The Technology Is Enemy for Me at the Moment: How Smart Home Technologies Assert Control Beyond Intent

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)

Abstract

Smart technology turns the home into an active agent, which shifts the power structure within the household. This paper examines how initiators of smart technology insert their vision of the good life into households, and how these technologies exert power over the residents. Through a thematic analysis of interviews with five households, we consider Foucault’s theory on disciplinary power to examine how smart home technologies shape the experience of the home by shifting the flow of information and thereby reify power structures. Results indicate that the implementation of smart technology can affect access to shared spaces, constrain interactions, and predefine practices thereby establishing hierarchies within the household. We turn the discussion towards ethical challenges concerning control, whose problems the smart home is concerned with, and how the smart home embeds itself in the household. We conclude with design considerations and future work.
Original languageEnglish
Title of host publicationCHI 2021 - Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
Subtitle of host publicationMaking Waves, Combining Strengths
PublisherACM
Number of pages11
ISBN (Print)978-1-4503-8096-6
DOIs
Publication statusPublished - 6 May 2021
MoE publication typeA4 Article in a conference publication
EventACM SIGCHI Annual Conference on Human Factors in Computing Systems - Virtual, Online, Yokohama, Japan
Duration: 8 May 202113 May 2021
https://chi2021.acm.org/

Conference

ConferenceACM SIGCHI Annual Conference on Human Factors in Computing Systems
Abbreviated titleACM CHI
Country/TerritoryJapan
CityYokohama
Period08/05/202113/05/2021
Internet address

Fingerprint

Dive into the research topics of 'The Technology Is Enemy for Me at the Moment: How Smart Home Technologies Assert Control Beyond Intent'. Together they form a unique fingerprint.

Cite this