1,849 Matching Annotations
  1. Jan 2019
    1. Contrary to mainstream thinking that this new technology is unregulated, it’s really quite the opposite. These systems apply the strictest of rules under highly deterministic and predictable models that are regulated through mathematics. In the future, industry will be regulated not just by institutions and committees but by algorithms and mathematics. The new technology will gradually out-regulate the regulators and, in many cases, make them obsolete because the new system offers more certainty. Antonopoulos explains that “the opposite of authoritarianism is not chaos, but autonomy.”

      <big>评:</big><br/><br/>1933 年德国包豪斯设计学院被纳粹关闭,大部分师生移民到美国,他们同时也把自己的建筑风格带到了美利坚。尽管人们在严格的几何造型上感受到了冷漠感,但是包豪斯主义致力于美术和工业化社会之间的调和,力图探索艺术与技术的新统一,促使公众思考——「如何成为更完备的人」?而这一点间接影响到了我们现在所熟知的美国式人格。<br/><br/>区块链最终会超越「人治」、达到「算法自治」的状态吗?类似的讨论声在人工智能领域同样不绝于耳。「绝对理性」站到了完备人格的对立面,这种冰冷的特质标志着人类与机器交手后的败退。过去有怀疑论者担心,算法的背后实际上由人操控,但随着「由算法生成」的算法,甚至「爷孙代自承袭」算法的出现,这样的担忧逐渐变得苍白无力——我们有了更大的焦虑:是否会出现 “blockchain-based authoritarianism”?

  2. wendynorris.com wendynorris.com
    1. Zack [42] distinguished these four termsaccording to two dimensions: the nature of what is being processed and the consti-tution of the processing problem.The nature of what is being processed is either information or frames of ref-erence. With information, we mean “observations that have been cognitively pro-cessed and punctuated into coherent messages” [42]. Frames of reference [4, p.108], on the other hand, are the interpretative frames which provide the context forcreating and understanding information. There can be situations in which there is alack of information or a frame of reference, or too much information or too manyframes of reference to process.

      Description of information processing challenges and breakdowns.

      Uncertainty -- not enough information

      Complexity -- too much information

      Ambiguity -- lack of clear meaning

      Equivocality -- multiple meanings

    2. Ta b l e 3DERMIS design premises [29]

      Muhren and Walle use the 6 of the 9 most relevant design premises for the future information system design guidelines for DERMIS, another crisis management system

      Information focus (dealing with complexity)

      Crisis memory (creating historical frames of reference)

      Exceptions as norms (support changing frames of reference in fluid, unpredictable scenario)

      Scope and nature of crisis (support adaptable management depending on type of crisis)

      Information validity and timeliness (synergy of coping with uncertainty and creating frames of reference from relevant, known information)

      Free exchange of information (synergy of social context and creating useful/sharable frames of reference)

    3. For our research design, we drew on Walsham [33] and Klein and Myers [13],who provide comprehensive guidelines on how to conduct interpretive case studyresearch in the IS domain.

      Bookmarked as a reminder to get these papers which could be helpful for the participatory design study.

    4. The problems of managing information and managing frames of reference are“tightly linked in a mutually interacting loop” and require “managing informationand the systems that provide it” [42]. IS have been generally designed to overcomethe information problems from Table 1. Most IS are aimed at either storing and re-trieving information to reduce uncertainty, such as database management systemsand document repositories, or at analyzing and processing large amounts of infor-mation to reduce complexity, such as decision support systems [31]. However, aswe have previously discussed, information related strategies are not always helpfulin coping with a variety of potential meanings.Problems of interpretation and the creation and management of frames of refer-ence, which aids Sensemaking, have generally not been taken into account whendesigning IS. Most IS currently seem tointend the opposite because they aim atreplacing or suppressing the possibility tomake sense of situations.

      Description of problem in integrating sensemaking (interpretive information process) into structured data systems.

      information =/= data

    5. there is scarce research on how IS can support informa-tion processing challenges—specifically related to Sensemaking—in crisis manage-ment [14]

      Muhren and Walle also state that there are "few studies that use Sensemaking as an analytical lens for the design of information technology."

    6. Sensemaking is about contextual rationality, built out of vaguequestions, muddy answers, and negotiated agreements that attempt to reduce ambi-guity and equivocality. The genesis of Sensemaking is a lack of fit between whatwe expect and what we encounter [40]. With Sensemaking, one does not look at thequestion of “which course of action should we choose?”, but instead at an earlierpoint in time where users are unsure whether there is even a decision to be made,with questions such as “what is going on here, and should I even be asking this ques-tion just now?” [40]. This shows that Sensemaking is used to overcome situationsof ambiguity. When there are too many interpretations of an event, people engagein Sensemaking too, to reduce equivocality.

      Definition of sensemaking and how the process interacts with ambiguity and equivocality in framing information.

      "Sensemaking is about coping with information processing challenges of ambiguity and equivocality by dealing with frames of reference."

    7. Decision making is traditionally viewed as a sequential process of problem classifi-cation and definition, alternative generation, alternative evaluation, and selection ofthe best course of action [26]. This process is about strategic rationality, aimed atreducing uncertainty [6, 36]. Uncertainty can be reduced through objective analysisbecause it consists of clear questions for which answers exist [5, 40]. Complex-ity can also be reduced by objective analysis, as it requires restricting or reducingfactual information and associated linkages [42]

      Definition of decision making and how this process interacts with uncertainty and complexity in information.

      "Decision making is about coping with information processing challenges of uncertainty and complexity by dealing with information"

    8. The central problem requiring Sensemaking ismostly that there are too many potential meanings, and so acquiring informationcan sometimes help but often is not needed. Instead, triangulating information [34],socializing and exchanging different points of view [20], and thinking back of pre-vious experiences to place the current situation into context, as the retrospectionproperty showed us, are a few strategies that are likely to be more successful forSensemaking.

      Strategies for sensemaking

    9. Just as the information processing challenges from Table 1 are not mutually ex-clusive, Sensemaking and decision making cannot be separated, but instead operatesimultaneously. Meaning must be established and then sufficiently negotiated priorto acting on information [42]: Sensemaking shapes events into decisions, and deci-sion making clarifies what is happening [40].

      Interaction between sensemaking and decision making

    10. Weick et al. [41, p. 419] formulate a gripping conclusion on what the sevenSensemaking properties are all about: “Taken together these properties suggest thatincreased skill at Sensemaking should occur when people are socialized to makedo, be resilient, treat constraints as self-imposed, strive for plausibility, keep show-ing up, use retrospect to get a sense of direction, and articulate descriptions thatenergize. These are micro-level actions. They are small actions. But they are smallactions with large consequences.”

      Description of how the seven properties interact to foster sensemaking.

    11. The seven different properties of Sensemaking can be captured by the acronym SIRCOPE: Social context, Identity construction, Retrospection, Cue extraction, Ongo-ing projects, Plausibility, and Enactment [17–21, 37–39]

      "Weick distinguishes between seven properties of Sensemaking"

    12. Crisis environments are characterized by various types of information problemsthat complicate the response, such as inaccurate, late, superficial, irrelevant, unreli-able, and conflicting information [30, 32]. This poses difficulties for actors to makesense of what is going on and to take appropriate action. Such issues of informationprocessing are a major challenge for the field of crisis management, both concep-tually and empirically [19].

      Description of information problems in crisis environments.

    13. We use the theory of Sensemaking to study exactly this: how people makesense of their environment, and how they give meaning to what is happening. Sense-making is a crucial process in crises, as the manner and thereby the success of howone deals with crucial events is determined by the grasp one has of a situation.

      Sensemaking frame used in this study relies on work by Weick, et al.

    1. Value Sensitive Design (VSD) emphasizes consideration of stakeholder values when making design decisions [5]. Applying this rationale to the goal of leveraging the capacity of digital workers during crisis events, we identify design solutions that fit the underlying community dynamics, including current work practices, organizational structures, and motivations of digital volunteer work.

      Description of developing the design agenda, values, and needs assessment

      Cites Value Sensitive Design

    2. Our research reveals several design opportunities in this space. Importantly, informed by the empirical findings presented here, we argue for situating solutions within current work practices and infrastructures.

      Description of design opportunities

    1. Based on our collective research on to date, we haveidentified that as tensions ebb and flow, OCs use (or,more precisely, participants engage in) any of the fourtypes of responses that seem to help the OC be gen-erative. The first generative response is labeledEngen-dering Roles in the Moment. In this response, membersenact specific roles that help turn the potentially negativeconsequences of a tension into positive consequences.The second generative response is labeledChannelingParticipation. In this response, members create a nar-rative that helps keep fluid participants informed ofthe state of the knowledge, with this narrative havinga necessary duality between a front narrative for gen-eral public consumption and a back narrative to airthe differences and emotions created by the tensions.The third generative response is labeledDynamicallyChanging Boundaries. In this response, OCs changetheir boundaries in ways that discourage or encouragecertain resources into and out of the communities at cer-tain times, depending on the nature of the tension. Thefourth generative response is labeledEvolving Technol-ogy Affordances. In this response, OCs iteratively evolvetheir technologies in use in ways that are embedded by,and become embedded into, iteratively enhanced socialnorms. These iterations help the OC to socially and tech-nically automate responses to tensions so that the com-munity does not unravel.

      Productive responses to experienced tensions.

      Evokes boundary objects (dynamically changing boundaries) and design affordances/heuristics (evolving technology affordances)

    1. These practices are highly situated, emer-gent, and contextualized and thus cannot be prespec-ified the way traditional coordination mechanismscan be. Thus, recent efforts based on an information-processing view to develop typologies of coordina-tion mechanisms (e.g., Malone et al. 1999) may be tooformal to allow organizations to mount an effectiveresponse to events characterized by urgency, novelty,surprise, and different interpretations.

      More design challenges

    2. Our findings also point to a broader divide in coor-dination research. Much of the power of traditionalcoordination models resides in their information-processing basis and their focus on the design issuessurrounding work unit differentiation and integra-tion. This design-centric view with its emphasis onrules,structures,andmodalitiesofcoordinationislessuseful for studying knowledge work.

      The high-tempo, non-routine, highly situated knowledge work of SBTF definitely falls into this category. Design systems/workarounds is challenging.

    1. By ignoring the diversity and discord of the ‘goals’ of theparticipants involved, the differentiation of strategies, and the incongruence of theconceptual frames of reference within a cooperating ensemble, much of the currentCSCW research evades the problem of how to provide computer support for peoplecooperating through the establishment of a common information space.

      Has this design challege been adequately addressed in CSCW (and CHI, for that matter) in the last 30-ish years?

    2. On the one hand, the visibility requirement is amplified by this divergence. Thatis, knowledge of the identity of the originator and the situational context motivat-ing the production and dissemination of the information is required so as to enableany user of the information to interpret the likely motives of the originator. On theother hand, however, the visibility requirement is moderated by the divergence ofinterests and motives. A certain degree of opaqueness is required for discretionarydecision making to be conducted in an environment charged with colliding inter-ests. Hence,visibility must be bounded.

      What role does system meta data (version control, user history, etc.) play in bounding the visibility of decision making?

      This also seems to be an area ripe for more collaborative design approaches (participatory, reflective, feminist, etc.)

    3. Thus, a computer-basedsystem supporting cooperative work involving decision making should enhancethe ability of cooperating workers to interrelate their partial and parochial domainknowledge and facilitate the expression and communication of alternative perspec-tives on a given problem. This requires a representation of the problem domainas a whole as well as a representation, in some form, of the mappings betweenperspectives on that problem domain.

      This seems to still be a major challenge in information system design as well as collaborative workflow. Even if the information/meta context is made available, do people use it?

    1. Reflective Design Strategies In addition shaping our principles or objectives, our foundational influences and case studies have also helped us articulate strategies for reflective design. The first three strategies identified here speak to characteristics of designs that encourage reflection by users. The second group of strategies provides ways for reflecting on the process of design.

      verbatim from subheads in this section

      1.Provide for interpretive flexibility.

      2.Give users license to participate.

      3.Provide dynamic feedback to users.

      4.Inspire rich feedback from users.

      5.Build technology as a probe.

      6.Invert metaphors and cross boundaries.

    2. Some Reflective Design Challenges

      The reflective design strategies offer potential design interventions but lack advice on how to evaluate them against each other.

      "Designing for appropriation requires recognizing that users already interact with technology not just on a superficial, task-centered level, but with an awareness of the larger social and cultural embeddedness of the activity."

    3. Principles of Reflective Design

      verbatim from subheads in this section

      1. Designers should use reflection to uncover and alter the limitations of design practice

      2. Designers should use reflection to re-understand their own role in the technology design process.

      3. Designers should support users in reflecting on their lives.

      4. Technology should support skepticism about and reinterpretation of its own working.

      5. Reflection is not a separate activity from action but is folded into it as an integral part of experience

      6. Dialogic engagement between designers and users through technology can enhance reflection.

    4. Reflective design, like reflection-in-action, advocates practicing research and design concomitantly, and not only as separate disciplines. We also subscribe to a view of reflection as a fully engaged interaction and not a detached assessment. Finally, we draw from the observation that reflection is often triggered by an element of surprise, where someone moves from knowing-in-action, operating within the status quo, to reflection-in-action, puzzling out what to do next or why the status quo has been disrupted

      Influences from reflection-in-action for reflective design values/methods.

    5. In this effort, reflection-in-action provides a ground for uniting theory and practice; whereas theory presents a view of the world in general principles and abstract problem spaces, practice involves both building within these generalities and breaking them down.

      A more improvisational, intuitive and visceral process of rethinking/challenging the initial design frame.

      Popular with HCI and CSCW designers

    6. CTP is a key method for reflective design, since it offers strategies to bring unconscious values to the fore by creating technical alternatives. In our work, we extend CTP in several ways that make it particularly appropriate for HCI and critical computing.

      Ways in which Senger, et al., describe how to extend CTP for HCI needs:

      • incorporate both designer/user reflection on technology use and its design

      • integrate reflection into design even when there is no specific "technical impasse" or metaphor breakdown

      • driven by critical concerns, not simply technical problems

    7. CTP synthesizes critical reflection with technology production as a way of highlighting and altering unconsciously-held assumptions that are hindering progress in a technical field.

      Definition of critical technical practice.

      This approach is grounded in AI rather than HCI

      (verbatim from the paper) "CTP consists of the following moves:

      • identifying the core metaphors of the field

      • noticing what, when working with those metaphors, remains marginalized

      • inverting the dominant metaphors to bring that margin to the center

      • embodying the alternative as a new technology

    8. Ludic design promotes engagement in the exploration and production of meaning, providing for curiosity, exploration and reflection as key values. In other words, ludic design focuses on reflection and engagement through the experience of using the designed object.

      Definition of ludic design.

      Offers a more playful approach than critical design.

    9. goal is to push design research beyond an agenda of reinforcing values of consumer culture and to instead embody cultural critique in designed artifacts. A critical designer designs objects not to do what users want and value, but to introduce both designers and users to new ways of looking at the world and the role that designed objects can play for them in it.

      Definition of critical design.

      This approach tends to be more art-based and intentionally provocative than a practical design method to inculcate a certain sensibility into the technology design process.

    10. value-sensitive design method (VSD). VSD provides techniques to elucidate and answer values questions during the course of a system's design.

      Definition of value-sensitive design.

      (verbatim from the paper)

      *"VSD employs three methods :

      • conceptual investigations drawing on moral philosophy, which identify stakeholders, fundamental values, and trade-offs among values pertinent to the design

      • empirical investigations using social-science methods to uncover how stakeholders think about and act with respect to the values involved in the system

      • technical investigations which explore the links between specific technical decisions and the values and practices they aid and hinder" *

    11. From participatory design, we draw several core principles, most notably the reflexive recognition of the politics of design practice and a desire to speak to the needs of multiple constituencies in the design process.

      Description of participatory design which has a more political angle than user-centered design, with which it is often equated in HCI

    12. PD strategies tend to be used to support existing practices identified collaboratively by users and designers as a design-worthy project. While values clashes between designers and different users can be elucidated in this collaboration, the values which users and designers share do not necessarily go examined. For reflective design to function as a design practice that opens new cultural possibilities, however, we need to question values which we may unconsciously hold in common. In addition, designers may need to introduce values issues which initially do not interest users or make them uncomfortabl

      Differences between participatory design practices and reflective design

    13. We define 'reflection' as referring tocritical reflection, orbringing unconscious aspects of experience to conscious awareness, thereby making them available for conscious choice. This critical reflection is crucial to both individual freedom and our quality of life in society as a whole, since without it, we unthinkingly adopt attitudes, practices, values, and identities we might not consciously espouse. Additionally, reflection is not a purely cognitive activity, but is folded into all our ways of seeing and experiencing the world.

      Definition of critical reflection

    14. Our perspective on reflection is grounded in critical theory, a Western tradition of critical reflection embodied in various intellectual strands including Marxism, feminism, racial and ethnic studies, media studies and psychoanalysis.

      Definition of critical theory

    15. ritical theory argues that our everyday values, practices, perspectives, and sense of agency and self are strongly shaped by forces and agendas of which we are normally unaware, such as the politics of race, gender, and economics. Critical reflection provides a means to gain some awareness of such forces as a first step toward possible change.

      Critical theory in practice

    16. We believe that, for those concerned about the social implications of the technologies we build, reflection itself should be a core technology design outcome for HCI. That is to say, technology design practices should support both designers and users in ongoing critical reflection about technology and its relationship to human life.

      Critical reflection can/should support designers and users.

  3. Dec 2018
    1. A: Anything else you’d like to say or tell the new comers and/or the community? L: Mmh, I know how it feels to be limited by your own lack of skills and today’s tools are taking away a little bit of that barrier. And the more the software helps you to get rid of the technical problems of representation, the more creative you can be. While the tool is the same, it’s very fun to see that everybody has its own take to how to use Quill. It wasn’t at first, but now I see more and more people having their own style. It’s so refreshing. I follow the group and what is going on with a lot of attention.
    2. L: It happened to us a couple of times to come up with these kinds of ideas where the audience really understands what we meant and feels as strongly as we did. We want to communicate feelings that we feel ourselves. Whatever the tool is, we wish to convey what we think is great. It sounds a little bit cliché but if you’re out just for the pretty picture, I think it’s a waste of time.
    1. Where did you study and what were some of your first jobs? I actually have a degree in Economics from Colorado College. This was pursued at the behest of my father and after bartending for a year in London after I graduated, I went to the Vancouver Film School and took their course in Multimedia. My first jobs were all menial labor: I worked sorting packages at a Greyhound station, cleaning recycled bottles at a brewery and erected party tents. After VFS, I moved to New York and freelanced as a web designer/flash animator for a bit before I helped found heavy.com with two of the guys I had been freelancing for. That lasted for about five years before I started Buck with my partners in 2003.
    1. participatory approach is compatible with empathic user research [81] that avoids the scientific distance that cuts the bonds of humanity between researcher and subject, pre-empting a major resource for design (empathy, love, care).

      Definition of participatory design

    1. Theproblem, then, was centered by social scientists in the process of design. Cer-tainly, many studies in CSCW, HCI, information technology, and informa-tion science at least indirectly have emphasized a dichotomy betweendesigners, programmers, and implementers on one hand and the social ana-lyst on the other.

      Two different camps on how to resolve this problem:

      1) Change more flexible social activity/protocols to better align with technical limitations 2) Make systems more adaptable to ambiguity

    2. In particular, concurrency control problems arise when the software, data,and interface are distributed over several computers. Time delays when ex-changing potentially conflicting actions are especially worrisome. ... Ifconcurrency control is not established, people may invoke conflicting ac-tions. As a result, the group may become confused because displays are incon-sistent, and the groupware document corrupted due to events being handledout of order. (p. 207)

      This passage helps to explain the emphasis in CSCW papers on time/duration as a system design concern for workflow coordination (milliseconds between MTurk hits) versus time/representation considerations for system design

    1. Noguidance was given to the participants regarding what topography or function of behavior to choose, nor which client tochoose. The BIPs that were submitted included a wide range of behavior topographies and functions, as depicted inTables 2 and 3. The ages of the clients ranged significantly, but were roughly equivalent across the two groups, witha mean age of 8.75 years (range = 3–19) in the treatment group and a mean age of 7.75 years (range = 4–10) in thecontrol group. It seems reasonable that due to reactivity, participants would choose to send a BIP that they believedwas good-quality, however, this reactivity was likely to be equally distributed across groups. Each BIP was then scoredas the pre-test data for that participant. For participants in the control group, the participant was then asked to updatetheir BIP however they see fit over the next 24 h and resubmit it. For participants in the BIP builder group, they wereasked to update their BIP using the BIP builder within the next 24 h. No further instructions were given to theparticipants.
  4. Nov 2018
    1. how does misrepresentative information make it to the top of the search result pile—and what is missing in the current culture of software design and programming that got us here?

      Two core questions in one? As to "how" bad info bubbles to the top of our search results, we know that the algorithms are proprietary—but the humans who design them bring their biases. As to "what is missing," Safiya Noble suggests here and elsewhere that the engineers in Silicon Valley could use a good dose of the humanities and social sciences in their decision-making. Is she right?

    1. I don't think passing the entire http client is very idiomatic, but what is quite common is to pass the entire "environment" (aka runtime configuration) that your app needs through every function. In your case if the only variant is the URL then you could just pass the URL as the first parameter to get-data. This might seem cumbersome to someone used to OO programming but in functional programming it's quite standard. You might notice when looking at example code, tutorials, open source libraries etc. that almost all code that reads or writes to databases expects the DB connection information (or an entire db object) as a parameter to every single function. Another thing you often see is an entire "env" map being passed around which has all config in it such as endpoint URLs.

      passing state down the call stack configuration, connection, db--pretty common in FP

    2. Something that I've found helps greatly with testing is that when you have code with lots of nested function calls you should try to refactor it into a flat, top level pipeline rather than a calling each function from inside its parent function. Luckily in clojure this is really easy to do with macros like -> and friends, and once you start embracing this approach you can enter a whole new world of transducers. What I mean by a top level pipeline is that for example instead of writing code like this: (defn remap-keys [data] ...some logic...) (defn process-data [data] (remap-keys (flatten data))) (defn get-data [] (let [data (http/get *url*)] (process-data data))) you should make each step its own pure function which receives and returns data, and join them all together at the top with a threading macro: (defn fetch-data [url] (http/get url)) (defn process-data [data] (flatten data)) (defn remap-keys [data] ...some logic...) (defn get-data [] (-> *url* fetch-data process-data remap-keys)) You code hasn't really changed, but now each function can be tested completely independently of the others, because each one is a pure data transform with no internal calls to any of your other functions. You can use the repl to run each step one at a time and in doing so also capture some mock data to use for your tests! Additionally you could make an e2e tests pipeline which runs the same code as get-data but just starts with a different URL, however I would not advise doing this in most cases, and prefer to pass it as a parameter (or at least dynamic var) when feasible.

      testing flat no deep call stacks, use pipelines

    3. One thing Component taught me was to think of the entire system like an Object. Specifically, there is state that needs to be managed. So I suggest you think about -main as initializing your system state. Your system needs an http client, so initialize it before you do anything else

      software design state on the outside, before anything else lessions from Component

    1. ADVERTISEMENT

      If you're going to include ads in your app, they need to be actual images. This looks broken.

    1. Learning needs analysis of collaborative e-classes in semi-formal settings: The REVIT exampl

      This article explores the importance of analysis of instructional design which seems to be often downplayed particularly in distance learning. ADDIE, REVIT have been considered when evaluating whether the training was meaningful or not and from that a central report was extracted and may prove useful in the development of similar e-learning situations for adult learning.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. In addition to discussing Knowles Andragogy learning theory this article also looks into two other adult learning theories: experiential and transformational. For learning to be successful in adults instructional designers need to "tap into prior experiences," "create a-ha moments," and "create meaning" by connecting to reality. Rating: 5/5

    1. Thinking in Multimedia: Research-Based Tips on Designing and Using Interactive Multimedia Curricula.

      This article examines various methods of delivery: multimedia integration, possibly including audio, video, slides, and animation. The recommendation is to carefully consider which online delivery mode matches with the learner, and to be cognizant that not everyone learns in the same manner. Certain topics may be best presented in live videos and not in power-point slides show as meaning may be lost or not delivered correctly. It’s important to follow-up with immediate assessment and feedback to continue to develop effective training.

      RATING: 5/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Instructional Design Strategies for Intensive Online Courses: An Objectivist-Constructivist Blended Approach

      This was an excellent article Chen (2007) in defining and laying out how a blended learning approach of objectivist and constructivist instructional strategies work well in online instruction and the use of an actual online course as a study example.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. How To Create A Mobile App in 10 Easy Steps

      Buildfire is a site that presents how to create a mobile app in 10 easy steps. Site is easy to read and use.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Prezi is a productivity platform that allows for creation, organization, collaboration of presentations. It can be used with either mobile or desktop. Prezi integrates with slack and salesforce. RATING: 5/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Older adult learning environment preferences

      Older adult preferences.is a dissertation preview that introduces the dissertation on preference of older adults to attend in person classes weekly for four to six hours.

      The information gleaned from this study is significant for learning designers and course structure. The study also investigated the time and location of the study, and the class make up. This information also warrants further investigation when designing courses for these adults and the success of the program. The dissertation is of value to those who are specifically involved in designing programs for older adults.

      RATING: 8/10

    1. format in which these materials are available to students, then, has an impact on students' willingness to access and use materials,

      This is very much a design concept. Where do "we" like to access and engage with material?

    1. Holographic computing made possible

      Microsoft hololens is designed to enable a new dimension of future productivity with the introduction of this self-contained holographic tools. The tool allows for engagement in holograms in the world around you.

      Learning environments will gain ground with the implementation of this future tool in the learning program and models.

      RATING: 5/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. “The ADDIE model consists of five steps: analysis, design, development, implementation, and evaluation. It is a strategic plan for course design and may serve as a blueprint to design IL assignments and various other instructional activities.”

      This article provides a well diagrammed and full explanation of the addie model and its' application to technology.

      Also included on the site is a link to an online course delivered via diversityedu.com

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

  5. create-center.ahs.illinois.edu create-center.ahs.illinois.edu
    1. CREATE Overview

      Create is a non-profit organization dedicated to providing resources for the development and creation of educational technology to enhance the independence and productivity of older adult learners.

      The sight includes publications, resources, research, news, social media and information all relevant to aging and technology. It is the consortium of five universities including: Weill Cornell Medicine,University of Miami, Florida State University,Georgia Institute of Technology, and University of Illinois at Urbana-Champaign.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Six Steps to Personalize Learning

      This pdf is a step by step guide to develop personalized learning. It includes instructions to creating a six-step personalized learning program.

      I enjoyed the at-a-glance chart distinguishing the differences between personalization, differentiation and individualization. The guide is very visual and easy to ready but offers relevant tips.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Towards teaching as design: Exploring the interplay between full-lifecycle learning design tooling and Teacher Professional Development.

      This article explores the theory of training teachers as learning designers to promote innovate and creativity. Included in the article are studies of designers with little teaching experience compared with those that are full-cycle teachers and the effect of TPD and LD upon training.

      RATING: 5/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. The Moodle project

      Moodle is one of the largest open source collaborative platform used in the development of curriculum.

      Moodle is an Australian company and has various levels of subscriptions including one level for free. Overall I have found the site to be user friendly rich with demos, documentation and support including community forums. This site supports multiple languages and has an easy to use drop down menu for that selection.

      RATING: 5/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Learning Design Process

      The Royal Roads University has created this useful site that offers support and assistance in the design and development of curriculum. What I found to be very useful is the support dedicated for Moodle, the online curriculum software as I have recently signed up for the site.

      The methodology used by the University is focused on an outcomes approach with integration of pedagogical and technological elements and blended learning.

      The site has a research link and the kb was excellent. I was very pleased to have found this resource.

      RATING: 5/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

    1. Learning Needs Analysis of Collaborative E-Classes in Semi-Formal Settings: The REVIT Example.

      This article explores the importance of analysis of instructional design which seems to be often downplayed particularly in distance learning. ADDIE, REVIT have been considered when evaluating whether the training was meaningful or not and from that a central report was extracted and may prove useful in the development of similar e-learning situations for adult learning.

      RATING: 4/5 (rating based upon a score system 1 to 5, 1= lowest 5=highest in terms of content, veracity, easiness of use etc.)

  6. Oct 2018
    1. Rob Pike has described Plan 9 as "an argument" for simplicity and clarity, while others have described it as "UNIX, only moreso."

      idea of a system as an argument pointed out by: https://twitter.com/rsnous/status/1054631468142493696

    1. Slow Design (Strauss & Fuad-Luke, 2009) celebrates slowness as an answer to critical issues in design, such as an often-perceived support to consumerism, a restrictive focus on functionalism, the diminishment of users’ engagement with materials, a lack of attention to local idiosyncrasies, and the need to think in the long-term.

      A definition of "slow design" to think sideways for long-term sustainance.

    1. Critical Instructional Design is new, and as such is grounded in the work of a very few people.

      I'm interested if the conception 'Critical Instructional Design' is truly new or mere interpolation of a native concept. As far as my understanding of critical theory, from lit crit readings and study, a theory can be molded to fit any necessary unnamed reality-from the nature of the TV War... Baudrillard's 'The Gulf War Did Not Take Place' to Freudian psychoanalysis "Neuroticisms of Computer A.I." This is an excellent article to discuss critical theory in the light of a new, online iteration of the learning space meriting further research.

  7. Sep 2018
    1. Now an impoverished Marxist cultural critique suggests that such encounters between people, qua humans with richly diverse lives, are the very opposite of — or further, directly opposed by — the alienated encounters underwritten, if not compelled, by money. You see this kind of argument when people say “the ‘sharing economy’ is an oxymoron that has nothing to do with sharing because people are lending their underutilized resources for financial recompense.” However, what has always seemed to me most interesting about many ‘sharing economy’ platforms is not that they are spaces outside of commercialism, but rather ways of affording a re-embedding of economic exchanges in social relations within commercialism. When I ride-share or home-share, there might be money changing hands, but the actual experience of the ‘service’ is of two people (when there are face-to-face encounters) who cannot entirely withdraw into prescribed roles of employee and customer. This is why these ‘sharing economy’ experiences tend to be awkward, in ways that I have tried to argue are in fact deconstructive of the monolithically abstract idea of capitalism.These moments underline that there can be ‘sharing’ within economies, that relations between strangers do occur at levels or in ways beyond what is covered by their monetization. Service designing, it seems to me, is precisely the pursuit of these forms of sociality that exceed commercialism even within commercial interactions. This is the quality that a well-designed service encounter will manifest, a quality that will differentiate such a service from other less-designed ways of managing or engineering services.Service designers should therefore be expertly sensitive to these emergent and sometimes even resistant socialities. Designers should understand that at the very core of their practice is all that is concealed by excessively capitalistic perspectives: the hidden labor of informal economies; the emotional and aesthetic labor provision that service interactions compel from providers without adequate recompense; the satisfiers that make care work rewarding beyond their inequitable pay scales; the moments of delight involved in the comfort of strangers. All of these, it should be clear, are political, sensitivities that acknowledge oppression and exploitation via gender, race and class.All this is why service design is never just the design of this or that service, but part of the wider project of redesigning work and generating sustainable livelihoods. For instance, service design is not tangential to current debates about the roboticization of jobs. Service design is unavoidably involved in Transition Design, toward or away from meaningful work, or rather perhaps toward or away from quality ways of organizing the resourcing of new kinds of society.
    2. Product designers tend to aim to create tools that should be appreciated in their own right for what they help accomplish — what the philosopher of technology, Albert Borgmann calls a focal thing. These well-designed products are valued for what they enable someone skilled to do with them. The service designer is less concerned with developing a refined product, valued for its versatility or finesse, and more concerned with a material means to an end, an enabler of a service interaction. This means that those products need to be more ‘alive’ to the needs of the participants in the service. They need to be less present in their own materiality, and more automated or responsive, directing the interactions between the service co-creators.This means that service designers must have a particularly acute sense of the agency of things. All designers understand the weak forces — affordances — that the forms of things exert on users in the appropriate contexts. For service designers, these forces must be more dynamically deployed because the point is less the products themselves and more the experiences they enable but even at times direct. Compared to a product that will be used regularly, and perhaps diversely, by an owner, the touchpoints that service designers design need to be more subservient to the overall experience. They should be more sensitive to a diversity of users and use cases on the one hand, but more focused on accomplishing just this or that transition in the service journey. This means that they tend to be more animated by intention than the artifacts conventionally produced by product designers. But paradoxically, this makes them less materially present as things. A product within a service pro-duces, leads forth, by being more of a sub-ject, something underlying the process, rather than an ob-ject, something jutting out with physical presence.
    3. To accomplish these goals, service designers make use of the same power that all designers deploy and that are particular to design compared to other expert professions but that the history of non-service design has tended to ignore or fail to comprehend. Design is always the design of things, of useful things for people. To be useful, a thing must communicate or influence or force its users to interact in particular ways. You cannot design a tool that will accept any kind of input. So though modern designing has mostly focused on the design of physical products, the nature of the decisions that a designer makes about the forms (and contexts and systems) of things are completely driven by attempts to sculpt the social practices involved in using those things. I use this metaphor of sculpting to indicate that design is a process of removing materials to create the negative space to be filled by certain kinds of interactions.Service design’s focus on people-to-people coordinated interactions therefore emphasizes the obverse of artifact design. All service design is still in every case still design of things, or in the terminology of service design, touchpoints — products and environments, but also communications and interactive screens. Service design is just more oriented toward the sequences of interactions between people that can be afforded by a network of designed things.
    4. Service design at its best is an expertise in forming how people interact without directly instructing them as to what to do to get paid. But precisely because what service design brings to service management is an attention to these other ways of inducing certain kinds and qualities of interactions, service design should begin with an acknowledgement of its baseline power, that which it should always seek to avoid enlisting to effect a design. This then is why I insist on calling this practice Service Design and not Design for Service.
    1. Atomic Design details all that goes into creating and maintaining robust design systems, allowing you to roll out higher quality, more consistent UIs faster than ever before. This book introduces a methodology for thinking of our UIs as thoughtful hierarchies, discusses the qualities of effective pattern libraries, and showcases techniques to transform your team's design and development workflow.
  8. Aug 2018
    1. Then I noticed, each of the records in his queue had a set of codes in the Salutation field. He explained that there wasn't a way to see the current status from this view of their system. So, to avoid having to open each record, he used the Salutation field (which wasn't really used in the system) to store his own personal status codes.

      Work around for a design fail

    2. Once she finished, there was basically a cross-reference table of items that were actual business aspects and how they translated into the items required to use this system. In short, the last system that was delivered by the IT group required a change in the business process to use the application.

      In other words, the customer/user had to make changes (process, use of fields, etc) due to the defects of the design.

    3. Without obtaining feedback from aspects of the entire user community, situations like those noted above are likely to exist. In each case, there were significant losses to the business from what was a bad application design.

      Try getting administration/management in healthcare to acknowledge the lack of productivity caused by poor design. Not. Going. To. Happen.

    1. Marcus Vitruvius, the classical Roman architect, defined architecture in proportion to the human body—an ideal building, as he saw it, had to reflect the ideal dimensions of a man. Today such anthropocentric design, indeed male-body centered design, seems irrelevant, perhaps even irresponsible, as the magnitude of our self-inflicted environmental disasters poses fundamental challenges to architects and designers. If the human body was the correct proportion for architecture for Vitruvius, what should the scale of design be that addresses today’s environmental challenges? Climatic change, species depletion, and oceanic pollution are worldwide problems. What is left of Vitruvius’s ideal of human reach has stretched to new global scales and millennial time frames. How can architecture conceptualize a planet on which humans have become involved in vast geological forces?

      Framing a post-humanist question for architecture. What would this mean in service design?

    1. Surveillance studies have tracked a shift from discipline to control (Deleuze 1992; Haggerty and Ericson 2000; Lyon 2014) exemplified by the shift from monitoring confined populations (through technologies such as the panopticon) to using new technologies to keep track of mobile populations.

      Design implication for ICT4D and ICT for humanitarian response -- moving beyond controlled environment surveillance to ubiquitous and omnipresent.

    1. A promising approach that addresses some worker output issues examines the way that workers do their work rather than the output itself, using machine learning and/or visualization to predict the quality of a worker’s output from their behavior [119,120]

      This process improvement idea has some interesting design implications for improving temporal qualities of SBTF data: • How is the volunteer thinking about time? • Where does temporality enter into the data collection workflow? • What metadata do they rely on? • What is their temporal sensemaking approach?

    2. n the sections below, we survey and analyze the 12research focithat comprise our model. First, we consider the future of the work processesand how the workis organized and accomplished. Second, we consider the integration of crowd work and computation, including the symbiosis between human cognition, artificial intelligence(AI), and computationally-enabled crowd platforms. Finally, we consider crowd workers and how we can develop jobs, reputation systems, motivations, and incentives that will benefit them.

      Research foci

      Crowd work processes: Workflow, task assignment, hierarchy, realtime crowd work, synchronous collaboration. quality control

      Crowd computation: Crowds guiding AI, AIs guiding crowds, crowdsourcing platforms

      Crowd worker future: Job design, reputation/credentials, motivation/rewards

    1. There is also a need for mechanisms to support transformations and processesover time, both for scientific data and scientific ideas. These mechanisms should not only help the user visualize but also express time and change.

      This is still true today. Is the problem truly a technical one or an opportunity to re-imagine the human process of representing time as an attribute and time as a function of evolving data?

    1. By structuring design changes as exper-iments, these studies make credible causal claims about the relationship oforganizational structure and project outcomes that previous work struggledto establish. By intervening in real communities, these efforts achieve a levelof external validity that lab-based experiments cannot

      The paper suggests that field experiments and intervention studies could offer new insights.

    1. The focus on details and delight can be traced to manifestos like Steve Krug’s Don’t Make Me Think, which propose a dogmatic adherence to cognitive obviousness and celebrates frictionless interaction as the ultimate design accomplishment. Users should never have to question an interface. Instead, designers should anticipate and cater to their needs: ”It doesn’t matter how many times I have to click, as long as each click is a mindless, unambiguous choice.15”A “mindless, unambiguous choice” is not without cultural, social and political context.
    2. But addressing problematic internal culture of design teams is not enough. As an industry we must also confront the real-world socio-political outcomes of our practice. If we accept a code of conduct as necessary, we must also accept a code of outcomes as necessary. We must create ethical frameworks to evaluate our work at all stages, especially once it is alive in the world. Our lack of ongoing critical evaluation of our profession means that design continues to reinforce a harmful status quo, creating exploitable systems at the expense of societies.
    3. It is critical that user experience design must begin to deconstruct the outcomes of our collective body of work, especially as tech becomes more embedded and less visible or more easily ignored. Saitta writes, “All infrastructure is political; indeed, one might better say that all politics is infrastructural; we ignore it at our peril.”
    4. Beyond better design paradigms, designers must look beyond the field, toward practices that directly criticise or oppose their work. In particular, security research and user experience design have significant practice and goal overlap and this relationship is often antagonistic. Both fields primarily focus on the systems of wide-scale interactions between users and technology, but the goals of the two fields are diametrically opposed; design is to create the best possible experience for a user, security is to create the worst possible experience for an attacker. By focusing of the outcomes of the two fields, it’s clear that security research is a form of user experience design. Design should reciprocate, and become a form of security research.
    5. Design is inherently political, but it is not inherently good. With few exceptions, the motivations of a design project are constrained by the encompassing platform or system first, and the experiences and values of its designers second. The result is designers working in a user hostile world, where even seemingly harmless platforms or features are exploited for state or interpersonal surveillance and violence.As people living in societies, we cannot be separated from our political contexts. However, design practitioners research and implement systems based on a process of abstracting their audience through user stories. A user story is “a very high-level definition of a requirement, containing just enough information so that the developers can produce a reasonable estimate of the effort to implement it23.” In most cases, user are grouped through shared financial or biographical data, by their chosen devices, or by their technical or cognitive abilities.When designing for the digital world, user stories ultimately determine what is or is not an acceptable area of human variation. The practice empowers designers and engineers to communicate via a common problem-focused language. But practicing design that views users through a politically-naive lens leaves practitioners blind to the potential weaponisation of their design. User-storied design abstracts an individual user from a person of lived experience to a collection of designer-defined generalisations. In this approach, their political and interpersonal experiences are also generalised or discarded, creating a shaky foundation that allows for assumptions to form from the biases of the design team. This is at odds with the personal lived experience of each user, and the complex interpersonal interactions that occur within a designed digital platform.When a design transitions from theoretical to tangible, individual user problems and motivations become part of a larger interpersonal and highly political human network, affecting communities in ways that we do not yet fully understand. In Infrastructural Games and Societal Play, Eleanor Saitta writes of the rolling anticipated and unanticipated consequences of systems design: “All intentionally-created systems have a set of things the designers consider part of the scope of what the system manages, but any nontrivial system has a broader set of impacts. Often, emergence takes the form of externalities — changes that impact people or domains beyond the designed scope of the system^24.” These are no doubt challenges in an empathetically designed system, but in the context of design homogeny, these problems cascade.In a talk entitled From User Focus to Participation Design, Andie Nordgren advocates for how participatory design is a step to developing empathy for users:“If we can’t get beyond ourselves and our [platforms] – even if we are thinking about the users – it’s hard to transfer our focus to where we actually need to be when designing for participation which is with the people in relation to each other25.”Through inclusion, participatory design extends a design team’s focus beyond the hypothetical or ideal user, considering the interactions between users and other stakeholders over user stories. When implemented with the aim of engaging a diverse range of users during a project, participatory design becomes more political by forcing teams to address weaponised design opportunities during all stages of the process.
    6. ‘Mindless and unambiguous’ is only true for those who have both the cultural context to effortlessly decode an interface, and the confidence that their comprehension is solid. Not only is this dogma an unreasonable constraint, it also frequently fails.
    7. Weaponised design – a process that allows for harm of users within the defined bounds of a designed system – is faciliated by designers who are oblivious to the politics of digital infrastructure or consider their design practice output to be apolitical.
    1. Nardi (1996) argues that one of the inherent strengths of Activity Theory is in its ability to capture the idea of context in user models for HCI, a notion that is gaining momentum particularly with respect to the ubiquitous computing paradigm and as its own design movement, so-called activity-centered design (Gay & Hembrooke, 2003). The world that Gay and Hembrooke envision relies upon design that is not user-centered (which is currently the dominant view in the HCI community) but activity-centered, since Activity Theory provides the right “orientation” for future classes of interactions mediated by ubiquitous computing devices.

      activity-based design -- a companion to user-centered design

  9. Jul 2018
    1. The design principle of the Time Machinefollows the stage-based model of personal informatics systems proposed by Li, Dey and Forlizzi

      Not familiar with this design model. Wonder if a participatory or design thinking approach is or can be intergrated?

    2. Figure 2. The stage-based model of personal informatics systems (after [6]).

      Helpful diagram to describe stage-based model design.

    1. Figure 2: Basic demonstration of theinterior operationof the CIA device, which includedthe gear train system, rack and pinion system used for lubrication, rollers, and catheter like tubing.

      I side view of this assembly would make it easier to see how the components interact.

    1. How do we understand such mosaictime in terms of striving for balance? Temporal units are rarely single-purpose and their boundaries and dependencies are often implicit. What sociotemporal values should we be honoring? How can we account for time that fits on neither side of a scale? How might scholarship rethink balance or efficiency with different forms of accounting, with attention to institutions as well as individuals?

      Design implication: What heuristics are involved in the lived experience and conflicts between temporal logic and porous time?

    2. . When creating tools for schedulingandcoordination, it is crucial to provide ways for people to take into account not just the multiplicity of (potentially dissonant) rhythms [22, 46], but also the differential affective experiencesof time rendered by such rhythms.

      Design implication: How to accommodate rhythms and obligation with social coordination work?

      ".. one 'chunk' of time is not equivalent to any other 'chunk'"

    3. Our rendering of porous time imagines a newperspective on time, in whichthe dominant temporal logic expandsbeyond ideals of control and mastery to include navigation(with or without conscious attention) of that which cannot be gridded or managed: the temporal trails, multiple interests, misaligned rhythms and expectations of others.

      Design implication: How to mesh temporal logic with porous time realities?

    4. Yet, thepromise of social control affordedby information and communication technologies belies the inadequacy ofthe dominant temporal logic.

      Design implication: Re-aligning real time needs/pressures/representations with temporal logic.

    5. A close look at the ways that people continually navigate the expectations and rhythms of those around them reveals how much the rhetoric of time management and control, built on the assumption that one is a solo temporal agent,is a fiction.To be considered a success in various social arenas (either via internal assessment or external validation) means that individualsoften cannot choose whether or not to attend to certain temporal obligations.

      Design implication: Empowering people to navigate time more effectively or at least balance obligated time pressures.

      Critique of time management industrial complex.

    6. Thinking abouttime as mosaic raises numerous questionsabout:when the mosaic is and is not obvious; what forms of interaction (or tiles) are given priority in any one moment; what skillsareneeded to engage in mosaic time with more or less effort; and what the effects of mosaic timeareon concentration, stress, and affect. Mosaic time appears mostsuccessful when people engage in attention switching in order to enact multiple social roles at once.

      Design implication: How to accommodate mosaic time needs?

      How to even prompt users to more effectively switch to mosaic time when appropriate?

    7. . Notably, this lack of predictability had large social, rather than individual, implications—a finding that strongly echoes prior CSCW research [1, 4, 13, 15, 20, 22, 34, 35, 36, 38, 45, 46, 59]

      Design implication: This is the nut to crack.

    8. Aligned with chunk-able time is the assumption that each chunk of time, or its particular gridded arrangement, is allocated to a single purpose.

      Definition of single purpose time.

      Design implication: How does single-purpose time align or conflict with multitasking and/or blurred task types that overlap home vs office, personal vs professional.

    9. The expectation that time is chunk-able is conditioned by an understanding that time exists in units (a second, a minute, a year) and that temporal units are equal–that can be swapped and exchanged with relative ease.

      Definition of chunkable time.

      Design implication: Time is experienced in consistent, measurable, and incremental units.

      Ex: 60 minutes is always 60 minutes no matter what part of the day it occurs or in any social context, such as calendaring/scheduling an event.

      Using a chunkable time perspective, we conform our activities/appointments to clock-time increments rather than making the calendar conform. Per Mazmanian, et al., this perspective "perpetuates a sense that time is malleable and responsive" with little concern about how changing an appointment time can affect the rest of the calendar.

    10. A temporal logicoperatesat multiple levels. It is perpetuated insocialand cultural discourse; is embedded in institutional expectations and policies; drivesthe design and implementation of technologies;establishes resilient social norms; and provides a cache of normative, rational examples to draw on when individuals needtomake sense of their everyday engagements with time. When a tool like Microsoft Outlook is designed, presented, and justified in a marketing campaign it is both reflecting and perpetuating atemporal logic.

      Design implication: How temporal logic informs and influences other behaviors.

    11. What would it look like to more explicitly acknowledge power dynamics in information and communication technologies? In the tradition of critical and reflective design [50], how might CSCW scholarship think about designing technologies that ‘protect’ users from temporal obligations and render messiness and disorganization a possible way of engaging with time?

      Design implication: What if porous time was considered a feature not a bug?

      How to better integrate personal agency/autonomy and values into a temporal experience?

      How could a temporal artifact better support a user flexibly shifting/adapting temporal logic to a lived experience?

    1. Notably, a practice-oriented treatment of digital time does open up avenues for research and design, one that resonates with Kuutti and Bannon’s [23] recent account of a practice perspective forming a new paradigm for HCI. They propose that a central issue in a practice-based research agenda is the need to develop the capability to transform practices through technology. Essential to this is understanding the role of computer artefacts in the emergence and transfor-mation of practices, and the possibilities for influencing these by changing the artefacts themselves.

      How can artifacts be incorporated into a revised SBTF data collection practices? What would that look like as a product of social coordination?

    2. Consequently, efforts to design for temporal experience must do more than simply build desirable temporal models into technologies.

      Quote this for CHI paper.

    3. How can we design for time as collective and interdependent, rather than individualised on the one hand, or explicitly scheduled on the other? What does it mean to position collective time not as something that is achieved when people come together, but as a set of relationships through which they are connected? Both Sharma and Mazmanian and Erickson raise this challenge while highlighting the difficulty in addressing it; neither offer a solution.

      The big question!

      Design implication: One advantage that SBTF has is that its work is very relationship-oriented.

    4. A shared context is im-plicit here, but the ways in which rhythms that bind people are shaped has been pulled into sharper focus by Jackson et al. [21]. Picking up on Orlikowski and Yates’ position, theyargue that “distributed collective practices not only have rhythms, but in some fundamental sense are rhythms” [p. 247]. Rhythms shape collective action but are also shaped by it, and efforts to build them and to bring them into alignment are an essential part of collaborative work.

      Lookup Jackson et al paper.

      Design implication: Similar to Wilk paper. How to adopt/adapt these findings to smooth the transition for SBTF to develop new routines/rhythms around temporal data collection.

    5. Wilk [57] has considered how routines come to be cultivated, observing that every day we are presented with opportuni-ties to “naturalize something new”, and turn events into the “precedents” of new routines [p. 151]. He argues that the decisions that surround the adoption of these routines are part of the process of their cultivation, in which uncon-scious habits are brought forward into consciousness, re-flection and discourse. Cultivation can be active or passive (routines may be actively initiated, or forced upon us), and is governed by “tacit rules” that reveal “how often things must be discussed before they can be done without discus-sion, how often things have to be repeated by agreement or with supervision before they can become an accepted part of shared daily routine” [p. 151].

      Design implication: Look up Wilk paper on recommendations for creating precedents of new routines. This will be important in encouraging new/different practices for incorporating time/temporality into SBTF data collection practices.

    6. Designing for an alternative temporal experience means understanding the ways in which multiple temporali-ties intersect, whether these frame a person’s working day, or allow a family to spend time together. While scheduling technologies do of course have a role to play here [see e.g. 31], many of the temporal structures that frame everyday life are not so much scheduled as unfold in a way that isunremarkable [54], or are so firmly established that they are no longer seen as alterable.

      Design implication: To integrate multiple temporalities into technology we need to reconsider temporal structures -- or the patterns of social coordination that we use as rules, rhythms, habits, and practices that guide activity.

    7. As noted by Zerubavel, “[t]ime is definitely one of the principles that can best allow us to establish and organ-ise priority in our lives as well as to symbolically display it” [59, p. 53].

      Design implication: Heuristic of control for user

    8. The temporal experience is as much a product of the ways in which the technologies are used as it is a feature of their design. This points to how, just as has been argued for the case of clocks, digital technologies and practices have coevolved to underpin particular experiences of time.

      Design implication for digital sociotemporal experiences

    1. sregarded. Temporal Design attempts to counteract these effects by drawing attention to social practices of time. Time is a social process, tacitly defined through everyday practices. It is rehearsed, learned, designed, created, storied, and made. This aspect however is often overlooked not only by designers, but also by society in general. Designers can have a key role in unlocking the hegemonic narratives that restrict cultural understandings of time and in opening up new ways of making, living and thinking

      Description of temporal design and its purpose.

    2. As the original visions for Slow Design and Slow Technology suggest, the world is comprised of multiple temporal expressions, which play important roles in our lives, even if disregarded within dominant accounts of what ti

      What are the "multiple temporal expressions?" Examples would help here.

      Note to self: Use more explicit language, case examples, etc., to avoid reviewers' incorrectly filling in the gaps or misinterpreting an already cagey subject that's hard to pin down.

    3. The documentation of routines invited the students to reflect on the multiplicity of practices that shape temporality inside the school community, making the social layering of time more perceptible. Far from being restricted to timetables, buzzers and timed tasks, school time is a fusion of personal times, rhythms and temporal force

      This graf and the next, might be helpful for the Time Machine Project study. Cites: Adam on description of "school time."

    4. While the Printer Clock focused on emphasising the embodied and situated nature of time, pointing to the mesh of activities and characters that come together to create time, the TimeBots drew attention to personal rhythms and how they played out within the context of the classroom

      Pschetz, et al., also use idea of "situated time."

    5. e students. The TimeBots interacted with each other on a different level, revealing the subjective timescap

      Adam's timescape concept as applied to a group during social coordination.

    6. 4.3.3 TimeBotsWhile the Printer Clock focused on emphasising the embodied and situated nature of time, pointing to the mesh of activities and characters that come together to create time, the TimeBots drew attention to personal rhythms and how they played out within the context of the classroom. The aim was to challenge the idea that the world is in a state of constant acceleration by inviting children to reflect on the multiple speeds of their day. In contrast to the slow movement, which assumes acceleration as a universalised condition and attempts to counteract this condition by promoting opportunities to slow down, the intention here was to invite the students to explore the variant speeds at which they l

      Does this idea map with Reddy's premise about temporal trajectories, rhythms, and horizons?

    7. ast. Moving from a quantitative time to a qualitative one, the Printer Clock tells time through the activities of others and the variety of pictures reveals the multiplicity of rhythms within that

      Qualitative time as a way to express a new present in some one else's past.

    8. Temporal Design could thereforeinvolve:•Identifying dominant narratives, including the forces and infrastructures that sustain them or which they help to support;•Challenging these narratives, e.g. by revealing more nuanced expressions of time;•Drawing attention to alternative temporalities, their dynamics and significance;•Exposing networks of temporalities, so as to illustrate multiplicity and variety.The approach would bring several benefits:•Acknowledging that slow and fast rhythms co-occur and are often interdependent would challenge the assumption of universal acceleration,•Acknowledging that the times of some are more invested in than others, would enable challenges to temporal inequalities.•Acknowledging that the natural world has multiple rhythms would change the assumption that ittherefore provides a stable background for human-made ‘progress’(McKibben, 2008

      Highlighting this section to return to it later with more concrete application to sociotemporal representations/expressions in crises and response to crises.

    9. LARISSA PSCHETZ, MICHELLE BASTIAN, CHRIS SPEED 6With this in mind we propose Temporal Design as a shift within design towards a pluralist perspectiveon time. Temporal Design attempts to identify and challenge expressions of dominant narratives of time, as it recognises that everyday rhythms are composed of multiple temporalities, whichare defined by both direct and indirect factors. It also seeks to empower alternative notions that are neglected by these narratives. It suggests that designers should start looking at time as something that emerges in relation to a complexity of cultural, social, economicand political forces.Temporal designers wouldtherefore observe time in the social context, investigating beyond narratives of a universal time and linear progression, and beyond simple dichotomies of fast and slow. This is not to simply negate dominant notions but acknowledging that they co-exist with several other expressions in all aspects of life. There is a multiplicity of temporalities latent in the world. Designers can help to create tools that disclose them, also revealing the intricacies of temporal relationships and negotiations that take place across individuals, groups, and institutions. They would then consider a network of times that accommodates the multiplicity of temporalities in the everyday, the natural world, and in intersections between these re

      Further description of the idea around Temporal Design. But still lacks clarity about what "multiple temporalities" are and how they manifest in social coordination.

      Note to self: Use the template margins to offer concrete examples in my paper. The lack of specificity is frustrating and will surely draw the wrath of the reviewers.

    10. Despite a clear social motivation, the alternative approaches to time in design described above have been constrained by dominant narratives of time. Further they have often only considered time in terms of pace, direction and flow rather than the more complex ways that it is involved in social life (e.g. Gre

      Look up Greenhouse 1996 paper.

    11. Thus in developing a theoretical framework which could support an understanding of time as multiple, heterogeneous and deeply entangled within various social formations (which may be discrete or overlapping), work in the social sciences, particularly anthropology and sociology, has proven to be more useful. Such approaches enable us to ask different questions about what time is and how it works. Rather than seeing time as a flow between past, present and future (whether this be linear or nonlinear), it becomes possible to ask how time operates as a system for social collaboration (Sorokin and Merton 1937), how it legitimates some and ‘manages’ others (Greenhouse 1996), or how it works within systems of exclusion (Fabian 1983). We thus move from time as flow to time as s

      Describes how time bridges into the concept of social coordination.

      Look up the Sorokin and Merton (1937). Greenhouse (1996) and Fabian (1983) papers to get a better handle on how "social coordination" is defined.

    12. tries (Prado 2013). Here again, instead of looking at the present as a heterogeneous context, the present isconsidered as uniform and following a linear trajectory toward

      This is an important caveat for the study of sociotemporality in humanitarian crises. Need to stay grounded in the present and how even some immediate, incremental steps toward improving the representation of time in the data and in the data gathering process can be serve the larger, future goals of attaining real-time situational awareness.

    13. (Dunne, 1999). The call has influenced movements such as Critical Design (Dunne and Raby, 2001), Design Fictions (Bleecker, 2009) and Design for Debate (Dunne and Raby, 200

      Unclear as to how these movements differ:

      Critical Design Design Fiction Design for Debate

    14. Design has also taken a critical approach to time in its attempt to anticipate the impacts of present actions in the future, particularly those concerning the introduction of new technologies. This attitude may be generally identified in particular design projects but is most evident in speculative design movements such as Design Fictions, Critical Design and Design for Debate.Since design is often focused on yet-to-exist interventions in a given context, it is often said to be invariably future-oriented (e.g. in Dunne & Rab

      Look up Dunne & Raby's 2013 paper. This could be helpful to frame/cite in the virtual participatory design study.

    15. evices. Similarly, Phoebe Sengers (2011) reflects on the way slower attitudes could be promoted by ‘‘making fewer choices, accessing less information, making productivity less central, keeping our lives less under formal control’’; she further considers how this attitude could be reflected in the design of communication technologies. Instead of reinforcing dichotomies, Fullerton (2010) and Sengers (2011) draw attention to practices that emphasise alternative expressions

      Look up Sengers 2011 paper on ICT design.

      What are the alternative expressions of time she references?

    16. The association of alternative approaches to time with a rejection of technology reinforces dichotomies that do not reflect the way people relate to artefacts and systems (Wajcman 2015). As a result, these proposals not only risk being interpreted as nostalgic or backward looking, but also leave little space for integrating more complex accounts of time (particularly those arising in the social sciences) or for discussing more nuanced rhythms, as well as more complex forces and consequences related to temporal decisions. As a result, instead of challenging dominant accounts of time, these proposals arguably reinforce the overarching narrative of universalised acceler

      Argument that slow technology is not anti-technology but should encourage different perspective on how people relate to artifacts and systems via time, rhythms, and other forces that help drive temporal decisions.

    17. gs done. Accepting an invitation for reflection inherent in the design means on the other hand that time willappear, i.e. we open up for time presence” (Hallnas & Redstrom 2001). A slow technology would not disappear, but would make its

      The idea of making time more present/more felt is counter-intuitive to how time is experienced in crisis response as urgent, as a need for effiicency, as an intense flow (Csikszentmihalyi) that disappears.

    18. In Slow Technology, Hallnas & Redstrom (2001) advance the need for a form of design that emphasises reflection, the amplification of environments, and the use of technologies that a) amplify the presence of time; b) stretch time and extend processes; and c) reveal an expression of presenttime as slow-paced. Important here is the concept of “time presence”: “when we use a thing as an efficient tool, time disappears, i.e. we get things done. Accepting an invitation for reflection inherent in the design means on the other hand that time willappear, i.e. we open up for time presence” (Hallnas & Redstrom 2001). A slow technology would not disappear, but would make its

      Definition of "slow technology" and its purpose to make time more present for the user.

    19. Argument for the need for Temporal Design and how it could lead to broader notions/ideas/solutions of time's role in social coordination.

    1. There’s a great saying that is so true here – just because you know something doesn’t mean you understand it. I know that the sky is blue, but that doesn’t mean I can explain to you the science behind why. Students may be able to correctly answer 8 x 6 on a math test, but that doesn’t mean that they can also show you what 8 x 6 represents with a box of manipulatives or in a real life situation.

      Great examples of how to use backward design- explaining the reasoning behind it

    1. We are advocating the reverse: One starts with the end—the desired results (goals or standards)—and then derives the curriculum from the evidence of learning (performances) called for by the standard and the teaching needed to equip students to perform. T

      Figure out what you want your students to learn before you figure out how to teach it

    1. We’ve run into roadblocks, and people really appreciate hearing about them because for the most part they’re running into the same issues
    2. they can develop a action plan to communicate change
    3. to embed their organizational aims in it
    1. We designate a room. We’re like, “This is the sleeping room. If you want to fall asleep, we turn off the lights, and you just go to sleep there.” It runs from noon to noon.
  10. Jun 2018
    1. In “Getting Real,” Barad proposes that “reality is sedimented out of the process ofmaking the world intelligible through certain practices and not others ...” (1998: 105). If,as Barad and other feminist researchers suggest, we are responsible for what exists, what isthe reality that current discourses and practices regarding new technologies makeintelligible, and what is excluded? To answer this question Barad argues that we need asimultaneous account of the relations of humans and nonhumansandof their asymmetriesand differences. This requires remembering that boundaries between humans and machinesare not naturally given but constructed, in particular historical ways and with particularsocial and material consequences. As Barad points out, boundaries are necessary for thecreation of meaning, and, for that very reason, are never innocent. Because the cuts impliedin boundary making are always agentially positioned rather than naturally occurring, andbecause boundaries have real consequences, she argues, “accountability is mandatory”(187). :We are responsible for the world in which we live not because it is an arbitraryconstruction of our choosing, but because it is sedimented out of particular practicesthat we have a role in shaping (1998: 102).The accountability involved is not, however, a matter of identifying authorship in anysimple sense, but rather a problem of understanding the effects of particular assemblages,and assessing the distributions, for better and worse, that they engender.
    2. In her analysis ofcomputer-based work, Susanne Bødker (1991) has discussed the shifting movement of theinterface from object to connective medium. She observes that when unfamiliar, or at timesof trouble, the interface itselfbecomes the work’s object. At other times persons work asshe puts it ‘through the interface’, enacted as a transparent means of engagement with otherobjects of interest (for example, a text, or an interchange with colleagues).
    3. Finally, the ‘smart’ machine's presentation of itself asthe always obliging, 'labor-saving device' erases any evidence of the labor involved in itsoperation "from bank personnel to software programmers to the third-world workers whoso often make the chips" (75).
    4. Chasin poses the question (which I return to below) of how a change in our view ofobjects from passiveand outside the social could help to undo the subject/object binaryand all of its attendant orderings, including for example male/female, or mental/manua
    5. One consequence of thisposition is a more radical understanding of the sense in whichmateriality is discursive (i.e., material phenomena are inseparable from theapparatuses of bodily production: matteremerges out of and includes as part of itsbeing the ongoing reconfiguring of boundaries), just as discursive practices arealways already material (i.e., they are ongoing material (re)configurings of theworld) (2003: 822).Brought back into the world oftechnology design, this intimate co-constitution ofconfigured materialities with configuring agencies clearly implies a very differentunderstanding of the ‘human-machine interface’.
    6. The trope of configuration animates another study of surgical practices by MargunAanestad (2003), who focuses on the labors (carried out predominately by women)involved in aligning a complex sociotechnical environment for the conduct of so-called‘minimally invasive’ or ‘keyhole’ surgery. The latterrequires, among other things,displacing the direct gaze of the surgeon and attendant practitioners from the interior ofthe patient’s body– formerly achieved only through a correspondingly large incision– to aview mediated through camera and video monitors. Aanestad’s analysis follows thecourse of shifting interdependencies in the assemblage, as changes to existingarrangements necessitate further changes through what she names thein situwork of“design in configuration” (2). She emphasizes that, incontrast to views of technologydesign as the province of (predominately male) ‘inventors’ located in research anddevelopment labs, the ongoing work of design takes place in the worksite, and isaccomplished by actors rarely recognized as designers.. Moreover, her analysis makesclear again how in such a setting the capacity for action is relational, dynamic andcollective rather than inherent in specific network elements, and how the extension of thenetwork in turn intensifies network dependencies.
    7. The feminist orientations of these studies add crucial sensibilities to thereconceptions of agency under development in STS more broadly. First, feministresearchdisplaces traditional preoccupations with abstracted and decontextualized formsofknowledge in favor of particular, specifically situated practices of knowing in action.Second, feminism directs attention always to the labors (particularly those previouslyignored) that are an essential and ongoing aspect ofsociotechnical assemblages and thecapacities for action that they enable. And finally, feminist research orients us not only torelations and symmetries among persons and things, but also to the politics of difference.The boundaries that constitute things as separate and different are treated not as pre-given, but as enacted, and practices of boundary-making and the enactment of differenceare inevitably political.
    8. Medical ethics and accountability, sheargues, need to be founded not in thefigure of the rational, informed citizen but in theconditions for the maintenance of those crucial relations that configure identities andselves, and that might allow them to be reconfigured in desired ways.
    9. its role in bringing archeologists’ perception into theservice of a particular organizational/bureaucratic endeavor, that is, professionalarchaeology.
    10. A rich body ofempirical studies have further specified, elaborated, and deepened the senses in whichhuman agency is always inextricably tied to the specific sociomaterial arrangements ofwhich we are part.These studies provide compelling empirical demonstration of howcapacities for action can be reconceived on foundations quite different from those of anEnlightenment, humanist preoccupation with the individual actor living in a world ofseparate things. Insofar as we see the politics of technology to be based in fundamentalassumptions about where agency is located,and whose agencies matter, these approacheshave at least the potential to work as powerful allies to feminist projects. In particular,these scholars align with feminist theorizing in their emphasis on the always relationalcharacter of our capacities for action; the constructed nature of subjects and objects,resemblances and differences; and the corporeal grounds of knowing and action.
    11. Must those not presentlyidentified as creative be shown in fact to be inventors in order tobe fully recognized? Thisquestion suggests that we need to pay close attention to the tensions and contradictionsthat arise when we adopt a strategy that distributes practices previously identifiedexclusively with certain people and places (for example, with privileged white menworking in elite institutions of science and technology) across a wider landscape (one thatincludes women). In distributing those practices more widely, they are givencorrespondingly greater presence. A counter project, therefore, is to question the valueplaced on innovation itself. The aim is to understand how a fascination with change andtransformation might not be universal, but rather specifically located and with particularpolitical consequences for women, both in termsof the possibilities that are available tothem, and the visibility of their already existing contributions.
    12. Recent research on the actual work involved in putting technologies into usehighlights the mundane forms of inventive yet taken for granted labor, hidden in thebackground, that are necessary to the success of complex sociotechnical arrangements.
    13. While not all of the authors and works cited would identify asfeminist, they share with feminist research– in my reading at least– a commitment tocritical, but also reconstructive engagement with received conceptions of the human, thetechnological and the relations between them.
  11. inst-fs-iad-prod.inscloudgate.net inst-fs-iad-prod.inscloudgate.net
    1. we must not place the burden of safety on users in terms of who is responsible and who suffers the consequences
    2. STRONG COMMUNITIES GIVE RISE TO MORE CONSENTFUL TECHNOLOGIESWhen attention is paid to relationships, stronger communities result. This is the case in physical communities as well as digital. Users and makers can strengthen their communities and improve consent therein by asking:• How can we better protect each other? For example, is there a technical way to have other community members see and respond to harassing messages, so the person who is targeted does not have to deal with the barrage alone?• How can we hold each other accountable as a community? What are some community-based strategies for addressing non-consensual actions that work on the roots of the issue?• How can we better support and uplift each other? How can we normalize asking for consent on our platform?Small changes can make a big difference when we add a little friction to pathways used for abusive behaviour, and when we make it easier for people to help each other. For example, new users might have a quieter voice until they’ve been around awhile, or messages mentioning you could be downvoted by your friends so you won’t see them.
    3. Community accountability is a community-based strategy, rather than a police/prison-based strategy, to address violence within our communities. Community accountability is a process in which a community — a group of friends, a family, a church, a workplace, an apartment complex, a neighborhood, etc — work together to do the following things:• Create and affirm values & practices that resist abuse and oppression and encourage safety, support, and accountability• Develop sustainable strategies to address community members’ abusive behavior, creating a process for them to account for their actions and transform their behavior• Commit to ongoing development of all members of the community, and the community itself, to transform the political conditions that reinforce oppression and violence• Provide safety & support to community members who are violently targeted that respects their self-determination1What would a community accountability approach to digital communities look like?
    4. Some people have called for police departments to become more knowledgeable about current technology, and for lawmakers to create harsher punishments for people who are committing violence online. But the problems with this approach mirror those that are rampant in enforcement of sexual assault laws.
    5. We have found that asking people directly, as one would in a physical interaction, is a strong practice. How might your experience of the Internet shift if people who had access to your digital body, whether in the form of photos or contact information, were to check in with you from time to time about it? What technologies would we need to build to help us manage ongoing and direct consent processes?
    6. Platforms like Google are incorporating periodic check-ins with users about what they’ve consented to, which is a good start.
    7. If we can’t make it safer then we can acknowledge the remaining risks and educate users about them.
    8. IDEAS FOR TECHNICAL MECHANISMSA technique called differential privacy1 provides a way to measure the likelihood of negative impact and also a way to introduce plausible deniability, which in many cases can dramatically reduce risk exposure for sensitive data.Modern encryption techniques allow a user’s information to be fully encrypted on their device, but using it becomes unwieldy. Balancing the levels of encryption is challenging, but can create strong safety guarantees. Homomorphic encryption2 can allow certain types of processing or aggregation to happen without needing to decrypt the data.Creating falsifiable security claims allows independent analysts to validate those claims, and invalidate them when they are compromised. For example, by using subresource integrity to lock the code on a web page, the browser will refuse to load any compromised code. By then publishing the code’s hash in an immutable location, any compromise of the page is detectable easily (and automatically, with a service worker or external monitor).Taken to their logical conclusion these techniques suggest building our applications in a more decentralized3 way, which not only provides a higher bar for security, but also helps with scaling: if everyone is sharing some of the processing, the servers can do less work. In this model your digital body is no longer spread throughout servers on the internet; instead the applications come to you and you directly control how they interact with your data.
    9. We can do better. By designing the system so certain things are impossible, we lower the trust barrier for that system.
    10. Non-technology folks can contribute to building consentful tech by:• Holding the platforms we use accountable to how they use our data• Advocating for consent-focused policy and legislation • Intervening in development processes through community organizing (petitions, demonstrations, etc.)• Signing on to platforms that are consentful • Learning more about code, policies, and legislationTech folks can contribute to building consentful tech by:• Advocating for diverse teams• Opening up design & development processes to people who those who are vulnerable to harm• Working towards a culture of consent in our companies and organizations• Mentoring newcomers, particularly those who are often excluded or marginalized from mainstream tech communities• Growing our knowledge on concepts like collaborative design processes and intersectionality • Consistently reviewing our development processes
    11. Can people consent to Specific things in this system and not others? Can people select which aspects of their digital bodies they want to have exposed and have stored?
    12. Are people Freely giving us their consent to access and store parts of their digital bodies? Can potentially harmful personal information about a person be displayed or stored without their consent? Does our system allow for Reversible consent? How easy is it for people to withdraw both their consent and their data?How are we fully and clearly Informing people about what they’re consenting to? Is important information about the risks a user might be exposed to buried in the fine print of the terms & conditions?How are we making sure that the consent is Enthusiastic? Is there an option not to use this technology, which means that people use it because they prefer to use it?
    13. There are many ways to make technology more just and equitable, and consent is one important consideration. Non-consentful features and interactions can be minor nuisances for some people, but can be very harmful to others. When Facebook introduced photo tagging, anyone could tag you in a photo, whether or not you were okay with it. For some users, that could lead to embarrassment if the photo wasn’t particularly flattering. But for other people, the harm could be much more serious. For trans users, tagging photos from their pre-transition lives without their consent could lead to them being outed, which can have consequences for employment, housing, safety, and more.In response to user outcry, Facebook eventually implemented a process by which users can approve tagged photos. However, it required a critical mass of complaints to make this happen. And, Facebook still stores photos that are tagged with your face in its database, which informs its facial recognition algorithms. Whether you consented to being tagged or not, Facebook has a 98% accurate idea of what your face looks like.
    14. With our digital bodies, there is also more to consent than a “yes” or “no.” As our physical bodies become increasingly interlinked with our digital bodies, harm can’t be prevented by trying to avoid technology. And harm can’t be justified because someone checked a box that said “I agree to these terms and conditions.”Instead, cases like those on the previous page point to a need for a cultural and technological shift in how we understand digital consent, as well as a political shift in how we advocate for control over our digital bodies. We want to offer up the idea of consentful technologies to help us move toward this. Consentful technologies are applications and spaces in which consent underlies all aspects, from the way they are developed, to how data is stored and accessed, to the way interactions happen between users.We use consentful instead of “consensual” because the latter implies a singular ask or interaction. Consentful technology is about a holistic and ongoing approach to consent
    1. Mechanism design studies solution concepts for a class of private-information games. Leonid Hurwicz explains that 'in a design problem, the goal function is the main "given", while the mechanism is the unknown. Therefore, the design problem is the "inverse" of traditional economic theory, which is typically devoted to the analysis of the performance of a given mechanism.'[1] So, two distinguishing features of these games are: that a game "designer" chooses the game structure rather than inheriting one that the designer is interested in the game's outcome

      Advantages over traditional game theory for token econimics:

      • a game "designer" chooses the game structure rather than inheriting one
      • that the designer is interested in the game's outcome
    1. 17. SAY NO TO SPEC WORK Speculative work, or spec work, is a request by a potential client for uncompensated creative and design work at the inception of a project. Avoid this like the plague—it’s a devaluation of the entire design process and marginalizes our efforts as a whole. AIGA.org has great resources for dealing with spec work, including a sample letter that you can personalize and send to clients explaining why their request is unappreciated (see No. 19).
    2. 9. BUILD YOUR BOOK One piece of advice I give young designers looking to fill out their portfolios is to find the best local arts organization with the worst visual brand identity or website and make a trade. They get some great design work, and you get creative control and real-world projects in your book that other potential clients will recognize.
    3. 6. LEARN TO SAY ‘NO’ Some of your best design business decisions will ultimately be saying “no” to clients or projects. Unfortunately, it usually takes a few disasters to gain the experience to know when to walk away from an impending train wreck. Carefully measure the upsides of any project—creative control of your design work, long-term relationship-building and gross billing—versus the potential downsides—the devaluation of the creative process, being treated like a “vendor” and ongoing scope creep (where the volume of what you’re expected to deliver keeps expanding, while the schedule and budget don’t).
    1. “The most important inspirations and influences in your life and career will come from places other than the design world. Get away from the design scene and cultivate other interests, skills, and experiences. Those are the things that will give you passion and distinguish you.”
    2. “Almost any situation gets better when you ask yourself this: How can I be most useful right now? — Most useful to your employer, to your client, to the people you care for in your personal life, even to your future self. Asking ‘How can I be most useful right now?’ will get you past too little ambition, past too much ambition, past many interpersonal conflicts, boredom, frustration, and creative block. Sometimes the answer is ‘I can be most useful to everybody — including me — by leaving,’ but usually it’ll lead you to creating better work!”
    3. “What did I know? I knew that relationships were critical in design. I knew that hard work was required. I knew that I needed inspiration beyond graphic design. “What did I not know? I didn’t know that time is forgiving. Saul Bass told me that success is defined by a series of successful projects over an extended period of time. I didn’t listen. I was convinced that every project was my last chance to succeed. Alternatively, each failure signaled the end of my career. Saul was right. Some projects were as ugly as something the cat coughed up, but the next one was better. And some projects were incredibly successful, and then the next one came along and it was left behind. The world isn’t black and white.”
    4. “There’s a lyric from the song, Ooh La La by The Faces that says, ‘I wish that I knew what I know now, when I was younger.’ I think of this any time someone asks me what advice I would give young people just starting out. On the one hand, there are a thousand things that I’ve learned over the years that would have made my early professional life easier; things I know now. On the other hand, the great joy of life is learning and growing and making one’s own mistakes. I’d feel robbed if— when I was younger— someone had taken that away from me. “So my advice is to remember that success is a map of failures; Explore with courage. Draw the contours with grace.”
    5. “Make sure to balance work and life. Without balance you may experience early career burn out or create undue emotional strain on yourself and the ones you love. “Connect with nature. Get out of your head and into your body. Nature reminds us to listen, think, and feel in ways that feed our intuition. “Travel. It enriches your life on every level. But there’s more to it because it takes us out of the context of what we know. It challenges us to exercise muscles that we don’t normally use. “There’s so much to learn from immersion in the unfamiliar. The benefit is a heightened sense of empathy and compassion — along with a sprinkling of humility. Chance invites spontaneity and play, which fuel creativity. Being open to chance — wherever you are — is a fearless act.”
    6. “Work for things, and with people, you believe are good. Good work and good people attract more good. “Work outdoors. If you’re stuck, go outside and watch squirrels or take a walk. Take paper and a pen. “Give your own work devotion.”
    7. “Talent is essential for success as a creative professional, but you also need mastery of current methodology and tools, excellent people skills, and business savvy to make your career sustainable over the long haul.”
    8. “Never stop learning. Embrace what interests you and stay on top of it. Everything you need to know is a never-ending pursuit. It doesn’t stop when you are handed a degree or when you accept your first job. Keep taking classes. Find ways to mingle with other designers who do what you do. Actively research and discover what is out there and who is doing it really well. Ignite discussions with them. Share your passions with your colleagues, friends, spouse. Keep acting as your own teacher and play, practice, experiment and share. Above all else, stay curious and authentic.”
    9. “Early on, if anyone had been able to tell me exactly the right thing, I would have dismissed it as preposterous because the world has just changed too much in unforeseen ways. “However, here’s my advice: get a second degree in something totally different— neuroscience, medicine, linguistics, or whatever feels right. “Design is what all humans do when they have intent and act upon it. Good design skills are most powerful when applied where they intersect with another discipline or two, or three. It is no longer enough to be a specialist only in design. Make your niche at those points of intersection, where future innovation will bloom.”
    10. “Be interested in something besides design. It is invigorating to work with a designer that is passionate about what they do, but I am finding myself in too many conversations with designers that only know their field and nothing else. Read anything that you can. Know the classics for reference purposes, understand mythology, know how a steam engine works, how to change a bobbin, calculate compound interest, and why the North Star doesn’t move. “Yes, great design skills, knowledge, and draftsmanship are fundamental. It’s what you know beyond that world that allows you to conceive of a solution your fellow designers are oblivious to. Load your chamber with everything you can so when it’s your turn to take a shot, you have something to fire at the challenge besides surface.”
    1. In website design, it was important to combine the interests of different stakeholders: marketing, branding, visual design, and usability. Marketing and branding people needed to enter the interactive world where usability was important. Usability people needed to take marketing, branding, and aesthetic needs into account when designing websites. User experience provided a platform to cover the interests of all stakeholders: making web sites easy to use, valuable, and effective for visitors. This is why several early user experience publications focus on website user experience
    1. Resetting expectations. As corporate leaders become aware of the power of design, many view design thinking as a solution to all their woes. Designers, enjoying their new level of strategic influence, often reinforce that impression. When I worked with the entertainment company, I was part of that problem, primarily because my livelihood depended on selling design consulting. But design doesn’t solve all problems. It helps people and organizations cut through complexity. It’s great for innovation. It works extremely well for imagining the future. But it’s not the right set of tools for optimizing, streamlining, or otherwise operating a stable business. Additionally, even if expectations are set appropriately, they must be aligned around a realistic timeline—culture changes slowly in large organizations. An organizational focus on design offers unique opportunities for humanizing technology and for developing emotionally resonant products and services. Adopting this perspective isn’t easy. But doing so helps create a workplace where people want to be, one that responds quickly to changing business dynamics and empowers individual contributors. And because design is empathetic, it implicitly drives a more thoughtful, human approach to business.
    2. Embracing risk. Transformative innovation is inherently risky. It involves inferences and leaps of faith; if something hasn’t been done before, there’s no way to guarantee its outcome. The philosopher Charles Peirce said that insights come to us “like a flash”—in an epiphany—making them difficult to rationalize or defend. Leaders need to create a culture that allows people to take chances and move forward without a complete, logical understanding of a problem. Our partners at the entertainment company were empowered to hire a design consultancy, and the organization recognized that the undertaking was no sure thing.
    3. Several years ago, I consulted for a large entertainment company that had tucked design away in a select group of “creatives.” The company was excited about introducing technology into its theme parks and recognized that a successful visitor experience would hinge on good design. And so it became apparent that the entire organization needed to embrace design as a core competence. This shift is never an easy one. Like many organizations with entrenched cultures that have been successful for many years, the company faced several hurdles.
    4. IBM and GE are hardly alone. Every established company that has moved from products to services, from hardware to software, or from physical to digital products needs to focus anew on user experience. Every established company that intends to globalize its business must invent processes that can adjust to different cultural contexts. And every established company that chooses to compete on innovation rather than efficiency must be able to define problems artfully and experiment its way to solutions.
    5. Design thinking is an essential tool for simplifying and humanizing.
    6. “There’s no longer any real distinction between business strategy and the design of the user experience,” said Bridget van Kralingen, the senior vice president of IBM Global Business Services, in a statement to the press. In November 2013 IBM opened a design studio in Austin, Texas—part of the company’s $100 million investment in building a massive design organization
    7. the iterative process works at GE: “GE is moving away from a model of exhaustive product requirements. Teams learn what to do in the process of doing it, iterating, and pivoting.” Employees in every aspect of the business must realize that they can take social risks—putting forth half-baked ideas, for instance—without losing face or experiencing punitive repercussions.
    8. Tolerate failure. A design culture is nurturing. It doesn’t encourage failure, but the iterative nature of the design process recognizes that it’s rare to get things right the first time. Apple is celebrated for its successes, but a little digging uncovers the Newton tablet, the Pippin gaming system, and the Copland operating system—products that didn’t fare so well. (Pippin and Copland were discontinued after only two years.) The company leverages failure as learning, viewing it as part of the cost of innovation.
    9. In design-centric organizations, you’ll typically see prototypes of new ideas, new products, and new services scattered throughout offices and meeting rooms. Whereas diagrams such as customer journey maps explore the problem space, prototypes explore the solution space. They may be digital, physical, or diagrammatic, but in all cases they are a way to communicate ideas. The habit of publicly displaying rough prototypes hints at an open-minded culture, one that values exploration and experimentation over rule following.
  12. May 2018