Perceptions of a Wearable Ubiquitous Monitoring Device

Aworld of ubiquitous computing, full of networked mobile and embedded technologies, is approaching. The benefits of this technology are numerous, and act as the major driving force behind its development. These benefits are brought about, in part, by ubiquitous monitoring (UM): the continuous and wide spread collection of significant amounts of data about users [1].

[1]  Richard Beckwith,et al.  Designing for Ubiquity: The Perception of Privacy , 2003, IEEE Pervasive Comput..

[2]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[3]  S. Kanazawa,et al.  Group Solidarity and Social Order in Japan , 1993, Rational Choice Sociology.

[4]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[5]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[6]  Yan Li,et al.  Senior Citizens' Acceptance of Information Systems: A Study in the Context of e-Government Services , 2006, IEEE Transactions on Engineering Management.

[7]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[8]  Keiichi Nakata,et al.  Analysing the factors affecting users in intelligent pervasive spaces , 2010 .

[9]  F. J. Roethlisberger,et al.  Management and the Worker , 2003 .

[10]  Ritsuko Ozaki,et al.  Boundaries and the Meaning of Social Space: A Study of Japanese House Plans , 2006 .

[11]  Isaac Wiafe,et al.  Ubiquitous Monitoring and User Perceptions as a Persuasive Strategy , 2011, 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.

[12]  I. Ajzen The theory of planned behavior , 1991 .

[13]  Nobuo Komiya,et al.  A Cultural Study of the Low Crime Rate in Japan , 1999 .

[14]  Shane Dawson,et al.  Watching Learning From Behind Closed Doors: The Impact of Surveillance on Student Online Behaviour , 2005 .

[15]  Christopher A. Higgins,et al.  Computerized performance monitors: are they costing you customers? , 1994 .

[16]  Peter Øhrstrøm,et al.  Surveillance, Persuasion, and Panopticon , 2007, PERSUASIVE.

[17]  Keiichi Nakata,et al.  Assessment of assistive technologies based on the PSA-BI model , 2011, PETRA '11.

[18]  Alfred Kobsa,et al.  An empirical investigation of concerns of everyday tracking and recording technologies , 2008, UbiComp.

[19]  Stuart J. Barnes,et al.  Rising sun: iMode and the wireless Internet , 2003, CACM.

[20]  F. J. Roethlisberger,et al.  Management and the Worker , 1941 .

[21]  Mark Cole Signage and Surveillance: Interrogating the Textual Context of CCTV in the UK , 2002 .

[22]  E. Nagy,et al.  Japanese office employees' psychological reactions to their underground and above-ground offices , 1995 .

[23]  Mihaela Vorvoreanu,et al.  Examining Electronic Surveillance In The Workplace: A Review Of Theoretical Perspectives And Research Findings , 2000 .

[24]  Mun Y. Yi,et al.  Understanding the Role of Individual Innovativeness in the Acceptance of IT-Based Innovations: Comparative Analyses of Models and Measures , 2006, Decis. Sci..