This paper presents four Destination Stewardship scenarios based on different levels of engagement from the public and private sector. The scenarios serve to support destination stakeholders in assessing their current context and the pathway towards greater stewardship. A Destination Stewardship Governance Diagnostic framework is built on the scenarios to support its stakeholders in considering how to move along that pathway, identifying the key aspects of governance that are either facilitating or frustrating a destination stewardship approach, and the required actions and resources to achieve an improved scenario. Moreover, the scenarios and diagnostic framework support stakeholders to come together to debate and scrutinise how tourism is managed in a way that meets the needs of the destination, casting new light on the barriers and opportunities for greater destination stewardship.
Design and development practitioners such as those in game development often have difficulty comprehending and adhering to the European General Data Protection Regulation (GDPR), especially when designing in a private sensitive way. Inadequate understanding of how to apply the GDPR in the game development process can lead to one of two consequences: 1. inadvertently violating the GDPR with sizeable fines as potential penalties; or 2. avoiding the use of user data entirely. In this paper, we present our work on designing and evaluating the “GDPR Pitstop tool”, a gamified questionnaire developed to empower game developers and designers to increase legal awareness of GDPR laws in a relatable and accessible manner. The GDPR Pitstop tool was developed with a user-centered approach and in close contact with stakeholders, including practitioners from game development, legal experts and communication and design experts. Three design choices worked for this target group: 1. Careful crafting of the language of the questions; 2. a flexible structure; and 3. a playful design. By combining these three elements into the GDPR Pitstop tool, GDPR awareness within the gaming industry can be improved upon and game developers and designers can be empowered to use user data in a GDPR compliant manner. Additionally, this approach can be scaled to confront other tricky issues faced by design professionals such as privacy by design.
LINK
Introduction: Depression can be a serious problem in young adult students. There is a need to implement and monitor prevention interventions for these students. Emotion-regulating improvisational music therapy (EIMT) was developed to prevent depression. The purpose of this study was to evaluate the feasibility of EIMT for use in practice for young adult students with depressive symptoms in a university context. Method: A process evaluation was conducted embedded in a larger research project. Eleven students, three music therapists and five referrers were interviewed. The music therapists also completed evaluation forms. Data were collected concerning client attendance, treatment integrity, musical components used to synchronise, and experiences with EIMT and referral. Results: Client attendance (90%) and treatment integrity were evaluated to be sufficient (therapist adherence 83%; competence 84%). The music therapists used mostly rhythm to synchronise (38 of 99 times). The students and music therapists reported that EIMT and its elements evoked changes in all emotion regulation components. The students reported that synchronisation elicited meaningful experiences of expressing joy, feeling heard, feeling joy and bodily responses of relaxation. The music therapists found the manual useful for applying EIMT. The student counsellors experienced EIMT as an appropriate way to support students due to its preventive character. Discussion: EIMT appears to be a feasible means of evoking changes in emotion regulation components in young adult students with depressive symptoms in a university context. More studies are needed to create a more nuanced and evidence-based understanding of the feasibility of EIMT, processes of change and treatment integrity.
This project addresses the fundamental societal problem that encryption as a technique is available since decades, but has never been widely adopted, mostly because it is too difficult or cumbersome to use for the public at large. PGP illustrates this point well: it is difficult to set-up and use, mainly because of challenges in cryptographic key management. At the same time, the need for encryption has only been growing over the years, and has become an urgent problem with stringent requirements – for instance for electronic communication between doctors and patients – in the General Data Protection Regulation (GDPR) and with systematic mass surveillance activities of internationally operating intelligence agencies. The interdisciplinary project "Encryption for all" addresses this fundamental problem via a combination of cryptographic design and user experience design. On the cryptographic side it develops identity-based and attribute-based encryption on top of the attribute-based infrastructure provided by the existing IRMA-identity platform. Identity-based encryption (IBE) is a scientifically well-established technique, which addresses the key management problem in an elegant manner, but IBE has found limited application so far. In this project it will be developed to a practically usable level, exploiting the existing IRMA platform for identification and retrieval of private keys. Attribute-based encryption (ABE) has not reached the same level of maturity yet as IBE, and will be a topic of further research in this project, since it opens up attractive new applications: like a teacher encrypting for her students only, or a company encrypting for all employees with a certain role in the company. On the user experience design side, efforts will be focused on making these encryption techniques really usable (i.e., easy to use, effective, efficient, error resistant) for everyone (e.g., also for people with disabilities or limited digital skills). To do so, an iterative, human-centred and inclusive design approach will be adopted. On a fundamental level, scientific questions will be addressed, such as how to promote the use of security and privacy-enhancing technologies through design, and whether and how usability and accessibility affect the acceptance and use of encryption tools. Here, theories of nudging and boosting and the unified theory of technology acceptance and use (known as UTAUT) will serve as a theoretical basis. On a more applied level, standards like ISO 9241-11 on usability and ISO 9241-220 on the human-centred design process will serve as a guideline. Amongst others, interface designs will be developed and focus groups, participatory design sessions, expert reviews and usability evaluations with potential users of various ages and backgrounds will be conducted, in a user experience and observation laboratory available at HAN University of Applied Sciences. In addition to meeting usability goals, ensuring that the developed encryption techniques also meet national and international accessibility standards will be a particular point of focus. With respect to usability and accessibility, the project will build on the (limited) usability design experiences with the mobile IRMA application.