Affiliation:
1. University of Copenhagen & Stockholm University, Copenhagen, Denmark
2. Stockholm University, Stockholm, Sweden
3. RISE Research Institutes of Sweden & Stockholm University, Stockkholm, Sweden
Abstract
It is often assumed that the interests of users and developers coincide, sharing a common goal of good design. Yet users often desire functionality that goes beyond what designers, and the organisations they work in, are willing to supply. Analysing online forums, complemented with interviews, we document how users, hackers and software developers worked together to discover and apply system exploits in hardware and software. We cover four cases: users of CPAP breathing assistance machines getting access to their own sleep data, 'hacking' the Nintendo switch game console to run non-authorised software, end-users building their own insulin supply system, and farmers repairing their own agriculture equipment against suppliers terms and conditions. We propose the concept of the 'gulf of interests' to understand how differing interests can create conflicts between end-users, designers, and the organisations they work in. This points us in the direction of researching further the political and economic situations of technology development and use.
Publisher
Association for Computing Machinery (ACM)
Subject
Computer Networks and Communications,Human-Computer Interaction,Social Sciences (miscellaneous)
Reference124 articles.
1. Mortada Al-Banna , Boualem Benatallah , Daniel Schlagwein , Elisa Bertino , and Moshe Chai Barukh . 2018 . Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery . PACIS 2018 Proceedings (June 2018). Mortada Al-Banna, Boualem Benatallah, Daniel Schlagwein, Elisa Bertino, and Moshe Chai Barukh. 2018. Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery. PACIS 2018 Proceedings (June 2018).
2. Making or Making Do? Challenging the Mythologies of Making and Hacking;Ames Morgan;Journal of Peer Production,2018
3. Sinchul Back Sadhika Soor and Jennifer LaPrade. [n.d.]. Juvenile Hackers: An Empirical Test of Self-Control Theory and Social Bonding Theory. 1 ([n. d.]) 17. Sinchul Back Sadhika Soor and Jennifer LaPrade. [n.d.]. Juvenile Hackers: An Empirical Test of Self-Control Theory and Social Bonding Theory. 1 ([n. d.]) 17.
4. "now that's definitely a proper hack"
5. Technologies for Sharing: lessons from Quantified Self about the political economy of platforms
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献