To improve people’s lives, human-computer interaction researchers are increasingly designing technological solutions based on behavior change theory, such as social comparison theory (SCT). However, how researchers operationalize such a theory as a design remains largely unclear. One way to clarify this methodological step is to clearly state which functional elements of a design are aimed at operationalizing a specific behavior change theory construct to evaluate if such aims were successful. In this article, we investigate how the operationalization of functional elements of theories and designs can be more easily conveyed. First, we present a scoping review of the literature to determine the state of operationalizations of SCT as behavior change designs. Second, we introduce a new tool to facilitate the operationalization process. We term the tool blueprints. A blueprint explicates essential functional elements of a behavior change theory by describing it in relation to necessary and sufficient building blocks incorporated in a design. We describe the process of developing a blueprint for SCT. Last, we illustrate how the blueprint can be used during the design refinement and reflection process.
DOCUMENT
Waste separation at companies is considered a priority to achieve a circular and sustainable society. This research explores behaviour change poli-cies for separating the organic fraction of municipal solid waste (OFMSW) at Small and Medium Enterprises (SMEs), particularly in cities. At SMEs, co-work-ers are responsible for waste disposal. Therefore, their behavioural intention to-wards pro-environmental action plays a major role. In this study, we have used agent-based modelling and simulation to explore the waste behaviour of the ac-tors in the system. The models were co-created in participatory workshops, sur-veys and interviews with stakeholders, domain experts and relevant actors. Ad-ditionally, we co-created and tested practical social and technical interventions with the model. We used the collaborative modelling method Lange reported to conceptualise, implement, test and validate the models. Five policies that affect waste separation behaviour were included in the model. The model and simula-tion results were cross-validated with the help of a literature study. The results were validated through experts and historical data to sketch a generalisable idea of networks with similar characteristics. These results indicate that combinations of behaviour profiles and certain policy interventions correlate with waste sepa-ration rates. In addition, individual waste separation policies are often limitedly capable of changing the behaviour in the system. The study also shows that the intention of co-workers concerning environmental behaviour can significantly impact waste separation rates. Future work will include the role of households, policies supporting separating multiple waste types, and the effect of waste sep-aration on various R-strategies.
DOCUMENT
Entrepreneurs are likely to be victims of ransomware. Previous studies have found that entrepreneurs tend to adopt few preventive measures, thereby increasing their chances of victimization. Due to a lack of research, however, not much is known about why entrepreneurs lack self-protective behaviors and how they can be encouraged to change said behaviors. Therefore, the purpose of this study is to explain, by means of an extended model of the Protection Motivation Theory (PMT), the motivation for entrepreneurs using protective measures against ransomware in the future. The data for our study were collected thanks to a questionnaire that was answered by 1,020 Dutch entrepreneurs with up to 250 employees. Our Structural Equation Modelling (SEM) analysis revealed that entrepreneurs are more likely to take preventive measures against ransomware if they perceive the risk of ransomware as severe (perceived severity), if they perceive their company as being vulnerable (perceived vulnerability), if they are concerned about the risks (affective response), and if they think that the people and companies around them expect them to apply preventive measures (subjective norms). However, if entrepreneurs think that they are capable of handling the risk (self-efficacy) and are convinced that their adopted preventive measures are effective (response efficacy), they are less likely to take preventive measures. Furthermore, for entrepreneurs that outsource IT security, the significant effect of perceived vulnerability and subjective norms disappears. The likelihood of entrepreneurs protecting their business against ransomware is thus influenced by a complex interplay of various motivational factors and is partly dependent on the business’ characteristics. Based on these findings, we will discuss security professionals’ prospects for increasing the cyber resilience of entrepreneurs, thus preventing cybercrime victimization.
DOCUMENT