply chain management, and the transportation industry. Even though IoT technology

is applied differently in all these distinctive domains, devices are generally equipped with

RFID technology, advanced sensors and actuators. The main purpose of implementing IoT

technology is to improve sustainability, efficiency and comfort, and decrease energy use and

overproduction (Bandyopadhyay & Sen, 2011). The aim of the connected city for example, is

to make better use of public resources, aspiring to improve the services offered to citizens,

while reducing costs. By increasing transparency, IoT technology in cities will improve

the management and maintenance of public areas, protection of cultural heritage, garbage

collection and the constitution of hospitals and schools (Zanella, Bui, Castellani, Vengelista,

& Zorzi, 2014). The healthcare application domain requires additional transparency on a

patient’s vital signs and body functions, such as glucose-level readings, blood-pressure

monitoring, abnormal heart activity and body temperature. These measurings are conducted

by body sensors and the derived information is shared with physicians and doctors, to prevent

the patient from, among other things, unnecessary check-ups and provides possibilities for

doctors to detect diseases in an early stadium (Kellmereit & Obodovski, 2013) (Turcu, Turcu &

Tiliute, 2012). The examples above already indicate that IoT applications rely on transparency,

deducible from the data generated by connected devices (Bandyopadhyay & Sen, 2011). In the

cases of connected cities and the healthcare industry, users do not have much inf luence on the

way IoT technology is applied. There is however an application domain in which the private

user has more authority: the domestic setting or the so-called connected home.

Page 12: Auster: A service designed for an increasingly connected world

10

2.4 A user’s influence on the Internet of Things

Connected devices at home enable actions such as the measuring of the productivity of home

tasks, and the tracking of people’s mood and vital signs. These actions rely on the decoding

of data that is generated by the use of unobtrusive body sensors and other connected devices.

The aim of the connected home is to adapt itself to the people living in it. Unobtrusive

body sensors improve the automatic communication with the home system, allowing better

control of temperature, light, smart appliances and security (Kellmereit & Obodovski,

2013). Moreover, users have the exciting opportunity to automate their home and control

different applications with a smartphone, or let things in the house respond and probe action

depending on various inputs and outputs (Miller, 2015). John Elliott makes the following

predictions about home appliances that are improving the standard of living by collecting the

user’s personal data: “All major appliances are going to be connected, and the value of the

information from major appliances will be worth a lot for those appliance manufacturers. Not

only will they discover usage patterns, but also ways to better manage marketing and supply

chain around parts replacement by staying connected with their installed base.” He continues:

“Even though the primary use case in the example I gave is an opportunity to syndicate data

externally to appliance manufacturers, there will be an interest in this data in the long haul by

other parties. Some of the new entrants, like Google, have a very different view on the value

of data, and as they wake up to this opportunity you may see them investing more heavily and

creating a sort of platform for home appliance data” (As cited in Kellmereit & Obodovski,

2013, p. 137). The data that can be obtained from IoT technology in the connected home is not

more sensitive or important than in the other application domains. However, people have the

power and authority in their own home to decide which products and services they want to

have installed, and how these are used. Accordingly, the focus of this thesis project will be on

the protection of personal data and the possibilities of IoT technology in the connected home.

Page 13: Auster: A service designed for an increasingly connected world

11

3. Problem domain and grounding

Along with the potential benefits offered, the adoption of the Internet of Things also raises

some concerns. The explosion of sensors, devices and other technologies connected to the

Internet naturally result in an increase of data generation and data exchange. “With the

development of the IoT, it appears that the physical world is transforming into an information

system itself, where data is being communicated between different devices, thus enabling

them to sense and decipher the continuous f low of data” (Skaržauskienė & Kalinauskas, 2012,

p. 109). IoT applications generally rely on the analysis of personal data in order for them to

function properly, which can provoke privacy and surveillance issues. Moreover, the scope and

consequences of the enormous increase of connected devices should not be underestimated.

3.1 Privacy and security issues

The IoT relies on the automatic exchange of vast amounts of data, communicated between

systems or devices by automatically transferring data over communication networks

(Borgohain, Kumar, & Sanyal, 2015). All this data needs to be processed in order for the

devices to respond correctly to each other, and to the environment they are in. Although

the decoding of the enormous amounts of data is a problem, the bigger issue concerns the

information that can be extracted from this data and who can obtain it. Especially the collection

and analysis of real-time data in IoT applications may challenge the privacy of the user. The

data retrieved at distinct times allows governments, providers or third parties to come into the

possession of extra knowledge by cross-examining the data within a specific timeframe (Wong

& Kim, 2014). In the sections underneath I will introduce the concept and implications of data

surveillance, and express which aspects of data surveillance are of current concern.

3.1.1 Data surveillance

The notion of a ‘surveillance society’ where every aspect of people’s private life is monitored

and recorded, still seems like an abstract and paranoid phenomenon to many people; the

danger and impact of an increase in surveillance by governments and private sectors is often

not acknowledged. One of the reasons that the dangers of surveillance are generally not

recognised is because many people think they are only surveilled by cameras. However, a

new type of surveillance, data surveillance, is becoming more common and powerful. Even

though data surveillance is less visible than video surveillance, it is presumably more intrusive

(Stanley & Steinhardt, 2003).

Page 14: Auster: A service designed for an increasingly connected world

12

Data surveillance encompasses the observing of people’s online behaviours, and makes tracking

and profiling through the exploitation of personal data even more dominant. Edward Snowden

revealed that all online actions, such as researching topics of interest, writing personal emails,

debating political issues, seeking support for intimate problems and many other purposes that

can result in the assembly of private information, are being recorded (Snowden, 2013). Even

leisure activities, such as being on Facebook, Twitter and Instagram, which are intended to

entertain and relax, simultaneously trick people into generating vast amounts of data. Although

a specific piece of data about a person is harmless, when enough pieces of similar data are

assembled it can result in a detailed and intrusive picture of an individual’s life and habits, and

it can almost give the data collector a look into a person’s mind.

3.1.2 Implications

Data has been collected in databases for over a century, but is no longer only in the possession

of accountants, analysts and scientists: “New technologies have made it possible for a wide

range of people – including humanities and social science academics, marketers, governmental

organisations, educational institutions, and motivated individuals – to produce, share,

interact with and organise data. Massive data sets that were once obscure and distinct are

being aggregated and made easily accessible” (Boyd & Crawford, 2011, p. 2). This means

that not only the government will have access to personal data, but also insurance companies

and future employers (Stanley & Steinhardt, 2003). Issues of financial as well as social

discrimination could arise.2 The conclusions derived from personal data collection are based

on propensities, which may result in the making of decisions on the basis of assumptions

(Mayer-Schonberger & Cukier, 2013). This can lead to bad decision making by organisations,

resulting in service denial. Service denial is known to occur in numerous contexts including

government licensing, financial services, transport, and even health. There is a chance the

individual is not even aware of a decision, or about the basis on which it was made (Mayer-

Schonberger & Cukier, 2013).

2 For instance, bank managers could restrict loans to residents of certain areas in a city. In addition, a future employer might not

hire a person based on information about their sexual or political preferences, retrieved by looking at their online behaviour and

data. Or if an individual’s data indicates that they are not having a healthy lifestyle or, conversely, are participating in extreme

sports, insurance costs might be increased.

Page 15: Auster: A service designed for an increasingly connected world

13

Another issue is the distributing of anonymous information. Even though the information

is anonymous, it is often fairly easy to de-anonymise it. “In October 2006, the movie rental

service Netf lix launched the ‘Netf lix prize.’ The company released 100 million rental records

from nearly half a million users – and offered a bounty of a million dollars to any team that

could improve its film recommendation system by at least ten percent. Personal identifiers had

been carefully removed from the data. And yet, a user was identified: a mother and a closeted

lesbian in America’s conservative Midwest” (Mayer-Schonberger & Cukier, 2013, p. 67).3 This

example illustrates how easy it is to de-anonymise so-called anonymous information. It also

points out how information that seems innocent, like film and TV preferences, can reveal

detailed information about a person.

3.1.3 Control society

The concept of data surveillance can be compared to Jeremy Bentham’s Panopticon, as

described by Michel Foucault: “The major effect of the Panopticon is to induce in the inmate a

state of conscious and permanent visibility that assures the automatic functioning of power. So

to arrange things that the surveillance is permanent in its effects, even if it discontinuous in its

action; that the perfection of power should tend to render its actual exercise unnecessary; that

this architectural apparatus should be a machine for creating and sustaining a power relation

independent of the person who exercises it; in short, that the inmates should be caught up in a

power situation of which they are themselves the bearers” (Foucault, 1977, p. 440).

The functionality of the Panopticon thrives on two aspects. One aspect encompasses the fact

that the surveilled person is visible, while the observer remains invisible. The other aspect

is a consequence of the first and concerns the asymmetrical nature of surveillance, which is

characteristic of an unbalanced power relationship. Both these aspects lead to an embodiment

of surveillance: there is no way of knowing whether someone is being observed or not, so

the observed person feels and acts as if always being surveilled. Foucault describes this

phenomenon as part of the disciplinary societies.

Gilles Deleuze introduces the notion that societies of control are replacing the disciplinary

societies. He writes the following: “‘control’ is the name Burroughs proposes as a term for the

3 Research has pointed out that it is possible to identify a Netflix customer 99 percent of the time, by comparing films watched on

Netflix with ratings on the Internet movie database (IMDb) website in a specific time frame (Mayer-Schonberger & Cukier, 2013).

Page 16: Auster: A service designed for an increasingly connected world

14

new monster, one that Foucault recognises as our immediate future. Virilio also is continually

analysing the ultra rapid forms of free-f loating control that replaced the old disciplines

operating in the time frame of a closed system” (Deleuze, 1992, p. 4). The essential difference

between the two systems is that in the case of control societies, surveillance is no longer bound

to a specific environment, such as factories, schools or prisons, but, as Deleuze describes, “the

corporation has replaced the factory, and the corporation is a spirit, a gas” (Deleuze, 1992, p.

4). The control society therefore increases the invisibility of surveillance and hereby expands

the embodiment of surveillance.

3.1.4 Surveillance in a world of connected things and beings

As Deleuze already implied, surveillance nowadays is everywhere, but rarely observed. The

emerging Internet of Things is tried to be made invisible by integrating it into buildings,

objects and bodies, allowing technology to be more interwoven in our lives than ever (Mann &

Niedzviecki, Cyborg: Digital Destiny and Human Possibility in the Age of the Wearable, 2001).

“The explosion of computers, cameras, sensors, wireless communication, GPS, biometrics, and

other technologies in just the last 10 years is feeding a surveillance monster that is growing

silently in our midst. Scarcely a month goes by in which we don’t read about some new high-tech

way to invade people’s privacy, from face recognition to implantable microchips, data-mining,

DNA chips, and even ‘brain wave fingerprinting.’ It seems as if there are no longer any technical

barriers to the Big Brother regime portrayed by George Orwell” (Stanley & Steinhardt, 2003, p. 1).

The Internet of Things (and technology in general) is developing at such a speed that adaption

of the legal system and the enactment of new laws and regulations have no time to take place.

To this day, it is undecided who will have the rights over the data generated by IoTs. Experts

announce that privacy is a big problem, but finding or developing the perfect concepts for absolute

data protection, privacy and security is probably not feasible (Witchalls & Chambers, 2013). The

impact of the IoT in the future will be huge and I therefore find the lack of solutions to solve the

aforementioned privacy and surveillance issues worrying.

3.1.5 Building on a worst case scenario

One of the reasons that user profiling, based on personal data, is built on propensities and

assumptions, is because it is not always possible to distract useful information from collected

data. As described earlier, one of the challenges of the Internet of Things is the decoding of

the big amounts of data.

Page 17: Auster: A service designed for an increasingly connected world

15

The data people generate is analysed by algorithms, on which a general profile of a person is

built.4 A whistle-blower at the Transmediale festival stated that it is absolutely impossible for

the NSA to handle the shear amount of data (Transmediale, 2015). It needs to be emphasised

that the cases above, introducing the privacy and surveillance issues, consist partly of worst case

scenarios. Boyd & Crawford stated that data sets that were once cryptic are being accumulated

and made easily accessible for governmental organisations, education institutions, and motivated

individuals. The consequences that can become results of the fact that not only governments have

access to personal data, but also insurance companies and future employers, will presumably not

affect most of the general public (Boyd & Crawford, 2011). Stanley and Steinhardt increase this

paranoia by explaining that new technology is invented to invade people’s privacy, in order to

feed a ‘surveillance monster’. There is no doubt that data collection and exploitation are used for

profiling, however, most of the scenarios described above are worst case scenarios that will not

affect a big percentage of people.

Nonetheless, I think the enforcement of paranoia (when for instance talking about a

‘surveillance monster’) is a concern, since it emphasises the embodiment of surveillance. The

people that are aware of what their personal data can provoke, might feel unsafe or spied upon

online, even if they are conscious of the probability of these consequences becoming a reality.

Conversely, there is a concern, as Smith points out, regarding people that are incautious or

uninformed when it comes to privacy and security issues. Moreover, unlike desktop and

mobile computing platforms where security has been an open concern for many years now,

embedded software is notoriously buggy, unaudited and potentially very dangerous (Smith,

Physical: Home, 2015). The uncertainty regarding the privacy laws of the emerging Internet of

Things is another concern. Until privacy laws have been set, companies have ownership and

control over their users’ personal data. Moreover, since IoT technology can collect information

on one’s physical functions and the use of devices at home, and more importantly the relation

between those, there is a possibility to derive a detailed impression of an individual’s life.

The aim of this thesis project is therefore to design on the context of a worst case scenario in

the unknown future of surveillance in a connected world. A slight notion of paranoia regarding

the surveillance society will be implemented in the execution, not with the aim to enforce the

embodiment of surveillance, but, on the contrary, to raise awareness and stimulate ref lection

on the implications of the IoT.

4 Data mining algorithms consist of a set of queries and calculations that create a data mining model from data. The algorithm

analyses the data, looking for specific patterns or trends. The results of this analysis define the optimal parameters for creating

the mining models. Subsequently, these parameters are applied across the entire data set to extract patterns and detailed statistics

(Microsoft, 2015).

Page 18: Auster: A service designed for an increasingly connected world

16

3.2 Breadth and scope

Comparing the traditional Internet to the emerging Internet of Things, the distinctions

are immediately apparent. The data networks of the traditional Internet have been over

provisioned: they are built with more capacity than is required for the amount of information

that is needed. This architecture of the Internet was developed before people had envisioned

to connect billions of devices to the Internet (daCosta, 2013). Now, a new era of ubiquity

is approaching, which will consist of billions of embedded electronic measuring devices

connected to the Internet, and where humans are becoming a minority as generators and

receivers of the information that is being communicated between these devices (Evans, 2011).

“Extending this thinking, simply scanning for hundreds of billions of IPv6 addresses would

take literally hundreds of years. It is one thing to put addresses on nearly a trillion devices,

but quite another to find and manage one device out of that constellation” (daCosta, 2013, p.

72). As the Internet of Things revolution advances, the challenges that are evident now will

only become more severe. Moreover, the incredible breadth and scope of new technology, and

the uncertainty of the consequences, will leave people feeling overwhelmed and unprepared.5

Accordingly, I find it crucial that people gather insight and control over ubiquitous technology,

in furtherance of stimulating IoT technology to be more accessible and closer to the user,

in contradiction to the current scenario where technology is dominated and controlled by

governments and private corporations.

5 Another concern is that the billions of embedded electronic devices and gadgets, that are a result of the unimaginable scope of the

IoT, are likely to be outdated in a couple of years. Outdated devices will constantly need to be replaced with new devices, resulting

in big amounts of electronic waste.

Page 19: Auster: A service designed for an increasingly connected world

17

4. Conceptual discovery

4.1 Sousveillance

If the surveillance and privacy issues that are consequences of the Internet of Things will

not be solved, a worst case scenario could be that the world will turn into an Orwellian

Panopticon, in which every thought or action is recorded. An act of dissidence against the

spying eyes of the surveilling government is ‘sousveillance’, a term first coined by Steve

Mann in 2002 (Mann, “Sousveillance” Inverse Surveillance in Multimedia Imaging, 2004).

Sousveillance can be described as a counteraction of surveillance and inherits its name from

the French words for sous which means below and veiler to watch. The name suggests that

surveillance is carried out by people in low places, rather than governments and the private

sector in high places (Mann, Nolan, & Wellman, Sousveillance: Inventing and Using Wearable

Computing Devices for Data Collection in Surveillance Environments, 2003). The concept

of sousveillance is to empower people to access and collect data about their observer, and by

doing so, neutralise surveillance. This method of contra surveillance leads to a distortion of

the Panopticon; the invisible is made visible, resulting in a decrease of asymmetry regarding

the power relationship. Sousveillance can also be used as a form of personal space protection,

which resonates with Gary Marx’s proposal to escape surveillance through non-consent and

interference techniques that block, distort, mask and refuse the collection of information

(Marx, 2009). Two examples that employ this method of sousveillance are described in the

chapter with related work (see Chapter 5.2).

4.2 Becoming fog

Sousveillance as a form of personal space and data protection can be achieved through data

obfuscation, by applying techniques such as blocking, distorting, masking or refusing the

collection of information by governments or data-mining companies. The consequence of

this method can be described as creating fog, which can be regarded as a vital response and

interference of the imperative of transparency, that control imposes: “Haze disrupts all the

typical coordinates of perception. It makes indiscernible what is visible and what is invisible,

what is information and what is an event. Fog makes revolt possible” (Tiqqun, 2010, p. 49).

A proposal to become ‘fog’ as an act of sousveillance, by creating opacity zones within the

realm of surveillance in the Internet of Things, is fruitful in the sense that it will not only

increase the feeling of safety, but will additionally stimulate creativity and experimentation.

A suggested method to create ‘fog’ in one’s home is to consider hacktivism or hacking as

Page 20: Auster: A service designed for an increasingly connected world

18

an act of sousveillance. In this case, Do-It-Yourself as a method of hacking and as an act of

sousveillance is an interesting direction, since it authorises people to regain control over the

data they generate, but it also empowers them to exploit their talents, realise their visions and

share this with a community joining forces.

4.3 Hacktivism and hacking

The term ‘hacking’ should not be confused with ‘cracking’. Eric Raymond, the author of

The Cathedral and the Bazaar (Raymond, 1999), explained this difference by making an

appropriate distinction between hackers, who build things, and crackers, who destroy things

(Von Busch & Palmas, 2006). The term ‘hacktivism’ was first coined in 1995 by Jason

Sack, and is a contraction of the words ‘hacking’ and ‘activism.’ Decentralising control

and empowering will are the main purposes of hacktivism, and are generally achieved by

“exploring the limits of what is possible, in a spirit of playful cleverness” (Stallman, 2002,

para. 8), or “the beating of a system through intellectual curiosity” (Von Busch & Palmas,

2006, p. 29). The exploration of these limits is done in different ways, depending on the goal

of the hack, but it mainly builds on the idea of customisation. However, hacking goes beyond

customisation. It instead focuses on the direct interventions in the functional systems and

operations of a machine or device, to make technology work the way one wants. This can be

achieved by using parts in unexpected ways, or making projects by building on those of others.

By this means, the domestic environment can be reclaimed and reshaped in the way the hacker

envisions it. The goal is not necessarily to create something unique, but rather to use parts in

unanticipated ways and to create cross-over techniques, in order not to be forced to adapt a

defined way of using technology. However, the reclaiming of authorship of a technology, by

encouraging transparency and unexpected practices, can also be a purpose of hacking (Von

Busch & Palmas, 2006). Arduino is a piece of hardware that has these particular qualities, and

additionally has the ability to serve as a possibility to hack into the edge technology layer,

described in the infrastructure of the Internet of Things.

The hacker ethos is based on collaboration and the sharing of information. Through hacking,

the purpose of a technology can be transformed and re-appropriated by building on existing

code, or a new commons can be shared for everyone to explore and augment. This ethic is

grounded in the Do-It-Yourself (DiY) culture, and evolved into the academic hacking subculture

with the introduction of computers. The software on the computers then was open source and

was shared amidst users and programmers. Academics discovered the potential of hacking

and reusing code to circumvent unwanted limitations. Hacking, therefore, can be regarded as

a “critical as well as a playful activity circling around a DiY approach to the means for our

Page 21: Auster: A service designed for an increasingly connected world

19

interaction with the world. A hack can be seen as a deeper intervention of customisation” (Von

Busch & Palmas, 2006, p. 30).

4.4 Do-It-Yourself

As the term Do-It-Yourself implies, it can be defined as an activity in which amateurs make

products or services for their own purposes, instead of buying these from professional retailers

that offer finished products. The activity of DiY validates the creative nature of people, and

provides feelings of ‘being their own boss’ (Hoftijzer, 2009).

Ever since the introduction of the first computers DiY has existed, but it was then considered

hacking as it involved the customisation of computers and software. DiY nowadays thrives

on giving people the opportunity to create personalised artefacts or to customise existing

applications to fulfil their visions. Leadbeater and Miller state that the customisation aspect

of DiY establishes “a form of everyday resistance to the alienating effects of contemporary

society, which is characterised by excessive consumerism, globalisation and economic

inequalities between persons and groups, alienating us from our environment and ourselves”

(as cited in Uckelmann et al., 2011, p. 38). Although these aspects are also important for DiY

practices regarding new technology at home, the main advantage is to give people back the

control over their own data and let them decide how to use it for context-awareness at any

time. Hacking as a DiY practice could provide opportunities to give people back their control,

following the five aspects of hacking from Anna Galloway:

- Access to a technology and knowledge about it (‘transparency’)

- Empowering users

- Decentralising control

- Creating beauty and exceeding limitations

- Using the intelligence of many for innovation, since the hacker ethic is based on

collaboration, sharing and the reuse of code (Galloway, 2004).

Page 22: Auster: A service designed for an increasingly connected world

20

5. Related work

In addition to the state of the art of the IoT (see Chapter 2), various examples of related work

are described in this chapter. Different home automation products and services, such as the Nest

Thermostat and Homey, along with an example of a self-made home automation project, are

explored. Additionally, the works AdNauseam and Jennifer Lyn Morone, Inc. were analysed and

described, in order to provide a better understanding of sousveillance as a method for personal

data protection. Furthermore, several online DiY platforms and websites with the focus on IoT

projects were examined to gain insight into the state of the art in this subfield, alongside the

functionality and design of these platforms.

5.1 Home automation products and services

5.1.1 Nest Thermostat

The Nest Thermostat (fig. 2) is a smart thermostat that is able to recognise patterns regarding

a user’s temperature preferences over time, and by this means aims to save energy in the

domestic environment. The Nest Thermostat is capable to detect when a user has left the home,

and, subsequently, adapts the temperature. Furthermore, the Nest app provides the user with

possibilities to control the thermostat with the use of a smart phone (Nest, 2014). The Nest

Thermostat is an example of a popular smart home product, and substantiates the advantages

of home automation in the fields of heat, light, presence and motion.

Fig. 2: The Nest Thermostat

Page 23: Auster: A service designed for an increasingly connected world

21

However, it is a product that relies heavily on the data generated by its users. As such, it

can be stated that the Nest Thermostat is a related work, as well as an example of a home

automation project linked to a data mining company (considering the fact that Google bought

the Nest Thermostat and Nest in early 2014). Sacha Segan states the following: “The Internet

of Things is at an early stage. A clear trend from CES 2014 was that over the next three years,

we’re going to try to connect everything to everything else. Phones are being reinvented as

“sensor hubs” that collect data, interpret and analyse it. There’s a land grab going on for the

best expertise and infrastructure in this new, growing field, and Google wants to have a strong

position early” (Segan, 2014, The “Internet of Things” is at an early stage section, para. 1).

5.1.2 Homey

Homey is a voice-controlled home automation system, enabling users to control many different

applications in the home; from lights to music, from temperature to TV. The service consists of

multiple wireless technologies enabling connections to wireless devices, and congregates these

on a single platform which connects to the Internet (Øredev, 2015). Homey is an interesting

example of a related work since it includes an interactive f low-editor, empowering the user to

‘program’ different parameters to respond to each other, without the use of code. By this means

it aims to increase the accessibility for the everyday user. However, the accessibility remains

limited considering the fact that the user is restricted to controlling the application layer of the

system. Homey offers another interesting approach to increase the accessibility and influence

of the everyday user by providing its own app store, in which apps of other users can be found.

By this means, it intends to increase collaboration and sharing between users in an original and

innovative way (Athom, 2014). Nevertheless, it remains unclear how safe these (self-made) apps

are, and to what extent personal data is protected.

5.1.3 DiY home automation

The following section describes a project of a home automation enthusiast and is chosen as

a related work, because it gives insight into the opportunities and capabilities of hacking

and constructing self-made home automation projects with the use of an Arduino. Moreover,

it indicates the possibility of replacing products and services that are usually distributed

by governments and data mining corporations with self-made projects, which decreases the

exposure of personal data to these aforementioned companies.

Page 24: Auster: A service designed for an increasingly connected world

22

“I made a quick web interface to turn stuff on and off from the Internet. I put the plug sockets on

loads of things in my house (fig. 3) - various lights, appliances (like my espresso machine), and I even

ripped one of them apart and connected it to my boiler so I can control my heating. It’s been a fun

project replicating the functionality of Internet of Things consumer products like the Belkin WeMO

system (£40 per socket) and the Nest Thermostat (around £200). I hack in new features when I have

time or get an idea - e.g. I’ve set the lights to come on just before sunset (a different time every day),

in the winter I have the heating come on automatically when I leave work so the house is warm and

my coffee machine is ready by the time I get back! I’ve also added in a few sensors, so I can turn off

the lights if there’s nobody in the room etc. It’s also handy when I’m away from home - I can turn off

the heating, and set the lights on random timers for security” (Smith, Physical: Home, 2015).

5.2 Data sousveillance

5.2.1 AdNauseam

Sousveillance can be used as a method to protect personal data, which resonates with Gary

Marx’s proposal to escape surveillance through non-consent and interference techniques that

block, distort, mask and refuse the collection of information (Marx, 2009) (see Chapter 4.1). A

related work and example of sousveillance that employs this method is the browser extension

AdNauseam (which only works when AdBlock is installed), which automatically and blindly

clicks all the ads on the websites users visit. Moreover, it registers a visit on the ad network’s

database. Since every single ad is clicked, user profiling, targeting and surveillance become

unprofitable. The purpose is not only to obfuscate browsing data and protect users from

surveillance, it also “amplifies the users’ discontent with advertising networks that disregard

privacy and facilitate bulk surveillance agendas” (Nissenbaum, Howe, & Mushon, 2014, para. 2).

Fig. 3: Hacked plug sockets (Smith, Andy Smith: Digital Media Portfolio, 2015)

Page 25: Auster: A service designed for an increasingly connected world

23

5.2.2 Jennifer Lyn Morone, Inc.

Another example is Jennifer Lyn Morone, Inc., which is an act of ‘extreme capitalism’, as she

describes it herself. “Jennifer Lyn Morone, Inc. has advanced into the inevitable next stage of

Capitalism by becoming an incorporated person. This model allows you to turn your health,

genetics, personality, capabilities, experience, potential, virtues and vices into profit” (Morone,

2014, Life Means Business section). The concept is to track one’s own data at all times by

recording online behaviour, mobile behaviour and offline behaviour with the use of an Arduino

and wearable sensors. “By mining, collecting and indexing as much data about oneself as

possible, you can gain valuable insights and intelligence specific to your operation” (Morone,

2014, Why Are We Building DOME? section). In Morone’s case sousveillance is applied to

protect personal data by collecting and keeping ownership over it. The reason behind the work

is not necessarily based on the implications of surveillance, but rather those of capitalism.

AdNauseam and Jennifer Lyn Morone, Inc. are interesting examples, considering the fact that

they highlight different tactics of sousveillance in the digital Panopticon, both relying on the

aspect of obfuscating personal data. AdNauseam obfuscates data through multiplication and

distortion, and by this means negates the reliability of the generated data. Conversely, Jennifer

Lyn Morone, Inc. employs sousveillance by containing and shielding the generated data in

furtherance of obfuscating it. The sousveillance tactic AdNauseam applies is suitable when

the purpose is to protect generated data from being used for profiling in order to prosecute

targeted advertisements, because, as described before, it does not only make the generated

data unprofitable, but it also emphasises the users’ discontent. Moreover, AdNauseam employs

a tactic that is well-chosen, as well as obvious: AdNauseam is granted with a straightforward

possibility to multiplicate and distort data, since there is the potentiality to automatically

click every ad on visited websites. The opportunity to practice multiplication and distortion

as a tactic for Jennifer Lyn Morone, Inc.’s example is less suitable, since there are no apparent

opportunities to generate big amounts of random data. Furthermore, the generated personal

data in this example is very sensitive, containing information about a user’s lifestyle, habits

and body functions. It is therefore advisable to completely shield the generated data in

furtherance of entirely protecting it. As such, it can be stated that different purposes of

sousveillance call for different tactics of data obfuscation, which the examples of AdNauseam

and Jennifer Lyn Morone, Inc., illustrate very well.

Page 26: Auster: A service designed for an increasingly connected world

24

5.3 Online (DiY) platforms

The different online DiY platforms that are elaborated in the following section are chosen

to shed light on various manners to support and motivate hacking and DiY in a range of

fields, along with providing information on the state of the art of (self-made) IoT projects.

Postscapes, for instance, is an online platform that tracks and gathers the most recent

developments of the IoT by displaying projects and devices, sorted in different categories

such as body, home, city and industry (Postscapes, 2015). Along with the clear and structured

manner of presenting the projects, Postscapes gives an excellent overview of the possibilities

and developments in the realm of the IoT. Instructables also offers an overview of IoT projects

and tutorials, supported by Intel, on one of the sections of the platform (Instructables, 2015).

Instructables was chosen as a related work due to the fact that the platform provides step-by-

step tutorials, created by the everyday user, for the everyday user, and by doing so supports

DiY in many different fields. However, the lack of structure in the uploading process, along

with the distracting design of the website, result in tutorials that are often chaotic and difficult

to follow. Kickstarter, just as Instructables, showcases projects in a range of categories.

The purpose of Kickstarter, however, is to provide users with a chance to pitch and get

their projects funded for further development, as opposed to providing tutorials on projects

(Kickstarter, 2015). Kickstarter, as a related work, provides insight into the uploading process

and methods of (crowdfunding) projects. In addition, the platform indicates the high level of

creativity and innovation of projects created by, among others, everyday users in the field of

IoT, alongside many other fields.

In furtherance of making DiY a successful practice, numerous platforms grant a place for

collaboration and community building, in different manners. Instructables, for instance,

supports collaboration by providing tutorials. Other platforms, such as Github and Stack

Overf low, encourage collaboration between users through the exchange of code. Github offers

a place for collaboration, code review and code management for open source and private

projects, by providing users with opportunities to share their projects with the necessary code

included (Github, 2015). Stack Overf low is another platform concentrated on code review and

code management. However, instead of sharing code in the form of projects, Stack Overf low

offers a question and answer based format for professional and amateur programmers to solve

programming problems through the exchange of code (Stack Overf low, 2015). Stack Overf low

and Github are related works that highlight the importance of collaboration, by pointing out

that amateur programmers are able to solve programming issues with the help of other (more

experienced) users, based on a question and answer method, and the sharing of code.

Page 27: Auster: A service designed for an increasingly connected world

25

6. Role of the interaction designer

In the introduction is described how there are no longer any technical restraints to create many

bizarre applications, presented in science fiction films and books. The increasingly popular

maker culture has the potential to enable people to turn these sci-fi inspired applications into a

reality. The chapter about the conceptual discovery pointed out that hacking as a DiY practice

(see Chapter 4.3 and 4.4) is a fruitful method to give control back to users and to help them

reclaim the domestic environment through the use of ‘transparent’ tools and customisation.

This empowers the user to construct numerous applications and prevents them from being

enforced to buy IoT applications from the government or corporations alike. The benefits of

hacking as a DiY practice, as part of the maker culture, emphasise the potentially shifting

role of the interaction designer: where it was once the task of an interaction designer to create

ideas, products, and services for the future society, it has transformed to ref lect and act on the

context of the development of new technology, and to create a fitting environment or platform

for this context. The role of the interaction designer in this case is to understand and design

for the context of the privacy and surveillance issues of the IoT and its implications, along

with the concerns regarding the user’s involvement. The proposed direction is to create a

platform which permits the everyday user to create ‘fog’ in their own home, by performing

an act of sousveillance. A place should be designed where people have “the right to privacy;

the right to be calm when they require it; the right to make autonomous decisions and control

their surrounding electronic environment and the right to be the master of their own identity in

machine systems” (as cited in Uckelmann et al., 2011, p. 30). This can be achieved by applying

hacking as a method: by providing the user with the right tools, inspiration and knowledge,

they are given the opportunity to construct and control their own home automation projects.

Accordingly, it permits the user to make a range of projects, from automatic pet feeders to

secure health trackers, but also projects inspired by their favourite sci-fi book or film, while at

the same time being assured that these are created in a publicly engaged and safe environment.

Page 28: Auster: A service designed for an increasingly connected world

26

7. Research methods

7.1 Research Through Design

Research Through Design (RtD) is “a research approach that employs methods and processes from

design practice as a legitimate method of inquiry”, and was the chosen approach for this project

(Zimmerman, Stolterman, & Forlizzi, 2010, p. 310). This RtD approach has been employed by

applying several different research methods throughout the design process, consisting of both de-

sign-based research, as well as other forms of research. Obrenović stated the following about de-

sign-based research: “While design itself adds discipline and professional attitude to tacit, implicit,

and intuitive knowledge and skills, design-based research may be viewed as an attempt to increase

awareness of such knowledge and to support, capture, generalize, and share this knowledge beyond

the design community” (Obrenović, 2011, p. 59). The different practiced research methods have

occurred in an iterative manner, which can be explained by the fact that “design problems are often

full of uncertainties about both the objectives and their priorities, which are likely to change as the

solution implications begin to emerge. Problem understanding evolves in parallel with the problem

solution, and many components of the design problem cannot be expected to emerge until some

attempt has been made at generating solutions” (Željko Obrenović, p. 57). The following section aims

to chronologically describe my design process in more detail, and introduces the different methods

implemented in each phase in order to give more insight into the decisions made during this process.

7.2 Design process

7.2.1 Field research: first round

Ethnographic research, as David R. Millen states, typically includes field work or field research.

The aim is, as described by Blomberg and her colleagues, “to provide designers with a richer

understanding of the work settings and context of use for the artefacts that they design” (as cited by

Millen, 2000, p. 280). The first round of field research concentrated on exploring and understanding

the context of the subject of this thesis project and was carried out by firstly attending the

Transmediale festival in Berlin, Germany (Transmediale, 2015). The topic of the Transmediale

festival was ‘Capture All’, fostering a critical understanding of how the development of technology

is influencing daily life, now and in the near future. Furthermore, I was present at different talks

concerning the Internet of Things at Media Evolution City in Malmö, Sweden (Media Evolution

City, 2015). Alongside the infrastructure of the Internet of Things, the main topics discussed at

these talks were the security and privacy concerns. The knowledge gained from this first round

of field research permitted me to establish a basic understanding of the state of the art of the

IoT, particularly regarding the concerns that are consequences of this emerging technological

Page 29: Auster: A service designed for an increasingly connected world

27

development. Both events spelled out that many of these concerns are related to the fact that the

infrastructure of the IoT (and frequently technology in general) is controlled by governments and

corporations alike. The consequences of the IoT were taken as a starting point and grounding for

this thesis, and it was determined that the solution would be focused on the decentralisation of

control, by enabling technology to be more accessible for the general public. At this stage the first

version of the research question was formulated, and the idea of creating an online DiY platform

and a construction kit was formed. However, the manner in which these would be developed and

framed were still undecided.

7.2.2 Literature-based research

Literature-based research as a method consists of reading through, analysing and sorting literatures

“in order to identify the essential attribute of materials. The conduction of literature-based

research consists of grasping sources of relevant researches and scientific developments and

understanding what predecessors in a specific field have achieved, alongside the progress made by

other researchers” (Lin, 2009, p. 179). Literature-based research has been conducted throughout

the design process, but has generally been employed to establish a better understanding of the

background and state of the art of the IoT, along with clarifying the problem domain. The chapters

about the background, and the problem domain and grounding are therefore largely dependent on

my interpretation of scientific articles and specialised literature in the form of digitised books.

After having researched the privacy and surveillance issues regarding the IoT in more depth,

along with the consequences of the lack of the user’s involvement, I was able to refine the research

question. The formulation of the research question was followed by the exploration of literature

focused on escaping surveillance and decentralising control as methods and onsets for possible

solutions, described in the conceptual discovery. Especially the description of Von Busch &

Palmas of hacking and hacking as a DiY practice (see Chapter 4.3), combined with the findings on

sousveillance (see Chapter 4.1), provided a grounding and a suitable framing for the project (Von

Busch & Palmas, 2006). In addition to the scientific and specialised literature, philosophic literature

was consulted to establish an extra layer of understanding and a different perspective on the topics

discussed in the conceptual discovery.

7.2.3 Analysis of related work

Alongside the literature-based research, part of the conceptual discovery consists of an analysis of

related works. Two critical design pieces, AdNauseam and Jennifer Lyn Morone, Inc., that focus

on sousveillance through data obfuscation, were analysed. Critical design, as Dunne and Raby

describe is “a form of design that questions the cultural, social and ethical implications of emerging

technologies” (Dunne and Raby, 2015, para. 27). The analysis of these two works have prompted

me to apply sousveillance as a method and a way of framing the concept of Auster, and provided

Page 30: Auster: A service designed for an increasingly connected world

28

inspiration for the overall idea.

Furthermore, several Do-It-Yourself platforms, and platforms which focus on the progression of the

IoT provided new insights and inspiration for the project. The platforms I reviewed were Postscapes,

Instructables, Adafruit, Kickstarter, Github and Stack Overflow. The review of these platforms

was conducted in the process of sketching the design and functionality of the online platform,

and resulted in an understanding of the strengths and weaknesses of each of the aforementioned

platforms. I realised that my concern with several platforms, such as Instructables, Kickstarter

and Github, is the lack of overview as a result of the many categories they try to cover. The main

inspiration for the design of the Auster platform was obtained by reviewing Kickstarter, whereas

Instructables has aided me in developing the functionality of the Auster platform. The exploration

of Github and Stack Overflow have contributed to developing aspects related to collaboration and

the sharing of code during the sketching and ideation phase of the online platform. In furtherance

of making informed decisions on the inclusion of tools in the Data Obfuscation Kit, inspiration

was obtained from analysing websites that offer construction kits, such as Arduino and Adafruit. In

addition, I studied tutorials on home automation projects to determine what the most used sensors

and actuators in this field are. Moreover, I have described and compared the different specifications

of the Arduino and Raspberry Pi in order to decide which hardware to adopt for the base of the

construction kit (see Appendix).

7.2.4 Field research: second round

The analysis of related work, and the sketching and ideation phase of the Auster platform and the

construction kit were followed up by another round of field research. An IoT conference at Ideon in

Lund, Sweden was attended, which strengthened my knowledge about hacking and the importance

of the user’s involvement regarding IoT at home (Ideon, 2015). When the audience at one of the talks

of this conference was asked if anyone had automated homes or IoT applications in their home, a fair

share of people raised their hands. When they were asked how many of them built and programmed

these themselves, all of them raised their hands. Needless to say, this is a biased audience, but it was

a validation of the chosen subject and confirmed the interest and feasibility of constructing home

automation projects. To validate the subject further, I attended a talk by Peter Sunde, best known for

being a co-founder and ex-spokesperson of The Pirate Bay, at STPLN in Malmö (STPLN, 2015). In his

presentation he sketched and discussed his view on the future, which turned out to be a dystopian one.

He expressed his concerns about a world in which the Internet is becoming more and more centralised,

and underlined the importance of online collaboration. Sunde’s views on online collaboration made

me, once more, realise the importance of the community and collaboration aspects of the Auster

platform. Moreover, during Sunde’s talk I got introduced to a microdonations service called Flattr,

which was later implemented in the feedback system of the Auster platform.

Page 31: Auster: A service designed for an increasingly connected world

29

In addition to attending different events, I carried out an in-depth interview with Andy Smith, who

has been building IoT home automation projects with the Arduino for a period of five years. Smith

has, among other things, studied web development, has a BA in Digital Media and now works as

a software developer. According to Mack, Woodsong, et al. “the in-depth interview is a technique

designed to elicit a vivid picture of the participant’s perspective on the research topic. During in-depth

interviews, the person being interviewed is considered the expert and the interviewer is considered

the student” (Mack, Woodsong, MacQueen, Guest, & Namey, 2005, p.29). The questions asked in the

interview gave insight into the possibilities of constructing home automation projects with the use of

an Arduino, and the benefits of connecting these to the Internet. Smith gave several examples of his

projects, along with describing the methods and technology used for constructing these. Furthermore,

I asked Smith about his opinion on the construction of self-made home automation projects as a

possible solution to the privacy and surveillance issues of the emerging IoT. In his answer he clarified

that the privacy and surveillance issues are a “massive issue” and will only become more prevalent

and dangerous. Moreover, he stated that self-made projects are a possibility to mitigate the risk by

applying methods of security through obscurity. After introducing Smith to the idea of an online DiY

platform consisting of tutorials in furtherance of sharing knowledge to a community, he indicated his

desire to share his projects and knowledge. However, he argued that most of the uploading processes

on platforms such as Instructables take too much time. This argument established an awareness of

the need for a well structured and easy uploading process. The interview with Smith was helpful,

since it did not only confirm the feasibility of the creation of home automation projects with the use

of Arduino, but his perspective on the privacy and surveillance issues of new technology, which he is

occasionally confronted with at his job, also became apparent (Smith, Physical: Home, 2015).

7.2.5 Prototyping: first round

After I had gained insight into the different conceptual approaches, the weaknesses and strengths

of several DiY platforms and the possibilities of self-made home automation projects, a first lo-fi

prototype of the Auster platform was created. Van Buskirk and Moroney explain that “a prototype

can be thought of as a representation or mock-up of a proposed solution to a design problem,

regardless of the medium. The typical use of prototypes is for usability evaluations conducted in

the design phase of a project” (Van Buskirk & Moroney, 2003, p. 613). The main objective of the

first prototyping round was to focus on the functionality of the platform, in order to make it suitable

for user testing. Therefore, the prototype was still ‘unpolished’ in furtherance of encouraging test

participants to provide feedback about the solution or artefact being evaluated (Van Buskirk &

Moroney, 2003). Alongside the prototype of the platform, a first proposition regarding the inclusion

of tools in the construction kit was made. However, no tangible prototype had yet been made at this

stage. Furthermore, a prototype of an automatic pet feeder was developed as an example of a home

Page 32: Auster: A service designed for an increasingly connected world

30

automation project. This prototype was uploaded as a tutorial on the Auster platform, in furtherance

of making it available for user testing.

7.2.6 User testing: first round

The first round of user testing was carried out to examine the feasibility of constructing home

automation projects. For this round of user testing two types of test participants were asked to

make the automatic pet feeder prototype on basis of the Auster platform prototype and the first

proposition of the Data Obfuscation Kit. One of the participants was a 23 year old girl, who worked

as a graphic designer, and had a bit of experience with using the Arduino. The other participant was

a 61 year old man, whose occupation was being a medical doctor. This participant had no experience

in using Arduino. Both participants were presented with the tutorial of the automatic pet feeder

on the Auster platform and were given an Arduino board and the necessary tools to construct this

particular project. The results extracted from this round of user testing were obtained by carefully

observing the participant, and by afterwards discussing the difficulties that became apparent during

the testing. The main findings of this round of user testing indicated that beginning users require a

basic understanding of the technological components, before constructing projects on basis of the

tutorials on the Auster platform. Additionally, the importance of collaboration and the community

aspect of the online platform became apparent, since with a bit of help, the test participant without

experience was able to successfully construct the project. The participant with a bit of experience

was found to be capable of following the tutorial on the platform without additional help.

7.2.7 Prototyping: second round

The first round of user testing was followed by a second round of prototyping. During this round

of prototyping, the functionality of the platform was improved, alongside enhancing the aspects

regarding community and collaboration, based on the findings of the user testing. However, the

main focus during this phase was to improve the design and aesthetics of the online platform.

Additionally, a tangible prototype of the Data Obfuscation Kit was created along with a guide

containing information and instructions on the functionality and the installation of the technological

components, on basis of the results obtained by the first round of user testing. In addition to the

prototypes of an online platform and a construction kit, a prototype for an app was created in

furtherance of connecting the home automation projects to the Internet. Two online services, Parse

and Temboo were used to connect Arduino projects to the Internet, and control these with the

use of a smart phone (Parse, 2015) (Temboo, 2015). The experiments and prototyping with Parse

and Temboo shed light on the advantages and disadvantages of both services, and enabled the

development of the idea and functionality of the app.

Page 33: Auster: A service designed for an increasingly connected world

31

7.2.8 User testing: second round

The second round of user testing applied attention to the navigation of the online platform, the

comprehensibility of the concept and the overall design. For this round of testing, I asked two

classmates of my bachelor’s studies in Crossmedia Design to participate. Both users were female

and in their mid-twenties, and had experience with developing and analysing design concepts and

aesthetics. The participants were presented with an advanced prototype of the Auster platform,

the Data Obfuscation Kit and the Auster app and IDE. The chosen approach was to let them take

their time to thoroughly read and examine the different aspects and objects, and to observe how the

participants navigated through the content. Afterwards there was a discussion in which the main

concerns of the participants were addressed. It became apparent that the online platform was easy to

navigate through, and the link with the Data Obfuscation Kit and Auster app appeared to be clear.

Moreover, the aesthetics of all the different aspects were found to be fitting to the purposes of each

of them, and formed a coherent unity. One of the main concerns consisted of a confusion regarding

the fact that the projects on the online platform concerned IoT in the realm of the home, as opposed

to IoT in general. Moreover, one of the participants suggested to introduce the Data Obfuscation Kit

on the homepage in furtherance of clarifying the concept. All findings were taken into account in

the final round of improvements, that followed immediately after the second round of user testing.

7.2.9 Use cases

Two use case scenarios have been written in order to concretise the project and guide the reader

through the different aspects of Auster. The term use case was introduced by Jacobson in the late

1980s and can be explained “as a method to describe the dialogue (interaction) between a system

and a (in this case imaginary) user as a sequence of steps” (as cited by Lauesen & Kuhail, 2012, p.

3). The use cases, described later in this thesis, emphasise different possible motivations for using

Auster, and give insight into the manners of using the various elements of Auster on the basis of

these motivations.

Page 34: Auster: A service designed for an increasingly connected world

32

8. Auster

8.1 The concept

The name Auster comes from Roman mythology, where Auster is one of the four Venti (wind

gods) and the embodiment of the Sirocco wind, bringing cloud covers and fog (Encyclopedia

Mythica Online, 2015). Auster is meant to provide users with an opportunity to create

metaphorical fog in their homes by performing an act of sousveillance. The proposed

method of sousveillance is one that protects personal space (Marx, 2009), by obfuscating

and obscuring personal data. The method Auster uses is similar to the example of Jennifer

Lyn Morone, Inc. (Morone, 2014), by implementing the practice of modern sousveillance

in the home through containing and shielding the generated data. This practice of modern

sousveillance is achieved by applying a method of hacking as a DiY practice, enabling users

to build home automation projects themselves. Auster provides people with the tools and

knowledge to construct these projects. Considering the fact that users are able to create their

own home automation projects, they are no longer obligated to use IoT applications from

governments or data-mining companies, and the ownership over personal data is kept with the

user. It empowers the user to build applications they desire or require in a safe environment,

resulting in an increase of creativity and innovation in the domain of IoT in the connected

home.

Accordingly, I have developed the Auster online platform, the Auster app and the Data

Obfuscation kit, all part of the BFI: Becoming Fog Initiative. The Data Obfuscation Kit

provides the user with tools that lower the threshold regarding the technical skills needed

for constructing home automation projects, and the Auster platform, an online DiY platform,

provides the inspiration and knowledge to use these particular tools. Another aspect of the

Auster platform is to provide a place for collaboration and open source IoT design, by enabling

the aspect of a community joining forces. Subsequently, the self-made home automation

projects can be controlled by using the self-maintained Auster app on the user’s phone.

Hacking as a DiY practice, as Galloway described before, relies on five aspects. Auster builds

on all these five aspects, with one of the core focuses on the empowering of the user and the

decentralisation of control. In addition, by creating opacity zones in the home, and by this

means increasing the feeling of safety, creativity and experimentation are stimulated. This

affirms the other core focus of Auster, namely to create beauty and to exceed limitations.

The exceeding of limitations is an interesting aspect, especially for ‘beginners.’ When

Page 35: Auster: A service designed for an increasingly connected world

33

beginning users initiate the construction of home automation projects, the process might be

slow and frustrating. The tools in the Data Obfuscation Kit however allow people to learn and

control the tools quickly, and before they know it, they have built an automatic pet feeder, or

created their own NEST. Thereafter, there is no stopping them from creating progressively

advanced, functional and fun applications. Accordingly, it has been stated that handing over

control to the creator has the ability to stimulate innovation and provoke mass creativity. Paul

Dourish describes that users should not be represented as passive recipients of preordained

technologies, but as actors driven by the circumstances, contexts and consequences of

technology use (Dourish, 2006). Other trends that describe the same phenomenon of this

‘taking control’ view are the open innovation process (Chesbrough, 2003) and the mutual

shaping of technology (Williams & Edge, 1996). Moreover, the Auster platform arranges a

place where the intelligence of many is used for inspiration, creativity and innovation, by

supporting collaboration, sharing and the reuse of code.

Two different aspects are embedded in the concept of Auster. The first aspect regards the

protection and collection of personal data, and the creation of an opacity zone. The production

of self-made applications liberates people from the all-seeing eyes of the government or

data-mining companies, and the ownership over personal data remains with the user. The

second aspect involves the increase of creativity and innovation regarding IoT technology in

the domestic setting. In addition, the element of fun should not be forgotten. I expect a lot of

people will find it surprisingly exciting to make working home automation projects, which can

be controlled and tracked with their phone. Moreover, users have the freedom to decide what

they make, and how they make it in the realm of their home.

These two different aspects enclosed in the concept of Auster, naturally lead to user groups

with different motivations. I anticipate that one of the user groups includes people that are

concerned about their personal data and are searching for a way to protect this, in a world that

is increasingly relying on the exchange of this data. The tools and knowledge to start building

home automation projects from the Auster platform and the Data Obfuscation Kit are offered

to users without any tinkering experience. Moreover, they are able to request the help of more

skilled users. This leads me to another user group, consisting of people that are interested

in tinkering and customising their home, and are compelled by the idea to connect their

creations to the Internet. Their experience could become profitable by offering their assistance

as a service on the Auster platform. The ambition of Auster is to make the user group that is

interested in protecting their personal data, realise the joy and creativity that the construction

of home automation projects yields. However, the people using the platform out of interest

Page 36: Auster: A service designed for an increasingly connected world

34

for tinkering are to be made aware of the grounding and the reason behind Auster. Therefore,

the naming of the construction kit, the Data Obfuscation Kit, and the fact that it is part of

the BFI: Becoming Fog Initiative, are a way of framing it in such a way that it makes people

question where the line between reality and fiction is, and will ideally make them think about

the privacy and surveillance issues that are consequences of the IoT. Nevertheless, since the

focus is also on creating and sharing knowledge, the aim is to choose a framing that might be

perceived as slightly paranoid, but does not make the content too sombre.

8.2 The Auster platform

The Auster platform is an online Do-It-Yourself platform and serves as an outlet for self-

made home automation projects (fig. 4).6 IoTs in automated homes can be found in a range of

applications such as lightning, heating, security, motorized blinds and curtains, etc. All these

different applications in an automated home generally work together, but the most creative

ideas will arise from the combination of different applications.

6 A complete walk-through of the structure of the Auster platform can be found in the appendix.

The projects on the Auster platform are uploaded in the form of step-by-step tutorials and are

supported with the used code. By providing the code, other people can reuse the same code or

make modifications to it, in order to make the project fit to their own vision. Afterwards, users

can share their customised version of the project by uploading it to the Auster platform.

The projects uploaded on the Auster platform are validated through a feedback system consisting

of various buttons. There is a button to indicate that the user has successfully created a project,

there is a favourite button and a comment button. The amount of views, successful ‘makes’ and

favourites determine the popularity of the project. Moreover, each project on Auster has a Flattr

button7 (Flattr, 2014), in order to support and acknowledge good projects. To validate the quality,

there is an option for users to indicate if a project is malfunctioning, and why this particular

Fig. 4: The Auster homepage and a tutorial page

7 Flattr is a Sweden-based microdonations provider founded by Peter Sunde and Linus Olsson. It helps creators to get paid for their

digital content in manner that is aligned with how people use the Internet (Flattr, 2014).

Page 37: Auster: A service designed for an increasingly connected world

35

project is not working properly. If enough users have pointed out that the quality of the project

is in such a state that it is not useful, the project will be taken down. As a consequence, the

projects on the platform will have a certain validation of quality and functionality.

There is a forum section on the Auster platform where users can ask questions about anything

related to the construction of home automation projects. In addition, more experienced users

have the opportunity to offer their help as a service on this part of the platform. Accordingly, the

Auster platform stimulates collaboration and open source IoT design and arranges a place for a

community to join forces, which builds on the hacker ethic and is grounded in the DiY culture. 8

8.3 The Data Obfuscation Kit

Fig. 5: The Data Obfuscation Kit with guide

The Auster platform works together with the Data Obfuscation Kit (fig. 5). The Data

Obfuscation Kit aims to lower the threshold regarding technical skills by using already existing

hardware. The main purpose of the Data Obfuscation Kit is to empower individuals to build

many different home automation projects, by providing a substitute for the edge hardware

layer (described in the ‘architecture of the Internet of Things’), on which different electronic

8 More information about the different features and aspects of the Auster platform can be found in the chapter about the use

cases and the appendix (see Chapter 9 and the Appendix).

Page 38: Auster: A service designed for an increasingly connected world

36

components can be built. Since IoT projects at home include such a wide range of applications

and is in need of many sensors and actuators, it is a task in itself to scavenge for the tools. To

make the step to building home automation projects as small as possible for users, the most

common hardware and sensors need to be easily accessible. Sensors are necessary to determine

the status of the environment and various other devices, a key element of the Internet of Things.

In the connected home, sensors are generally used to measure temperature, humidity, light,

noise, motion and proximity. More advanced sensors are able to detect smoke and carbon

monoxide levels. Furthermore, sensors can detect the status of devices, such as verifying

whether devices are on or off, and the location of other devices, people and pets (Miller, 2015).

The most common sensors and actuators, suited for the purpose of home automation, are

therefore included in the Data Obfuscation Kit. Moreover, the user requires to be authorised

to master the tools that are needed to build the envisioned project without too much effort.

Therefore, the user needs capabilities as well as tools with particular attributes, openness being

an important attribute of that (Roelands, Claeys, Godon, Feki, & Trappeniers, 2011). Proposed

for the construction kit is a modular piece of hardware, like an Arduino or Raspberry Pi, as a

hardware base, on which people can build their projects by composing or decomposing, and

connecting and disconnecting different building blocks, like sensors and actuators.

8.3.1 The hardware base

The two main tinkering computers, Raspberry Pi and Arduino, are both valid options

for the hardware base of the Data Obfuscation Kit. The difference between Arduino and

the Raspberry Pi is that Arduino is a microcontroller board and the Raspberry Pi a fully

functional mini-computer. However, both devices are relatively cheap and include many inputs

and outputs for sensory expansions to test light, temperature, humidity and more. The potential

of having these sensory expansions, provides opportunities to register and react to signals from

the environment, which makes both tinkering computers very suitable for IoT projects.

The Arduino is not a fully functional computer; the code first needs to be programmed on the

computer and uploaded to the Arduino. However, the Arduino is small and unobtrusive, which

is ideal for creating IoT projects in domestic environments (Orsini, 2014).9 Auster therefore

uses the Arduino Yun as a hardware base on which different components can be built, enabling

the use of sensors and different types of outputs. Furthermore, the Arduino Yun is wirelessly

connected to the Internet, providing users with the opportunity to control their projects over

the Internet by, for instance, using their phone.

9 A complete analysis of both the Arduino and the Raspberry Pi can be found in the appendix.

Page 39: Auster: A service designed for an increasingly connected world

37

The Data Obfuscation Kit includes a hardware base and different sensors and actuators that

are most common in the building of home automation projects. Most of the sensors and

actuators can immediately be used by creating the basic projects included in the guide that is

part of the Data Obfuscation Kit.

The Data Obfuscation Kit is an assembly of the following tools (fig. 6):

Arduino Yun

Breadboard (x2)

Jumper wires (60 m)

Servo motor (x2)

DC motor

Temperature sensor (x2)

Soil moisture sensor (x2)

Photoresistor (x5)

Piezo speaker

Motion sensor

Ultrasound (proximity) sensor

Accelerometer

Weight sensor

Barometric pressure sensor

Microphone

Camera

LCD display

Pulse sensor

Body temperature sensor

Potentiometer (x5)

Different LEDs (x30)

Different resistors (x65)

Transistor (x5)

Capacitor (x3)

Diode (x10)

8.3.2 Tools

Fig. 6: Tools included in the Data Obfuscation Kit

Page 40: Auster: A service designed for an increasingly connected world

38

The Data Obfuscation Kit includes a guide with instructions on how to set up the hardware

base and the Auster phone application that is used to control the applications over the Internet.

Furthermore, some basic projects to get the user started are included in the guide (fig. 7).

The aim is to familiarise the user with the tools in the kit, without requiring many additional

tools or the need to build difficult constructions. There are some general projects included in

the guide, but also some projects that underline the data protection aspect of the construction

kit. All the ‘get-started’ projects provided with the construction kit can be controlled over the

Internet using the Auster app. Furthermore, the guide redirects the user to the Auster platform

for the setting up and the tutorials of the basic projects, to make people acquainted with using

the online platform immediately.

8.3.3 The guide

Fig. 7: The guide, part of the Data Obfuscation Kit

Page 41: Auster: A service designed for an increasingly connected world

39

To make one’s house truly connected, the Auster app has been created to allow users to control

self-made home automation projects with their phone. The aim of the Auster app is to have a

basic framework that wirelessly connects home automation projects to the app on the user’s

phone. It permits the receiving of notifications from devices and sensors in the house, and

it allows the user to control connected applications from their phone, over big distances if

necessary (fig. 8). The Auster app gives the user control over all the projects they have built,

without using anything besides the Auster app.

8.4 The Auster app

Fig. 8: The Auster app

Page 42: Auster: A service designed for an increasingly connected world

40

To enable the user to create and manage the Auster app, an IDE can be downloaded to the

laptop or PC. The Auster IDE installs and updates the Auster app on the phone of the user.

New applications for home automation projects can be created in the Auster IDE, which are

also added in the Auster app after connecting it to the IDE (fig. 9). These new applications can

then be called upon in the Arduino code (fig. 10), and enable for example the sending of push

notifications of the Auster app. The Auster IDE therefore functions as a bridge between the

Arduino and the Auster app.

Fig. 9: The Auster IDE

Fig. 10: An example in which the ‘connected Blink’ application is called upon in the code of the Arduino IDE

Page 43: Auster: A service designed for an increasingly connected world

41

9. Use cases

Different possible motivations and target groups of the Auster platform and Data Obfuscation

Kit can be distinguished. There are people who have an interest in tinkering and making own

home automation projects, or people who are worried about their personal data. There are

people who have just started to get interested, and people who already have the knowledge and

technical skills to build their own constructions. In the use cases below, the way of using the

Auster platform by two different users with different motivations is described, in furtherance

of making the concept less abstract and theoretical. One of the users, Andreas, starts using

Auster on account of his concerns about personal data. He is however new to hacking and

creating technical projects. The other user, Emma, is someone who has a lot of experience

in tinkering and building projects with the Arduino. She uses the website as a way to obtain

inspiration and new ideas, and becomes part of the community in order to help other users.

9.1 Andreas

Andreas (35) is reading some articles on the website of the Guardian, while eating his

breakfast on a regular Sunday morning. He stumbles upon an article called ‘How can privacy

survive in the era of the Internet of Things?’ by Danny Bradbury (Bradbury, 2015). Andreas

is fairly informed on developments in technology and knows what the Internet of Things is.

However, he was not aware of the fact that the generated data can lead to privacy issues. After

reading the following section he feels a mixture of concern and interest in the privacy aspect

of the IoT:

“The capacity to correlate information is going to change all of those interactions,” worries

Webb. “I lose power over a great deal of my life when there’s a massive amount of information

over me that I don’t have control over. What about other breaches, though, that may be more

difficult to avoid, or are simply invisible? Could your utility’s smart meter – or your Google

Nest device – know when you arrive and leave at your home based on energy usage patterns?

When your smart bathroom scale beams data to a cloud-based health service, could that data

be used by a health insurance provider?” (Bradbury, 2015, A Big Brother made of little things

section, para. 7).

Andreas used to be a fitness enthusiast, but since he started his office job, he is expected to

sit down biggest part of the day and it does not leave him much time for exercising afterwards.

He does however still enjoy to eat, and out of habit, still eats the same amount as before he

started his job. It is no wonder that he has gained some weight and his lifestyle in general has

gotten less healthy. Andreas starts to wonder how it would affect him if his house were to be

Page 44: Auster: A service designed for an increasingly connected world

42

connected. He starts to get more and more interested in the subject and searches for several

related articles. Quite a few articles write about giving the power back to individuals, and it

seems to him like an enchanting solution. He digs a bit deeper and finds Auster.org, an online

platform which enables people to build their own IoT applications, starting in the home. The

banner shows different pictures, explaining the concept and functionality of Auster (fig. 11).

He clicks on one of the slides of the banner, which takes him to the Data Obfuscation Kit page

where he finds information about how the kit works, for whom it is most suitable and what

is included (fig. 12). It becomes clear to him that the so-called ‘Data Obfuscation Kit’ can

provide him with the tools to get started with building own home automation applications.

Fig. 11: The Auster homepage

Page 45: Auster: A service designed for an increasingly connected world

43

He orders the construction kit and after receiving it reads quickly through the guide. The

guide redirects Andreas to the platform to set up the Arduino Yun and download the software

for the Auster app (fig. 13).

Fig. 12: The page of the Data Obfuscation Kit

Fig. 13: The ‘getting started’ page

Page 46: Auster: A service designed for an increasingly connected world

44

Even though he enjoyed constructing the pet feeder, Andreas is mainly interested in protecting

personal data regarding his lifestyle and health, and would maybe even want to try to improve

his health. He decides to search for projects by using the tool filtering option in the navigation

menu, and searches for projects that are constructed by using the pulse sensor (fig. 15).

After he has successfully set up his Arduino, he plays around with some of the starter projects

included in the guide and finds more basic projects on the Auster platform. Andreas explores

the projects page, and decides to follow an easy tutorial of an automatic pet feeder (fig. 14). It

is a tutorial that does not require many extra tools, but mainly uses those included in the Data

Obfuscation Kit. He finds the tutorial fun and easy to follow, and it makes him realise that

even with a few tools, useful projects can be built. Moreover, he no longer has to worry about

feeding his cat in the morning, when he is in a hurry to go to work.

Fig. 14: Tutorial of an automatic pet feeder

Page 47: Auster: A service designed for an increasingly connected world

45

Andreas finds a project that enables users to securely monitor their body functions, and

simultaneously keeps track of what they eat and the provision of particular food in the home.

He thinks the combination of collecting and analysing data about his body functions, with

the information of what he has eaten during the day is an interesting way to track his health.

Another advantage is that the app can notify him when he starts to run out of a certain

product. After successfully finishing the tutorial, Andreas realises the importance of the

Auster app, where he has quick access to an overview of all the different statistics about his

body functions and nutrition (fig. 16).

Fig. 15: Searching for projects that make use of the pulse sensor tool

Fig. 16: Auster app showing the ‘Health & food tracker’ application

Page 48: Auster: A service designed for an increasingly connected world

46

The project Andreas has built, on the basis of the tutorial, focuses mainly on the amount of

sugar consumed on a day. However, since he is generally not fond of sweet food, he decides

he wants to change this feature to the amount of fat consumed per day. When he encounters

a coding problem during the customising of his project, he decides to ask for help on the

forum (fig. 17). Another user quickly found the mistake and replies to Andreas’ post with an

improved version of the code.

After creating a few health and fitness related projects, Andreas starts exploring the rest of the

Auster platform and finds a lot of creative projects that he would like to build in the future.

Fig. 17: The forum page of the Auster platform

Page 49: Auster: A service designed for an increasingly connected world

47

9.2 Emma

Emma (21) is studying for a bachelor’s degree in Digital Media. She has owned an Arduino for

a couple of years and quite frequently builds small applications in her home, mainly for her

own entertainment. The holidays have just started and it has been raining a lot. She is thinking

of something she can do and remembers her Arduino. However, instead of making the usual

projects, she feels like it would be interesting to make projects that can also be controlled over

the Internet. Why not make several parts of the home automated? It would for example be so

nice to wake up because your curtains have opened in the morning, instead of being woken

up by the sound of an alarm clock. And after waking, she could turn on the coffee machine

while still lying in her bed. She orders an Arduino Yun and decides to search the Internet for

inspiration for projects that she will be able to make with it. She finds the Auster platform and

starts doubting whether the people that are part of the community are slightly paranoid (fig.

18), and if the whole data aspect is really that serious.

She will read more about that after exploring the rest of the website. Emma clicks on the

project page and is pleasantly surprised by the unexpected ideas other people have come

up with; the ‘Adaptive Manipulator’ project, for instance, enables connected devices to

malfunction when operated by certain people, recognised by their fingerprint, whom the

owner of the house apparently dislikes (fig. 19). Other projects such as the ‘musical mashups

cupboards’ project and the ‘GPP (Genuine People Personality) doors’, inspired by the

Hitchhiker’s Guide To The Galaxy (Adams, 1979), show that there is a range of creative

projects that have been made, as opposed to the ‘standard’ home automation projects she

expected to find.

Fig. 18: Footer of the Auster platform

Page 50: Auster: A service designed for an increasingly connected world

48

She notices that she can also upload projects, and can even upload a project with

crowdfunding. Emma lives in a student house and has her room next to the balcony. A few

of her housemates like to sit outside at night and frequently get loud after having a few

drinks. She decides to build an application that recognises if she’s still awake (by tracking

her movement) and measures her mood. Furthermore, she hacks the LED light chain that is

used as outside lightning on the balcony. If the system recognises she is still awake and there

are people making a lot of noise on the balcony, the LED lights start blinking to signal that

Emma is having trouble falling asleep. This subtle and quite pretty way of sending a signal is

hopefully enough, but if the level of noise continues, an automatic (Whatsapp or text) message

will be sent. Emma realises that the project can also be customised for other purposes: parents

can for example use it to analyse if their children inside are already sleeping, while they enjoy

their evening outside. She thinks even more people can benefit from her idea, by applying it to

different circumstances, and chooses to upload it as a crowdfunding project (fig. 20).

Fig. 19: Projects page showing, among others, the Adaptive Manipulator and Musical mashups cupboards

Page 51: Auster: A service designed for an increasingly connected world

49

After having successfully uploaded her first project, she sees that someone else has indeed

made a tutorial built on the same concept, but applied differently to make it suitable for other

purposes. She decides to try to construct some of the projects that other people have uploaded

and becomes part of the community. Emma notices that Auster has an option to leave feedback

to projects in different ways, enabling users to validate, but also support, other users’ creations

(fig. 21). By clicking the Flattr button the uploader of a project is supported by receiving

microdonations from other users. She thinks this way of giving recognition to good projects is

much in line with the concept of Auster, since it emphasises the decentralisation of control.

Fig. 20: The uploading process

Fig. 21: Feedback buttons, including the Flattr button

After spending more time on the Auster platform, Emma becomes increasingly aware of the

reason behind the platform, and thinks it’s a positive thing to be more conscious and cautious

of the consequences of data generation. She therefore thinks it’s good that the platform

dedicates some attention to it, without making it too overwhelming. However, for Emma the

main reason for using Auster is still to make her home automated in a creative and fun way.

Page 52: Auster: A service designed for an increasingly connected world

50

Emma has also noticed that there is a part on the forum which enables ‘expert’ users to offer

their help as a service to people in the same area who are less technically skilled, by installing

applications in their home (fig. 22). She might just give this a try to help people and earn some

money by doing something she enjoys.

Fig. 22: Page where people can request and offer assistance in the Malmö area

Page 53: Auster: A service designed for an increasingly connected world

51

10. Discussion and conclusion

The privacy and surveillance issues that are consequences of the Internet of Things were the

motivation and grounding for this thesis project. The Internet of Things allows technology to

become smaller and more ubiquitous, and by being integrated in the environment around us,

the world is becoming increasingly connected. Even though these developments will generally

make our lives easier and more enjoyable, the Internet of Things also faces some challenges.

These challenges include the privacy and surveillance issues that are results of the increase of

the transferring of sensitive data over communication networks, which presumably won’t be

solved in the near future (Witchalls & Chambers, 2013).

The aim of this thesis project is therefore to answer both in a theoretical, as well as in a

practical way, the following research question: ‘How can the Internet of Things be more

accessible and safe for the everyday user?’ In the process of solving this problem it became

clear that the role of the interaction designer in this project has shifted. The traditional task

of an interaction designer is to develop ideas and products for the future, now the role has

transformed to understanding the context of these ideas and to create a suitable environment or

platform for these ideas to exist in.

This approach has been realised by designing an environment for the possible scenarios that

are able to occur in the context of the Internet of Things in a surveillance society. As a result

the Auster platform, the Auster app and the Data Obfuscation Kit were developed, to make the

step for individuals to build own home automation projects, using IoT technology, as small

as possible. The aim is to create a way to endow people with the capability to exploit their

talents, realise their visions and share this with a community joining forces. By enabling

people to create their own projects at home, personal data is kept in the user’s possession

and the collection of data by governments and companies alike is prevented. Moreover, it is

expected to increase creativity and innovation in the field of the IoT in the realm of the home.

10.1 Discussion

Considering the short time span of the project, not everything has received the desirable amount

of attention and a few aspects can therefore be improved. Moreover, I have tried to cover a

broad and ambitious topic, resulting in a difficulty to thoroughly investigate certain elements.

Page 54: Auster: A service designed for an increasingly connected world

52

For one, to solve the problem regarding the accessibility and safety of the Internet of Things

I have proposed to apply a method of sousveillance in the home. Sousveillance is usually

done by surveilling back, through performing acts such as video sousveillance (Mann,

“Sousveillance” Inverse Surveillance in Multimedia Imaging , 2004). However, in the case

of digital surveillance the method of sousveillance has been applied in a different way,

namely by obfuscating or obscuring (security by obscurity) personal data. Two related works,

AdNauseam and Jennifer Lyn Morone, Inc. have been analysed to examine different tactics of

data obfuscation: AdNauseam obfuscates data through multiplication and distortion, whereas

Jennifer Lyn Morone, Inc. contains and shields data. The applied method of sousveillance for

Auster enables the user to avoid surveillance by concealing and sheltering data, rather than

to surveil back, comparable to the related work of Jennifer Lyn Morone, Inc. As a result, an

opacity zone in the home is created, which can be described as the metaphorical creation

of fog. Moreover, it provides people with alternatives for using services and products from

governments and data mining companies, such as the Nest Thermostat (Nest, 2014). However,

the applied method of sousveillance is only applicable in places where the user has the

authority to intervene in the space. Therefore, the research question has only tried to be solved

in the realm of the domestic setting. Even though this might be a step in the right direction, the

protection in other fields where IoT technology will influence the privacy of personal data, such

as cities and healthcare, remains a problem.

By obfuscating and obscuring surveillance, the home automation projects remain connected

to the Internet. The persisting risk is that a house could be hacked by people with malevolent

intentions, even though the chance of this happening is exceptionally small. As the interview

with Smith pointed out, even if people wanted to break into the self-made applications in the

house, they would generally not know how do it, since they are not aware how the applications

are constructed (Smith, Physical: Home, 2015). I could, however, have done more research on

applying an extra encryption to the Auster app and the hardware base of the Data Obfuscation

Kit. Moreover, a possible solution could have been to propose the use of a home server to

make the projects more secure. Given the amount of time, there has unfortunately been no

opportunity to examine or test this possibility.

The other aspect of the research question focuses on the accessibility of the Internet of

Things. It is envisioned that Auster would be used by user groups with different motivations

and levels of experience. Similar to the related work Homey (Athom, 2014), I have developed

an opportunity for people to program their own home automation projects. However, whereas

Homey only provides users with possibilities to create an interactive f low-editor and allows

Page 55: Auster: A service designed for an increasingly connected world

53

them to intervene in the application layer, Auster additionally aims to give the user control

over the edge hardware layer and construct home automation projects from scratch. To test the

feasibility of this aspiration, I have carried out user testing on test participants with different

skill levels. It became clear that users who have worked with the Arduino or similar hardware

before, generally will not have difficulties constructing the projects on Auster. Even though

the Data Obfuscation Kit offers tools with attributes as ‘transparency’ and openness, user

testing indicated that there is a possibility that some beginners might have trouble building

their own home automation projects. Accordingly, it can be deduced that Auster has the

potential to increase the accessibility of the Internet of Things, but the question remains if this

applies to the everyday user. Therefore, I proposed a solution which builds on the community

aspect of Auster and creates opportunities for experienced users to help beginning users. This

solution might help many beginners and less experienced people, but should be developed and

researched further, before it can be concluded that it is a valid solution.

Another aspect regarding the accessibility that should be highlighted is the framing of the

project. The aim of Auster is to enable the everyday user to make their own home automation

projects, by proposing hacking as a DiY method. The characteristics and advantages of hacking

as a DiY practice have been described in the chapter about the conceptual discovery. The

aspects of collaboration and open source design are characteristic of the hacker ethic and are

grounded in the DiY culture. The hacker ethic is based on the sharing of information, and the

transformation and re-appropriation of technology by building on existing code (Von Busch &

Palmas, 2006). Moreover, community based development is becoming increasingly important.

It supports the development process with techniques such as open-source development, end-

user programming and crowd sourcing (Pletikosa Cvijikj & Michahelles, 2011). Open-source

development has the advantage of empowering people to not only control the application layer,

but also the middleware layer and the edge technology layer. Even though it is emphasised that

hacking should be seen as a positive act (considering there is a difference between hackers, who

build things, and crackers, who destroy things), some people might have bad connotations with

the word hacking. Nevertheless, I have decided to keep using the term hacking as a framing for

this project, since it underlines the grounding and reasons behind the establishment of Auster.

Auster consists of an online platform, an app and a construction kit. All of these different

aspects work together as a whole, but have their individual strengths and weaknesses. The

functionality and design of the Auster platform has been developed by examining and analysing

several online DiY platforms. The feasibility of constructing home automation projects has

been validated by the findings of the interview with, and projects constructed by Andy Smith

(Smith, Physical: Home, 2015), and by additionally carrying out two rounds of user testing.

Page 56: Auster: A service designed for an increasingly connected world

54

The first round of user testing applied attention to the construction of a project on the basis of

the Auster platform and the Data Obfuscation Kit, and has been tested on people with different

levels of experience. This round of user testing was very insightful, and has helped me to

make important decisions on the design and structure of the platform. Moreover, it has enabled

the development of the guide, which is included in the Data Obfuscation Kit. The feedback

of the second round has resulted in improving the explanation of the Auster concept, and the

introduction of the Data Obfuscation Kit on the homepage of the Auster platform. Even though

the user testing has given me several valuable insights, I could have prototyped and user tested

more projects, including the ‘get started’ projects. It would also have been compelling to do a

user test on the uploading process of Auster, by letting someone build a project and upload it to

the platform. Given the amount of time, I have as yet not been able to do either of these.

Although the user testing has indicated that the Auster platform is generally functioning

properly, there are some elements that require some additional attention. At present, the Auster

platform allows users to upload a crowdfunded project, in order to make it more attractive for

experienced users to contribute their knowledge to the platform. However, more strategies on

how to make it more appealing for tech savvy users to upload their project, and by this means

help other users, could have been explored. Moreover, a plan to get the Auster platform off

the ground has to be developed. A way of doing this could be to launch a Kickstarter project.

To initiate the use of Auster and to motivate the uploading of the first content on the Auster

platform, an IoT home automation contest could be created.

For the hardware base of the Data Obfuscation Kit, I have chosen to use an Arduino Yun,

which has some great advantages: it is a tool with openness, it is easy to set up for beginners,

it enables the construction of projects in a short time range and the Arduino software is open

source. After analysing and comparing the Raspberry Pi to the Arduino it became clear that

the Arduino is in general more suitable for creating home automation projects in a simple and

quick way. Not only is it easier to set up and program, it takes less effort to connect a lot of

inputs and outputs to it (Schwartz, 2013). However, there are some disadvantages of using an

Arduino, regarding the high quantity of electrical wires and the limited amount of pins that

connect the devices and sensors to the Arduino board. Especially when users have the wish

to create many complex projects, they might quickly run out of pins. Moreover, it is generally

not perceived as pleasant to have many wires throughout the house. In the future, a strategy to

reduce the amount of wires should be thought of, or possibilities for a wireless solution should

be explored. Furthermore, the estimated price of the Data Obfuscation Kit, when everything is

bought individually, is €173. Needless to say, this is a high price for a starter kit. However, it

Page 57: Auster: A service designed for an increasingly connected world

55

is expected that the price will drop as soon as the components are bought in bigger numbers.

Moreover, this price is calculated on the use of original hardware. Nowadays a lot of cheaper

versions are available for the hardware base, as well as the sensors and actuators, which could

make the price drop by fifty percent.

The process of the Auster app has been based on the prototyping of connecting Arduino

projects to the Internet with Temboo and Parse. Based on the analysis of the specifications

of Parse and Temboo derived from the prototyping, I have been able to develop the idea

and functionality of the app. However, since only the general idea and functionality have

been designed, more research should be done on the technical implications and the overall

performance.

As described before, the short time span of the project has prevented me from examining and

exploring all distinctive aspects thoroughly. It would have been advantageous to explore and

test more methods and tactics without time pressure, since I feel that this project has even more

to offer than I have been able to prove.

10.2 Conclusion

A method and design to solve the concerns regarding the accessibility and safety of the

Internet of Things in the domestic environment has been developed through the creation of

Auster. The Auster platform, the Data Obfuscation Kit and the Auster app were created as

a ref lection and reaction to the context of a possible surveillance society in an increasingly

connected world, in which the user’s involvement is becoming progressively important. The

emerging Internet of Things plays a big role in this increase of ubiquity, resulting in privacy

and surveillance issues. To a certain extent, Auster provides a solution to make the Internet

of Things more accessible and safe (regarding the aforementioned privacy and surveillance

issues). It gives users a creative and fun alternative for home automation, instead of being

enforced to use applications from the government or corporations alike. Subsequently, Auster

allows users to obfuscate and keep ownership over their personal data. However, there are

still some security concerns that need to be further examined before Auster can be presented

as a completely safe solution. Moreover, the accessibility for the everyday user relies on the

community and collaboration aspects of the Auster platform. It can therefore be concluded

that with the help of an online community joining forces against a surveillance society in

an increasingly connected world, Auster is a new wind blowing in a field which is currently

marked by pessimism and fear.

Page 58: Auster: A service designed for an increasingly connected world

56

References

Adams, D. (1979). The Hitchhiker’s Guide To The Galaxy. New York: Harmony Books.

Athom. (2014, May 28). Homey, The Living Room - Talk to your home! by Athom & Kickstarter. Retrieved

April 30, 2015 from Kickstarter: view-source:https://www.kickstarter.com/projects/athom/homey-

the-living-room-talk-to-your-home/description

Bandyopadhyay, D., & Sen, J. (2011, April 9). “Internet of Things: Applications and Challenges in

Technology and Standardization.” Wireless Personal Communication, 58 (1), 49-69.

Barnstone, D. (2014, September 15). ‘Cloaking’ device uses ordinary lenses to hide objects across range

of angles. Retrieved May 15, 2015, from University of Rochester: http://www.rochester.edu/

newscenter/watch-rochester-cloak-uses-ordinary-lenses-to-hide-objects-across-continuous-range-

of-angles-70592/

Boyd, D., & Crawford, K. (2011). Six Provocations for Big Data. A Decade in Internet Time: Symposium

on the Dynamics of the Internet and Society. Oxford: Oxford Internet Institute.

Borgohain, T., Kumar, U., & Sanyal, S. (2015, January 9). Survey of Security and Privacy Issues of Internet

of Things. p. 7.

Bradbury, D. (2015, April 7). How can privacy survive in the era of the Internet of things? Retrieved May

12, 2015, from The Guardian: http://www.theguardian.com/technology/2015/apr/07/how-can-

privacy-survive-the-Internet-of-things

CERP-IoT;. (2009). Internet of Things Strategic Research Roadmap. Retrieved April 5, 2015, from http://

www.grifs- project.eu/data/File/CERP-IoT%20SRA_IoT_v11.pdf

Chesbrough, H. (2003). Open Innovation: The New Imperative for Creating and Profiting from Technology.

Boston: Harvard Business School Press.

Cowlishaw, B. (2014, October 30). The Circle by Dave Eggers: Let’s All “Like” Our Transparent Dystopia!

Retrieved April 12, 2015, from Sequart Organization: http://sequart.org/magazine/51469/the-

circle-dave-eggers-review/

Cramer, F. (2003, April 1). Social Hacking, Revisited. Retrieved April 21, 2015, from cramer.pleintekst.nl/

all/social_hacking_revisited_sollfrank/social_hacking_revisited_sollfrank.pdf

Eggers, D. (2014). The Circle. London: Vintage Books.

Encyclopedia Mythica Online. (2015). Auster. Retrieved April 29, 2015, from Encyclopedia Mythica: http://

www.pantheon.org/articles/a/auster.html

Evans, D. (2011, April). The Internet of Things; How The Next Evolution of the Internet is Changing

Everything. Cisco White Paper .

daCosta, F. (2013). Rethinking the Internet of Things; A Scalable Approach to Connecting Everything.

New York: Apress Media, LLC.

Page 59: Auster: A service designed for an increasingly connected world

57

Deleuze, G. (1992). Postscript on the Societies of Control. October, 3-7.

Dick, P. K. (1998). The Minority Report. In P. K. Dick, The Collected Stories Of Philip K. Dick Volume 4:

The Minority Report. Citadel.

Dougherty, D. (2012). The Maker Movement. Innovations: Technology, Governance, Globalization , 7 (3),

11-14.

Dourish, P. (2006). Implications for Design. Paper presented at the CHI 2006, Montreal, Quebec, Canada.

Dunne and Raby. (2015). Towards a Critical Design. Retrieved June 13, 2015 from Dunne and Raby: http://

www.dunneandraby.co.uk/content/bydandr/42/0

Flattr. (2014). Flattr - Social microdonations. Retrieved May 6, 2015, from Flattr: https://f lattr.com/

Foucault, M. (1977). Discipline and Punish. (A. Sheridan, Trans.) New York: Vintage Books.

Galloway, A. (2004). Panel: Design for Hackability. DIS2004. Cambridge, Massachusetts: DIS2004.

Github. (2015). GitHub · Build software better, together. Retrieved April 7, 2015, from GitHub · Build

software better, together.: https://github.com/

Guglielmo, C. (2014, January 7). CES LIVE: Cisco’s chambers says Internet of everything, $19 trillion

opportunity, is next big thing. (Forbes, Producer) Retrieved April 5, 2015, from http://www.forbes.

com/sites/connieguglielmo/2014/01/07/ces-live-cisco- ceo-chambers-to-deliver-keynote/

Hoftijzer, J. (2009). The Implications of Do-It-Yourself. International Conference on Integration of Design,

Engineering and Management for Innovation. Porto, Portugal: FEUP Faculty of Engineering of

the University of Porto.

Ideon. (2015, April 23). Internet of Things Conference. Lund, Sweden.

Ingham, L. (2015, March 14). Connected World: Edward Snowden: without change, future surveillance

will be in the hands of countries, companies and criminals. Retrieved April 6, 2015, from

Factor: http://factor-tech.com/connected-world/16998-edward-snowden-without-change-future-

surveillance-will-be-in-the-hands-of-countries-companies-and-criminals/

Instructables. (2015). Instructables - DIY How To Make Instructions. Retrieved April 3, 2015, from

Instructables: http://www.instructables.com/

Kamel Boulos, M. N., & Al-Shorbaji, N. M. (2014). On the Internet of Things, smart cities and the WHO

Healthy Cities. International Journal of Health Geographics, 13 (10).

Kellmereit, D., & Obodovski, D. (2013). The Silent Intelligence - The Internet of Things. San Francisco,

California: DnD Ventures.

Kickstarter. (2015). Retrieved April 2, 2015, from Kickstarter: kickstarter.com

Lauesen, S., & Kuhail, M. A. (2012). Task descriptions versus use cases. Requirements Engineering, 17 (1),

3-18.

Leadbeater, C., & Miller, P. (n.d.). The Pro-Am Revolution. How Enthusiasts are changing the

way our economy and society work. Retrieved April 7, 2015, from http://www.demos.co.uk/files/

proamrevolutionfinal.pdf

Page 60: Auster: A service designed for an increasingly connected world

58

Lin, G. (2009). Higher Education Research Methodology-Literature Method. International Education

Studies, 2 (4), 179.

Mack, N., Woodsong, C., MacQueen, K. M., Guest, G., & Namey, E. (2005). Qualitative Research

Methods: A Data Collector’s Field Guide. Research Triangle Park, North Carolina: Family Health

International.

Mayer-Schonberger, V., & Cukier, K. (2013). Big Data: A Revolution That Will Transform How We Live,

Work and Think. New York: Houghton Mifflin Harcourt Publishing Company.

Mann, S. (2004). “Sousveillance” Inverse Surveillance in Multimedia Imaging. MULTIMEDIA ‘04

Proceedings of the 12th annual ACM international conference on Multimedia, pp 620-627. New

York: ACM.

Mann, S., & Niedzviecki, H. (2001). Cyborg: Digital Destiny and Human Possibility in the Age of the

Wearable. Toronto: Doubleday of Canada.

Mann, S., Nolan, J., & Wellman, B. (2003). Sousveillance: Inventing and Using Wearable Computing

Devices for Data Collection in Surveillance Environments. Surveillance & Society, 1 (3), 331-

355.

Marx, G. (2009). A Tack in the Shoe and Taking Off the Shoe: Neutralization and Counterneutralization

Dynamics. Surveillance & Society, 6(3), 294-306.

Media Evolution City. (2015, March 14). Internet of Things. Malmö, Sweden.

Microsoft. (2015). Data Mining Algorithms (Analysis Services - Data Mining). Retrieved May 19, 2015,

from Microsoft Developer Network: https://msdn.microsoft.com/en-us/ms175595.aspx

Millen, D. (2000). Rapid ethnography: time deepening strategies for HCI field research. DIS ‘00

Proceedings of the 3rd conference on Designing interactive systems: processes, practices,

methods, and techniques (pp. 280-286). New York: ACM.

Miller, M. (2015). The Internet of Things; How Smart Tvs, Smart Cars, Smart Homes, and Smart Cities are

Changing the World. Indianapolis, Indiana: Pearson Education, Inc.

Morone, J. L. (2014). Jennifer Lyn Morone Inc. Retrieved April 21, 2015, from jenniferlynmorone.com

Mukhopadhyay, S., & Suryadevara, N. (2014). Internet of Things: Challenges and Opportunities. In S. C.

Mukhopadhyay, Internet of Things: Challenges and Opportunities. New York Dordrecht London:

Springer.

Nest. (2014, January 14). Life with Nest Thermostat | Nest. Retrieved May 20, 2015 from Nest: https://nest.

com/thermostat/life-with-nest-thermostat/

Nissenbaum, H., Howe, D. C., & Mushon, Z.-A. (2014). Adnauseam. Retrieved April 20, 2015, from

Adnauseam: adnauseam.io

Obrenović, Ž. (2011). Design-based research: what we learn when we engage in design of interactive

systems. Interactions, 18 (5), 56 - 59.

Office of the Data Protection Commissioner. (2015). What is Personal Data - Data Protection

Page 61: Auster: A service designed for an increasingly connected world

59

Commissioner - Ireland. Retrieved June 14, 2015 from Home - Data Protection Commissioner -

Ireland: https://www.dataprotection.ie/docs/What-is-Personal-Data-/210.htm

Øredev. (2015, April 23). Stefan Witkamp - Internet of Things by Øredev. Retrieved April 20, 2015 from

Internet of Things by Øredev - A One-Day Internet of Things Conference: http://www.iotconf.se/

speakers/stefan-witkamp/

Orwell, G. (1949). 1984. Signet Classic.

Orsini, L. (2014, April 16). How Arduino and Raspberry Pi Can Enhance Your Connected Home. Retrieved

April 8, 2015, from http://readwrite.com/2014/04/16/arduino-raspberry-pi-connected-home-

tutorials-projects

Pax, A. (2014-2015). Arx Pax - The infinite possibilities of a limitless technology. Retrieved May 15, 2015,

from arxpax.com

Parse. (2015). Parse. Retrieved April 15, 2015, from Parse: https://parse.com/

Pletikosa Cvijikj, I., & Michahelles, F. (2011). The Toolkit Approach for End-user Participation in the

Internet of Things. In D. Uckelmann, M. Harrison, & F. Michahelles, Architecting the Internet of

Things. Dordrecht London New York: Springer-Verlag Berlin Heidelberg .

Postscapes. (2015). Postscapes: Tracking the Internet of Things. Retrieved April 10, 2015, from Tracking

the Internet of Things: Postscapes: http://postscapes.com/

Raymond, E. S. (1999). The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental

Revolutionary. Sebastopol, CA, United States of America: O’Reilly Media.

Roelands, M., Claeys, L., Godon, M., Feki, M. A., Feki, M. A., & Trappeniers, L. (2011). Enabling the

Masses to Become Creative in Smart Spaces; Orienting User Creation in the Internet of Things in

the Context of the ITEA2 DiYSE Project. In D. Uckelmann, M. Harrison, & F. Michahelles,

Architecting The Internet of Things (pp. 37-64). Dordrecht London New York: Springer-Verlag

Heidelberg Berlin.

Rowling, J. K. (1998). Harry Potter. London: Scholastic.

Salus, P. H. (1995). Casting the Net: From ARPANET to Internet and Beyond. Addison-Wesley.

Schwartz, M. (2013, April 29). Arduino vs Raspberry Pi: Which Platform Is the Best for Home

Automation? Retrieved April 8, 2015, from Open Home Automation: https://www.

openhomeautomation.net/arduino-vs-raspberry-pi-which-platform-is-the-best-for-home-

automation/

Segan, S. (2014, January 14). Google and Nest: Smart Buy, Silly Price. Retrieved June 13, 2015 from

Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine : PCmag.

com

Skaržauskienė , A., & Kalinauskas, M. (2012). The Future Potential of Internet of Things. Social

Technologies , 1 (2), 102-113.

Smith, A. (2015). Andy Smith: Digital Media Portfolio. Retrieved May 19, 2015, from Andy Smith: Digital

Page 62: Auster: A service designed for an increasingly connected world

60

Media Portfolio: http://www.andysmithfilm.co.uk/

Smith, A. (2015). Physical: Home. Retrieved May 19, 2015, from What Andy Made: http://whatandymade.

com/project/physical-home/

Snowden, E. (2013, July 12). Statement by Edward Snowden to human rights groups at Moscow’s

Sheremetyevo airport. Retrieved April 28, 2015, from Wikileaks: https://wikileaks.org/Statement-

by-Edward-Snowden-to.html

Spielberg, S. (Director). (2002). Minority Report [Motion Picture].

Stack Overflow. (2015). Stack Overflow. Retrieved April 11, 2015, from Stack Overflow: http://

stackoverflow.com/

Stallman, R. (2002). On Hacking. Retrieved April 21, 2015, from http://stallman.org/articles/on-hacking.

html

Stanley, J., & Steinhardt, B. (2003) Bigger Monster, Weaker Chains; The Growth of an American

Surveillance Society. Technology and Liberty Program. New York, NY: American Civil Liberties

Union.

Stichting voordekunst. (2015). voordekunst is hét platform voor crowdfunding in de creatieve sector.

Retrieved April 13, 2015, from voordekunst: http://www.voordekunst.nl

STPLN. (2015, May 1). Connectors Salon #33 In the Cloud: The Craft of Online Collaboration with Peter

Sunde. Malmö, Sweden.

Temboo. (2015). Temboo. Retrieved April 14, 2015, from Temboo: https://temboo.com/

Tiqqun. (2010, May 29). The Cybernetic Hypothesis. Retrieved April 21, 2015, from theanarchistlibrary.org

Tsai, C.-W., Lai, C.-F., & Vasilakos, A. V. (2014). Future Internet of Things: Open Issues and

Challenges. Wireless Networks , 20 (8), 2201-2217.

Transmediale. (2015, Febraury 3). Circumventing the Panopticon: Whistle-blowing, Cypherpunk and

Journalism in the Networked 5th Estate. Retrieved May 18, 2015, from Transmediale: http://www.

transmediale.de/de/node/25201

Transmediale. (2015, January 28). Transmediale Festival. Berlin, Germany.

Turcu, C. Turcu, C. & Tiliute, D. (2012). The Potential of Internet of Things to Improve the Quality of

Healthcare Delivery. Journal of Applied Computer Science & Mathematics, 6 (13), 73-78.

Uckelmann, D., Harrison, M., & Michahelles, F. (2011). An Architectural Approach Towards the Future

Internet of Things. In D. Uckelmann, M. Harrison, & F. Michahelles, Architecting the Internet of

Things. Dordrecht London New York: Springer-Verlag Berlin Heidelberg.

Van Buskirk, R., & Moroney, B. W. (2003). Extending prototyping. IBM Systems Journal, 42 (4), 613-623.

Virilio, P. (2002). The Visual Crash. Cambridge, MA: MIT Press.

Vives, A. (2013, November). Building a smarter city: Interview with Antoni Vives Deputy Major of

Barcelona. Retrieved April 5, 2015, from http://www.youtube.com/watch?v=cAmn9gQhMVI

Von Busch, O., & Palmas, K. (2006). Abstract Hacktivism: The Making of a Hacker Culture. London

Page 63: Auster: A service designed for an increasingly connected world

61

Istanbul: Openmute.org and Lightning Source UK Ltd.

Weiser, M. (1991, September). The computer for the twenty-first century. Scientific American, 265 (3), 94-

104.

Williams, R., & Edge, D. (1996). The Social Shaping of Technology. Research Policy, 25 (6), 856-899.

Witchalls, C., & Chambers, J. (2013). The Internet of Things business index: A quiet revolution gathers

pace. The Economist Intelligence Unit.

Wong, K.-S., & Kim, M. (2014). Towards Self-Awareness Privacy Protection for Internet of Things Data

Collection. Journal of Applied Mathemetics, 2014, 1-9.

Zanella, A., Bui, N., Castellani, A., Vengelista, L., & Zorzi, M. (2014). Internet of Things for Smart Cities.

IEEE Internet of Things Journal, 1 (1), 22-32.

Zemeckis, R. (Director). (1989). Back to the Future II [Motion Picture].

Zimmerman, J., Stolterman, E., & Forlizzi, J. (2010). An Analysis and Critique of Research through

Design: towards a formalization of a research approach. Proceedings of the 8th ACM Conference

on Designing Interactive Systems (pp. 310-319). New York: ACM .

Page 64: Auster: A service designed for an increasingly connected world

62

Image credits

Fig. 3: Hacked plug sockets. Photo: Andy Smith. By permission of the copyright owner (Smith, Andy

Smith: Digital Media Portfolio, 2015).

Fig. 19: Projects page showing, among others, the Adaptive Manipulator and Musical mashups cupboards.

Includes an image by Andy Smith. By permission of the copyright owner (Smith, Andy Smith: Digital

Media Portfolio, 2015).

Page 65: Auster: A service designed for an increasingly connected world

63

Appendices

Structure of the Auster platform

Fig. 23: The Auster homepage

The Auster homepage introduces the overall concept of Auster, as shown in fig. 23. A banner is

used to visually explain the concept and the distinctive slides of the banner link to particular

pages. The written information on the homepage describes in more detail how Auster works,

the motivation behind it and the functionality of the Data Obfuscation Kit.

Page 66: Auster: A service designed for an increasingly connected world

64

The projects page showcases the home automation projects created by the users of Auster

(fig. 24). The projects are sorted by the amount of views, with the most viewed projects

displayed at the top. The way the projects are structured visually is straightforward, and can

be compared to websites such as Kickstarter, Instructables and Postscapes (Kickstarter, 2015),

(Instructables, 2015), (Postscapes, 2015). The projects can be filtered by tools (particular

sensors for instance), or they can be categorised by tags that were given to the projects.

Moreover, Auster does not only support Arduino based projects, but also projects built with

the Raspberry Pi and the Intel Edison.

Fig. 24: The projects page

Page 67: Auster: A service designed for an increasingly connected world

65

Fig. 25: The first step of a tutorial, showing the necessary tools

The tutorials are based on a step-by-step system, which can be compared to the way

Instructables works (Instructables, 2015). However, the tutorials on Instructables are

occasionally chaotic and disorganised, which is demotivating if a project is difficult to

construct. Therefore the tutorials are built up out of different steps, consisting of small sub

steps, resulting in a better overview and making it easier for the user to follow. The first step

of each tutorial lists which tools from the Data Obfuscation Kit have been used, and which

additional tools will be necessary (fig. 25). If the additional tools contain specific pieces of

hardware, a link to where it can be bought is provided. This is to prevent users from having

to scavenge the Internet for all the different tools, which is a common case when following

tutorials on websites such as Instructables. Moreover, if the project includes the building

of certain constructions, these could be pre-made and sold by the uploader. All steps of a

project’s tutorial are shown with the support of text, images, schematic pictures and code files.

The code files can be downloaded and customised by the user, in order for it to function in the

way they have envisioned it, which is comparable to the way GitHub works (Github, 2015).

Page 68: Auster: A service designed for an increasingly connected world

66

Fig. 26: Feedback buttons, including the Flattr button

Moreover, the user can leave feedback on a project in a few distinctive ways through the use of

several buttons, as shown in fig. 26. There is an option to show that the user has successfully

created a project, there is a favourite button and a comment button. The amount of views,

successful ‘makes’ and favourites determine the popularity of the project. Moreover, each

project on Auster has a Flattr button (Flattr, 2014), in order to support and acknowledge

good projects. To validate the quality, there is an option for users to indicate if a project

is malfunctioning, and the reason behind this. If enough users have pointed out that the

quality of a project is in such a state that it is not useful, the project will be taken down. As a

consequence, the displayed projects will have a certain validation of quality and functionality.

Fig. 27: The uploading process with the option to upload a free or crowdfunded project

The uploading system of Auster permits the user to upload a free project, or to upload a

crowdfunded project (fig. 27). If the user decides to upload a free project, it means that it

is available for anyone for free, based on the open source license the user has chosen. For

users who don’t want to put their projects on the Auster platform for free, there is an option

to start a crowdfunding campaign for the project. The concept of crowdfunding has become

Page 69: Auster: A service designed for an increasingly connected world

67

popular through platforms such as Kickstarter and Voordekunst (Kickstarter, 2015) (Stichting

voordekunst, 2015). Whenever a project is funded in the selected time, the user will receive

the specified amount of money and the project will afterwards be on the platform for free.

However, if the project is not funded, the project will only be accessible for other users by

donating a small amount or by supporting it with the use of Flattr (Flattr, 2014).

Fig. 28 and 29: Different steps of the uploading process

Page 70: Auster: A service designed for an increasingly connected world

68

The remaining steps of the uploading process are the same for free or crowdfunded projects.

First the user fills in the fields concerning the title, description and tags, and uploads a

finished picture of the project and a thumbnail (fig. 28). The rest of the uploading system

is very structured, in furtherance of making the tutorial easy to follow for other users. The

first step always consists of listing the tools used, from the Data Obfuscation Kit, and from

elsewhere (provided with a link to where it can be bought). Every step consists of sub steps,

to stimulate the uploader to make the steps small and easy to follow for other users. Each sub

step supports the adding of text, uploading of pictures and schematic images, and the sharing

of code (fig. 29).

Fig. 30: The page of the Data Obfuscation Kit

The Data Obfuscation Kit page provides information about the concept, whom it is suitable

for and what features are included. Moreover, the link to where the construction kit can

be acquired can be found on this page. There is also a link to the ‘get started’ page, where

tutorials can be found for the set-up of the Arduino, the software for the Auster app and some

basic projects to familiarise the user with the Data Obfuscation Kit (fig. 30).

Page 71: Auster: A service designed for an increasingly connected world

69

Fig. 31: Pages to help the user to get started with Auster

Several pages of the Auster platform are dedicated to assist users to get started with Auster

(fig. 31). There is a page that gives information about the setting up of the Arduino Yun,

another page about installing the Auster app and yet another page provides tutorials for

beginner projects. The guide in the Data Obfuscation Kit redirects the user to these pages, to

immediately familiarise people with how the platform works.

Page 72: Auster: A service designed for an increasingly connected world

70

Fig. 32: The forum section of Auster

The Auster platform has a forum section where users can ask for help with anything related

to building applications for the automated home. Other users can help by answering these

question, by uploading small tutorials or by sharing code. This part of the forum could be

compared with the way Stack Overf low works (Stack Overf low, 2015). Furthermore, some

users might have the wish to automate the home by themselves, but do not have the skills or

time to build the applications. The forum therefore has a department where more technically

skilled users can offer their help as a service to people in their area who need help setting up

home automation projects (fig. 32).

Page 73: Auster: A service designed for an increasingly connected world

71

Analysis of the hardware base of the Data Obfuscation Kit

The Arduino and the Raspberry Pi are compared below by analysing specifications such as

setup, connectivity, computing power, inputs/outputs and the programming possibilities, which

are important aspects for enabling the construction of home automation projects.

Setup

The Arduino can immediately be connected to the computer by using a USB cable, usually

provided with it, which makes it easy to set it up. The software needed for Arduino is open

source and only needs to be downloaded. On the contrary, setting up a Raspberry Pi is

challenging: a USB cable for power, an SD card for the OS, a mouse, a keyboard, an HDMI

screen and cable and an Ethernet cable or WiFi dongle to connect to the Internet are needed.

Furthermore, the right operating system needs to be installed on de SD card in order for the

Raspberry Pi to be functional.

Connectivity

In order to create IoT projects, it is necessary that the hardware platform is easily connected

to the Internet. Most Raspberry Pi boards have a built-in Ethernet connection. Moreover, WiFi

connectivity is easily added by connecting a WiFi dongle. The Arduino Yun has the feature

of connecting to the WiFi easily. Standard boards can be easily connected to the web by using

shields, such as the Ethernet shield or the WiFi shield.

Computing power

The Raspberry Pi is a lot better than the Arduino when it comes to computing power. Most Arduino

boards are equipped with an 8-bit microcontroller from ATMEL, generally the Atmega328 which

runs at 16 MHz. The Raspberry Pi however works on a 700 MHz BCM2835 chip.

Inputs/Outputs

The Raspberry Pi has some inputs and outputs, all of them being digital connectors.

Most Arduino boards however, are equipped with digital inputs/outputs, PWM outputs, analog

inputs, I2C and SPI interfaces.

Programming

Programming the Arduino is fairly easy; the processing language is easy to use, the code

can be written directly on your computer in the Arduino IDE, and everything is open-source,

meaning that there are a lot of tutorials and libraries available online. Programming the

Raspberry Pi is more difficult; logging on to the device is required, either with the board

Page 74: Auster: A service designed for an increasingly connected world

72

itself or via SSH from the computer. Afterwards the code can be written and run. However, the

advantage of Raspberry Pi is that it supports many programming languages, such as Python

(which enables the use of the many Python libraries available on the web).

Price

The price depends a lot on which Raspberry Pi or Arduino boards are being used. The price

for a Raspberry Pi board is generally $43, whereas the Arduino Uno board is $15. Moreover,

in order for the Raspberry Pi to function, a lot of accessories need to be purchased. On the

contrary, the only thing needed to for the Arduino to be functional is a USB cable. (Schwartz,

2013)

Page 75: Auster: A service designed for an increasingly connected world

73