Towards the Design of Privacy-Aware Computing: A Case Study in Hospital Work

Size: px
Start display at page:

Download "Towards the Design of Privacy-Aware Computing: A Case Study in Hospital Work"

Transcription

1 Towards the Design of Privacy-Aware Computing: A Case Study in Hospital Work Mónica Tentori 1, Jesús Favela 1, Víctor M. Gonzalez 2 and Marcela D. Rodríguez 1 1 Departamento de Ciencias de la Computación, CICESE, Ensenada, BC, México {mtentori, favela, marcerod}@cicese.mx 2 Universtity of California, Irvine, CA, USA vmgyg@ics.uci.edu ABSTRACT Privacy is a complex social process that will persist in one form or another as a fundamental feature of the substrate into which ubicomp is threaded. To better understand the privacy issues related to the use of ubicomp we place our efforts in understanding the contextual information relevant to privacy and how their interplay shapes the perception of privacy in a particular setting, such as a hospital. We introduce the concept of Quality of Privacy (QoP) which allows balancing the trade-off between the amount of privacy a user is willing to concede and the value of the services that can be provided by a ubicomp application, in a similar way as that of Quality of Service (QoS). We propose an agent-based architecture that adapts the ubicomp application s behavior based on the user s context. Finally, we exemplify our architecture extending a context-aware mobile communication system. INTRODUCTION Ubiquitous computing will surround users with a comfortable and convenient information environment that merges physical and computational infrastructures into an integrated habitat [15]. Context-awareness will allow this habitat to take on the responsibility of serving users, by tailoring itself to their preferences as well as performing tasks and group activities according to the nature of the physical space. Moreover the more an application has a rich knowledge of each user the better it can perform its task. Paradoxically, the more an application knows the user the greater the threat to his privacy [4]. Thus, the pervasive computing era also brings some risks, being the potential invasion of privacy among the more important ones. Because previous research has indicated that the privacy demanded and expected by a user is context dependent [1, 11], we decided to base our efforts on understanding the contextual variables and the interplay among them that shape the perception of privacy in the particular case of hospitals. Important work has been made in the last few years in the design and deployment of ubicomp solutions in support of hospital work which are a step in the direction of providing accurate and timely information to hospital staff in support of adequate decision-making [2, 9]. Despite the benefits of ubicomp for hospitals, cases of users distrust and abandonment of potentially useful ubiquitous applications have been reported, and among other factors, privacy concerns have been identified as a central aspect to be considered[12]. Paradoxically, the the design of ubicomp for hospital has, in general, overlooked privacy issues due among other factors to the lack of understanding about how in practice they can be integrated into the system s architecture. The problem is that developers currently have little support in designing software and in creating interactions that are effective in helping end-users manage their privacy [6]. In addition, despite the fact that the importance of privacy has been highlighted, there have been no attempts to understand the privacy concerns of medical workers, how those concerns affect their practices, and how they are affected by the introduction of ubicomp technologies. Based on this, we want to corroborate if our work still hold in this particular setting. In addition, we think that these situations can be used as insights and issues that can be helpful to design grounded privacy-aware ubicomp applications, and provide directions for new opportunities for research and development in this field. The rest of the paper is organized as follows: We first present, in Section 2, the results of a case study that allowed us to identify the contextual information which shapes hospital workers perception of privacy. In Section 3, we introduce the concept of Quality of Privacy (QoP) and present an architecture aimed at addressing privacy issues in ubicomp. Finally, Section 4 presents our conclusions. A CASE STUDY: UNDERSTANDING PRIVACY IN UBIQUITOUS HOSPITAL ENVIRONMENTS For a period of three months we conducted a workplace study at a public hospital. This study helped us assess some of the privacy issues hospital workers face on their everyday practice, how they deal with it, and the way it influences their decision making. In addition, it helped us understand how hospital workers perception of privacy changes by the foreseeing use of ubicomp technologies. Next we briefly describe the results of the case study more detailed information is described in [14]. Methodology The study at the hospital started with a period of systematic observations where we followed for a period of three working days, three medical interns, two nurses, and two physicians throughout their morning, afternoon, and night shifts. Our observations in the hospital helped us identify specific instances where privacy was compromised, or decisions were made taking privacy issues into consideration. We used this information to generate two sets of scenarios, one based on current practices, and a second one using ubicomp. We conducted ten interviews to five hospital workers and discussed the scenarios with them, to get a sense of whether they found the proposed ubicomp systems to support their work and if the scenarios made apparent privacy concerns. As a results of those interviews we derived a new set of four four ubicomp scenarios that were both useful for medical work but rose privacy concerns for hospital workers. Each scenario was defined to explore both the benefit of an ubicomp application supporting medical work and its impacts for privacy of those using it. We organized a group evaluation to show the four scenarios to medical workers. Following an scheme proposed by Caroll, we 1

2 presented the scenarios to 27 medical interns.. The participants were asked to situate themselves in a specific role within the scenario. After each scenario, they were asked to complete a survey with 7 Likert-scale assertions for each scenario, to evaluate the threats raised by the technology to their privacy. Finally, we applied these findings to identify the contextual information used to regulate and manage privacy using a ubicomp application. Privacy management From our observational data we identified a set of privacy concerns that emerged during the enactment of work of those individuals that we observed. These concerns center around the individuals themselves, the information they manage, and the people they interact with. In general, we noticed that the perception of the importance of each concern can be affected by the particular circumstances experienced by people. We observed that sometimes medical personnel tend to relax the privacy implications of some of their actions in order to cope with the circumstances experienced or in order to facilitate their work. For instance, despite that the medical record is an official document that, according to the rules, cannot be removed from a particular area of the hospital; sometimes the medical interns take those documents to other places to facilitate the study of a case. This situation is generally with the knowledge and encouragement of physicians supervising interns as they see it as a way for interns to take full responsibility of a case and to help them improve their decision making. Medical interns, as they become used to medical practices, people s styles and routines, learn to adapt their privacy concerns to each particular kind of circumstance. Ubicomp scenarios that raise privacy concerns With the results of the interviews, we defined four scenarios that integrate one or more of the ubicomp services that have been proposed in support for healthcare and other working environments. The scenarios were also identified as being useful while raising privacy concerns for the medical worker involved. Table 1 indicates the different ubicomp services that were included in each of the four scenarios we selected. Scenarios Ubicomp services Displaying info from a personal device Monitoring people s location Locating services Context-based notifications and reminders Data transfer between heterogeneous devices Tracking people s movements Audio/video capture of people s activities Memory aid Identify people with similar needs/interests Table 1. Ubicomp services used in the grounded-scenarios The first scenario illustrates how an intern requests laboratory studies and receives context-aware notifications of the availability of the results through a handheld. The second scenario shows how photographs of the intern s activities, taken while performing a surgical procedure, can help her as memory aid when she is interrupted by an emergency, and later on needs to resume the task. The third scenario shows how colleagues collaborate discussing a clinical case through heterogeneous devices. Finally, the fourth scenario illustrates how a supervisor can find out if a given procedure has been performed, by looking at where the intern was throughout the day and looking at pictures of him taken at different times during his shift. We next describe scenario 4 to illustrate some of the technology proposed for, and privacy issues raised by, the scenarios. Scenario 4: Medical Supervising through the Floor Map Mrs. Diaz, a head nurse, wants to know if an intern made a clinical procedure to the patient in bed 222. She approaches a semi-public display where she selects the name of the intern in charge of the patient and a window showing a map of the area pops-up. The window includes a widget that represents a Timeline. Thru it, she can scroll through time and the map in the window will display the location of the intern (see Figure 1). The map shows that the intern entered room 239 and spent a few minutes in this room. Mrs. Diaz stops the Timeline to find the intern s activities in this room. The display shows the electronic medical record related to the patient in room 239 and photographs of the intern s activities taken at the time. Trough the timeline Mrs. Diaz notices that the intern entered the Internal Medicine office. Trough the photographs displayed, she realizes that the intern resident was chatting with Rita, another intern until Dr. Perez arrives to the office; and then the three discuss a clinical case. Following the activities of the intern through the day she realizes that the procedure wasn t made, and assigns it to another intern. Activities Photos Timeline Public Map Figure 1. With the timeline tool a supervisor can follow the location and activities performed by medical interns. This scenario has serious privacy implications since the nurse (and potentially other supervisors) can track the location of the intern throughout the day, including photos of the intern s activities. Nonetheless, we included such scenario because it was found useful by hospital staff who actually supervise the interns activities. A head nurse made the following comment during an interview when the scenario was shown to her: I find this system really helpful because I can evaluate through the photos if my staff follows the norm, besides these photos could be used as study reference. In addition, although the people interviewed were not very concerned of colleagues knowing their location, they were not foreseeing the potential use of this information in the future as illustrated in the scenario. Contextual information We identified two sets of contextual information differing in the role that this information play in order to preserve privacy. The first set of contextual information is defined as contextual elements. The contextual elements are the parameters that the user wants to protect while using a ubicomp environment and they are perceived by the user qualitatively and regulated quantitatively by the technology. In accordance with previous studies [8], location, identity, and time are important factors in assessing privacy concerns. In addition to these variables, we found access and persistence as being highly relevant. 2

3 The identity, the location and the activity of hospital staff members determines their perception of privacy in specific situations. Thus, a ubicomp application has to manage the precision with which these information is given and provide mechanisms to help the end-users regulate them. Related to the location, a medical intern made the following comment during an interview: For example, when you have time off you might also have pending tasks, and if you re in the break room or in the dinning room I ll would be concern if my location is being shared; because this information could be used to get a sense of the amount of work that I ve done, or I ve haven t because I was in my lunch break. In this case, if a medical intern is in the bathroom or the dinning room, he wouldn t want to be disturbed or he might not want others to know how much time they spent in this particular location. In addition, when they re in these places, they in general, wouldn t want access to a patient s medical records. In this case, they would rather have the system know only their general location, for instance the fact that they are in a given floor, or within the hospital. In addition, the right of access and persistence has serious implications in losing control of the information shared with other people an the treatment of the information stored. The interplay of those elements and its values will ensure a certain level of privacy perceived by the user and regulated by the technology. Design principles to built privacy-aware computing As a result of our analysis we identified the main privacy issues faced by hospital workers using ubicomp technology. We have grouped them into three main areas. Sharing. This includes risks related to loosing control over the information and devices shared with other people. We propose in Scenario 3 that physicians can store in their PDA the discussion of a clinical case. In this case the owner of the information can loose control over the files exchanged between colleagues. Although hospital workers were not concerned with sharing information at the moment when the exchange takes place, they were not foreseeing future uses of this information. In the same direction, when hospital workers share devices, like their PDA, the owner loses control over the device and the information contained in it. They might not predict that his colleague can browse his personal information until it happens. Sensing. Related to the invisibleness of the ubiquitous environment there are concerns when the technology monitors the user s context. Through the use of the floor map presented in scenario 3 and 4 the hospital workers expressed anxiety about not knowing how the system becomes aware of their location and if the system can monitor them anywhere at anytime, for example when they are in the bathroom. They start to wonder what information is being monitored and if they will notice it. For example, a medical intern commented: This sensor only monitors my location? Nobody can here my conversation through it, right?. In addition, the information captured must be the minimum necessary. Storing. This is related to the treatment of the information that is stored once captured. Through our study we found that the content of the information, where it is stored, and the fact that it is persistent are highly relevant variables to manage privacy. We describe in Scenario 4 how a supervisor can evaluate if a procedure was made by accessing the activities that the interns performed during their work day. Although the people interviewed were not very concerned of colleagues knowing their location in real-time, they were not foreseeing that this information might be stored for long periods of time and could be used to derive secondary contextual information. Such as, the places that the individual visits more often or with who does he normally interacts. We are currently working on these concerns shaping them in a form of design principles; in order, to help designers analyze the privacy concerns during the design of ubicomp and help them incorporate mechanisms to reduce the privacy risks of the ubicomp application they develop. We expected with this to create a new direction in the development of ubicomp: the development of privacy-aware ubiquitpus computing applications. PRIVACY-AWARE COMPUTING There is a trade-off between the amount of privacy a user is willing to concede and the value of the services that can be provided by a ubiquitous application. For instance, if a physician doesn t want to be easily located he can login into the hospital information system sharing only her role as a physician, and not her identity. In this case, she might not be able to access the records of her patients, but still be able to access services such as the hospital s digital library. Similarly, users should be able to control the precision with which their location is made available to others, based on contextual variables such as the identity of the receiver. In the above examples, the physician requests the level of privacy he expects when joining the ubiquitous environment and based on contextual information the environment adapts in order to preserve privacy. Quality of Privacy (QoP) A similar trade-off is presented between the services offered by a ubiquitous environment and the cost that the users might need to pay in regard to privacy. Similarly, privacy can be considered at two levels: the qualitative perception of the user and the quantitative parameters managed by the technology. To address this we introduce the concept of Quality of Privacy (QoP) following the analogy with Quality of Service (QoS), a concept used in computer networks. We characterize the level of QoP based on five contextual elements: location, identity, activity, access and persistence as discussed in section 2. Based on this, a user can demand a certain level of QoP to the ubiquitous environment using a qualitative measure (i.e., logging into the system as an anonymous user). On the other hand, the perception of anonymity will be mapped by the system to certain values of one or more contextual elements. In this case, the ubiquitous application must adapt its behavior considering the user s context in order to satisfy the level of QoP, that both, the application and the user have agreed upon. To cope with both, the user and technology views, of QoP; we re designing an ontology which uses the Event-Condition-Action (ECA) model reported in [14]. This ontology will manage the level of QoP demanded from the user and it will depend on contextual variables and the degree of privacy desired while using the ubicomp application. On the other hand, the information that the user is willing to share with the system determines the services the environment is willing to provide her. For example, a contexaware hospital application can control the identity by roles or the location by rooms. But, a context-aware tour guide might want to manage this information differently. In this case, it might be better to use age groups for the identity and geographic position for location. Towards an architecture for privacy-aware computing Privacy-aware mechanisms must be triggered when the information is captured [7], as well as when the information is 3

4 being requested [10]. This has suggested us to regulate privacy both in the side of the user (client) as well as in that of the environment (server). Figure 2 shows our proposed agent-based architecture for privacy-aware computing, that extends the SALSA framework reported in [13]. In this architecture, a broker handles the communication between all services using an extension of the agent communication language, itself based on the Extensible Messaging and Presence Protocol XMPP which incorporates the ECA model to preserve users privacy. This protocol includes privacy related information based on the ontology discus above, in order to manage QoP provisions. A Context-aware filter running on the client (c-filter) allows the user to set his preferred level of QoP. In this case, when the user joins the ubicomp environment, or the user s context changes, the desired level of QoP is negotiated between the user and the broker. Similarly, when an application requires information about the user, a context-aware filter in the server (sfilter) negotiates the QoP set by the user and shares this information with the client s applications maintaining the QoP set by the user. information he decides to consult a patient s medical record. The system at this point knows Dr. Díaz as a physician. Taking this into consideration the system allows Dr. Díaz to consult part of the patient s medical record. Dr. Díaz decides to print the patient s medical record and he sends his request to the application. The context-aware privacy s-filter compares Dr. Diaz QoP with the policies announced by the agent that represents the printer. Because, the printer agent needs to know his identity (a higher level of QoP) to provide this service, Dr. Diaz request is rejected asking them to renegotiate his QoP. Middleware SALSA Context-aware privacy C-FILTER Context-aware privacy S-FILTER Tailoring Policlicing Negotiation Monitoring User & Service provider policies Figure 3. The sequence diagram illustrates the negotiation of QoP to use a service provided by the ubicomp application. The doctor uses the PDA to negotiate their desired QoP (a) and to be aware of the availability and location of users given a certain level of QoP (b, c). Agent Broker: IM&P Server Figure 2. An architecture for privacy-aware computing A sample application To illustrate how our architecture can be used in the design of privacy-aware applications we re-designed a context-aware mobile communication system (CHIS) reported in [9]. The architecture of CHIS was extended to deal with privacy allowing the users to negotiate a level of QoP and adapting ubicomp applications and services behavior. To exemplify this consider the following scenario. Dr. Díaz wants to study with more detail the evolution of a patient who presents a rare combination of symptoms. In this case, he wants to print the patient s medical record to study it in detail later on, and probably discuss it with a colleague. At the same time, since he is out of duty, during the use of the ubicomp environment he wants to protect his privacy. Figure 3 illustrates how the system s components interact to support this scenario. While Dr. Díaz joins the ubicomp environment he chooses a level of privacy setting the privacy-bar to medium as Figure 3a shows. The context-aware privacy c-filter receives this information and adapts the information of the user based on the privacy ontology for the system. This agent sends the user s presence to the broker specifying the contract between the ubicomp environment and the user as a certain level of QoP. The agent broker notifies all users and agents in the environment. They update the information related to Dr. Díaz in order to preserve his privacy, adapting the information shown by the list of users presenting only his role (figure 3b) and the floor map lowers the precision with which his position is shown (figure 3c). After Dr. Díaz visualizes the CONCLUSIONS Over the last few years research has been conducted towards the design of ubicomp solutions in support of hospital work. Through the design and evaluation of those solutions several privacy issues have been pointed out as a critical factor for their adoption. To explore these issues we conducted a workplace study in a hospital. We identified the contextual variables that influence the user s perception of privacy and how they deal with it. We introduce the concept of Quality of Privacy (QoP) which can be used to develop privacy-aware computing systems that balance the trade-off between the amounts of privacy a user is willing to concede and the value of the services that can be provided by the application. We describe an architecture that considers the users context to satisfy the level of QoP that both, the application and the user have agreed upon. Finally, we exemplified our proposal extending a context-aware mobile communication system. As we argued, contextual information is required to regulate privacy for ubicomp, and additional time and efforts are required to find proper solutions. During the workshop, we would like to receive feedback as to how our proposals could be improved from the results others are doing in this area. Also we want to present how the results of our study can be applied in the design of ubicomp managing privacy. For this, we want to show the scenarios in more detail, as well as, particular ubicomp services for hospitals that we ve re-designed to address privacy concerns. In addition, we want to corroborate if the contextual information that we identified so far, make sense in other settings; and, we want to know if other researchers are interested in incorporating some of our ideas in their work. Finally, we want to discuss if our work is useful and still hold in other settings besides hospitals. 4

5 REFERENCES 1. Adams, A. Multimedia Information Changes the Whole Privacy Ballgame. in Conference on Computers, Freedom, and Privacy, Bardram, J. Applications of ContextAware Computing in Hospital Work - Examples and Design Principles. 2004: ACM Press, Bardram, J.E. and C. Bossen. Moving to get ahead: Local Mobility and Collaborative Work. 2003: Kluwer Academic Publishers. 4. Brown, P.J. and J.F. Gareth, 2004., Context-awareness and privacy: an inevitable clash?, in Technical Report. Department of Computer Science, E. 4PT, Editor. 2004, University of Exeter: Exter, United Kingdom. 5. Caroll, J., Scenario-Based Design: Envisioning work and technology in system development, ed. J.W. Sons. 1995, New York. 6. Hong, J.I. and J.A. Landay. An Architecture for Privacy- Sensitive Ubiquitous Computing. in MobiSys. 2004: ACM Press. 7. Langheinrich, M. A Privacy Awareness System for Ubiquitous Computing Environments. in Ubicomp : Springer- Verlag. 8. Lederer, S., Designing Disclosure:Interactive Personal Privacy at the Dawn of Ubiquitous Computing, in Computer Science Division. 2003, University of California: Berkeley, California. p Munoz, M.A., M. Rodriguez, J. Favela, A.I. Martinez-Garcia, and V.M. Gonzalez, Context-Aware Mobile Communication in Hospitals. IEEE Computer, (8): p Myles, G., A. Friday, and N. Davies, Preserving Privacy in Environments with Location-Based Applications. IEEE Pervasive computer, (1): p Palen, L. and P. Dourish. Unpacking 'privacy' for a networked world. in ACM Press Reang, P., Dozens of nurses in Castro Valley balk at wearing locators, in The Mercury News Rodriguez, M., J. Favela, A. Preciado, and A. Vizcaino, Agentbased Ambient Intelligence for Healthcare. Accepted for publication in AI Communications, Tentori, M., J. Favela, and V. González, Designing for Privacy in Ubiquitous Computing Environments. Accepted for publication in Proc. of the Ubiquitous Computing and Ambient Intelligence, Weiser, M., The future of ubiquitous computing on campus. Communications of the ACM., : p research involves using qualitative ethnographic methods to evaluate media-rich/activity-rich environments, the adoption of information-visualization systems, and the use of home information technologies. He received an MS in information and computer science from UC Irvine and an MSc in telecommunication and information systems from the University of Essex, UK. Marcela Rodríguez is a doctoral student in computer science at CICESE and a lecturer in computer engineering at the Autonomous University of Baja California (UABC). Her research interests include ubiquitous computing, autonomous agents, and CSCW. She received an MSc in computer science from CICESE and a BSc in computer engineering from UABC. THE AUTHORS Mónica Tentori is a graduate student in computer science at the Center of Scientific Research and Higher Education of Ensenada (CICESE), where her research focus is on medical informatics, ubiquitous computing, and human computer interaction(hci). She received a BSc in computer sciences from the Universidad Autonoma de Baja California (UABC). Jesus Favela is a professor of computer science at CICESE, where he leads the Collaborative Systems Laboratory and heads the Department of Computer Science. His research interests include CSCW, ubiquitous computing, and information retrieval. Favela received a PhD in computer-aided engineering from the Massachusetts Institute of Technology. Victor M. González is a doctoral student in information and computer science at the University of California, Irvine. His 5

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment

A Profile-based Trust Management Scheme for Ubiquitous Healthcare Environment A -based Management Scheme for Ubiquitous Healthcare Environment Georgia Athanasiou, Georgios Mantas, Member, IEEE, Maria-Anna Fengou, Dimitrios Lymberopoulos, Member, IEEE Abstract Ubiquitous Healthcare

More information

Ontology-based Context Aware for Ubiquitous Home Care for Elderly People

Ontology-based Context Aware for Ubiquitous Home Care for Elderly People Ontology-based Aware for Ubiquitous Home Care for Elderly People Kurnianingsih 1, 2, Lukito Edi Nugroho 1, Widyawan 1, Lutfan Lazuardi 3, Khamla Non-alinsavath 1 1 Dept. of Electrical Engineering and Information

More information

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS

AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS Vicent J. Botti Navarro Grupo de Tecnología Informática- Inteligencia Artificial Departamento de Sistemas Informáticos y Computación

More information

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM

More information

SUPPORTING LOCALIZED ACTIVITIES IN UBIQUITOUS COMPUTING ENVIRONMENTS. Helder Pinto

SUPPORTING LOCALIZED ACTIVITIES IN UBIQUITOUS COMPUTING ENVIRONMENTS. Helder Pinto SUPPORTING LOCALIZED ACTIVITIES IN UBIQUITOUS COMPUTING ENVIRONMENTS Helder Pinto Abstract The design of pervasive and ubiquitous computing systems must be centered on users activity in order to bring

More information

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS T.VENGATTARAMAN, P. DHAVACHELVAN Department of Computer Science, Pondicherry University, Puducherry, India. vengat.mailbox@gmail.com, dhavachelvan@gmail.com

More information

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media

Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA 92697 USA

More information

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration

Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)

More information

Adapting Data Collection Methods for Different Participants of the User Study: to Improve the Empathic Understanding between Designers and Users

Adapting Data Collection Methods for Different Participants of the User Study: to Improve the Empathic Understanding between Designers and Users Adapting Data Collection Methods for Different Participants of the User Study: to Improve the Empathic Understanding between Designers and Users Shu Yuan, Tongji University Hua Dong, Tongji University

More information

An Ontology for Modelling Security: The Tropos Approach

An Ontology for Modelling Security: The Tropos Approach An Ontology for Modelling Security: The Tropos Approach Haralambos Mouratidis 1, Paolo Giorgini 2, Gordon Manson 1 1 University of Sheffield, Computer Science Department, UK {haris, g.manson}@dcs.shef.ac.uk

More information

Privacy Preserving, Standard- Based Wellness and Activity Data Modelling & Management within Smart Homes

Privacy Preserving, Standard- Based Wellness and Activity Data Modelling & Management within Smart Homes Privacy Preserving, Standard- Based Wellness and Activity Data Modelling & Management within Smart Homes Ismini Psychoula (ESR 3) De Montfort University Prof. Liming Chen, Dr. Feng Chen 24 th October 2017

More information

Activity-Centric Configuration Work in Nomadic Computing

Activity-Centric Configuration Work in Nomadic Computing Activity-Centric Configuration Work in Nomadic Computing Steven Houben The Pervasive Interaction Technology Lab IT University of Copenhagen shou@itu.dk Jakob E. Bardram The Pervasive Interaction Technology

More information

Marcela D. Rodríguez Universidad Autónoma de Baja California,UABC, Mexicali, México

Marcela D. Rodríguez Universidad Autónoma de Baja California,UABC, Mexicali, México Marcela D. Rodríguez Universidad Autónoma de Baja California,UABC, Mexicali, México marcerod@uabc.edu.mx Definition: taking the prescribed number of pills each day, within a prescribed period 26% to 59%

More information

Using Agent-Based Methodologies in Healthcare Information Systems

Using Agent-Based Methodologies in Healthcare Information Systems BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 2 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0033 Using Agent-Based Methodologies

More information

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation

An Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance

More information

Ubiquitous Home Simulation Using Augmented Reality

Ubiquitous Home Simulation Using Augmented Reality Proceedings of the 2007 WSEAS International Conference on Computer Engineering and Applications, Gold Coast, Australia, January 17-19, 2007 112 Ubiquitous Home Simulation Using Augmented Reality JAE YEOL

More information

A Service-Oriented Platform for Pervasive Awareness Systems

A Service-Oriented Platform for Pervasive Awareness Systems 2009 International Conference on Advanced Information Networking and Applications Workshops A Service-Oriented Platform for Pervasive Awareness Systems C. Goumopoulos 1, A. Kameas 1,2, E. Berg 3, I. Calemis

More information

Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare

Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare Constructing the Ubiquitous Intelligence Model based on Frame and High-Level Petri Nets for Elder Healthcare Jui-Feng Weng, *Shian-Shyong Tseng and Nam-Kek Si Abstract--In general, the design of ubiquitous

More information

Home-Care Technology for Independent Living

Home-Care Technology for Independent Living Independent LifeStyle Assistant Home-Care Technology for Independent Living A NIST Advanced Technology Program Wende Dewing, PhD Human-Centered Systems Information and Decision Technologies Honeywell Laboratories

More information

The Intel Science and Technology Center for Pervasive Computing

The Intel Science and Technology Center for Pervasive Computing The Intel Science and Technology Center for Pervasive Computing Investing in New Levels of Academic Collaboration Rajiv Mathur, Program Director ISTC-PC Anthony LaMarca, Intel Principal Investigator Professor

More information

Amigo Approach Towards Perceived Privacy

Amigo Approach Towards Perceived Privacy Amigo Approach Towards Perceived Privacy Maddy Janse, Peter Vink, Yeo LeeChin, and Abdullah Al Mahmud Philips Research, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands Abstract. Perceived privacy,

More information

Supporting Wards with Interactive Resources and Logic-based Systems

Supporting Wards with Interactive Resources and Logic-based Systems Supporting Wards with Interactive Resources and Logic-based Systems Federico Cabitza, Marco Loregian and Marcello Sarini Università degli Studi di Milano Bicocca, via Bicocca degli Arcimboldi 8, 20126

More information

Situated Interactions of Lay Users with Home Hemodialysis Technology: Influence of Broader Context of Use

Situated Interactions of Lay Users with Home Hemodialysis Technology: Influence of Broader Context of Use 219 Situated Interactions of Lay Users with Home Hemodialysis Technology: Influence of Broader Context of Use Atish Rajkomar, Ann Blandford & Astrid Mayer University College London, London, United Kingdom

More information

AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces

AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces AMIMaS: Model of architecture based on Multi-Agent Systems for the development of applications and services on AmI spaces G. Ibáñez, J.P. Lázaro Health & Wellbeing Technologies ITACA Institute (TSB-ITACA),

More information

Implementing Privacy as Symmetry in Location-aware Systems

Implementing Privacy as Symmetry in Location-aware Systems Implementing Privacy as Symmetry in Location-aware Systems Anders Kofod-Petersen, Espen Klæboe, Jørgen Jervidalo, Kjetil Aaltvedt, Magnus Romnes, and Trond Martin Nyhus Department of Computer and Information

More information

Methodology for Agent-Oriented Software

Methodology for Agent-Oriented Software ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this

More information

INTERVIEW WORKBOOK. Remember: You want to leave the interview with the option to pursue the position further.

INTERVIEW WORKBOOK. Remember: You want to leave the interview with the option to pursue the position further. INTERVIEW WORKBOOK THE INTERVIEW How do you want others to see you? Few people are born with innate interviewing skills. Nonetheless, successful interviewing skills can be acquired. We recommend you pick

More information

RESUMEN DE TESIS DOCTORAL

RESUMEN DE TESIS DOCTORAL RESUMEN DE TESIS DOCTORAL Autonomous Agents in Collaborative Ubiquitous Computing Environments Agentes Autónomos en Ambientes de Cómputo Colaborativos Ubicuos Graduated: Marcela D. Rodríguez Facultad de

More information

Ubicomp researchers have long argued

Ubicomp researchers have long argued THE HUMAN EXPERIENCE Designing for Ubiquity: The Perception of Privacy Can users offer informed consent when they don t understand a technology or forget that it exists? These were among the issues that

More information

Welcome and Opening Remarks

Welcome and Opening Remarks Fujitsu Laboratories of America Technology Symposium 2013 Welcome and Opening Remarks Yasunori Kimura President and CEO Fujitsu Laboratories of America, Inc. June 5 th, 2013 Copyright 2013 Fujitsu Laboratories

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Improving long-term Persuasion for Energy Consumption Behavior: User-centered Development of an Ambient Persuasive Display for private Households

Improving long-term Persuasion for Energy Consumption Behavior: User-centered Development of an Ambient Persuasive Display for private Households Improving long-term Persuasion for Energy Consumption Behavior: User-centered Development of an Ambient Persuasive Display for private Households Patricia M. Kluckner HCI & Usability Unit, ICT&S Center,

More information

Mirrored Message Wall:

Mirrored Message Wall: CHI 2010: Media Showcase - Video Night Mirrored Message Wall: Sharing between real and virtual space Jung-Ho Yeom Architecture Department and Ambient Intelligence Lab, Interactive and Digital Media Institute

More information

Paul Davidsson Director. Professor in Computer Science

Paul Davidsson Director. Professor in Computer Science Paul Davidsson Director Professor in Computer Science The Internet of Things (IoT) Everything that benefits from being connected will be connected! connectivity is ubiquitous technology is affordable 25

More information

Bridging the Gap: Moving from Contextual Analysis to Design CHI 2010 Workshop Proposal

Bridging the Gap: Moving from Contextual Analysis to Design CHI 2010 Workshop Proposal Bridging the Gap: Moving from Contextual Analysis to Design CHI 2010 Workshop Proposal Contact person: Tejinder Judge, PhD Candidate Center for Human-Computer Interaction, Virginia Tech tkjudge@vt.edu

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network K.T. Sze, K.M. Ho, and K.T. Lo Abstract in this paper, we study the performance of a video-on-demand (VoD) system in wireless

More information

Daniel Fallman, Ph.D. Research Director, Umeå Institute of Design Associate Professor, Dept. of Informatics, Umeå University, Sweden

Daniel Fallman, Ph.D. Research Director, Umeå Institute of Design Associate Professor, Dept. of Informatics, Umeå University, Sweden Ubiquitous Computing Daniel Fallman, Ph.D. Research Director, Umeå Institute of Design Associate Professor, Dept. of Informatics, Umeå University, Sweden Stanford University 2008 CS376 In Ubiquitous Computing,

More information

What are References?

What are References? References Boston University College of Engineering Career Development Office 44 Cummington Street, Room 112 Boston, MA 02215 (617) 353-5731 www.bu.edu/eng/careers What are References? References are individuals

More information

Design for X Principles & Applications for Product Development

Design for X Principles & Applications for Product Development Design for X Principles & Applications for Product Development Jaap Daalhuizen IPU Innovation Update 26 th January, 2016 My background MSc. in Industrial Design Engineering PhD. In Design Theory & Methodology

More information

Trends Report R I M S

Trends Report R I M S Trends Report R I M S 2 0 1 8 Changing technology Changing workplaces Changing risk Progress is a good thing. But, with evolution and change comes risk. Fast-moving technology and super-charged innovation

More information

Towards a Software Engineering Research Framework: Extending Design Science Research

Towards a Software Engineering Research Framework: Extending Design Science Research Towards a Software Engineering Research Framework: Extending Design Science Research Murat Pasa Uysal 1 1Department of Management Information Systems, Ufuk University, Ankara, Turkey ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

EBI SES Consumer Satisfaction Survey. September-October 2017

EBI SES Consumer Satisfaction Survey. September-October 2017 EBI SES Consumer Satisfaction Survey September-October 2017 Number of Respondents: 57 WORK SATISFACTION Are your co-workers friendly? Disagree (2) Undecided (2) Do you want to keep this job? Agree (40)

More information

Activity Inference for Ambient Intelligence Through Handling Artifacts in a Healthcare Environment

Activity Inference for Ambient Intelligence Through Handling Artifacts in a Healthcare Environment Sensors 2012, 12, 1072-1099; doi:10.3390/s120101072 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Activity Inference for Ambient Intelligence Through Handling Artifacts in a Healthcare

More information

Conversation Guide. Hospice of Southwest Ohio and CareBridge are dedicated to helping people talk about their wishes for end-of-life care.

Conversation Guide. Hospice of Southwest Ohio and CareBridge are dedicated to helping people talk about their wishes for end-of-life care. Conversation Guide Hospice of Southwest Ohio and CareBridge are dedicated to helping people talk about their wishes for end-of-life care. Table of Contents Voice Your Choice.............. 2 Voice your

More information

A Survey of Autonomic Computing Systems

A Survey of Autonomic Computing Systems A Survey of Autonomic Computing Systems Mohammad Reza Nami, Koen Bertels Computer Engineering Laboratory, Delft University of Technology Abstract The evolution of networks and Internet has introduced highly

More information

A User Interface Level Context Model for Ambient Assisted Living

A User Interface Level Context Model for Ambient Assisted Living not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,

More information

Service Vision Design for Smart Bed System of Paramount Bed

Service Vision Design for Smart Bed System of Paramount Bed Service Vision Design for Smart Bed System of Paramount Bed Ryotaro Nakajima Kazutoshi Sakaguchi Design thinking, a popular approach in business today, helps companies to see challenges in the field from

More information

GridOrbit Public Display: Providing Grid Awareness in a Biology Laboratory

GridOrbit Public Display: Providing Grid Awareness in a Biology Laboratory GridOrbit Public Display: Providing Grid Awareness in a Biology Laboratory Juan David Hincapié Ramos jdhr@itu.dk Aurelien Tabard auta@itu.dk Jakob Bardram bardram@itu.dk Tomas Sokoler sokoler@itu.dk Copyright

More information

Privacy as Impression Management

Privacy as Impression Management Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210

More information

The Chatty Environment Providing Everyday Independence to the Visually Impaired

The Chatty Environment Providing Everyday Independence to the Visually Impaired The Chatty Environment Providing Everyday Independence to the Visually Impaired Vlad Coroamă and Felix Röthenbacher Distributed Systems Group Institute for Pervasive Computing Swiss Federal Institute of

More information

Open Issues in Activity-Based and Task-Level Computing

Open Issues in Activity-Based and Task-Level Computing Open Issues in Activity-Based and Task-Level Computing Jakob E. Bardram and Henrik Bærbak Christensen Centre for Pervasive Computing Department of Computer Science, University of Aarhus Aabogade 34, 8200

More information

Mobile Tourist Guide Services with Software Agents

Mobile Tourist Guide Services with Software Agents Mobile Tourist Guide Services with Software Agents Juan Pavón 1, Juan M. Corchado 2, Jorge J. Gómez-Sanz 1 and Luis F. Castillo Ossa 2 1 Dep. Sistemas Informáticos y Programación Universidad Complutense

More information

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture

Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Western University Scholarship@Western Electronic Thesis and Dissertation Repository August 2011 Semantic Privacy Policies for Service Description and Discovery in Service-Oriented Architecture Diego Zuquim

More information

INTERVIEWING AND POST-INTERVIEW CORRESPONDENCE GUIDE

INTERVIEWING AND POST-INTERVIEW CORRESPONDENCE GUIDE INTERVIEWING AND POST-INTERVIEW CORRESPONDENCE GUIDE Naropa University Career Services Sarah Steward, career services coordinator Arapahoe Campus ~ Allen Ginsberg Library 6210, second floor 303.245.4863

More information

Theoretical Category 5: Lack of Time

Theoretical Category 5: Lack of Time Themes Description Interview Quotes Real lack of time I mean I don t feel it should be 50% of time or anything like that but I do believe that there should be some protected time to do that. Because I

More information

Examples of Mentoring Agreements

Examples of Mentoring Agreements Examples of Mentoring Agreements Adapted from the W.H. Freeman Entering Mentoring Series, 2017 1 Mentor/Mentee Expectations Fall 2017 Stephanie Robert The relationships between doctoral students and their

More information

Imminent Transformations in Health

Imminent Transformations in Health Imminent Transformations in Health Written By: Dr. Hugh Rashid, Co-Chair Technology & Innovation Committee American Chamber of Commerce, Shanghai AmCham Shanghai s Technology and Innovation Committee and

More information

Digital Health Startups A FirstWord ExpertViews Dossier Report

Digital Health Startups A FirstWord ExpertViews Dossier Report AM PL E PA G ES S A G ES S A FirstWord ExpertViews Dossier Report Published Copyright 2016 Doctor s Guide Publishing Limited All rights reserved. No part of this publication may be reproduced or used in

More information

Implementing digital resources for clinicians and patients varying needs.

Implementing digital resources for clinicians and patients varying needs. Preprint of: ADAMS, A., BLANDFORD, A. & ATTFIELD S. (2005) Implementing digital resources for clinicians and patients varying needs. In Proc. BCS Healthcare Computing 2005. 226-233. Implementing digital

More information

The Evidence Base for Home Health Technologies. George Demiris PhD, FACMI University of Washington

The Evidence Base for Home Health Technologies. George Demiris PhD, FACMI University of Washington The Evidence Base for Home Health Technologies George Demiris PhD, FACMI University of Washington The Future of Home Health Care: A Workshop October 1, 2014 Technology in the Home Pervasive, ubiquitous

More information

TO BE HELD AT UNIVERSITA' CATTOLICA DEL SACRO CUORE, ROME, 31 MAY 1 JUNE

TO BE HELD AT UNIVERSITA' CATTOLICA DEL SACRO CUORE, ROME, 31 MAY 1 JUNE Published on Second Faculty of Medicine, Charles University ( https://www.lf2.cuni.cz) LF2 > Konference Řím Konference Řím * * * CALL FOR PARTICIPATION * * * ******* ehdc 2004 e-health FOR DEVELOPING COUNTRIES

More information

Transferring knowledge from operations to the design and optimization of work systems: bridging the offshore/onshore gap

Transferring knowledge from operations to the design and optimization of work systems: bridging the offshore/onshore gap Transferring knowledge from operations to the design and optimization of work systems: bridging the offshore/onshore gap Carolina Conceição, Anna Rose Jensen, Ole Broberg DTU Management Engineering, Technical

More information

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools

Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Avner Hatsek, Ohad Young, Erez Shalom, Yuval Shahar Medical Informatics Research Center Department of Information

More information

User Interface for Multi-Agent Systems: A case study

User Interface for Multi-Agent Systems: A case study User Interface for Multi-Agent Systems: A case study J. M. Fonseca *, A. Steiger-Garção *, E. Oliveira * UNINOVA - Centre of Intelligent Robotics Quinta da Torre, 2825 - Monte Caparica, Portugal Tel/Fax

More information

Collaboration on Interactive Ceilings

Collaboration on Interactive Ceilings Collaboration on Interactive Ceilings Alexander Bazo, Raphael Wimmer, Markus Heckner, Christian Wolff Media Informatics Group, University of Regensburg Abstract In this paper we discuss how interactive

More information

Prof Ina Fourie. Department of Information Science, University of Pretoria

Prof Ina Fourie. Department of Information Science, University of Pretoria Prof Ina Fourie Department of Information Science, University of Pretoria Research voices drive worldviews perceptions of what needs to be done and how it needs to be done research focus research methods

More information

Understanding User s Experiences: Evaluation of Digital Libraries. Ann Blandford University College London

Understanding User s Experiences: Evaluation of Digital Libraries. Ann Blandford University College London Understanding User s Experiences: Evaluation of Digital Libraries Ann Blandford University College London Overview Background Some desiderata for DLs Some approaches to evaluation Quantitative Qualitative

More information

ConFra: A Context Aware Human Machine Interface Framework for In-vehicle Infotainment Applications

ConFra: A Context Aware Human Machine Interface Framework for In-vehicle Infotainment Applications ConFra: A Context Aware Human Machine Interface Framework for In-vehicle Infotainment Applications Hemant Sharma, Dr. Roger Kuvedu-Libla, and Dr. A. K. Ramani Abstract The omnipresent integration of computer

More information

AGILE USER EXPERIENCE

AGILE USER EXPERIENCE AGILE USER EXPERIENCE Tina Øvad Radiometer Medical ApS and Aalborg University tina.oevad.pedersen@radiometer.dk ABSTRACT This paper describes a PhD project, exploring the opportunities of integrating the

More information

An Application Framework for a Situation-aware System Support for Smart Spaces

An Application Framework for a Situation-aware System Support for Smart Spaces An Application Framework for a Situation-aware System Support for Smart Spaces Arlindo Santos and Helena Rodrigues Centro Algoritmi, Escola de Engenharia, Universidade do Minho, Campus de Azúrem, 4800-058

More information

Creative Informatics Research Fellow - Job Description Edinburgh Napier University

Creative Informatics Research Fellow - Job Description Edinburgh Napier University Creative Informatics Research Fellow - Job Description Edinburgh Napier University Edinburgh Napier University is appointing a full-time Post Doctoral Research Fellow to contribute to the delivery and

More information

This is the author s version of a work that was submitted/accepted for publication in the following source:

This is the author s version of a work that was submitted/accepted for publication in the following source: This is the author s version of a work that was submitted/accepted for publication in the following source: Vyas, Dhaval, Heylen, Dirk, Nijholt, Anton, & van der Veer, Gerrit C. (2008) Designing awareness

More information

Health Informatics Basics

Health Informatics Basics Health Informatics Basics Foundational Curriculum: Cluster 4: Informatics Module 7: The Informatics Process and Principles of Health Informatics Unit 1: Health Informatics Basics 20/60 Curriculum Developers:

More information

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities

Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Topical Collection on Blockchain-based Medical Data Management System: Security and Privacy Challenges and Opportunities Timely access to data, particularly data relevant to a patient s medical and genetic

More information

Awareness in Collaborative Ubiquitous Environments: the Multilayered Multi-Agent Situated System Approach

Awareness in Collaborative Ubiquitous Environments: the Multilayered Multi-Agent Situated System Approach Awareness in Collaborative Ubiquitous Environments: the Multilayered Multi-Agent Situated System Approach MARCO P. LOCATELLI and GIUSEPPE VIZZARI Department of Informatics, Systems and Communication University

More information

Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality

Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality Ethics Emerging: the Story of Privacy and Security Perceptions in Virtual Reality Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musabay, Kadeem Pitkin and Elissa M. Redmiles 1 Interactivity Immersion

More information

Health Informatics Principles - Excerpt -

Health Informatics Principles - Excerpt - Health Informatics Principles - Excerpt - Foundational Curriculum: Cluster 4: Informatics Module 7: The Informatics Process and Principles of Health Informatics Unit 2: Health Informatics Principles 1

More information

Notice of Privacy Practices

Notice of Privacy Practices Notice of Privacy Practices THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY. Privacy is a very

More information

How to be a Proactive Patient

How to be a Proactive Patient How to be a Proactive Patient Part I: A Urologist s Perspective September 11, 2017 Presented by: is currently an associate professor with the department of urology in the Levine Cancer Institute at the

More information

How Do I sign up to Volunteer? Go Then click the Volunteer Up link

How Do I sign up to Volunteer? Go   Then click the Volunteer Up link How Do I sign up to Volunteer? Go www.habitatect.org Then click the Volunteer Up link 1 Click Log In 2 If you have used Volunteer Up before you will input your user name and password. Then choose Login

More information

OSGi-Based Context-Aware Middleware for Building Intelligent Services in a Smart Home Environment

OSGi-Based Context-Aware Middleware for Building Intelligent Services in a Smart Home Environment OSGi-Based Context-Aware Middleware for Building Intelligent Services in a Smart Home Environment SHU-CHEN CHENG1, CHIEN-FENG LAI2 Department of Computer Science and Information Engineering, Southern Taiwan

More information

AI use in European healthcare

AI use in European healthcare Artificial Intelligence (AI) AI use in European healthcare www.himss.eu/analytics Results, May 2018 1 TABLE OF CONTENT Introduction & methodology page 3 Survey questions page 4 Results Key Findings page

More information

Lead framework manual:

Lead framework manual: Lead framework manual: Protocol & Guidelines for a Successful Campaign PART one: We have put together the absolute must do s and dont s for following up with our marketing campaigns to have patients showing

More information

Space Copy & Paste: Grabbing Space- Based User Experience to Support Reminiscence

Space Copy & Paste: Grabbing Space- Based User Experience to Support Reminiscence Space Copy & Paste: Grabbing Space- Based User Experience to Support Reminiscence Ohbyung Kwon obkwon@khu.ac.kr Jae Mun Sim deskmoon@khu.co.kr Nam Yeon Lee Research Center for Ubiquitous Business and Services

More information

Christina Narensky, Psy.D.

Christina Narensky, Psy.D. Christina Narensky, Psy.D. License # PSY 25930 2515 Santa Clara Ave., Ste. 207 Alameda, CA 94501 Phone: Fax: 510.229.4018 E-Mail: Dr.ChristinaNarensky@gmail.com Web: www.drchristinanarensky.com Notice

More information

Designing Engaging Experiences with Children and Artists 1

Designing Engaging Experiences with Children and Artists 1 Designing Engaging Experiences with Children and Artists 1 Richard Hull, Jo Reid Mobile and Media Systems Laboratory HP Laboratories Bristol HPL-2002-337 December 18 th, 2002* E-mail: {richard.hull josephine.reid}

More information

Durham Research Online

Durham Research Online Durham Research Online Deposited in DRO: 29 August 2017 Version of attached le: Accepted Version Peer-review status of attached le: Not peer-reviewed Citation for published item: Chiu, Wei-Yu and Sun,

More information

STRATEGIC FRAMEWORK Updated August 2017

STRATEGIC FRAMEWORK Updated August 2017 STRATEGIC FRAMEWORK Updated August 2017 STRATEGIC FRAMEWORK The UC Davis Library is the academic hub of the University of California, Davis, and is ranked among the top academic research libraries in North

More information

Towards a Consumer-Driven Energy System

Towards a Consumer-Driven Energy System IEA Committee on Energy Research and Technology EXPERTS GROUP ON R&D PRIORITY-SETTING AND EVALUATION Towards a Consumer-Driven Energy System Understanding Human Behaviour Workshop Summary 12-13 October

More information

Structural Analysis of Agent Oriented Methodologies

Structural Analysis of Agent Oriented Methodologies International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 613-618 International Research Publications House http://www. irphouse.com Structural Analysis

More information

Digitisation. A panacea for Increased Access to Historical Information at the National Archives of Zambia.

Digitisation. A panacea for Increased Access to Historical Information at the National Archives of Zambia. Digitisation A panacea for Increased Access to Historical Information at the National Archives of Zambia. by Chrispin Hamooya University of Zambia (Department of Library and Information Studies), Lusaka,

More information

PREFACE. Introduction

PREFACE. Introduction PREFACE Introduction Preparation for, early detection of, and timely response to emerging infectious diseases and epidemic outbreaks are a key public health priority and are driving an emerging field of

More information

The Ubiquitous Lab Or enhancing the molecular biology research experience

The Ubiquitous Lab Or enhancing the molecular biology research experience The Ubiquitous Lab Or enhancing the molecular biology research experience Juan David Hincapié Ramos IT University of Copenhagen Denmark jdhr@itu.dk www.itu.dk/people/jdhr Abstract. This PhD research aims

More information

Alberta Health Services and Advancing Uptake of HTA & Innovation

Alberta Health Services and Advancing Uptake of HTA & Innovation Alberta Health Services and Advancing Uptake of HTA & Innovation Don Juzwishin, Candis Bilyk, Rosmin Esmail, Paule Poulin, Dr. Trevor Schuler April 5, 2011 Vancouver, British Columbia Objectives Introduction

More information

Beta Testing For New Ways of Sitting

Beta Testing For New Ways of Sitting Technology Beta Testing For New Ways of Sitting Gesture is based on Steelcase's global research study and the insights it yielded about how people work in a rapidly changing business environment. STEELCASE,

More information

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara

AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara Sketching has long been an essential medium of design cognition, recognized for its ability

More information

Designing 3D Virtual Worlds as a Society of Agents

Designing 3D Virtual Worlds as a Society of Agents Designing 3D Virtual Worlds as a Society of s MAHER Mary Lou, SMITH Greg and GERO John S. Key Centre of Design Computing and Cognition, University of Sydney Keywords: Abstract: s, 3D virtual world, agent

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing

Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing Context Information vs. Sensor Information: A Model for Categorizing Context in Context-Aware Mobile Computing Louise Barkhuus Department of Design and Use of Information Technology The IT University of

More information