The TRIFoRM project brought together computer science, health science, social science and engineering to explore the trusting beliefs of users of IT systems, looking at factors that influence trust of systems and ways to model those factors and trust levels. The team focused particularly on healthcare technologies for monitoring chronic conditions, and interviewed people who may use or provide healthcare monitoring technology to understand what was important to them as individuals. Analysis of the interviews let the team identify possible threats to trust of technology, and controls to mitigate those threats. In addition, the team identified two key issues. The first issue was that it is clear that people using a monitoring technology to manage pain are more likely to take risks and tolerate faults, making them more vulnerable. The second issue is the importance of relationships: patients were concerned that monitoring technology might change their relationship with healthcare providers, as well as with whether healthcare providers themselves trust the technology.
Clare Hooper is a computer scientist specialised in human-computer interaction, user experience and web science. She has led various national research projects in the UK as well as major work packages in EU projects. Clare enjoys the challenges and rewards of interdisciplinary work, and has recently moved to Vancouver.
Frank Stein IBM presented at AAAI (Artificial Intelligence) meeting in Washington DC about the future of cognitive assistants and IBM Watson Business Unit and IBM Research Cognitive Computing
Jisc learning analytics MASHEIN Jan 2017Paul Bailey
Jisc Learning Analytics presentation at Leading Digital Learning: Key Issues for Small and Specialist Institutions event organised by MASHEIN (Management of Small Higher
Education Institutions Network)
This presentation focuses on the principles and practicalities of establishing a working risk appetite statement supported by risk limits and tolerances.
Technology in general -- and the internet and social media specifically -- have changed the way we work. And not just by shifting the mediums through which we communicate, but by changing the very nature of what we communicate. Technology is blurring the line between our personal and professional selves and changing our expectations of each other and our organizations.
Each nonprofit’s story is more than a mission statement, a website or an annual report. The story also includes the people inside and those on the front lines. It's how individuals represent the mission statement and organizational values that bring the vision to life online and out in the world. Blending individual and organizational stories is crucial to success in the digital age.
So, how can organizations and individuals work together to do this?
Nancy Lyons and Meghan Wilker of the Geek Girls Guide will speak about the intersection of technology and humanity, and the role of individuals in representing an organization.
Frank Stein IBM presented at AAAI (Artificial Intelligence) meeting in Washington DC about the future of cognitive assistants and IBM Watson Business Unit and IBM Research Cognitive Computing
Jisc learning analytics MASHEIN Jan 2017Paul Bailey
Jisc Learning Analytics presentation at Leading Digital Learning: Key Issues for Small and Specialist Institutions event organised by MASHEIN (Management of Small Higher
Education Institutions Network)
This presentation focuses on the principles and practicalities of establishing a working risk appetite statement supported by risk limits and tolerances.
Technology in general -- and the internet and social media specifically -- have changed the way we work. And not just by shifting the mediums through which we communicate, but by changing the very nature of what we communicate. Technology is blurring the line between our personal and professional selves and changing our expectations of each other and our organizations.
Each nonprofit’s story is more than a mission statement, a website or an annual report. The story also includes the people inside and those on the front lines. It's how individuals represent the mission statement and organizational values that bring the vision to life online and out in the world. Blending individual and organizational stories is crucial to success in the digital age.
So, how can organizations and individuals work together to do this?
Nancy Lyons and Meghan Wilker of the Geek Girls Guide will speak about the intersection of technology and humanity, and the role of individuals in representing an organization.
Literature, Law and Learning: Excursions from Computer ScienceClare Hooper
The slides I presented at Interdisciplinary Coups and Calamities 2014 about my accepted paper. The abstract of the paper follows:
With the goal of identifying success factors for interdisciplinary collaboration, this paper describes three such collaborations by a computer scientist with: a digital culture researcher from a literary background; an IT law professor; and an education specialist with a background in modern languages. Success factors are discussed for each collaboration and four success factors are suggested: established shared context; strong communication; closeness of relationship between disciplines; typology of collaboration.
Trust from a Human Computer Interaction perspective Sónia
Persuasion, Emotion and Trust (PET) is a design methodology that enables design more technologically engaging products. PET uses three main design values,
Persuasion – Triggers actions;
Emotion - Generate an emotional response; and
Trust – Leveraging credibility and cooperation.
This design methodology main aim is to incentives people to become more engaged and connected with a certain product or ecosystems.
Our main aim is to stress the role of trust on persuasive design.
In general, we will focus on the following aspects:
1) First we will start by creating a clear understanding on the challenges of transferring Human Computer Trust (HCT) values to influence user engagement and fostering trust-enabling interactions.
2) Then, in the second part we will learn to analyze interaction design sequences from digital products that changes human trust behaviors. As well as explore different methodologies for testing.
3) We will end by presenting and reflection on the result achieved.
For more information read my human computer trust blog https://humancomputertrust.wordpress.com
Literature, Law and Learning: Excursions from Computer ScienceClare Hooper
The slides I presented at Interdisciplinary Coups and Calamities 2014 about my accepted paper. The abstract of the paper follows:
With the goal of identifying success factors for interdisciplinary collaboration, this paper describes three such collaborations by a computer scientist with: a digital culture researcher from a literary background; an IT law professor; and an education specialist with a background in modern languages. Success factors are discussed for each collaboration and four success factors are suggested: established shared context; strong communication; closeness of relationship between disciplines; typology of collaboration.
Trust from a Human Computer Interaction perspective Sónia
Persuasion, Emotion and Trust (PET) is a design methodology that enables design more technologically engaging products. PET uses three main design values,
Persuasion – Triggers actions;
Emotion - Generate an emotional response; and
Trust – Leveraging credibility and cooperation.
This design methodology main aim is to incentives people to become more engaged and connected with a certain product or ecosystems.
Our main aim is to stress the role of trust on persuasive design.
In general, we will focus on the following aspects:
1) First we will start by creating a clear understanding on the challenges of transferring Human Computer Trust (HCT) values to influence user engagement and fostering trust-enabling interactions.
2) Then, in the second part we will learn to analyze interaction design sequences from digital products that changes human trust behaviors. As well as explore different methodologies for testing.
3) We will end by presenting and reflection on the result achieved.
For more information read my human computer trust blog https://humancomputertrust.wordpress.com
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
The following presentation was given at the workshop "Technology solutions for privacy issues: what is the best way forward?" organized by e-SIDES at the BDVe Meet-up in Sofia on May 14, 2018. The workshop, chaired by Gabriella Cattaneo from IDC, involved stakeholders from ICT-18 projects.
Businesses are increasingly embracing the dynamics of digital technologies, as they communicate with interested parties about their responsible initiatives through corporate websites, social media platforms and other interactive channels. Therefore, a quantitative study involving 202 owner-managers investigates their attitudes toward stakeholder engagement through digital media. The research methodology involved the integration of previously tried and tested measurement tools from the technological acceptance model, the pace of technological innovation and corporate social responsibility (CSR) items, to better understand the rationale for using digital media to communicate with stakeholders on the organization’s responsible behaviors. The results have indicated that there was a positive and significant relationship between the perceived “ease of use” and “usefulness” of online media. The findings also revealed that the younger owner-managers were increasingly using ubiquitous technologies as opposed to their older counterparts. This contribution implies that all businesses, particularly the smaller ones, could improve their relationships with stakeholders if they use digital media to communicate about their responsible behaviors.
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Ansgar Koene
This was a half-day UnBias project workshop at the WebSci'17 conference presenting some of the interim UnBias project results and engaging the audience in debate on issues related to the role of algorithms in mediated access to online information.
Virtual Reality and Healthcare - The Past, the Present, and the FutureStanford University
A presentation about Virtual Reality, Augmented Reality and Healthcare -
The history of the field, the current status, and a perspective about future directions.
ERM occasionally sponsors free seminars in Southeast Michigan. In this particular short presentation I explore how injuries are really just process failures.
KnowMe and ShareMe: understanding automatically discovered personality traits...Leon Gou
There is much recent work on using the digital footprints left by people on social media to predict personal traits and gain a deeper understanding of individuals. Due to the veracity of social media, imperfections in prediction algorithms, and the sensitive nature of one's personal traits, much research is still needed to better understand the effectiveness of this line of work, including users' preferences of sharing their computationally derived traits. In this paper, we report a two- part study involving 256 participants, which (1) examines the feasibility and effectiveness of automatically deriving three types of personality traits from Twitter, including Big 5 personality, basic human values, and fundamental needs, and (2) investigates users' opinions of using and sharing these traits. Our findings show there is a potential feasibility of automatically deriving one's personality traits from social media with various factors impacting the accuracy of models. The results also indicate over 61.5% users are willing to share their derived traits in the workplace and that a number of factors significantly influence their sharing preferences. Since our findings demonstrate the feasibility of automatically inferring a user's personal traits from social media, we discuss their implications for designing a new generation of privacy-preserving, hyper-personalized systems.
Quando as coisas dão certo - Nele os autores descrevem o trabalho realizado no Reino Unido para manter a segurança durante a construção do parque Olímpico das olimpiadas de Londres, 2012. As obras foram realizadas sem morte de nenhum trabalhador.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Trust in IT: Factors, Metrics and Models
1. +
Trust in IT: Factors, Metrics
and Models
Dr. Clare Hooper
clare@clarehooper.net
www.twitter.com/clarejhooper
2. +
Hi!
I’m Dr. Clare Hooper
I enjoy exploring boundaries
quantitative and qualitative
industry and academia
I’m into HCI, web science, user experience,
ubicomp, hypertext
Recent topics include design, inclusive
research, crime, social media and trust
4. +
Multidisciplinary approach
Computer science, health science, social
science and engineering
The University of Southampton…
Faculty of Health Sciences (Jane Prichard)
Faculty of Business and Law (Melanie Ashleigh)
IT Innovation Centre (Clare Hooper, Brian
Pickering, Mike Surridge, Stefanie Wiegand)
5. +
The problem
What are the trusting
beliefs of users of IT
systems?
What factors influence
trust of systems?
How can we model
those factors and trust
levels?
6. +
Trust in a system may be too high or
low compared with its actual
trustworthiness (security)
Trigger adequate trust
perceptions allowing users to
make risk-aware, informed
decisions
Methodologies to increase
trustworthiness
www.it-
innovation.soton.ac.uk/projects/opte
t
7. +
TRIFoRM
How do users develop and
apply trust to systems?
Models to determine when
user trust is out of balance
with system trustworthiness
Add to set of warnings and
reassurances that OPTET
can provide
8. +
The process
Literature
• State of the art from social sciences
• Analyse trust models from OPTET
Data
gathering
• Semi-structured interviews
• Service users and a service provider
Thematic
analysis
• Identify and model threats
• Identify threat controls and key issues
9. +
The process
Literature
• State of the art from social sciences
• Analyse trust models from OPTET
Data
gathering
• Semi-structured interviews
• Service users and a service provider
Thematic
analysis
• Identify and model threats
• Identify threat controls and key issues
10. +
The process
Literature
• State of the art from social sciences
• Analyse trust models from OPTET
Data
gathering
• Semi-structured interviews
• Service users and a service provider
Thematic
analysis
• Identify and model threats
• Identify threat controls and key issues
20. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
21. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
22. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
23. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
24. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
25. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
26. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
27. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
28. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
29. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
30. Trust
Transfer
(4+1)
Trust in Experts
(2+1)
+ve Effects on
H2H Interaction
(5+1)
Age (1+0)
Physical Health
(2+0)
-ve Effects
on H2H
Interaction
(4+1)
Experience
(4+0)
Cognitive
Impairment
(2+0)
Trust in
Process
(4+1) Demo-
graphics
(4+1)
33. +
Monitoring technology to manage
pain: issues
Likelihood of user risk-taking
and fault-tolerance: users are
more vulnerable.
We must be cognisant of
user motivation and
application domain
throughout design
Relationships are important.
Interviewees were concerned
that such technology might
change their relationship with
healthcare providers
be trusted by their healthcare
providers
Users
Carers
Systems
Stake-
holders
35. +
Summary: outputs and findings
Usefulness and ease of use are
key – of course!
Also: demographics,
motivation, domain
Users managing pain are
mistake-tolerant and more likely
to take risks
Trust transfer and H2H
interactions affect H2T trust
Technology should enhance,
not replace, H2H interaction
The right amount of data
Displayed in the right way, at
the right time
OPTET augmented its model
Other projects used TRIFoRM
outputs
Work continued by INTRMS:
Individual and Network Trust in
Remote Monitoring Systems
Trust in the healthcare environment is a complex
interaction between technology utility and convenience
and its affect on existing human interaction
36. +
Thank you
I’m new to Vancouver; please
introduce yourself
I’m available for consultancy
HCI, web science, user
experience, ubicomp,
hypertext
Design, inclusive research,
crime, social media and trust
Stay in touch
clare@clarehooper.net
twitter.com/ClareJHooper
Editor's Notes
I don’t know many of you folks, so let me take a moment to introduce myself. I was based in Europe ‘til now.
(Mis)trust of IT utilities has enormous impact on people’s decisions to use or not use those utilities.
We set out to identify and model factors that influence individual trust of IT systems.
I’m going to take you through the process we used and our results, particularly insights from a thematic analysis.
Healthcare technologies for monitoring chronic conditions, and interviewed people who may use or provide healthcare monitoring technology to understand what was important to them as individuals.
Help users trust safe systems
Protect users from risk with compromised systems
OPTET infers trust with a model: trust change as a result of UX. Supports IT system engineering goals (its for technical system designers & devs), ignores what users feel about systems, or how their feelings affect their behaviour.
TRIFoRM addresses the gap. A more holistic model of trust, not just “trust as a response to system behaviour”
SotA: >70 pubs on defining/modelling trust, theoretical foundations of trust in tech, technology acceptance, formation of trust in tech.
SotA guided semi-structured interviews. 7 interviewees (1 withdrew) connected w/healthcare monitoring tech. What’s important to them as individuals?
6 service users
1 service provider, who treats pain and designs/develops assistive tech.
Professional transcription, 2 coders analysed for themes, 1 person analysed the themes
2 thematic maps: identified new OPTET threats, & controls. 4 major themes…
Model of trust formation, 1st and 2nd order constructs.
Performance: does it help user achieve goal? Accuracy, reliability, functionality
Process: how much does it do do what is expected? Understandable, predictable, confidential, data integrity
Purpose: the intentions of the provider: benevolence, authorised data usage
The model of trust specifically for IT artifacts from Söllner, Hoffmann, Hoffmann, Wacker & Leimeister, 2012
Smarpthone app for monitoring RA
Objective inputs: monitoring physical movements
Subjective inputs: patient reports of pain levels
Thematic map 1: HCI & technology acceptance (willingness to trust and adopt tech; impact of tech on willingness to do that). Figures in brackets show how many service users mentioned each topic, and whether the service provider did.
The arrows link themes with sub-themes and show some assumed relationships between themes or sub-themes associated with a different theme.
Not so much trust as necessity, “I am a bit more nervous than I use to be but the alternative, which is not to use any of these things, is not an option for me”.
The medical context helps, though: “Quite honestly if medical people can’t be trusted who can.” (Quotes from users unless I say from SP, service provider.)
Fault tolerance: users typically accepted that problems will occur; that doesn’t necessarily undermine trust. “We might come unstuck somewhere along the line but thus far I trust it […] and I don’t see any reason for that changing.”
Usefulness: users had an appreciation that tech can make things easier, from aide-memoir (“I had this app called Pill Scheduler and there would be alarms and everything and it would tell me what to take”) to even improving treatment (“It provides very new data, in that sense, outside the traditional clinical encounter” –SP).
Physical aspects (“the iPad is a lot easier when I’m stressed becaues it’s flat and I don’t actually have to bend the wrists in the same way”), responsveness, allowing achievement of complicated tasks, being intuitive and easy to navigate. Technology format, given RApp context: “So I’m wondering how, unless you go on to a smart watch or something and wear it on your wrist, I don’t know, how accurate or how misleading that could be depending on the advanced-ness, as it were, of what it was recording or how it was recording rather.”
Tech must fit in with everyday life (“Yeah, I really like the iPad I find it easy to use and it doesn’t take up any space. You can take it with you.”) and potentially help not just the individual but others (“bothering receptionists and having to explain who you are, what you want, blah blah […] So it’s just great. I don’t hassle anyone, nobody has to hassle me and it works smoothly”)
In summary: if motivated and appropriately positioned, technology supporting healthcare is likely to be accepted with maybe initial resistance. It’s really about usefulness.
Thematic map 2: trust transfer and demographics. How trust in overall healthcare management process & individuals supporting that process might affect trust and acceptance of tech. How culture and characteristics of users may affect that. (Trust in one agent or component can logically transfer to others).
There’s implicit and explicit acceptance that medical team has best interests of user at heart (“Quite honestly if medical people can’t be trusted then who can? […] I haven’t really thought about it because I always assumed they were tickety boo. And I’m sure they are”)
Users showed willingness to trust tech as long as they take sensible precautions, responsibility (“I mean, I change my password a lot so they’d have to be pretty clever to get into my stuff. […] I think it’s just common sense really.”). SP sees role as providing tech for support (“this care emerges from interaction between people, clinicians and patients being the central part of that care relationship, where technology adds to, enhances, supports, exemplifies that activity, I think it absolutely will be very, very important to how medicine and the clinical world develop. Where it’s used to substitute it, I think that can be detrimental.”)
Users see the special nature of interactions between healthcare professionals and those they treat (“the nurses can if you’re not very well by your demeanour and the way you look of course.”). Technology can fill information gaps (“I’m not the best historian really when I go. I’m not the best at describing pain.”). But: “I think it’s imperative that the two-way communication is maintained. I think the technology, not the technology but the data should support the meeting not overtake or subsume it.”
Importance of companionship and sympathy (“I went for an infusion a few weeks back and the lady came and sat down next to me and when her nurse came up and said how are you she burst into tears because she was so ill. […] Being with somebody else, both professional and another patient, is fantastic. I mean, that’s a great example of how important that is.”
Must maintian that conversation, to avoid mechanistic and dehumanised healthcare (“It kind of takes away from the personal aspect of things. It’s all a little robotic, isn’t it? They forget to talk to you because they’re too busy looking at computers instead of you.”). Ensure data is used: “I’d be quite happy to fill something in but there’s no point in doing that unless they were going to look at it.”
A small pilot. Some users were comfortable with technology (“Despite my age I’m actually quite a geek really. […] I have run a website for a whole group of [people[. I have a very positive attitude towards technology”). The service provider had a negative comment: “We’ve found all sorts of cultural problems in trying to get both clinicians and students to see the worth of these things and to use the technology on a day to day basis.”).
Existing usage or experience with technology is relevant, i.e. patients using lots of apps or particular computer products (“Yes, I use it for, I mean I’m all Apple based too. I have an iMac and I have an iPad and I have an iPhone”).
Age and condition may reduce the importance of perceived risk in handling sensitive information: “Well, as far as I’m concerned I’m at retirement age […] I haven’t got any life insurance, it’s not particularly sensitive to me. I don’t really mind who knows, if you see what I mean. ” Stereotypes can mislead: “I’m actually quite a geek really. I do digital artwork as well.”
“The iPad is a lot easier when I’m very stressed because it’s flat and I don’t actually have to bend the wrists in the same way.”
“That’s the other thing with rheumatoid, if you’re feeling really tired it’s really easy to get brain fog and do something really stupid.”
In summary: users trust the whole process & medical team. We must account not just for ease of use and usefulness but background, expectation of potential users. Their condition may lead to physical or cognitive disadvantage that could exacerbate technology issues.
From the interviews we identified 2 threats not covered by OPTET.
Clinician disengages, undermining trust of pain sufferersUser Disengagement – if the medical team don’t adopt the technology, then patients will lose interest in that technology.
Control: User Training
An Unusable System causes all users, clinicians as well as patients, to lose interest and disengage. (Possible cause of threat 1) User Disengagement can be mitigated with appropriate training and support; Unusable System can be helped with appropriate design expertise.
Control: HCI Analysis (for the Unusable System threat)
Design, implement, test, maintain systems cognisant of these issues
We can speculative that healthcare provider perception of patient trust is also important.
Not to mention other stakeholders: family, sysadmins, other types of healthcare provider…
Interdisciplinary SOTA guided semi-structured interviews w/service users and a service provider
Thematic analysis and maps (tech acceptance and trust transfer)
Threats and controls (user disengagement; unusable system)
Human & organisational relationships. Concern that tech may change relationships: nurses focus on data, lose contact w/patients; consultants ignore data, patients don’t trust/use system.
Trust depends somewhat on non-system interactions, particularly if it changes expectations or behaviour. Tech must enhance and develop H2H.
INTRMS: identify further factors to influence trust, implications for design, evaluate with a human-machine network (Rheumatoid Arthritis App, an app for objective and subjective monitoring of rheumatoid arthritis).
eVACUATE: user responses to technology, both evacuees and operational staff
HUMANE: how trust relations might affect human-machine networks
PRICE: how trust relations might affect social machines in general and TimeBanks in particular
ProSocialLearn: how trust relations may translate to co-operation in the virtual world.