4,826 research outputs found

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given

    Revisiting digital technologies: envisioning biodigital bodies

    Get PDF
    In this paper the contemporary practices of human genomics in the 21st century are placed alongside the digital bodies of the 1990s. The primary aim is to provide a trajectory of the biodigital as follows: First, digital bodies and biodigital bodies were both part of the spectacular imaginaries of early cybercultures. Second, these spectacular digital bodies were supplemented in the mid-1990s by digital bodywork practices that have become an important dimension of everyday communication. Third, the spectacle of biodigital bodies is in the process of being supplemented by biodigital bodywork practices, through personal or direct-to-consumer genomics. This shift moves a form of biodigital communication into the everyday. Finally, what can be learned from putting the trajectories of digital and biodigital bodies together is that the degree of this communicative shift may be obscured through the doubled attachment of personal genomics to everyday digital culture and high-tech spectacle.Keywords: genomics, biodigital, bodies, spectacle, everyda

    Latent segmentation of older adults in the use of social networks and e-banking services

    Get PDF
    Introduction. This study analyses heterogeneity in the online behaviour of elderly people. Previous research has centred on the socio-demographic segmentation of the elderly regarding their Internet use. Method. The novelty that this study adds is in determining this segmentation through variables that have been especially chosen for studies of the elderly and which are related to their utilitarian use of e-banking, compared to the more hedonic nature of using online social networks. Analysis. The sample was collected using 474 students over 55 years old enrolled in a class of experience in a University in the South of Europe (Spain). We use a latent class cluster model which is appropriate in situations of a posterior segmentation. Results. In dealing with such behaviour in situations of the elderly using these technologies, we have detected the presence of five groups or segments with highly differentiated use-related profiles concerning the variables analysed: venturesomeness, technology anxiety and selfconfidence in information and communication technologies use. Conclusion. We discover the existence of heterogeneity in the behaviour of the elderly regarding services available in Internet. The results support the idea proposed. The stereotype of the elderly cut off from technology is mistaken, as is shown by the different segments found

    Systematic Review on Privacy Categorization

    Full text link
    In the modern digital world users need to make privacy and security choices that have far-reaching consequences. Researchers are increasingly studying people's decisions when facing with privacy and security trade-offs, the pressing and time consuming disincentives that influence those decisions, and methods to mitigate them. This work aims to present a systematic review of the literature on privacy categorization, which has been defined in terms of profile, profiling, segmentation, clustering and personae. Privacy categorization involves the possibility to classify users according to specific prerequisites, such as their ability to manage privacy issues, or in terms of which type of and how many personal information they decide or do not decide to disclose. Privacy categorization has been defined and used for different purposes. The systematic review focuses on three main research questions that investigate the study contexts, i.e. the motivations and research questions, that propose privacy categorisations; the methodologies and results of privacy categorisations; the evolution of privacy categorisations over time. Ultimately it tries to provide an answer whether privacy categorization as a research attempt is still meaningful and may have a future

    A qualitative study of stakeholders' perspectives on the social network service environment

    Get PDF
    Over two billion people are using the Internet at present, assisted by the mediating activities of software agents which deal with the diversity and complexity of information. There are, however, ethical issues due to the monitoring-and-surveillance, data mining and autonomous nature of software agents. Considering the context, this study aims to comprehend stakeholders' perspectives on the social network service environment in order to identify the main considerations for the design of software agents in social network services in the near future. Twenty-one stakeholders, belonging to three key stakeholder groups, were recruited using a purposive sampling strategy for unstandardised semi-structured e-mail interviews. The interview data were analysed using a qualitative content analysis method. It was possible to identify three main considerations for the design of software agents in social network services, which were classified into the following categories: comprehensive understanding of users' perception of privacy, user type recognition algorithms for software agent development and existing software agents enhancement

    User kansei modeling and eco-design

    Get PDF
    The use of day-to-day life artifacts is a key phase in the lifecycle of products. Indeed it has a great impact on our environment. User centered methods are not yet taken into account in eco-design approaches. These methods are being developed in two ways, by building new user models encompassing complex dimensions such as Kansei and experience, including values and moods, and by integrating the user himself in the design process. This paper deals with setting-up a new theoretical framework associating user-centered design advanced approaches such as experience design, Kansei studies, or participative design and eco-design methods. The final goal is to support product design by providing some guidelines according to environmental issues linked to the users and their abilities

    Know thy eHealth user: Development of biopsychosocial personas from a study of older adults with heart failure

    Get PDF
    BACKGROUND: Personas are a canonical user-centered design method increasingly used in health informatics research. Personas-empirically-derived user archetypes-can be used by eHealth designers to gain a robust understanding of their target end users such as patients. OBJECTIVE: To develop biopsychosocial personas of older patients with heart failure using quantitative analysis of survey data. METHOD: Data were collected using standardized surveys and medical record abstraction from 32 older adults with heart failure recently hospitalized for acute heart failure exacerbation. Hierarchical cluster analysis was performed on a final dataset of n=30. Nonparametric analyses were used to identify differences between clusters on 30 clustering variables and seven outcome variables. RESULTS: Six clusters were produced, ranging in size from two to eight patients per cluster. Clusters differed significantly on these biopsychosocial domains and subdomains: demographics (age, sex); medical status (comorbid diabetes); functional status (exhaustion, household work ability, hygiene care ability, physical ability); psychological status (depression, health literacy, numeracy); technology (Internet availability); healthcare system (visit by home healthcare, trust in providers); social context (informal caregiver support, cohabitation, marital status); and economic context (employment status). Tabular and narrative persona descriptions provide an easy reference guide for informatics designers. DISCUSSION: Personas development using approaches such as clustering of structured survey data is an important tool for health informatics professionals. We describe insights from our study of patients with heart failure, then recommend a generic ten-step personas development process. Methods strengths and limitations of the study and of personas development generally are discussed

    Exploring personality-targeted UI design in online social participation systems

    Get PDF
    We present a theoretical foundation and empirical findings demonstrating the effectiveness of personality-targeted design. Much like a medical treatment applied to a person based on his specific genetic profile, we argue that theory-driven, personality-targeted UI design can be more effective than design applied to the entire population. The empirical exploration focused on two settings, two populations and two personality traits: Study 1 shows that users' extroversion level moderates the relationship between the UI cue of audience size and users' contribution. Study 2 demonstrates that the effectiveness of social anchors in encouraging online contributions depends on users' level of emotional stability. Taken together, the findings demonstrate the potential and robustness of the interactionist approach to UI design. The findings contribute to the HCI community, and in particular to designers of social systems, by providing guidelines to targeted design that can increase online participation. Copyright © 2013 ACM

    Online Manipulation: Hidden Influences in a Digital World

    Get PDF
    Privacy and surveillance scholars increasingly worry that data collectors can use the information they gather about our behaviors, preferences, interests, incomes, and so on to manipulate us. Yet what it means, exactly, to manipulate someone, and how we might systematically distinguish cases of manipulation from other forms of influence—such as persuasion and coercion—has not been thoroughly enough explored in light of the unprecedented capacities that information technologies and digital media enable. In this paper, we develop a definition of manipulation that addresses these enhanced capacities, investigate how information technologies facilitate manipulative practices, and describe the harms—to individuals and to social institutions—that flow from such practices. We use the term “online manipulation” to highlight the particular class of manipulative practices enabled by a broad range of information technologies. We argue that at its core, manipulation is hidden influence—the covert subversion of another person’s decision-making power. We argue that information technology, for a number of reasons, makes engaging in manipulative practices significantly easier, and it makes the effects of such practices potentially more deeply debilitating. And we argue that by subverting another person’s decision-making power, manipulation undermines his or her autonomy. Given that respect for individual autonomy is a bedrock principle of liberal democracy, the threat of online manipulation is a cause for grave concern
    corecore