skip to main content
10.1145/1579114.1579185acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Pervasive healthcare: the elderly perspective

Published:09 June 2009Publication History

ABSTRACT

The pervasive vision of future technologies raises important questions on how people, especially the elderly, will be able to use, trust and maintain privacy. To begin to address such issues, we conducted focus group sessions with elderly participants aged from 65 to 89 years. The groups were shown three Videotaped Activity Scenarios [5] depicting pervasive or ubiquitous computing applications in three contexts: health, commerce and e-voting. The resultant data was coded in terms of stakeholder, user and system issues. The data is discussed here from the user perspective -- specifically in terms of concerns about trust and privacy.

References

  1. Bohn, J., Coram, V., Langheinrich, M., Mattern, F., Rohs, M Social, Economic, and Ethical Implications of Ubiquitous computing and Ubiquitous Computing Ubiquitous computing. Springer-Verlag, 5--29. (2005).Google ScholarGoogle Scholar
  2. Goggin, G., & Newell, C. An end to disabling policies? Toward enlightened universal service. Information Society, 16, 127--133. (2000)Google ScholarGoogle ScholarCross RefCross Ref
  3. Jaeger, P. T. Telecommunications policy and individuals with disabilities: issues of accessibility and social inclusion in the policy and research agenda. Telecommunications Policy, 30, 112--124 (2006).Google ScholarGoogle ScholarCross RefCross Ref
  4. Little, L., Briggs, P., & Coventry, L. Videotaped Activity Scenarios and the Elicitation of Social Rules for Public Interactions. British HCI Conference, Leeds. (2004).Google ScholarGoogle Scholar
  5. Little, L. and Briggs, P. Privacy factors for successful ubiquitous computing. In press: International Journal of E-Business Research (2009).Google ScholarGoogle Scholar
  6. Little, L., Marsh, S., & Briggs, P. Trust and privacy permissions for an ambient world. In R. Song, L. Korba, G. Yee (Eds.) Trust in e-services: technologies, practices and challenges. New York: Ideas Group (2007).Google ScholarGoogle Scholar
  7. Maguire, M. C. A Review of User-Interface Guidelines for Public information kiosk Systems. International journal of Human-Computer Studies, 50. 263--286 (1998). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Poole, E. S., Dantec, C. A., Eagan, J. R., & Edwards, W. K. Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing, ACM International Conference Proceeding Series; Vol. 344 Proceedings of the 10th international conference on Ubiquitous computing, 192--201. 2008 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. UK National Statistics Population Estimates UK population grows to 60.6 million. Downloaded December 2007 http://www.statistics.gov.uk/CCI/nugget.asp?ID=6 (2007).Google ScholarGoogle Scholar
  10. Varshney, U. Pervasive healthcare and wireless health monitoring, Mobile Networks and Applications, v. 12 n. 2--3, p. 113--127, March 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Webb, J. D. & Weber, M. J. Influences of Sensory Abilities on the Interpersonal Distance of the Elderly. Environment & Behavior. 35, 695--711(2003).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Pervasive healthcare: the elderly perspective

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        PETRA '09: Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
        June 2009
        481 pages
        ISBN:9781605584096
        DOI:10.1145/1579114

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 June 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader