ArticlePDF Available

The Internet of Things and Convenience

Authors:

Abstract

Purpose – This study explores and engages with connections between the evolving technology of the Internet of Things and notions of convenience. In particular, the concept of alpha convenience is introduced in order to articulate the broad scope of Internet “any-everything” connectivity, here called “alpha convenience”. Design/methodology/approach – The recommendations of Constructive Technology Assessment are followed in order to evaluate technology before implementation. The seven value drivers articulated by Fleisch (2010) are utilized in order to envision specific aspects. Findings – Three critical aspects relating to alpha convenience are identified and discussed: gossiping technology, personalization and the disempowered smartphone user. It is argued that extreme forms of convenience shift traditional areas of human agency onto technology. It is also noted that alpha convenience tends to develop as ubiquitous feature of future society, making it difficult, if not impossible, to opt out. Research limitations – The article focuses on one powerful concept, although the Internet of Things is merely one of several terms used to deliberate the role of next-generation information technology and society. Notable competitors include semantic web, ubiquitous computing, pervasive computing, and ambient intelligence. Social Implications – The Internet of Things is predicted to be an intrusive feature into everyday life and the article identifies important aspects. Originality/value – This is the first critical discussion of the Internet of Things and convenience. The article aims at conceptual innovation. Overall, there is a substantial lack of critical scrutiny of the emerging ideas of the Internet of Things.
1
Draft version of article published in Internet Research. Full reference:
Nolin, J. & Olson, N. (2016)."The Internet of Things and convenience", Internet Research, 26(2), 360-376.
DOI http://dx.doi.org/10.1108/IntR-03-2014-0082
The Internet of Things and Convenience
Jan Nolin and Nasrine Olson
Abstract
Purpose This study explores and engages with connections between the evolving technology of the Internet of
Things and notions of convenience. In particular, the concept of alpha convenience is introduced in order to
articulate the broad scope of Internet “any-everything”connectivity, here called “alpha convenience”. .
Design/methodology/approach The recommendations of Constructive Technology Assessment are followed
in order to evaluate technology before implementation. The seven value drivers articulated by Fleisch (2010) are
utilized in order to envision specific aspects.
Findings Three critical aspects relating to alpha convenience are identified and discussed: gossiping
technology, personalization and the disempowered smartphone user. It is argued that extreme forms of
convenience shifts traditional areas of human agency onto technology. It is also noted that alpha convenience
tends to develop as ubiquitous features of future society, making it difficult, if not impossible, to opt out.
Research limitations The article focuses on one powerful concept although the Internet of Things is merely
one of several terms used to deliberate the role of next-generation information technology and society. Notable
competitors are ubiquitous computing, pervasive computing, semantic web and digital living.
Social Implications The Internet of Things is predicted to be an intrusive feature into everyday life and the
article identifies important aspects.
Originality/value This is the first critical discussion of the Internet of Things and convenience. The article
aims at conceptual innovation. Overall, there is a substantial lack of critical scrutiny of the emerging ideas of the
Internet of Things.
Keywords Internet of Things, convenience, alpha convenience, value drivers, ubiquitous computing,
pervasive computing, silent gossip, personalization
Paper type Conceptual paper
Introduction
The Disney/Pixar movie Wall-E (2008) presents a future scenario with people permanently docked into
mobile entertainment modules. Everything in their lives is handled by computers. Clearly, this is
convenience gone too far. But when, really, is it too much for our own good?
In this article we highlight a number of vital issues that tend to be ignored in the dominant technological
discussions related to the vision of Internet of Things. Although convenience as a concept is not
excessively highlighted in texts on the Internet of Things, it holds a paradigmatic status. There is an
implicit idea that our things can be made to serve us much better. Dohr et al. (2010: 804) argue that the
Internet of Things is a development of the previous notions of ubiquitous computing, pervasive computing
2
and ambient intelligence. With such progress, there is a vital development as the earlier familiar
dimensions of the common Internet from anytime, anyplace connectivity for anyone are supplemented
by the dimension anything.
The metaphor is taken further by Sundmaeker et al. (2010: 44) informing us that: The Internet of Things
allows people and things to be connected Anytime, Anyplace, with Anything and Anyone, ideally using
Any path/network and Any service. Such visions of “any-everything” connectivity, hereafter termed alpha
convenience, constitute powerful formulations of convenient technology. These are also seductive visions:
Who wouldn't want ever-present supersmart tools making all aspects of life easier? Still, we should ask: are
there limits to how convenient we can become? How distant is the vision of alpha convenience to that of
Wall-E? Does alpha convenience imply that computers will move in and take over essential human and
social skills? At which points do we become so dependent on our personal information technology that we
cannot function without it?
Discussions on the Internet of Things usually seem to treat convenience as something unproblematic in the
sense that it is always beneficial (e.g. Thompson, 2005; Sundmaeker, et al., 2010). In other words, if we
can identify areas of human action where we can alleviate and create more efficiency, then there are no
problems in producing such technology. One argument against this position is that all personal
development involves effort, friction and overcoming difficulties. When we stop struggling with certain
tasks, we eventually stagnate in those areas. Taken to its extreme, supplying convenience makes work into
something that machines, not humans, do.
The aim with this article is to introduce the concept and critical perspective of alpha convenience, outlining
critical issues that need to be considered and scrutinized. In the current text, we will first introduce the
theoretical context of Constructive Technology Assessment (CTA) a proactive approach to evaluating
technology before implementation. Following this, we will touch upon the concept of Internet of Things
and other associated terms. We will also review earlier critical reflections. After a presentation of seven
value drivers articulated by Fleisch (2010), the article will continue with a discussion on three fundamental
aspects of alpha convenience. The concluding discussion is concerned with the possibilities of opting out of
alpha convenience.
Constructive Technology Assessment
Constructive Technology Assessment (CTA) should be understood as a proactive approach in contrast to
conventional Technology Assessment (TA) (Genus, 2006; Rip, Misa, and Schot, 1995; Schot, 1992; Schot
and Rip, 1996). While TA deals with retrospective assessments of technology, CTA attempts strategic
intervention. Although the impact of technology cannot be fully foreseen, some trends and consequences
can be anticipated. Such foresight is valuable in both public debate, which potentially could guide
implementation (Rip, 2001), and policy formulations, which determine the path for future directions. The
underpinning idea is that the implications are too broad for technological development to be left solely in
the hands of technologists. These are commonly concerned with the production of functional devices,
which nevertheless, as a byproduct, construct societal instruments and, indeed, contribute to future societal
states, hence, the need for the engagement from social scientists.
There are two ways in which the project of engaging with Internet of Things is considerably easier than
with most cases of CTA. First, many involved technological researchers are overtly creating social
scenarios. This simplifies the task of social sciences, as there is less need to start from scratch in
speculating the implied social agendas involved. Second, mobile Internet technology has received a
3
breakthrough in recent years. It is therefore easily understandable to a large public. Furthermore, many
citizens are concerned about issues of usability and are therefore likely to become readily engaged. Alpha
convenience is an issue of substantial societal significance and critical discussions should involve and
generate adequate public response.
The Internet of Things and similar concepts
The Internet of Things, probably coined in 1999 (Ashton, 2009) was initially little more than an adoption of
ubiquitous computing to the technology of the Internet. With time, this notion has been considerably
broadened. The original interpretation referred to the opportunity to identify objects with radio tags or
barcodes. This enabled an aggregation of Internet catalogues allowing one to see where any individual
object is situated. Although that remains the core meaning of the Internet of Things, as discussed later in
the article, the concept has since been expanded to include both the opportunities of technological
development and parallel visions brought forward through other concepts.
In the simplest terms, the Internet of Things seems to envisage a society where all members have access to
a full-fledged Internet environment populated by self-configuring, self-managing, smart technology
anytime and anywhere. Implicitly, the driving force for this expansive technology is to facilitate practices,
increasing convenience. As defined by Sundmaeker, et al. (2010: 41) Internet of Things (IoT) is a dynamic
global network infrastructure with self configuring capabilities based on standard and interoperable
communication protocols where physical and virtual ‘things’ have identities, physical attributes, and virtual
personalities and use intelligent interfaces, and are seamlessly integrated into the information network.
Similar concepts have appeared since the second half of 1990s, becoming increasingly relevant in recent
years. The most prolific concepts have clearly been ubiquitous computing (Weiser, 1991, 1993a, 1993b,
1995), pervasive computing (Satyanarayanan, 2001) and semantic web (Berners-Lee, Hendler, and Lassila,
2001). Other concepts have also been suggested, outlining similar scenarios, such as ambient intelligence
(Zelkha and Epstein, 1998) and the Internet of people and things (Townsend, 2011). These concepts refer
to a multitude of ideas that in different ways renegotiate affordances of social structure and activity. Each
of these terms has its own specificity. Some terms, such as the Ubiquitous Web (Billsus, Brunk, Evans,
Gladish, and Pazzani, 2002), Digital Living and Web of Things (Guinard and Trifa, 2009) have been around
for some time without catching on.
The Internet of Things, focused in this article, has been promoted by European policymakers, for instance
in the European framework program on the Future Internet. As this concept embraces a number of
technological visions that were earlier held apart, it becomes easier for the social scientist to form an
understanding of where the current technological trajectories are leading society. It also becomes easier to
argue for the vital emergence of non-technological perspectives. However, these ideas have met with scant
criticism from social scientists. This is quite alarming since technologists are taking on the role of social
engineers, thereby bypassing politics, the public sphere and social sciences.
In their promotion of the Internet of Things, the EU policymakers emphasizes that devices and tags can
interact with the environment and send the information to other objects through machine to machine
communication (The Council of Europe, 2009: 7). In strategic documents (Commision of The European
Communities, 2008, 2009) a number of smart concepts are suggested:
Seamless connection of devices
Intelligent cars
4
Machine to machine communication
Smart buildings
Things-to-person communication
Thing-to-thing communication
etc.
Several applications in this area has already been implemented, such as IoT Based Smart Rehabilitation
System (Fan et al., 2014) and manufacturing service systems (Tao et al., 2014).
Sundmaeker et al. (2010) categorises the things in a hierarchy of five domains. At the lowest level,
domain 1, there are real world entities or virtual entities that communicate with each other and with
infrastructure. At domain 2, things can compete with other things regarding resources and services. They
can be equipped with sensors and therefore interact with the environment. Higher up, at domain 3, they can
communicate and collaborate with other things and create groups or networks. More power is given to
things at domain 4, at which level they are considered autonomous. Here they can negotiate and adapt to
their environment, they can also extract information and patterns from environment. They are expected to
be able to learn, take decisions and reason. At the highest level, domain 5, things are capable of self-
replication, controlling, creating, managing and even destroying other things.
The current article builds on a reading of literature surrounding the Internet of Things. There is a heavy
technological emphasis within the literature devoted to that concept. Nevertheless, as it has been adopted as
the formative concept for the European Union research programme Future Internet, it becomes easier for
the social scientist to identify technological agendas connected to concrete political goals. The most central
texts for our understanding of the Internet of Things and alpha convenience can be found in this context.
In the Internet of Things, users are seen as socially active in a number of contexts, in various roles and
utilizing different tools in various contexts. Crucially, Internet technology will be layered with artificial
intelligence that serves to support each task with the appropriate set of resources: things. In order to
maximize functionality, devices and web applications will be in constant dialogue, in practice fine-tuning
personalization and alpha convenience.
Earlier critical reflections
The Internet of Things and associated concepts, mentioned above, have met limited criticism. Most scrutiny
has been directed toward ubiquitous computing but even this has been surprisingly sparse. The brunt of the
literature has been situated in the technological realm, i.e. working to manifest technological visions. The
First International Conference on the Internet of Things, held in 2008 was one of the very first attempts to
invite papers that addressed non-technical topics, however, this invitation was met with rather low
number of submissions (Jakobs and Williams, 2008). In the same year, van Kranenburg (2008) wrote a
general critical discussion of RFID tags connected to ambient intelligence.
The wealth of alternative concepts has not helped the evolution of critical reflection. Instead, criticism has
been fragmented, targeting different concepts. In addition, critical perspectives have come from a variety of
disciplines and approaches, often without any reference to each other. It is one of the ambitions of this
article to attract attention to this broad topic of investigation. Bohn et al. (2003) summarized some of the
early critical texts as belonging to three broad categories: vision, effects and man/technology. Typically,
then, one of the main criticisms has been that the vision is too vague. This technological concern has been
considerably lessened with time and the articulation of alpha convenience is specific enough to invite
5
critical scrutiny. At the outset of the 2010s, we can clearly see a number of technologies converging as a
new form of information architecture surrounding the individual, discussed by Papacharissi (2010) and
Turkle (2012). However, reflections on the aggregated social effects of social media, cloud computing,
smartphones and heterogeneous computing are still minimal. Although not specifically concerned with the
Internet of Things, there is a growing literature on what can be called critical social media studies that is
highly relevant for the purpose of this article (Lovik, 2011; Van Dijck, 2013; Fuchs, 2014).Another vital
theme is a criticism of the way technology is turning humans into cyborgs (Araya, 1995). This area of
technological criticism is also aimed at other targets beyond that of ubiquitous computing and the Internet
of Things (Haraway, 1991; Greenfield, 2003; Lanier, 2010).
Otherwise, the main theme in the critical literature has been the violation of privacy (Araya, 1995; Talbott,
2000a, 2000b, 2000c). These texts raise some general issues of personal integrity. Until recently, it was not
possible to discern the future mechanisms of privacy intrusion. The works of Andrejevic (2007) Solove
(2007) and, more recently, Bauman and Lyon (2013) mark a turning point in this area. A specific genre of
ubiquitous computing research is that of wearable interface, certainly among our most important things.
This focus tends to highlight the potential for surveillance and this discussion has led to articulation of a
related concept: sousveillence (Mann, Nolan, and Wellman, 2003) or subveillance (Fuchs, 2011).
In an ambitious attempt to investigate the future of the Internet of Things, Pew Research Center (2014)
queried 1,867 experts and stakeholders on diverse viewpoints about the situation in the year 2025. There
were broad agreement about widespread beneficial effects during the next decade although there were a
number of criticisms as well. In case of the latter, the main emphasis was loss of individual privacy but also
concerns about digital divides (the plight of nonusers and developing countries). One problem discussed at
some length was that we might see the evolution of so complex networks that many functions came in
conflict with each other.
The value drivers of the Internet of Things
The obvious challenge for CTA is that technologists seldom are concerned with larger societal visions. For
the current article, we are indebted to the work of Fleisch (2010), which has served to pinpoint various
specific usages of the Internet of Things. In his article, Fleisch (2010) presents seven value drivers that the
Internet of Things can contribute to business processes. In the following, we will review these in order to
clarify how specific forms of increased convenience can be developed.
1) Simplified manual proximity trigger
Smart things can communicate their identification number to other things in their proximity. Fleisch notes
that this proximity trigger allows instant transactions, payment or validity checks automatically, without
human agency. It helps them to save time, to gain independence via self-serving, and finally to increase
their perceived convenience (2010: 8). From our perspective, this is a crucial element of alpha
convenience, as the things are constantly and unobtrusively talking to each other in the background. In his
early thinking about ubiquitous computing Weiser (1991) aspired to create technologies that disappeared in
the background, weaving themselves into the fabric of everyday life, becoming invisible. This is originally
a humanist idea as the computer is in the background, technology quietly serving the living. However, with
the recent development of machine-to-machine communication this seems to be a vision with some
problems. The proximity trigger also tends to shorten the time that humans have for mulling over a
6
decision. This type of convenience reduces a typical process of buying into an instant interaction. The
effort of reaching for a wallet and perhaps selecting an appropriate credit card is taken away from us.
2) Automatic proximity trigger
This is a service that can be triggered when two things come into proximity with each other. For instance,
when car and key are close enough, the door is unlocked and opened. Similarly, proximity triggers can
support people with work instructions, for instance with augmented reality, when they approach different
machines on an assembly line. Fleisch notes that this can eliminate almost any manual information
processing on the shop floor (2010: 9). However, this kind of convenience tends to take memory and
evaluation functions away from humans. Moreover, the development of human skills is result of processes
of learning through trial and error and convenient technology might allow us to bypass whole segments of
difficulties. Processes that usually underpin serendipity and creativity may also be seen to be at risk
here.Morozov (2013) scrutinizes numerous attempts of implementing this strategy into the kitchens of
restaurants, keeping tabs on chefs adhering to the precise specifications of recipes. The quest here is to
turn the modern kitchen into a temple of modern-day Taylorism, with every task tracked, analyzed, and
optimized... That cooking thrives on failure and experimentation, that deviating from recipes is what
creates culinary innovations and pushes a cuisine forward, is discarded as whimsical and irrelevant
(Morozov 2013: 11). Clearly, it is important to counter tendencies of automatic proximity triggers leading
to Taylorism.
3) Automatic sensor triggering
With this service, things can sense data from their environment and this triggers various activities. This can
alleviate the active work of people in sensing various processes around them. As the sensors (senses) of
things can communicate with each other, the Internet of Things can measure the world in detail at
reasonable cost... serves as a network of sensors for far more senses than those of human beings. And it can
do so continually, at a ridiculously high resolution, and across the globe (Fleisch 2010: 9). The human
faculties of sight, hearing, smell, taste and touch may all be inferior to the sensors of our things, particularly
if these are connected in large-scale networks and self-monitoring algorithms. How can we compete with
that? Furthermore, this kind of convenience allows us to hand over the caretaking of environments to
technology. There is a potential for people to rely less on their own warning systems. For instance, we may
be warned when stepping into an area with a statistically high level of crime or when we come into
proximity to people who in one way or another are sensed to have criminal history or behavior. In practice
we are enticed to rely more on technology than on our own instincts.
4) Automatic product security
Fleisch notes that all fakes are shallow (2010: 10), i.e., the Internet of Things can be used to keep track of
certified products by brands and obstruct all business of counterfeits. We find here a potential of totally
wiping out the black market. As a consequence, the stamp of authenticity is no longer given by experts but
by a certain position in the order of things. We no longer have any choice but to surround ourselves with
100% legal products. However, intellectual property rights are extremely difficult to navigate. Will the
sensors around me alert the police if I make my own T-shirt as a parody of a work of art or a major brand
logo? Or will we program our product security things to be generous and make certain allowances?
5) Simple and direct user feedback
7
The Internet of things will also supply simple feedback to the user to affirm or reassure us that a certain
trigger has been activated. This can be in the form of a beep when swiping a card. The signal has two
modes: confirmation or silence. Essentially, this is a machine to human interaction that replaces people to
people interplay. This can eliminate countless everyday situations where we otherwise would have trivial
small talk with a person representing a customer service. It certainly is convenient and effective, but
strengthens the contemporary trend of humans having more and more interaction with machines and using
devices as an interface in our contact with other people (Turkle 2012).
6) Extensive user feedback
People can receive extensive feedback through a handy device, such as the mobile phone. This leads to
Deep product convenience because individualized information is at hand exactly at the point of decision
(Fleisch, 2010: 13-14).This is an area of the Internet of Things were specific and customized information is
assembled and delivered to the user at various locations. Fleisch notes that the mobile phone, as it has
developed into a computer of its own, serves as a key innovation. At the same time, we argue that the
development of the Internet of Things serves to transfer control from the mobile phone to smart
environments. Instead of being our tool, the smartphone can be re-mediated to be a tool for the smart
environment.
7) Mind changing feedback
Fleisch is concerned about the huge potential of technology being able to influence the behavior of users,
praying that it will hopefully be used for good (2010: 12). Nevertheless, the Internet of Things can be
utilized in a wealth of different ways to keep tabs on humans, making people behave in a more rational
manner. This specific added value will entice individuals to switch off their own moral compass and allow
technology to steer behavior according to norms found statistically significant. It is convenient to lazily
allow our things to monitor our behavior and make suggestions based on previous conduct or a database of
decision-making deemed excellent. Nevertheless, it is a kind of intimate technology, already creeping up on
us, which we should carefully evaluate.
Exploring alpha convenience
As becomes obvious when reviewing the seven value drivers, creating applications utilizing the Internet of
Things is a multifaceted project. There are myriads of opportunities targeting any perceivable aspect of our
lives. Technologists typically work in a piecemeal manner, targeting individual patterns of behavior with
the aim of making our daily lives more efficient. However, taken together and as a cumulative global drive
powered by the need for technologists to find funding for their particular skills, any area that requires some
form of human effort will have a bull’s eye painted on it. The possible problems associated with the seven
value drivers are summarized in table 1.
8
Value driver
Possible problems
Simplified manual proximity
trigger
-Gossiping technology
-Technology appropriates decision-making process of humans
Automatic proximity trigger
-Appropriation of memory and evaluation functions
-Removal of “trial and error” forms of learning and creativity
-Neo-Taylorism
Automatic sensor triggering
-Senses of technology far superior to human “sensing” and
instincts
-Caretaking of environments shifted from humans to machines
Automatic product security
-Authenticity certification shifted from humans to machines
-Ubiquitous brand policing
Simple and direct user feedback
-Machine to human interaction replaces service related people to
people interplay
-Reduces amount of serendipitous meetings between humans
Extensive user feedback
-Personalization of information flows
-Disempowered smartphone owner
Mind changing feedback
-People rely less on own moral compass and more on statistically
significant majority indicators
Table 1: Value drivers of the Internet of Things (based on Fleisch, 2010) and possible problems connected
to these
From a CTA-perspective, we must question the need to do whatever we can do to reach some ultimate form
of “any-everything”. It is important to emphasize that although the seven value drivers discussed above
outlines a wide range of forthcoming applications, they do not really move into the area of advanced forms
of “smart technology”, i.e. the Internet of Things combined with artificial intelligence. Such a development
implies forms of convenience in which we no longer need to rely on our biological brain. We may not be
allowed the choice of “any-brain”, but still an option of several artificial super neurological networks. More
likely there will be decision-making systems in place that determines the role of different forms of
neurological networks. Building on the principles of cybernetics (Wiener, 1961) it is rational and effective
for control systems to deal with artificial and biological processes symmetrically. In our attempt to
understand the full potential of what the Internet of Things can be developed into we cannot expect that the
division between humans and machines remains the same. In the extensive survey performed by Pew
Research Center (2014) some experts argue that the Internet of Things in the 2020s will bypass the body
and connect directly to the brain and, moreover, to our DNA. With such a development, the neurology of
humans will be merged with the Internet of Things.
As humans become surrounded with powerful presences of “any-everything” we seem to confront, in new
ways, age-old philosophical questions of what it means to be human. As a species, we have become
accustomed to having monopoly on higher forms of intellectual processes. How are we transformed when
we rely on the signals of our things rather than the intuitions of our body? Are ever increasing tools for
more convenience really what the human body needs? At the core, notions here characterized as alpha
convenience, places an emphasis on machine learning rather than human learning.
In the following, we will go deeper into a few critical aspects mentioned in the preceding discussion:
gossiping technology, personalization, the disempowered smartphone and the renegotiation of agency.
9
Alpha convenience and gossiping technology
Already today, the web is populated by widgets, gadgets and applications that automatically exchange
information about users. This is most clearly evident when shopping. The PayPal account or credit card
vendor will communicate automatically with the site selling goods. This is, however, only the most obvious
example. Most of our actions on the web will generate a flurry of gossip between websites and between
diverse gadgets. This is a development that is accelerating as applications are becoming smarter. Many
web-based services are now mashups that have drawn content from different sources.
Increasingly, the World Wide Web hosts adaptive Web resources that recognizes each individual user and
produces a tailor-made user interface based on previous surfing. The pioneering work in this area was made
by Amazon.com, but Facebook and Google are without doubt the most systematic developers of this kind
of functionality. During 2011, the widgets of Facebook gained some notoriety as it was shown that they
were spying on their users (Cubrilovic, 2011). The continuous revelations by Edward Snowden regarding
systematic and large-scale privacy intrusion by the intelligence community have stimulated widespread
public concern in this area.
Users tend not to notice that their tools are quietly translating their actions into bits of information that
flow upstream along the same channels and pipes that carry data, images, music, and e-mail (Andrejevic,
2007: 111). Similarly, in her critical discussion of social media, van Dijck (2013) discusses the evolution of
a culture of connectivity in which social relations are encoded in technology at the back end of applications,
far beyond the control of our privacy settings. The gossip that technology routinely and extensively
performs on all users is therefore in the background, a kind of silent gossip. Although people all through
history have been the target of gossip when they have not been around, it is only now that our devices are
talking amongst themselves about us. And, for our convenience, we are not privy to what is being said
and to whom/what this information is being sent.
With alpha convenience, silent gossip becomes omnipresent. Our web-based gadgets are not only talking to
each other, they are also keeping tabs on our movement in daily life, gossiping with a number of devices
around us. All this smart activity is performed in order to make our lives easier. With alpha convenience,
we are delegating a number of difficult tasks so as to be more effective and focus on, hopefully, more
important things. Still, we should reflect on the fact that we are letting go of a number of skills that
historically have been quite important for us.
Gossiping technology is a prerequisite for alpha convenience. It is only by attaining intimate knowledge of
our preferences, habits, strengths and weaknesses that appropriate and fluent services can be produced.
Ideally, these services are so perfectly attuned to who we are that they become natural, invisible and,
indeed, silent.
The very phenomenon of technological gossip is in urgent need of social science research. We need to ask
questions about what it means for individuals, groups, institutions and societies to be surveilled and
supported through gossiping technology. We also need to scrutinise various forms of personalised services
that are evolving and it is to this we turn to next.
10
Alpha convenience and personalization
Alpha convenience, as enabled by the sixth and seventh added value of the Internet of Things (above),
seems to require that a multitude of computers will recognize each individual and adapt services
accordingly. When a person enters a new environment, s/he is instantly recognized and resources
customized. Compared to current practices of mobile Internet access, this is a far more elaborate
technology. The process is eerily akin to that of users accessing an adaptive webpage such as Amazon.com.
The smart room allows things connected to the user to communicate with the things of other users as well
as permanent and temporal things situated in that environment.
It seems that we will be supplied with personalized adaptive systems that are trained to become familiar
with user interests and quickly adapt to changes (Light and Maybury, 2002). This entails a kind of personal
servant, which has such intimate knowledge of the user that it can search and filter in his or her stead. This
is a powerful and potentially dangerous idea with resonance in many fields such as Information Retrieval,
Text Retrieval Evaluation and Machine Learning. It is also the basic ideology and goal underpinning the
semantic web and the search engine of Google.
The emergence of such personalized technology raises questions on how many choices will be afforded the
user in customizing experience of a new environment. While it would be possible to allow users a range of
options, this may not be convenient. The user is certainly at a disadvantage when compared with the smart
room. Her own things will know her needs, interests, traits and networks intimately and can negotiate
appropriate resources with a multitude of other things within the environment. It is probably hard to
develop smart and convenient environments without implicitly conceptualizing users as flawed in the
management and creation of effective and sophisticated filters for their own information needs. Users
generally have too little understanding and access to available information resources to be able to make
judgment calls that can compete with the things of alpha convenience.
Basically, the overwhelming amount of available data places humans at emphatic disadvantage. We have
simply produced too much data. Left to our own devices, we do not know how to make the best use of it or
even to select the most appropriate tools for our needs. This is not a new existential dilemma for mankind.
Information overload has been considered as far back as 4 BCE by Seneca (Weinberger, 2011). Shirky
(2010) argues that the modern articulation of information overload is filter failure. Here it is suggested that
our social networks can constitute our filtering systems. However, in the Internet of Things, our social
networks will also be embedded in technology and, in a sense, manifest themselves as things managed by
computers rather than humans.
At least three fundamental problems with automatic personalization have been identified in previous
literature (Pariser, 2011; Sunstein, 2007; Turow, 2011). Such discussions have been focused on web-based
personalization. Processes enabled by smart environments are likely to extend these problems.
First, building on the historical interests of the individual may constrict future personal development.
Personalization may simply disallow individual growth as our private information technology, for instance
in the form of semantic agents, constructs filters based on how we historically have behaved. This is a
difficult problem to bypass. Surfing on the Internet generates a wealth of information that can be refined
and categorized in order to predict future preferences and needs. Even if it is mathematically doable for
computers to understand our history, and who we have been, it is something else to diagnose our potential
and say who we may become. Arguably, personalization tends to hold us back by reaffirming past identities
and filtering out such information that reflect other identities. The problem is particularly pertinent for
11
young people who routinely change identities and need to find evolving maturity through the information
accessed. The convenience of the Internet of Things may restrict personal growth.
Second, some technologies are developed with the assumption that each user only holds one identity, while
in reality people assume different roles over the course of each day. This is a major complication for those
who construct artificial agents with the aim of monitoring and predicting human needs and actions. How
can we build things to serve the specific needs of individuals if they keep changing roles all the time? In the
matching of complex human beings with artificial agents the problem is perhaps solved by requiring users
to be more one-dimensional. As Facebook's founder Mark Zuckerberg claimed, you have one identity [...].
Having two identities for yourself is an example of a lack of integrity (Kirkpatrick, 2010: 199). This
statement is understandable within the framework of radical transparency promoted by Facebook. The
position makes sense from a technocratic perspective, if we can get people to become less multifaceted,
then the work of semantic agents is much facilitated. The main thrust of the social and human sciences tells
a different story. We are multifaceted beings and we need that kind of complexity in our lives in order to
grow. Alpha convenience may push single identities upon us, making us less complex and more
predictable.
Third, information needs are situated, varying according to specific and unique situations in daily life.
Personalization systems will have difficulties in recognizing these differences as long as they have limited
access to that situational data. Furthermore, the modern development of professionalism has emphasized
the value of being able to alternate between different roles. We need to know when to maintain a
professional distance, when to take up a leadership role, how to identify relationships when different
professions meet and when to select and apply new perspectives. Working in a professional landscape with
constantly shifting roles is also vital for personal development. The Internet of Things holds the potential of
monitoring our situations and our roles. When positioned in a typical mingling situation, the smart
environment can conveniently recommend people for us to meet and rank them according to interest,
availability and importance. We may also be given useful personal information harvested from Facebook
and similar applications. However, such tools are limited and deceptive as each individual situation is
unique and a challenge to the support given by artificial intelligence. If we will learn to rely heavily on
smart tools in professional life, we will probably do away with a number of professional skills.
Again, many questions arise that require further scrutiny. Is this kind of personalization desirable? The
trajectory toward alpha convenience is perhaps assumed to be locked, but the decision to build and
empower a technology which places humans at a considerable disadvantage in decision-making should be
one made deliberately. We should ahead of time ask: What would the implications of such personalization
be for the individuals in their daily lives and for society as a whole?
Alpha convenience and the disempowered smartphone owner
Rennie and Wellman (2012) identify a triple revolution of contemporary societies, consisting of social
revolution, Internet revolution and mobility revolution. Similar interpretations of modern societies are
common in social science. Clearly, several aspects of alpha convenience are already in place. However,
while the mobility revolution has made Internet access possible for just about anyone at any place and any
time, alpha convenience pushes the envelope. It is important to clearly identify the difference between our
current smartphone-based mobility and alpha convenience. Such differences concern the central positioning
of artificial intelligence in the development of Internet of Things.
12
Arguably, something happens in our relationship to tools when they become smart. We are used to tools
that amplify and alleviate our intentions and decisions. In such cases, we maintain control and the tool is a
powerful extension of our action. However, as Rheingold (1985) recognized, computers and software
should not be seen as ordinary technology but as “tools for thought“, our modern medium for thinking and
imagining. Building on this notion, what happens when our ubiquitous support structure for thinking
evolves to the next level and becomes “smart tools” with artificial intelligence embedded into them? Will
these self-managing objects eventually build up an agency removed from the intentions of the human
creator (or at least the human user)? This becomes an extreme example of what Callon (1986) and Latour
(1992) call actants, objects that express agency.
Smart tools can be seen as something different to ordinary tools. They do not serve us by extending our
agency. Rather, they are co-constructing human action. This reframing of what the tool can be is
systematically put to work in visions of Internet of Things. Smart technology is constructed to be a kind of
mediator of our ordinary life. This is far beyond the traditional meaning of the tool and it constitutes a
challenge to social scientists to rethink the relationship between humans and their tools. In comparing
contemporary smartphone practices with the visions of alpha convenience we would like to emphasize
three aspects.
First, the evolution of smart environments. Users will be recognized by the environment they enter and
available resources will be customized according to their perceived personal preferences.
Second, anything will be used to access and navigate the Internet. In essence, this means that users will
not need to take along their own device for Internet access, such as a smartphone. Instead, they can make
use of whatever device is close by.
Third, the transference of agency from the smartphone to the surrounding intelligence constitutes a shift in
power from pocket of user to technological environment. In a very real sense, the smartphone owner is
disempowered. Our portable devices are appropriated to be more concerned with the input from the smart
environment than it is with human owners. Compared to computers, humans are acting in extreme slow-
motion. The smartphone that is constantly connected to the Internet of Things will have much more
communication (and in common) with other things.
Concluding discussion: Can we opt out of alpha convenience?
We have discussed several vital problems that tend to be ignored in technological discussions in the
extreme forms of convenience that in this article have been called alpha convenience. We have argued that
the relocation of power from the things we carry with us, i.e. smartphones, laptops, pads, etc., to things in
an intelligent environment generates a number of significant problems. Most of these are already present in
our current highly digital lives, but alpha convenience will tend to introduce new dimensions.
We have argued that the alpha convenience of the Internet of Things pushes the boundaries of convenience
much too far. We are presented with convenient technology that does not only help us with physical work.
We are also assisted in the way we use our senses and as the technology advances, there are good reasons
for investing more trust in the sensors of things rather than our own faculties. Furthermore, we are also
supplied shortcuts that simplify our thinking. In a way, we find this paradoxical, as there is a clear humanist
idea underpinning the vision of computers adapting to humans, not the other way around. We are supplied a
tantalizing vision of computers unobtrusively humming in the background, ready to attend to our every
13
need. Nevertheless, alpha convenience presupposes a series of renegotiations of the division of labour
between humans and machines.
In line with the agenda of Constructive Technology Assessment, we argue that it is important to discuss the
possible consequences of alpha convenience before full implementation. This is particularly pertinent as it,
once implemented, does not seem to be a technology that can be avoided by the individual user.
Absence of choice seems to be implicit in the key documents read for this analysis. Already, in the early
work of Weiser (1991, 1993a, 1993b) workspaces are emphasized. As a consequence, dealing with the
technology becomes a prerequisite for performing work. In the visions of the European Commission
(Commision of The European Communities, 2008, 2009) we find this kind of technology integrated into
cars and buildings. As ubiquitous technology is built into the hardware of our environment, we can no
longer choose non-usage.
While implementation of new technology by necessity comes in stages, there are also dimensions of force
involved. In other words, volunteerism also enters the debate. With this fundamental humanist ideal, the
agent is seen as an active individual who is free to choose among competing alternatives. Internet of Things
is likely to interfere with volunteerism.
The range of involuntary non-use has traditionally varied depending on type, form of use and availability
of competing technologies. For instance, it may be possible for us to choose not to have a car if we have
access to sufficient public transport to work. Also, dominating technologies such as TV can be avoided, as
it is often not necessary for work. ICT is an entirely different extension of social action, as it has become
such a dominant element in most workplaces and also tends to renegotiate boundaries between work and
leisure. The vision of alpha convenience seems to be one that leaves scarce opportunity to opt out.
This absence of choice is also present on a societal level, as we seem to be faced with a technological
trajectory independent of political agendas. On the face of it, this links to ideas of technological
determinism in which technology is seen as the cause of social change. However, as Gunkel (2003) argues,
empirical studies demonstrate that technological determinism (whether the ‘hard’ or ‘soft’ kind) is
inadequate as explanation of the problem and a simplification of a complex situation.
From our perspective, the absence of choice comes from a lack of both early and broad discussions on the
appropriate role for technology in society. This article has aimed to contribute to awareness of the price we
pay for alpha convenience. We invite further discussion and research of these issues.
References
Andrejevic, M. (2007), iSpy: surveillance and power in the interactive era, University Press of Kansas,
Lawrence, KS.
Araya, A.A. (1995, February 28 - March 02), “Questioning Ubiquitous Computing”, Paper presented at the
The 1995 ACM 23rd annual conference on Computer science, Nashville.
Ashton, K. (2009), “That ‘Internet of Things’ Thing - In the real world, things matter more than ideas”,
RFID Journal, 22 June,
Bauman, Z. and Lyon, D. (2013), Liquid Surveillance: a conversation, Polity Press, Cambridge, UK.
Berners-Lee, T., Hendler, J., and Lassila, O. (2001), “The Semantic Web”, Scientific American, May, pp.
29-37.
14
Billsus, D., Brunk, C. A., Evans, C., Gladish, B., and Pazzani, M. (2002), “Adaptive Interfaces for
Ubiquitous Web Access”, Communications of the ACM, Vol. 45 No. 5, pp. 34-38.
Bohn, J., Coroamă, V., Langheinrich, M., Mattern, F., and Rohs, M. (2003), Disappearing Computers
Everywhere - Living in a World of Smart Everyday Objects, Paper presented at the New Media,
Technology and Everyday Life in Europe Conference, London.
Callon, M. (1986), “Some Elements of a Sociology of Translation: Domestication of the Scallops and the
Fishermen of St Brieuc Bay, in J. Law (Ed.), Power, Action and Belief: A New Sociology of
Knowledge (pp. 196-233), Routledge and Kegan Paul, London.
Commision of The European Communities. (2008), Communication on Future Networks and the Internet,
Brussels: Commision of the European Communities.
Commision of The European Communities. (2009), Internet of Things - An action plan for Europe Europe
(No. COM (2009) 278 final), Brussels: Commision of The European Communities, (pp. 1-11),
Council of Europe, The. (2009), Internet Governance and Critical Internet Resources: Media and
Information Society Division, Directorate General of Human Rights and Legal Affairs, Council of
Europe, Brussels.
Cubrilovic, N. (2011, 25th September 2011), “Logging out of Facebook is not enough”, Available at:
http://nikcub.appspot.com/posts/logging-out-of-facebook-is-not-enough
Dijck, J. van, (2013), The Culture of Connectivity: A Critical History of Social Media, Oxford University
Press, Oxford.
Dohr, A. et al. (2010), “The Internet of Things for ambient assisted living”, Seventh International
Conference on Information Technology: New Generations, conference proceedings, pp. 804-809.
Fan, Y.J., Yin, Y.H., Xu, L.D., Zeng, Y., and Wu, F. (2014), “IoT-based smart rehabilitation
system”, IEEE Transactions on Industrial Informatics, Vol. 10, No. 2, pp. 1568-1577.
Fleisch, E. (2010), What Is the Internet of Things? An Economic Perspective, Auto-ID Labs White Paper,
WP-BIZAPP-053.
Fuchs, C. (2011), WikiLeaks: power 2.0? Surveillance 2.0? Criticism 2.0? Alternative media 2.0? A
political-economic analysis, Global Media Journal - Australian Edition, Vol. 5 No. 1 (17 pages).
Fuchs, C. (2014), Social Media: a Critical Introduction, Sage, London.
Genus, A. (2006), “Rethinking constructive technology assessment as democratic, reflective, discourse”,
Technological Forecasting and Social Change, Vol. 73 No.1, pp. 13-26.
Greenfield, S. (2003), Tomorrow's People: How 21st Century Technology is Changing the Way We Think
and Feel, Allen Lane, London.
Guinard, D., and Trifa, V. (2009), Towards the Web of Things: Web Mashups for Embedded Devices, Paper
presented at the Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the
Web (MEM 2009) [in proceedings of WWW (International World Wide Web Conferences)],
Madrid, Spain.
Gunkel, D. J. (2003), “Second Thoughts: Toward a Critique of the Digital Divide” New Media and Society,
Vol. 5 No. 4, pp. 499-522.
Haraway, D. (1991), Simians, Cyborgs and Women: The Reinvention of Nature, Free Association Books,
London.
Jakobs, K., and Williams, R. (2008, March 26-28, 2008 ), Message from the Workshop Co-Organisers -
Workshop 'Producing Standards for the Internet of Things' (PROSIT 2008), Paper presented at the
First International Conference on The Internet of Things, Zurich.
Kirkpatrick, D. (2010), The Facebook Effect: The Inside Story of the Company that is Connecting the
World, Virgin Books, London.
Lanier, J. (2010), You Are Not a Gadget: A Manifesto, Alfred A. Knopf, New York, NY.
Latour, B. (1992), Where Are the Missing Masses? The Sociology of a Few Mundane Artifacts, in
Bijker, W.E. and Law, J. (Eds.), Shaping Technology/Building Society - Studies in Sociotechnical
Change (pp. 225-258), MIT Press, Cambridge, MA.
15
Light, M., and Maybury, M. T. (2002), Personalized Multimedia Information Access: Ask Questions, Get
Personalized Answers, Communications of the ACM, Vol. 45 No. 5, pp. 54-59.
Lovink, G. (2011), Networks without a Cause: a Critique of Social Media, Polity Press, Cambridge, UK.
Mann, S., Nolan, J., and Wellman, B. (2003), Sousveillance: Inventing and Using Wearable Computing
Devices for Data Collection in Surveillance Environments, Surveillance and Society, Vol. 1 No. 3,
pp. 331-355.
Morozov, E. (2013), To Save Everything, Click Here - Technology, Solution Is and the Urge to Fix
Problems That Don’t Exist, Penguin Books, London.
Papacharissi, Z.A. (2010), A Private Sphere: Democracy in the Digital Age, Polity Press, Cambridge, UK.
Pariser, E. (2011), The Filter Bubble - What the Internet Is Hiding from You, Penguin Group, London.
Pew Research Center (2014), “The Internet of Things Will Thrive by 2025”, available at:
http://www.pewinternet.org/files/2014/05/PIP_Internet-of-things_0514142.pdf (accessed May 19,
2014).
Rainie, L. and Wellman, B. (2012), Networked: The New Social Operating System, The MIT Press,
Cambridge, MA.
Rheingold, H. (1985), Tools for thought: The people and ideas behind the next computer revolution, Simon
& Schuster Trade, New York, NY.
Rip, A. (2001), Assessing the Impacts of Innovation: New Developments in Technology Assessment, In
Social Sciences and Innovation - Information society - OECD proceedings, OECD Publishing, Paris.
Rip, A., Misa, T. J., and Schot, J. (Eds.), (1995), Managing Technology in Society. The Approach of
Constructive Technology Assessment, Pinter Publishers, London.
Satyanarayanan, M. (2001), “Pervasive computing: vision and challenges”, IEEE Personal
Communications, Vol. 8 No. 4, pp. 10-17.
Schot, J. (1992), “Constructive Technology Assessment and Technology Dynamics: The Case of Clean
Technologies”, Science, Technology and Human Values, Vol. 17 No. 1, pp. 36-56.
Schot, J., and Rip, A. (1996), “The Past and Future of Constructive Technology Assessment”,
Technological Forecasting and Social Change, Vol. 54 No 2-3, pp. 251-268.
Shirky, C. (2010), “It’s Not Information Overload. It’s Filter Failure”, Keynote address at Web2.0 Expo,
September 16-19, 2010. Retrieved 25 May 2012, from http://blip.tv/web2expo/web-2-0-expo-ny-
clay-shirky-shirky-com-it-s-not-information-overload-it-s-filter-failure-1283699
Solove, D. J. (2007), The Future of Reputation - Gossip, Rumor, and Privacy on the Internet, Yale
University Press, New Haven, CT.
Sundmaeker, H., Guillemin, P., Friess, P., and Woelfflé, S. (Eds.), (2010), Vision and Challenges for
Realising the Internet of Things, European Commission, Information Society and Media, Brussels.
Sunstein, C. R. (2007), Republic.com 2.0, Princeton University Press, Woodstock, UK.
Talbott, S. L. (2000a), The Trouble with Ubiquitous Technology Pushers (Part 3), To Automate, or Re-
enflesh? Netfuture: Technology and Human Responsibility 2000(#112).
Talbott, S. L. (2000b), The Trouble with Ubiquitous Technology Pushers (Part 1), or: Why We'd Be Better
Off without the MIT Media Lab, Netfuture: Technology and Human Responsibility 2000(#100).
Talbott, S. L. (2000c), The Trouble with Ubiquitous Technology Pushers (Part 2), or: Why We'd Be Better
Off without the MIT Media Lab, Netfuture: Technology and Human Responsibility 2000(#101).
Tao, F., Cheng, Y., Xu, L. D., Zhang, L., & Li, B. H. (2014), CCIoT-CMfg: cloud computing
and Internet of Things based cloud manufacturing service system. IEEE Transactions on
Industrial Informatics, Vol. 10 No. 2, pp. 1435-1442.
Thompson, C. W. (2005), “Smart Devices and Soft Controllers”, IEEE Internet computing, Vol. 9 No. 1,
pp. 82-85.
Townsend, E. (2011), “Technology Strategy Board - Driving Innovation”, in U. F. I. S. Group (Ed.), Future
Internet Report , ICT knowledge Transfer Network, London.
16
Turkle, S. (2012), Alone Together: Why We Expect More from Technology and Less from Each Other,
Basic Books, New York, NY.
Turow, J. (2011), The Daily You: How the New Advertising Industry Is Defining Your Identity and Your
Worth, Yale University Press, London.
van Kranenburg, R. (2008), The Internet of Things: A critique of ambient technology and the all-seeing
network of RFID, Institute of Network Cultures, Amsterdam.
Weinberger, D. (2011), Too Big to Know: Rethinking Knowledge Now That the Facts Aren't the Facts,
Experts Are Everywhere, and the smartest Person in the Room Is the Room, Basic Books, New
York, NY.
Wiener, N. (1961), Cybernetics: Or, Communication and Control in the Animal and the Machine,
2nd edn,MIT Press, Cambridge, MA.
Weiser, M. (1991), The Computer for the 21st Century - Specialized elements of hardware and software,
connected by wires, radio waves and infrared, will be so ubiquitous that no one will notice their
presence, Scientific American, September, pp. 94-104.
Weiser, M. (1993a), “Some Computer Science Issues in Ubiquitous Computing”, Communications of the
ACM, Vol. 36 No. 7, pp. 75-84.
Weiser, M. (1993b), “Ubiquitous computing”, Computer, Vol. 26 No. 10, pp. 71-72.
Weiser M. (1995), “The Technologist’s Responsibilities and Social Change”, Computer-Mediated
Communication Magazine, Vol. 2, No. 4, p. 17
Zelkha, E., and Epstein, B. (1998), From Devices to 'Ambient Intelligence': The Transformation of
Consumer Electronics, Paper presented at the Digital Living Room Conference, Philips.
... Extant research clearly indicates that online social networks are usually formed among like-minded people who use digital platforms to both facilitate sharing among themselves and promote and bolster belief in both true/fake news within and beyond their groups (Bleakley, 2023). While individuals tend to seek out like-minded people, the algorithms of digital platforms have amplified this tendency through filtering challenging information and providing confirmatory information, which algorithms determine from platform users' previous behaviors and choices (Nolin and Olson, 2016;Pariser, 2011). Albright (2017) emphasizes the necessity of scrutinizing the fake news ecosystem, which can be accomplished by tracing the flow of information across expansive networks of websites, profiles, and platforms. ...
Article
Full-text available
This study investigates the features of fake news networks and how they spread during the 2020 South Korean election. Using actor–network theory (ANT), we assessed the network’s central players and how they are connected. Results reveal the characteristics of the videoclips and channel networks responsible for the propagation of fake news. Analysis of the videoclip network reveals a high number of detected fake news videos and a high density of connections among users. Assessment of news videoclips on both actual and fake news networks reveals that the real news network is more concentrated. However, the scale of the network may play a role in these variations. Statistics for network centralization reveal that users are spread out over the network, pointing to its decentralized character. A closer look at the real and fake news networks inside videos and channels reveals similar trends. We find that the density of the real news videoclip network is higher than that of the fake news network, whereas the fake news channel networks are denser than their real news counterparts, which may indicate greater activity and interconnectedness in their transmission. We also found that fake news videoclips had more likes than real news videoclips, whereas real news videoclips had more dislikes than fake news videoclips. These findings strongly suggest that fake news videoclips are more accepted when people watch them on YouTube. In addition, we used semantic networks and automated content analysis to uncover common language patterns in fake news, which helps us better understand the structure and dynamics of the networks involved in the dissemination of fake news. The findings reported here provide important insights on how fake news spread via social networks during the South Korean election of 2020. The results of this study have important implications for the campaign against fake news and ensuring factual coverage.
... Besides, the discussions have also included the factor like 'Social Influence' which deals with societal issues. It highlights reactions of the society (Nolin & Olson, 2016). The discussions also have aptly dealt with issues concerned with human belief because it has dealt with issues covering 'Trust' level of the consumers (Harwood & Garry, 2017). ...
Article
Full-text available
This paper investigates empirically the impact of antecedents of behavioral intention and trust of users to use IoT-enabled devices. With the help of UTAUT2 model along with the review of literature, a conceptual model has been developed. The conceptual model consists of antecedents of behavioral intention and trust. The factors and hypotheses so identified and developed have been tested with different tools after collection of data from 308 respondent (n = 308) participants from four metropolitan cities of India. The result has shown that the most important factor which can explain the behavioral intention of consumers to use IoT is ‘trust’ level of the potential users. In addition, the impact of performance expectancy, effort expectancy, social influence, facilitating conditions, hedonic motivation, and cost on behavioral intention of the consumers to use IoT-enabled devices has been discussed.
... IoT dapat menciptakan sebuah lingkungan internet yang lengkap dan memudahkan masyarakat untuk mengakses berbagai teknologi pintar yang telah terintegrasi dengan otomasi yang dapat digunakan kapanpun, dan dimanapun (Olson, 2016). IoT mempunyai tiga karakteristik utama (Santoso & Ramli, 2016): ...
Article
Penelitian ini menerapkan sistem literature review untuk mengupas sekitar 50 penelitian yang berkaitan dengan Internet of things (IoT) baik penelitian yang berbasis nasional maupun internasional. Dalam penelitian ini akan mendalami penerapan IoT dalam kehidupan sehari-hari manusia, mulai dari bidang pendidikan, kesehatan, ekonomi, keamanan, hingga transportasi. Selain beberapa bidang tersebut, dalam penelitian ini juga mereview beberapa penelitian yang menerapkan IoT dalam bidang yang lebih spesifik ke dalam kehidupan manusia. Hasil dari penelitian ini menjelaskan tentang rendahnya angka penelitian yang telah dilakukan oleh peneliti Indonesia, rata-rata penelitian nasional yang berkaitan dengan pengembangan IoT tidak melebihi 10% dari keseluruhan penelitian yang telah di review. Penelitian yang telah dilakukan hanya terfokus pada bidang pendidikan dan keamanan, kurangnya penyebaran ide pada pengembangan IoT sehingga mengakibatkan rendahnya angka penelitian IoT pada bidang-bidang lainnya. Rendahnya angka penelitian yang dilakukan dapat ditingkatkan dengan bantuan pemerintah dalam penyediaan fasilitas yang memadai dan adanya kesadaran peneliti untuk mengembangkan penelitian yang lebih berbobot dan kaya akan informasi serta dapat mengikuti perkembangan dunia.
... AmI относится к цифровой среде, которая чувствительна и реагирует на присутствие людей. Окружающий интеллект разрабатывается с конца 1990-х годов как проекция электроники, телекоммуникаций и вычислений на будущее [True Visions… 2006;Nolin 2016]. Такие системы сейчас разрабатываются для обеспечения согласованной работы различных технических устройств, чтобы поддерживать людей в их повседневной деятельности, решения задач интуитивно понятным способом, используя информацию и ИИ, которые скрыты в сети, соединяющей эти устройства (например, Интернет вещей). ...
Article
The article addresses the problem of identifying methods to develop the ability of artificial intelligence (AI) systems to provide explanations for their findings. This issue is not new, but, nowadays, the increasing complexity of AI systems is forcing scientists to intensify research in this direction. Modern neural networks contain hundreds of layers of neurons. The number of parameters of these networks reaches trillions, genetic algorithms generate thousands of generations of solutions, and the semantics of AI models become more complicated, going to the quantum and non-local levels. The world’s leading companies are investing heavily in creating explainable AI (XAI). However, the result is still unsatisfactory: a person often cannot understand the “explanations” of AI because the latter makes decisions differently than a person, and perhaps because a good explanation is impossible within the framework of the classical AI paradigm. AI faced a similar problem 40 years ago when expert systems contained only a few hundred logical production rules. The problem was then solved by complicating the logic and building added knowledge bases to explain the conclusions given by AI. At present, other approaches are needed, primarily those that consider the external environment and the subjectivity of AI systems. This work focuses on solving this problem by immersing AI models in the social and economic environment, building ontologies of this environment, taking into account a user profile and creating conditions for purposeful convergence of AI solutions and conclusions to user-friendly goals.
Article
Digitalization has profoundly reshaped work modes and lifestyles and impacted individuals' life satisfaction. However, there has been limited research exploring this issue while comparing the effects before and during the COVID-19 pandemic. Furthermore, investigating heterogeneity across different socioeconomic groups is crucial. This study uses data from the latest three waves of the European Social Survey in 2016, 2018, and 2020 to examine the influence of Internet usage on life satisfaction, unravel its underlying mechanisms, and conduct heterogeneity analysis with the fixed-effects ordered logit model and propensity score matching method. The empirical findings reveal the following: (a) Internet usage has significant and positive effects on life satisfaction, although the marginal effects of Internet usage decreases as respondents' life satisfaction increases; (b) respondents with a "right" political tendency, higher levels of social interaction and trust, females, older individuals, higher income earners, those with lower education levels, better health conditions, and stronger religious beliefs tend to report higher life satisfaction; (c) work flexibility, work-life balance, and team engagement are identified as essential mediating factors in the relationship between Internet usage and life satisfaction; (d) Internet usage has had a significant and positive effect on life satisfaction since the outbreak of the COVID-19 pandemic, whereas this was not the case before the pandemic; and (e) the influence of Internet usage on life satisfaction is more pronounced among young, affluent communities, well-educated individuals, Eastern and Central Europeans, non-managers, and employees of central/local governments and private firms. This study underscores the rapid socioeconomic transformation induced by digitalization in Europe and provides valuable insights on leveraging the Internet to improve individual life satisfaction in the post-pandemic era. Thank you for your insightful comments and suggested revisions. With your guidance, we are now submitting a revised version of our paper by adding Section 5.5 to propose the lessons learned from the COVID-19 experience. Four related papers from SocioEconomic Planning Sciences are also cited at where appropriate. All modifications are highlighted in red for easy reference. Below are our point-by-point responses to your feedback.  Reviewer #1: The authors improved the manuscript in accordance with my previous comments. My main concern is with the data used for the analysis. I suggest the authors emphasise what lessons could be learned from the COVID experience. This part could be included in the discussions and conclusions. Perhaps the authors should also emphasise this in the title. A: Thank you for your comment. The dataset used in this study was obtained from the ESS, which has been widely used in academic researches, include the studies of Palermo et al. (2022) and Tubadji & Nijkamp (2017) that published on SocioEconomic Planning Sciences. We estimated the relationship between Internet usage and life satisfaction by using the latest three waves of ESS, namely rounds 8, 9, and 10. Since Round 10 contains information on people's Internet usage during the pandemic, we therefore in a good position to compare the impact of Internet usage on life satisfaction before and during the COVID-19 pandemic. Thank you for your suggestion, in the new version we added Section 5.5 to the Response to Reviewers 2 Discussion section to propose the lessons learned from the COVID-19, please review. Besides, we prefer to remain current title because the lessons are derived from the relationship test and heterogeneity analysis, which are illustrated in the title. Ref: [1] Palermo F, Sergi BS, Sironi E. Does urbanization matter? Diverging attitudes toward migrants and Europe's decision-making. Socio-Econ Plan Sci. 2022;83. https://doi.org/10.1016/J.SEPS.2022.101278. [2] Tubadji A, Nijkamp P. Green Online vs Green Offline preferences on local public goods trade-offs and house prices. Socio-Econ Plan Sci. 2017;58, 72-86. https://doi.org/10.1016/J.SEPS.2016.11.001.  Reviewer #2: After reviewing the authors' responses, extensions and improvements to my initial assessments, my opinion is that the article has clearly improved in robustness and that it is publishable in its current format. A: Thank you for your nice words. It is with your suggestion that the quality of this article got improved. Highlights  Ordered logit model, PSM and IV method are used to analyze Internet-satisfaction nexus in Europe.  Internet usage can improve life satisfaction during COVID-19, but it is not the case before the pandemic.  Work flexibility, work-life balance, and team engagement plays a mediating role in Internet-satisfaction nexus.  Heterogeneity analyses in terms of age, income, region, education, and occupation have been made. Highlights 1 How did Internet usage affect life satisfaction before and during COVID-19? 1 Mediating effects and heterogeneity analysis 2 3 Abstract: Digitalization has profoundly reshaped work modes and lifestyles and impacted individuals' 4 life satisfaction. However, there has been limited research exploring this issue while comparing the 5 effects before and during the COVID-19 pandemic. Furthermore, investigating heterogeneity across 6 different socioeconomic groups is crucial. This study uses data from the latest three waves of the 7 European Social Survey in 2016, 2018, and 2020 to examine the influence of Internet usage on life 8 satisfaction, unravel its underlying mechanisms, and conduct heterogeneity analysis with the fixed-9 effects ordered logit model and propensity score matching method. The empirical findings reveal the 10 following: (a) Internet usage has significant and positive effects on life satisfaction, although the 11 marginal effects of Internet usage decreases as respondents' life satisfaction increases; (b) respondents 12 with a "right" political tendency, higher levels of social interaction and trust, females, older individuals, 13 higher income earners, those with lower education levels, better health conditions, and stronger 14 religious beliefs tend to report higher life satisfaction; (c) work flexibility, work-life balance, and team 15 engagement are identified as essential mediating factors in the relationship between Internet usage and 16 life satisfaction; (d) Internet usage has had a significant and positive effect on life satisfaction since
Article
Full-text available
Penelitian ini bertujuan untuk mengembangkan prototipe sensor aliran air berbasis IoT yang dapat memantau aliran air secara real-time. Prototipe ini menggunakan teknologi sensor aliran air berskala mikro yang sensitif dan efisien dalam penggunaan energi, serta menggabungkannya dengan modul komunikasi nirkabel berbasis IoT untuk mengirimkan data aliran air ke server. Data yang diperoleh dari sensor ini kemudian dapat diakses dan dianalisis secara web atau aplikasi seluler. Prototype ini juga menggabungkan elemen monitoring, di mana pengguna dapat memonitoring aliran air secara jarak jauh melalui aplikasi seluler atau web.
Article
Purpose We have witnessed an evolution in the use of smartphones in recent years. We have been aware for some time of the potentially deleterious impact of smartphones on users' lives and their propensity for user addiction, as reflected in the large and growing body of work on this topic. One modern phenomenon – the distracted mobile phone user in public, or “smartphone zombie” – has received limited research attention. The purpose of the present study is to develop a robust measure of smartphone zombie behaviour. Design/methodology/approach The research deign comprises three studies: A round of focus groups (n = 5) and two online surveys (survey one n = 373, survey two n = 386), in order to develop and validate a three-factor, 15-item measure named the Smartphone Zombie Scale (SZS). Findings Following the round of focus groups conducted, Exploratory Factor Analysis and a Confirmatory Factor Analysis, the SZS measure (Cronbach's α = .932) is demonstrated to be robust and comprises three factors: Attention Deficit (Cronbach's α = .922), Jeopardy (Cronbach's α = .817) and Preoccupation (Cronbach's α = .835), that is shown to be distinct to existing closely related measures (Smartphone Addiction scale and Obsessive Compulsive Use). Originality/value The present study represents the first extant attempt to produce a measure of smartphone zombie behaviour, and provides us with a reliable and valid measure with which we can study this growing phenomenon.
Article
Full-text available
Service industries are increasingly creating physical frictionless experiences to reduce effort for customers so they are able to ‘just walk out’. However, frictionless experiences can reduce memorability which can in turn reduce share of wallet. The purpose of this paper is to explore the relationship between customer effort and experience memorability in a just-walk-out physical frictionless experience. Interviews were conducted with 30 customers using a simulated frictionless retail experience. The data were analyzed using thematic analysis. This study found that a just-walk-out physical frictionless experience consists of transferable positive and negative effort with physical, cognitive, and interpersonal components. A second finding was that the reduction of customer effort is facilitated by removing high interpersonal effort which is associated with a more forgettable, or slippery, experience. Individual differences that appear to play a role in desire for effortful human interaction, shopping value type, attitude towards technology and age were identified.
Chapter
Marketers are now employing artificial intelligence (AI) to improve the customer experience, turning it into the key to enterprises’ future success. Smart speakers also known as voice assistant, are voice recognition programs powered in the Internet of things by AI technology designed to promote customer interaction, engagement, and voice-based conversations. This chapter proposes a new framework for consumers in regards to interactive experiences with smart devices. The optimal scenario of the synergistic experience between a customer and a smart device is explored under the framework of Internet of Thing (IoT) by observing the interactive occurrences among interpersonal orientation, objects’ orientation, and social orientation. Specifically, this chapter first discusses AI technology advancement optimization of the customer experience. Then, explored the interaction experience between customers and intelligent objects in the context of IoT, can be classified into four different types of experience combination attributes: self-extension, self-restriction, self-expansion, and self-reduction. Second, the proposed model is validated by an experiment, explore the levels of interaction experience between customers and smart speaker devices influences on customer engagement. Finally, the chapter also discusses user types and parasocial interaction interfere with the interactive experience levels of users and smart speaker devices and customer engagement.KeywordsInteraction experienceAssemblage theoryCustomer engagementInternet of thingsCustomer experience
Chapter
Full-text available
In the "Internet of Things" vision, the physical world be-comes integrable with computer networks. Embedded com-puters or visual markers on everyday objects allow things and information about them to be accessible in the digi-tal world. However, this integration is based on competing standards and requires custom solutions, thus requires ex-tensive time and technical expertise. Based on the success of Web 2.0 mashup applications, we propose a similar ap-proach for integrating real-world devices to the Web, allow-ing for them to be easily combined with other virtual and physical resources. In this paper we discuss possible inte-gration method, in particular how the REST principles can be applied to embedded devices. Then we illustrate these principles with two concrete implementations: on the Sun SPOT platform and on the Ploggs wireless energy monitors. Finally, we show how RESTful interactions can be leveraged to quickly create new prototypes and mashups that combine the physical and virtual world.
Book
Simians, Cyborgs and Women is a powerful collection of ten essays written between 1978 and 1989. Although on the surface, simians, cyborgs and women may seem an odd threesome, Haraway describes their profound link as "creatures" which have had a great destabilizing place in Western evolutionary technology and biology. Throughout this book, Haraway analyzes accounts, narratives, and stories of the creation of nature, living organisms, and cyborgs. At once a social reality and a science fiction, the cyborg--a hybrid of organism and machine--represents transgressed boundaries and intense fusions of the nature/culture split. By providing an escape from rigid dualisms, the cyborg exists in a post-gender world, and as such holds immense possibilities for modern feminists. Haraway's recent book, Primate Visions, has been called "outstanding," "original," and "brilliant," by leading scholars in the field. (First published in 1991.).
Article
This article examines the impact of the Internet on the everyday lives of U.K. citizens through the integration of quantitative longitudinal time-use data and qualitative interviews. It shows that there is little significant change in people's time use that can be associated with their acquisition of an Internet connection and demonstrates the oversimplicity of the impact model for understanding the role of the Internet in everyday life. Instead, it suggests that lifestyle and/or lifestage transitions may trigger adoption of the Internet and, simultaneously, changes in domestic time use. It also demonstrates that Internet usage is too coarse a unit for sensible analysis. Rather, researchers need to consider the patterns of usage of the various applications or services that the Internet delivers.
Article
This paper outlines a new approach to the study of power, that of the sociology of translation. Starting from three principles, those of agnosticism, generalised symmetry and free association, the paper describes a scientigc and economic controversy about the causes for the decline in the population of scallops in St. Brieuc Bay and the attempts by three marine biologists to develop a conservation strategy for that population. Four "moments" of translation are discerned in the attempts by these researchers to impose themselves and their degnition of the situation on others: Z) problematization-the researchers sought to become indispensable to other actors in the drama by degning the nature and the problems of the latter and then suggesting that these would be resolved if the actors negotiated the "obligatory passage point" of the researchers' program of investigation; G) interessemen- A series of processes by which the researchers sought to lock the other actors into the roles that had been proposed for them in that program; 3) enrolment- A set of strategies in which the researchers sought to degne and interrelate the various roles they had allocated to others; 4) mobilization- A set of methods used by the researchers to ensure that supposed spokesmen for various relevant collectivities were properly able to represent those collectivities and not betrayed by the latter. In conclusion, it is noted that translation is a process, never a completed accomplishment, and it may (as in the empirical case considered) fail.
Article
The Internet is often hyped as a means to enhanced consumer power: a hypercustomized media world where individuals exercise unprecedented control over what they see and do. That is the scenario media guru Nicholas Negroponte predicted in the 1990s, with his hypothetical online newspaper The Daily Me-and it is one we experience now in daily ways. But, as media expert Joseph Turow shows, the customized media environment we inhabit today reflects diminished consumer power. Not only ads and discounts but even news and entertainment are being customized by newly powerful media agencies on the basis of data we don't know they are collecting and individualized profiles we don't know we have. Little is known about this new industry: how is this data being collected and analyzed? And how are our profiles created and used? How do you know if you have been identified as a "target" or "waste" or placed in one of the industry's finer-grained marketing niches? Are you, for example, a Socially Liberal Organic Eater, a Diabetic Individual in the Household, or Single City Struggler? And, if so, how does that affect what you see and do online? Drawing on groundbreaking research, including interviews with industry insiders, this important book shows how advertisers have come to wield such power over individuals and media outlets-and what can be done to stop it.
Book
This book studies the rise of social media in the first decade of the twenty-first century, up until 2012. It provides both a historical and a critical analysis of the emergence of networking services in the context of a changing ecosystem of connective media. Such history is needed to understand how the intricate constellation of platforms profoundly affects our experience of online sociality. In a short period of time, services like Facebook, YouTube and many others have come to deeply penetrate our daily habits of communication and creative production. While most sites started out as amateur-driven community platforms, half a decade later they have turned into large corporations that do not just facilitate user connectedness, but have become global information and data mining companies extracting and exploiting user connectivity. Offering a dual analytical prism to examine techno-cultural as well as socio-economic aspects of social media, the author dissects five major platforms: Facebook, Twitter, Flickr, YouTube, and Wikipedia. Each of these microsystems occupies a distinct position in the larger ecosystem of connective media, and yet, their underlying mechanisms for coding interfaces, steering users, filtering content, governance and business models rely on shared ideological principles. Reconstructing the premises on which these platforms are built, this study highlights how norms for online interaction and communication gradually changed. "Sharing," "friending," "liking," "following," "trending," and "favoriting" have come to denote online practices imbued with specific technological and economic meanings. This process of normalization is part of a larger political and ideological battle over information control in an online world where everything is bound to become "social."