bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

11

Click here to load reader

Upload: boni

Post on 08-May-2015

1.408 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

ORIGINAL ARTICLE

Genevieve Bell Æ Paul Dourish

Yesterday’s tomorrows: notes on ubiquitous computing’sdominant vision

Received: 31 August 2005 / Accepted: 25 April 2006� Springer-Verlag London Limited 2006

Abstract Ubiquitous computing is unusual amongsttechnological research arenas. Most areas of computerscience research, such as programming language imple-mentation, distributed operating system design, or de-notational semantics, are defined largely by technicalproblems, and driven by building upon and elaboratinga body of past results. Ubiquitous computing, by con-trast, encompasses a wide range of disparate techno-logical areas brought together by a focus upon acommon vision. It is driven, then, not so much by theproblems of the past but by the possibilities of the fu-ture. Ubiquitous computing’s vision, however, is over adecade old at this point, and we now inhabit the futureimagined by its pioneers. The future, though, may nothave worked out as the field collectively imagined. Inthis article, we explore the vision that has driven theubiquitous computing research agenda and the con-temporary practice that has emerged. Drawing on cross-cultural investigations of technology adoption, we arguefor developing a ‘‘ubicomp of the present’’ which takesthe messiness of everyday life as a central theme.

1 Introduction

Ubiquitous computing (ubicomp) research is character-ized primarily by a concern with potential future com-putational worlds. This notion of research by futureenvisionment has been a feature of ubicomp discourseand reasoning since it earliest days; Weiser [1] founda-tional article is even entitled ‘‘The Computer for thetwenty-first Century’’—an explicit look towards a pos-

sible future. Rhetorically, Weiser situates the researchactivities that he describes there as initial steps upon apath of technological development inspired by an ex-plicit vision of possible future relationships betweenpeople, practice, and technology. Although much of hisarticle describes a research program already under wayand some of the early results that it had produced, thedominant theme of the article is the twin challenge ofanticipating future trends and meeting future needs.

Weiser’s article was doubly influential. Not only didit articulate a research agenda that many have em-braced, it also set a rhetorical tone that many haveadopted. So, the same concern with technological fu-tures continues to feature in the ways in which ubicompresearch agendas are framed and in which technologicaladvances are motivated and measured. Ubicomp isessentially defined by its visions of a technological fu-ture. Often, this is taken directly from Weiser’s ownwork; almost one quarter of all the papers published inthe Ubicomp conference between 2001 and 2005 citeWeiser’s foundational articles, a remarkable number ofpublications to cite a single vision as fundamental fortheir own work over a decade later. Even in cases whereWeiser’s own vision is not a driving factor, the idea thatubiquitous computing research is exploring prototypesof tomorrow’s everyday technology and everyday expe-rience is a pervasive one.

Such visions, however, are interesting not just forwhat they say about the future but also for what they sayabout the present. This seems to be particularly the casewhen it comes to normative social relationships. Envi-sionments of the future, such as those of the WorldsFairs [2], Disney’s Tomorrowland [3], or most popularscience fiction [4] have provided a useful analytic focusfor considering how the problems of today are per-ceived, framed, and understood. In this paper, we areconcerned with the balance between past, present, andfuture embedded in conventional discourses aboutubiquitous computing. In particular, we are interested inthe central conundrum posed by the fact that Weiser’svision of the future is, by this point, not only an old one,

G. Bell (&)Intel Corporation, Santa Clara, CA, USAE-mail: [email protected]

P. DourishUniversity of California, Irvine, CA, USAE-mail: [email protected]

Pers Ubiquit Comput (2006)DOI 10.1007/s00779-006-0071-x

Page 2: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

but also a very American one. The role of technology ineveryday life is, in the early twenty-first century, alreadyquite different than it was when Weiser wrote in the late1980s; among many other things, it is now explicitlyacknowledged to have remarkable cultural variation.PARC famously pursued a policy of ‘‘time–machineresearch,’’ devoting its considerable financial and intel-lectual resources to creating simulations of futurecomputing environments; by this stage, though,conventional computing platforms have vastly out-stripped even the ‘‘futuristic’’ environment that Weiser’slaboratory was capable of building. Yet, his originalframing of the ubiquitous computing vision still occu-pies an important place in much of the discourse ofubiquitous computing research. As researchers workingwithin and around ubiquitous computing discourses,our own research practices and interests also lie at thisintersection of technical and social considerations, andour approach here will attempt to weave back and forthbetween them. One of us is a computer scientist whosework lies at the intersection of computer science andsocial science, the other a cultural anthropologist with aprimary concern in information technology as a site ofcultural production and the consequences for technol-ogy innovation and diffusion. The questions we want toask, then, are as follows. First, how should we under-stand the relationship between ubiquitous computing’senvisioned future and our everyday present? Secondly,what influence does this have on contemporary ubiqui-tous computing research? And finally, what motivatesand explains the remarkable persistence and centrality ofWeiser’s vision?

We will begin by exploring the ways in which ubiq-uitous computing researchers have framed their workwith respect to anticipated technological and socialtrends, and consider some of the implications of thisapproach. We will then present two cases of alternativevisions of ubiquitous computing, one from Singaporeand one from Korea. These will then provide the basisfor a discussion of competing visions of ubiquitouscomputing and the idea of a ‘‘ubicomp of the present.’’

Ultimately this paper is organized around threeframing points.

First, the centrality of ubiquitous computing’s‘‘proximate future’’ continually places its achievementsout of reach, while simultaneously blinding us to currentpractice. By focusing on the future just around thecorner, ubiquitous computing renders contemporarypractice (at outside of research sites and ‘‘living labs’’),by definition, irrelevant or at the very least already out-moded. Arguably, though, ubiquitous computing is al-ready here; it simply has not taken the form that weoriginally envisaged and continue to conjure in our vi-sions of tomorrow. We will draw on a number of casestudies to substantiate this point, drawing in particularon models of the ubiquitous world that seem to deviatefrom conventional images.

Second, the framing of ubicomp as something yet tobe achieved allows researchers and technologists to ab-

solve themselves for responsibilities for the present; theproblems of ubiquitous computing are framed asimplementation issues that are, essentially, someoneelse’s problem, to be cleaned up afterwards as part of thebroad march of technology. Essentially, the futureframing allows us to assume that certain problems willsimply disappear of their own accord. By focusing oncase studies drawn from countries in which the vision ofubiquitous computing has played out differently thanWeiser envisioned, we will draw attention to the com-plex settings within which ubiquitous computing is al-ways already embedded.

Third, the seamlessly interconnected world of futurescenarios is at best a misleading vision and at worst adownright dangerous one. Homogeneity and an erasureof differentiation is a common feature of future envi-sionments; the practice is inevitably considerably mess-ier, and perhaps dealing with the messiness of everydaylife should be a central element of ubicomp’s researchagenda. We will illustrate the work involved in contin-ually producing alignments between technologicalopportunities and social realities.

2 Ubiquitous computing’s ‘‘proximate future’’

The dominant tense of ubiquitous computing writing iswhat we might call the ‘‘proximate future.’’ That is,motivations and frames are often written not merely inthe future tense, describing events and settings to come,but describe a proximate future, one ‘‘just around thecorner.’’ The proximate future is invoked in observa-tions that ‘‘Internet penetration will shortly reach...’’ or‘‘We are entering a period when...’’ or ‘‘New techno-logical opportunities are emerging that...’’ or ‘‘Mobilephones are becoming the dominant form of...’’ A briefperusal of proceedings of recent conferences confirmsthe pervasive sense of the proximate future; of the 108papers comprising the Ubicomp conference proceedingsbetween 2001 and 2004, fully 47% of the papers areoriented towards a proximate (and inevitable) techno-logical future (e.g., from only Ubicomp 2004, [5–9] andmore.) Indeed, Weiser’s foundational article originallypublished at the start of the last decade of the twentiethcentury and entitled ‘‘The computer for the twenty-firstcentury’’ is, similarly, built around a vision of theproximate future, the future just around the corner orover the horizon.

It may be that subsequent ubicomp writing hasadopted not only Weiser’s technological vision, but as-pects of his formulation of how this vision will come topass. Certainly, this collective envisionment of a futuresaturated with technology has been a defining charac-teristic of ubicomp research. What is perhaps mostinteresting is that ubicomp research has generally sharednot only in the notion of a technology-saturated future,but also in the designations of what sorts of technologiesit is that will saturate our future. In other words, thesecollective avowals of future potentialities are ways in

Page 3: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

which current activities are tied to the self-same agendathat Weiser set out in the late 1980s. In fact, citations toWeiser’s article are often phrased not so much as a ‘‘lookbackwards’’ but rather as a collective ‘‘look forwards’’;that is, instead of saying ‘‘back in 1991, we thoughtthat...’’, they say ‘‘Just as Weiser suggested in 1991, weare soon to enter a world where...’’

Latour and others [10] in the sociology of sciencehave talked about the pragmatics of citation practice,noting that citing the ways in which one’s own workdepends on prior results and writings not onlyacknowledges intellectual debts, but also builds defen-sible positions by aligning research with existing para-digms and traditions, and by enrolling others as tacitsupporters of one’s approach. However, beyond theways in which citation builds intellectual networks, it isworth stopping for a moment to think about the timedilations involved here. Weiser formulated his vision ofubiquitous computing in the late 1980s [11]; althoughthe Scientific American article was published in 1991, theubicomp project was already, by that point, wellunderway, and indeed the 1991 article is not only acompelling vision of the future, but a progress reporton the project of realizing it (complete with photographsof devices that had already been designed and built,and reports on their use.) However, the invocation ofWeiser’s vision as one that we share and continue toprosecute neglects the significant difference between thenand now, and changing techno-social contexts.

So, for example, in 1989, at the same time as theubiquitous computing research agenda was being for-mulated, Intel introduced the 486DX processor, runningat 25 MHz. Apple introduced the Mac IIci, based on a25 MHz MC68030 processor. They had yet to release aPowerbook laptop, but 1989 also saw the debut of the16lb, 16 MHz Macintosh portable. In the same year,Sun introduced the Sparcstation-1, running at 20 MHzand with a maximum memory capacity of 64 M. From acontemporary perspective, these would be poor ‘‘specs’’for a portable MP3 player never mind a scientificworkstation. The figures for the telecommunicationsmarket are equally salutary. The first US cellular tele-phony service had begun in 1983; by 1988, there wereapproximately 1.6 million US subscribers. In Europe,the GSM standard for mobile telephony was not dem-onstrated until 1991 (with the first network operatorbecoming active in 1992).

In other words, today’s technological landscape isquite radically different than that of the late 1980s whenWeiser was outlining the ubiquitous computing vision.The idea that, in the early twenty-first century, we arepostulating much the same proximate future vision ofubicomp that motivated Weiser is a somewhat surprisingone. Given that the last 20 years have seen such radicaltransformations of technological infrastructure world-wide, and that Moore’s Law suggests a 8,000-fold in-crease in computational performance, two questionsimmediately present themselves. First, why is our visionof the future still the same as Weiser’s, and second, why

has it not yet come to pass? Two possibilities presentthemselves.

The first possibility is that the ubiquitous computingvision can never come to pass. The proximate future is afuture infinitely postponed; when we are continuallyabout to enter a new age, when we are continuallyanticipating what happens next, and when our attentionis continually directed over the horizon, then by defini-tion ubiquitous computing is never about the here andnow. Indeed, within this particular model of a techno-logical future, it is hard to imagine how we could ever, asa community, say, ‘‘There. It is done.’’

The second possibility is that ubiquitous computingalready has come to pass. Clearly, of course, we do notlive in ‘‘Sal’s world,’’ as described in the scenario out-lined in Weiser’s paper. But perhaps ubiquitous com-puting is already here, but took a form other than thatwhich had been envisioned. Arguably, and as we willexplore at more length below, our contemporary world,in which mobile computation and mobile telephony arecentral aspects not just of Western commercial endeav-ors but also facets of everyday life in the developingworld, is already one of ubiquitous computing, albeit inunexpected form.

In fact, these two possibilities are not distinct options,but rather are two aspects of the same observation—thatthe vision of the future originally envisioned by Weiser,and still motivating much research in ubiquitous com-puting, is one that is firmly entrenched in its own par-ticular moments, locations and cultural contexts, avision as much of the past as of the future. From thisperspective, the future that ubicomp has been attempt-ing to build is not our own future, but 1989sfuture—yesterday’s tomorrows. Weiser envisioned ‘‘thecomputer for the twenty-first century.’’ Having nowentered the twenty-first century that means that what weshould perhaps attend to is ‘‘the computer of now.’’

In order to help us see the present day ‘‘anew,’’ wepresent two examples of contemporary computationalpractice oft neglected in Western research confer-ences—ubiquitous computing in Singapore and inKorea.

3 Ubiquitous computing environments: Singapore

Located at the tip of the Malay peninsular, Singapore isa small, prosperous former British colony with a robusteconomy, a technologically literate population, and areputation for strong government regulation of daily life[12–16]. Singapore is a diverse ethnic and culture mix:more than 76% of Singapore’s 4.3 million residentsidentify as Chinese, another 14% as Malay, slightly over8% as Indian, and the rest a mix of expatriates. MostSingaporeans are comfortably middle class, and thenation enjoys higher than average per capita householdincomes (around S$37,555 per year), and remarkablerates of home ownership (94%). Singapore is also one ofthe most wired (and indeed, ‘‘unwired,’’ that is, digitally

Page 4: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

connected via wireless networks) countries in the world[17]. Yet Singaporeans do not appear to think ofthemselves as living on a cutting technology edge—cellphones, hot spots and multi-media mobile messages areat this point naturalized parts of the local culturallandscape. Yet ironically, it is an example of ubiquitouscomputing out of the lab, out the experimental frame, inthe wild, working.

In 1992, 6 months after Mark Weiser’s article ap-peared in the pages of Scientific American, the Singap-orean National Computer Board launched IT2000Masterplan, the third in a series of ambitious technologyroadmaps for their island nation-state [18]. To achievethe goals of this plan, the board deemed it necessary todevelop a nation-wide information infrastructure. Thisproposed infrastructure would connect up nearly everyhome, school, and workplace in Singapore, creating an‘intelligent island’ (ibid). The island nation-state ofSingapore is small, compromising of slightly less than434 square miles, a land-mass only three and half timesthat of Washington DC, so making such a vision realseemed more reasonable. As part of the broader IT2000plan, Singapore ONE (One Network for Everyone) waslaunched in 1996, bringing together a range of publicsector agencies to roll out a high-speed data networktest-bed across the island which would in turn support ahost of applications and services designed to enhancenot only Singapore’s economic position globally but alsoto ‘‘improve the quality of life of its citizens’’ [19]. Thisplan was not without its technical challenges and delays[20], but is safe to say now, a decade later, the ‘intelligentisland’ vision has been realized. Rather than a proximatefuture, there were a series of bench-marked achieve-ments and milestones and the setting of a new 10 yearagenda.

Statistics tell one story. As of December 2004, 92.2%of the population owns a cell phone. A total of 73.3% ofSingapore’s 964,000 households have a computer athome, and more than 65% of households have access tothe internet—about 42% use dial-up and 41% broad-band (though these numbers are changing monthly, withthe former declining, while the latter grows). Outside ofthe home, the two major mobile phone carriers offer 560wireless hotspots between them, with Starhub boastingthat is hotspots cover nearly 115 square miles of theisland. In addition to these ICTs, Singapore also hasother sorts of ubiquitous technologies, including theworld’s first electronic road payment system, a blanketi-CCTV coverage network, a computer-driven masstransit system, and an enviable smart-postal network.

It is not so difficult, then, to make the case thatSingapore represents a kind of ubiquitous computingenvironment. Indeed during the SARS outbreak in 2003,the government strategically employed the internet andthe cell phone base as a way to distribute critical infor-mation, and provide cyber alternatives to ongoing socialpractices, including the festivals around Ching Mingwhich fell during the outbreak. Here the governmenthelped create online shrines for the ancestors of Singa-

pore’s Chinese community, encouraging them to vener-ate at home, rather than in Singapore’s many cemeteries,hoping by doing to cut the risk of transmission. Inthinking about Singapore as a ubiquitous computingenvironment, then, it is also important to think aboutwhat happens on and around the infrastructures builtout in accordance with IT2000, and those that justhappened (like the adoption of mobile phones). Whatkinds of experiences, services and applications transpire?What are people doing, or not doing, in an environmentso full of sensing and smart technologies?

Almost everyone in Singapore owns a cell phone—itis unlikely that even those without phones are beyondreach of a phone. Phones are utterly pervasive and canbe found interwoven into most of the aspects of daily life[21]. In any given month Singaporeans exchange morethan 690 million text messages—around 200 messagesper phone per month. Indeed, text messaging has be-come an art form in Singapore; a young Singaporeanwoman recently took the crown for the fastest textmessenger in the world, entering 26 words in 43.24 s.For regular Singaporeans, speed is facilitated by all sortsof local short-hands that have crept into text messaging,including a use of Sing-lish—the local Singaporean pa-tios. The two major mobile service providers offer a widerange of mobile services from feng shui advice to theweather; they also offer various translation applicationswhich make good sense in a country with four officiallanguages [22]. The mobile nature of cell phones alsocreates the new opportunities for location-based ser-vices—everyone in Singapore jokes about the impossi-bility of hailing a taxi without a cell phone. Most publiclocations in Singapore now have some kind of code thatyou send in a SMS message to a taxi company whodispatches a taxi to your location—simple, but effective.Singaporeans rely on their phones for everything frombasic communication to more sophisticated forms ofcommerce, social interaction and political engagement.

There are other ways in which Singapore’s trans-portation infrastructure blends different sorts of tech-nological interventions—in both the public and privatedomains. Again, Singapore’s size here is an advantage.The vast majority of Singapore’s residents use publictransport in their daily lives. In fact, Singapore’s massrapid transit system serves more than 1 million passen-gers daily in the city’s high-density travel corridors, andmany more use the bus lines to reach their final desti-nations. The train system utilizes smart card ticketingand advanced CCTV to provide seamless and safetransportation. Although only about 11% of the popu-lation owns a car, there is also a significant infrastruc-ture of taxis and traffic control in Singapore has alwaysbeen an issue. In 1998, Singapore’s Land TransportAuthority implemented the world’s first electronic roadpricing (ERP) system [23, 24]. Utilizing a dedicatedshort-wave radio communication system, unique in-vehicle identification units, smart cards, distributed datacollection points and a centralized data centre, the ERPprovides Singapore’s drivers with variable pricing

Page 5: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

schemes for entry into the central business district dur-ing the week—saturdays have no tolls. The data is dis-played on large LED boards at major intersectionsringing the restricted zone—and drivers will make deci-sions based on the pricing at these transition points andtaxi-drivers will consult with price-sensitive passengersregarding appropriate routes. Tolls are debited directlyfrom drivers through a smart card system. Interestinglywhile the system did not result in a boost to the publictransportation system, within the first year there was anoticeable drop in the number of times any single vehicleentered the restricted zone on a given day [24]. Digitallyenhanced vehicles, smart toll booths and various formsof technological interventions in the mass transit system,all point to an almost seamless manifestation of ubiq-uitous computing in the otherwise very prosaic domainof public transportation.

The development of an intelligent island has not beenwithout its challenges—for Singaporeans, this ubiqui-tous computing environment with its mobile handsets,pervasive internet and smart sensors raised questionsabout content, surveillance and control. Regulation ofubiquitous computing spaces is not often a subject thatis well documented in the relevant literature, savethrough the vectors of privacy and security. However,the Singapore example seems to offer some interestingre-workings of the consequences of a wide-scaledeployment and subsequent accessibility. In late 1996,the Singaporean Ministry of Information and the Artsannounced plans to filter all internet use through gov-ernment proxies to regulate access to political, religious,and pornographic content online. Not only were ISPs,cyber cafes and websites required to register with theBroadcast Authority, but adopting an approach similarto that used in China, the government blocked access toat least one hundred sites it deemed most problem-atic—including playboy.com. Usenet groups were alsosubject to scrutiny, intervention and regulation [25]. Thehead of the Singapore Broadcasting authority wasquoted at the time as saying that the regulation was inthe service of national safely: ‘‘We don’t want objec-tionable material to be easily available...We just want tokeep this part of the Internet within our immediateneighborhood clean.’’ What is particularly interestingabout these censorship moves is that many Singaporeansregarded them as positive and appropriate governmentactions [25, 26], while outsiders viewed this further proofof a controlling state.

Singapore’s censorship regime has been well docu-mented [27] and is often the subject of derision, scornand skepticism. However, its collaborative nature,clearly articulated principles and relatively transparencymake it worthy of closer scrutiny—as it has interestingimplications in the ubicomp space. In 2003, Singaporeauthorities revisited these questions of regulation andcontrol of the internet in their decadal review of cen-sorship in Singapore [26]. The committee defined cen-sorship not as a confrontation between regulators andthe regulated, but rather ‘‘it is about collaboration to

debate social issues constructively and to help educatemembers of a society to be more knowledgeable andsophisticated’’ [26, Sect. 9.4]. In his letter to the chair-man of the Censorship Review Committee, the thenMinister of Information, Communication and the Artswrote:

Your committee has succeeded in keeping the reportrelevant against the backdrop of our social evolutionand changing global landscape. While understandingthe need to fan the creative flames of the new gener-ation and to accommodate the diversity of views, youwere sensitive not to weaken the ‘glue’ that bonds oursociety—our core values, our identity, our sharedmemories, our religious and racial harmony. Yourcommittee also sees censorship as a shared responsi-bility, thus your approach of encouraging participa-tion comprising regulators, industry players,community and artists in the process....Our commonchallenge is to achieve a balance where adults canhave wider access, whilst our young are provided witha conducive environment to develop morally and so-cially, without compromising the development ofcreativity and social capital. These objectives might bedifficult but certainly not incompatible [26].

Here technology is understood as always and alreadyoperating within a cultural context and a complicatedone at that—the religious, cultural and racial heteroge-neity of Singaporean society is a constant feature ofnegotiations around appropriate regulation of technol-ogy environments. This construction of censorshiphappened in the larger context of Singapore’s social/cultural regulation of the internet, in particular theNational Internet Advisory Committee (NIAC) contin-ued its charter to promote ‘‘the safe and positive use ofthe internet’’ [28] (1). In 2002, they reported ongoingconcerns about internet accessibility via mobiledevices—particularly as it negated the value of parentalsupervision. While it is possible for parents to put thepersonal computer in the communal room at home tosupervise their children’s online activities; that safetymeasure is greatly diminished with mobile Internet [28](4). This continuing concern with children’s safety inparticular, promoted the NIAC to launch a new ‘cyberwellness’ initiative—‘‘in the cyber wellness vision, usersshould not only embrace the Internet in their lives, theyshould also adopt an attitude of using the Internet forinspiring others and contributing to the community’’[28] (7). Furthermore the task force goes on to suggestthat this vision of cyber wellness also incorporates asense of personal responsibility—to not spam, to notspread misleading information, to verify the accuracy ofinformation gleaned online before acting upon it [28].This language, and its intent, is remarkable. Here theubiquity of the internet is seen to support collective andcommunity practices, individuals are not just satisfyingtheir own desires and needs but operating within a largercultural framework. Imaging ubiquitous computing as a

Page 6: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

collective practice, rather than a set of discrete individ-ual actions, is an important reframing of that techno-logical vision.

4 Ubiquitous computing environments: Korea

So if Singapore, then, is an example of collective uses, aswell as computational device and sensor ubiquity, Koreamust surely be an example of infrastructural ubiquityand of public/private sector co-operations to achieve it.With its population of 45 million, Korea routinely ranksas one of the most connected countries in the world:77% of Korea’s 16.9 million households have computersin them; the average user spends about 15 h/week usingthat computer, 11 of those hours online. Just over 70%of the population reports using the internet regularly; astaggering 96% of Koreans, ages 6–20, report using theinternet regularly—for everything from email to gaming,data management and education [29]. Furthermore,according to the National Internet Development Agencyof Korea, 83% of Koreans have their own email ad-dresses—this includes 85% of those under 20, 91% ofthose in their 20 s, and a remarkable 67% of those of 60,and just under a third of all Koreans who use the in-ternet report having more than 1 email address. It is safeto say that the internet is a ubiquitous technology inKorea.

Korea is also frequently touted as the leadingbroadband market in the world, and it is. The remark-able level of connectivity is, in no small part, facilitatedby the nature of Korea’s urban landscape. More than81% of Koreans live in urban areas—indeed nearly 25%of the country’s population lives in Seoul alone—andmost of those live in high-rise, multi-family, high-densitydwellings. These tall, heavily populated buildings createa last-mile boon, not available in US urban sprawl—youonly need extend the wire to a building, and plug thewhole building in, rather than wiring house by house. Asa result of readily available, and relatively cheap, highspeed data connections (with fat pipes up and down);Koreans enjoy a wide range of internet usages at home,including watching previously shown TV programs,streamed to their home computers. Just as 77% ofhouseholds in Korea have usable computers at home,72% of Korean households are connected to the internet[29]. But perhaps more remarkable is the fact that only86% of Korean homes can connect to the internet,meaning that 14% of Korean households that couldconnect to the internet chose not to, and a further 14%of households cannot connect at all. Given the strengthof recent government actions, it is interesting to see thepresence of a lingering form of digital divide, or at leastinaccessibility.

In addition to this still high degree of broadbandpenetration, Korea also happens to be one of the fastestgrowing markets for ‘PC-Bangs’ or cyberarcades—gaming parlors with between 20 and 200 ma-chines, designed to support online gaming. These ar-

cades have flourished even as Korea’s home-PC uptakehas grown. This seemingly topsy–turvy reality makessense when you know that Korean homes are consideredto be extremely private domains, closed often even toone’s closest friends, and that socializing, especiallywhen it comes to gaming, has nearly always had a spacein the public domain, and is in fact actively sought outthat way. While 90% of Korea’s online population goeson line at home, 25% also report regularly go online incyber cafes. Even those people who have computers athome are also frequently using computational devicesaway from those homes. Further eschewing some of ourexpectations of technology usage patterns, of the sixteenmillion or so Koreans who make use of some form ofmobile internet access only 30% do so on the move; afull 40% report using their mobile devices to access theinternet while at home [29]. Interestingly, women areslightly outpacing men in their consumption of mobileinternet experiences—38 to 34%. Less surprising,Koreans using mobile internet access skew young—83%of those under 20 reports using it at some time, thisincludes everything from surfing the web to engaging ina range of eCommerce and mCommerce where thephone is the dominant mode of payment for onlinecontent in any form.

In 2004, against this backdrop of ubiquitous con-nectivity, devices and content, and also a boomingmiddle class [30, 31], Daeje Chin, the Minister ofInformation and Communication, and a former seniorexecutive at Samsung, launched IT389—‘‘The Road to$20,000 GDP/capita’’—a remarkable technology planthat proposed to transform Korea into a ubiquitoussociety by 2010 [32]. ‘‘U-Korea,’’ as it was quicklydubbed in the press, was a bold plan that relied on theclose ties that already exist between Korea’s govern-ment and many large private sector companies [33–35].The plan which takes its name from eight services(Wireless Broadband, Digital Multi-media Broadcast-ing, Home Network, Telematics, RFID, W-CDMA,Terrestrial Digital TC, VOIP), three infrastructures(Broadcast Convergence Network, Ubiquitous SensorNetwork, Next Generation Internet Protocol) and nineequipment fields (Next-Generation Mobile Communi-cations, Digital TV, Home Network, IT System-on-Chip, Wearable PC, Embedded SW, Digital Contents,Telematics, Intelligent Service Robot) is designed toboast Korea’s production, employment and exports,ultimately raising the entire country’s GDP, as well asthose of all households. In the press, Chin was quotedas saying that U-Korea meant ‘‘a society where allpeople can enjoy the benefits of state-of-the-art IT atanywhere and anytime.’’ It appears to be well under-stood that the ubiquity to which Chin refers is a so-cially experienced one, that it happens to Koreansociety, not just for Korean individuals. Indeed, eventhe metric of success of IT839 is at a household le-vel—per capita household income will rise, as willquality of life for all Koreans. Again, the vision of atechnology future, here explicitly called out as ubiqui-

Page 7: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

tous computing is manifested at a collective cultural orsocietal level.

5 Visions of ubiquitous computing

Studies of daily life in non-Western environments, eventhose that are richly populated with wireless andembedded technologies, are remarkably rare in ubiqui-tous computing research publications, even when, as inthese cases, they would seem to be paradigmatic exam-ples of ubiquitous computing.

There are a range of differences between the settingswe have been describing and those that more conven-tionally appear in Ubiquitous Computing research, andthese may account for the absence of these sorts of ac-counts as parts of the ubicomp vision. Perhaps it is thatin Singapore computational technology is both embed-ded in daily life (e.g. CCTV, sensors) and carried around(e.g. cell phones), disappearing into the fabric of every-day life. Perhaps it is that Korea’s infrastructuraldevelopment relied not on the free-market but on astrong relationship between the public and private sec-tors. Perhaps it is because all these cultural, social andpolitical contexts within which technologies have tran-spired, and the contexts in which they been deployed,consumed and resisted are unfamiliar and thus unread-able. Perhaps it is because Sal’s scenario and otherstandard visions of digital futures do not accommodatemonitoring and restricting car traffic, or centralizedgovernmental control and regulation of infrastructure orcontent, or dense urban environments, or extendedcollective public living, or sensing urination in elevators,or electronic consultations about feng shui or ambientdisplays of prayer times on a mosque wall. But if theydid, where else might we see ubiquitous computing al-ready happening? Cairo with its freshly deployed WiFinetwork set to connect all the local mosques and create asingle city-wide call to prayer? Indonesia’s e-mosqueproject?

In other words, by looking outside of the researchlaboratory, we are looking at ubiquitous computing as itis currently developing rather than it might be imaginedto look in the future. In these settings, we certainly seeconcerns with mobile devices, with infrastructures forpartial connectivity, and with optimizing applicationsfor devices with restricted input and restricted power.But at the same time, we also see that the ubiquitouscomputing agenda is one that is fundamentally tied toother important but neglected issues such as multi-gen-erational living, high density housing, public transit,religious observance, the practicalities of calling a cab,the politics of domesticity and the spatialities of infor-mation access—the messiness of every day practice.

A focus on current practice and on the diversity ofsettings in which ubiquitous computing is currentlybeing put to work can, perhaps, help us avoid visions ofubicomp application that are, in their own way, as

misguided as 1950s science fiction’s speculations abouttwenty-first century clothing and gender relations.

6 Messiness: an alternate ubicomp?

What these alternative and contemporary views ofubiquitous infrastructure have in common is theirmessiness. In our collective vision of ubicomp’s proxi-mate future, the messiness of our local laboratoryinfrastructures (the nests of cabling hidden in thedropped ceiling or behind the closet door, the jumble ofperl, Java, and python code that precariously conspire toproduce results in demos) is replaced by a clean,gleaming infrastructure seamlessly providing wellunderstood services. In practice, though, we see thatinfrastructures are continually visible and must be con-sciously attended to in the course of everyday encounterswith ubiquitous computing, from the vagaries of net-work access to the structure of service billing. The crit-ical property of this messy infrastructural regime in theeveryday world is that it is most emphatically not aproblem of living on the ‘‘bleeding edge,’’ as it often isfor research labs. Infrastructures remain messy afterdecades or centuries, as the user of any transit systemfrom urban subways to international airlines can attest.The lesson of the real world of ubiquitous computing,then, is that we will always be assembling heterogeneoustechnologies to achieve individual and collective effects.

Star [36, 37] has been a particularly prominentadvocate of the use of infrastructure as an analytic lensthrough which to consider the relationship betweenhuman action and technology. The crux of her approachis to look at infrastructure as a relational concept; aninfrastructure is an infrastructure only from the per-spective of specific peoples and technologies. To us ascasual users, the sewer system is an urban infrastructure,ubiquitously available and uniform in its operation; to asewer engineer, however, exposed to the daily practi-calities and pragmatics of waste water management andtreatment, the sewer is not an infrastructure but a site ofwork, and not uniform but highly localized and variable.

Star’s perspective is particularly instructive here,since, in adopting infrastructure as a site of enthno-graphic inquiry, she also dispels the myth of infra-structure as quiescent and stable. Infrastructures mustbe actively maintained, and relationships to them mustbe continually negotiated. Mainwaring et al. [38] providea valuable examination of these issues for ubicomp inexploring different attitudes towards infrastructure, andindeed looking at the relationship with infrastructure as,itself, a cultural production. So, for example, amongsttheir subjects, the rejection of infrastructure (be thatcommercial or technological) is itself a marker of certainforms of social life, and even a way in which inter-per-sonal relationships are managed (e.g. through a concernwith ‘‘authenticity’’ in everyday life and interaction.)McCullough [39] similarly explores the structure of

Page 8: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

everyday space as a confluence of infrastructuralarrangements that overlap to produce effects that reachbeyond each.

In other words, infrastructures are messy. The mess-iness that we experience in laboratory ubiquitous com-puting infrastructures is not a property of prototypetechnologies, of the bleeding edge, or of pragmaticcompromise; messiness is a property of infrastructureitself. Infrastructures are inherently messy; uneven intheir operation and their availability. The notion of aseamless and uniform infrastructure is, at best, a chi-mera, and at worst, to draw on aboriginal Australianmyth, a mulywonk—a fearsome creature that might beinvoked to steer people away from certain paths, places,or actions.

This messiness is important. Our suggestion thatubiquitous computing is already here, in the form ofdensely available computational and communicationresources, is sometimes met with an objection that thesetechnologies remain less than ubiquitous in the sensethat Weiser suggested. Mobile telephony, after all, offerswidespread coverage, but is neither truly ubiquitous nortruly seamless; incompatible standards, spotty regionalcoverage, etc., seem like obstacles that we must stillovercome before the ubiquitous computing vision can berealized. But postulating a seamless infrastructure is astrategy whereby the messy present can be ignored, al-though infrastructure is always unevenly distributed,always messy. An indefinitely postponed ubicomp futureis one that need never take account of this complexity.Consider some examples.

Verrips and Meyer [40] describe the complex net-works of support and practice necessary to maintaincars in Ghana. Most vehicles on the road here were notdesigned for sub-Saharan Africa, but rather are second-or third-hand vehicles imported from Europe and pres-sed into new life. Their discussions of the travails ofkeeping a car on the road are framed by the radicaldeparture from their European models of cars as com-modity items and elements in a network of technologicalstandardization. Initially surprised (indeed, appalled) bythe practices of customization, jury-rigging, and make-shift maintenance that are pervasive in Ghana, theygradually uncover an alternative infrastructure uniquelyadapted to local needs and to the problems of main-taining an engineering artifact outside of its naturalenvironment. The same vehicle, moved from Europe toAfrica, is embedded in a radically different infrastruc-ture and a radically different web of social values asso-ciated with mobility, reuse, exchange, commodification,craftsmanship, etc.

In their work on information infrastructures, Bowkerand Star [41] discuss the International Classification ofDiseases, a common infrastructure for the collection andcomparison of mortality statistics worldwide. Like otherboundary objects [42], though, the ICD is less a stableplatform upon which everyone can stand, and more ameans by which different interests, groups, concerns,and activities can be brought into temporary alignment.

What seems like a straightforward process—the cate-gorization of causes of death—is rife with complications,especially because of the uses to which the informationwill be put later. For example, consider the difficultiesfaced by AIDS researchers. AIDS deaths are, typically,the direct result of other infections that a patient suffersbecause of immune deficiency. However, before a cate-gory allowed physicians to record death by AIDS, thecondition was essentially ‘‘invisible’’ in the medical sta-tistics, making it extremely difficult to mobilize supportfor research funding. Similarly, the different purposes towhich the statistics, once gathered might be put—publichealth actions, regulation of industries, allocation ofresources, and more—result in a host of different pres-sures that shape the information infrastructure. Theuniform structure of the ICD hides the messiness ofpractice beneath—the way it coordinates multiple dif-ferent interests (e.g. the needs of medical practitioners,legislators and regulatory agencies, researchers andfunding agencies, pharmaceutical companies, etc), thedifferent ways it is put to work in different parts of theworld (reflecting not only different power relationshipsbut also different cultural interpretations of disease), thevariability in its coverage of diseases associated withdifferent regions (such as the under-representation oftropical diseases), etc.

Third, a significant infrastructure issue for ubiquitouscomputing endeavors is the problem of power—notMIPS-per-Watt, or even Foucauldian curbs on agency,but the electrical supply that keeps our electronic world(quite literally) humming. World travelers are alreadyfamiliar with the problems of varying voltage, frequencyand socket shapes, but these forms of variability mask amore complex reality where, for example, in many partsof the developing world, the dominant infrastructure forpower is based on car and truck batteries. It is notsimply that these are improvised replacements for the‘‘natural’’ arrangement of power distribution availablein the West and the developed world, but rather thatthey constitute an alternative, indigenously appropriateand thoroughly invisible infrastructure for power gen-eration, albeit one quite radically different from ourown. Ironically, current developments in what is knownas ‘‘distributed generation’’ in the developed world(incorporating solar cells, fuel cells, and micro-turbinegenerators into a complex infrastructure in which pro-duction and consumption are more evenly distributedthrough the grid) are moving Western power infra-structures in some ways in directions closer to those wemight see in the developing world.

Infrastructures, then, be they networks of carmechanics, medical categories, or power sources, arenever seamless in the ways in which they are put towork. They are sites of negotiation and contest, com-promise and coordination, approximation and partialagreement. They are unevenly distributed and unevenlyavailable. They are continually in flux, and brought intolocal stability only through active engagement andcoordination. Infrastructure itself is a relational prop-

Page 9: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

erty; it describes a relationship between technology,people, and practice. In this environment, then, thinkingof infrastructure as stable, as uniform, as seamless, andas universally available is clearly problematic. It is notmerely a dream of a world not yet realized; it is a dreamof a world that could never be realized.

7 Towards a ubicomp of the present

What this suggests, then, is an alternative domain ofubicomp research—a ubicomp not of the future but ofthe present. William Gibson famously quipped that‘‘The future is already here; it’s just not very evenlydistributed’’ [43]. We take each component of this aph-orism as a component of an alternative research agendafor ubicomp.

7.1 The future is already here

The future is already here. The technological trends thatWeiser insightfully extrapolated have, just as he antici-pated, resulted in radical transformations and reconfig-urations of the role of computation in everyday life.Weiser anticipated a world in which computation wouldbe embedded into our everyday worlds—not just phys-ically embedded but also socially and procedurallyembedded, becoming part and parcel of how we act inthe world. It has not, perhaps, taken the form that heanticipated, although PDAs, cell phones, large-scaledisplays and digital cameras do bear family resem-blances to the devices that Weiser imagined would cometo populate our world. However, the fact that the detailsare different should not blind us to the remarkableaccuracy of Weiser’s vision. Computation is embeddedinto the technology and practice of everyday life; wecontinually use computational devices without thinkingof them as computational in any way. The desktopcomputer has not been displaced, but augmented.

Interestingly, though, while the technological form ofubiquitous computing differs only in its details from themodel that Weiser had anticipated, it is perhaps the useof ubiquitous computing which would have surprisedhim. One notable aspect of Weiser’s article is that, as helays out a vision for a radically different form of com-putational experience, the settings into which those de-vices are to be deployed and the activities that they areused to support remain largely unexamined. Weiser’subiquitous computing technology is used in workplaces;it relies on large fixed infrastructure investments bycommercial entities; it is directed towards the needs ofcorporate efficiency. Weiser’s ubiquitous computing is atool for labor.

From the perspective of a ‘ubicomp of the present,’we can note that Weiser was entirely correct in one re-gard—that the purposes to which people would putcomputational devices are not radically new ones, butrather reflect existing social and cultural needs. How-

ever, again, this did not necessarily take the form thathad been anticipated. Computational technologies areembedded in social structures and cultural scripts ofmany sorts; ubicomp technologies prove also to be sitesof social engagement, generational conflict, domesticregulation, religious practice, state surveillance, civicprotest, romantic encounters, office politics, artisticexpression, and more.

What this suggests, then, is that we need a deeperunderstanding of how social and cultural practice iscarried out in and around emerging information tech-nologies. If ubiquitous computing is already here, thenwe need to pay considerably more attention to just whatit is being used to do and its effects. Interestingly, whileconsiderations of the social and cultural elements in u-bicomp’s agenda has traditionally been thought of interms of ‘social impacts,’ our focus here is more ontechnology as a site of social and cultural production;that is, as an aspect of how social and cultural work aredone, rather than as something which will inevitablytransform social practice. Indeed, it may be quite theother way around.

7.2 It’s just not very evenly distributed

The idea that the future is not very evenly distributedhas traditionally been taken to note differential access totechnologies, and in particular the concentration withinthe research laboratories of universities and corpora-tions of advanced technological infrastructures. Here,we read it in three ways: first, as noting the ways inwhich power relations are embedded in access to infra-structure; second, as pointing towards the quite differentpatterns of technology adoption and use in differentcultural settings; and third, as signally a primary concernwith how inherently messy and uneven infrastructuresare encountered and navigated.

First, drawing on analyses of ‘‘time–space compres-sion’’ such as that of Harvey [44], Doreen Massey [45]coined the term ‘‘power-geometries’’ to refer to the waysthat spatial arrangements (e.g. the locations of homesand their proximity both to amenities and to sources ofnoise and pollution) and patterns of access and mobility(e.g. in the competition for resources between differentforms of public and private transportation) reflectarrangements of power and control. These powergeometries also affect the relationships between spacesand the means by which those relations are broughtabout; for instance, reflecting on the area of Londonwhere she lives, Massey comments: ‘‘It is (or ought tobe) impossible even to begin thinking about KilburnHigh Road without bringing into play half the worldand a considerable amount of British imperialist his-tory’’ [45: 65]. Similarly, when we think about ubiqui-tous computing technologies and infrastructures, thepatterns by which they are introduced into existingspaces and the needs around which they are designedand for which they are harnessed, we are immediately

Page 10: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

presented with the need to acknowledge the ways inwhich technologies both exploit and reproduce a rangeof power concentrations and relationships.

Second, when we see ubiquitous computing as afeature of the present rather than of the future, then weare forced to contend with it as an inherently heteroge-neous phenomenon. Standardization and consistencycan be imagined in the future, but a technology of thepresent is one that operates in a thoroughly heteroge-neous environment. This applies at all levels. Consider,for example, the radically different forms of govern-mentality at work in a comparison between the US andSingaporian approaches to Internet information provi-sion (or even, for that matter, between US and Euro-pean approaches to mobile telephony regulation.) At thesame time, on a much smaller scale, the interplay ofstandards for telecommunications render an apparently‘‘invisible’’ infrastructure highly visible in terms of therange of concerns to which its users must be oriented. Atechnology of the present is inherently one that is de-ployed and operated in a fragmented world.

Third, and relatedly, focusing on ubicomp in thepresent as an inherently heterogeneous phenomenonsuggests that a significant aspect of ubicomp’s researchagenda should be the ways in which heterogeneity iscurrently manifested and managed. We have discussedubicomp as inherently messy; so how do people bothmanage and even exploit this messiness in currentinteraction? From an ethnographic perspective, thismight take the form of Star [36] ‘ethnography ofinfrastructure,’ using the multiple manifestations ofinfrastructure as an analytic lens as in, for example,Star and Ruhleder’s [46] exploration of the infra-structure of scientific collaboration. From a techno-logical perspective, it might take the form of theexplorations of ‘seamful design’ being explored byChalmers and colleagues [47], in which the variabilityof infrastructure and of access become a resource foractive engagement.

8 Conclusions

Ubicomp has been tremendously successful, on twocounts. First, it has been successful as a research en-deavor. In addition to being a topic in its own right, it isalso a central aspect of the research agenda of manyother areas of computer science research, from theory toembedded systems. On the second front, it has beensuccessful as a technological agenda, so that Weiser’smodel of a single person making use of tens or hundredsof embedded devices networked together—is a realityfor many people. However, we have posed the questionhere of the relationship between these two successes.

Certainly, the foundational elements of the ubicompvision—a future in which our encounters with the worldand with each other are smoothed by the application oftechnology, a world to be delivered to us by heroic

engineering—is remarkably persistent. There is a fun-damental technological determinism at work, and Tol-mie et al. [48] note the irony of, on the one hand,Weiser’s attempt to move beyond the idea of the ‘‘dra-matic computer’’ and, on the other, an inevitable re-search practice celebrating ingenious design. Weiser andother early ubicomp visionaries provided an imaginativevehicle for understanding the encounter between tech-nology and the social world, one in which technologywould play a liberating role. This is both an alluringvision and a common one [49]. However, while themajority of ubicomp’s research attention has tradition-ally been devoted to the proximate future—the futurejust around the corner—we have suggested instead that,some 15 years after Weiser originally formulated it,ubiquitous computing has indeed arrived. If the avail-ability of devices with wireless data communications andpowerful computational properties is anything to go by,then it is hard to deny that computation is alreadyubiquitous. This raises two interesting questions—first,why did we fail to notice it, and second, what should wedo as a consequence?

We have suggested that our failure to notice the ar-rival of ubiquitous computing is rooted (at least in part)in the idea of seamless interoperation and homogeneity.The ubicomp world was meant to be clean and orderly;it turns out instead to be a messy one. Rather than beinginvisible or unobtrusive, ubicomp devices are highlypresent, visible, and branded, but perhaps still unre-markable in the sense explored by Tolmie et al. Ubi-comp has turned out to be characterized byimprovisation and appropriation; by technologies lashedtogether and maintained in synch only through consid-erable efforts; by surprising appropriations of technol-ogy for purposes never imagined by their inventors andoften radically opposed to them; by widely differentsocial, cultural and legislative interpretations of thegoals of technology; by flex, slop, and play.

We do not take this to be a depressing conclusion.Instead, we take the fact that we already live in a worldof ubiquitous computing to be a rather wonderful thing.The challenge, now, is to understand it.

Acknowledgments This work was supported in part by the NationalScience Foundation under awards 0133749, 0205724, 0326105,0527729, and 0524033, and by a grant from Intel Corporation. Weare grateful to Matthew Chalmers and Beki Grinter for insightfulcomments on earlier drafts, and to the anonymous reviewers fortheir insightful remarks and criticisms.

References

1. Weiser M (1991) The computer for the 21st Century. Sci Am265(3):94–104

2. Rydell R (1993) World of fairs: the century-of-progress expo-sitions. University of Chicago Press, Chicago

3. Bukatman S (1991) There’s always Tomorrowland: Disney andthe hypercinematic experience. October 57:55–78

4. Penley C (1997) NASA/Trek: popular science and sex inAmerica. Verso, London

Page 11: bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vision

5. Beckman C, Consolvo S, LaMarca A (2004). Some assemblyrequired: supporting end-user sensor installation in domesticubiquitous computing environments. In: Proceedings of inter-national conference ubiquitous computing ubicomp (Notting-ham), pp 107–124

6. Borriello G, Brunette W, Hall M, Hartung C, Tangney C(2004) Remind about tagged objects using passive RFIDs. In:Proceedings of international conference on ubiquitous com-puting ubicomp (Nottingham), pp 36–53

7. Hull R, Clayton B, Melamed T (2004) Rapid authoring ofmediascapes. In: Proceedings of international conference onubiquitous computing ubicomp (Nottingham), pp 125–142

8. Kindberg T, Sellen A, Geelhoed E (2004) Security and trust inmoble interactions: a study of users’ perceptions and reasoning.In: Proceedings of international conference on ubiquitouscomputing ubicomp (Nottingham), pp 196–213

9. Truong K, Huang E, Abowd G (2004) CAMP: a magneticpoetry interface for end-user programming of capture appli-cations for the home. In: Proceedings of international confer-ence on ubiquitous computing ubicomp (Nottingham), pp 143–160

10. Latour B (1987) Science in action: how to follow scientistsand engineers through society. Harvard University Press,Cambridge

11. Weiser M, Gold R, Brown JS (1999) The origins of ubiquitouscomputing research at PARC in the Late 1980s. IBM Syst J38(4):693–696

12. Huff WG (1994) The economic growth of Singapore: trade anddevelopment in the 20th century. Cambridge University Press,Cambridge

13. Hui OJ, Kiong TC, Ser TE (eds) (1997) Understanding Sin-gapore society. Times Academic Press, Singapore

14. Koh G, Ooi GL (2000) State–society relations in Singapore.Oxford University Press, New York

15. Murray G, Perera A (1996) Singapore: the global city state.China Library

16. Rengier P (1987) City–state in South-East Asia. University ofHawaii Press, Singapore

17. Yew LK (2000) From third world to first: the Singapore story:1965–2000. Times Private Media, Singapore

18. National Computer Board (1992) A vision of an Intelligentisland: IT2000 Report. National Computer Board, Singapore

19. Choo CW (1997) IT2000: Singapore’s vision of an intelligentisland. In: Droege P (ed) Intelligent environments. North-Holland, Amsterdam

20. Ang PH, Zhou Q, Jiang Y (2003) Lessons in broadbandadoption from Singapore. J Interactive Advert 4(1):67–75

21. Bell, Genevieve (2005) The age of the thumb: a cultural readingof mobile technologies in Asia. In: Bertschi S (ed) The socialand cultural consequences of the mobile phone (in Press)

22. Chew PGL, Kramer-Dahl A (1999) Reading culture: textualpractices in Singapore. Times Academic Press, Singapore

23. Menon APG, Keong CK (1998) The making of Singapore’selectronic road pricing system. In: Proceedings of the interna-tional conference on transportation into the next millennium,Singapore, 9–11 September 1998. Centre for TransportationStudies, Nanyang Technological University

24. Menon APG (2000) ERP in Singapore—a perspective a year onTec, vol 41, issue 2

25. Ang PH, Nadarajan B (1995) Censorship and internet: a Sin-gapore perspective. http://www.inet.nttam.com

26. Censor Review Committee 2003 (CRC) (2003) Report ofCensorship Review Committee 2003. Ministry of Information,Communication and the Arts, Singapore

27. Heng G, Devan J (1992) State fatherhood: the politics ofnationalism, sexuality, and race in Singapore. In: Parker A,Russo M, Somer D, Yaeger P (eds) Nationalisms and sexuali-ties, Routledge, New York, pp 343–364

28. National Internet Advisory Committee (NIAC) (2004) Reportof the National Advisory Council 2003. Ministry of Informa-tion, Communications and the Arts, Singapore

29. NIDA (2004) Survey of the Computer and Internet Usage,Ministry for Information and Communication, National In-ternet Development Agency of Korea. http://www.isis.nida.or.kr/eng_report_down/upload/user_sum_200412_english.pdf

30. Lett DP (1998) In pursuit of status: the making of SouthKorea’s ‘new’ urban middle class. Harvard University Press,Cambridge

31. Nelson L (2000) Measured excess, status, gender, and consumernationalism in South Korea. Columbia University Press, NewYork

32. Ministry of Information and Communication (MIC) (2004) IT839 Strategy: the Road to $20,000 GDP/capita. Ministry ofInformation and Communication, Republic of Korea

33. Kim CS (1986) The culture of Korean Industry: an ethnogra-phy of Poongsan Corporation. University of Arizona Press,Arizona

34. Kim EM (1997) Big business, strong state: collusion and con-flict in South Korean development, 1960–1990. SUNY

35. Koo H (ed) (1993) State and society in Contemporary Korea.Cornell University Press, Ithaca

36. Star SL (1999) The ethnography of infrastructure. Am BehavSci 43(3):377–391

37. Star SL (2002) Infrastructure and ethnographic practices.Scand J Inf Syst 24(2):107–122

38. Mainwaring S, Chang M, Anderson K (2004) Infrastructureand its discontents. In: Proceedings of international conferenceon Ubiquitous Computing Ubicomp (Nottingham, England)

39. McCullough M (2004) On digital ground: architecture, perva-sive computing, and environmental knowing. MIT Press,Cambridge

40. Verrips J, Meyer B (2001) Kwaku’s car: the struggles and sto-ries of a Ghanian long-distance taxi-driver. In: Miller D (ed)Car cultures. Berg, Oxford, pp 153–184

41. Bowker G, Star SL (1999) Sorting things out: classification andits consequences. MIT Press, Cambridge

42. Star SL, Griesemer J (1989) Institutional ecology, ‘Transla-tions’ and boundary objects: amateurs and professionals inBerkeley’s Museum of vertebrate zoology, 1907–39. Soc StudSci 19(3):387–420

43. Gibson W (1999) Interview on NPR’s ‘‘Talk of the Nation,’’ 30November

44. Harvey D (1988) The condition of postmodernity. Blackwell,Oxford

45. Massey D (1993) Power-geometry and a progressive sense ofplace. In: Bird, Curtis, Putnam, Robertson and Tickner (eds)Mapping the Futures: Local Cultures, Global Change. Routl-edge, London

46. Star SL, Ruhleder K (1994) Steps towards an ecology ofinfrastructure: complex problems in design and access for large-scale collaborative systems. In: Proceedings of ACM confer-ence on computer-supported cooperative work CSCW’94(Chapel Hill, NC). ACM, New York, pp 253–264

47. Chalmers M, Galani A (2004) Seamful Interweaving: heteoge-neity in the theory and design of interactive systems. In: Pro-ceedings of ACM conference on designing interactive systemsDIS 2004. ACM, New York, pp 243–252

48. Tolmie P, Pycock J, Diggins T, MacLean A, Karsenty A (2001)Unremarkable Computing. In: Proceedings of ACM confer-ence on human factors in computing systems CHI 2001 (Min-neapolis, MN). ACM, New York, pp 399–406

49. Kling R (1994) Reading ‘‘All About’’ computerization: howgenre conventions shape non-fiction social analysis. Inf Soc10(3):147–172