SlideShare a Scribd company logo
1 of 52
IMPLEMENTING RESPONSIBLE DESIGN 

IN A CONNECTED WORLD
IoT Design Manifesto
WORKSHOP
4-12-2015 Thingscon Amsterdam
HI!
Anner Holly Jeffrey
WHY
Peak of inflated expectations
Technology trigger
Trough of Disillusionment
Plateau of Productivity
Slope of
enlightenment
MANIFESTO
10 Principles
Open for discussion
A tool for conversation
Guideline
WHY THIS WORKSHOP?
• Identify the situation of designing in the IoT world
• Develop techniques and strategies for how the
manifesto’s principles can be implemented
• Develop practical guidelines for promoting responsible
design within the IoT
• Achieve this by “doing” … practice what we preach
PROGRAMME TODAY
Who we are, why we have a manifesto, what is this workshop for? (5 min)
Participant introductions (5 min)
Manifesto re-cap (5 min)
Super pressure cooker concept design session (60 min)
• Breakup & mix into groups (5 min)
• Check the briefs (10 min)
• Design your concept (10 min - for real …)
• Showtime 1! (20 min)
• Refine the concept with the manifesto (30 min)
• Showtime! 2 (20 min)
Conclusions & discussion ( … min)
INTRODUCTIONS!
Who?
What?
Why?
Favourite Star Wars character?
RECAP MANIFESTO
DON’T BELIEVE THE HYPEI
We pledge to be skeptical of the cult of the new —
just slapping the Internet onto a product isn’t the
answer. Monetising only through connectivity
rarely guarantees sustainable commercial
success.
DON’T BELIEVE THE HYPEI
WE DESIGN USEFUL THINGSII
Value comes from products that are purposeful.
Our commitment is to design products that have
a meaningful impact on people’s lives; IoT
technologies are merely tools to enable that.
WE DESIGN USEFUL THINGSII
WE AIM FOR THE WIN-WIN-WINIII
A complex web of stakeholders is forming
around IoT products: from users, to businesses,
and everyone in between. We design so that
there is a win for everybody in this elaborate
exchange.
WE AIM FOR THE WIN-WIN-WINIII
WE KEEP EVERYONE AND
EVERY THING SECURE
IV
With connectivity comes the potential for
external security threats executed through the
product itself, which comes with serious
consequences. We are committed to protecting
our users from these dangers, whatever they
may be.
WE KEEP EVERYONE AND
EVERY THING SECURE
IV
WE BUILD AND PROMOTE
A CULTURE OF PRIVACY
V
Equally severe threats can also come from within.
Trust is violated when personal information
gathered by the product is handled carelessly. We
build and promote a culture of integrity where the
norm is to handle data with care.
WE BUILD AND PROMOTE
A CULTURE OF PRIVACY
V
WE ARE DELIBERATE ABOUT
WHAT DATA WE COLLECT
VI
This is not the business of hoarding data; we only
collect data that serves the utility of the product
and service. Therefore, identifying what those
data points are must be conscientious and
deliberate.
WE ARE DELIBERATE ABOUT
WHAT DATA WE COLLECT
VI
WE MAKE THE PARTIES ASSOCIATED
WITH AN IOT PRODUCT EXPLICIT
VII
IoT products are uniquely connected, making the
flow of information among stakeholders open and
fluid. This results in a complex, ambiguous, and
invisible network. Our responsibility is to make
the dynamics among those parties more visible
and understandable to everyone.
WE MAKE THE PARTIES ASSOCIATED
WITH AN IOT PRODUCT EXPLICIT
VII
WE EMPOWER USERS TO BE THE
MASTERS OF THEIR OWN DOMAIN
VIII
• Users often do not have control over their role within the
network of stakeholders surrounding an IoT product. We
believe that users should be empowered to set the boundaries
of how their data is accessed and how they are engaged with via
the product.
WE EMPOWER USERS TO BE THE
MASTERS OF THEIR OWN DOMAIN
VIII
WE DESIGN THINGS FOR THEIR LIFETIMEIX
Currently physical products and digital services
tend to be built to have different lifespans. In an
IoT product features are codependent, so
lifespans need to be aligned. We design products
and their services to be bound as a single, durable
entity.
WE DESIGN THINGS FOR THEIR LIFETIMEIX
IN THE END, WE ARE HUMAN BEINGS.X
Design is an impactful act. With our work, we
have the power to effect relationships between
people and technology, as well as among people.
We don’t use this influence to only make profits or
create robot overlords; instead, it is our
responsibility to use design to help people,
communities, and societies thrive.
IN THE END, WE ARE HUMAN BEINGS.X
CONCLUDING
We pledge to be skeptical of the cult of the
new — just slapping the Internet onto a
product isn’t the answer. Monetizing only
through connectivity rarely guarantees
sustainable commercial success.
The world is becoming increasingly connected. This
offers opportunities for designers, engineers and
entrepreneurs to create unprecedented products
and services. Yet, a connected world also brings new
questions and challenges to the table.
This manifesto serves as a code of conduct for
everyone involved in developing the Internet of
Things, outlining 10 principles to help create
balanced and honest products in a burgeoning field
with many unknowns.
WE DON’T BELIEVE
THE HYPE
I
With connectivity comes the potential for
external security threats executed through
the product itself, which comes with serious
WE KEEP EVERYONE
AND EVERY THING
SECURE
IV
A complex web of stakeholders is forming
around IoT products: from users, to
WE AIM FOR THE
WIN-WIN-WIN
III
Value comes from products that are
purposeful. Our commitment is to design
WE DESIGN
USEFUL THINGS
II
IOT DESIGN MANIFESTOFirst drafted by a number of design professionals,
this manifesto is intended to be a living document
that the larger community of peers working within
the IoT field can contribute to and improve upon.
This manifesto is a living document, we seek your
input to help it grow. Please discuss, contribute,
remix, and test the boundaries of these principles.
www.iotmanifesto.org
v1.0 · May 2015
PRESSURE COOKER!
Split up - let’s make groups
You’ll be assigned a role - act like it
Let’s do this super fast …
TOMORROW’S KITCHEN
Brief #1
Local greengrocers team up w/
Ultimaker® to build new retail
model.
Brief #2
Carpenters union create open
source kitchen based on usage
data.
Brief #4
Waste processors want to bid for
clean waste from urban
households
Brief #3
Salvation army wants to tap into
the resource of expiring food
Brief #6
A national political party wants
kitchen table that strengthens
family ties.
Brief #5
Hospital commissions nearby
amateur chefs to make hospital
food
MAKE IT YOUR OWN
How can we create / design / improve
a …….………..
for ….………..
to …..…………
DEFINE
What will you be designing? (service, thing, … etc )
It can be “evil” - there are no no no limits!
What does this mean for your role / profession in the
process?
Draw it ! (advertisement poster)
HOW?
Where will your concept be used?
Sketch the context of the physical space (2D)
HOW?
Add your solution, users and other actors and
play out the actual use / behaviour
In three marvellous dimensions!
Explain to group (2 min max!)
SHOWTIME!
ADD MANIFESTO!
Concept
DesignVerify
Implement
IOT DESIGN MANIFESTO CHEATSHEET
This is the IoT Design Manifesto cheatsheet. It aims to make the principles of the manifesto
actionable.
How to use this?The principles of the manifesto work on different abstraction levels. So when you design a
product, you would address conceptual issues first, and become more specific toward
implementation. Then iterate once more to account for interrelated issues.
1. Concept What is the raison-d’être ? Why is it connected? What value do we create?
2. Design How should it work? How would people interact? How would it show…
3. Implementation What do we need to develop? How do we account for privacy?
I. WE DON’T BELIEVE THE HYPEImagine, your product would be advertise
without any mentioning of connectedness
data, the internet or smartness. What
would it be that would trigger a customer?
II. WE DESIGN USEFUL THINGSThis is basically a challenge of good design.
What kind of untapped potential is there in
this product? What would’ve been
impossible 10 years ago, but would now
suddenly be possible? What needs can the
product cater for that it couldn’t do before?
III. WE AIM FOR THE WIN-WIN-WINIoT products are connected. Not only to the
web or a service, but through that service to
anyone involved in creating it.Who is involved with the product, and what
is to gain from being connected? And if one
stakeholder clearly wins, how’s that of value
to the other stakeholders?
IV. WE KEEP EVERYONE AND EVERY THINGSECUREWhat are the scenarios you can think of,
where security is at stake. And what are the
potential points where security can be
breached? On product level, service level?
Or does your product put other products
around it at risk?V. WE BUILD AND PROMOTE A CULTUREOF PRIVACYThis is an organisational issue. Privacy is a
complex matter and you need to align
everyone working on a product or service
to have a common notion and policy
relevant to the context of your business.
When drafting your policy, try to ‘be’ your
customer, and push for extreme scenarios
like company acquisitions, security
breaches, partner company bankruptcies,
potential outsourcing of processing and
storing data, etc. etc.
VI. WE ARE DELIBERATE ABOUT WHATDATA WE COLLECTWhat is the minimal amount of data we
need to process to make this product work?
And what data could be of use for the
current user, future users, or future
versions of a product? How could a product
become a better version of themselves?
How could other products work better
through data from your product?
If any data stream doesn’t server any of
these purposes, why bother to collect or
store it?
VII. WE MAKE THE PARTIES ASSOCIATED
WITH AN IOT PRODUCT EXPLICITHow will your user know who is involved
with your product? When, in the process of
bringing this product into her/his life, will
she/he understand that the product is an
element of a greater network with more
parties involved?
VIII. WE EMPOWER USERS TO BE THE
MASTERS OF TH
Concept
A complex web of stakeholders is forming
around IoT products: from users, to
businesses, and everyone in between. We
design so that there is a win for everybody in
this elaborate exchange.
WE AIM FOR THE WIN-WIN-WINIII
Design
Users often do not have control
over their role within the network
of stakeholders surrounding an IoT
product. We believe that users
should be empowered to set the
boundaries of how their data is
accessed and how they are engaged
with via the product.
WE EMPOWER USERS TO BE THE
MASTERS OF THEIR OWN DOMAIN
VIII
Implementation
This is not the business of hoarding data; we
only collect data that serves the utility of the
product and service. Therefore, identifying what
those data points are must be conscientious and
deliberate.
WE ARE DELIBERATE ABOUT
WHAT DATA WE COLLECT
VI
SHOWTIME (again)!
DISCUSS
What happened?
How did the manifesto help / obstruct / influence your group?
We would like to know how you plan on using or implementing what
you’ve learned?
What point in your development / design process would you go back
to the points in the manifesto?
WE SPIED WITH OUR LITTLE EYES…
TBD during the workshop
THANKS - YOU’RE ALL AWESOME!

More Related Content

Similar to Implementing Responsible Design in a Connnected World

IoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitev
IoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitevIoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitev
IoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitevAlja Isakovic
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016We Are Social
 
Marcel Schouwenaar: The inevitable Internet of Things
Marcel Schouwenaar: The inevitable Internet of ThingsMarcel Schouwenaar: The inevitable Internet of Things
Marcel Schouwenaar: The inevitable Internet of Thingssinnerschrader
 
Digital Transformation 2018 - Edinburgh
Digital Transformation 2018 - EdinburghDigital Transformation 2018 - Edinburgh
Digital Transformation 2018 - EdinburghRay Bugg
 
Fjord Trends 2016
Fjord Trends 2016Fjord Trends 2016
Fjord Trends 2016Fjord
 
Design & Innovation Trends 2016
Design & Innovation Trends 2016Design & Innovation Trends 2016
Design & Innovation Trends 2016Allan V. Braverman
 
Accenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand
 
Go-to-market services for IoT
Go-to-market services for IoTGo-to-market services for IoT
Go-to-market services for IoTIoTAnalytics
 
The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project
 
Culture of Innovation
Culture of InnovationCulture of Innovation
Culture of InnovationAxway
 
What's Next for Creativity & Technology: Applied Innovation
What's Next for Creativity & Technology: Applied InnovationWhat's Next for Creativity & Technology: Applied Innovation
What's Next for Creativity & Technology: Applied InnovationOgilvy Consulting
 
Mindshare Ireland - Future of 2015
Mindshare Ireland - Future of 2015Mindshare Ireland - Future of 2015
Mindshare Ireland - Future of 2015Mindshare Ireland
 
Best_Practice_Digital_Signage_Content
Best_Practice_Digital_Signage_ContentBest_Practice_Digital_Signage_Content
Best_Practice_Digital_Signage_ContentGreg Weaver
 
Examples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBMExamples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBMPietro Leo
 
Internet of Things: and the new era of smart, connected products
Internet of Things: and the new era of smart, connected productsInternet of Things: and the new era of smart, connected products
Internet of Things: and the new era of smart, connected productsCESAR
 
MongoDB World 2016 Giant Ideas Stage eBook
MongoDB World 2016 Giant Ideas Stage eBookMongoDB World 2016 Giant Ideas Stage eBook
MongoDB World 2016 Giant Ideas Stage eBookMongoDB
 
WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02
WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02
WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02WIN World
 
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience  7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience Mighty Guides, Inc.
 
The Invention Of An Invention
The Invention Of An InventionThe Invention Of An Invention
The Invention Of An InventionErin Moore
 

Similar to Implementing Responsible Design in a Connnected World (20)

IoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitev
IoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitevIoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitev
IoT Design Manifesto: smernice za bolj odgovoren razvoj IoT izdelkov in storitev
 
Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016Curiosity Stop Special: Techcrunch Disrupt 2016
Curiosity Stop Special: Techcrunch Disrupt 2016
 
David cutler slides shared at mit ilp update
David cutler slides shared at mit ilp   updateDavid cutler slides shared at mit ilp   update
David cutler slides shared at mit ilp update
 
Marcel Schouwenaar: The inevitable Internet of Things
Marcel Schouwenaar: The inevitable Internet of ThingsMarcel Schouwenaar: The inevitable Internet of Things
Marcel Schouwenaar: The inevitable Internet of Things
 
Digital Transformation 2018 - Edinburgh
Digital Transformation 2018 - EdinburghDigital Transformation 2018 - Edinburgh
Digital Transformation 2018 - Edinburgh
 
Fjord Trends 2016
Fjord Trends 2016Fjord Trends 2016
Fjord Trends 2016
 
Design & Innovation Trends 2016
Design & Innovation Trends 2016Design & Innovation Trends 2016
Design & Innovation Trends 2016
 
Accenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord TrendsAccenture New Zealand - Fjord Trends
Accenture New Zealand - Fjord Trends
 
Go-to-market services for IoT
Go-to-market services for IoTGo-to-market services for IoT
Go-to-market services for IoT
 
The hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human webThe hi:project: empowering you, empowering us, with a more human web
The hi:project: empowering you, empowering us, with a more human web
 
Culture of Innovation
Culture of InnovationCulture of Innovation
Culture of Innovation
 
What's Next for Creativity & Technology: Applied Innovation
What's Next for Creativity & Technology: Applied InnovationWhat's Next for Creativity & Technology: Applied Innovation
What's Next for Creativity & Technology: Applied Innovation
 
Mindshare Ireland - Future of 2015
Mindshare Ireland - Future of 2015Mindshare Ireland - Future of 2015
Mindshare Ireland - Future of 2015
 
Best_Practice_Digital_Signage_Content
Best_Practice_Digital_Signage_ContentBest_Practice_Digital_Signage_Content
Best_Practice_Digital_Signage_Content
 
Examples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBMExamples of Innovation Building Blocks in IBM
Examples of Innovation Building Blocks in IBM
 
Internet of Things: and the new era of smart, connected products
Internet of Things: and the new era of smart, connected productsInternet of Things: and the new era of smart, connected products
Internet of Things: and the new era of smart, connected products
 
MongoDB World 2016 Giant Ideas Stage eBook
MongoDB World 2016 Giant Ideas Stage eBookMongoDB World 2016 Giant Ideas Stage eBook
MongoDB World 2016 Giant Ideas Stage eBook
 
WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02
WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02
WIN WORLD INSIGHTS | ISSUE 10 | YEAR 02
 
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience  7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
 
The Invention Of An Invention
The Invention Of An InventionThe Invention Of An Invention
The Invention Of An Invention
 

More from ThingsConAMS

ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS
 
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacyThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacyThingsConAMS
 
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoTThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoTThingsConAMS
 
Ame Elliott UX security ThingsCon 2017 workshop
Ame Elliott UX security ThingsCon 2017 workshopAme Elliott UX security ThingsCon 2017 workshop
Ame Elliott UX security ThingsCon 2017 workshopThingsConAMS
 
ThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtecThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtecThingsConAMS
 
ThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef LubbersThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef LubbersThingsConAMS
 
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander SmitThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander SmitThingsConAMS
 
ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque ThingsConAMS
 
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman HaqueThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman HaqueThingsConAMS
 
ThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper CugunThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper CugunThingsConAMS
 
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter ReeskampThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter ReeskampThingsConAMS
 
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel SchouwenaarThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel SchouwenaarThingsConAMS
 
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...ThingsConAMS
 
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris SpeedThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris SpeedThingsConAMS
 
Helma van Rijn presents Linkx
Helma van Rijn presents Linkx Helma van Rijn presents Linkx
Helma van Rijn presents Linkx ThingsConAMS
 
Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai ThingsConAMS
 
Ismael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc ToysIsmael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc ToysThingsConAMS
 
Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti ThingsConAMS
 
Thingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna GouldenThingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna GouldenThingsConAMS
 
Thingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smitThingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smitThingsConAMS
 

More from ThingsConAMS (20)

ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit FailsThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
ThingsConAMS 2017 - Mirko Ross - Internet of Shit Fails
 
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacyThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
ThingsConAMS 2017 - Ame Elliott - User Experience: IoT security & privacy
 
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoTThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
ThingsConAMS 2017 - Jeff Katz - A Survey of Structural Insecurities in IoT
 
Ame Elliott UX security ThingsCon 2017 workshop
Ame Elliott UX security ThingsCon 2017 workshopAme Elliott UX security ThingsCon 2017 workshop
Ame Elliott UX security ThingsCon 2017 workshop
 
ThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtecThingsCon Salon 6 - Fashion Tech - WEtec
ThingsCon Salon 6 - Fashion Tech - WEtec
 
ThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef LubbersThingsCon Salon 6 - Fashion Tech - Eef Lubbers
ThingsCon Salon 6 - Fashion Tech - Eef Lubbers
 
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander SmitThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
ThingsCon Salon 6 - Fashion Tech - Welcome - Iskander Smit
 
ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque ThingsCon Amsterdam 2016 - keynote Usman Haque
ThingsCon Amsterdam 2016 - keynote Usman Haque
 
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman HaqueThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
ThingsCon Amsterdam 2016 - Smart Citizen workshop - Usman Haque
 
ThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper CugunThingsCon Amsterdam 2016 - Alper Cugun
ThingsCon Amsterdam 2016 - Alper Cugun
 
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter ReeskampThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
ThingsCon Amsterdam 2016 - Workshop Internet of Toys - Wouter Reeskamp
 
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel SchouwenaarThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
ThingsCon Amsterdam 2016 - Welcome by Iskander Smit and Marcel Schouwenaar
 
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
ThingsCon Amsterdam 2016 - Workshop Products as Agents - Nazli Cila, Iskander...
 
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris SpeedThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
ThingsCon Amsterdam 2016 - Block exchange - workshop intro - Chris Speed
 
Helma van Rijn presents Linkx
Helma van Rijn presents Linkx Helma van Rijn presents Linkx
Helma van Rijn presents Linkx
 
Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai Justyna Zubrycka presents Vai Kai
Justyna Zubrycka presents Vai Kai
 
Ismael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc ToysIsmael Velo Feijoo presents Misc Toys
Ismael Velo Feijoo presents Misc Toys
 
Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti Wouter Reeskamp presents the work of StudioSophisti
Wouter Reeskamp presents the work of StudioSophisti
 
Thingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna GouldenThingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
Thingscon Salon #4 - The Things Network Eindhoven - Lorna Goulden
 
Thingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smitThingscon salon 4 intro iskander smit
Thingscon salon 4 intro iskander smit
 

Recently uploaded

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 

Recently uploaded (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 

Implementing Responsible Design in a Connnected World

  • 1. IMPLEMENTING RESPONSIBLE DESIGN 
 IN A CONNECTED WORLD IoT Design Manifesto WORKSHOP 4-12-2015 Thingscon Amsterdam
  • 3.
  • 4. WHY
  • 5. Peak of inflated expectations Technology trigger Trough of Disillusionment Plateau of Productivity Slope of enlightenment
  • 6.
  • 7. MANIFESTO 10 Principles Open for discussion A tool for conversation Guideline
  • 8. WHY THIS WORKSHOP? • Identify the situation of designing in the IoT world • Develop techniques and strategies for how the manifesto’s principles can be implemented • Develop practical guidelines for promoting responsible design within the IoT • Achieve this by “doing” … practice what we preach
  • 9. PROGRAMME TODAY Who we are, why we have a manifesto, what is this workshop for? (5 min) Participant introductions (5 min) Manifesto re-cap (5 min) Super pressure cooker concept design session (60 min) • Breakup & mix into groups (5 min) • Check the briefs (10 min) • Design your concept (10 min - for real …) • Showtime 1! (20 min) • Refine the concept with the manifesto (30 min) • Showtime! 2 (20 min) Conclusions & discussion ( … min)
  • 13. We pledge to be skeptical of the cult of the new — just slapping the Internet onto a product isn’t the answer. Monetising only through connectivity rarely guarantees sustainable commercial success. DON’T BELIEVE THE HYPEI
  • 14. WE DESIGN USEFUL THINGSII
  • 15. Value comes from products that are purposeful. Our commitment is to design products that have a meaningful impact on people’s lives; IoT technologies are merely tools to enable that. WE DESIGN USEFUL THINGSII
  • 16. WE AIM FOR THE WIN-WIN-WINIII
  • 17. A complex web of stakeholders is forming around IoT products: from users, to businesses, and everyone in between. We design so that there is a win for everybody in this elaborate exchange. WE AIM FOR THE WIN-WIN-WINIII
  • 18. WE KEEP EVERYONE AND EVERY THING SECURE IV
  • 19. With connectivity comes the potential for external security threats executed through the product itself, which comes with serious consequences. We are committed to protecting our users from these dangers, whatever they may be. WE KEEP EVERYONE AND EVERY THING SECURE IV
  • 20. WE BUILD AND PROMOTE A CULTURE OF PRIVACY V
  • 21. Equally severe threats can also come from within. Trust is violated when personal information gathered by the product is handled carelessly. We build and promote a culture of integrity where the norm is to handle data with care. WE BUILD AND PROMOTE A CULTURE OF PRIVACY V
  • 22. WE ARE DELIBERATE ABOUT WHAT DATA WE COLLECT VI
  • 23. This is not the business of hoarding data; we only collect data that serves the utility of the product and service. Therefore, identifying what those data points are must be conscientious and deliberate. WE ARE DELIBERATE ABOUT WHAT DATA WE COLLECT VI
  • 24. WE MAKE THE PARTIES ASSOCIATED WITH AN IOT PRODUCT EXPLICIT VII
  • 25. IoT products are uniquely connected, making the flow of information among stakeholders open and fluid. This results in a complex, ambiguous, and invisible network. Our responsibility is to make the dynamics among those parties more visible and understandable to everyone. WE MAKE THE PARTIES ASSOCIATED WITH AN IOT PRODUCT EXPLICIT VII
  • 26. WE EMPOWER USERS TO BE THE MASTERS OF THEIR OWN DOMAIN VIII
  • 27. • Users often do not have control over their role within the network of stakeholders surrounding an IoT product. We believe that users should be empowered to set the boundaries of how their data is accessed and how they are engaged with via the product. WE EMPOWER USERS TO BE THE MASTERS OF THEIR OWN DOMAIN VIII
  • 28. WE DESIGN THINGS FOR THEIR LIFETIMEIX
  • 29. Currently physical products and digital services tend to be built to have different lifespans. In an IoT product features are codependent, so lifespans need to be aligned. We design products and their services to be bound as a single, durable entity. WE DESIGN THINGS FOR THEIR LIFETIMEIX
  • 30. IN THE END, WE ARE HUMAN BEINGS.X
  • 31. Design is an impactful act. With our work, we have the power to effect relationships between people and technology, as well as among people. We don’t use this influence to only make profits or create robot overlords; instead, it is our responsibility to use design to help people, communities, and societies thrive. IN THE END, WE ARE HUMAN BEINGS.X
  • 32. CONCLUDING We pledge to be skeptical of the cult of the new — just slapping the Internet onto a product isn’t the answer. Monetizing only through connectivity rarely guarantees sustainable commercial success. The world is becoming increasingly connected. This offers opportunities for designers, engineers and entrepreneurs to create unprecedented products and services. Yet, a connected world also brings new questions and challenges to the table. This manifesto serves as a code of conduct for everyone involved in developing the Internet of Things, outlining 10 principles to help create balanced and honest products in a burgeoning field with many unknowns. WE DON’T BELIEVE THE HYPE I With connectivity comes the potential for external security threats executed through the product itself, which comes with serious WE KEEP EVERYONE AND EVERY THING SECURE IV A complex web of stakeholders is forming around IoT products: from users, to WE AIM FOR THE WIN-WIN-WIN III Value comes from products that are purposeful. Our commitment is to design WE DESIGN USEFUL THINGS II IOT DESIGN MANIFESTOFirst drafted by a number of design professionals, this manifesto is intended to be a living document that the larger community of peers working within the IoT field can contribute to and improve upon. This manifesto is a living document, we seek your input to help it grow. Please discuss, contribute, remix, and test the boundaries of these principles. www.iotmanifesto.org v1.0 · May 2015
  • 33. PRESSURE COOKER! Split up - let’s make groups You’ll be assigned a role - act like it Let’s do this super fast …
  • 35. Brief #1 Local greengrocers team up w/ Ultimaker® to build new retail model. Brief #2 Carpenters union create open source kitchen based on usage data. Brief #4 Waste processors want to bid for clean waste from urban households Brief #3 Salvation army wants to tap into the resource of expiring food Brief #6 A national political party wants kitchen table that strengthens family ties. Brief #5 Hospital commissions nearby amateur chefs to make hospital food
  • 36. MAKE IT YOUR OWN How can we create / design / improve a …….……….. for ….……….. to …..…………
  • 37. DEFINE What will you be designing? (service, thing, … etc ) It can be “evil” - there are no no no limits! What does this mean for your role / profession in the process? Draw it ! (advertisement poster)
  • 38. HOW? Where will your concept be used? Sketch the context of the physical space (2D)
  • 39. HOW? Add your solution, users and other actors and play out the actual use / behaviour In three marvellous dimensions! Explain to group (2 min max!)
  • 42. Concept DesignVerify Implement IOT DESIGN MANIFESTO CHEATSHEET This is the IoT Design Manifesto cheatsheet. It aims to make the principles of the manifesto actionable. How to use this?The principles of the manifesto work on different abstraction levels. So when you design a product, you would address conceptual issues first, and become more specific toward implementation. Then iterate once more to account for interrelated issues. 1. Concept What is the raison-d’être ? Why is it connected? What value do we create? 2. Design How should it work? How would people interact? How would it show… 3. Implementation What do we need to develop? How do we account for privacy? I. WE DON’T BELIEVE THE HYPEImagine, your product would be advertise without any mentioning of connectedness data, the internet or smartness. What would it be that would trigger a customer? II. WE DESIGN USEFUL THINGSThis is basically a challenge of good design. What kind of untapped potential is there in this product? What would’ve been impossible 10 years ago, but would now suddenly be possible? What needs can the product cater for that it couldn’t do before? III. WE AIM FOR THE WIN-WIN-WINIoT products are connected. Not only to the web or a service, but through that service to anyone involved in creating it.Who is involved with the product, and what is to gain from being connected? And if one stakeholder clearly wins, how’s that of value to the other stakeholders? IV. WE KEEP EVERYONE AND EVERY THINGSECUREWhat are the scenarios you can think of, where security is at stake. And what are the potential points where security can be breached? On product level, service level? Or does your product put other products around it at risk?V. WE BUILD AND PROMOTE A CULTUREOF PRIVACYThis is an organisational issue. Privacy is a complex matter and you need to align everyone working on a product or service to have a common notion and policy relevant to the context of your business. When drafting your policy, try to ‘be’ your customer, and push for extreme scenarios like company acquisitions, security breaches, partner company bankruptcies, potential outsourcing of processing and storing data, etc. etc. VI. WE ARE DELIBERATE ABOUT WHATDATA WE COLLECTWhat is the minimal amount of data we need to process to make this product work? And what data could be of use for the current user, future users, or future versions of a product? How could a product become a better version of themselves? How could other products work better through data from your product? If any data stream doesn’t server any of these purposes, why bother to collect or store it? VII. WE MAKE THE PARTIES ASSOCIATED WITH AN IOT PRODUCT EXPLICITHow will your user know who is involved with your product? When, in the process of bringing this product into her/his life, will she/he understand that the product is an element of a greater network with more parties involved? VIII. WE EMPOWER USERS TO BE THE MASTERS OF TH
  • 44. A complex web of stakeholders is forming around IoT products: from users, to businesses, and everyone in between. We design so that there is a win for everybody in this elaborate exchange. WE AIM FOR THE WIN-WIN-WINIII
  • 46. Users often do not have control over their role within the network of stakeholders surrounding an IoT product. We believe that users should be empowered to set the boundaries of how their data is accessed and how they are engaged with via the product. WE EMPOWER USERS TO BE THE MASTERS OF THEIR OWN DOMAIN VIII
  • 48. This is not the business of hoarding data; we only collect data that serves the utility of the product and service. Therefore, identifying what those data points are must be conscientious and deliberate. WE ARE DELIBERATE ABOUT WHAT DATA WE COLLECT VI
  • 50. DISCUSS What happened? How did the manifesto help / obstruct / influence your group? We would like to know how you plan on using or implementing what you’ve learned? What point in your development / design process would you go back to the points in the manifesto?
  • 51. WE SPIED WITH OUR LITTLE EYES… TBD during the workshop
  • 52. THANKS - YOU’RE ALL AWESOME!