1,533
Views
16
CrossRef citations to date
0
Altmetric
Articles

New directions in information technology law: learning from human–computer interaction

&
Pages 150-169 | Received 06 Jan 2017, Accepted 19 Jan 2017, Published online: 28 Mar 2017

References

  • Aarts, E., and S. Marzano. 2003. The New Everyday: Views on Ambient Intelligence. Rotterdam: 010 Publishers.
  • Arkko, J., D. Thaler, and D. McPherson. 2015. IETF RC 7452: Architectural Considerations in Smart Object Networking. Fremont, CA: IETF.
  • Article 29 Working Party. 2014. Opinion 8/2014 on the Recent Developments on the Internet of Things WP 23. Brussels: European Commission.
  • Ashton, K. 2009. “That Internet of Things Thing.” RFID Journal 22: 97–114.
  • Ausloos, J., and A. Kuczerawy. 2016. “From Notice-and-Takedown to Notice-and-Delist: Implementing the Google Spain Ruling.” CTLJ 14: 219–258.
  • Bachour, K., R. Wetze, M. Flintham, T. D. Huynh, T. Rodden, and L. Moreau. 2015. “Provenance for the People: A User-Centered Look at the W3C PROV Standard through an Online Game.” Proceedings CHI ‘15, 2437–2446.
  • Bakos, Y., F. Marotta-Wurgler, and D. Trossen. 2014. “Does Anyone Read the Fine Print? Consumer Attention to Standard Form Contracts.” JLS 43 (1): 1–35. doi: 10.1086/674424
  • Baldwin, R., and M. Cave. 1999. Understanding Regulation: Theory Strategy and Practice. Oxford: OUP.
  • Bansler, J. 1989. “Systems Development Research in Scandinavia: Three Theoretical Schools.” SJIS 1 (1). http://aisel.aisnet.org/sjis/vol1/iss1/1.
  • Barocas, S., S. Hood, and M. Ziewitz. 2013. “Governing Algorithms: A Provocation Piece.” Governing Algorithms, NY, USA.
  • Barthel, R., K. Leder Mackley, A. Hudson-Smith, A. Karpovich, M. de Jode, and C. Speed. 2011. “An Internet of Old Things as an Augmented Memory System.” PUC 17 (2): 321–333.
  • Benford, S., G. Giannachi, B. Koleva, T. Rodden. 2009. “From Interaction to Trajectories, Designing Coherent Journeys through User Experiences.” Proceedings of CHI ’09, 709–718. doi: 10.1145/1518701.1518812
  • Benford, S., A. Hazzard, A. Chamberlain, K. Glover, C. Greenhalgh, L. Xu, M. Hoare, and D. Darzentas. 2016. “Accountable Artefacts: The Case of the Carolan Guitar.” Proceedings CHI ‘16, 1163–1175.
  • Bernal, P.A. 2011. “A Right to Delete?” EJLT 2 (2). http://ejlt.org/issue/view/6.
  • Bjerknes, G., and T. Bratteteig. 1995. “User Participation and Democracy: A Discussion of Scandinavian Research on System Development.” SJIS 7 (1): 73–98.
  • Black, J. 2001. “Decentring Regulation: Understanding the Role of Regulation and Self-regulation in a Post-Regulatory World.” Current Legal Problems 54 (1): 103–146. doi: 10.1093/clp/54.1.103
  • Black, J. 2002. “Critical Reflections on Regulation.” AJLP 27: 1–35.
  • Black, J. 2007. “Tensions in the Regulatory State.” Public Law (Spring): 58–73.
  • Bødker, S. 2006. “When Second Wave HCI Meets Third Wave Challenges.” Proceedings of NORDICHI ’06, 1–8. doi: 10.1145/1182475.1182476
  • Bødker, S. 2016. “Third Wave HCI, 10 Years Later – Participation and Sharing.” Interactions – September-October.
  • Brockmann, D., and F. Theis. 2008. “Money Circulation, Trackable Items, and the Emergence of Universal Human Mobility Patterns.” IEEE Pervasive Computing 7 (4): 28–35. doi: 10.1109/MPRV.2008.77
  • Brown, I. 2015. “GSR Discussion Paper: Regulation and the Internet of Things.” ITU, Geneva.
  • Brownsword, R. 2004. “What the World Needs Now: Techno-Regulation, Human Rights and Human Dignity.” In Human Rights: Global Governance and the Quest for Justice, edited by R. Brownsword, 203. Oxford: Hart. https://kclpure.kcl.ac.uk/portal/en/publications/what-the-world-needs-now-technoregulation-human-rights-and-human-dignity(3cc2cf53-bf1f-4a53-b6e9-ec7d72bb3a2c).html.
  • Caceres, R., and A. Friday. 2012. “Ubicomp Systems at 20: Progress, Opportunities and Challenges.” IEEE Pervasive Computing 11 (1): 14–21. doi: 10.1109/MPRV.2011.85
  • Caddy, P. 2013. “‘Surrendering Your Immortal Soul’: Does Anybody Ever Read Terms and Conditions?” LexisNexis Comet, September 19.
  • Cavoukian, A. 2011. 7 Foundational Principles of Privacy by Design. Ontario: Information and Privacy Commissioner of Ontario.
  • Choe, E.K., S. Consolvo, J. Jung, B. Harrison, and J. Kientz. 2011. “Living in a Glass House: A Survey of Private Moments in the Home.” Proceedings Ubicomp ‘11.
  • Cisco. 2013. “The Internet of Everything.” http://www.cisco.com/c/dam/en_us/about/business-insights/docs/ioe-value-at-stake-public-sector-analysis-faq.pdf.
  • Cisco Website. 2016. “Visual Networking Index.“ http://www.cisco.com/c/en/us/solutions/service-provider/visual-networking-index-vni/index.html.
  • Crabtree, A., and T. Rodden. 2004. “Domestic Routines and Design for the Home.” CSCW 13 (2): 191–220.
  • Crabtree, A., M. Rouncefield, and P. Tolmie. 2012. Doing Design Ethnography. London: Springer Verlag.
  • Danezis, G., J. Domingo-Ferrer, M. Hansen, J.-H. Hoepman, D. Le Métayer, R. Tirtea, and S. Schiffner. 2014. Privacy and Data Protection by Design – From Policy to Engineering. Heraklion: ENISA.
  • Darzentas, D., M. Brown, M. Flintham, and S. Benford. 2015. “The Data Driven Lives of Wargaming Miniatures.” Proceedings CHI ‘15, 2427–2436.
  • Darzentas, D., A. Hazzard, M. Brown, M. Flintham, and S. Benford. 2016. “Harnessing the Digital Records of Everyday Things.” Proceedings of DRS ‘16.
  • Deakin, S., C. Sausman, B. Sones, and C. Twigg. 2015. The Internet of Things: Shaping Our Future. Cambridge: Cambridge Public Policy.
  • Dodge, M., and R. Kitchin. 2007. “‘Outlines of a World Coming into Existence’: Pervasive Computing and the Ethics of Forgetting.” Environment and Planning B: Planning and Design 34 (3): 431–445. doi: 10.1068/b32041t
  • Edwards, L. 2016a. “Privacy, Security and Data Protection in Smart Cities: A Critical EU Perspective.” EDPL 2 (1): 28–58.
  • Edwards, L. 2016b. “Sunny Spells? Non Foggy Thinking About the Right to Be Forgotten.” BILETA 2016, SlideShare. http://www.slideshare.net/lilianed/sunny-spells-non-foggy-thinking-about-the-right-to-be-forgotten.
  • Edwards, K., and B. Grinter. 2001. “At Home with Ubiquitous Computing: Seven Challenges.” Proceedings Ubicomp ‘01, 256–272.
  • Ehn, P., and M. Kyng. 1987. “The Collective Resource Approach to System Design.” Computers and Democracy: A Scandinavian Challenge, edited by G. Bjerknes, P. Ehn, and M. Kyng, 17–58. Aldershot: Avebury.
  • Eidenbenz, R., Y. Li, and R. Wattenhofer. 2013. “Reading Up on Bookcrossing.” International Journal of the Book 10 (2): 11–26. doi: 10.18848/1447-9516/CGP/v10i02/36978
  • European Commission. 2015. “Special Eurobarometer 431 ‘Data Protection’.” http://ec.europa.eu/justice/newsroom/data-protection/news/240615_en.htm.
  • Floyd, C., W.-M. Mehl, F.-M. Resin, G. Schmidt, and G. Wolf. 1989. “Out of Scandinavia: Alternative Approaches to Software Design and System Development.” Human–Computer Interaction 4: 253–350. doi: 10.1207/s15327051hci0404_1
  • Fox-Brewster, T. 2014. “Londoners Give Up Eldest Children in Public WiFi Security Horror Show.” The Guardian, September 29.
  • Friedman, B., P. Kahn, and A. Borning. 2008. “Value Sensitive Design and Information Systems.” In The Handbook of Information and Computer Ethics, edited by K. Himma and H. Tavani, 69–101. New York: Wiley.
  • Garfinkel, H. 1967. Studies in Ethnomethodology. Englewood Cliffs, NJ: Prentice Hall.
  • Gartner Hype Cycle for Emerging Technologies. 2015. https://www.gartner.com/newsroom/id/3114217.
  • Gaver, B. 1991. “Technology Affordances.” Proceedings SIGCHI Conference Human Factors in Computer Systems (CHI, 91). New York, NY: ACM Press.
  • GDPR. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation). Official Journal of European Union, L119/1. http://eur-lex.europa.eu/eli/reg/2016/679/oj.
  • Giaccardi, E. 2011. “Things We Value.” Interactions 18 (1): 17–21. doi: 10.1145/1897239.1897245
  • Gibson, J. J. 1979. The Ecological Approach to Visual Perception. Boston: Houghton Mifflin.
  • Gillespie, T., 2012. “The Relevance of Algorithms.” In Media Technologies, edited by Tarleton Gillespie, Pablo Boczkowski, and Kirsten Foot, 167–195. Cambridge, MA: MIT Press. https://www.scribd.com/document/292547806/The-Relevance-of-Algorithms-Tarleton-Gillespie.
  • Gillespie, T., and N. Seaver. 2016. “Critical Algorithm Studies: A Reading List.” https://socialmediacollective.org/reading-lists/critical-algorithm-studies/#0.5.
  • Glenn, J., and R. Walker. 2012. Significant Objects: 100 Extraordinary Stories About Ordinary Things. Seattle, WA: Fantagraphics.
  • Google Spain. 2014. C-131/12.
  • Harper, R., ed. 2003. Inside the Smart Home. London: Springer-Verlag.
  • Hood, C., and H. Z. Margetts. 2007. The Tools of Government in the Digital Age. New York: Palgrave MacMillan.
  • Horn, M. S., Z. S. Leong, M. Greenberg, and R. Stevens. 2015. “Kids and Thermostats: Understanding Children’s Involvement with Household Energy Systems.” International Journal of Child-Computer Interaction 3–4: 14–22. doi: 10.1016/j.ijcci.2015.09.002
  • Huawei Website. 2016. Global Connectivity Index 2016.
  • Hutchins, E. 1995. Cognition in the Wild. Cambridge: MIT Press.
  • International Telecommunications Union. 2012. “Overview of the Internet of Things.” Rec ITU Y.2060.
  • Jaap Koops, B. 2006. Starting Points for IT Regulation: Vol 9 – Deconstructing Prevalent Policy One Liners. The Hague: Asser Press.
  • Jondet, N. 2006. “La France v Apple: Who’s the Dadvsi in DRMs.” SCRIPTed 3 (4): 473–484. doi: 10.2966/scrip.030406.473
  • Kitchin, R. 2016. “Thinking About and Critically Researching Algorithms.” Information, Communications and Society 20: 1–16.
  • Leenes, R. 2011. “Framing Techno-Regulation: An Exploration of State and Non-State Regulation by Technology.” Legisprudence 5 (2): 143–169. doi: 10.5235/175214611797885675
  • Lessig, L. 2006. Code Version 2.0. New York: Basic Books.
  • Luger, E., S. Moran, and T. Rodden. 2013. “Consent for All: Revealing the Hidden Complexity of Terms and Conditions.” Proceedings CHI ‘13, 2687–2696.
  • Luger, E., and T. Rodden. 2013. “An Informed View on Consent for Ubicomp.” Proceedings Ubicomp ‘13.
  • Luger, E., L. Urquhart, T. Rodden, and M. Golembewski. 2015. “Playing the Legal Card.” Proceedings CHI ‘15, 457–466.
  • Mäkinen, L. 2016. “Surveillance On/Off: Examining Home Surveillance Systems from the User’s Perspective.” Surveillance & Society 14 (1): 59–77.
  • Marsden, C. 2011. Internet Co-Regulation: European Law, Regulatory Governance and Legitimacy in Cyberspace. Cambridge: CUP.
  • Marsden, C., and I. Brown. 2013. Regulating Code. Cambridge, MAMIT Press.
  • Mayer-Schonberger, V. 2009. Delete: The Virtue of Forgetting in the Digital Age. Princeton, NJ: Princeton University Press.
  • McAuley, D. 2016. What is IoT? That is Not the Question. IoT UK.
  • McDonald, A., and L. F. Cranor. 2008. “The Cost of Reading Privacy Policies.” I/S A Journal of Law and Policy for the Information Society.
  • Meese, R., S. Ali, E. Thorne, S. Benford, A. Quinn, R. Mortier, B. Koleva, T. Pridmore, and S. Baurley. 2013. “From Codes to Patterns: Designing interactive Decoration for Tableware.” Proceedings CHI ‘13, 931–940.
  • Moreau, L., and P. Missier. 2012. PROV-DM: The PROV Data Model. W3C.
  • Murray, A. 2006. The Regulation of Cyberspace: Control in the Online Environment. Abingdon: Routledge Cavendish.
  • Nissenbaum, H. 2005. “Values in Technical Design.” In Encyclopaedia of Science, Technology and Ethics, edited by C. Mitcham, 66–70. New York: MacMillan.
  • Norman, D. 1988. The Psychology of Everyday Things. New York: Basic Books.
  • Norman, D. 2013. The Design of Everyday Things: Revised and Expanded Edition. Cambridge, MA: MIT Press.
  • Oulasvirta, A., et al. 2012. “Long-term Effects of Ubiquitous Surveillance in the Home.” Proceedings Ubicomp ‘12.
  • Parris, R. 2012. Online Ts&Cs Longer Than Shakespeare Plays – Who Reads Them? Which?
  • Reidenberg, J. 1998. “Lex Informatica: The Formulation of Policy Rules through Technology.” Texas Law Review 76: 553–594.
  • Rodden, T., and S. Benford. 2003. “The Evolution of Buildings and Implications for the Design of Ubiquitous Domestic Environments.” Proceedings CHI ‘03, 9–16.
  • Rogers, Y. 2005. “New Theoretical Approaches for Human Computer Interaction.” Annual Review of Information Science and Technology 38 (1): 87–143. doi: 10.1002/aris.1440380103
  • Rose, K., S. Eldridge, and L. Chapin. 2015. Internet of Things: An Overview. Internet Society.
  • Rosner, G. 2016. “In the Age of Connected Devices, Will Our Privacy Regulations Be Good Enough?” O’Reilly, February 1.
  • Satyanarayanan, M. 2001. “Pervasive Computing: Visions and Challenges.” IEEE Personal Communications.
  • Selznick, P. 1985. “Focusing Organizational Research on Regulation.” In Regulatory Policy and the Social Science, edited by R. G. Noll, 363–364. Berkeley: University of California.
  • Shneiderman, B. 2000. “Universal Usability.” Communications of the ACM 43 (5): 84–91. doi: 10.1145/332833.332843
  • Smithers, R. 2011. “Terms and Conditions: Not Reading Small Print Can Mean Big Problems.” The Guardian, 11/05/11.
  • Speed, C., D. Shingleton, S. Box, T. Cherrett, J. Dickinson, N. Davies, and S. Norgate. 2013. “An Internet of Cars.” 45th Annual UTSG Conference, Oxford, UK.
  • Sterling, B. 2005. Shaping Things. Cambridge, MA: MIT Press.
  • Suchman, L. 1987. Plans and Situated Actions: The Problem of Human-Machine Communication. New York: Cambridge University Press.
  • Tene, O., and J. Polonetsky. 2013. “Big Data for All: Privacy and User Control in the Age of Analytics.” NJTIP 11. 239–272.
  • Tolmie, P., J. Pycock, T. Diggins, A. MacLean, and A. Karsenty. 2002. “Unremarkable Computing.” Proceedings CHI ‘02.
  • Tolmie, P., J. Pycock, T. Diggins, A. MacLean, and A. Karsenty. 2003. “Towards the Unremarkable Computer: Making Technology at Home in Domestic Routine.” In Inside the Smart Home, edited by R. Harper, 183–206. London: Springer-Verlag.
  • Ur, B., J. Jung, and S. Schechter. 2014. “Intruders Versus Intrusiveness: Teens’ and Parents’ Perspectives on Home-Entryway Surveillance.” Proceedings UbiComp' 14, 129–139.
  • Urquhart, L. 2013. “The Persistence of Memory towards the Synchronic Society.” Gikii ‘13.
  • Urquhart, L. 2016. “Towards User Centric Regulation: Exploring the Interface Between IT Law and HCI.” PhD thesis, University of Nottingham.
  • Urquhart, L., and T. Rodden. 2016. “A Legal Turn in Human Computer Interaction?” SSRN. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2746467.
  • Vanhemert. 2014. “Needy Robotic Toaster Sells Itself If Neglected.” Wired.com, 18/03/14 http://www.wired.co.uk/article/addicted-toaster.
  • Von Hirsch, A., D. Garland, and A. Wakefield. 2004. Ethical and Social Perspectives on Situational Crime Prevention. Oxford: Hart. http://www.hartpub.co.uk/BookDetails.aspx?ISBN=9781841135533.
  • Walport, M. 2014. Internet of Things: Making the Most of the Second Digital Revolution. London: UK Government Office of Science.
  • Weiser, M. 1993. “Some Computer Science Issues in Ubiquitous Computing.” Communications of the ACM 36 (7): 75–84. doi: 10.1145/159544.159617
  • Weiser, M., and J. S. Brown. 1997. “The Coming Age of Calm Technology.” In Beyond Calculation, edited by Denning, and Metcalfe, 75–85. New York: Copernicus.
  • Winner, L. 1980. “Do Artifacts Have Politics?” Daedalus 109 (1): 121–136.
  • Yang, R., and M. Newman. 2013. “Learning from a Learning Thermostat: Lessons for Intelligent Systems for the Home.” Proceedings Ubicomp ‘13.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.