SlideShare a Scribd company logo
1 of 25
Download to read offline
Digital health and wellbeing: the case for broadening the
EU DigComp framework
Anícia Rebelo Trindade, Debbie Holley, Célio Gonçalo Marques
ISCTE - Instituto Universitário de Lisboa
20-22 October 2022
Lisbon, Portugal
Hybrid (Online + Face to Face)
2 0 T H o f O c t o b e r 2 0 2 2
16th International Conference on Information Technology and Applications (ICITA)
ICITA2022
CONFERENCE
1.
PROBLEM
3.
METHODOLOGY
4.
RESULTS
5.
CONCLUSIONS
TABLE of
CONTENTS
0.
6.
RECOMMENDATIONS
2.
BACKGROUND
ICITA2022
CONFERENCE
Artificial Intelligence (AI)
health systems
▪ Identifying the necessity
to empower and
educate EU citizens with
critical knowledge, skills,
and attitudes (KSA);
▪ Help EU citizens make
informed choices when
interacting, using health
systems and applications
(apps).
▪ Advances in healthcare artificial
intelligence technologies end up
owned and controlled by private
entities, raising issues and
discussion about privacy, ethics
and protecting patient health
information (Murdoch, 2021).
MOTIVATION
1. PROBLEM
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Competencies recommended
▪ Protecting devices, protecting
personal data and privacy, and
protecting health and well-being
as a pre-requisite essential to
avoid threats to physical,
emotional, and personal health.
AI health concerns
▪ The revised EU framework sets
out a pathway for a
comprehensive understanding
about what AI systems do/do not;
how do AI systems work; how to
interact with AI systems for
different daily routines
RELEVANCE OF THE STUDY
1. PROBLEM
AUTHORS
Chang, 2020; Murdoch (2021); Vuorikari, Kluzer & Punie, 2022
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Research:
▪ Do European Union (EU) citizens need to engage with the digital
environment in a confident, critical, and responsible way for
participation in society in the safety area of the DigComp
framework
RESEARCH QUESTION
1. PROBLEM
?
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
THEORETICAL ASSUMPTIONS
2. BACKGROUND
Data breaches
▪ Illegal disclosure or use
of data information
without authorization of
the main information
owner;
▪ Growing and regular
threat to the ordinary
citizen.
complex problems
emerging from the
capture and treatment of
sensitive data
▪ Empowering and educating
citizens to take the
responsibility of protecting
their own personal data;
▪ New policy implementation
approaches;
▪ Personal data and their
health and medical
conditions.
AUTHORS
Chang, 2020; Fornasier, 2021; Goldsmith, Holley & Quinney, 2020; Seh et al, 2020; Singh et al, 2021; Vuorikari, Kluzer & Punie, 2022).
▪ EU citizens need the
skills to embrace
“digital” to secure
employment, to
communicate;
▪ To shop, and
increasingly to access
health apps and
systems regarding their
own physical and
mental health needs.
Digital Competence
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
▪ To answer this challenge, qualitative research was conducted and designed
by a group of experts, working as part of the wider Community of Practice
(CoP), using a Design-Based Research (DBR) approach (Mckenney &
Reeves, 2014; Plomp, 2013);
▪ To propose the new KSA encompassed in the revised European DigComp
2.2 framework for safety, security, and well-being competencies, required
for EU citizens negotiating a complex and constantly changing of health
sector;
▪ Design-based research (DBR) protocol combines theory with practice and
is used when complex decisions and multiple voices are to be collated and
represented. In this case, the stakeholders comprised experts, volunteers,
and Joint Research Centre (JRC) leadership.
3. METHODOLOGY
METHODOLOGICAL OPTIONS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
3. METHODOLOGY
METHODOLOGICAL OPTIONS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
▪ The DBR approach was implemented through into four cycles, as proposed
by Plomp (2013), and involves:
▪ I) Analyze existing practical problems;
▪ II) Develop innovative solutions based on existing design principles;
▪ III) Create iterative cycles of tests for the improvement of the solutions
in practice;
▪ IV) Reflect on the principles of improvement of the implemented
solutions.
Figure I. Digcomp Revision 2.2 Steps
3. METHODOLOGY
METHODOLOGICAL OPTIONS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Source: https://tinyurl.com/4xwwx6xc
Existing practical
problems
Based on literature
Proposing and selecting
requirements for a
safety, security and well-
being, perspective
Linked to the different
competences of the
Framework 2.1
Expert brainstorming Focus group sessions
PRODUCT
Organization of three
strands of discussion:
1) E-Health/well-being;
2) Opportunities and
limits to digital
protection;
3) How to build safety
and security step by step
in the development of
users (cf. younger
students, active workers,
and elderly people).
3. METHODOLOGY
PHASE I & II . ANALYSIS
Identification of the
new digital
competence
requirements for
citizens
Figure 2. Step 1 and 2 (Initiation and collection of examples) - Analysis of existing practical problems
Dec. 15th, 2020 to Feb. 28th, 2021
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Innovative
solutions
Literature review that
inform the scope of
safety, security and
well-being
Applying underpinning
literature and values
Triangulated back
through to the DigComp
2.1 framework
Expert brainstorming
Requirements
identified, along with
suggestions about
where they might fit
PRODUCT
Initial suggestions for
relevant knowledge,
skills and attitudes
(KSA):
Digital competence 4.1
protecting devices; 4.2
protecting personal data
and privacy; and 4.3
protecting health and
well-being).
3. METHODOLOGY
PHASE III & IV . DEVELOPMENT
Based on existing
design principles
Figure 3. Step 3 and 4 (Initiation and collection of examples) - Analysis of existing practical problems
Mar., 2021 to Jun., 2021
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Creation of
iterative
sequences
Iterative peer
review/reflective cycle
of work
Online questionnaires
Expert brainstorming
meetings
373 Stakeholders/experts
and 31 experts in the field
of safety, security, and well-
being, civil society
Focus group
discussions
PRODUCT
Collected more than
hundred statements
(n=133) for the safety
area (51 statements
(KSA) related with the
digital competence
“protecting devices”
and its components; 41
statements (KSA)
related with “protecting
personal data and
privacy”, and 41
statements related with
“protecting health and
well-being”).
3. METHODOLOGY
PHASE V & VI . ITERATIVE PEER REVIEW
Improvement of
the solutions in
practices
Figura 4. Step 5 and 6 - Create iterative cycles of tests for the improvement of the solutions in practice.
Sep., 2021 to Oct., 2021
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
3. METHODOLOGY
PHASE VII & VIII REFLECT
Figura 2. Step 7 and 8 - Reflect on the principles of improvement of the implemented solutions
Nov., 2021 to Feb., 2022
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
▪ On phase seven and eight only few KSA were selected to be included on the
Digcomp 2.2 update;
▪ The survey collected additional comments about the Digcomp 2.2 update,
which were useful to rephrase some proposed statements.
▪ The survey was completed online by a broad range of stakeholders, from
different countries and organizations across Europe.
3. METHODOLOGY
PHASE VII & VIII REFLECT
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Digital
competence
no. KSA
proposed by
experts (phase
3 and 4)
no. KSA
selected by JRC
for survey
validation
(phase 5 and 6)
no. KSA
selected by
experts related
with digital
health and AI
no. of KSA
selected through
public validation
to DigComp 2.2
(phase 7 and 8)
4.1 - Protecting
devices 51 20 17 14
4.2 - Protecting
personal data and
privacy
41 20 16 9
4.3 - protecting
health and well-
being
41 21 12 14
Total 133 61 45 37
Source: Expert working group statements (KSA) results regarding digital competence 4.1, 4.2 and 4.3,
survey validation results and final statements of DigComp 2.2 at Vuorikari, Kluzer & Punie, 2022, p. 35 – 40.
Table 1. Process of selection of KSA for DigComp 2.2 update
4.1 PROTECTING DEVICES
4. RESULTS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Examples of final KSA related with digital health for digital competence
4.1 - protecting devices presented in the survey validation and were
excluded of the DigComp framework 2.2
K4
Aware of “social engineering” that uses psychological manipulation to
obtain confidential information (passwords, pin-codes) from victims or
convince them to take a harmful action (execute malicious software).
(NI)
S7
Can respond to a security breach (an incident that results in
unauthorized access to digital data, applications, networks or devices), a
personal data breach (leakage of their login and passwords) or a
malware attack (contain viruses) or a malware attack (ransomware). (IA)
A3
Vigilant towards practices to protect devices and digital content as
security risks are always evolving. (NI)
4.1 PROTECTING DEVICES
4. RESULTS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
▪ The competence of ‘protecting devices’ now articulated clearly
previously invisible types of KSA such as identity theft,
psychological manipulation, cyber-attacks, vulnerabilities, and
protection against malicious software.
▪ The experts believe that those KSA (n= 5), that were not covered by
the DigComp framework, are still very important, regarding the
threats and risks that all citizens face in their daily routine (see
proceedings for detail).
▪ This is supported by the work of Seh et al, (2020) who clearly
identify data breach as one of the major concerns of digital health
data protection.
4.2 PERSONAL DATA AND PRIVACY
4. RESULTS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Examples of final KSA related with digital health for digital
competence 4.2 - protecting personal data and privacy presented in
the survey validation and were excluded from the DigComp framework
2.2.
k4
Aware that a security or privacy incident can result in loss of
control, compromise, unauthorized disclosure, acquisition, or
access to personal data, in physical or electronic form. (NI)
S5
If informed by data controllers that there has been a data
breach affecting users, act accordingly to take actions to
mitigate the impact (change all passwords immediately, not
just the one known to be compromised). (NI)
A3
Weighs the benefits and risks before engaging with software
that uses biometric data (voice, face images), checking that it
complies with GDPR. (NI)
4.2 PERSONAL DATA AND PRIVACY
4. RESULTS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
▪ The group of experts selected 16 of the 20 statements submitted to
public validation, which were related to digital health behaviours
that all citizens need to acquire, in order to protect them and
others, against risks and cyber-attacks of data health information.
▪ Nevertheless, half of these KSA were unable to be included in
DigComp 2.2 (n= 8) see proceedings for detail.
4.3 HEALTH AND WELL-BEING
4. RESULTS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Examples of final knowledge and attitudes related with digital health
for digital competence 4.3 - protecting health and wellbeing presented
in the survey validation and were excluded of the DigComp framework
2.2
K3
Knows that for many digital health applications, there are no
official licensing procedures like is the case in classical
medicine. (NI)
K6
Able to decide whether to deal with an online problem
situation alone or to recruit professional or informal help. (NI)
A4 Being willing not to harm others online. (NI)
4.3 HEALTH AND WELL-BEING
4. RESULTS
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
▪ Regarding health and well-being, among the 20 statements submitted
to public validation, the experts found 12 statements relating to the
digital health behaviour (KSA), which were crucial in preventing
citizens from neglecting aspects of their digital health data.
▪ Nevertheless, even though all 12 statements selected, five of them
(n=5) were not selected for inclusion in the DigComp 2.2 (see
proceedings for detail).
ESSENTIAL KSA
5. CONCLUSIONS
Critically the
implications for
health, security and
wellbeing
▪The researchers refined and distilled to the essential
components of Knowledge Skills and Attitudes (KSA) as
required by the EU DigComp team.
▪Gathering of an extensive evidence base to inform the final
recommendations, and although not all were included in the
revised version, the gaps in knowledge have been articulated
and identified for further work.
- Promote a more critical engagement with digital health
provision;
- The themes that were not included in the final new
DIGICOMP update remain crucial in helping and supporting EU
citizens to take informed decisions regarding their security,
health and wellbeing on AI apps;
- Digital health apps become increasing prevalent as health
services move increasing online.
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Data collected
(unable to be
included) needs
wide dissemination
throughout
academic, social,
and professional
networks.
To empower and educate
citizens of the future to
have the confidence to
interact, evaluate and
protect their privacy
whilst using medical apps,
building these topics into
educational curricula is
essential at all levels of
schooling and further
study.
An EU funded
education package for
all citizens as part of the
EU life-long learning
movement.
6. RECOMMENDATIONS
DATA COLLECTED
1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
Chang, A. (2020). The role of artificial intelligence in digital health. In S. Wulfovich & A. Meyers (Eds.).
Digital health entrepreneurship (pp. 71-81). Cham: Springer.
Center for Open Data Enterprise (2019). CODE, Sharing and utilizing health data for AI applications.
Washington, DC: Center for Open Data Enterprise.
Ferrari, A. (2012). Digital competence in practice: An analysis of frameworks. European Commission.
Ferrari, A. (2013). DigComp: A framework for developing and understanding digital competence in Europe.
European Commission.
Fornasier, M. de O. (2021). The use of AI in digital health services and privacy regulation in GDPR and LGPD
between revolution and (dis)respect. RIL Brasília, 59 (233), 201-220.
Goldsmith, B., Holley, D., & Quinney, A. (2020). The best way of promoting digital wellbeing in HE?,
https://lmutake5.wordpress.com/2020/09/24/take5-47-the-best-way-of-promoting-digital-wellbeing-in-
he/
McKenney, S., Reeves, T.C. (2014). Educational Design Research. In: J. Spector, M. Merrill, J., Elen, & M.
Bishop (Eds.), Handbook of Research on Educational Communications and Technology. New York, NY:
Springer.
Murdoch, B. (2021). Privacy and artificial intelligence: Challenges for protecting health information in a
new era. BMC Medical Ethics, 22(122), 1-5.
REFERENCES
Plomp, T. (2013). Educational design research: An introduction. In T. Plomp & N. Nienke (Eds.), Educational
design research: Part A: An introduction (pp. 10–51). Enschede: SLO - Netherlands Institute for Curriculum
Development.
Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad K. R. (2020). Healthcare
data breaches: Insights and implications. Healthcare, 8 (2), 2227-9032.
Singh, A. K., Anand, A., Lv, Z., Ko, H., & Mohan, A. (2021). A survey on healthcare data: a security
perspective. ACM Transactions on Multimidia Computing Communications and Applications, 17(2), 1-26.
Tuckman, B. W. (2012). Manual de investigação em educação: Metodologia para conceber e realizar o
processo de investigação científica. Lisboa: Fundação Calouste Gulbenkian.
Vuorikari. R., Kluzer, S., & Punie, Y. (2022). DigComp 2.2: The digital competence framework for citizens
with new examples of knowledge, skills and attitudes. European Commission.
REFERENCES
Thanks!
Anícia Rebelo Trindade, Debbie Holley, Célio Gonçalo Marques
ISCTE - Instituto Universitário de Lisboa
20-22 October 2022
Lisbon, Portugal
Hybrid (Online + Face to Face)
2 0 T H o f O c t o b e r 2 0 2 2
16th International Conference on Information Technology and Applications (ICITA)
ICITA2022
CONFERENCE

More Related Content

Similar to Digital health and wellbeing: the case for broadening the EU DigComp framework

AI, Productivity, Innovation, and Sustainability
AI, Productivity, Innovation, and SustainabilityAI, Productivity, Innovation, and Sustainability
AI, Productivity, Innovation, and SustainabilityRobin Teigland
 
Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )Riina Vuorikari
 
University Public Driven Applications - Big Data and Organizational Design
University Public Driven Applications - Big Data and Organizational Design University Public Driven Applications - Big Data and Organizational Design
University Public Driven Applications - Big Data and Organizational Design maria chiara pettenati
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...IRJET Journal
 
Towards well being in digital media education
Towards well being in digital media educationTowards well being in digital media education
Towards well being in digital media educationdebbieholley1
 
From Carer to CarerPlus: Digital competences in the care worker sector
From Carer to CarerPlus: Digital competences in the care worker sectorFrom Carer to CarerPlus: Digital competences in the care worker sector
From Carer to CarerPlus: Digital competences in the care worker sectorCARER+ Project
 
EU health research funding opportunities
EU health research funding opportunitiesEU health research funding opportunities
EU health research funding opportunitiesdoctrid2012
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...IOSR Journals
 
Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...
Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...
Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...IRJET Journal
 
Best practices for digital tool inclusiceness & farmer co-creation of practices
Best practices for digital tool inclusiceness & farmer co-creation of practicesBest practices for digital tool inclusiceness & farmer co-creation of practices
Best practices for digital tool inclusiceness & farmer co-creation of practicesSadie W Shelton
 
iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr
 
Benefits and Hurdles of AI In The Workplace – What Comes Next?
Benefits and Hurdles of AI In The Workplace – What Comes Next?Benefits and Hurdles of AI In The Workplace – What Comes Next?
Benefits and Hurdles of AI In The Workplace – What Comes Next?CSCJournals
 
Výzkum digitálních kompetencí
Výzkum digitálních kompetencíVýzkum digitálních kompetencí
Výzkum digitálních kompetencíMichal Černý
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitysandeepnani2260
 
2. Evaluating the impact of dissemination via social media
2. Evaluating the impact of dissemination via social media2. Evaluating the impact of dissemination via social media
2. Evaluating the impact of dissemination via social mediadesignanddigitalworld
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016Rui Silva
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 

Similar to Digital health and wellbeing: the case for broadening the EU DigComp framework (20)

AI, Productivity, Innovation, and Sustainability
AI, Productivity, Innovation, and SustainabilityAI, Productivity, Innovation, and Sustainability
AI, Productivity, Innovation, and Sustainability
 
Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )
 
COVID-19 Evidence Network to support Decision-making (COVID-END): Resources t...
COVID-19 Evidence Network to support Decision-making (COVID-END): Resources t...COVID-19 Evidence Network to support Decision-making (COVID-END): Resources t...
COVID-19 Evidence Network to support Decision-making (COVID-END): Resources t...
 
ISA.pdf
ISA.pdfISA.pdf
ISA.pdf
 
University Public Driven Applications - Big Data and Organizational Design
University Public Driven Applications - Big Data and Organizational Design University Public Driven Applications - Big Data and Organizational Design
University Public Driven Applications - Big Data and Organizational Design
 
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
AI-based Mechanism to Authorise Beneficiaries at Covid Vaccination Camps usin...
 
Towards well being in digital media education
Towards well being in digital media educationTowards well being in digital media education
Towards well being in digital media education
 
From Carer to CarerPlus: Digital competences in the care worker sector
From Carer to CarerPlus: Digital competences in the care worker sectorFrom Carer to CarerPlus: Digital competences in the care worker sector
From Carer to CarerPlus: Digital competences in the care worker sector
 
EU health research funding opportunities
EU health research funding opportunitiesEU health research funding opportunities
EU health research funding opportunities
 
Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...Recapitulating the development initiatives of a robust information security s...
Recapitulating the development initiatives of a robust information security s...
 
Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...
Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...
Symptom-Based Prediction of COVID-19 using Machine Learning Models with SMOTE...
 
Best practices for digital tool inclusiceness & farmer co-creation of practices
Best practices for digital tool inclusiceness & farmer co-creation of practicesBest practices for digital tool inclusiceness & farmer co-creation of practices
Best practices for digital tool inclusiceness & farmer co-creation of practices
 
iwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generationiwatchjr | Next Generation Wearable for Young Generation
iwatchjr | Next Generation Wearable for Young Generation
 
Benefits and Hurdles of AI In The Workplace – What Comes Next?
Benefits and Hurdles of AI In The Workplace – What Comes Next?Benefits and Hurdles of AI In The Workplace – What Comes Next?
Benefits and Hurdles of AI In The Workplace – What Comes Next?
 
Výzkum digitálních kompetencí
Výzkum digitálních kompetencíVýzkum digitálních kompetencí
Výzkum digitálních kompetencí
 
cse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber securitycse-csp batch4 review-1.1.pptx cyber security
cse-csp batch4 review-1.1.pptx cyber security
 
2. Evaluating the impact of dissemination via social media
2. Evaluating the impact of dissemination via social media2. Evaluating the impact of dissemination via social media
2. Evaluating the impact of dissemination via social media
 
Poster ECIS 2016
Poster ECIS 2016Poster ECIS 2016
Poster ECIS 2016
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 

More from debbieholley1

Spaghetti Symphony to Technology Harmony
Spaghetti Symphony to Technology  HarmonySpaghetti Symphony to Technology  Harmony
Spaghetti Symphony to Technology Harmonydebbieholley1
 
Student reboot 4.0: the affordances of their Brave New World
Student reboot 4.0: the affordances of their Brave New WorldStudent reboot 4.0: the affordances of their Brave New World
Student reboot 4.0: the affordances of their Brave New Worlddebbieholley1
 
Valuing the invisible: metrics and meaning
Valuing the invisible: metrics and meaningValuing the invisible: metrics and meaning
Valuing the invisible: metrics and meaningdebbieholley1
 
Towards a taxonomy of scale: a sustainable approach
Towards a taxonomy of scale: a sustainable approachTowards a taxonomy of scale: a sustainable approach
Towards a taxonomy of scale: a sustainable approachdebbieholley1
 
The Brave New World of the University of Bedfordshire (v4.0)
The Brave New World of the University of Bedfordshire (v4.0)  The Brave New World of the University of Bedfordshire (v4.0)
The Brave New World of the University of Bedfordshire (v4.0) debbieholley1
 
Creating authentic learning environments: An evaluation of Godzilla (II) the...
Creating authentic learning environments: An evaluation of  Godzilla (II) the...Creating authentic learning environments: An evaluation of  Godzilla (II) the...
Creating authentic learning environments: An evaluation of Godzilla (II) the...debbieholley1
 
Tech Chat: technology mediated learning
Tech Chat: technology mediated learning Tech Chat: technology mediated learning
Tech Chat: technology mediated learning debbieholley1
 
Creating a culture for learning
Creating a culture for learning Creating a culture for learning
Creating a culture for learning debbieholley1
 
Why students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for workWhy students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for workdebbieholley1
 
A manifesto for the metaverse: opportunities and challenges for learning deve...
A manifesto for the metaverse: opportunities and challenges for learning deve...A manifesto for the metaverse: opportunities and challenges for learning deve...
A manifesto for the metaverse: opportunities and challenges for learning deve...debbieholley1
 
Recognition for learning developers
Recognition for learning developersRecognition for learning developers
Recognition for learning developersdebbieholley1
 
Why students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for workWhy students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for workdebbieholley1
 
Simulation theory briefing paper (ALDinHE Conference 2023)
Simulation theory briefing paper (ALDinHE Conference 2023) Simulation theory briefing paper (ALDinHE Conference 2023)
Simulation theory briefing paper (ALDinHE Conference 2023) debbieholley1
 
Technostress and the student experience
Technostress and the student experienceTechnostress and the student experience
Technostress and the student experiencedebbieholley1
 
Harnessing the Blend: Creating authentic learning experiences
Harnessing the Blend: Creating authentic learning experiencesHarnessing the Blend: Creating authentic learning experiences
Harnessing the Blend: Creating authentic learning experiencesdebbieholley1
 
Metaphor (money) and Metaverse
Metaphor (money) and MetaverseMetaphor (money) and Metaverse
Metaphor (money) and Metaversedebbieholley1
 
"The future is human, and the future of learning is immersive": discuss
 "The future is human, and the future of learning is immersive": discuss  "The future is human, and the future of learning is immersive": discuss
"The future is human, and the future of learning is immersive": discuss debbieholley1
 
Hololens_a starting point
Hololens_a starting pointHololens_a starting point
Hololens_a starting pointdebbieholley1
 
The promise of technology
The promise of technologyThe promise of technology
The promise of technologydebbieholley1
 
Glossary_Tech_ January 23.docx
Glossary_Tech_ January 23.docxGlossary_Tech_ January 23.docx
Glossary_Tech_ January 23.docxdebbieholley1
 

More from debbieholley1 (20)

Spaghetti Symphony to Technology Harmony
Spaghetti Symphony to Technology  HarmonySpaghetti Symphony to Technology  Harmony
Spaghetti Symphony to Technology Harmony
 
Student reboot 4.0: the affordances of their Brave New World
Student reboot 4.0: the affordances of their Brave New WorldStudent reboot 4.0: the affordances of their Brave New World
Student reboot 4.0: the affordances of their Brave New World
 
Valuing the invisible: metrics and meaning
Valuing the invisible: metrics and meaningValuing the invisible: metrics and meaning
Valuing the invisible: metrics and meaning
 
Towards a taxonomy of scale: a sustainable approach
Towards a taxonomy of scale: a sustainable approachTowards a taxonomy of scale: a sustainable approach
Towards a taxonomy of scale: a sustainable approach
 
The Brave New World of the University of Bedfordshire (v4.0)
The Brave New World of the University of Bedfordshire (v4.0)  The Brave New World of the University of Bedfordshire (v4.0)
The Brave New World of the University of Bedfordshire (v4.0)
 
Creating authentic learning environments: An evaluation of Godzilla (II) the...
Creating authentic learning environments: An evaluation of  Godzilla (II) the...Creating authentic learning environments: An evaluation of  Godzilla (II) the...
Creating authentic learning environments: An evaluation of Godzilla (II) the...
 
Tech Chat: technology mediated learning
Tech Chat: technology mediated learning Tech Chat: technology mediated learning
Tech Chat: technology mediated learning
 
Creating a culture for learning
Creating a culture for learning Creating a culture for learning
Creating a culture for learning
 
Why students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for workWhy students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for work
 
A manifesto for the metaverse: opportunities and challenges for learning deve...
A manifesto for the metaverse: opportunities and challenges for learning deve...A manifesto for the metaverse: opportunities and challenges for learning deve...
A manifesto for the metaverse: opportunities and challenges for learning deve...
 
Recognition for learning developers
Recognition for learning developersRecognition for learning developers
Recognition for learning developers
 
Why students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for workWhy students engage in simulation and how it prepares them for work
Why students engage in simulation and how it prepares them for work
 
Simulation theory briefing paper (ALDinHE Conference 2023)
Simulation theory briefing paper (ALDinHE Conference 2023) Simulation theory briefing paper (ALDinHE Conference 2023)
Simulation theory briefing paper (ALDinHE Conference 2023)
 
Technostress and the student experience
Technostress and the student experienceTechnostress and the student experience
Technostress and the student experience
 
Harnessing the Blend: Creating authentic learning experiences
Harnessing the Blend: Creating authentic learning experiencesHarnessing the Blend: Creating authentic learning experiences
Harnessing the Blend: Creating authentic learning experiences
 
Metaphor (money) and Metaverse
Metaphor (money) and MetaverseMetaphor (money) and Metaverse
Metaphor (money) and Metaverse
 
"The future is human, and the future of learning is immersive": discuss
 "The future is human, and the future of learning is immersive": discuss  "The future is human, and the future of learning is immersive": discuss
"The future is human, and the future of learning is immersive": discuss
 
Hololens_a starting point
Hololens_a starting pointHololens_a starting point
Hololens_a starting point
 
The promise of technology
The promise of technologyThe promise of technology
The promise of technology
 
Glossary_Tech_ January 23.docx
Glossary_Tech_ January 23.docxGlossary_Tech_ January 23.docx
Glossary_Tech_ January 23.docx
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Digital health and wellbeing: the case for broadening the EU DigComp framework

  • 1. Digital health and wellbeing: the case for broadening the EU DigComp framework Anícia Rebelo Trindade, Debbie Holley, Célio Gonçalo Marques ISCTE - Instituto Universitário de Lisboa 20-22 October 2022 Lisbon, Portugal Hybrid (Online + Face to Face) 2 0 T H o f O c t o b e r 2 0 2 2 16th International Conference on Information Technology and Applications (ICITA) ICITA2022 CONFERENCE
  • 3. Artificial Intelligence (AI) health systems ▪ Identifying the necessity to empower and educate EU citizens with critical knowledge, skills, and attitudes (KSA); ▪ Help EU citizens make informed choices when interacting, using health systems and applications (apps). ▪ Advances in healthcare artificial intelligence technologies end up owned and controlled by private entities, raising issues and discussion about privacy, ethics and protecting patient health information (Murdoch, 2021). MOTIVATION 1. PROBLEM 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 4. Competencies recommended ▪ Protecting devices, protecting personal data and privacy, and protecting health and well-being as a pre-requisite essential to avoid threats to physical, emotional, and personal health. AI health concerns ▪ The revised EU framework sets out a pathway for a comprehensive understanding about what AI systems do/do not; how do AI systems work; how to interact with AI systems for different daily routines RELEVANCE OF THE STUDY 1. PROBLEM AUTHORS Chang, 2020; Murdoch (2021); Vuorikari, Kluzer & Punie, 2022 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 5. Research: ▪ Do European Union (EU) citizens need to engage with the digital environment in a confident, critical, and responsible way for participation in society in the safety area of the DigComp framework RESEARCH QUESTION 1. PROBLEM ? 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 6. THEORETICAL ASSUMPTIONS 2. BACKGROUND Data breaches ▪ Illegal disclosure or use of data information without authorization of the main information owner; ▪ Growing and regular threat to the ordinary citizen. complex problems emerging from the capture and treatment of sensitive data ▪ Empowering and educating citizens to take the responsibility of protecting their own personal data; ▪ New policy implementation approaches; ▪ Personal data and their health and medical conditions. AUTHORS Chang, 2020; Fornasier, 2021; Goldsmith, Holley & Quinney, 2020; Seh et al, 2020; Singh et al, 2021; Vuorikari, Kluzer & Punie, 2022). ▪ EU citizens need the skills to embrace “digital” to secure employment, to communicate; ▪ To shop, and increasingly to access health apps and systems regarding their own physical and mental health needs. Digital Competence 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 7. ▪ To answer this challenge, qualitative research was conducted and designed by a group of experts, working as part of the wider Community of Practice (CoP), using a Design-Based Research (DBR) approach (Mckenney & Reeves, 2014; Plomp, 2013); ▪ To propose the new KSA encompassed in the revised European DigComp 2.2 framework for safety, security, and well-being competencies, required for EU citizens negotiating a complex and constantly changing of health sector; ▪ Design-based research (DBR) protocol combines theory with practice and is used when complex decisions and multiple voices are to be collated and represented. In this case, the stakeholders comprised experts, volunteers, and Joint Research Centre (JRC) leadership. 3. METHODOLOGY METHODOLOGICAL OPTIONS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 8. 3. METHODOLOGY METHODOLOGICAL OPTIONS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS ▪ The DBR approach was implemented through into four cycles, as proposed by Plomp (2013), and involves: ▪ I) Analyze existing practical problems; ▪ II) Develop innovative solutions based on existing design principles; ▪ III) Create iterative cycles of tests for the improvement of the solutions in practice; ▪ IV) Reflect on the principles of improvement of the implemented solutions.
  • 9. Figure I. Digcomp Revision 2.2 Steps 3. METHODOLOGY METHODOLOGICAL OPTIONS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS Source: https://tinyurl.com/4xwwx6xc
  • 10. Existing practical problems Based on literature Proposing and selecting requirements for a safety, security and well- being, perspective Linked to the different competences of the Framework 2.1 Expert brainstorming Focus group sessions PRODUCT Organization of three strands of discussion: 1) E-Health/well-being; 2) Opportunities and limits to digital protection; 3) How to build safety and security step by step in the development of users (cf. younger students, active workers, and elderly people). 3. METHODOLOGY PHASE I & II . ANALYSIS Identification of the new digital competence requirements for citizens Figure 2. Step 1 and 2 (Initiation and collection of examples) - Analysis of existing practical problems Dec. 15th, 2020 to Feb. 28th, 2021 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 11. Innovative solutions Literature review that inform the scope of safety, security and well-being Applying underpinning literature and values Triangulated back through to the DigComp 2.1 framework Expert brainstorming Requirements identified, along with suggestions about where they might fit PRODUCT Initial suggestions for relevant knowledge, skills and attitudes (KSA): Digital competence 4.1 protecting devices; 4.2 protecting personal data and privacy; and 4.3 protecting health and well-being). 3. METHODOLOGY PHASE III & IV . DEVELOPMENT Based on existing design principles Figure 3. Step 3 and 4 (Initiation and collection of examples) - Analysis of existing practical problems Mar., 2021 to Jun., 2021 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 12. Creation of iterative sequences Iterative peer review/reflective cycle of work Online questionnaires Expert brainstorming meetings 373 Stakeholders/experts and 31 experts in the field of safety, security, and well- being, civil society Focus group discussions PRODUCT Collected more than hundred statements (n=133) for the safety area (51 statements (KSA) related with the digital competence “protecting devices” and its components; 41 statements (KSA) related with “protecting personal data and privacy”, and 41 statements related with “protecting health and well-being”). 3. METHODOLOGY PHASE V & VI . ITERATIVE PEER REVIEW Improvement of the solutions in practices Figura 4. Step 5 and 6 - Create iterative cycles of tests for the improvement of the solutions in practice. Sep., 2021 to Oct., 2021 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 13. 3. METHODOLOGY PHASE VII & VIII REFLECT Figura 2. Step 7 and 8 - Reflect on the principles of improvement of the implemented solutions Nov., 2021 to Feb., 2022 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS ▪ On phase seven and eight only few KSA were selected to be included on the Digcomp 2.2 update; ▪ The survey collected additional comments about the Digcomp 2.2 update, which were useful to rephrase some proposed statements. ▪ The survey was completed online by a broad range of stakeholders, from different countries and organizations across Europe.
  • 14. 3. METHODOLOGY PHASE VII & VIII REFLECT 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS Digital competence no. KSA proposed by experts (phase 3 and 4) no. KSA selected by JRC for survey validation (phase 5 and 6) no. KSA selected by experts related with digital health and AI no. of KSA selected through public validation to DigComp 2.2 (phase 7 and 8) 4.1 - Protecting devices 51 20 17 14 4.2 - Protecting personal data and privacy 41 20 16 9 4.3 - protecting health and well- being 41 21 12 14 Total 133 61 45 37 Source: Expert working group statements (KSA) results regarding digital competence 4.1, 4.2 and 4.3, survey validation results and final statements of DigComp 2.2 at Vuorikari, Kluzer & Punie, 2022, p. 35 – 40. Table 1. Process of selection of KSA for DigComp 2.2 update
  • 15. 4.1 PROTECTING DEVICES 4. RESULTS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS Examples of final KSA related with digital health for digital competence 4.1 - protecting devices presented in the survey validation and were excluded of the DigComp framework 2.2 K4 Aware of “social engineering” that uses psychological manipulation to obtain confidential information (passwords, pin-codes) from victims or convince them to take a harmful action (execute malicious software). (NI) S7 Can respond to a security breach (an incident that results in unauthorized access to digital data, applications, networks or devices), a personal data breach (leakage of their login and passwords) or a malware attack (contain viruses) or a malware attack (ransomware). (IA) A3 Vigilant towards practices to protect devices and digital content as security risks are always evolving. (NI)
  • 16. 4.1 PROTECTING DEVICES 4. RESULTS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS ▪ The competence of ‘protecting devices’ now articulated clearly previously invisible types of KSA such as identity theft, psychological manipulation, cyber-attacks, vulnerabilities, and protection against malicious software. ▪ The experts believe that those KSA (n= 5), that were not covered by the DigComp framework, are still very important, regarding the threats and risks that all citizens face in their daily routine (see proceedings for detail). ▪ This is supported by the work of Seh et al, (2020) who clearly identify data breach as one of the major concerns of digital health data protection.
  • 17. 4.2 PERSONAL DATA AND PRIVACY 4. RESULTS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS Examples of final KSA related with digital health for digital competence 4.2 - protecting personal data and privacy presented in the survey validation and were excluded from the DigComp framework 2.2. k4 Aware that a security or privacy incident can result in loss of control, compromise, unauthorized disclosure, acquisition, or access to personal data, in physical or electronic form. (NI) S5 If informed by data controllers that there has been a data breach affecting users, act accordingly to take actions to mitigate the impact (change all passwords immediately, not just the one known to be compromised). (NI) A3 Weighs the benefits and risks before engaging with software that uses biometric data (voice, face images), checking that it complies with GDPR. (NI)
  • 18. 4.2 PERSONAL DATA AND PRIVACY 4. RESULTS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS ▪ The group of experts selected 16 of the 20 statements submitted to public validation, which were related to digital health behaviours that all citizens need to acquire, in order to protect them and others, against risks and cyber-attacks of data health information. ▪ Nevertheless, half of these KSA were unable to be included in DigComp 2.2 (n= 8) see proceedings for detail.
  • 19. 4.3 HEALTH AND WELL-BEING 4. RESULTS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS Examples of final knowledge and attitudes related with digital health for digital competence 4.3 - protecting health and wellbeing presented in the survey validation and were excluded of the DigComp framework 2.2 K3 Knows that for many digital health applications, there are no official licensing procedures like is the case in classical medicine. (NI) K6 Able to decide whether to deal with an online problem situation alone or to recruit professional or informal help. (NI) A4 Being willing not to harm others online. (NI)
  • 20. 4.3 HEALTH AND WELL-BEING 4. RESULTS 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS ▪ Regarding health and well-being, among the 20 statements submitted to public validation, the experts found 12 statements relating to the digital health behaviour (KSA), which were crucial in preventing citizens from neglecting aspects of their digital health data. ▪ Nevertheless, even though all 12 statements selected, five of them (n=5) were not selected for inclusion in the DigComp 2.2 (see proceedings for detail).
  • 21. ESSENTIAL KSA 5. CONCLUSIONS Critically the implications for health, security and wellbeing ▪The researchers refined and distilled to the essential components of Knowledge Skills and Attitudes (KSA) as required by the EU DigComp team. ▪Gathering of an extensive evidence base to inform the final recommendations, and although not all were included in the revised version, the gaps in knowledge have been articulated and identified for further work. - Promote a more critical engagement with digital health provision; - The themes that were not included in the final new DIGICOMP update remain crucial in helping and supporting EU citizens to take informed decisions regarding their security, health and wellbeing on AI apps; - Digital health apps become increasing prevalent as health services move increasing online. 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 22. Data collected (unable to be included) needs wide dissemination throughout academic, social, and professional networks. To empower and educate citizens of the future to have the confidence to interact, evaluate and protect their privacy whilst using medical apps, building these topics into educational curricula is essential at all levels of schooling and further study. An EU funded education package for all citizens as part of the EU life-long learning movement. 6. RECOMMENDATIONS DATA COLLECTED 1. PROBLEM |2. BACKGROUND|3. METHODOLOGY|4. RESULTS| 5. CONCLUSIONS| 6. RECOMMENDATIONS
  • 23. Chang, A. (2020). The role of artificial intelligence in digital health. In S. Wulfovich & A. Meyers (Eds.). Digital health entrepreneurship (pp. 71-81). Cham: Springer. Center for Open Data Enterprise (2019). CODE, Sharing and utilizing health data for AI applications. Washington, DC: Center for Open Data Enterprise. Ferrari, A. (2012). Digital competence in practice: An analysis of frameworks. European Commission. Ferrari, A. (2013). DigComp: A framework for developing and understanding digital competence in Europe. European Commission. Fornasier, M. de O. (2021). The use of AI in digital health services and privacy regulation in GDPR and LGPD between revolution and (dis)respect. RIL Brasília, 59 (233), 201-220. Goldsmith, B., Holley, D., & Quinney, A. (2020). The best way of promoting digital wellbeing in HE?, https://lmutake5.wordpress.com/2020/09/24/take5-47-the-best-way-of-promoting-digital-wellbeing-in- he/ McKenney, S., Reeves, T.C. (2014). Educational Design Research. In: J. Spector, M. Merrill, J., Elen, & M. Bishop (Eds.), Handbook of Research on Educational Communications and Technology. New York, NY: Springer. Murdoch, B. (2021). Privacy and artificial intelligence: Challenges for protecting health information in a new era. BMC Medical Ethics, 22(122), 1-5. REFERENCES
  • 24. Plomp, T. (2013). Educational design research: An introduction. In T. Plomp & N. Nienke (Eds.), Educational design research: Part A: An introduction (pp. 10–51). Enschede: SLO - Netherlands Institute for Curriculum Development. Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Ahmad K. R. (2020). Healthcare data breaches: Insights and implications. Healthcare, 8 (2), 2227-9032. Singh, A. K., Anand, A., Lv, Z., Ko, H., & Mohan, A. (2021). A survey on healthcare data: a security perspective. ACM Transactions on Multimidia Computing Communications and Applications, 17(2), 1-26. Tuckman, B. W. (2012). Manual de investigação em educação: Metodologia para conceber e realizar o processo de investigação científica. Lisboa: Fundação Calouste Gulbenkian. Vuorikari. R., Kluzer, S., & Punie, Y. (2022). DigComp 2.2: The digital competence framework for citizens with new examples of knowledge, skills and attitudes. European Commission. REFERENCES
  • 25. Thanks! Anícia Rebelo Trindade, Debbie Holley, Célio Gonçalo Marques ISCTE - Instituto Universitário de Lisboa 20-22 October 2022 Lisbon, Portugal Hybrid (Online + Face to Face) 2 0 T H o f O c t o b e r 2 0 2 2 16th International Conference on Information Technology and Applications (ICITA) ICITA2022 CONFERENCE