Pervasive computing and an aging populace

Journal of Information, Communication and Ethics in Society 8 (3):236-248 (2010)
  Copy   BIBTEX

Abstract

PurposeThe purpose of this paper is to describe some of the methodological challenges of investigating privacy and ubiquitous computing in the home, particularly among the healthy elderly.Design/methodology/approachThe paper is based on focus groups with 60 senior citizens either living independently or in an assisted living facility. Prototypes of home‐based ubiquitous computing devices were created and deployed in a home‐like living lab setting; elders were brought to the lab to interact with the prototypes, then brought together in focus groups to discuss their insights and concerns.FindingsInitial analyses suggest that extant metaphors of privacy may be inadequate for understanding pervasive computing in the home. Concepts of data, affective concerns, and the creation of appropriate prototypes for eliciting privacy are considered. Considerations for future studies of the elderly and privacy are made.Research limitations/implicationsThe homogeneity of the study population in terms of socioeconomic status, location, and community networks suggests that the study needs to be repeated with wider populations.Originality/valueAlthough a number of projects and studies have examined the usability of home‐based ubiquitous computing and design for aging, there has been little integration of privacy and ethical concerns into general research discourse.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,349

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Four challenges for a theory of informational privacy.Luciano Floridi - 2006 - Ethics and Information Technology 8 (3):109–119.
An Intrusion Theory of Privacy.George E. Panichas - 2014 - Res Publica 20 (2):145-161.
Nanotechnology and Privacy.Jeroen van den Hoven - 2006 - International Journal of Applied Philosophy 20 (2):215-228.
The importance of privacy revisited.Norman Mooradian - 2009 - Ethics and Information Technology 11 (3):163-174.
A cure for aging?Timothy F. Murphy - 1986 - Journal of Medicine and Philosophy 11 (3):237-255.
Privacy in (mobile) telecommunications services.Jacques Penders - 2004 - Ethics and Information Technology 6 (4):247-260.
Freedom and privacy in ambient intelligence.Philip Brey - 2005 - Ethics and Information Technology 7 (3):157-166.
KDD, data mining, and the challenge for normative privacy.Herman T. Tavani - 1999 - Ethics and Information Technology 1 (4):265-273.

Analytics

Added to PP
2014-02-19

Downloads
21 (#715,461)

6 months
14 (#170,850)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Surveillance at workplace and at home.Riikka Vuokko - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):60-75.
The clash between standardisation and engagement.Anne Gerdes - 2008 - Journal of Information, Communication and Ethics in Society 6 (1):46-59.

Add more references