Last month, an Apple patent application was published describing a method of “Protecting electronic devices from extended unauthorized use” – effectively a ‘charging rights management’ system. New Scientist and OhGizmo have stories explaining the system; while the stated intention is to make stolen devices less […]
All posts filed under “Intrusive technology”
Design & Punishment
Design and Punishment, by Ben Cunningham. Photo from the Arts Institute at Bournemouth‘s 2007 Three Dimensional Design graduate directory. Very neatly linking the themes of the last two posts (devices to make users aware of their energy use, and intentionally uncomfortable seating) is the Design […]
Persuasion & control round-up
New Scientist: Recruiting Smell for the Hard Sell Samsung’s coercive atmospherics strategy involves the smell of honeydew melon: THE AIR in Samsung’s flagship electronics store on the upper west side of Manhattan smells like honeydew melon. It is barely perceptible but, together with the soft, […]
Mosquito controversy goes high-profile
The Mosquito anti-teenager sound device, which we’ve covered on this site a few times, was yesterday heavily criticised by the Children’s Commissioner for England, Sir Albert Aynsley-Green, launching the BUZZ OFF campaign in conjunction with Liberty and the National Youth Agency: Makers and users of […]
Slanty design
The Main Reading Room, Library of Congress. Image from CIRLA. In this article from Communications of the ACM from January 2007, Russell Beale uses the term slanty design to describe “design that purposely reduces aspects of functionality or usability”: It originated from an apocryphal story […]
Do you really need to print that?
This is not difficult to do, once you know how. Of course, it’s not terribly useful, since a) most people don’t read the display on a printer unless an error occurs, or b) you’re only likely to see it once you’ve already sent something to […]
Destroy everything you touch
We can’t help but be familiar with the concept of ‘malicious code’ in the context of computer security and programming, but in general the idea of products or technology which, as they’re used, sabotage or degrade the performance of a ‘rival’, is intriguing and not […]
The Hacker’s Amendment
Congress shall pass no law limiting the rights of persons to manipulate, operate, or otherwise utilize as they see fit any of their possessions or effects, nor the sale or trade of tools to be used for such purposes. From Artraze commenting on this Slashdot […]
The Convention on Modern Liberty
Britain’s supposedly on the verge of a summer of rage, and while like Mary Riddell I am of course reminded of Ballard, it’s not quite the same. I don’t think this represents the ‘middle class’ ennui of Chelsea Marina. Instead I think we may have […]
Anti-teenager “pink lights to show up acne”
In a similar vein to the Mosquito, intentionally shallow steps (and, superficially at least–though not really–blue lighting in toilets, which Raph d’Amico dissects well here), we now have residents’ associations installing pink lighting to highlight teenagers’ acne and so drive them away from an area: […]
On ‘Design and Behaviour’ this week: Do you own your stuff? And a strange council-run ‘Virtual World for young people’
GPS-aided repo and product-service systems Ryan Calo of Stanford’s Center for Internet and Society brought up the new phenomenon of GPS-aided car repossession and the implications for the concepts of property and privacy: A group of car dealers in Oregon apparently attached GPS devices to […]
‘Smart meters’: some thoughts from a design point of view
Here’s my (rather verbose) response to the three most design-related questions in DECC’s smart meter consultation that I mentioned earlier today. Please do get involved in the discussion that Jamie Young’s started on the Design & Behaviour group and on his blog at the RSA. […]