Professional Documents
Culture Documents
2016. ’Designing for exploratory play with a hackable digital musical instrument’. In: Proceedings
of the 2016 ACM Conference on Designing Interactive Systems. Brisbane, Australia 4-8 June
2016. [Conference or Workshop Item]
https://research.gold.ac.uk/id/eprint/26409/
The version presented here may differ from the published, performed or presented work. Please
go to the persistent GRO record above for more information.
If you believe that any material held in the repository infringes copyright law, please contact
the Repository Team at Goldsmiths, University of London via the following email address:
gro@gold.ac.uk.
The item will be removed from the repository while any claim is being investigated. For
more information, please contact the GRO team: gro@gold.ac.uk
Designing for Exploratory Play with a Hackable Digital
Musical Instrument
Andrew P. McPherson Alan Chamberlain Adrian Hazzard
Centre for Digital Music Mixed Reality Laboratory Mixed Reality Laboratory
Queen Mary University of The University of Nottingham The University of Nottingham
London Nottingham, UK Nottingham, UK
London, UK alan.chamberlain@ adrian.hazzard@nottingham.ac.uk
a.mcpherson@qmul.ac.uk nottingham.ac.uk
ABSTRACT digital art [29, 43, 42, 41] present different opportunities and
This paper explores the design of digital musical instruments challenges, particularly as technology use in these domains is
(DMIs) for exploratory play. Based on Gaver’s principles of often less goal-directed, more open-ended and more personal.
ludic design, we examine the ways in which people come to
Ludic design is a term coined by Gaver [21] to describe play-
terms with an unfamiliar musical interface. We describe two
ful interactions with technology where the intrinsic experi-
workshops with the D-Box, a DMI designed to be modified
ence of using a system is privileged over traditional metrics of
and hacked by the user. The operation of the D-Box is de-
utility. Ludic design seeks to be “richly suggestive ... without
liberately left ambiguous to encourage users to develop their
implying preferred interpretations”. It seeks to promote cu-
own meanings and interaction techniques. During the work-
riosity and exploration [24], values ambiguity and openness
shops we observed emergent patterns of exploration which re-
to interpretation [23], and provides the capacity for appropri-
vealed a rich process of exploratory play. We discuss our ob-
ation by the user [28, 13].
servations in relation to previous literature on appropriation,
ambiguity and ludic engagement, and we provide recommen- This paper explores ludic design and evaluation principles in
dations for the design of playful and exploratory interfaces. the context of digital musical instruments (DMIs). It presents
two workshops using the D-Box [63], a new DMI which is
Author Keywords designed to be appropriated, modified and hacked by the per-
Ludic design; ambiguity; musical instruments; exploration; former. The function and meaning of the D-Box is deliber-
play; hacking. ately left open to interpretation to encourage the user to de-
velop personal uses for the instrument that the designer may
ACM Classification Keywords not have anticipated.
H.5.2 User Interfaces: Evaluation/methodology; H.5.5 Sound
and Music Computing: Methodologies and techniques, Sys- After a survey of the background and context, we introduce
tems the design principles of the D-Box in relation to appropriation
and playful interaction. We then describe the format of the
INTRODUCTION workshops, which examined how users come to terms with
Traditional HCI principles developed for workplace tools, in- an unfamiliar instrument through exploratory play. Workshop
cluding metrics of accuracy, efficiency and clarity, do not cap- outcomes included: a distinctive pattern of exploration which
ture the whole spectrum of human interaction with technol- differed from what previous literature has observed in soft-
ogy. Domains such as the home [11, 23, 30] and interactive ware tools and interactive art; the presence of creative tension
around whether participants felt in control of the hacking pro-
Paste the appropriate copyright statement here. ACM now supports three different
cess; and the emergence in several participants of a sense of
copyright statements: personal attachment to their hacks. We discuss the implica-
• ACM copyright: ACM holds the copyright on the work. This is the historical ap- tions of these findings for playful and exploratory design.
proach.
• License: The author(s) retain copyright, but ACM receives an exclusive publication
license.
• Open Access: The author(s) wish to pay for the work to be open access. The addi-
tional fee must be paid to ACM.
This text field is large enough to hold the appropriate release statement assuming it is
single spaced.
Every submission will be assigned their own unique DOI string to be included here.
BACKGROUND appropriations of music technology [64]. Dahlstedt et al. [12]
Work and Play in Musical Instrument Use suggest the value of simple tools with open-ended musical in-
Digital musical instruments would seem to be a natural vehi- terpretations in group improvisation.
cle for studying playful interaction within HCI. Most musi- Roedl et al. [50] examine the recent shift in HCI discourse
cians do not aspire to become professionals, and many do not from “user” to “maker”, arguing that a certain resourcefulness
perform in public at all. Rather, the experience of playing an characterises the maker identity: “makers are not satisfied us-
instrument can be its own reward. Jordà [31] highlights the ing products exactly as they are designed. Rather, makers are
evolving nature of the performer-instrument relationship and motivated by a desire to adapt, customize, and improve on
the central importance reaching of the “rewarding point” in technology in order to better suit their particular goals and
the learning process. DMI design for non-specialist users is a tastes.” Tanenbaum et al. identify playfulness as a charac-
significant research area, especially in collaborative or public teristic of maker culture, while still being aligned with utility
settings, e.g. [5, 55, 4]. [56]. Hackspaces and similar community hubs have been an
Nonetheless, perhaps surprisingly, the exchange of ideas be- important source of innovative new hardware products [35].
tween DMI design and HCI has more often followed a differ- These trends collectively suggest that appropriation, modifi-
ent path, applying task-based HCI metrics to DMI evaluation cation and completion of ambiguous or unfinished designs,
[59, 33] or evaluating aspects of control and learning curve and design of new systems may represent points along the
[31]. It is widely accepted that control accuracy alone is not same spectrum of creative activity.
a sufficient metric, leading to investigations of DMI “expres- Circuit Bending
siveness” [49, 14, 32]. Circuit bending [26, 9, 10] is both the direct inspiration for the
Implicit in these evaluations is the notion that the DMI is, if D-Box and an interesting example of the space between ap-
not a strictly professional tool, then at least a goal-oriented propriation and design. Through exploratory rewiring, circuit
one, whose goal is performance (whether public or private). benders transform toys, mass-market music equipment and
The degree to which the musician can successfully perform other consumer electronics into new audio or visual media
(or express themselves) becomes the metric of an instru- pieces. The intended outcome may not be known in advance,
ment’s success. This is undeniably important, especially in and both systematic and playful experiments may contribute
connecting to existing expert communities [38], but it is only to the result. Similar processes can be applied to physical
part of the picture. It is also not to say that DMIs have only objects as exemplified by Bowers’ infra-instruments [7].
one interpretation. There is recognition of competing stake-
holders in an artistic situation [46], and the way meaning and Learning and Playing
use shift over time has been explored in longitudinal studies The role of learning in the context of technology has been
[37, 25, 38]. well documented. Learning is formative [34]. There are many
techniques that individuals rely on to assimilate knowledge
Still, there remains an opportunity to specifically examine the and engage with new experiences [54, 51, 2, 20].
early stages of encountering an unfamiliar DMI: playing in
the ludic rather than musical sense. How people come to un- Our D-Box workshops, whose format is described in the next
derstand an instrument’s meaning has implications not only section, represent a hybrid approach utilising guided [60],
for possible later performance, but for a broad range of HCI semi-guided [47] and at times unguided learning [1] to pro-
domains. vide an initial entry point of access without relying on goal-
oriented tuition. The workshops support a process of expan-
Appropriation, Hacking and Making sive learning by offering one-to-one support in helping learn-
The history of musical instrument use is closely bound up ers to achieve their goals [18]. This way, learners can define
with the phenomenon of appropriation [44, 16], where the their own agenda and progress towards it, without first being
user develops a personal working relationship with the tool told how they should interact with the devices. For familiar
that may differ from the designer’s intent. Transformative instruments, famous performers, tutorial materials and per-
musical techniques such as electric guitar distortion and DJ sonal experience may mean that the first hands-on encounter
turntable scratching emerged from musicians exploiting en- is already goal-directed; the status of the D-Box as a novel
gineering limitations in unexpected ways. Capacity for ap- instrument reduces these biases.
propriation has been suggested as an HCI design goal [30, Bloom offers the view that systematic learning can lead to
28, 13] which is closely bound up with encouraging ambigu- mastery through a series of increasingly challenging interac-
ity [23], openness to interpretation [52], and even unfinished tions [6], but limited time and scope means that these work-
designs [53]. shops are not designed to be iterative learning assignments
On the other hand, it is inherent in the nature of appropriation to develop conceptual understanding, but rather experiential
that unexpected uses may emerge whether or not the designer engagements where people learn and develop initial skills.
seeks them out. Openness also does not imply that tools
should be more complex. Though in interactive art, Morrison THE D-BOX
[43] finds that simple behaviours lead to boredom amongst The D-Box (Figure 1 top) is a self-contained digital musical
experts, within music the creative benefit of constraints is instrument expressly designed to be modified and hacked by
well-established [27, 36], and may in fact encourage unusual the user [63].
Form and Appearance
The instrument consists of a 15cm wooden cube with two
2x10cm capacitive touch sensors on the top surface, each of
which reads the location and contact area of up to 5 fingers.
Inside the cube is a 10cm speaker at the front, a recharge-
able battery and a BeagleBone Black single-board computer
which handles audio and sensor data processing [39].
We seek to leave the interpretation of the D-Box open to the
user, without pushing them strongly toward any existing in-
strumental paradigm. The openness allows observation of
how people come to terms with unfamiliar music technology.
To this end we did not engage with user-centred or partici-
patory design approaches, which seek to align the designers’
and users’ interpretations from the initial point of creation,
and the D-Box design deliberately avoids obvious metaphors
with other acoustic or digital instruments. The 15cm size is
just small enough to fit in one hand, but large enough to be
more comfortable in two. The cube shape allows for a wide
range of orientations, playing techniques and postures, which
tend to vary between users [64]. The touch sensors on the
surface are an original design whose appearance and function
will not be familiar to most users.
Previous work has shown that constrained musical instru-
ments often encourage users to develop creative playing tech-
niques [36, 27, 64]. For this reason, the action-sound map-
ping of the D-Box is deliberately simple and limited at first:
one touch sensor controls the pitch of the sound, while the
other controls the centre frequency of a bandpass filter effect.
In our workshops, it is initially left to each user to discover
which actions have a meaningful effect on the output sound.
Figure 1. The D-Box. Top: exterior view, showing touch sensors (top
Hacking and Exploration surface) and speaker. Bottom: interior view, showing the default state of
Removing the side panel of the box reveals a solderless bread- the breadboard (matrix) for hacking the instrument.
board (Figure 1 bottom) known as the matrix, containing a
collection of simple analog circuits. In total, 8 analog inputs
and 8 analog outputs connect from a custom expansion board An important byproduct of the D-Box design is that without
on the BeagleBone to the matrix. The breadboard is pre- either significant prior experience of working with the D-Box
populated with resistors and capacitors which form a collec- or a detailed user manual and significant time to read it, goal-
tion of idiosyncratic feedback loops [40] which collectively directed exploration of the matrix is difficult or impossible.
govern the behaviour of the instrument. As in circuit bending [26], it will not be immediately obvious
which circuit controls which feature, nor what the effect of
All circuits on the matrix can be reconfigured by the user, and a given change might be. Thus the D-Box deliberately seeks
there are no restrictions on what connections can be made nor ambiguity [23] and encourages a divergence of interpretation.
what components can be used. 220-ohm protection resistors We seek to design for appropriation [28, 13] where we expect
on the board prevent damage from shorting outputs or power the user to adopt the tool in an idiosyncratic fashion, with-
connections together [63]. out predicting or deliberately biasing what that interpretation
Once the performer encounters the matrix, the initially sim- may be. It may be fair to describe the designer-user relation-
ple and constrained mapping gives way to a much broader ship as adversarial: the space of possibilities is deliberately
space of possibilities obtainable by changing the wiring (re- nonlinear and opaque.
ferred to in this paper as “hacking”; see [63] for a discus-
sion of this term). However, as compared to standard modular Previous Use
synth approaches using control voltages (CVs), changing the In previous work, the D-Box was used in a performance study
feedback circuits can produce unusual, even chaotic results, with 10 musicians, each of whom worked with a D-Box over
though the results are generally deterministic and repeatable several weeks to produce two performances. We observed a
[40]. Avoiding familiar CV approaches was a deliberate de- wide variety of usage patterns and hacking techniques which
sign decision aimed at encouraging the performer to discover are explored in [63, 40]. Amongst the observations were a
unique personal configurations that may diverge significantly diverse variety of physical modifications to the box and the
from the designer’s original intent. circuits within, and contrasting approaches between hacking-
as-preparation (designing an instrument to be used in perfor- Workshop 1
P1 Male Student of Music Tech
mance) and hacking-as-performance (where the instrument is P2 Male Film maker, non-musician, experienced ‘maker’ of
modified live on stage). Several study participants have con- mechanical objects
tinued to use the D-Box in their personal performances. P3 Male Student, non-musician, limited experience of digital
technology
In this study, instead of focusing on the results of long-term P4 Female Artist and composer working with traditional
engagement, we examine the process by which lay users instruments. Limited experience of digital music
come to terms with the affordances and constraints of the D- making
Box over a period of several hours. The status of the D-Box as P5 Female Artist and DJ, experience with live performance and
playing percussion.
an unfamiliar technological object without clear correct and P6 Female Student, non-musician, limited experience of digital
incorrect uses offers a window into exploratory play. Com- technology
parison between exploratory play and long-term performance Workshop 2
studies will be further addressed in the Discussion section. P7 Female Classical music student, emergent understanding of
music technology
P8 Female Academic, some music technology experience
D-BOX HACKING WORKSHOPS P9 Male Student, plays drums, no music technology experience
P10 Male PhD Student, experience in acoustic instruments and
music technology
Format
P11 Male Student, non-musician, some technical background
We staged two hacking workshops, each a half day long. P12 Male Student, some musical experience, no reported
Both workshops were free, open to the public, and targeted technical experience
to adults with or without musical experience. Workshop 1 P13 Female Some technical exposure (signal processing and
was held at an established art technology venue in Liverpool, electronics), plays a musical instrument.
P14 Female Therapist with a focus on brain injuries and learning
UK. 6 participants (3 female) took part, with all participants difficulties. Self-reported as “not very technical.”
sitting around one large circular table. Workshop 2 was held P15 Male Sound engineer, some experience with Arduino,
at a community centre in London. 11 participants (6 female) analogue synths
were split across three small rectangular tables (4, 4 and 3 P16 Female Some experience with electronics e.g. repairing
people) in the same room. laptop, learning piano
P17 Female Intern, did electronics degree (radio and sensors),
For both workshops, no technical background was required, experience in software-based music, plays several
though a few participants had previous music technology instruments.
experience (see Table 1). No participants had previously Table 1. Participants in the D-Box workshops.
worked with the D-Box, though some had seen a YouTube
video containing several short performance excerpts which
was used in email advertising for the event.
components were located in the centre of each table. In prac-
The workshops were led by one of the authors, who explained tice we observed that wires were used most commonly, fol-
each step and assisted participants with their D-Boxes when lowed by capacitors and then resistors.
needed. The workshops thus mixed guided learning (tuto-
rials from leader), semi-guided learning (when participants For most of the hacking time, participants were free to ex-
actively sought help) and unguided learning (which compro- plore as they saw fit. The period was punctuated by interven-
mised the bulk of the hacking process). tions from the workshop leader to maintain interest and direc-
tion: first, participants were pointed to online documentation
on the D-Box along with a video of performances, both ac-
Stages cessible by mobile phone. Subsequently, the workshop leader
Both workshops followed a similar format. At the begin- described a series of example hacks and gradually explained
ning, each participant received their own D-Box in its default the function of a few of the breadboard circuits (less than 50%
configuration, with the wooden panels closed, obscuring the in total). These examples were intended to provide inspira-
breadboard. Participants were asked to learn to play it, having tion for the participants in their own hacks, not to provide a
been given no information beyond how to turn it on. The pur- systematic tutorial of the D-Box nor to define certain hack-
pose of this stage was to capture the ways in which participant ing processes as right or wrong. Similarly, when answering
made meaning from an unfamiliar tool. questions, the workshop leader attempted to provide focused
guidance without suggesting that certain hacks or processes
After a 10-15 minute period of initial exploration, participants
were better than others.
then were instructed to open the box and examine the bread-
board inside. The bulk of the workshop from this point for- In the last hour of the workshop, participants were directed
ward (2-3 hours) focused on hacking inside the box, where to exchange D-Boxes. This meant that each participant re-
modifying the breadboard circuits altered the behaviour of the ceived a D-Box hacked according to a process they had not
instrument. At this point, jumper wires and small electronic witnessed. In Workshop 1, participants knew the identity of
components were provided at each table for participants to the person who they had received the D-Box from; in Work-
use in their hacks. In Workshop 1, an arbitrary selection of shop 2, boxes were rotated between tables so the participants
components, mainly consisting of resistors and capacitors, did not know who it came from. Although participants could
was placed near each group of participants; in Workshop 2, have used the same D-Box for the entire workshop, the ex-
Figure 2. P15, P16 and P17 give a group D-Box performance, with the
wooden side plate reused to mute the speakers in the centre of the trian-
gle.
Figure 3. Top: Workshop 2 during the initial encounter with the D-Box.
change was a deliberate attempt to perturb the hacking pro- Bottom: two participants from Workshop 1 hacking the D-Box.
cess and observe how the participants reacted.
After a short period exploring and playing the new D-Box,
participants were given the opportunity to develop a further, WORKSHOP OBSERVATIONS
final hack that they were then invited to perform to the group This section presents the most salient observations from the
at the end of the workshop. In Workshop 1, participants two workshops, focusing particularly on three periods of ac-
showed their final hacks but none gave a prepared perfor- tivity: the participants’ first encounter with the D-Box (Fig-
mance. In Workshop 2, each table chose to perform together ure 3 top); their process of making hacks (Figure 3 bottom);
(see Figure 2 for one example). and the reactions to participants exchanging D-Boxes with
one another. Participants are identified by number (P1-P17:
P1-P6 represent workshop 1, P7-P17 workshop 2) in the fol-
Data Collection
lowing text; refer to Table 1 for details. The design implica-
tions of these observations are then addressed in the Discus-
Aside from the workshop leader, a team of researchers (4 for
sion section.
W1; 3 for W2) captured video documentation of the work-
shop including observations of the participants’ hacking in-
teractions and periodic interviews at the culmination of the First Contact with the D-Box
stages of the workshop, inviting the participants to explain In this phase of the workshop, we sought to understand how
their hacks and their processes as they went along. Each par- participants discovered the affordances of the D-Box having
ticipant was also interviewed following the end of the work- been given no instructions. Each participant typically began
shop. Interviews served to clarify observations during the by inspecting the six faces of the cube, after which attention
workshop, establish the background of the participant, and focused on the two black touch sensor strips on the top of the
gather their final thoughts on the D-Box. box. Each person quickly worked out that one sensor controls
the pitch of the sound and proceeded to explore the details
The workshop format was intended to capture a detailed qual-
of its operation. Several playing techniques were observed,
itative picture of each participant’s actions, reactions and re-
including tapping, holding and stroking along the sensor sur-
marks. It was expected that each participant might bring face with the fingers and touching keys and mobile phones to
their own idiosyncratic approach to hacking and exploration, the sensor.
and our documentation prioritised capturing individual ac-
tions and thought processes in detail rather than attempting The physical design of the sensor guided participants’ expec-
comparisons on any numerical metric. Following the work- tations about its operation, and these expectations were not
shop, interviews and comments were transcribed and grouped always fulfilled. P6 noticed the exposed vias on the sensor
into themes. circuit board (Figure 1 top) and surmised that they held spe-
cial significance: “I came up with hypotheses: do the sounds “I’ve abandoned any sort of method and I’m just doing ran-
change when you are different distances from the knobs... dom.” P9 explained that he understood what he was doing
experimented a few times. Nothing changed, hypothesis re- “60, 50 percent.”
jected.”
Despite the experimental approach, several participants re-
Participants also developed playing techniques by observing mained confident that a systematic understanding was possi-
their neighbours. P6 commented: “I saw someone else start ble. P2: “It creates sounds and seems to me to be slightly out
stroking [the sensors] and I thought, I’ll do that as well.” P6 of control ... but I don’t think it is.” At least four participants
discovered the pressure capability and demonstrated it to P4 commented that with more time or a different situation, they
and P5: “if you press harder it gets louder.” P5 discovered would take a systematic approach to hacking the D-Box. P16
that hovering a finger just about the sensor would activate commented: “I think if I was by myself I’d work at it in a sys-
it, and demonstrated the technique to P4 and P6: “you don’t tematic manner, it’s different with lots of people around, so
need to touch it for it to work.” I’m just messing around.”
While all participants understood the pitch sensor, the second Caution was a characteristic common to many participants’
sensor (controlling a bandpass filter on the sound) was not approaches (and commented on by P6, P8, P9, P12). P9 ex-
well understood. P1, a music technology student, worked it plained that he took a maximum of two steps forward before
out: “one’s a pitch and one’s a filter.” But P2’s reaction was evaluating his hack. P6 explained the process as: “move one
typical of several participants: “I found that one just sort of wire ... move it back.” The tension between discovering a
cut the other one out in some ways.” P7 and P8 believed that new hack and saving or restoring previously favoured hacks
this sensor strip was nonfunctional. is further addressed in the next subsection and in Discussion.
P6 discovered that touching the speaker cone created a damp- In general, self-described reactions to the hacking process
ing effect on the sound. Otherwise, very few playing tech- included curiosity (P3, P10), playfulness (P17), excitement
niques emerged using anything other than the two sensors. (P12, P14, P17) and sometimes frustration (P11, P13). Frus-
tration emerged particularly from lack of sonic variety, and
Producing and Exploring Hacks was typically a transient state associated with particular
Once initial exploration finished, participants were invited to breadboard configurations. P13 commented: “I can’t make
open the D-Box and inspect the breadboard within. Perhaps it do very many things. I guess I’m kind of frustrated that I
reflecting a general reaction to electronic circuits, at least two can only make it play one type of sound at the same time.”
participants asked whether it was safe or acceptable to touch Notably, none of the 17 participants disengaged from the ac-
inside the box, e.g. P3: “if you touch these [wires] together is tivities or left the workshop early (including during the lunch
that going to blow up?” Participants were assured that there break which would have been a natural breakpoint).
was no safety hazard nor was there any way to damage the
box by rewiring it. Other participants attempted to use visual Most of the favourite hacks identified by participants resulted
cues on the breadboard to guess at its function. P5: “I’m very from exploratory or arbitrary actions. P13 demonstrated a
interested in how sound and colour correlate, and I’m happy sound: “I put the impact sensor from the purple to the blue.
to see that the colours inside are rainbow colours. So each But the blue is in the yellow row. I don’t know what that
sound has a colour, is that right?” means, but it does this!” Later, P13 commented: “The ones
I enjoyed sonically was the one that was just me not quite
Discovering New Hacks plugging things in.”
The process of finding new hacks typically began by fol-
lowing the instructions of the workshop leader (P9 explains The D-Box is designed to stop making sound within a few
one of his hacks as “I’m doing what he asked us to do”) or seconds of removing the fingers from the touch sensors. If
bringing in assumptions from prior knowledge (P5’s focus on necessary, the instrument could be forcibly silenced by pow-
colours; P10’s experience with the software tool Max/MSP). ering it off. No participant was observed doing this during
the workshop. In one case, P14 produced a hack where sound
Some participants initially attempted to develop a systematic continued after removing the fingers. She reacted with enthu-
understanding of the breadboard function. However, the de- siasm: “I made it do something without me doing anything.
sign of the D-Box, while deterministic in behaviour, is also That was fun. It’s so cool.”
deliberately resistant to easy analysis. This led participants
to shift their approach. P1 commented: “I was trying to be Technological failure happened infrequently. When it oc-
really methodical with it and it didn’t work very well for me. curred, it was a source of temporary frustration or embar-
It lends itself well to being a lot more experimental.” Indeed, rassment, but taken in stride (sometimes with assistance from
11 of the 17 participants specifically commented on taking the workshop leader). In one exchange, P12 and P14 were
a trial-and-error approach to developing hacks, and no par- laughing at their sounds. P14’s D-Box then stopped work-
ticipant mentioned retaining a systematic approach. P6 ex- ing. Asked what happened, P14 replied: “I have absolutely
plained: “I was experimenting in a systematic way and then I no idea. I fiddled and it went kaboom!”
was like ‘nah!’ I decided to move things around in a bit of a
random way and see what happens. I just went a bit mental Saving or Reverting Hacks
with it and I’m here now.” P10: “I don’t really get what I’m Perhaps the most interesting part of the hacking process was
doing precisely, so I’m just experimenting basically.” P17: the point when a participant converged on a sound they liked.
After often arbitrary exploration, participants would become identified a sense of personal invasion associated with work-
increasingly cautious and systematic as they approached a de- ing with someone else’s D-Box. (P2, P12; P11 commented:
sired result. P6 explained: “I just randomly tended to re-plug “It feels wrong to touch someone else’s box,” to which P14
things in ... but once it got to a stage where I quite like the agreed: “Yeah, it feels weird.”)
sound, it was no longer random, so I wanted to control the
sound and manipulated it in a way I wanted to achieve a cer- P12 cast judgment on the previous user of the D-Box: “I’m
tain outcome.” not sure they knew what they were doing. I mean, neither did
I, but at least I produced some sounds!” Collectively, these re-
As a hardware system, the D-Box breadboard has no built- actions suggest the emergence of a sense of personal connec-
in undo feature aside from manually reverting to a previous tion or ownership, despite the self-acknowledged undirected
wiring configuration. There is no way to save global pre- hacking process. This phenomenon will be further explored
sets, though P7 and P9 requested this capability. This led to in Discussion below.
tension between maintaining a favoured hack and continuing
exploration, as participants weighed the costs and benefits of Not all participants disliked the new D-Boxes. P4, P5 and P17
losing the state they had gotten to. P8: “There’s a moment liked the new ones (P4: “Oh, it’s well better to be honest! I
where you want to go, ‘oh, don’t go too far’ because you got a little bit lost with mine”), as did P9 whose old D-Box
had gone silent. P6 and P15 had more neutral reactions to the
want to get back to that nice sound I had.”
swap.
Participants relied on memory to backtrack if a modification
didn’t produce a desired result (P1, P12; P6: “if it made the After the swap, many participants expressed that they felt
wrong sound, I’d make it go back.”; P8: “just try and remem- they’d lost control and understanding of the hacking process
ber the steps I’ve taken”). P9 explained that if he did not like (P2, P5, P7, P8, P9, P10, P14). P9 explained: “I guess it’s
a result, “I turn back, I go to the original state and change like, you’ve made the changes yourself [P7 nods in agree-
ment] and you’ve made a conscious decision when you made
something else.” Being unable to recreate a previously de-
the change ‘I like this sound’, so that’s why I feel more in con-
sired hack was a common experience (P10, P13, P14, P16;
trol. For this one, you’re just given a random thing and you
P4: “I found some other favourites earlier but I can’t find
don’t know what’s going on.” Perhaps as a result, a qualitative
them again.”). Participants cited this experience as a reason
for taking a cautious approach. Surprisingly, no participants change appeared in the hacking process with many partici-
made written notes through several mentioned they could (P4, pants taking a more aggressive, less cautious approach. P12:
P16, P17). When asked why, most participants mentioned the “I’m being braver on what I’m trying out on the breadboard
short duration of the workshop. P15 suggested the use of a because it’s already been destroyed!”
mobile phone to take a picture of desired breadboard states. P2 created one of the most aggressive hacks in the new D-
Box, pulling out all the wires and letting them dangle free
As in the initial encounter with the D-Box, social factors
emerged in backtracking from an undesirable hack. In one within the box. He then added a random collection of elec-
exchange, after P13 makes an undesired change, P14 asks: tronic components and an electric motor from a dismantled
“You took the resistor out. Where did you take it out from?” toy he had brought with him (Figure 4). When the motor
P13: “I don’t know.” P14: “Was it here?” P13 pauses, then: spun, it caused transient connections within the pile of com-
“Yeah.” P14 reconnects the resistor in P13’s box. A similar ponents, creating a chaotic noise. P2 explained: “I can’t log-
exchange was observed between P7 and P9 over where a lost ically play this thing, so I literally took it apart and tried to
make it play itself. I didn’t feel very in control, so I decided
part should go. (Both P7-P9 and P13-P14 knew one another
to give that control to something else.”
before the workshop and arrived together.) Generating new
hacks tended to be an individual rather than group process. Reflections on the D-Box
Participants were asked during and after the workshop to re-
Exchanging Hacks flect on the capabilities and potential applications of the D-
In the latter part of the workshop, in a deliberate attempt Box. The physicality of the instrument was mentioned by
to perturb the hacking process, the participants exchanged several participants. P11: “The way you use the box means
hacked D-Boxes. A surprising result was the strong sense of you’re very close to it. You’re touching it, you’re inside it,
disappointment expressed by many participants at their new you’re very close to try and hear what’s going on.” P5 com-
instrument (P3, P11, P12, P13, P16). P11 commented of the mented that the D-Box sound could be influenced by the
new D-Box: “It doesn’t make much sound. This is sad.... whole body (“it wasn’t just finger based, it wasn’t just tap-
This box has been mistreated.” P16 likewise described the ping with my hands it was my whole body, well my whole
new D-Box as “a bit sad”. P13 compared her new instrument top half.”) P5 also discovered techniques involving loosely
unfavourably to nu metal music. P12 commented: “I don’t connecting wires and hovering the finger just over the sen-
like it. It doesn’t do anything. It needs changing.” sor. Only P7 asked for a version of the D-Box attached to
a computer, citing the ergonomics of hacking the breadboard
In a similar vein, several participants (P3, P12, P14) com- (“I couldn’t control the resistors too well, my fingers were too
mented that they missed their old D-Box. P14: “I miss mine cumbersome”).
[the old box]. I knew exactly what I’d done.” P12: “I liked
my box. It’s the configuration isn’t it? Having done your own Participants viewed the D-Box as complex (P6: “it seemed
hack, it does feel very personal.” Some participants further very simple at first ... but now there are a huge range of com-
Initial Discovery of Affordances
Upon receiving a D-Box (with side panels closed), partici-
pants quickly identified the two touch sensors as providing
the main affordances of the instrument. In the process of
understanding their operation, one participant discovered the
unusual playing technique of hovering the finger over the sen-
sor, and another developed a muting technique by touching
the speaker, but most interaction remained focused on touch
position and pressure.
This contrasts with a previous study of a similarly-shaped but
highly constrained wooden cube instrument [64]. 10 partic-
ipants working alone collectively developed a broad range
of unusual playing techniques based on hidden affordances
[22], including percussion on the case, mechanical filtering
of the speaker and application of moisture to the touch sen-
sor. The absence of such discovery here is surprising. It may
be that the short time, the fact that participants knew that they
would later modify the box, or the social setting where some
were copying the interactions of the others nearby, discour-
Figure 4. P2’s hack, which leaves all wires and other components drift- aged them from looking beyond the obvious affordances of
ing freely in the box. A spinning motor produces transient connections, the two sensors.
leading to chaotic sounds.
4. Ben Bengler and Nick Bryan-Kinns. 2013. Designing 19. Qais Faryadi. 2007. Behaviorism and the Construction
collaborative musical experiences for broad audiences. of Knowledge. Online Submission (2007).
In Proceedings of the 9th ACM Conference on Creativity 20. Jenny Fleming and Lesley Ferkins. 2010. The use of
& Cognition. action learning strategies for cooperative education or
work-integrated learning projects. Learning and
5. Tina Blaine and Sidney Fels. 2003. Contexts of
Teaching in Higher Education Journal 4, 1 (2010), 1–4.
Collaborative Musical Experiences. In Proceedings of
the International Conference on New Interfaces for 21. William Gaver. 2002. Designing for Homo Ludens. I3
Musical Expression. Magazine 12 (2002).
6. Benjamin S Bloom. 1987. A Response to Slavin’s 22. William W Gaver. 1991. Technology affordances. In
Mastery Learning Reconsidered. Review of Educational Proceedings of the SIGCHI conference on Human
Research 57, 4 (1987), 507–8. factors in computing systems. ACM, 79–84.
7. John Bowers and Phil Archer. 2005. Not hyper, not 23. William W. Gaver, Jacob Beaver, and Steve Benford.
meta, not cyber but infra-instruments. In Proceedings of 2003. Ambiguity As a Resource for Design. In
the International Conference on New Interfaces for Proceedings of the SIGCHI Conference on Human
Musical Expression. Factors in Computing Systems (CHI ’03). ACM, New
York, NY, USA, 233–240. DOI:
8. Eva Buchinger and Bernard Scott. 2010. Comparing http://dx.doi.org/10.1145/642611.642653
conceptions of learning: Pask and Luhmann.
Constructivist Foundations 5, 3 (2010), 109–120. 24. William W. Gaver, John Bowers, Andrew Boucher,
Hans Gellerson, Sarah Pennington, Albrecht Schmidt,
9. Nicolas Collins. 2008. A Solder’s Tale: Putting the Anthony Steed, Nicholas Villars, and Brendan Walker.
‘Lead’ Back in ‘Lead Users’. Pervasive Computing 7 2004. The Drift Table: Designing for Ludic
(2008), 32–38. Issue 3. Engagement. In CHI ’04 Extended Abstracts on Human
Factors in Computing Systems (CHI EA ’04). ACM,
10. Nicolas Collins. 2009. Handmade Electronic Music: New York, NY, USA, 885–900. DOI:
The Art of Hardware Hacking (second ed.). Routledge, http://dx.doi.org/10.1145/985921.985947
New York.
25. Steven Gelineck and Stefania Serafin. 2012.
11. Andy Crabtree, Tom Rodden, Terry Hemmings, and Longitudinal evaluation of the integration of digital
Steve Benford. 2003. Finding a Place for UbiComp in musical instruments into existing compositional work
the Home. In UbiComp 2003: Ubiquitous Computing. processes. Journal of New Music Research 41, 3 (2012),
Springer, 208–226. 259–276.
12. Palle Dahlstedt, Per Anders Nilsson, and Gino Robair. 26. Reed Ghazala. 2005. Circuit Bending: Build Your Own
2015. The Bucket System - a computer mediated Alien Instruments. Wiley.
signaling system for group improvisation. In
Proceedings of the International Conference on New 27. Michael Gurevich, Paul Stapleton, and Adnan
Interfaces for Musical Expression. Marquez-Borbon. 2010. Style and Constraint in
Electronic Musical Instruments. In Proceedings of the
13. Alan Dix. 2007. Designing for appropriation. In Proc. International Conference on New Interfaces for Musical
British HCI Group Conf. on People and Computers. Expression.
28. Kristina Höök. 2006. Designing familiar open surfaces. 39. Andrew McPherson and Victor Zappi. 2015a. An
In Proceedings of the 4th Nordic conference on environment for submillisecond-latency audio and
Human-computer interaction: changing roles. ACM, sensor processing on BeagleBone Black. In Proc. AES
242–251. 138th Conv.
29. Kristina Höök, Phoebe Sengers, and Gerd Andersson. 40. Andrew McPherson and Victor Zappi. 2015b. Exposing
2003. Sense and Sensibility: Evaluation and Interactive the Scaffolding of Digital Instruments with
Art. In Proceedings of the SIGCHI Conference on Hardware-Software Feedback Loops. In Proceedings of
Human Factors in Computing Systems (CHI ’03). ACM, the International Conference on New Interfaces for
New York, NY, USA, 241–248. DOI: Musical Expression.
http://dx.doi.org/10.1145/642611.642654
41. Fabio Morreale, Antonella De Angeli, Raul Masu, Paolo
30. Hilary Hutchinson, Wendy Mackay, Bo Westerlund, Rota, and Nicola Conci. 2014. Collaborative creativity:
Benjamin B. Bederson, Allison Druin, Catherine The Music Room. Personal and Ubiquitous Computing
Plaisant, Michel Beaudouin-Lafon, Stéphane Conversy, 18, 5 (2014), 1187–1199.
Helen Evans, Heiko Hansen, Nicolas Roussel, and Björn 42. Ann Morrison, Stephen Viller, and Peta Mitchell. 2011.
Eiderbäck. 2003. Technology Probes: Inspiring Design Building Sensitising Terms to Understand Free-play in
for and with Families. In Proceedings of the SIGCHI Open-ended Interactive Art Environments. In
Conference on Human Factors in Computing Systems Proceedings of the SIGCHI Conference on Human
(CHI ’03). ACM, New York, NY, USA, 17–24. DOI: Factors in Computing Systems (CHI ’11). ACM, New
http://dx.doi.org/10.1145/642611.642616
York, NY, USA, 2335–2344. DOI:
31. Sergi Jordà. 2004. Instruments and Players: Some http://dx.doi.org/10.1145/1978942.1979285
Thoughts on Digital Lutherie. J. New Music Research 33 43. Ann J. Morrison, Peta Mitchell, and Margot Brereton.
(2004), 321–341. Issue 3. 2007. The Lens of Ludic Engagement: Evaluating
32. Sergi Jordà and Sebastián Mealla. 2014. A Participation in Interactive Art Installations. In
methodological framework for teaching, evaluating and Proceedings of the 15th International Conference on
informing NIME design with a focus on expressiveness Multimedia (MULTIMEDIA ’07). ACM, New York, NY,
and mapping. In Proceedings of the International USA, 509–512. DOI:
Conference on New Interfaces for Musical Expression, http://dx.doi.org/10.1145/1291233.1291358
Vol. 30. 233–238. 44. Donald A Norman. 1988. The psychology of everyday
33. Chris Kiefer, Nick Collins, and Geraldine Fitzpatrick. things. Basic books.
2008. HCI methodology for evaluating musical 45. Lora Oehlberg, Wesley Willett, and Wendy E. Mackay.
controllers: A case study. In Proceedings of NIME, 2015. Patterns of Physical Design Remixing in Online
Vol. 8. Maker Communities. In Proceedings of the 33rd Annual
34. J-L Le Moigne. 2011. From Jean Piaget to Ernst von ACM Conference on Human Factors in Computing
Glasersfeld: An epistemological itinerary in review. Systems (CHI ’15). ACM, New York, NY, USA,
Constructivist Foundations 6, 2 (2011), 152–156. 639–648. DOI:
http://dx.doi.org/10.1145/2702123.2702175
35. Silvia Lindtner, Garnet D. Hertz, and Paul Dourish.
2014. Emerging Sites of HCI Innovation: Hackerspaces, 46. Sile O’modhrain. 2011. A framework for the evaluation
Hardware Startups & Incubators. In Proceedings of of digital musical instruments. Computer Music Journal
the SIGCHI Conference on Human Factors in 35, 1 (2011), 28–42.
Computing Systems (CHI ’14). ACM, New York, NY, 47. Jon Ord. 2012. John Dewey and Experiential Learning:
USA, 439–448. DOI: Developing the theory of youth work. Youth & Policy
http://dx.doi.org/10.1145/2556288.2557132 108 (2012), 55–72.
36. Thor Magnusson. 2010. Designing Constraints: 48. Matthew Pike, Richard Ramchurn, Steve Benford, and
Composing and Performing with Digital Musical Max L. Wilson. 2016. #Scanners: Exploring the Control
Systems. Computer Music J. 34 (2010), 62–73. Issue 4. of Adaptive Films using Brain-Computer Interaction. In
Proceedings of the SIGCHI Conference on Human
37. Adnan Marquez-Borbon, Michael Gurevich, A Cavan
Factors in Computing Systems.
Fyans, and Paul Stapleton. 2011. Designing digital
musical interactions in experimental contexts. 49. Cornelius Poepel. 2005. On interface expressivity: a
Proceedings of the International Conference on New player-based study. In Proceedings of the 2005
Interfaces for Musical Expression (2011). conference on New interfaces for musical expression.
National University of Singapore, 228–231.
38. A. McPherson and Y. Kim. 2012. The problem of the
second performer: building a community around an 50. David Roedl, Shaowen Bardzell, and Jeffrey Bardzell.
augmented instrument. Computer Music Journal 34, 4 2015. Sustainable Making? Balancing Optimism and
(2012). Criticism in HCI Discourse. ACM Trans. Comput.-Hum.
Interact. 22, 3, Article 15 (June 2015), 27 pages. DOI: 63. Victor Zappi and Andrew McPherson. 2014a. Design
http://dx.doi.org/10.1145/2699742 and Use of a Hackable Digital Instrument. In
Proceedings of the International Conference on Live
51. J. Rogers. 2001. Honey and Mumford’s Learning Styles. Interfaces.
In Adults Learning.
64. Victor Zappi and Andrew McPherson. 2014b.
52. Phoebe Sengers and Bill Gaver. 2006. Staying open to Dimensionality and appropriation in digital musical
interpretation: engaging multiple meanings in design instrument design. In Proceedings of the International
and evaluation. In Proceedings of the 6th Conference on Conference on New Interfaces for Musical Expression.
Designing Interactive Systems. ACM, 99–108.
65. Victor Zappi and Andrew McPherson. 2015. The
53. Jin-min Seok, Jong-bum Woo, and Youn-kyung Lim. D-Box: How to Rethink a Digital Musical Instrument.
2014. Non-finito Products: A New Design Space of In Proceedings of the International Symposium on
User Creativity for Personal User Experience. In Electronic Art.
Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems (CHI ’14). ACM, New
York, NY, USA, 693–702. DOI:
http://dx.doi.org/10.1145/2556288.2557222