This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Hacking, Mashing, Gluing: Understanding Opportunistic Design
July-September 2008 (vol. 7 no. 3)
pp. 46-54
Opportunistic practices can accelerate and simplify ubiquitous computing systems design. Such practices may include copying and pasting code from online forums into one's own scripts or reappropriating components from consumer electronics for design prototypes. The authors introduce a framework that links opportunistic design for ubiquitous computing to hardware and software practices. They interview 14 professional and hobbyist "mashers"-Web 2.0 programmers, hardware hackers, and designers of interactive ubiquitous computing systems-to learn how designers choose between integration levels. Finally, they discover the mashups' epistemic, pragmatic, and intrinsic values for creators and how shopping becomes a central activity.

1. E. von Hippel, Democratizing Innovation, MIT Press, 2005.
2. A. Cypher, Watch What I Do: Programming by Demonstration, MIT Press, 1993.
3. H. Lieberman, F. Paterno, and V. Wulf, End-User Development, Springer, 2005.
4. J. Brandt et al., "Opportunistic Programming: How Rapid Ideation and Prototyping Occur in Practice," Workshop End-User Software Eng., ACM Press, 2008, pp. 1–5.
5. E.A. Brewer, "Lessons from Giant-Scale Services," IEEE Internet Computing, vol. 5, no. 4, 2001, pp. 46–55.
6. M. Weiser and J.S. Brown, "The Coming Age of Calm Technology," Beyond Calculation: The Next 50 Years of Computing, P.J. Denning and R.M. Metcalfe, eds., Copernicus Books, 1997, pp. 75–86.
7. J.K. Ousterhout, "Scripting: Higher Level Programming for the 21st Century," Computer, Mar. 1998, pp. 23–30.
8. B.A. Nardi, A Small Matter of Programming: Perspectives on End User Computing, MIT Press, 1993.
9. J. Mankoff, G.D. Abowd, and S.E. Hudson, "OOPS: A Toolkit Supporting Mediation Techniques for Resolving Ambiguity in Recognition-Based Interfaces," Computers and Graphics, vol. 24, no. 6, 2000, pp. 819–834.
10. R. Eglash, "Appropriating Technology: An Introduction," Appropriating Technology: Vernacular Science and Social Power, R. Eglash et al., eds., Univ. of Minnesota Press, 2004, pp. vii–xxi.
11. D. Kirsh and P. Maglio, "On Distinguishing Epistemic from Pragmatic Action," Cognitive Science, vol. 18, 1994, pp. 513–549.
12. S.R. Klemmer, B. Hartmann, and L. Takayama, "How Bodies Matter: Five Themes for Interaction Design," Proc. 6th Conf. Designing Interactive Systems, ACM Press, 2006, pp. 140–149.
13. D.A. Schön and J. Bennett, "Reflective Conversation with Materials," Bringing Design to Software, T. Winograd, ed., ACM Press, 1996.
14. F.P. Brooks, The Mythical Man-Month: Essays on Software Engineering, Addison-Wesley, 1995.

Index Terms:
Computer crime,Mashups,Ubiquitous computing,Hardware,Acceleration,Consumer electronics,Software prototyping,Prototypes,Programming profession,Computer hacking,mashups,opportunistic design,hardware hacking,ubiquitous computing
Citation:
"Hacking, Mashing, Gluing: Understanding Opportunistic Design," IEEE Pervasive Computing, vol. 7, no. 3, pp. 46-54, July-Sept. 2008, doi:10.1109/MPRV.2008.54
Usage of this product signifies your acceptance of the Terms of Use.