Preface
Organization
Introduction Human Choice and Computers: An Ever More Intimate Relationship
Contents
Ethics
An Unclear Question: Who Owns Patient Information?
Abstract
1 Introduction
2 Datenherrschaft – Mastery Over Data and Information
3 Kantian Autonomy and Rational Agents: Prerequisites for Patient Centeredness and Empowerment
4 Datenherrschaft in Light of the Categorical Imperative(S)
5 Conclusions
References
Ethical Gathering of Exercise Metrics from Elderly: Case Jumppatikku
Assistive Technology Devices for the Oldest-Old: Maintaining Independence for the Fourth Age
Safety-Enhancing Locating Wearables on Passenger Ships: Privacy and Security Perceptions by the Elderly
Balancing Act or Compromise? A Case Study Highlighting the Challenges of Trialling IT Services with ...
Skeuomorphic Reassurance: Personhood and Dementia
Abstract
1 Introduction
2 Contemporary Ageing, Cognitive Decline, and Dementia
3 ‘Rational Man’ and the Philosophy of Personhood
4 Towards a Principle of Built-In Skeuomorphic Reassurance
5 Conclusion
References
Ethical and Legal Issues Involved in the Pro-active Collection of Personal Information with the Aim of Reducing Online Disclosure
Abstract
1 Introduction/Background
2 Pro-active Data Breach Detection
3 Personal Information Detected
4 Ethical and Legal Aspects of a Pro-active Detection System
5 Using the Detection System in an Ethical and Legal Manner
6 Conclusion
References
A Comparative Legal Study on Data Breaches in Japan, the U.S., and the U.K.
Abstract
1 Introduction
2 Legal Remedies for Data Leakage in Japan
2.1 Tort Law and Data Leakage
2.2 Recent Massive Data Leaks
2.3 Legal Obligations for Security and Data Breach Notifications
3 Legal Remedies for Data Leakage in the United States
3.1 Litigation Involving Massive Data Leaks
3.2 The FTC’s Role in Maintaining Security
3.3 Security Breach Notifications
4 Legal Remedies for Data Leakage in the United Kingdom
5 Consideration
6 Conclusion
Acknowledgments
References
Ethics and Professional Intimacy Within the Search Engine Optimisation (SEO) Industry
A Participatory Design Program for Making Ethical Choices in Client Vendor Relations in ISD
Narrative Ethics of Personalisation Technologies
Abstract
1 Introduction
2 Personalisation Technologies as Adaptive Mirrors of Personhood
3 A Framework of Narrative Personalisation Technologies
4 The Narrative Ethics of Personalisation Technologies
5 Concluding Remarks
Acknowledgements
References
Communications
“Break the Ice”: The Use of Technology to Initiate Communication in Public Spaces
Abstract
1 Introduction
2 Related Work
3 Method
4 Results and Discussion
5 Conclusion
References
Enabling Socio-Economic Activities: Opening Global Markets for the Marginalized Through Secure ICT Use
Abstract
1 Introduction
2 The Socio-Economic Activities Identified and the Rationale Thereof
2.1 Arts and Crafts
2.2 Cultural Tourism
2.3 Mobile Money
2.4 E-Books on Undocumented African Stories
2.5 Made in Africa Cybersecurity Solutions, Products and Services
3 Description of the Four Unique Contexts
4 Argument for Effective ICT Use as the Solution
5 The Portal Platform and Its Features
5.1 Architectural Goals
5.2 Guiding Principles
5.3 Design Principles
6 The Smart Community Centre Model of SEIDET
7 Embedded Portal into the Smart Community Centre Model of SEIDET
8 Concluding Discussion
References
Adoption of Social Media for the Banking Sector in Sri Lanka
Abstract
1 Introduction
2 Literature Review
3 Conceptual Framework
3.1 Introduction
3.2 Perceived Risk of Social Media
3.3 Perceived Cost of Social Media
3.4 Perceived Advantage of Social Media
3.5 Perceived Ease of Use and Perceived Usefulness of Social Media
3.6 Attitude Towards Using Social Media and Social Media Adoption
3.7 Demographic Characteristics: Knowledge and Age
4 Methodology
5 Discussion
6 Expected Benefits
Appendix
References
Visualising Actor Network for Cooperative Systems in Marine Technology
Abstract
1 Background
2 Challenges of Awareness and ANT in Design
3 A Marine Example
4 Transferring Technique (2T)
5 2T-Supported Marine Technology
6 Concluding Remarks
Acknowledgements
References
“To Listen, Share, and to Be Relevant” - Learning Netiquette by Reflective Practice
The Embodiment of Relationships of Adult Facebookers
Manifestations of Users’ Privacy Concerns in a Formative Usability Test of Social Networking Site
Denial of Choice: Group Level Disclosure of Private Information
From Caravaggio to Braque: Digital Technology and the Illusion of Augmented Responsibility
Examining User Experience in an Augmented Reality Adventure Game: Case Luostarinmäki Handicrafts Museum
Abstract
1 Introduction
2 Reality… Augmented?
2.1 What Is AR?
2.2 Our Prototype
3 Research Method
4 Results
5 Discussion
6 Conclusions
Acknowledgements
References
Using a Mobile Phone as a 2D Virtual Tracing Tool: Static Peephole vs. Magic Lens
Futures
The Beginnings of Government Support for Computers in Schools – The State Computer Education Centre ...
Abstract
1 Introduction
2 Computers in Australian Schools in the 1980s
3 The Beginnings of the State Computer Education Centre of Victoria
4 Computer Education Support Centres in Other States
4.1 Angle Park Computing Centre, South Australia
4.2 The Elizabeth Computer Centre, Tasmania
5 Research Methodology
6 The State Computer Education Centre of Victoria (SCEC)
6.1 Head of the Centre
6.2 Software
6.3 Curriculum
6.4 Professional Development
6.5 Educational Computer Systems Evaluation
6.6 Regional Computer Centres
7 Some Views of SCEC Professional Staff
7.1 Mary
7.2 Oliver
7.3 Janice
7.4 Matthew
7.5 Betty
7.6 Allan
7.7 Mark
8 Conclusion
References
Collaborative Annotation Sharing in Physical and Digital Worlds
Abstract
1 Introduction
2 Previous Work
3 System Design
4 Method
5 Discussion
6 Conclusion
References
Revocable Anonymisation in Video Surveillance: A ``Digital Cloak of Invisibility''
1 Introduction
2 Technological Implementation
3 Legal Considerations
4 Economic Applications
5 Ethical Impact Assessment
6 Discussion and Conclusion
References
Edges, Surfaces, and Spaces of Action in 21st Century Urban Environments – Connectivities and Awareness in the City
Abstract
1 Introduction
2 Review of the Literature
2.1 Edges, Spaces, Surfaces, and the In-Between
2.2 Awareness, Infrastructure, and Experience
2.3 Summary
3 Methodology
3.1 Process
3.2 Data Collection
3.3 Analysis of the Data
4 Findings
4.1 P1: Edges, Surfaces, Spaces and the In-Between: Awareness
4.2 P2: Social Media and Aware Technologies: Infrastructures for Action
4.3 P3: Urban Infrastructure: Connectivities and Awareness for Action
4.4 Summary
5 Discussion
6 Contributions and Future Directions
7 Limitations and Mitigations
8 Conclusion
References
Author Index