skip to main content
research-article

An Internet-less World?: Expected Impacts of a Complete Internet Outage with Implications for Preparedness and Design

Published:04 January 2020Publication History
Skip Abstract Section

Abstract

In HCI research, non-use of systems, especially involuntary loss of use, is a relatively neglected topic. How do people perceive the impacts on their lives should the Internet go out for an extended period of time? Would it be a minor inconvenience or Armageddon? We took a Futures Studies approach to conduct a conceptualized future, scenario-based study with 754 responses to a survey of mostly students at three universities and used framing theory to help explicate the findings from qualitative data analysis. Our data show that most respondents do believe a long-term complete Internet outage is possible; however, perceptions in terms of what the impacts would be range widely. Most participants employ an egocentric frame to understand the impacts in terms of changes in their personal relationships and activities, with both gains and losses envisioned. A minority frame their visions in terms of the societal level, with severe infrastructure problems resulting. This paper is the first to explore perceptions of the potential impacts of an Internet outage and provide implications for preparedness and design.

References

  1. Monica Anderson and Laura Silver. 7 key findings about mobile phone and social media use in emerging economies. Pew Research Center. Retrieved June 16, 2019 from https://www.pewresearch.org/fact-tank/2019/03/07/7-key-findings-about-mobile-phone-and-social-media-use-in-emerging-economies/Google ScholarGoogle Scholar
  2. Víctor Bañuls and Murray Turoff. 2011. Scenario construction via Delphi and cross-impact analysis. Technological Forecasting and Social Change 78, (November 2011), 1579--1602. DOI: https://doi.org/10.1016/j.techfore.2011.03.014Google ScholarGoogle Scholar
  3. Eric P. S. Baumer, Morgan G. Ames, Jenna Burrell, Jed R. Brubaker, and Paul Dourish. 2015. Why study technology non-use? First Monday 20, 11 (November 2015). DOI: https://doi.org/10.5210/fm.v20i11.6310Google ScholarGoogle ScholarCross RefCross Ref
  4. Eric P. S. Baumer, Jenna Burrell, Morgan G. Ames, Jed R. Brubaker, and Paul Dourish. 2015. On the Importance and Implications of Studying Technology Non-use. interactions 22, 2 (February 2015), 52--56. DOI: https://doi.org/10.1145/2723667Google ScholarGoogle Scholar
  5. Eric P. S. Baumer, Shion Guha, Emily Quan, David Mimno, and Geri K. Gay. 2015. Missing Photos, Suffering Withdrawal, or Finding Freedom? How Experiences of Social Media Non-Use Influence the Likelihood of Reversion. Social Media + Society 1, 2 (July 2015), 2056305115614851. DOI: https://doi.org/10.1177/2056305115614851Google ScholarGoogle Scholar
  6. Eric P.S. Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI '15), 3295--3298. DOI: https://doi.org/10.1145/2702123.2702147Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Eric P.S. Baumer, Phil Adams, Vera D. Khovanskaya, Tony C. Liao, Madeline E. Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, Leaving, and (Re)Lapsing: An Exploration of Facebook Non-use Practices and Experiences. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 3257--3266. DOI: https://doi.org/10.1145/2470654.2466446Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Wendell Bell. 2010. Foundations of Futures Studies: Human Science for a New Era: History, Purposes, Knowledge (1 edition ed.). Transaction Publishers, New Brunswick, N.J.Google ScholarGoogle Scholar
  9. Mark Blythe. 2014. Research Through Design Fiction: Narrative in Real and Imaginary Abstracts. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 703--712. DOI: https://doi.org/10.1145/2556288.2557098Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Mark Blythe. 2017. Research Fiction: Storytelling, Plot and Design. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 5400--5411. DOI: https://doi.org/10.1145/3025453.3026023Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Lena Börjeson, Mattias Höjer, Karl-Henrik Dreborg, Tomas Ekvall, and Göran Finnveden. 2006. Scenario types and techniques: Towards a user's guide. Futures 38, 7 (September 2006), 723--739. DOI: https://doi.org/10.1016/j.futures.2005.12.002Google ScholarGoogle ScholarCross RefCross Ref
  12. Stephanie E. Chang, Timothy L. McDaniels, Joey Mikawoz, and Krista Peterson. 2007. Infrastructure failure interdependencies in extreme events: power outage consequences in the 1998 Ice Storm. Nat Hazards 41, 2 (May 2007), 337--358. DOI: https://doi.org/10.1007/s11069-006--9039--4Google ScholarGoogle ScholarCross RefCross Ref
  13. Juliet Corbin and Anselm Strauss. 2007. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory (3rd edition ed.). SAGE Publications, Inc, Los Angeles, Calif.Google ScholarGoogle Scholar
  14. Alberto Dainotti, Claudio Squarcella, Emile Aben, Kimberly C. Claffy, Marco Chiesa, Michele Russo, and Antonio Pescapé. 2014. Analysis of Country-wide Internet Outages Caused by Censorship. IEEE/ACM Trans. Netw. 22, 6 (December 2014), 1964--1977. DOI: https://doi.org/10.1109/TNET.2013.2291244Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Carl DiSalvo. 2012. Adversarial Design. The MIT Press.Google ScholarGoogle Scholar
  16. James N. Druckman. 2001. The Implications of Framing Effects for Citizen Competence. Political Behavior 23, 3 (September 2001), 225--256. DOI: https://doi.org/10.1023/A:1015006907312Google ScholarGoogle ScholarCross RefCross Ref
  17. Anthony Dunne and Fiona Raby. 2013. Speculative Everything: Design, Fiction, and Social Dreaming. The MIT Press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Lindsay Ems. 2015. Exploring ethnographic techniques for ICT non-use research: An Amish case study. First Monday 20, 11 (November 2015). DOI: https://doi.org/10.5210/fm.v20i11.6312Google ScholarGoogle ScholarCross RefCross Ref
  19. Rebecca Eynon and Ellen Helsper. 2011. Adults learning online: Digital choice and/or digital exclusion? New Media & Society 13, 4 (June 2011), 534--551. DOI: https://doi.org/10.1177/1461444810374789Google ScholarGoogle ScholarCross RefCross Ref
  20. Alex Feyerke. 2013. Designing Offline-First Web Apps. A List Apart. Retrieved September 21, 2019 from https://alistapart.com/article/offline-first/Google ScholarGoogle Scholar
  21. Adrian Florido. 2018. 6 Months After Hurricanes, 11 Percent Of Puerto Rico Is Still Without Power. NPR.org. Retrieved June 13, 2019 from https://www.npr.org/2018/03/07/591681107/6-months-after-hurricanes-11-percent-of-puerto-rico-is-still-without-powerGoogle ScholarGoogle Scholar
  22. William A. Gamson and Andre Modigliani. 1989. Media Discourse and Public Opinion on Nuclear Power: A Constructionist Approach. American Journal of Sociology 95, 1 (July 1989), 1--37. DOI: https://doi.org/10.1086/229213Google ScholarGoogle ScholarCross RefCross Ref
  23. Thomas Gauthier and Katarzyna Wac. A Foresight Analysis of Pervasive Healthcare Technologies * Journal of Futures Studies. Journal of Futures Studies. Retrieved June 13, 2019 from https://jfsdigital.org/2015--2/vol-20-no-1-sept-2015/articles/a-foresight-analysis-of-pervasive-healthcare-technologies/Google ScholarGoogle Scholar
  24. Erving Goffman. 1974. Frame analysis: An essay on the organization of experience. Harvard University Press, Cambridge, MA, US.Google ScholarGoogle Scholar
  25. Jeffrey Gottfried and Elisa Shearer. 2016. News Use Across Social Media Platforms 2016. Pew Research Center. Retrieved June 13, 2019 from https://www.journalism.org/2016/05/26/news-use-across-social-media-platforms-2016/Google ScholarGoogle Scholar
  26. Jesse Haapoja and Airi Lampinen. 2018. "Datafied" Reading: Framing Behavioral Data and Algorithmic News Recommendations. In Proceedings of the 10th Nordic Conference on Human-Computer Interaction (NordiCHI '18), 125--136. DOI: https://doi.org/10.1145/3240167.3240194Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Mike Hale. 2017. We Love the Sun. It Couldn't Care Less.(The Arts/Cultural Desk)(The Dark Side of the Sun)(Television program review). The New York Times, C3.Google ScholarGoogle Scholar
  28. Eszter Hargittai. 2007. Whose Space? Differences among Users and Non-Users of Social Network Sites. J Comput Mediat Commun 13, 1 (October 2007), 276--297. DOI: https://doi.org/10.1111/j.1083--6101.2007.00396.xGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  29. Starr Roxanne Hiltz, Hughes Amanda, Muhammad Imran, Linda Plotnick, Robert Power, and Murray Turoff. 2019. Requirements for software to support the use of social media in emergency management: A Delphi study. In 16th ISCRAM Conference.Google ScholarGoogle Scholar
  30. Hannah Kosow and Robert Grassner. 2008. Methods of Future and Scenario Analysis: Overview, Assessment, and Selection Criteria. Deutsches Institut für Entwicklungspolitik gGmbH. Retrieved from: https://www.researchgate.net/publication/258510126_Methods_of_Future_and_Scenario_Analysis_Overview_Assessment_and_Selection_CriteriaGoogle ScholarGoogle Scholar
  31. Cliff Lampe, Jessica Vitak, and Nicole Ellison. 2013. Users and Nonusers: Interactions Between Levels of Adoption and Social Capital. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13), 809--820. DOI: https://doi.org/10.1145/2441776.2441867Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Sven Laumer, N. Sadat Shami, Michael Muller, and Werner Geyer. 2017. The Challenge of Enterprise Social Networking (Non-)Use at Work: A Case Study of How to Positively Influence Employees' Enterprise Social Networking Acceptanc. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW '17), 978--994. DOI: https://doi.org/10.1145/2998181.2998309Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Dave Lawler and Jonathan Swan. 2018. Special report: America's greatest threat is a hurricane-force cyberattack. Retrieved June 13, 2019 from https://www.axios.com/americas-greatest-threat-hurricane-force-cyberattack-67ff9c98--1cb8--4358--9d9e-e8c26836dec3.htmlGoogle ScholarGoogle Scholar
  34. Rainie Lee, Aaron Smith, and Maeve Duggan. 2013. Coming and Going on Facebook | Pew Research Center. Retrieved February 17, 2019 from http://www.pewinternet.org/2013/02/05/coming-and-going-on-facebook/Google ScholarGoogle Scholar
  35. Irwin P. Levin and Gary J. Gaeth. 1988. How Consumers are Affected by the Framing of Attribute Information Before and After Consuming the Product. Journal of Consumer Research 15, 3 (1988), 374--378.Google ScholarGoogle ScholarCross RefCross Ref
  36. Harold A. Linstone and Murray Turoff. 2002. The Delphi Method: Techniques and Applications. Retrieved from https://web.njit.edu/~turoff/pubs/delphibook/delphibook.pdfGoogle ScholarGoogle Scholar
  37. Jennifer Mankoff, Jennifer A. Rode, and Haakon Faste. 2013. Looking Past Yesterday's Tomorrow: Using Futures Studies Methods to Extend the Research Horizon. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13), 1629--1638. DOI: https://doi.org/10.1145/2470654.2466216Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Joeseph Marks. Homeland Security Invests $11.6 Million in Countering Large-Scale Internet Outages. Nextgov.com. Retrieved June 6, 2019 from https://www.nextgov.com/cybersecurity/2018/09/homeland-security-invests-116-million-countering-large-scale-internet-outages/151315/Google ScholarGoogle Scholar
  39. Lene Nielsen. 2002. From User to Character: An Investigation into User-descriptions in Scenarios. In Proceedings of the 4th Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS '02), 99--104. DOI: https://doi.org/10.1145/778712.778729Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Sara Ashley O'Brien. 2016. Widespread cyberattack takes down sites worldwide. Retrieved June 13, 2019 from https://money.cnn.com/2016/10/21/technology/ddos-attack-popular-sites/index.htmlGoogle ScholarGoogle Scholar
  41. Wanda J. Orlikowski and Debra C. Gash. 1994. Technological Frames: Making Sense of Information Technology in Organizations. ACM Trans. Inf. Syst. 12, 2 (April 1994), 174--207. DOI: https://doi.org/10.1145/196734.196745Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Leysia Palen and Amanda L. Hughes. 2018. Social Media in Disaster Communication. In Handbook of Disaster Research, Havidán Rodríguez, William Donner and Joseph E. Trainor (eds.). Springer International Publishing, Cham, 497--518. DOI: https://doi.org/10.1007/978--3--319--63254--4_24Google ScholarGoogle Scholar
  43. Leysia Palen, Sarah Vieweg, and Kenneth Mark Anderson. 2011. Supporting "Everyday Analysts" in Safety-and Time-Critical Situations. The Information Society 27, 1 (January 2011), 52--62. DOI: https://doi.org/10.1080/01972243.2011.534370Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Daniel Pargman, Elina Eriksson, Mattias Höjer, Ulrika Gunnarsson Östling, and Luciane Aguiar Borges. 2017. The (Un)Sustainability of Imagined Future Information Societies. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17), 773--785. DOI: https://doi.org/10.1145/3025453.3025858Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Nicole Perlroth. 2017. Lasting Damage and a Search for Clues in Cyberattack - The New York Times. Retrieved June 13, 2019 from https://www.nytimes.com/2017/07/06/technology/search-for-clues-global-cyberattacks.htmlGoogle ScholarGoogle Scholar
  46. Linda Plotnick and Starr Roxanne Hiltz. 2016. Barriers to Use of Social Media by Emergency Managers. Journal of Homeland Security and Emergency Management 13, (2016), 247--277. DOI: https://doi.org/10.1515/jhsem-2015-0068Google ScholarGoogle ScholarCross RefCross Ref
  47. Michael G. Pratt. 2008. Fitting Oval Pegs Into Round Holes: Tensions in Evaluating and Publishing Qualitative Research in Top-Tier North American Journals. Organizational Research Methods 11, 3 (July 2008), 481--509. DOI: https://doi.org/10.1177/1094428107303349Google ScholarGoogle ScholarCross RefCross Ref
  48. E. L. Quarantelli. 1997. Research Based Criteria for Evaluating Disaster Planning and Managing. (1997). Retrieved September 26, 2019 from http://udspace.udel.edu/handle/19716/136Google ScholarGoogle Scholar
  49. Kelly Quinn and Dmitry Epstein. 2018. #MyPrivacy: How Users Think About Social Media Privacy. In Proceedings of the 9th International Conference on Social Media and Society (SMSociety '18), 360--364. DOI: https://doi.org/10.1145/3217804.3217945Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Rafael Ramirez, Malobi Mukherjee, Simona Vezzoli, and Arnoldo Matus Kramer. 2015. Scenarios as a scholarly methodology to produce "interesting research." Futures 71, (August 2015), 70--87. DOI: https://doi.org/10.1016/j.futures.2015.06.006Google ScholarGoogle Scholar
  51. Mary Beth Rosson and John M. Carroll. 2002. Usability Engineering: Scenario-based Development of Human-computer Interaction. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.Google ScholarGoogle Scholar
  52. David E. Sanger and Nicole Perlroth. 2019. U.S. Escalates Online Attacks on Russia's Power Grid. The New York Times. Retrieved June 16, 2019 from https://www.nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.htmlGoogle ScholarGoogle Scholar
  53. Christine Satchell and Paul Dourish. 2009. Beyond the User: Use and Non-use in HCI. In Proceedings of the 21st Annual Conference of the Australian Computer-Human Interaction Special Interest Group: Design: Open 24/7 (OZCHI '09), 9--16. DOI: https://doi.org/10.1145/1738826.1738829Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Dietram A. Scheufele and Shanto Iyengar. 2014. The State of Framing Research. Oxford University Press. DOI: https://doi.org/10.1093/oxfordhb/9780199793471.013.47Google ScholarGoogle Scholar
  55. Sarita Yardi Schoenebeck. 2014. Giving Up Twitter for Lent: How and Why We Take Breaks from Social Media. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14), 773--782. DOI: https://doi.org/10.1145/2556288.2556983Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Kathleen Seiders, Berry Leonard L, and Larry G. Gresham. Attention, Retailers! How Convenient Is Your Convenience Strategy? MIT Sloan Management Review. Retrieved June 13, 2019 from https://sloanreview.mit.edu/article/attention-retailers-how-convenient-is-your-convenience-strategy/Google ScholarGoogle Scholar
  57. Kathleen Seiders, Glenn B. Voss, Andrea L. Godfrey, and Dhruv Grewal. 2006. ORIGINAL EMPIRICAL RESEARCH SERVCON: development and validation of a multidimensional service convenience scale.Google ScholarGoogle Scholar
  58. Neil Selwyn. 2003. Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in Society 25, 1 (January 2003), 99--116. DOI: https://doi.org/10.1016/S0160--791X(02)00062--3Google ScholarGoogle ScholarCross RefCross Ref
  59. Aaron Smith. Shared, Collaborative and On Demand: The New Digital Economy. Pew Research Center.Google ScholarGoogle Scholar
  60. Susan Leigh Star. 1999. The Ethnography of Infrastructure. American Behavioral Scientist 43, 3 (November 1999), 377--391. DOI: https://doi.org/10.1177/00027649921955326Google ScholarGoogle ScholarCross RefCross Ref
  61. The Editorial Board. 2017. Opinion | When Cyberweapons Go Missing. The New York Times. Retrieved June 13, 2019 from https://www.nytimes.com/2017/07/04/opinion/cyberweapons-nsa-attacks.htmlGoogle ScholarGoogle Scholar
  62. Kathleen J. Tierney. 1993. Disaster Preparedness And Response: Research Findings And Guidance From The Social Science Literature. (1993). Retrieved September 26, 2019 from http://udspace.udel.edu/handle/19716/579Google ScholarGoogle Scholar
  63. Amos Tversky and Daniel Kahneman. 1981. The framing of decisions and the psychology of choice. Science 211, 4481 (January 1981), 453--458. DOI: https://doi.org/10.1126/science.7455683Google ScholarGoogle ScholarCross RefCross Ref
  64. Murray Turoff, Victor A. Bañuls, Linda Plotnick, Starr Roxanne Hiltz, and Miguel Ramirez de la Huerga. 2015. Collaborative Evolution of a Dynamic Scenario Model for the Interaction of Critical Infrastructures. In ISCRAM.Google ScholarGoogle Scholar
  65. Murray Turoff, Víctor Bañuls, Linda Plotnick, and Starr Hiltz. 2014. Development of a dynamic scenario model for the interaction of critical infrastructures. In Proceedings of the 11th International ISCRAM Conference.Google ScholarGoogle Scholar
  66. Sarah Vieweg, Amanda L. Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10), 1079--1088. DOI: https://doi.org/10.1145/1753326.1753486Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Karl E. Weick and Kathleen M. Sutcliffe. 2001. Managing the unexpected: Assuring high performance in an age of complexity. Jossey-Bass, San Francisco, CA, US.Google ScholarGoogle Scholar
  68. Mark Weiser. 1999. The Computer for the 21st Century. SIGMOBILE Mob. Comput. Commun. Rev. 3, 3 (July 1999), 3--11. DOI: https://doi.org/10.1145/329124.329126Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Sally M.E. Wyatt. 2003. Non-users also matter: The construction of users and non-users of the Internet. (2003). Retrieved February 17, 2019 from https://dare.uva.nl/search?identifier=9fc15327--9657--4e65--9af3-b5def673f4e9Google ScholarGoogle Scholar
  70. Susanna Zaraysky. Design for Offline - Library. Google Design. Retrieved June 11, 2019 from https://design.google/library/offline-design/Google ScholarGoogle Scholar
  71. NCSAM 2018 Toolkit. Department of Homeland Security. Retrieved June 13, 2019 from https://www.dhs.gov/cisa/cyber-safetyGoogle ScholarGoogle Scholar
  72. EPRI Report: State of the Technology 2017. Retrieved June 13, 2019 from https://www.epri.com/#/pages/product/000000003002011125/?lang=en-USGoogle ScholarGoogle Scholar
  73. Shared, Collaborative and On Demand: The New Digital Economy. Retrieved June 13, 2019 from https://www.pewresearch.org/wp-content/uploads/sites/9/2016/05/PI_2016.05.19_Sharing-Economy_FINAL.pdfGoogle ScholarGoogle Scholar
  74. Critical Infrastructure and the Internet of Things | FLETC. Retrieved June 13, 2019 from https://www.fletc.gov/critical-infrastructure-and-internet-thingsGoogle ScholarGoogle Scholar
  75. ICT Facts and Figures 2017. Retrieved June 13, 2019 from https://news.itu.int/itu-statistics-leaving-no-one-offline/Google ScholarGoogle Scholar
  76. Information Security and Critical Infrastructure Protection | Center for International Strategy, Technology, and Policy. Retrieved June 13, 2019 from https://cistp.gatech.edu/programs/information-security-and-critical-infrastructure-protectionGoogle ScholarGoogle Scholar
  77. What Point Of Sale System Does Walmart Use? Expert Market US. Retrieved June 13, 2019 from https://www.expertmarket.com/pos/walmart-pos-systemGoogle ScholarGoogle Scholar

Index Terms

  1. An Internet-less World?: Expected Impacts of a Complete Internet Outage with Implications for Preparedness and Design

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader