77 research outputs found

    The millennial mum:technology use by new mothers

    Get PDF
    Becoming a mother presents a woman with new challenges and a need to access new sources of information. This work considers the increase in the use of online parenting support as the first group of millennials become parents. Initial results from a survey comparing the use of technology pre and post the experience of childbirth is presented. The survey reveals that mothers are likely to increase the time they spend online and are strongly motivated by seeking social contact. The paper concludes by considering the implications of this survey for healthcare professionals wishing to give information and support through online media and suggests how HCI professionals can become involved in this work

    The strategic role of design in supporting knowledge exchange

    Get PDF
    Within the last decade design has had a strategic role in tackling escalating environmental, social and economic problems. Through design thinking, creative methods have been applied to problem solving in a process of collaboration and designers working in new territories and knowledge domains. As the designer has moved further afield the method of Knowledge Exchange (KE) has become more recognised as a democratic approach to collaboration with the ethos that everyone has something creative and productive to offer. This paper provides reflections on early stage findings from a strategic design innovation process in which collaborative partnerships between academics, SMEs and designers emerged through KE and suggests that there is value to be had from using design strategically for not only those from a business or academic background but also for those from the design community and points to a need for more training for designers from all disciplines in how to use design strategically

    Use of an agile bridge in the development of assistive technology

    Get PDF
    Engaging with end users in the development of assistive technologies remains one of the major challenges for researchers and developers in the field of accessibility and HCI. Developing usable software systems for people with complex disabilities is problematic, software developers are wary of using user-centred design, one of the main methods by which usability can be improved, due to concerns about how best to work with adults with complex disabilities, in particular Severe Speech and Physical Impairments (SSPI) and how to involve them in research. This paper reports on how the adoption of an adapted agile approach involving the incorporation of a user advocate on the research team helped in meeting this challenge in one software project and offers suggestions for how this could be used by other development teams

    Understanding audiences from industry sectors in knowledge exchange

    Get PDF
    This essay discusses the concept of Knowledge Exchange between industry and academia. In particular it focuses on ways in which academic organisations can learn about different industry sectors in order to identify potential Knowledge Exchange partners and how they operate. Three case studies of scoping approaches taken in the understanding of these audiences are presented followed by a discussion of their different strengths and weaknesses. This essay concludes with presentation of an initial framework for scoping and suggestions for where this work can be developed in the future

    Case study:exploring children’s password knowledge and practices

    Get PDF
    Children use technology from a very young age, and often have to authenticate themselves. Yet very little attention has been paid to designing authentication specifically for this particular target group. The usual practice is to deploy the ubiquitous password, and this might well be a suboptimal choice. Designing authentication for children requires acknowledgement of child-specific developmental challenges related to literacy, cognitive abilities and differing developmental stages. Understanding the current state of play is essential, to deliver insights that can inform the development of child-centred authentication mechanisms and processes. We carried out a systematic literature review of all research related to children and authentication since 2000. A distinct research gap emerged from the analysis. Thus, we designed and administered a survey to school children in the United States (US), so as to gain insights into their current password usage and behaviors. This paper reports preliminary results from a case study of 189 children (part of a much larger research effort). The findings highlight age-related differences in children’s password understanding and practices. We also discovered that children confuse concepts of safety and security. We conclude by suggesting directions for future research. This paper reports on work in progress.<br/

    Sharing the vision:representing the matters of concern for design-led fledgling companies in Scotland

    Get PDF
    Design is being performed on an ever-increasing spectrum of complex practices arising in response to emerging markets and technologies, co-design, digital interaction, service design and cultures of innovation. This emerging notion of design has led to an expansive array of collaborative and facilitation skills to demonstrate and share how such methods can shape innovation. The meaning of these design things in practice can't be taken for granted as matters of fact, which raises a key challenge for design to represent its role through the contradictory nature of matters of concern. This paper explores an innovative, object-oriented approach within the field of design research, visually combining an actor-network theory framework with situational analysis, to report on the role of design for fledgling companies in Scotland, established and funded through the knowledge exchange hub Design in Action (DiA). Key findings and visual maps are presented from reflective discussions with actors from a selection of the businesses within DiA's portfolio. The suggestion is that any notions of strategic value, of engendering meaningful change, of sharing the vision of design, through design things, should be grounded in the reflexive interpretations of matters of concern that emerge

    Children's password-related books:efficacious, vexatious and incongruous

    Get PDF
    Software is developed specifically for children and this often requires them to authenticate themselves, usually by entering a password. Password hygiene is important for children, because the principles they learn in early life will often endure across their life span. Children learn from their parents, siblings, teachers, and peers. They also learn from educational resources, such as children’s books. We carried out a content analysis of a range of children’s books that aims to educate children about passwords. We used directional coding, as informed by a systematic literature review of methods, such as those used in other content analysis-based studies of children’s books. We examined the principles the books taught, and whether these were correct. We also analysed how the books portrayed the genders of characters, in various roles. We found that principle coverage was variable, with books sometimes teaching outdated principles. Genders were evenly represented in the books. Finally, our analysis revealed conflation of the terms “safety” and “security” in the cyber domain. We conclude the paper by justifying the adjectives we use in the title.</p

    The “three M’s” counter-measures to children’s risky online behaviors:mentor, mitigate and monitor

    Get PDF
    PurposeThe purpose of this paper is to scope the field of child-related online harms and to produce a resource pack to communicate all the different dimensions of this domain to teachers and carers.Design/methodology/approachWith children increasingly operating as independent agents online, their teachers and carers need to understand the risks of their new playground and the range of risk management strategies they can deploy. Carers and teachers play a prominent role in applying the three M’s: mentoring the child, mitigating harms using a variety of technologies (where possible) and monitoring the child’s online activities to ensure their cybersecurity and cybersafety. In this space, the core concepts of “cybersafety” and “cybersecurity” are substantively different and this should be acknowledged for the full range of counter-measures to be appreciated. Evidence of core concept conflation emerged, confirming the need for a resource pack to improve comprehension. A carefully crafted resource pack was developed to convey knowledge of risky behaviors for three age groups and mapped to the appropriate “three M’s” to be used as counter-measures.FindingsThe investigation revealed key concept conflation, and then identified a wide range of harms and countermeasures. The resource pack brings clarity to this domain for all stakeholders.Research limitations/implicationsThe number of people who were involved in the empirical investigation was limited to those living in Scotland and Nigeria, but it is unlikely that the situation is different elsewhere because the internet is global and children’s risky behaviors are likely to be similar across the globe.Originality/valueOthers have investigated this domain, but no one, to the authors’ knowledge, has come up with the “Three M’s” formulation and a visualization-based resource pack that can inform educators and carers in terms of actions they can take to address the harms

    Who is best placed to support cyber responsibilized UK parents?

    Get PDF
    The UK government responsibilizes its citizens when it comes to their cyber security, as do other countries. Governments provide excellent advice online, but do not provide any other direct support. Responsibilization is viable when: (1) risk management activities require only ubiquitous skills, (2) a failure to manage the risk does not affect others in the person’s community. Cybersecurity fails on both counts. Consider that parents and carers are effectively being responsibilized to educate their children about cybersecurity, given that young children cannot be expected to consult and act upon government advice. Previous research suggests that UK parents embrace this responsibility but need help in keeping up to date with cybersecurity ‘best practice’. In this paper, we consider a number of possible sources of parental advice, and conclude that support workers would be best placed to support parents in this domain. We then carried out a study to gauge the acceptability of this source of help. We find that parents would be willing to accept advice from this source, and suggest that cybersecurity academics be recruited to train support workers to ensure that they have current ‘best practice’ cybersecurity knowledge to impart to parents

    Age-appropriate password "best practice'' ontologies for early educators and parents

    Get PDF
    Many mobile apps are developed specifically for use by children. As a consequence, children become actors in world where they use passwords to authenticate themselves from a very young age. As such, there is a need for guidance to inform educators and parents about how to prepare children for responsible password practice. Very little attention has been paid to determining which password-related principles young children should know, and the age at which this information should be imparted. To address this deficiency, we commenced by deriving an ontology of “best practice” password principles from official sources. These password principles encode essential knowledge for password users of all ages and provide a benchmark that can be used to ground a set of age-appropriate ontologies. We compared this benchmark “good practice” ontology to the advice provided by a wide-ranging snapshot of password-related children’s books and parents’ online resources. We then consulted the research literature to identify the skills required to understand and apply each principle, and removed those that were unsuitable for young children. We then consulted parents of young children to help us to confirm the classification of the ontology’s principles in terms of age appropriateness. Parents also helped us to rephrase each principle to maximise accessibility and understandability for each age group. We conclude with our final set of three age-appropriate password best practice ontologies as a helpful resource for early education professionals and parents
    • …
    corecore