2,754 research outputs found

    New Frontiers of Quantified Self: Finding New Ways for Engaging Users in Collecting and Using Personal Data

    Get PDF
    In spite of the fast growth in the market of devices and applications that allow people to collect personal information, Quantified Self (QS) tools still present a variety of issues when they are used in everyday lives of common people. In this workshop we aim at exploring new ways for designing QS systems, by gathering different researchers in a unique place for imagining how the tracking, management, interpretation and visualization of personal data could be addressed in the future

    Health Promotion for Childhood Obesity: An Approach Based on Self-Tracking of Data

    Get PDF
    [EN]At present, obesity and overweight are a global health epidemic. Traditional interventions for promoting healthy habits do not appear to be e ective. However, emerging technological solutions based on wearables and mobile devices can be useful in promoting healthy habits. These applications generate a considerable amount of tracked activity data. Consequently, our approach is based on the quantified-self model for recommending healthy activities. Gamification can also be used as a mechanism to enhance personalization, increasing user motivation. This paper describes the quantified-self model and its data sources, the activity recommender system, and the PROVITAO App user experience model. Furthermore, it presents the results of a gamified program applied for three years in children with obesity and the process of evaluating the quantified-self model with experts. Positive outcomes were obtained in children’s medical parameters and health habits

    Useful shortcuts: Using design heuristics for consent and permission in smart home devices

    Get PDF
    Prior research in smart home privacy highlights significant issues with how users understand, permit, and consent to data use. Some of the underlying issues point to unclear data protection regulations, lack of design principles, and dark patterns. In this paper, we explore heuristics (also called “mental shortcuts” or “rules of thumb”) as a means to address security and privacy design challenges in smart homes. First, we systematically analyze an existing body of data on smart homes to derive a set of heuristics for the design of consent and permission. Second, we apply these heuristics in four participatory co-design workshops (n = 14) and report on their use. Third, we analyze the use of the heuristics through thematic analysis highlighting heuristic application, purpose, and effectiveness in successful and unsuccessful design outcomes. We conclude with a discussion of the wider challenges, opportunities, and future work for improving design practices for consent in smart homes

    Preparing for a Robot Future? Social Professions, Social Robotics and the Challenges Ahead

    Get PDF

    Drawing as a Facilitator of Critical Data Discourse: Reflecting on Problems with Digital Health Data Through Expressive Visualizations of the Unseen Body Landscape

    Get PDF
    In a 1.5-hour workshop, we used drawing and self-reflection prompts to facilitate a value-driven discussion of personal and institutional data practices. Activities included mark-making in time with one's heartbeat, creating an inventory of one's personal data, and creating a qualitative personal health visualization. This article details the workshop structure and exercises and includes a summary of the discussion, which constructively encompassed both the empowering and the uncomfortable aspects of digital health data collection in a constructive manner. The workshop's design used the format of hands-on, expressive drawing activities to enable participants to achieve depth and breadth in a relatively short discussion about personal health, data autonomy, institutional trust, and consent. Critical discourse about data, especially health data, is a valuable experience for every person whose health data has been or is being collected; and approaches that take personal data as a starting point can support the practice of digital/data sovereignty more broadly

    The patterning of finance/security : a designerly walkthrough of challenger banking apps

    Get PDF
    Culture is being ‘appified’. Diverse, pre-existing everyday activities are being redesigned so they happen with and through apps. While apps are often encountered as equivalent icons in apps stores or digital devices, the processes of appification – that is, the actions required to turn something into an app – vary significantly. In this article, we offer a comparative analysis of a number of ‘challenger’ banking apps in the United Kingdom. As a retail service, banking is highly regulated and banks must take steps to identify and verify their customers before entering a retail relationship. Once established, this ‘secured’ financial identity underpins a lot of everyday economic activity. Adopting the method of the walkthrough analysis, we study the specific ways these processes of identifying and verifying the identity of the customer (now the user) occur through user onboarding. We argue that banking apps provide a unique way of binding the user to an identity, one that combines the affordances of smart phones with the techniques, knowledge and patterns of user experience design. With the appification of banking, we see new processes of security folded into the everyday experience of apps. Our analysis shows how these binding identities are achieved through what we refer to as the patterning of finance/security. This patterning is significant, moreover, given its availability for wider circulation beyond the context of retail banking apps
    • 

    corecore