Can audience embarrassment be used to shape interactions in public settings? Is this the threshold for an audience to step in and / or out of the interaction in performative interactions in public space? The proliferation of mobile and ubiquitous devices has shifted the attention to the design of interactive systems for use in public settings. This design applies the notion of performance to attract and engage audiences. Because performance becomes such a core part of the interaction, the success of those interactive systems heavily depends upon the physical, social and emotional context in which they are to be used. Indeed, strangers around a potential user may hinder or encourage that individual's participation in the interaction. Similarly, the physical space in which the interaction takes place, public or semipublic space may as well facilitate audience participation or prevent it. This paper investigates what characteristics of this setting (perceived / felt) can trigger audience participation in the interaction. A model based on the notion of performance and entailing some degree of felt embarrassment is applied to two cases to explain how the potential embarrassment implicit in any interaction in public space can be used to encourage users’ participation in it.
DOCUMENT
Background Physical activity after bariatric surgery is associated with sustained weight loss and improved quality of life. Some bariatric patients engage insufficiently in physical activity. The aim of this study was to examine whether and to what extent both physical activity and exercise cognitions have changed at one and two years post-surgery, and whether exercise cognitions predict physical activity. Methods Forty-two bariatric patients (38 women, 4 men; mean age 38 ± 8 years, mean body mass index prior to surgery 47 ± 6 kg/m²), filled out self-report instruments to examine physical activity and exercise cognitions pre- and post surgery. Results Moderate to large healthy changes in physical activity and exercise cognitions were observed after surgery. Perceiving less exercise benefits and having less confidence in exercising before surgery predicted less physical activity two years after surgery. High fear of injury one year after surgery predicted less physical activity two years after surgery. Conclusion After bariatric surgery, favorable changes in physical activity and exercise cognitions are observed. Our results suggest that targeting exercise cognitions before and after surgery might be relevant to improve physical activity.
MULTIFILE
Walking meetings are a promising way to reduce unhealthy sedentary behavior at the office. Some aspects of walking meetings are however hard to assess using traditional research approaches that do not account well for the embodied experience of walking meetings. We conducted a series of 16 bodystorming sessions, featuring unusual walking meeting situations to engage participants (N=45) in a reflective experience. After each bodystorming, participants completed three tasks: a body map, an empathy map, and a rating of workload using the NASA-TLX scale. These embodied explorations provide insights on key themes related to walking meetings: material and tools, physical and mental demand, connection with the environment, social dynamics, and privacy. We discuss the role of technology and opportunities for technology-mediated walking meetings. We draw implications for the design of walking meeting technologies or services to account for embodied experiences, and the individual, social, and environmental factors at play.
DOCUMENT
Social issues are becoming increasingly pressing. From dementia to climate change to corona; we as people, citizens, residents and city users - through our own experience or otherwise - have a sense of them. However, truly understanding and addressing these issues is difficult because there is no single owner. Everything is related, intertwined and also changing. Getting an overview and deciding together on necessary steps proves difficult. Complex issues thus become orphaned. Design and more specifically co-design - creative collaboration with others - is increasingly seen as a possible approach to these such issues and collaborations because it can deal with complexity and uncertainty, is optimistic and investigative in nature. With a co-design approach, we can find a shared desire and with that we connect with each other. By then searching together for mechanisms that can lead to the desired values, we gain insights on how to tilt a problematic situation. That enables us to imagine alternative futures. These help us on our way to a better, greener and more social world and social change.
DOCUMENT
IT organizations and CEO‟s are, and should be, concerned these days about the (lack of) data confidentiality and the usage of „shadow‟ IT systems by employees. Not only does the company risk monetary loss or public embarrassment, the senior management might also risk personal fines or even imprisonment. Several trends reinforce the attention for these subjects, including the fact that an increasing number of people perform parts of their work tasks from home (RSA, 2007) and the increasing bandwidth available to internet users which makes them rely on the Internet for satisfying their business and personal computing needs (Desisto et al. 2008). Employee compliance with the existing IT security policies is therefore essential. This paper presents a study on factors that influence non-compliance behavior of employees in organizations. The factors found in literature are tested in a survey study amongst employees of a big-four accountancy firm in the Netherlands and Belgium. The study concludes that stricter IT governance and cultural aspects are the most important factors influencing non-compliance behavior.
DOCUMENT
Refugees and internally displaced people who flee their homes due to environmental threats and far-going degradation which destroys their living conditions are not well-protected under international law. Refugee law focusses on political refugees. Establishing principals similar to the Responsibility to Protect (R2P) regime, (which is limited to genocide, war crimes, crimes against humanity and ethnic cleansing), could offer a solution for the lack of protection of environmental refugees. The obligation to establish this system could be based on the same obligation that forms the basis of the establishment of the R2P regime itself: the international obligation to prevent large scale suffering. This obligation corresponds with changed notions regarding state sovereignty and with the moral and legal obligations emanating from various human rights treaties. In first instance, according to R2P, the primary responsibility to take protective measures lies with the state itself. Secondly, the international community has a responsibility to assist. Lastly, the international community has a responsibility to respond duly and in a decisive manner when a state is unable or unwilling to provide protection for its citizens. The international community is equipped with a broad range of instruments under R2P that can be employed to protect environmental refugees. These instruments allow for custom-made solutions, which are absent in most traditional legal instruments
DOCUMENT
Understanding the decision-making process of a boardroom is one of the most fascinating parts of organizational research. We are all interested in power games, team dynamics and how the external environment could influence the decision of directors. One of the important buzzwords of today is “good governance” and many boards face a lot of societal pressure to implement best practices of governance. It goes beyond regulatory requirements and boards need to take a different perspective on integrating governance codes and best practices in their organizations. In this study, we focused on the role of individual directors in developing organizational responses to that pressure. More specifically, we looked at how directors’ own cognitive frames of governance influence the way boards choose best practices.
MULTIFILE
Physical activity (PA) can have a substantial benefit in the prevention, treatment andrehabilitation of (breast) cancer. Wearable devices offer possibilities to monitor PA,to provide feedback and to set targets. Although the market for PA related wearabledevices is booming, the impact of these wearables is questionable. One of the mainconcerns is the limitations to address individual needs of users, among which specificgroups such as women with breast cancer. Through design, we see opportunities tostimulate for self-enhancement while encouraging PA after cancer treatment.Following a constructive design research approach, Aymée was designed. Aymée is asmart bra that changes its pattern based on the amount of PA. Through thisinteraction, Aymée aims to reinforce women recovering from breast cancer to feelgood about themselves and to be (more) active. In this paper, we describe both thedesign approach in co-creation with former breast-cancer patients, as well as firstresults. We also discuss implications for designing intelligent systems that address PAencouragement.
DOCUMENT
The growing sophistication, frequency and severity of cyberattacks targeting all sectors highlight their inevitability and the impossibility of completely protecting the integrity of critical computer systems. In this context, cyber-resilience offers an attractive alternative to the existing cybersecurity paradigm. We define cyber-resilience as the capacity to withstand, recover from and adapt to the external shocks caused by cyber-risks. This article seeks to provide a broader organizational understanding of cyber-resilience and the tensions associated with its implementation. We apply Weick's (1995) sensemaking framework to examine four foundational tensions of cyber-resilience: a definitional tension, an environmental tension, an internal tension, and a regulatory tension. We then document how these tensions are embedded in cyber-resilience practices at the preparatory, response and adaptive stages. We rely on qualitative data from a sample of 58 cybersecurity professionals to uncover these tensions and how they reverberate across cyber-resilience practices.
DOCUMENT