Advertisement

Introduction

  • Holger SchnädelbachEmail author
  • David Kirk
Chapter
Part of the Springer Series in Adaptive Environments book series (SPSADENV)

Abstract

Personal data is increasingly important in our lives. We use personal data to quantify our behaviour, through health apps or for ‘personal branding’ and we are also increasingly forced to part with our data to access services. With a proliferation of embedded sensors, the built environment is playing a key role in this developing use of data, even though this remains relatively hidden. Buildings are sites for the capture of personal data. This data is used to adapt buildings to people's behaviour, and increasingly, organisations use this data to understand how buildings are occupied and how communities develop within them. A whole host of technical, practical, social and ethical challenges emerge from this still developing area across interior, architectural and urban design, and many open questions remain. This book makes a contribution to this on-going discourse by bringing together a community of researchers interested in personal informatics and the design of interactive buildings and environments. The book’s aim is to foster critical discussion about the future role of personal data in interactions with the built environment.

Keywords

Personal data Adaptive architecture Built environment Human Building Interaction GDPR 

References

  1. Aarts E, Grotenhuis F (2011) Ambient intelligence 2.0: towards synergetic prosperity. J Ambient Intell Smart Environ 3 (1):3-11Google Scholar
  2. Alavi HS (2018) Call for papers-human-building interaction. ACM Press, https://tochi.acm.org/human-building-interaction/. Accessed 3 July 2018
  3. Alavi HS, Lalanne D, Nembrini J, Churchill E, Kirk D, Moncur W (2016) Future of human-building interaction. Paper presented at the proceedings of the 2016 CHI conference extended abstracts on human factors in computing Systems, San Jose, California, USAGoogle Scholar
  4. Banham R (1969) The architecture of the well-tempered environment. University of Chicago Press, ChicagoGoogle Scholar
  5. Beesley P, Khan O (2009) Responsive architecture/ performing instruments. Situated Technologies Pamphlets 2 (4)Google Scholar
  6. Bell G, Dourish P (2007) Yesterday’s tomorrows: notes on ubiquitous computing’s dominant vision. Pers Ubiquit Comput 11(2):133–143CrossRefGoogle Scholar
  7. Bullivant L (ed) (2005) 4dspace: Interactive architecture. Architectural design. Wiley-AcademyGoogle Scholar
  8. Cook DJ, Das SK (2012) Pervasive computing at scale: transforming the state of the art. Pervasive Mob Comput 8(1):22–35.  https://doi.org/10.1016/j.pmcj.2011.10.004CrossRefGoogle Scholar
  9. Council of the European Union (2016) General data protection regulation. Council of the European Union, Brussels, BelgiumGoogle Scholar
  10. Fox MA, Kemp M (2009) Interactive architecture. Princeton Architectural Press, New YorkGoogle Scholar
  11. Harper R (2003) Inside the smart home. Springer, London, New YorkCrossRefGoogle Scholar
  12. Hsu J (2018) The Strava heat map and the end of secrets. Wired. Accessed 26/06 2018Google Scholar
  13. Jäger N, Schnädelbach H, Hale J, Kirk D, Glover K (2017) Reciprocal control in adaptive environments. Interacting with Computers:1–18Google Scholar
  14. Kindberg T, Chalmers M, Paulos E (2007) Urban computing. IEEE Pervasive Comput 6(3):18–20CrossRefGoogle Scholar
  15. Kitchin R, Dodge M (2011) Code/space: software and everyday life. MIT PressGoogle Scholar
  16. Lupton D (2016) The quantified self: a sociology of self-tracking. Polity, Cambridge, UKGoogle Scholar
  17. McCullough M (2004) Digital ground: architecture, pervasive computing, and environmental knowing. MIT Press, Cambridge, MassGoogle Scholar
  18. Nam T, Pardo TA (2011) Conceptualizing smart city with dimensions of technology, people, and institutions. Paper presented at the Proceedings of the 12th annual international digital government research conference: digital government innovation in challenging times, College Park, Maryland, USAGoogle Scholar
  19. Narayanan A, Shmatikov V Robust de-anonymization of large sparse datasets. In: IEEE symposium on security and privacy, Oakland, USA, 2008 2008. IEEE, pp 111–125.  https://doi.org/10.1109/sp.2008.33
  20. Nicholls S (2018) The facebook data leak: what happend and what’s next. Euronews. http://www.euronews.com/2018/04/09/the-facebook-data-leak-what-happened-and-what-s-next. Accessed 20/06 2018
  21. O’Brien L (2018) The human-building interaction lab. Carleton University. https://carleton.ca/hbilab/. Accessed 3 July 2018 2018
  22. Randall T (2015) The Edge is the greenest, most intelligent building in the world. Bloomberg businessweek. https://www.bloomberg.com/features/2015-the-edge-the-worlds-greenest-building/. Accessed 21/06 2018
  23. Reeves S (2012) Envisioning ubiquitous computing. Paper presented at the proceedings of the SIGCHI conference on human factors in computing systems, Austin, Texas, USAGoogle Scholar
  24. Schnädelbach H (2010) Adaptive architecture-a conceptual framework. Paper presented at the MediaCity, Weimar, GermanyGoogle Scholar
  25. Schnädelbach H, Arieyanto H (2018) Movement-based co-creation of adaptive architecture. In: Bier H (ed) Robotic architecture, SpringerGoogle Scholar
  26. Schnädelbach H, Glover K, Irune A (2010) ExoBuilding - breathing life into architecture. Paper presented at the NordiCHI, Reykjavik, IcelandGoogle Scholar
  27. Schnädelbach H, Irune A, Kirk D, Glover K, Brundell P (2012) ExoBuilding: physiologically driven adaptive architecture. ACM Trans Comput Hum Interac (TOCHI) 19(4):1–22.  https://doi.org/10.1145/2395131.2395132CrossRefGoogle Scholar
  28. Shepard M (2011) Sentient city: ubiquitous computing, architecture, and the future of urban space. MIT Press, Cambridge, USAGoogle Scholar
  29. Streitz NA, Geißler J, Holmer T (1998) Roomware for cooperative buildings: integrated design of architectural spaces and information spaces. In: International workshop on cooperative buildings, Springer, pp 4–21Google Scholar
  30. Suchman LA (1987) Plans and situated actions: the problems of human machine communication. Cambridge University Press, CambridgeGoogle Scholar
  31. Techworld Staff (2018) The most infamous data breaches. IDG. https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/. Accessed 20/06 2018
  32. Thomsen MR (2008) Robotic membranes - exploring a textile architecture of behaviour. Protoarchitecture - analogue and digital hybrids, vol 78. Architectural Design. John Wiley & Sons, London, pp 92–97Google Scholar
  33. Weiser M (1991) The Computer for the twenty-first century. Sci Am 265(3):94–104CrossRefGoogle Scholar
  34. Williams A, Dourish P (2006) Imagining the city: the cultural dimensions of urban computing. Computer 39(9):38–43.  https://doi.org/10.1109/mc.2006.313CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Mixed Reality LaboratoryUniversity of NottinghamNottinghamUK
  2. 2.Northumbria University School of Computer & Information ScienceNewcastleUK

Personalised recommendations