Purpose Building services technologies such as home automation systems and remote monitoring are increasingly used to support people in their own homes. In order for these technologies to be fully appreciated by the endusers (mainly older care recipients, informal carers and care professionals), user needs should be understood1,2. In other words, supply and demand should match. Steele et al.3 state that there is a shortage of studies exploring perceptions of older users towards technology and the acceptance or rejection thereof. This paper presents an overview of user needs in relation to ambient assisted living (AAL) projects, which aim to support ageing-in-place in The Netherlands. Method A literature survey was made of Dutch AAL projects, focusing on user needs. A total of 7 projects concerned with older persons, with and without dementia, were included in the overview. Results & Discussion By and large technology is considered to be a great support in enabling people to age-in-place. Technology is, therefore, accepted and even embraced by many of the end-users and their relatives. Technology used for safety, security, and emergency response is most valued. Involvement of end-users improves the successful implementation of ambient technology. This is also true for family involvement in the case of persons with dementia. Privacy is mainly a concern for care professionals. This group is also key to successful implementation, as they need to be able to work with the technology and provide information to the end-users. Ambient technologies should be designed in an unobtrusive way, in keeping with indoor design, and be usable by persons with sensory of physical impairments. In general, user needs, particularly the needs of informal carers and care professionals, are an understudied topic. These latter two groups play an important role in implementation and acceptance among care recipients. They should, therefore, deserve more attention from the research community.
LINK
Particulate matter (PM) exposure, amongst others caused by emissions and industrial processes, is an important source of respiratory and cardiovascular diseases. There are situations in which blue-collar workers in roadwork companies are at risk. This study investigated perceptions of risk and mitigation of employees in roadwork (construction and maintenance) companies concerning PM, as well as their views on methods to empower safety behavior, by means of a mental models approach. We held semi-structured interviews with twenty-two employees (three safety specialists, seven site managers and twelve blue-collar workers) in three different roadwork companies. We found that most workers are aware of the existence of PM and reduction methods, but that their knowledge about PM itself appears to be fragmented and incomplete. Moreover, road workers do not protect themselves consistently against PM. To improve safety instructions, we recommend focusing on health effects, reduction methods and the rationale behind them, and keeping workers’ mental models into account. We also recommend a healthy dialogue about work-related risk within the company hierarchy, to alleviate both information-related and motivation-related safety issues. https://doi.org/10.1016/j.ssci.2019.06.043 LinkedIn: https://www.linkedin.com/in/john-bolte-0856134/
This chapter reports on the findings of a research project aimed at investigating the actual thermal environment of the housing of older occupants (aged 65 or over) in South Australia. The study documented their thermal preferences and behaviours during hot and cold weather and relationships to their well-being and health. Information was collected in three phases, a telephone survey, focus group discussions and detailed house environmental monitoring that employed an innovative data acquisition system to measure indoor conditions and record occupant perceptions and behaviours. The research covered three climate zones and extended over a nine-month period. The detailed monitoring involved a total of 71 participants in 57 houses. More than 10,000 comfort/well-being questionnaire responses were collected with more than 1,000,000 records of indoor environmental conditions. Analysis of the data shows the relationships between thermal sensation and self-reported well-being/health and the various adaptive strategies the occupants employ to maintain their preferred conditions. Findings from the research were used to develop targeted recommendations and design guidelines intended for older people with specific thermal comfort requirements and more broadly advice for architects, building designers and policymakers. Original publication at: Routledge Handbook of Resilient Thermal Comfort Chapter 7: https://doi.org/10.4324/9781003244929-10
MULTIFILE
The modern economy is largely data-driven and relies on the processing and sharing of data across organizations as a key contributor to its success. At the same time, the value, amount, and sensitivity of processed data is steadily increasing, making it a major target of cyber-attacks. A large fraction of the many reported data breaches happened in the healthcare sector, mostly affecting privacy-sensitive data such as medical records and other patient data. This puts data security technologies as a priority item on the agenda of many healthcare organizations, such as of the Dutch health insurance company Centraal Ziekenfonds (CZ). In particular when it comes to sharing data securely, practical data protection technologies are lacking as they mostly focus on securing the link between two organizations while being completely oblivious of what is happening with the data after sharing. For CZ, searchable encryption (SE) technologies that allow to share data in encrypted form, while enabling the private search on this encrypted data without the need to decrypt, are of particular interest. Unfortunately, existing efficient SE schemes completely leak the access pattern (= pattern of encrypted search results, e.g. identifiers of retrieved items) and the search pattern (= pattern of search queries, e.g. frequency of same queries), making them susceptible to leakage-abuse attacks that exploit this leakage to recover what has been queried for and/or (parts of) the shared data itself. The SHARE project will investigate ways to reduce the leakage in searchable encryption in order to mitigate the impact of leakage-abuse attacks while keeping the performance-level high enough for practical use. Concretely, we propose the construction of SE schemes that allow the leakage to be modeled as a statistic released on the queries and shared dataset in terms of ε-differential privacy, a well-established notion that informally says that, after observing the statistic, you learn approximately (determined by the ε-parameter) the same amount of information about an individual data item or query as if the item was not present in the dataset or the query has not been performed. Naturally, such an approach will produce false positives and negatives in the querying process, affecting the scheme’s performance. By calibrating the ε-parameter, we can achieve various leakage-performance trade-offs tailored to the needs of specific applications. SHARE will explore the idea of differentially-private leakage on different parts of SE with different search capabilities, starting with exact-keyword-match SE schemes with differentially-private leakage on the access pattern only, up to schemes with differentially-private leakage on the access and search pattern as well as on the shared dataset itself, allowing for more expressive query types like fuzzy match, range, or substring queries. SHARE comes with an attack lab in which we investigate existing and new types of leakage-abuse attacks to assess the mitigation-potential of our proposed combination of differential privacy with cryptographic guarantees in searchable encryption. To stimulate commercial exploitation of SHARE-results, our consortium partners CZ and TNO will take the lead on applying and evaluating our envisioned technologies in various healthcare use-cases.