Abstract
In HCI research, non-use of systems, especially involuntary loss of use, is a relatively neglected topic. How do people perceive the impacts on their lives should the Internet go out for an extended period of time? Would it be a minor inconvenience or Armageddon? We took a Futures Studies approach to conduct a conceptualized future, scenario-based study with 754 responses to a survey of mostly students at three universities and used framing theory to help explicate the findings from qualitative data analysis. Our data show that most respondents do believe a long-term complete Internet outage is possible; however, perceptions in terms of what the impacts would be range widely. Most participants employ an egocentric frame to understand the impacts in terms of changes in their personal relationships and activities, with both gains and losses envisioned. A minority frame their visions in terms of the societal level, with severe infrastructure problems resulting. This paper is the first to explore perceptions of the potential impacts of an Internet outage and provide implications for preparedness and design.
- Monica Anderson and Laura Silver. 7 key findings about mobile phone and social media use in emerging economies. Pew Research Center. Retrieved June 16, 2019 from https://www.pewresearch.org/fact-tank/2019/03/07/7-key-findings-about-mobile-phone-and-social-media-use-in-emerging-economies/Google Scholar
- Víctor Bañuls and Murray Turoff. 2011. Scenario construction via Delphi and cross-impact analysis. Technological Forecasting and Social Change 78, (November 2011), 1579--1602. DOI: https://doi.org/10.1016/j.techfore.2011.03.014Google Scholar
- Eric P. S. Baumer, Morgan G. Ames, Jenna Burrell, Jed R. Brubaker, and Paul Dourish. 2015. Why study technology non-use? First Monday 20, 11 (November 2015). DOI: https://doi.org/10.5210/fm.v20i11.6310Google ScholarCross Ref
- Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, and Paul Dourish. 2015. On the Importance and Implications of Studying Technology Non-use. interactions 22, 2 (February 2015), 52--56. DOI: https://doi.org/10.1145/2723667Google Scholar
- Eric P. S. Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K. Gay. 2015. Missing Photos, Suffering Withdrawal, or Finding Freedom? How Experiences of Social Media Non-Use Influence the Likelihood of Reversion. Social Media + Society 1, 2 (July 2015), 2056305115614851. DOI: https://doi.org/10.1177/2056305115614851Google Scholar
- Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 3295--3298. DOI: https://doi.org/10.1145/2702123.2702147Google ScholarDigital Library
- Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, Leaving, and (Re)Lapsing: An Exploration of Facebook Non-use Practices and Experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3257--3266. DOI: https://doi.org/10.1145/2470654.2466446Google ScholarDigital Library
- Wendell Bell. 2010. Foundations of Futures Studies: Human Science for a New Era: History, Purposes, Knowledge (1 edition ed.). Transaction Publishers, New Brunswick, N.J.Google Scholar
- Mark Blythe. 2014. Research Through Design Fiction: Narrative in Real and Imaginary Abstracts. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 703--712. DOI: https://doi.org/10.1145/2556288.2557098Google ScholarDigital Library
- Mark Blythe. 2017. Research Fiction: Storytelling, Plot and Design. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 5400--5411. DOI: https://doi.org/10.1145/3025453.3026023Google ScholarDigital Library
- Lena Börjeson, Mattias Höjer, Karl-Henrik Dreborg, Tomas Ekvall, and Göran Finnveden. 2006. Scenario types and techniques: Towards a user's guide. Futures 38, 7 (September 2006), 723--739. DOI: https://doi.org/10.1016/j.futures.2005.12.002Google ScholarCross Ref
- Stephanie E. Chang, Timothy L. McDaniels, Joey Mikawoz, and Krista Peterson. 2007. Infrastructure failure interdependencies in extreme events: power outage consequences in the 1998 Ice Storm. Nat Hazards 41, 2 (May 2007), 337--358. DOI: https://doi.org/10.1007/s11069-006--9039--4Google ScholarCross Ref
- Juliet Corbin and Anselm Strauss. 2007. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (3rd edition ed.). SAGE Publications, Inc, Los Angeles, Calif.Google Scholar
- Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé. 2014. Analysis of Country-wide Internet Outages Caused by Censorship. IEEE/ACM Trans. Netw. 22, 6 (December 2014), 1964--1977. DOI: https://doi.org/10.1109/TNET.2013.2291244Google ScholarDigital Library
- Carl DiSalvo. 2012. Adversarial Design. The MIT Press.Google Scholar
- James N. Druckman. 2001. The Implications of Framing Effects for Citizen Competence. Political Behavior 23, 3 (September 2001), 225--256. DOI: https://doi.org/10.1023/A:1015006907312Google ScholarCross Ref
- Anthony Dunne and Fiona Raby. 2013. Speculative Everything: Design, Fiction, and Social Dreaming. The MIT Press.Google ScholarDigital Library
- Lindsay Ems. 2015. Exploring ethnographic techniques for ICT non-use research: An Amish case study. First Monday 20, 11 (November 2015). DOI: https://doi.org/10.5210/fm.v20i11.6312Google ScholarCross Ref
- Rebecca Eynon and Ellen Helsper. 2011. Adults learning online: Digital choice and/or digital exclusion? New Media & Society 13, 4 (June 2011), 534--551. DOI: https://doi.org/10.1177/1461444810374789Google ScholarCross Ref
- Alex Feyerke. 2013. Designing Offline-First Web Apps. A List Apart. Retrieved September 21, 2019 from https://alistapart.com/article/offline-first/Google Scholar
- Adrian Florido. 2018. 6 Months After Hurricanes, 11 Percent Of Puerto Rico Is Still Without Power. NPR.org. Retrieved June 13, 2019 from https://www.npr.org/2018/03/07/591681107/6-months-after-hurricanes-11-percent-of-puerto-rico-is-still-without-powerGoogle Scholar
- William A. Gamson and Andre Modigliani. 1989. Media Discourse and Public Opinion on Nuclear Power: A Constructionist Approach. American Journal of Sociology 95, 1 (July 1989), 1--37. DOI: https://doi.org/10.1086/229213Google ScholarCross Ref
- Thomas Gauthier and Katarzyna Wac. A Foresight Analysis of Pervasive Healthcare Technologies * Journal of Futures Studies. Journal of Futures Studies. Retrieved June 13, 2019 from https://jfsdigital.org/2015--2/vol-20-no-1-sept-2015/articles/a-foresight-analysis-of-pervasive-healthcare-technologies/Google Scholar
- Erving Goffman. 1974. Frame analysis: An essay on the organization of experience. Harvard University Press, Cambridge, MA, US.Google Scholar
- Jeffrey Gottfried and Elisa Shearer. 2016. News Use Across Social Media Platforms 2016. Pew Research Center. Retrieved June 13, 2019 from https://www.journalism.org/2016/05/26/news-use-across-social-media-platforms-2016/Google Scholar
- Jesse Haapoja and Airi Lampinen. 2018. "Datafied" Reading: Framing Behavioral Data and Algorithmic News Recommendations. In Proceedings of the 10th Nordic Conference on Human-Computer Interaction (NordiCHI '18), 125--136. DOI: https://doi.org/10.1145/3240167.3240194Google ScholarDigital Library
- Mike Hale. 2017. We Love the Sun. It Couldn't Care Less.(The Arts/Cultural Desk)(The Dark Side of the Sun)(Television program review). The New York Times, C3.Google Scholar
- Eszter Hargittai. 2007. Whose Space? Differences among Users and Non-Users of Social Network Sites. J Comput Mediat Commun 13, 1 (October 2007), 276--297. DOI: https://doi.org/10.1111/j.1083--6101.2007.00396.xGoogle ScholarDigital Library
- Starr Roxanne Hiltz, Hughes Amanda, Muhammad Imran, Linda Plotnick, Robert Power, and Murray Turoff. 2019. Requirements for software to support the use of social media in emergency management: A Delphi study. In 16th ISCRAM Conference.Google Scholar
- Hannah Kosow and Robert Grassner. 2008. Methods of Future and Scenario Analysis: Overview, Assessment, and Selection Criteria. Deutsches Institut für Entwicklungspolitik gGmbH. Retrieved from: https://www.researchgate.net/publication/258510126_Methods_of_Future_and_Scenario_Analysis_Overview_Assessment_and_Selection_CriteriaGoogle Scholar
- Cliff Lampe, Jessica Vitak, and Nicole Ellison. 2013. Users and Nonusers: Interactions Between Levels of Adoption and Social Capital. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13), 809--820. DOI: https://doi.org/10.1145/2441776.2441867Google ScholarDigital Library
- Sven Laumer, N. Sadat Shami, Michael Muller, and Werner Geyer. 2017. The Challenge of Enterprise Social Networking (Non-)Use at Work: A Case Study of How to Positively Influence Employees' Enterprise Social Networking Acceptanc. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 978--994. DOI: https://doi.org/10.1145/2998181.2998309Google ScholarDigital Library
- Dave Lawler and Jonathan Swan. 2018. Special report: America's greatest threat is a hurricane-force cyberattack. Retrieved June 13, 2019 from https://www.axios.com/americas-greatest-threat-hurricane-force-cyberattack-67ff9c98--1cb8--4358--9d9e-e8c26836dec3.htmlGoogle Scholar
- Rainie Lee, Aaron Smith, and Maeve Duggan. 2013. Coming and Going on Facebook | Pew Research Center. Retrieved February 17, 2019 from http://www.pewinternet.org/2013/02/05/coming-and-going-on-facebook/Google Scholar
- Irwin P. Levin and Gary J. Gaeth. 1988. How Consumers are Affected by the Framing of Attribute Information Before and After Consuming the Product. Journal of Consumer Research 15, 3 (1988), 374--378.Google ScholarCross Ref
- Harold A. Linstone and Murray Turoff. 2002. The Delphi Method: Techniques and Applications. Retrieved from https://web.njit.edu/~turoff/pubs/delphibook/delphibook.pdfGoogle Scholar
- Jennifer Mankoff, Jennifer A. Rode, and Haakon Faste. 2013. Looking Past Yesterday's Tomorrow: Using Futures Studies Methods to Extend the Research Horizon. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 1629--1638. DOI: https://doi.org/10.1145/2470654.2466216Google ScholarDigital Library
- Joeseph Marks. Homeland Security Invests $11.6 Million in Countering Large-Scale Internet Outages. Nextgov.com. Retrieved June 6, 2019 from https://www.nextgov.com/cybersecurity/2018/09/homeland-security-invests-116-million-countering-large-scale-internet-outages/151315/Google Scholar
- Lene Nielsen. 2002. From User to Character: An Investigation into User-descriptions in Scenarios. In Proceedings of the 4th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '02), 99--104. DOI: https://doi.org/10.1145/778712.778729Google ScholarDigital Library
- Sara Ashley O'Brien. 2016. Widespread cyberattack takes down sites worldwide. Retrieved June 13, 2019 from https://money.cnn.com/2016/10/21/technology/ddos-attack-popular-sites/index.htmlGoogle Scholar
- Wanda J. Orlikowski and Debra C. Gash. 1994. Technological Frames: Making Sense of Information Technology in Organizations. ACM Trans. Inf. Syst. 12, 2 (April 1994), 174--207. DOI: https://doi.org/10.1145/196734.196745Google ScholarDigital Library
- Leysia Palen and Amanda L. Hughes. 2018. Social Media in Disaster Communication. In Handbook of Disaster Research, Havidán Rodríguez, William Donner and Joseph E. Trainor (eds.). Springer International Publishing, Cham, 497--518. DOI: https://doi.org/10.1007/978--3--319--63254--4_24Google Scholar
- Leysia Palen, Sarah Vieweg, and Kenneth Mark Anderson. 2011. Supporting "Everyday Analysts" in Safety-and Time-Critical Situations. The Information Society 27, 1 (January 2011), 52--62. DOI: https://doi.org/10.1080/01972243.2011.534370Google ScholarDigital Library
- Daniel Pargman, Elina Eriksson, Mattias Höjer, Ulrika Gunnarsson Östling, and Luciane Aguiar Borges. 2017. The (Un)Sustainability of Imagined Future Information Societies. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 773--785. DOI: https://doi.org/10.1145/3025453.3025858Google ScholarDigital Library
- Nicole Perlroth. 2017. Lasting Damage and a Search for Clues in Cyberattack - The New York Times. Retrieved June 13, 2019 from https://www.nytimes.com/2017/07/06/technology/search-for-clues-global-cyberattacks.htmlGoogle Scholar
- Linda Plotnick and Starr Roxanne Hiltz. 2016. Barriers to Use of Social Media by Emergency Managers. Journal of Homeland Security and Emergency Management 13, (2016), 247--277. DOI: https://doi.org/10.1515/jhsem-2015-0068Google ScholarCross Ref
- Michael G. Pratt. 2008. Fitting Oval Pegs Into Round Holes: Tensions in Evaluating and Publishing Qualitative Research in Top-Tier North American Journals. Organizational Research Methods 11, 3 (July 2008), 481--509. DOI: https://doi.org/10.1177/1094428107303349Google ScholarCross Ref
- E. L. Quarantelli. 1997. Research Based Criteria for Evaluating Disaster Planning and Managing. (1997). Retrieved September 26, 2019 from http://udspace.udel.edu/handle/19716/136Google Scholar
- Kelly Quinn and Dmitry Epstein. 2018. #MyPrivacy: How Users Think About Social Media Privacy. In Proceedings of the 9th International Conference on Social Media and Society (SMSociety '18), 360--364. DOI: https://doi.org/10.1145/3217804.3217945Google ScholarDigital Library
- Rafael Ramirez, Malobi Mukherjee, Simona Vezzoli, and Arnoldo Matus Kramer. 2015. Scenarios as a scholarly methodology to produce "interesting research." Futures 71, (August 2015), 70--87. DOI: https://doi.org/10.1016/j.futures.2015.06.006Google Scholar
- Mary Beth Rosson and John M. Carroll. 2002. Usability Engineering: Scenario-based Development of Human-computer Interaction. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.Google Scholar
- David E. Sanger and Nicole Perlroth. 2019. U.S. Escalates Online Attacks on Russia's Power Grid. The New York Times. Retrieved June 16, 2019 from https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.htmlGoogle Scholar
- Christine Satchell and Paul Dourish. 2009. Beyond the User: Use and Non-use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7 (OZCHI '09), 9--16. DOI: https://doi.org/10.1145/1738826.1738829Google ScholarDigital Library
- Dietram A. Scheufele and Shanto Iyengar. 2014. The State of Framing Research. Oxford University Press. DOI: https://doi.org/10.1093/oxfordhb/9780199793471.013.47Google Scholar
- Sarita Yardi Schoenebeck. 2014. Giving Up Twitter for Lent: How and Why We Take Breaks from Social Media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 773--782. DOI: https://doi.org/10.1145/2556288.2556983Google ScholarDigital Library
- Kathleen Seiders, Berry Leonard L, and Larry G. Gresham. Attention, Retailers! How Convenient Is Your Convenience Strategy? MIT Sloan Management Review. Retrieved June 13, 2019 from https://sloanreview.mit.edu/article/attention-retailers-how-convenient-is-your-convenience-strategy/Google Scholar
- Kathleen Seiders, Glenn B. Voss, Andrea L. Godfrey, and Dhruv Grewal. 2006. ORIGINAL EMPIRICAL RESEARCH SERVCON: development and validation of a multidimensional service convenience scale.Google Scholar
- Neil Selwyn. 2003. Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in Society 25, 1 (January 2003), 99--116. DOI: https://doi.org/10.1016/S0160--791X(02)00062--3Google ScholarCross Ref
- Aaron Smith. Shared, Collaborative and On Demand: The New Digital Economy. Pew Research Center.Google Scholar
- Susan Leigh Star. 1999. The Ethnography of Infrastructure. American Behavioral Scientist 43, 3 (November 1999), 377--391. DOI: https://doi.org/10.1177/00027649921955326Google ScholarCross Ref
- The Editorial Board. 2017. Opinion | When Cyberweapons Go Missing. The New York Times. Retrieved June 13, 2019 from https://www.nytimes.com/2017/07/04/opinion/cyberweapons-nsa-attacks.htmlGoogle Scholar
- Kathleen J. Tierney. 1993. Disaster Preparedness And Response: Research Findings And Guidance From The Social Science Literature. (1993). Retrieved September 26, 2019 from http://udspace.udel.edu/handle/19716/579Google Scholar
- Amos Tversky and Daniel Kahneman. 1981. The framing of decisions and the psychology of choice. Science 211, 4481 (January 1981), 453--458. DOI: https://doi.org/10.1126/science.7455683Google ScholarCross Ref
- Murray Turoff, Victor A. Bañuls, Linda Plotnick, Starr Roxanne Hiltz, and Miguel Ramirez de la Huerga. 2015. Collaborative Evolution of a Dynamic Scenario Model for the Interaction of Critical Infrastructures. In ISCRAM.Google Scholar
- Murray Turoff, Víctor Bañuls, Linda Plotnick, and Starr Hiltz. 2014. Development of a dynamic scenario model for the interaction of critical infrastructures. In Proceedings of the 11th International ISCRAM Conference.Google Scholar
- Sarah Vieweg, Amanda L. Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10), 1079--1088. DOI: https://doi.org/10.1145/1753326.1753486Google ScholarDigital Library
- Karl E. Weick and Kathleen M. Sutcliffe. 2001. Managing the unexpected: Assuring high performance in an age of complexity. Jossey-Bass, San Francisco, CA, US.Google Scholar
- Mark Weiser. 1999. The Computer for the 21st Century. SIGMOBILE Mob. Comput. Commun. Rev. 3, 3 (July 1999), 3--11. DOI: https://doi.org/10.1145/329124.329126Google ScholarDigital Library
- Sally M.E. Wyatt. 2003. Non-users also matter: The construction of users and non-users of the Internet. (2003). Retrieved February 17, 2019 from https://dare.uva.nl/search?identifier=9fc15327--9657--4e65--9af3-b5def673f4e9Google Scholar
- Susanna Zaraysky. Design for Offline - Library. Google Design. Retrieved June 11, 2019 from https://design.google/library/offline-design/Google Scholar
- NCSAM 2018 Toolkit. Department of Homeland Security. Retrieved June 13, 2019 from https://www.dhs.gov/cisa/cyber-safetyGoogle Scholar
- EPRI Report: State of the Technology 2017. Retrieved June 13, 2019 from https://www.epri.com/#/pages/product/000000003002011125/?lang=en-USGoogle Scholar
- Shared, Collaborative and On Demand: The New Digital Economy. Retrieved June 13, 2019 from https://www.pewresearch.org/wp-content/uploads/sites/9/2016/05/PI_2016.05.19_Sharing-Economy_FINAL.pdfGoogle Scholar
- Critical Infrastructure and the Internet of Things | FLETC. Retrieved June 13, 2019 from https://www.fletc.gov/critical-infrastructure-and-internet-thingsGoogle Scholar
- ICT Facts and Figures 2017. Retrieved June 13, 2019 from https://news.itu.int/itu-statistics-leaving-no-one-offline/Google Scholar
- Information Security and Critical Infrastructure Protection | Center for International Strategy, Technology, and Policy. Retrieved June 13, 2019 from https://cistp.gatech.edu/programs/information-security-and-critical-infrastructure-protectionGoogle Scholar
- What Point Of Sale System Does Walmart Use? Expert Market US. Retrieved June 13, 2019 from https://www.expertmarket.com/pos/walmart-pos-systemGoogle Scholar
Index Terms
- An Internet-less World?: Expected Impacts of a Complete Internet Outage with Implications for Preparedness and Design
Recommendations
Wait, Did You Say No Internet?: An Exploratory Study of the Perceived Impact of Internet Outage
CSCW '17 Companion: Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social ComputingUse of the Internet is widespread both in social and work contexts. In this research we explore people's perceptions of their reliance on Internet technologies and response to a scenario of Internet outage. Data from a survey (N= 1070) shows that ...
Departing and Returning: Sense of Agency as an Organizing Concept for Understanding Social Media Non/use Transitions
Recent work has identified a variety of motivations for various forms of technology use and non-use. However, less work has closely examined relationships between those motivations and the experiences of transiting among these different forms of use and ...
Internet use and non-use: views of older users
This paper reports the results of two connected surveys of computer and Internet use among the older population in the UK. One hundred and twenty questionnaires and interviews were completed with participants aged over 55 in Derbyshire and 353 ...
Comments