Why people do and don't wear active badges: a case study

This paper reports findings from an analysis of attitudes toward and use of active badges and associated applications in a large corporate research laboratory. The evidence will show that there were two distinct sets of views about active badges, leading one group within the institution to be strongly opposed to their introduction and use, and another very supportive. Analysis of these views will show that they were the manifestation of two different morally cohered communities. The demonstrable existence of these communities was in part achieved through and displayed by the avowal of these distinct sets of attitudes and views. Further, analysis of the particular communities will suggest that some of these views and attitudes had the character of being sacred or semi-sacred; in this sense they were beliefs. On the basis of these materials, the paper will conclude with discussion of how beliefs can form the bedrock of any and all communities, and how it is necessary to respect those beliefs if one wishes to introduce technologies to support group activities. Failure to do so can lead to the rejection of systems on grounds well removed from the purported purpose of those systems.

[1]  Stjepan G. Mestrovic,et al.  Moral Theory Based on the ‘Heart’ versus the ‘Mind’: Schopenhauer's and Durkheim's Critiques of Kantian Ethics , 1989 .

[2]  Roger C. Pace Personalized and Depersonalized Conflict in Small Group Discussions , 1990 .

[3]  Andy Hopper,et al.  Active badges and personal interactive computing objects , 1992 .

[4]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[5]  Richard Harper,et al.  Looking at ourselves: an examination of the social organisation of two research laboratories , 1992, CSCW '92.

[6]  Michael G. Lamming,et al.  Locating Systems at Work: Implications for the Development of Active Badge Applications , 1992, Interact. Comput..

[7]  Wanda J. Orlikowski,et al.  Learning from Notes: organizational issues in groupware implementation , 1992, CSCW '92.

[8]  Marvin Theimer,et al.  Scalable, secure, mobile computing with location information , 1993, CACM.

[9]  S. Easterbrook,et al.  A Survey of Empirical Studies of Conflict , 1993 .

[10]  Lisa Bud-Frierman Information Acumen: The Understanding and Use of Knowledge in Modern Business , 1994 .

[11]  A. Harter,et al.  A distributed location system for the active office , 1994, IEEE Network.

[12]  M. Lamming,et al.  The Design of a Human Memory Prosthesis , 1994 .

[13]  M. Lamming,et al.  "Forget-me-not" Intimate Computing in Support of Human Memory , 1994 .

[14]  Jean Bacon,et al.  Using events to build distributed applications , 1995, Second International Workshop on Services in Distributed and Networked Environments.

[15]  P. Thomas The social and interactional dimensions of human-computer interfaces , 1995 .

[16]  Philip E. Agre,et al.  Conceptions of the user in computer systems design , 1995 .