Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems 2017
DOI: 10.1145/3064857.3079142
|View full text |Cite
|
Sign up to set email alerts
|

Leaky Objects

Abstract: This paper introduces the concept of leaky objects to describe this phenomenon in which shared objects unintentionally reveal implicit information about individual or collective users. This leaking of implicit information changes our individual interactions with objects to through objects, enabling expressive communication and ambiguous speculation. The aim of this paper is raise awareness of this phenomenon through an ongoing autobiographical design probe in which remote interpersonal communication through a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Within interaction design, leakiness has been conceptualized in the light of leakage of digital information from, e.g. surveillance cameras (Pierce 2019;Helms 2017) and knowledge leakage from low-fidelity artifacts (Andersen 2017). Our account of leakiness distinguishes itself from this prior work, by primarily drawing on feminist theories of leaky bodies (Shildrick 1997).…”
Section: Leakinessmentioning
confidence: 99%
“…Within interaction design, leakiness has been conceptualized in the light of leakage of digital information from, e.g. surveillance cameras (Pierce 2019;Helms 2017) and knowledge leakage from low-fidelity artifacts (Andersen 2017). Our account of leakiness distinguishes itself from this prior work, by primarily drawing on feminist theories of leaky bodies (Shildrick 1997).…”
Section: Leakinessmentioning
confidence: 99%
“…This can be immensely beneficial for users, even when it goes beyond the assumption that my interaction is improving my interaction to include the interaction of others. Yet, it can also be highly problematic -singling out users or 'leaking' data to another system or user [32]. The house of cards of interaction effects is also not robust and it is embedded in itself.…”
Section: Interaction Effectsmentioning
confidence: 99%