The 'implementation' and use of smart home technology to lengthen independent living of non-instutionalized elderly have not always been flawless. The purpose of this study is to show that problems with smart home technology can be partially ascribed to differences in perception of the stakeholders involved. The perceptual worlds of caregivers, care receivers, and designers vary due to differences in background and experiences. To decrease the perceptual differences between the stakeholders, we propose an analysis of the expected and experienced effects of smart home technology for each group. For designers the effects will involve effective goals, caregivers are mainly interested in effects on workload and quality of care, while care receivers are influenced by usability effects. Making each stakeholder aware of the experienced and expected effects of the other stakeholders may broaden their perspectives and may lead to more successful implementations of smart home technology, and technology in general.
Airports have undergone a significant digital evolution over the past decades, enhancing efficiency, effectiveness, and user-friendliness through various technological advancements. Initially, airports deployed basic IT solutions as support tools, but with the increasing integration of digital systems, understanding the detailed digital ecosystem behind airports has become crucial. This research aims to classify technological maturity in airports, using the access control process as an example to demonstrate the benefits of the proposed taxonomy. The study highlights the current digital ecosystem and its future trends and challenges, emphasizing the importance of distinguishing between different levels of technological maturity. The role of biometric technology in security access control is examined, highlighting the importance of proper identification and classification. Future research could explore data collection, privacy, and cybersecurity impacts, particularly regarding biometric technologies in Smart Access Level 4.0. The transition from Smart Access Level 3.0 to 4.0 involves process automation and the introduction of AI, offering opportunities to increase efficiency and improve detection capabilities through advanced data analytics. The study underscores the need for global legislative frameworks to regulate and support these technological advancements.
Advanced technology is a primary solution for the shortage of care professionals and increasing demand for care, and thus acceptance of such technology is paramount. This study investigates factors that increase use of advanced technology during elderly care, focusing on current use of advanced technology, factors that influence its use, and care professionals’ experiences with the use. This study uses a mixed-method design. Logfiles were used (longitudinal design) to determine current use of advanced technology, questionnaires assessed which factors increase such use, and in-depth interviews were administered to retrieve care professionals’ experiences. Findings suggest that 73% of care professionals use advanced technology, such as camera monitoring, and consult clients’ records electronically. Six of nine hypotheses tested in this study were supported, with correlations strongest between performance expectancy and attitudes toward use, attitudes toward use and satisfaction, and effort expectancy and performance expectancy. Suggested improvements for advanced technology include expanding client information, adding report functionality, solving log-in problems, and increasing speed. Moreover, the quickest way to increase acceptance is by improving performance expectancy. Care professionals scored performance expectancy of advanced technology lowest, though it had the strongest effect on attitudes toward the technology.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.