Personal and Ubiquitous Computing

, Volume 14, Issue 3, pp 227–236 | Cite as

Designing for social interaction with mundane technologies: issues of security and trust

  • Sara Bury
  • Johnathan Ishmael
  • Nicholas J. P. Race
  • Paul Smith
Original Article


This paper documents some of the socio-technical issues involved in developing security measures for wireless mesh networks (WMNs) that are deployed as part of a community network. We are interested in discovering whether (and exactly how) everyday social interaction over the network is affected by security issues, and any consequent design implications. We adopt an interdisciplinary methodological approach to requirements, treating a community as an ‘organization’ and implementing an approach, OCTAVE, originally designed to uncover security elements for organizations. Using a focus group technique we chart some of the assets and security concerns of the community, concerns that need to be addressed in order for WMNs, or indeed any network, to become a truly ‘mundane technology’.



Paul Smith’s research was supported by Telekom Austria AG. The authors are grateful to the members of the Wray village community that took part in this research.


  1. 1.
    Agre P (1999) Rethinking networks and communities in a wired society. American Society for Information Science, Pasadena, May 1999Google Scholar
  2. 2.
    Alberts C, Behrens S, Pethia R, Wilson W (1999) Operationally critical threat, asset, and vulnerability evaluation framework, version 1.0. Technical Report CMU/SEI-99-TR-017, Carnegie Mellon University, June 1999Google Scholar
  3. 3.
    Anderson J (2008) What is the LocustWorld Meshbox?
  4. 4.
    Annison L (2006) JFDI Community broadband: Wennington. Digital Dales Ltd, November 2006Google Scholar
  5. 5.
    Bauman Z (2001) Community: seeking safety in an insecure world. Polity, LondonGoogle Scholar
  6. 6.
    Becker H (1953) Becoming a marihuana user’. J Sociol 59:235–242Google Scholar
  7. 7.
    Besnard D, Arief B (2004) Computer security impaired by legitimate users. Comput Secur 23(3):253–264Google Scholar
  8. 8.
    Borgmann A (1984) Technology and the character of contemporary life. University of Chicago Press, ChicagoGoogle Scholar
  9. 9.
    Castells M (2000) The information age: economy, society and culture. Blackwell, OxfordGoogle Scholar
  10. 10.
    Castells M (2000) Materials for an exploratory theory of the network society. Br J Sociol 51(1):5–24CrossRefGoogle Scholar
  11. 11.
    Dourish P, Anderson K (2006) Collective information practice: exploring privacy and security as social and cultural phenomena. Hum Comput Interact 21:319–342CrossRefGoogle Scholar
  12. 12.
    Dourish P, Grinter R, Delgado de la Flor J, Jospeh M (2004) Security in the wild: user strategies for managing security as an everyday, practical problem. Pers Ubiquitous Comput 8(6):19–30CrossRefGoogle Scholar
  13. 13.
    Edwards W, Poole E, Stoll J (2007) Security automation considered harmful? In: Proceedings of the IEEE new security paradigms workshop (NSPW 2007), White Mountain, New Hampshire, September 18–21, 2007Google Scholar
  14. 14.
    Fleck J (1988) Innofusion or diffusation? The nature of technological development in robotics. Edinburgh PICT working paper no. 7. Edinburgh University, EdinburghGoogle Scholar
  15. 15.
    Fleck J (1988) Innofusion or diffusation: the nature of technological development in robotics. Edinburgh PICT working paper no. 4. Edinburgh University, EdinburghGoogle Scholar
  16. 16.
    Friedman B, Hurley D, Howe DC, Felten E, Nissenbaum H (2002) Users’ conceptions of web security: a comparative study. In: Proceedings of CHI 2002, Minneapolis, Minnesota, 2002, pp 746–747Google Scholar
  17. 17.
    Harrison S, Dourish P (1996) Re-place-ing space: the roles of place and space in collaborative systems. In: Proceedings of CSCW ’96, pp 67–76Google Scholar
  18. 18.
    Kindberg T, Sellen A, Geelhoed E (2004) Security and trust in mobile interactions: a study of users' perceptions and reasoning UBICOMP 2004, Nottingham, UK, September 2004Google Scholar
  19. 19.
    Lash S, Urry J (1994) Economies of signs and space. Sage, LondonGoogle Scholar
  20. 20.
    Luhmann N (1990) Familiarity, confidence, trust: problems and Alternatives. In: Gambetta D (ed) Trust: making and breaking co-operative relations, electronic edition. Department of Sociology, University of Oxford, chap 6, pp 94–107.
  21. 21.
    Mackenzie A (2008) Wirelessness as experience of convergence Fibreculture Issue 13
  22. 22.
    Mynatt E, O’Day V, Adler A, Ito M (1998) Network communities: something old, something new, something borrowed …. Comput Support Coop Work 7(1–2):123–156Google Scholar
  23. 23.
    Petersen SM (2007) Mundane cyborg practice: material aspects of broadband Internet use. Convergence: Int J Res New Media Technol 13(1):79–91CrossRefGoogle Scholar
  24. 24.
    Silverstone R, Haddon L (1996) Design and the domestication of information and communication technologies: technical change and everyday life. In: Silverstone R, Mansell R (eds) Communication by design: the politics of information and communication technologies. Oxford University Press, OxfordGoogle Scholar
  25. 25.
    Silverstone R, Hirsch E, Morley D (1992) Information and communication technologies and the moral economy of the household. In: Silverstone R, Hirsch E (eds) Consuming technologies. Media and information in domestic spaces. Routledge, LondonGoogle Scholar
  26. 26.
    Silverstone R (1994) Television and everyday life. Routledge, LondonGoogle Scholar
  27. 27.
    Stewart J, Williams R (2005) The wrong trousers? Beyond the design fallacy: social learning and the user. Reprinted in Howcroft et al (eds) Critical IT handbook. Edward Elgar, Cheltenham, pp 195–221Google Scholar
  28. 28.
    Taylor N, Cheverst K. Fitton D, Race N, Rouncefield M, Graham C (2007) ‘Probing communities: study of a village photo display. In: Proceedings of OzCHI 2007, pp 17–24Google Scholar
  29. 29.
    Tönnies F (1988) Community & society: gemeinschaft and gesellschaft. Transaction Publishers, EdisonGoogle Scholar
  30. 30.
    Wellman B (1999) From little boxes to loosely-bounded networks: the privatization and domestication of community. In: Abu-Lughod J (ed) Sociology for the 21st century: continuities and cutting edges. University of Chicago Press, ChicagoGoogle Scholar
  31. 31.
    Wellman B, Haase AQ, Witte J, Hampton K (2001) Does the Internet increase, decrease, or supplement social capital? Social networks, participation, and community commitment. Am Behav Sci 45(3):436–455CrossRefGoogle Scholar

Copyright information

© Springer-Verlag London Limited 2009

Authors and Affiliations

  • Sara Bury
    • 1
  • Johnathan Ishmael
    • 1
  • Nicholas J. P. Race
    • 1
  • Paul Smith
    • 1
  1. 1.Computing DepartmentLancaster UniversityLancasterUK

Personalised recommendations