LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Briggs, Pamela; Little, Linda; Sillence, Elizabeth (2009)
Publisher: ACM
Languages: English
Types: Unknown
Subjects: G500, G400
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people, especially families, will be able to engage with and trust such systems whilst maintaining privacy and individual boundaries. To begin to address such issues, we have recently conducted a wide reaching study eliciting trust, privacy and identity concerns about pervasive computing. Over three hundred UK citizens participated in 38 focus groups. The groups were shown Videotaped Activity Scenarios [11] depicting pervasive or ubiquitous computing applications in a number of contexts including shopping. The data raises a number of important issues from a family perspective in terms of access, control, responsibility, benefit and complexity. Also findings highlight the conflict between increased functionality and the subtle social interactions that sustain family bonds. We present a Pre-Concept Evaluation Tool (PRECET) for use in design and implementation of ubicomp systems.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Bohn, J., Coram, V., Langheinrich, M., Mattern, F., Rohs, M. 2005. Social, Economic, and Ethical Implications of Ubiquitous computing and Ubiquitous Computing. Ubiquitous computing, Springer-Verlag, 5-29.
    • Fern, E.F. 2001. Advanced Focus Group Research.
    • [3] Floridi, I. 2005. The ontological interpretation of informational privacy. Ethics and Information Technology, 7, 185-200.
    • [4] [5] Friedewald, M., Vildjiounaite, E., Punie, Y., & Wright, D.
    • 2007: Privacy, Identity, and Security in Ambient Intelligence: A Scenario Analysis. In: Telematics and Informatics 24, Nr. 1, S. 15-29.
    • Friedewald, M., Costa, O., Punie, Y., Alahuhta, P., Heinonen, S. 2005. Perspective of ubiquitous computing in the home environment. Telematics Information, 22 (3), 221-2385.
    • Hartog, F,D., Schmidt, A., & vries, A.D.2006 On the potential of personal networks for hospitals . International Journal of Medical Informatics , 75 , 9 , 658 - 663
    • Hess, R., & Handel, G. 1985. The family as a psychosocial organization. In: Handel, G. (Ed.) The psychosocial interior of the family (3rd Ed.). Aldine, New York
    • [8] Hong, J.I., Ng, J.D., Lederer, S. & Landay, J. 2004. Privacy risk models for designing privacy-sensitive ubiquitous computing systems, Proceedings of the 2004 conference on Designing interactive systems: processes, practices, methods, and techniques, Cambridge, MA, USA
    • Khan V.J., Markopoulos, P., de Ruyter, B., IJsselsteijn, W.A. 2007 Expected Information Needs of Parents for Pervasive Awareness Systems. Proceedings Ambient Intelligence 2007, LNCS, 332-339.
    • [10] Little, L., Marsh, S., & Briggs, P. 2007. Trust and privacy permissions for an ambient world. In R. Song, L. Korba, G. Yee (Eds.) Trust in e-services: technologies, practices and challenges. New York: Ideas Group [11]. Little, L., Briggs, P., & Coventry, L. 2004. Videotaped Activity Scenarios and the Elicitation of Social Rules for Public Interactions. British Human Computer Interaction Conference, Leeds, September 2004.
    • [12] Maguire, M.C. 1998. A Review of User-Interface Guidelines for Public information kiosk Systems.
    • International journal of Human-Computer Studies, 50.
    • [13] Poole, E.S., Dantec, C.A., Eagan, J.R., & Edwards, W.K. 2008 Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing. ACM International Conference Proceeding Series; Vol. 344 Proceedings of the 10th international conference on Ubiquitous computing. 192-201.
    • [14] Segrin, C. 1986. Family interaction and well-being: Integrative perspectives. Journal of Family Communication, 6, 3-21.
    • [15] Stroufe, L. A., & Fleeson, J. 1986. Attachment and the construction of relationships. In W. W. Hartup, & Z. Rubin (Eds.), Relationships and development (pp. 51- 71). Hillsdale, NJ: Lawrence Erlbaum Associates.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article