Analysing the factors affecting users in intelligent pervasive spaces

Recent advancements in pervasive computing allow embedded Information Communication Technology (ICT) systems to collect information and apply it in ways that result in new advanced services. In order to provide these services, a vast number of sensors are used to collect large levels of data pervasively. While successful in many environments, in some situations, monitoring technologies have been known to cause undesirable effects, such as increases in stress in those being observed. With an increase in the coverage of the data collection in pervasive spaces, we anticipate an increase in the impact of such effects. To date, the use of this monitoring technology and its effect on human behaviour have not been thoroughly investigated, meaning future system designs may result in (preventable) undesirable effects. This article analyses a series of recurring factors, identified in the literature and believed to influence occupant behaviour, from both physical and social perspectives. The use of such factors, and their relationships, as a means of analysing and comparing monitoring systems is also described. These factors/concepts can be linked to existing predictive behavioural models, and when empirical evidence is collected, a tool for predicting, and therefore preventing, the undesirable effects of this new technology may be possible.

[1]  Johann Cas,et al.  Privacy in pervasive computing environments - a contradiction in terms? , 2005, IEEE Technology and Society Magazine.

[2]  Emmanuel,et al.  Activity recognition in the home setting using simple and ubiquitous sensors , 2003 .

[3]  Wendy S. Ark,et al.  At What Cost Pervasive? A Social Comuting View of Mobile Computing Systems , 1999, IBM Syst. J..

[4]  Hani Hagras,et al.  Inhabited Intelligent Environments , 2004 .

[5]  David C. Yen,et al.  Theory of planning behavior (TPB) and customer satisfaction in the continued use of e-service: An integrated model , 2007, Comput. Hum. Behav..

[6]  Mare Langheinrich,et al.  Personal privacy in ubiquitous computing: Tools and system support , 2005 .

[7]  Gregory D. Abowd,et al.  Physical, Social, and Experiential Knowledge in Pervasive Computing Environments , 2007, IEEE Pervasive Computing.

[8]  George Roussos,et al.  Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments , 2006, Personal and Ubiquitous Computing.

[9]  Kent Larson,et al.  A living laboratory for the design and evaluation of ubiquitous computing technologies , 2005, CHI Extended Abstracts.

[10]  J. Webster,et al.  Where is the line between benign and invasive? An examination of psychological barriers to the acceptance of awareness monitoring systems , 2002 .

[11]  Daniel Robey,et al.  Human agency in a wireless world: Patterns of technology use in nomadic computing environments , 2005, Inf. Organ..

[12]  Agustin A. Araya,et al.  Questioning ubiquitous computing , 1995, CSC '95.

[13]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[14]  Edward Finch,et al.  The impact of an intelligent classroom on pupils' interactive behaviour , 2005 .

[15]  I. Ajzen,et al.  Understanding Attitudes and Predicting Social Behavior , 1980 .

[16]  Gregory D. Abowd,et al.  The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.

[17]  Michael Rohs,et al.  Living in a World of Smart Everyday Objects—Social, Economic, and Ethical Implications , 2004 .

[18]  Gordon B. Davis,et al.  Anytime/anyplace computing and the future of knowledge work , 2002, CACM.

[19]  Charles D. Barrett Understanding Attitudes and Predicting Social Behavior , 1980 .

[20]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[21]  G. Marx Murky conceptual waters: The public and the private , 2001, Ethics and Information Technology.

[22]  Frank Pallas,et al.  Technology paternalism – wider implications of ubiquitous computing , 2005, Poiesis Prax..

[23]  Elizabeth D. Mynatt,et al.  Potential Intrusiveness of Aware Home Technology: Perceptions of Older Adults , 2004 .

[24]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[25]  Friedemann Mattern,et al.  Living in a smart environment - implications for the coming ubiquitous information society , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[26]  I. Ajzen The theory of planned behavior , 1991 .

[27]  Marc Böhlen Second order ambient intelligence , 2009, J. Ambient Intell. Smart Environ..

[28]  Kent Larson,et al.  Using a Live-In Laboratory for Ubiquitous Computing Research , 2006, Pervasive.

[29]  David Zweig,et al.  Beyond Privacy and Fairness Concerns: Examining Psychological Boundary Violations as a Consequence of Electronic Performance Monitoring , 2005 .

[30]  Youngjin Yoo,et al.  Socio-Technical Studies of Mobility and Ubiquity , 2005, Designing Ubiquitous Information Environments.

[31]  J. R. Larson,et al.  Performance monitoring: How it affects work productivity. , 1990 .

[32]  Marc Langheinrich,et al.  Personal Privacy in Ubiquitous Computing , 2005 .

[33]  Emmanuel Munguia Tapia,et al.  Lessons learned using ubiquitous sensors for data collection in real homes , 2004, CHI EA '04.

[34]  James B. Rule,et al.  Computerized surveillance in the workplace: Forms and distributions , 1992 .

[35]  Elizabeth D. Mynatt,et al.  Privacy Mirrors: Understanding and Shaping Socio-technical Ubiquitous Computing Systems , 2002 .

[36]  Jean Scholtz,et al.  Toward a Framework for Evaluating Ubiquitous Computing Applications , 2004, IEEE Pervasive Comput..

[37]  Jeffrey M. Stanton,et al.  Reactions to Employee Performance Monitoring: Framework, Review, and Research Directions , 2000 .

[38]  Katrin Jonsson,et al.  The Embedded Panopticon: Visibility Issues of Remote Diagnostics Surveillance , 2006, Scand. J. Inf. Syst..

[39]  W. Mackenzie,et al.  The Management and the Worker , 2008 .

[40]  Kent Larson,et al.  THE PLACELAB : A LIVE-IN LABORATORY FOR PERVASIVE COMPUTING RESEARCH ( VIDEO ) , 2005 .

[41]  Marc Langheinrich,et al.  Privacy and trust issues with invisible computers , 2005, CACM.

[42]  Graham Clarke,et al.  Some socio-technical aspects of intelligent buildings and pervasive computing research , 2009 .

[43]  Shane Dawson,et al.  Watching Learning From Behind Closed Doors: The Impact of Surveillance on Student Online Behaviour , 2005 .

[44]  Mihaela Vorvoreanu,et al.  Examining Electronic Surveillance In The Workplace: A Review Of Theoretical Perspectives And Research Findings , 2000 .

[45]  Stephen S Intille,et al.  To Track or Not to Track: User Reactions to Concepts in Longitudinal Health Monitoring , 2006, Journal of medical Internet research.

[46]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[47]  Mihaela Vorvoreanu,et al.  What Do Employees Think about Electronic Surveillance at Work , 2005 .

[48]  R. Rosenthal,et al.  Pygmalion in the Classroom: Teacher Expectation and Pupils' Intellectual Development , 1968 .

[49]  Steve Sawyer,et al.  Surfing the Next Wave: Design and Implementation Challenges of Ubiquitous Computing , 2004, Commun. Assoc. Inf. Syst..

[50]  Keiichi Nakata,et al.  Ubiquitous Monitoring and Human Behaviour in Intelligent Pervasive Spaces , 2009, 2009 International Conference on Computational Science and Engineering.

[51]  Yves Punie,et al.  A social and technological view of Ambient Intelligence in Everyday Life : What bends the trend ? Key Deliverable The European Media and Technology in Everyday Life Network , 2000-2003 , 2003 .

[52]  J. R. Aiello,et al.  Computer Monitoring of Work Performance: Extending the Social Facilitation Framework to Electronic Presence1 , 1993 .