Master Thesis

Master Thesis
Photo by Porter Raab / Unsplash

Management and Deployment of Ubiquitous Computing Environment

Summary

Author: Riad Lemhachheche
Degree: Master of Science in Industrial Engineering, Oregon State University, June 7, 2006

This research addresses the challenge of designing, deploying, and maintaining ubiquitous computing (Ubicomp) environments, where computing devices and services are seamlessly integrated into everyday life. It emphasizes that successful Ubicomp design requires a multidisciplinary framework that goes beyond technology, incorporating social, legal, and economic perspectives to enhance user experience.

The thesis develops a comprehensive framework synthesizing key design requirements—context awareness, privacy, and adaptation—drawn from literature and real-world projects. This framework is applied to a wireless local area network (WLAN) as a case study, and validated through an online survey of Wi-Fi users. The survey revealed issues such as confusion between privacy and security, insufficient user information, and unclear legal implications of open Wi-Fi access.

Key contributions:

  • A structured design framework for Ubicomp systems, integrating user experience, legal, economic, and social factors.
  • Empirical evidence from a Wi-Fi case study and user survey supporting the framework.
  • Identification of critical issues—such as privacy controls, user information, and policy management—that must be addressed for successful Ubicomp deployment.

The thesis concludes by highlighting the importance of multidisciplinary collaboration and suggests future work should apply the framework to other environments and implement the proposed design concepts for further validation.


Extracted Examples

  • Needs-Satisfaction Curve:
    “Computing has reached a stage of maturity in terms of technology and therefore research should shift to improving the user experience associated to computing activities. This shift implies a complete reconsideration of the relationship between users and computing resources.” (p.5)
  • Forces Affecting a Computing System:
    “All of the forces depicted in Figure 2 have an important impact on how the field of Ubicomp will develop and how an Ubicomp system will be designed.” (p.6)
  • Major Projects Table:
    Table 1 lists pioneering projects such as PARCTab, Active Badge, Classroom 2000, AURA, Cooltown, Oxygen, and Labscape, each with distinctive goals and technological approaches.
    “Despite the fact that each of the projects shown in Table 1 has different goals and follows specific procedures to reach these goals, they all emphasize the user experience.” (p.9)
  • Privacy in Early Ubicomp Projects:
    “One of the factors that became critical in both of these projects was the privacy concern associated with the availability of real-time localization. ... Centralized architectures require users to trust the operators of the service, both to properly use location data and to sufficiently protect it.” (p.11)
  • Context-Awareness and User Control:
    “The balance between the intelligence of the environment and user involvement cannot be set globally. Mechanisms to link context acquisition and context use should also be designed since there is a need to agree on representations of context.” (p.17)
  • Face Properties in Privacy Interfaces:
    The thesis references a UC Berkeley project that lets users define "faces" for privacy:
    “The interface for the Everyday Privacy in Ubiquitous Computing project at the University of California Berkeley introduced the concept of face that summarizes these types of disclosure.” (p.25)
  • Folksonomy and User-Generated Metadata:
    “One of the most famous examples of folksonomy is the online application del.icio.us where the metadata is called tags. ... The webpage is linked based on its URL, which is augmented with information such as keywords (tags), notes and descriptions that are personalized for this user.” (p.37)
  • Wi-Fi Case Study and Survey:
    “The survey was taken by 536 people and the distribution of respondents based on self-reported Wi-Fi expertise is shown in Figure 24. A majority of respondents considered themselves as experts (55.1%) or familiar (33.3%) with the Wi-Fi technology.” (p.87)
  • Connect Commons License:
    “ Connect Commons license could be provided by the producers of the connectivity to inform the consumers of the rights and privileges available through a particular connection. ... A license, both machine- and user-readable, could facilitate the access to this kind of information.” (p.79)
  • Information Provided by Wi-Fi Infrastructure:
    “Our design incorporates three major components: a network facts module, a network stats module and a connect commons license.” (p.58)

Full Bibliography (119 Entries)

Each entry is listed with a publication link at the end.

  1. New Hampshire HB0495. An act relative to unauthorized access to a wireless computer network. State of New Hampshire, 2004. Full Text
  2. Abowd, G.D. and Mynatt, E.D. Charting past, present, and future research in ubiquitous computing. ACM Trans. Comput.-Hum. Interact., 7(1), 29-58. ACM Digital Library
  3. Abowd, G.D., Mynatt, E.D. and Rodden, T. The human experience of ubiquitous computing. Pervasive Computing, IEEE, 1(1), 48-57. IEEE Xplore
  4. Ackerman, M., Darrell, T. and Weitzner, D.J. Privacy in Context. Human-Computer Interaction, 16(2, 3, 4), 167-176. Taylor & Francis
  5. Arabasz, P., and Pirani, J. Wireless networking at Carnegie Mellon University, ECAR, EDUCAUSE, 2002. EDUCAUSE
  6. Arbaugh, W.A. Wireless Security Is Different. Computer, 36(8), 99-101. IEEE Xplore
  7. Arnstein, L., Grimm, R., Hung, C.-Y., Kang, J.H., LaMarca, A., Look, G., Sigurdsson, S.B., Su, J. and Borriello, G. Systems Support for Ubiquitous Computing: A Case Study of Two Implementations of Labscape. In Proceedings of the First International Conference on Pervasive Computing, Springer-Verlag, 2002, 30-44. Springer
  8. Arnstein, L., Hung, C.-Y., Franza, R., Zhou, Q.H., Borriello, G., Consolvo, S. and Su, J. Labscape: a smart environment for the cell biology laboratory. Pervasive Computing, IEEE, 1(3, 13-21). IEEE Xplore
  9. Barkhuus, L. and Dey, A. Is Context-Aware Computing Taking Control away from the User? Three Levels of Interactivity Examined, 2003. Springer
  10. Barkhuus, L. and Dourish, P. Everyday Encounters with Context-Aware Computing in a Campus Environment. In Proceedings of the Sixth International Conference on Ubiquitous Computing (Ubicomp 2004), Nottingham, United Kingdom, 2004, 232-249. Springer
  11. Battiti, R., Cigno, R.L., Sabel, M., Orava, F. and Pehrson, B. Wireless LANs: From WarChalking to Open Access Networks. Mobile Networks and Applications, 10(3), 275-287. Springer
  12. Bausch, P. We blog: publishing online with weblogs. Wiley Pub., Indianapolis, IN, 2002. Amazon
  13. Beckwith, R. Designing for Ubiquity: The Perception of Privacy. IEEE Pervasive Computing, 2(2), 40-46. IEEE Xplore
  14. Bell, G., Blythe, M., Gaver, B., Sengers, P. and Wright, P. Designing culturally situated technologies for the home. In CHI 03 extended abstracts on Human factors in computing systems, ACM Press, Ft. Lauderdale, Florida, USA, 2003, 1062-1063. ACM Digital Library
  15. Bellotti, V. and Sellen, A. Design for Privacy in Ubiquitous Computing Environments. In Proceedings of the Third European Conference on Computer Supported Cooperative Work (ECSCW93), 1993, 77-92. Kluwer. Springer
  16. Bellotti, V. and Smith, I. Informing the design of an information management system with iterative fieldwork. In DIS 00 Proceedings of the conference on Designing interactive systems, 2000, 227-237. ACM Press. ACM Digital Library
  17. Bernard, J.B. and Charles, R.B. Wireless Andrew: building a high speed, campus-wide wireless data network. Mob. Netw. Appl., 6(1), 9-22. Springer
  18. Berners-Lee, T., Cailliau, R., Luotonen, A., Nielsen, H.F. and Secret, A. The World-Wide Web. Commun. ACM, 37(8), 76-82. ACM Digital Library
  19. Bible, J.D. and McWhirter, D.A. Privacy in the workplace: a guide for human resource managers. Quorum Books, New York, 1990. Amazon
  20. Bill, N.S., Anthony, L., Gaetano, B., William, G.G., David, M., Edward, L., Anand, B., Jason, H. and Vaughn, I. Challenge: ubiquitous location-aware computing and the place lab initiative. Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots, ACM Press, San Diego, CA, USA, 2003. ACM Digital Library
  21. Billsus, D., Brunk, C.A., Evans, C., Gladish, B. and Pazzani, M. Adaptive interfaces for ubiquitous web access. Commun. ACM, 45(5), 34-38. ACM Digital Library
  22. Borriello, G. Key challenges in communication for ubiquitous computing. Communications Magazine, IEEE, 40(5), 16-18. IEEE Xplore
  23. Brown, B., Green, N. and Harper, R. Wireless world: social and interactional aspects of the mobile age. Springer, London New York, 2002. Amazon
  24. Cairncross, F. The Death of Distance: How the Communications Revolution Will Change Our Lives. Harvard Business School Press, 1997. Amazon
  25. Carlos, J., Colin, P. and Christian, J. Privacy practices of Internet users: self-reports versus observed behavior. Int. J. Hum.-Comput. Stud. 63(1-2), 203-227. ScienceDirect
  26. Carr, N.G. Does IT matter? information technology and the corrosion of competitive advantage. Harvard Business School Press, Boston, 2004. Amazon
  27. Christensen, C.M. The innovator's dilemma: when new technologies cause great firms to fail. Harvard Business School Press, Boston, Mass., 1997. Amazon
  28. Congress, U.S. Computer Fraud and Abuse Act, 1986. LII
  29. Cranor, L.F. and Brian, A.L. Spam! Commun. ACM, 41(8), 74-83. ACM Digital Library
  30. Cummings, J. and Kraut, R. Domesticating computers and the Internet. Information Society, 18(3), 221-232. Taylor & Francis
  31. Dahlbäck, N., Jönsson, A. and Ahrenberg, L. Wizard of Oz studies: why and how. In Proceedings of the 1st international conference on Intelligent user interfaces, ACM Press, Orlando, Florida, United States, 1993, 193-200. ACM Digital Library
  32. Dahlen, B.J., Konstan, J.A., Herlocker, J.L, Good, N., Borchers, A., and Riedl, J. Jump-starting movielens: User benefits of starting a collaborative filtering system with dead data, University of Minnesota, 1998. UMN
  33. Davies, N. and Gellersen, H.-W. Beyond prototypes: challenges in deploying ubiquitous systems. Pervasive Computing, IEEE, 1(1), 26-35. IEEE Xplore
  34. Davis, M., Simon, K., Nathan, G. and Risto, S. From context to content: leveraging context to infer media metadata. Proceedings of the 12th annual ACM international conference on Multimedia, ACM Press, New York, NY, USA, 2004, 188-195. ACM Digital Library
  35. Dey, A.K. Evaluation of Ubiquitous Computing Systems: Evaluating the Predictability of Systems. In Proceedings of Evaluation Methods for Ubiquitous Computing Workshop, 2001, Springer-Verlag. Springer
  36. Dey, A.K. Understanding and Using Context. Personal Ubiquitous Comput., 5(1), 4-7. Springer
  37. Dourish, P. Where the action is: the foundations of embodied interaction. MIT Press, Cambridge, Mass., 2001. Amazon
  38. Dourish, P. and Edwards, W.K. A Tale of Two Toolkits: Relating Infrastructure and Use in Flexible CSCW Toolkits. Comput. Supported Coop. Work, 9(1), 33-51. Springer
  39. ECPA. ELECTRONIC COMMUNICATIONS PRIVACY ACT (ECPA), 1986. Justice.gov
  40. Edwards, W. Policies and roles in collaborative applications. In CSCW 96 Proceedings of the 1996 ACM conference on Computer supported cooperative work, 1996, 11-20. ACM Press. ACM Digital Library
  41. Edwards, W.K., Bellotti, V., Dey, A.K. and Newman, M.W. The challenges of user-centered design and evaluation for infrastructure. In Proceedings of the SIGCHI conference on Human factors in computing systems, ACM Press, Ft. Lauderdale, Florida, USA, 2003, 297-304. ACM Digital Library
  42. Edwards, W.K., Newman, M.W., Sedivy, J. and Izadi, S. Challenge: recombinant computing and the speakeasy approach. In Proceedings of the 8th annual international conference on Mobile computing and networking, ACM Press, Atlanta, Georgia, USA, 2002, 279-286. ACM Digital Library
  43. FCC. Over-the-Air Reception Devices Rule, Federal Communications Commission, 2005. FCC
  44. FCC. Title 47 PART 15 RADIO FREQUENCY DEVICES, Federal Communications Commission, 2004. FCC
  45. Finkin, M. Privacy in Employment Law. BNA Books, 1995. Amazon
  46. Fischer, K. Agent-based design of holonic manufacturing systems. Journal of Robotics and Autonomous Systems. ScienceDirect
  47. Francisco, C.o.S. San Francisco TechConnect, 2005. SF Gov
  48. Franklin, M. and Stan, Z. Data in your face: push technology in perspective. SIGMOD Rec., 27(2), 516-519. ACM Digital Library
  49. Goffman, E. The presentation of self in everyday life. University of Edinburgh, Social Sciences Research Centre, Edinburgh, 1956. Amazon
  50. Goldstine, H. The Computer from Pascal to von Neumann. Princeton United Press, 1972. Amazon
  51. Grudin, J. The computer reaches out: the historical continuity of interface design. In Proceedings of the SIGCHI conference on Human factors in computing systems Empowering people, ACM Press, Seattle, Washington, United States, 1990. ACM Digital Library
  52. Gupta, P. and Moitra, D. Evolving a pervasive IT infrastructure: a technology integration approach. Personal Ubiquitous Comput., 8(1), 31-41. Springer
  53. Haartsen, J.C. The Bluetooth radio system. Personal Communications, IEEE, 7(1), 28-36. IEEE Xplore
  54. Herlocker, J.L., Konstan, J.A. and Riedl, J. Explaining collaborative filtering recommendations. In Proceedings of the 2000 ACM conference on Computer supported cooperative work, ACM Press, Philadelphia, Pennsylvania, United States, 2000. ACM Digital Library
  55. Hong, J.I., Borriello, G., Landay, J.A., McDonald, D.W., Schilit, B.N., and Tygar, J.D. Privacy and Security in the Location-enhanced World Wide Web. In Fifth International Conference on Ubiquitous Computing (Ubicomp 2003), Seattle, WA, 2003, Springer. Springer
  56. ITU. The Internet of Things. ITU Internet Reports, International Telecommunication Union, 2005. ITU
  57. IWS. WORLD INTERNET USAGE AND POPULATION STATISTICS, International World Stats, 2005. Internet World Stats
  58. Jiajun, Z. and Lie, L. Perceptual Visualization of a Music Collection. In IEEE International Conference on Multimedia and Expo, 2005. ICME 2005, 1058-1061. IEEE Xplore
  59. JiWire. JiWire Wi-Fi Service, 2006. JiWire
  60. Kindberg, T., Barton, J., Morgan, J., Becker, G., Caswell, D., Debaty, P., Gopal, G., Frid, M., Krishnan, V., Morris, H., Schettino, J., Serra, B. and Spasojevic, M. People, Places, Things: Web Presence for the Real World. Mobile Networks and Applications, 7(5), 365-376. Springer
  61. Kindberg, T. and Fox, A. System software for ubiquitous computing. Pervasive Computing, IEEE, 1(1), 70-81. IEEE Xplore
  62. Kleinrock, L. Nomadic computing—an opportunity. SIGCOMM Comput. Commun. Rev., 25(1), 36-40. ACM Digital Library
  63. Kling, R. Computerization and controversy: value conflicts and social choices. Academic Press, San Diego, 1996. Amazon
  64. Kobsa, A. Tailoring Privacy to Users' Needs. In Proceedings of the 8th International Conference on User Modeling, 2001, Springer-Verlag, 303-313. Springer
  65. Lederer, S. Designing Disclosure: Interactive Personal privacy at the Dawn of ubiquitous computing. Computer Science Division, University of California, Berkeley, 2003. Berkeley
  66. Lederer, S., Mankoff, J. and Dey, A.K. Who wants to know what when? privacy preference determinants in ubiquitous computing. In CHI 03 extended abstracts on Human factors in computing systems, ACM Press, Ft. Lauderdale, Florida, USA, 2003, 724-725. ACM Digital Library
  67. Lee, Y. The CAN-SPAM Act: a silver bullet solution? Commun. ACM, 48(6), 131-132. ACM Digital Library
  68. Lemhachheche, R., Porter, J.D. and Puthpongsiriporn, T. Methodology for the Deployment of Effective Campus Wireless Environment Infrastructures. In 14th Industrial Engineering Research Conference, Atlanta, Georgia, 2005. OSU
  69. Lessig, L. Code and other laws of cyberspace. Basic Books, New York, 1999. Amazon
  70. Manber, U., Patel, A. and Robison, J. Experience with personalization of Yahoo! Commun. ACM, 43(8), 35-39. ACM Digital Library
  71. Mantei, M.M. and Teorey, T.J. Cost-benefit analysis for incorporating human factors in the software lifecycle. Commun. ACM, 31(4), 428-439. ACM Digital Library
  72. McDaniel, T. Magneto-optical data storage. Commun. ACM, 43(11), 56-63. ACM Digital Library
  73. Mick, D.G. and Fournier, S. Paradoxes of Technology: Consumer Cognizance, Emotions and Coping Strategies. Journal of Consumer Research, 25(2), 123-143. JSTOR
  74. Microsoft. To set up automatic wireless network configuration, 2005. Microsoft Support
  75. MIT. Project Oxygen, Pervasive, Human-centered Computing, 2000. MIT Oxygen
  76. Molnar, D. and Wagner, D. Privacy and security in library RFID: issues, practices, and architectures. In CCS 04 Proceedings of the 11th ACM conference on Computer and communications security, 2004, 210-219. ACM Digital Library
  77. Moore, G.E. Cramming more components onto integrated circuits. Electronics, 38(8), 56-59. IEEE Xplore
  78. Newman, M.W., Izadi, S., Edwards, W.K., Sedivy, J.Z. and Smith, T.F. User interfaces when and where they are needed: an infrastructure for recombinant computing. In Proceedings of the 15th annual ACM symposium on User interface software and technology, ACM Press, Paris, France, 2002, 171-180. ACM Digital Library
  79. Nielsen, J. Heuristic evaluation. In Usability inspection methods, John Wiley & Sons, Inc., 1994, 25-62. NNG
  80. Norman, D.A. Design principles for human-computer interfaces. Proceedings of the SIGCHI conference on Human Factors in Computing Systems, ACM Press, Boston, Massachusetts, United States, 1983. ACM Digital Library
  81. Norman, D.A. The invisible computer. MIT Press, 1998. Amazon
  82. Norman, D.A. and Draper, S.W. User centered system design: new perspectives on human-computer interaction. L. Erlbaum Associates, Hillsdale, N.J., 1986. Amazon
  83. OHara, B. and Petrick, A. The IEEE 802.11 Handbook: A Designers Companion. Standards Information Network IEEE Press, 1999. Amazon
  84. Osborne, A. An introduction to microcomputers. McGraw-Hill, 1976. Amazon
  85. Palen, L. and Marilyn, S. Welcome to the wireless world: problems using and understanding mobile telephony. In Wireless world: social and interactional aspects of the mobile age, Springer-Verlag New York, Inc., 2002, 135-153. Springer
  86. Pankoke-Babatz, U., Klockner, K. and Jeffrey, P. Norms and conventions in collaborative systems. Proceedings of the HCI International 99: the 8th International Conference on Human-Computer Interaction, Lawrence Erlbaum Associates, Inc., 1999. ACM Digital Library
  87. Philadelphia, C.o. Wireless Philadelphia, 2005. Phila.gov
  88. Plazes. Plazes Wi-Fi Location service. Plazes
  89. Rao, B. and Parikh, M.A. Wireless broadband drivers and their social implications. Technology in Society, 25(5), 477-489. ScienceDirect
  90. Rivero, J., Porter, J.D., Puthpongsiriporn, T., Layton, W.M. and Lemhachheche, R. Campus Wireless Environment Deployment Guide, Intel Corporation - Oregon State University, 2005. OSU
  91. Rogers, E.M. Diffusion of innovations. Free Press, New York, 2003. Amazon
  92. Russ, H. and William, A. Security problems in 802.11-based networks. Commun. ACM, 46(5), 31-34. ACM Digital Library
  93. Salber, D., Dey, A.K. and Abowd, G.D. The context toolkit: aiding the development of context-enabled applications. In Proceedings of the SIGCHI conference on Human factors in computing systems, ACM Press, Pittsburgh, Pennsylvania, United States, 1999, 434-441. ACM Digital Library
  94. Satyanarayanan, M. Pervasive computing: vision and challenges. Personal Communications, IEEE, 8(4), 10-17. IEEE Xplore
  95. Schachter, J. Del.icio.us, 2003. Del.icio.us
  96. Schilit, B., Adams, N. and Want, R. Context-aware computing applications. In Mobile Computing Systems and Applications, 1994. Proceedings., Workshop on, 1994, 85-90. IEEE Xplore
  97. Schmidt, A. Ubiquitous Computing: Computing in Context., PhD thesis - Lancaster University, 2002. Lancaster
  98. Schmidt, A., Beigl, M. and Gellersen, H. There is more to context than location. Computers and Graphics, 23(6), 893-901. ScienceDirect
  99. Scholtz, J. and Consolvo, S. Towards a Discipline for Evaluating Ubiquitous Computing Applications, Intel Research, Seattle, Washington, 2004. Intel
  100. Semacode. Semacode, 2002. Semacode
  101. Sevtsuk, A., Ratti, C. iSpot: describing the use of space on the MIT campus through the analysis of WiFi networks. In CUPUM 05 The Ninth International Conference on Computers in Urban Planning and Urban Management, London, 2005. MIT
  102. Sharples, M., Corlett, D. and Westmancott, O. The Design and Implementation of a Mobile Learning Resource. Personal and Ubiquitous Computing, 6(3), 220-234. Springer
  103. Shneiderman, B. Designing the user interface: strategies for effective human--computer interaction. Addison-Wesley, Reading, Mass., 1992. Amazon
  104. Smart, L. Making Sense of RFID. Library Journal, 129, Fall 2004, 4-11. Library Journal
  105. Smetters, D.K. and Grinter, R.E. Moving from the design of usable security technologies to the design of useful secure applications. In Workshop on New security paradigms, Virginia Beach, Virginia, 2002, ACM Press, 82-89. ACM Digital Library
  106. Tatarinov, I., Ives, Z.G., Halevy, A.Y. and Weld, D.S. Updating XML. In Proceedings of the 2001 ACM SIGMOD international conference on Management of data, ACM Press, Santa Barbara, California, United States, 2001. ACM Digital Library
  107. Toyama, K., Ron, L. and Asta, R. Geographic location tags on digital images. Proceedings of the eleventh ACM international conference on Multimedia, ACM Press, Berkeley, CA, USA, 2003. ACM Digital Library
  108. Union, E. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, 1995. EUR-Lex
  109. Vanderwal. Folksonomy, 2005. Vanderwal
  110. Want, R., Hopper, A., Falco, V. and Gibbons, J. The active badge location system. ACM Trans. Inf. Syst., 10(1), 91-102. ACM Digital Library
  111. Weiser, M. The computer for the 21st century. Scientific American, 265(3), 94-104. Scientific American
  112. Weiser, M. The major trends in computing, 1996. PARC
  113. Weiser, M. Some computer science issues in ubiquitous computing. SIGMOBILE Mob. Comput. Commun. Rev., 3(3), 12. ACM Digital Library
  114. Westin, A.F. Privacy and freedom. Atheneum, New York, 1967. Amazon
  115. Wheatley, M. ERP Training Stinks. CIO Magazine, 2000. CIO
  116. Wikipedia. Network Neutrality. Wikipedia
  117. Winer, D. RSS 2.0 Specification. http://blogs.law.harvard.edu/tech/rss, Harvard Law School, 2003. RSS Board
  118. Wixon, D., Holtzblatt, K. and Knox, S. Contextual design: an emergent view of system design. In Proceedings of the SIGCHI conference on Human factors in computing systems Empowering people, ACM Press, Seattle, Washington, United States, 1990. ACM Digital Library
  119. Yin, R.K. Case study research: design and methods. Sage Publications, Thousand Oaks, Calif., 2003. Amazon
Lego RCX for Computer Science Teaching
Teaching Assistant Experience: EECS Department, Oregon State University (2022) During 2022, Riad Lemhachheche served as a teaching assistant in the School of Electrical Engineering and Computer Science (EECS) at Oregon State University. His primary responsibility was to support laboratory courses that leveraged the Lego RCX robotics platform to teach foundational

Prior Research at Oregon State University by Riad Lemhachheche