6 research outputs found

    Wearables at work:preferences from an employee’s perspective

    Get PDF
    This exploratory study aims to obtain a first impression of the wishes and needs of employees on the use of wearables at work for health promotion. 76 employ-ees with a mean age of 40 years old (SD ±11.7) filled in a survey after trying out a wearable. Most employees see the potential of using wearable devices for workplace health promotion. However, according to employees, some negative aspects should be overcome before wearables can effectively contribute to health promotion. The most mentioned negative aspects were poor visualization and un-pleasantness of wearing. Specifically for the workplace, employees were con-cerned about the privacy of data collection

    Influencable autonomy and predictable freedom in the IoE

    Get PDF
    This thesis investigates how individuals can develop, exercise, and maintain autonomy and freedom in the presence of information technology. It is particularly interested in how information technology can impose autonomy constraints. The first part identifies a problem with current autonomy discourse: There is no agreed upon object of reference when bemoaning loss of or risk to an individual’s autonomy. Here, thesis introduces a pragmatic conceptual framework to classify autonomy constraints. In essence, the proposed framework divides autonomy in three categories: intrinsic autonomy, relational autonomy and informational autonomy. The second part of the thesis investigates the role of information technology in enabling and facilitating autonomy constraints. The analysis identifies eleven characteristics of information technology, as it is embedded in society, so-called vectors of influence, that constitute risk to an individual’s autonomy in a substantial way. These vectors are assigned to three sets that correspond to the general sphere of the information transfer process to which they can be attributed to, namely domain-specific vectors, agent-specific vectors and information recipient-specific vectors. The third part of the thesis investigates selected ethical and legal implications of autonomy constraints imposed by information technology. It shows the utility of the theoretical frameworks introduced earlier in the thesis when conducting an ethical analysis of autonomy-constraining technology. It also traces the concept of autonomy in the European Data Lawsand investigates the impact of cultural embeddings of individuals on efforts to safeguard autonomy, showing intercultural flashpoints of autonomy differences. In view of this, the thesis approaches the exercise and constraint of autonomy in presence of information technology systems holistically. It contributes to establish a common understanding of (intuitive) terminology and concepts, connects this to current phenomena arising out of ever-increasing interconnectivity and computational power and helps operationalize the protection of autonomy through application of the proposed frameworks
    corecore