Abstract
This paper documents some of the socio-technical issues involved in developing security measures for wireless mesh networks (WMNs) that are deployed as part of a community network. We are interested in discovering whether (and exactly how) everyday social interaction over the network is affected by security issues, and any consequent design implications. We adopt an interdisciplinary methodological approach to requirements, treating a community as an ‘organization’ and implementing an approach, OCTAVE, originally designed to uncover security elements for organizations. Using a focus group technique we chart some of the assets and security concerns of the community, concerns that need to be addressed in order for WMNs, or indeed any network, to become a truly ‘mundane technology’.
Similar content being viewed by others
References
Agre P (1999) Rethinking networks and communities in a wired society. American Society for Information Science, Pasadena, May 1999
Alberts C, Behrens S, Pethia R, Wilson W (1999) Operationally critical threat, asset, and vulnerability evaluation framework, version 1.0. Technical Report CMU/SEI-99-TR-017, Carnegie Mellon University, June 1999
Anderson J (2008) What is the LocustWorld Meshbox? http://www.locustworld.com/overview.php
Annison L (2006) JFDI Community broadband: Wennington. Digital Dales Ltd, November 2006
Bauman Z (2001) Community: seeking safety in an insecure world. Polity, London
Becker H (1953) Becoming a marihuana user’. J Sociol 59:235–242
Besnard D, Arief B (2004) Computer security impaired by legitimate users. Comput Secur 23(3):253–264
Borgmann A (1984) Technology and the character of contemporary life. University of Chicago Press, Chicago
Castells M (2000) The information age: economy, society and culture. Blackwell, Oxford
Castells M (2000) Materials for an exploratory theory of the network society. Br J Sociol 51(1):5–24
Dourish P, Anderson K (2006) Collective information practice: exploring privacy and security as social and cultural phenomena. Hum Comput Interact 21:319–342
Dourish P, Grinter R, Delgado de la Flor J, Jospeh M (2004) Security in the wild: user strategies for managing security as an everyday, practical problem. Pers Ubiquitous Comput 8(6):19–30
Edwards W, Poole E, Stoll J (2007) Security automation considered harmful? In: Proceedings of the IEEE new security paradigms workshop (NSPW 2007), White Mountain, New Hampshire, September 18–21, 2007
Fleck J (1988) Innofusion or diffusation? The nature of technological development in robotics. Edinburgh PICT working paper no. 7. Edinburgh University, Edinburgh
Fleck J (1988) Innofusion or diffusation: the nature of technological development in robotics. Edinburgh PICT working paper no. 4. Edinburgh University, Edinburgh
Friedman B, Hurley D, Howe DC, Felten E, Nissenbaum H (2002) Users’ conceptions of web security: a comparative study. In: Proceedings of CHI 2002, Minneapolis, Minnesota, 2002, pp 746–747
Harrison S, Dourish P (1996) Re-place-ing space: the roles of place and space in collaborative systems. In: Proceedings of CSCW ’96, pp 67–76
Kindberg T, Sellen A, Geelhoed E (2004) Security and trust in mobile interactions: a study of users' perceptions and reasoning UBICOMP 2004, Nottingham, UK, September 2004
Lash S, Urry J (1994) Economies of signs and space. Sage, London
Luhmann N (1990) Familiarity, confidence, trust: problems and Alternatives. In: Gambetta D (ed) Trust: making and breaking co-operative relations, electronic edition. Department of Sociology, University of Oxford, chap 6, pp 94–107. http://www.sociology.ox.ac.uk/papers/luhmann94-107.pdf
Mackenzie A (2008) Wirelessness as experience of convergence Fibreculture Issue 13 http://journal.fibreculture.org/issue13/issue13_mackenzie_print.html
Mynatt E, O’Day V, Adler A, Ito M (1998) Network communities: something old, something new, something borrowed …. Comput Support Coop Work 7(1–2):123–156
Petersen SM (2007) Mundane cyborg practice: material aspects of broadband Internet use. Convergence: Int J Res New Media Technol 13(1):79–91
Silverstone R, Haddon L (1996) Design and the domestication of information and communication technologies: technical change and everyday life. In: Silverstone R, Mansell R (eds) Communication by design: the politics of information and communication technologies. Oxford University Press, Oxford
Silverstone R, Hirsch E, Morley D (1992) Information and communication technologies and the moral economy of the household. In: Silverstone R, Hirsch E (eds) Consuming technologies. Media and information in domestic spaces. Routledge, London
Silverstone R (1994) Television and everyday life. Routledge, London
Stewart J, Williams R (2005) The wrong trousers? Beyond the design fallacy: social learning and the user. Reprinted in Howcroft et al (eds) Critical IT handbook. Edward Elgar, Cheltenham, pp 195–221
Taylor N, Cheverst K. Fitton D, Race N, Rouncefield M, Graham C (2007) ‘Probing communities: study of a village photo display. In: Proceedings of OzCHI 2007, pp 17–24
Tönnies F (1988) Community & society: gemeinschaft and gesellschaft. Transaction Publishers, Edison
Wellman B (1999) From little boxes to loosely-bounded networks: the privatization and domestication of community. In: Abu-Lughod J (ed) Sociology for the 21st century: continuities and cutting edges. University of Chicago Press, Chicago
Wellman B, Haase AQ, Witte J, Hampton K (2001) Does the Internet increase, decrease, or supplement social capital? Social networks, participation, and community commitment. Am Behav Sci 45(3):436–455
Acknowledgments
Paul Smith’s research was supported by Telekom Austria AG. The authors are grateful to the members of the Wray village community that took part in this research.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bury, S., Ishmael, J., Race, N.J.P. et al. Designing for social interaction with mundane technologies: issues of security and trust. Pers Ubiquit Comput 14, 227–236 (2010). https://doi.org/10.1007/s00779-009-0257-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-009-0257-0