Skip to main content
Log in

Designing for social interaction with mundane technologies: issues of security and trust

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

This paper documents some of the socio-technical issues involved in developing security measures for wireless mesh networks (WMNs) that are deployed as part of a community network. We are interested in discovering whether (and exactly how) everyday social interaction over the network is affected by security issues, and any consequent design implications. We adopt an interdisciplinary methodological approach to requirements, treating a community as an ‘organization’ and implementing an approach, OCTAVE, originally designed to uncover security elements for organizations. Using a focus group technique we chart some of the assets and security concerns of the community, concerns that need to be addressed in order for WMNs, or indeed any network, to become a truly ‘mundane technology’.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Agre P (1999) Rethinking networks and communities in a wired society. American Society for Information Science, Pasadena, May 1999

  2. Alberts C, Behrens S, Pethia R, Wilson W (1999) Operationally critical threat, asset, and vulnerability evaluation framework, version 1.0. Technical Report CMU/SEI-99-TR-017, Carnegie Mellon University, June 1999

  3. Anderson J (2008) What is the LocustWorld Meshbox? http://www.locustworld.com/overview.php

  4. Annison L (2006) JFDI Community broadband: Wennington. Digital Dales Ltd, November 2006

  5. Bauman Z (2001) Community: seeking safety in an insecure world. Polity, London

  6. Becker H (1953) Becoming a marihuana user’. J Sociol 59:235–242

    Google Scholar 

  7. Besnard D, Arief B (2004) Computer security impaired by legitimate users. Comput Secur 23(3):253–264

    Google Scholar 

  8. Borgmann A (1984) Technology and the character of contemporary life. University of Chicago Press, Chicago

    Google Scholar 

  9. Castells M (2000) The information age: economy, society and culture. Blackwell, Oxford

    Google Scholar 

  10. Castells M (2000) Materials for an exploratory theory of the network society. Br J Sociol 51(1):5–24

    Article  Google Scholar 

  11. Dourish P, Anderson K (2006) Collective information practice: exploring privacy and security as social and cultural phenomena. Hum Comput Interact 21:319–342

    Article  Google Scholar 

  12. Dourish P, Grinter R, Delgado de la Flor J, Jospeh M (2004) Security in the wild: user strategies for managing security as an everyday, practical problem. Pers Ubiquitous Comput 8(6):19–30

    Article  Google Scholar 

  13. Edwards W, Poole E, Stoll J (2007) Security automation considered harmful? In: Proceedings of the IEEE new security paradigms workshop (NSPW 2007), White Mountain, New Hampshire, September 18–21, 2007

  14. Fleck J (1988) Innofusion or diffusation? The nature of technological development in robotics. Edinburgh PICT working paper no. 7. Edinburgh University, Edinburgh

  15. Fleck J (1988) Innofusion or diffusation: the nature of technological development in robotics. Edinburgh PICT working paper no. 4. Edinburgh University, Edinburgh

  16. Friedman B, Hurley D, Howe DC, Felten E, Nissenbaum H (2002) Users’ conceptions of web security: a comparative study. In: Proceedings of CHI 2002, Minneapolis, Minnesota, 2002, pp 746–747

  17. Harrison S, Dourish P (1996) Re-place-ing space: the roles of place and space in collaborative systems. In: Proceedings of CSCW ’96, pp 67–76

  18. Kindberg T, Sellen A, Geelhoed E (2004) Security and trust in mobile interactions: a study of users' perceptions and reasoning UBICOMP 2004, Nottingham, UK, September 2004

  19. Lash S, Urry J (1994) Economies of signs and space. Sage, London

    Google Scholar 

  20. Luhmann N (1990) Familiarity, confidence, trust: problems and Alternatives. In: Gambetta D (ed) Trust: making and breaking co-operative relations, electronic edition. Department of Sociology, University of Oxford, chap 6, pp 94–107. http://www.sociology.ox.ac.uk/papers/luhmann94-107.pdf

  21. Mackenzie A (2008) Wirelessness as experience of convergence Fibreculture Issue 13 http://journal.fibreculture.org/issue13/issue13_mackenzie_print.html

  22. Mynatt E, O’Day V, Adler A, Ito M (1998) Network communities: something old, something new, something borrowed …. Comput Support Coop Work 7(1–2):123–156

    Google Scholar 

  23. Petersen SM (2007) Mundane cyborg practice: material aspects of broadband Internet use. Convergence: Int J Res New Media Technol 13(1):79–91

    Article  Google Scholar 

  24. Silverstone R, Haddon L (1996) Design and the domestication of information and communication technologies: technical change and everyday life. In: Silverstone R, Mansell R (eds) Communication by design: the politics of information and communication technologies. Oxford University Press, Oxford

  25. Silverstone R, Hirsch E, Morley D (1992) Information and communication technologies and the moral economy of the household. In: Silverstone R, Hirsch E (eds) Consuming technologies. Media and information in domestic spaces. Routledge, London

  26. Silverstone R (1994) Television and everyday life. Routledge, London

  27. Stewart J, Williams R (2005) The wrong trousers? Beyond the design fallacy: social learning and the user. Reprinted in Howcroft et al (eds) Critical IT handbook. Edward Elgar, Cheltenham, pp 195–221

  28. Taylor N, Cheverst K. Fitton D, Race N, Rouncefield M, Graham C (2007) ‘Probing communities: study of a village photo display. In: Proceedings of OzCHI 2007, pp 17–24

  29. Tönnies F (1988) Community & society: gemeinschaft and gesellschaft. Transaction Publishers, Edison

    Google Scholar 

  30. Wellman B (1999) From little boxes to loosely-bounded networks: the privatization and domestication of community. In: Abu-Lughod J (ed) Sociology for the 21st century: continuities and cutting edges. University of Chicago Press, Chicago

  31. Wellman B, Haase AQ, Witte J, Hampton K (2001) Does the Internet increase, decrease, or supplement social capital? Social networks, participation, and community commitment. Am Behav Sci 45(3):436–455

    Article  Google Scholar 

Download references

Acknowledgments

Paul Smith’s research was supported by Telekom Austria AG. The authors are grateful to the members of the Wray village community that took part in this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara Bury.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bury, S., Ishmael, J., Race, N.J.P. et al. Designing for social interaction with mundane technologies: issues of security and trust. Pers Ubiquit Comput 14, 227–236 (2010). https://doi.org/10.1007/s00779-009-0257-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-009-0257-0

Keywords

Navigation