This paper presents a user-centered design (UCD) process of an interface for Parkinson’s disease (PD) patients for helping them to better manage their symptoms. The interface is designed to visualize ...symptom and medication information, collected by an Internet of Things (IoT)-based system, which will consist of a smartphone, electronic dosing device, wrist sensor and a bed sensor. In our work, the focus is on measuring data related to some of the main health-related quality of life aspects such as motor function, sleep, medication compliance, meal intake timing in relation to medication intake, and physical exercise. A mock-up demonstrator for the interface was developed using UCD methodology in collaboration with PD patients. The research work was performed as an iterative design and evaluation process based on interviews and observations with 11 PD patients. Additional usability evaluations were conducted with three information visualization experts. Contributions include a list of requirements for the interface, results evaluating the performance of the patients when using the demonstrator during task-based evaluation sessions as well as opinions of the experts. The list of requirements included ability of the patients to track an ideal day, so they could repeat certain activities in the future as well as determine how the scores are related to each other. The patients found the visualizations as clear and easy to understand and could successfully perform the tasks. The evaluation with experts showed that the visualizations are in line with the current standards and guidelines for the intended group of users. In conclusion, the results from this work indicate that the proposed system can be considered as a tool for assisting patients in better management of the disease by giving them insights on their own aggregated symptom and medication information. However, the actual effects of providing such feedback to patients on their health-related quality of life should be investigated in a clinical trial.
Background: Current research shows that perceived improvement of quality of life (QoL) is among the most important factors influencing acceptance of technology by older adults. Research ...Aim/question(s): The purpose of this study was to assess the utility of a sensor-based cognitive assistive technology (CAT) deployed in real homes and its impact on older adults' and their informal caregivers' perceived QoL. Methods During a period of five months, we conducted a summative evaluation by deploying a CAT in the home of couples in which one of the partners had a self-perceived memory decline. We applied a mixed method approach. Quantitative and qualitative data was collected via subjective forms, observations and 28 interviews conducted prior to the deployment, when the CAT was deployed and one month after the CAT removal. Results The study showed that the CAT had a psychosocial impact on older adults with a self-perceived memory decline and their informal caregivers but no impact on subjective forms measuring physiological and mental health, anxiety, depression or QoL. Additionally, we found that the CAT lacked a number of functionalities and that the test persons experienced several problems of different nature when using it in their homes. This affected the users' experienced impact of the CAT. Conclusions This study contributes to the literature on sensor networks' impact on QoL. While previous studies often use general forms intended to assess QoL, this summative evaluation indicates that using such instruments without considering contextual factors is not meaningful. The study also outlines a number of factors that sensor network providers might consider in order to increase their products impact on QoL and their perceived utility.
To identify factors that influence the acceptance of technology for ageing in place by seniors in the post-implementation stage. This review is among very few that focus on acceptance in ...post-implementation phase.
A literature review. We searched six databases (Cinahl, Medline, PsycINFO, PubMed, Science Direct, Scopus). Inclusion criteria were: 1) original and peer-reviewed research written in English, 2) Articles published in 2010–2018, 3) Empirical research papers, 4) Research in which participants are seniors aged above 60 years, 5) Research aimed at investigating factors that influence the acceptance of digital technology for ageing in place, 6) Research conducted in home environment, 7) Focus on post-implementation stage.
Twenty-three out of 2181 papers were included. The results show that acceptance of technology in the post-implementation stage is influenced by 36 factors, divided into six themes: concerns/problems regarding technology (technical errors, etc.), experienced positive characteristics of technology (e.g., ease of use factors, privacy implications), expected benefits of technology (e.g., increased safety, companionship, increased security, etc.), need for technology (e.g., perceived need to use), social influence (e.g., influence by peers, family or surroundings) and characteristics of older adults (e.g., past experiences/attitudes, physical environment). The articles considered different types of technology: health monitoring, ADL, safety and communication. The level of technology readiness for digital technologies supporting ageing in place in post-implementation stage is still low within the scientific literature, since only seven out of 23 articles studied mature technologies (TRL 8–9 of the technology readiness level scale). The majority of the studies were conducted in Western Europe or the US, and only two were conducted in other regions (Australia, and Taiwan). Qualitative and quantitative methods were equally used in the analysed articles.
Acceptance of technology in the post-implementation stage is influenced by multiple factors. An interesting finding was that the seniors’ views of technology change between the pre- and post-implementation stages. Some negative concerns that appeared in the pre-implementation stage appear as positive characteristics in the post-implementation stage. In the post-implementation stage, seniors realize the wide variety of benefits that technology can have on their lives. We expect that findings of this review can be utilised by academics and policy-makers for gaining insights for further research and successful implementation of technology for ageing in place.
•We develop a method for Value Based Compliance analysis of information security.•We develop a set of design principles for a Value Based Compliance analysis method.•We analyse value conflicts behind ...information security non-compliance.•We provide a hands-on guide to Value Based Compliance analysis.
Employees’ poor compliance with information security policies is a perennial problem. Current information security analysis methods do not allow information security managers to capture the rationalities behind employees’ compliance and non-compliance. To address this shortcoming, this design science research paper suggests: (a) a Value-Based Compliance analysis method and (b) a set of design principles for methods that analyse different rationalities for information security. Our empirical demonstration shows that the method supports a systematic analysis of why employees comply/do not comply with policies. Thus we provide managers with a tool to make them more knowledgeable about employees’ information security behaviours.
This paper analyzes power relationships and the resulting failure in complying with information security rules. It argues that an inability to understand the intricate power relationships in the ...design and implementation of information security rules leads to a lack of compliance with the intended policy. The argument is conducted through an empirical, qualitative case study set in a Swedish Social Services organization. Our findings indicate that various dimensions of power and how these relate to information security rules ensure adequate compliance. This also helps to improve configuration of security rules through proactive information security management.
The increasing use of the Internet for service delivery has paralleled an increase of e-service users' privacy concerns as technology offers ample opportunities for organizations to store, process, ...and exploit personal data. This may reduce individuals' perceived ability to control their personal information and increase their perceived privacy risk. A systematic understanding of individuals' privacy concerns is important as negative user perceptions are a challenge to service providers' reputation and may hamper service delivery processes as they influence users' trust and willingness to disclose personal information. This study develops and validates a model that examines the effect of organizational privacy assurances on individual privacy concerns, privacy control and risk perceptions, trust beliefs and non-self-disclosure behavior. Drawing on a survey to 547 users of different types of e-services – e-government, e-commerce and social networking – in Rwanda, and working within the framework of exploratory analysis, this study uses partial least square-structural equation modeling to validate the overall model and the proposed hypotheses. The findings show that perceptions of privacy risks and privacy control are antecedents of e-service users' privacy concerns, trust and non-self-disclosure behavior. They further show that the perceived effectiveness of privacy policy and perceived effectiveness of self-regulations influence both perceptions of privacy risks and control and their consequences; users' privacy concerns, trust and non-self-disclosure behavior. The hypotheses are supported differently across the three types of e-services, which means that privacy is specific to context and situation. The study shows that the effect of privacy assurances on trust is different in e-government services than in other services which suggest that trust in e-government may be more complex and different in nature than in other contexts. The findings serve to enhance a theoretical understanding of organizational privacy assurances and individual privacy concerns, trust and self-disclosure behavior. They also have implications for e-service providers and users as well as for regulatory bodies and e-services designers.
•Perceptions of privacy risk-control influence privacy concerns, trust and self-disclosure behavior.•Privacy policy influences perceptions of privacy risk and/or control, privacy concerns, trust and self-disclosure behavior.•Organizational privacy self-regulations influence users’ privacy concerns, trust and non-self-disclosure behavior.•Organization's strategies in executing privacy policies may reflect how effective the organization is in protecting personal information.•Privacy and trust in e-government are influenced by the level of trust users have in the government and its organizations.
When end users have to prioritize between different rationalities in organisations there is a risk of non-compliance with information security policies. Thus, in order for information security ...managers to align information security with the organisations’ core work practices, they need to understand the competing rationalities. The Value-based compliance (VBC) analysis method has been suggested to this end, however it has proven to be complex and time-consuming. Computerized software may aid this type of analysis and make it more efficient and executable. The purpose of this paper is to elicit a set of requirements for computerized software that support analysis of competing rationalities in relation to end users’ compliance and non-compliance with information security policies. We employed a design science research approach, drawing on design knowledge on VBC and elicited 17 user stories. These requirements can direct future research efforts to develop computerized software in this area.
Purpose Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and ...its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents’ interpretations of the operationalized variables). This study asks: How well do respondents’ interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations? Design/methodology/approach This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior. Findings The authors found that respondents’ interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items – referred to as property contextualization, extension, alteration and oscillation – each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined. Originality/value The qualitative method used proved vital to better understand respondents’ interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors’ knowledge, this study is a first step toward understanding how precise and uniform definitions of variables’ theoretical properties can be operationalized into effective measurement items.
Purpose
The purpose of this paper is to survey existing information security policy (ISP) management research to scrutinise the extent to which manual and computerised support has been suggested, and ...the way in which the suggested support has been brought about.
Design/methodology/approach
The results are based on a literature review of ISP management research published between 1990 and 2017.
Findings
Existing research has focused mostly on manual support for managing ISPs. Very few papers have considered computerised support. The entire complexity of the ISP management process has received little attention. Existing research has not focused much on the interaction between the different ISP management phases. Few research methods have been used extensively and intervention-oriented research is rare.
Research limitations/implications
Future research should to a larger extent address the interaction between the ISP management phases, apply more intervention research to develop computerised support for ISP management, investigate to what extent computerised support can enhance integration of ISP management phases and reduce the complexity of such a management process.
Practical implications
The limited focus on computerised support for ISP management affects the kind of advice and artefacts the research community can offer to practitioners.
Originality/value
Today, there are no literature reviews on to what extent computerised support the ISP management process. Findings on how the complexity of ISP management has been addressed and the research methods used extend beyond the existing knowledge base, allowing for a critical discussion of existing research and future research needs.