Wireless broadband networks for home environment present us with many challenges unfamiliar in more public settings. At home, we encounter the end-users with little ICT experience. Probably among the most challenging members of the home network are the elderly, who may have demanding needs for ensuring accessibility. Either living in a joined community as in a home for the elderly or at home on their own, the possibility to have a remote connection to the homes of their extended family may become important by e.g. decreasing mobility. Interconnectivity between various heterogeneous networks across multiple homes means for example situations where the family shares a photo album or web server with various pieces located at different homes. In this paper, we identify usability challenges presented by internetworking multiple homes, with a special focus on universal accessibility.


Home networks accessibility usability user interface design security accessibility authentication 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Dourish, P., Grinter, R.E., de la Flor, D., Joseph, M.J.: Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem. Journal of Personal and Ubiquitous Computing 8(6), 391–401 (2004)CrossRefGoogle Scholar
  2. 2.
    Edwards, W.K., Grinter, R.E.: At Home with Ubiquitous Computing: Seven Challenges. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) Ubicomp 2001: Ubiquitous Computing. LNCS, vol. 2201, pp. 256–272. Springer, Heidelberg (2001)Google Scholar
  3. 3.
    Grinter, R.E., Edwards, W.K., Newman, M.W., Ducheneaut, N.: The Work to Make the Home Network Work. In: Proceedings of the 9th European Conference on Computer Supported Cooperative Work (ECSCW ’05). Paris, France, pp. 469–488(September 18-22, 2005)Google Scholar
  4. 4.
    Grinter, R.E., Palen, L., Eldridge, M.: Chatting with teenagers: Considering the place of chat technologies in teen life. ACM Trans. Comput.-Hum. Interact. 13(4), 423–447 (2006)CrossRefGoogle Scholar
  5. 5.
    Horrigan, J., Rainie, L.: The Broadband Difference: How online Americans’ behavior changes. with high-speed Internet connections at home. In: The Pew Internet Project,
  6. 6.
    Koskela, T., Väänänen-Vainio-Mattila, K.: Evolution towards smart home environments: empirical evaluation of three user interfaces. Personal Ubiquitous Comput 8(3-4), 234–240 (2004)Google Scholar
  7. 7.
    Kostiainen, K., Rantapuska, O., Moloney, S., Roto, V., Holmström, U., Karvonen, K.: Usable Access Control inside Home Networks (submitted, 2007)Google Scholar
  8. 8.
    Kraut, R., Mukhopadhyay, T., Szczypula, J., Kiesler, S., Scherlis, W.: Information and communication: Alternative uses of the internet in households. Inf. Syst. Res. 10(4), 287–303 (1999)CrossRefGoogle Scholar
  9. 9.
    Livinsgstone, S.: Young People and New Media: Childhood and the Changing Media Environment. Sage Press, London (2002)Google Scholar
  10. 10.
    Reeves, B., Nass, C.: The Media Equation. Cambridge Univ. Press, Cambridge (1996)Google Scholar
  11. 11.
    Norman, D.: Emotional Design: Why We Love (Or Hate) Everyday Things. Basic Books (2004)Google Scholar
  12. 12.
    Turow, J., Kavanaugh, A.L. (eds.): The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. MIT Press, Cambridge (2003)Google Scholar
  13. 13.
    Uzun, E., Karvonen, K., Asokan, N.: Usability Analysis of Secure Pairing Methods. In: Proceedings of Usable Security (USEC’07), Trinidad&Tobago, a workshop co-located with The Eleventh Conference on Financial Cryptography and Data Security (FC’07), February 15–16, 2007. LNCS, Springer, Heidelberg (2007)Google Scholar
  14. 14.
    Valkonen, J., Toivonen, A., Karvonen, K.: Usability Testing for Secure Device Pairing in Home Networks (submitted, 2007)Google Scholar
  15. 15.
    Wellman, B., Haythornthwaite, C. (eds.): The Internet in Everyday Life. Blackwell Press, Oxford (2002)Google Scholar
  16. 16.
    Whitten, A., Tygar, J.D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium (August 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Kristiina Karvonen
    • 1
  1. 1.Department of Computer Science, Helsinki University or Technology, P.O.Box 5400, 02015-TKKFinland

Personalised recommendations