Co-Living Social Community for Elderly

With a rapidly increasing elderly population, keeping elderly healthy is more important than ever. Physical and social activity is closely related to people’s well-being. This paper describes some of the challenges faced when activating elderly people in an organised fashion. We propose a Virtual Collaborative Social Living Community for Elderly; utilising friends, family and care-professionals connected to the elderly in achieving this goal. Challenges related to this work in progress is then presented. The paper presents experiences made in an ongoing development and deployment of a socio-technical system.

[1]  Steffen Späthe,et al.  Geolocated communication support in rescue management , 2011, ISCRAM.

[2]  Yolande Berbers,et al.  A Notion of Event Quality for Contextualized Planning and Decision Support Systems , 2011, CONTEXT.

[3]  Martin Gilje Jaatun,et al.  Reference deployment models for eliminating user concerns on cloud security , 2010, The Journal of Supercomputing.

[4]  Åsmund Ahlmann Nyre Usage Control Enforcement - A Survey , 2011, ARES.

[5]  M. Bruce Corp CHAPTER 12 – Overall System Design , 1990 .

[6]  Gerald Eichler,et al.  Spree - Trial-based Improvements: Transferring an Enterprise 2.0 into a Web 2.0 Expert Community Application , 2011, IICS.

[7]  John Krogstie,et al.  A longitudinal study of development and maintenance in Norway: Report from the 2003 investigation , 2006, Inf. Softw. Technol..

[8]  J. van Leeuwen,et al.  Intelligent Agents V: Agents Theories, Architectures, and Languages , 2003, Lecture Notes in Computer Science.

[9]  Rajashree V Biradar,et al.  Classification and Comparison of Routing Protocols in Wireless Sensor Networks , 2009 .

[10]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[11]  Stefano Chessa,et al.  Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards , 2007, Comput. Commun..

[12]  Herwig Unger,et al.  Search Word Extraction Using Extended PageRank Calculations , 2012, Autonomous Systems: Developments and Trends.

[13]  Lora Aroyo,et al.  The NoTube Beancounter: Aggregating User Data for television Programme Recommendation , 2009, ISWC 2009.

[14]  Kenneth L. Mattox,et al.  Modeling and Simulation in Terror Medicine , 2009 .

[15]  Jimmy J. Lin,et al.  Where is the Cloud? Geography, Economics, Environment, and Jurisdiction in Cloud Computing , 2009, First Monday.

[16]  Henry Mintzberg,et al.  Managing the care of health and the cure of disease--Part II: Integration. , 2001, Health care management review.

[17]  Yoshimichi Sato Rational choice theory , 2013 .

[18]  Marijn Janssen,et al.  The Entanglement of Enterprise Architecture and IT-Governance: The Cases of Norway and the Netherlands , 2011, 2011 44th Hawaii International Conference on System Sciences.

[19]  Howard M. Heys,et al.  Energy efficiency of encryption schemes applied to wireless sensor networks , 2012, Secur. Commun. Networks.

[20]  Izak Benbasat,et al.  Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness , 2010, MIS Q..

[21]  Adam Dunkels,et al.  Increasing ZigBee network lifetime with X-MAC , 2008, REALWSN '08.

[22]  Jonna Häkkilä,et al.  Let's all get up and walk to the North Pole: design and evaluation of a mobile wellness application , 2010, NordiCHI.

[23]  Gerald Eichler,et al.  Ad-hoc Community Composition of Rescue Forces in Action Situations , 2010, IICS.

[24]  Prashant Palvia,et al.  Software maintenance management: Changes in the last decade , 1990, J. Softw. Maintenance Res. Pract..

[25]  Valeriy Vyatkin,et al.  Toward Digital Ecologies: Intelligent Agent Networks Controlling Interdependent Infrastructures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[26]  A. Faxvaag,et al.  Process support for risk mitigation: a case study of variability and resilience in vascular surgery , 2011, Quality and Safety in Health Care.

[27]  M. S. Blois,et al.  What is medical informatics? , 1986, The Western journal of medicine.

[28]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[29]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[30]  Roy T. Fielding,et al.  Principled design of the modern Web architecture , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[31]  Dirk Schönfuß,et al.  CONTENTUS—technologies for next generation multimedia libraries , 2011, Multimedia Tools and Applications.

[32]  Helen Nissenbaum,et al.  Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .

[33]  Marcel Worring,et al.  Concept-Based Video Retrieval , 2009, Found. Trends Inf. Retr..

[34]  Valentin Tablan,et al.  Web-assisted annotation, semantic indexing and search of television and radio news , 2005, WWW '05.

[35]  Hajo A. Reijers,et al.  Workflow for Healthcare: A Methodology for Realizing Flexible Medical Treatment Processes , 2009, Business Process Management Workshops.

[36]  Ian H. Witten,et al.  Data mining: practical machine learning tools and techniques, 3rd Edition , 1999 .

[37]  Marius Mikalsen,et al.  Interoperability Services in the MPOWER Ambient Assisted Living Platform , 2009, MIE.

[38]  Mahesh K. Marina,et al.  On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[39]  Michael C. Hout,et al.  Multidimensional Scaling , 2003, Encyclopedic Dictionary of Archaeology.

[40]  Johan Oomen,et al.  Linking Europe's Television Heritage , 2012 .

[41]  Alexander M. Bronstein,et al.  Multigrid multidimensional scaling , 2006, Numer. Linear Algebra Appl..

[42]  George E. Higgins,et al.  An Application of Deterrence Theory to Software Piracy , 2005 .

[43]  Thomas Steiner SemWebVid - Making Video a First Class Semantic Web Citizen and a First Class Web Bourgeois , 2010, ISWC Posters&Demos.

[44]  Thierry Denoeux,et al.  Multidimensional scaling of interval-valued dissimilarity data , 2000, Pattern Recognit. Lett..

[45]  Eric Anderson,et al.  X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks , 2006, SenSys '06.

[46]  Slinger Jansen,et al.  A sense of community: A research agenda for software ecosystems , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.

[47]  F. P. Wieland,et al.  A CONCEPT PROTOTYPE FOR INTEGRATED GAMING AND SIMULATION FOR INCIDENT MANAGEMENT , 2006 .

[48]  Harald Sack,et al.  A skeleton based binarization approach for video text recognition , 2012, 2012 13th International Workshop on Image Analysis for Multimedia Interactive Services.

[49]  John Krogstie,et al.  A study of development and maintenance in Norway: assessing the efficiency of information systems support using functional maintenance , 2000, Inf. Softw. Technol..

[50]  Subhash C. Kak,et al.  Online data storage using implicit security , 2009, Inf. Sci..

[51]  Xiping Song,et al.  Managing exceptions in the medical workflow systems , 2006, ICSE.

[52]  Radu State,et al.  Management of Ad-Hoc Networks , 2008 .

[53]  P. Sheeran,et al.  Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory , 2000 .

[54]  Ai-Chun Pang,et al.  A comprehensive study of low-power operation in ieee 802.15.4 , 2007, MSWiM '07.

[55]  Andreas Schwill,et al.  Lernen im digitalen Zeitalter - DeLFI 2009, die 7. E-Learning-Fachtagung Informatik der Gesellschaft für Informatik e.V., 14. - 17. September 2009 an der Freien Universität Berlin , 2009, DeLFI.

[56]  Angelos Bilas,et al.  Providing security to the Desktop Data Grid , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[57]  Abigail Sellen,et al.  User sketches: a quick, inexpensive, and effective way to elicit more reflective user feedback , 2006, NordiCHI '06.

[58]  R. W. Rogers,et al.  A meta-analysis of research on protection motivation theory. , 2000 .

[59]  Gerald Eichler,et al.  Simulation of wireless, self-organizingandagent-based dynamic communication scenarios , 2012, ISCRAM.

[60]  Sicherheit 2012: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 6. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 7.-9. März 2012 in Darmstadt , 2012, Sicherheit.

[61]  Peter Loos,et al.  BPM-in-the-Large - Towards a Higher Level of Abstraction in Business Process Management , 2010, EGES/GISP.

[62]  Martin Gilje Jaatun,et al.  A farewell to trust: An approach to confidentiality control in the Cloud , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[63]  Randy H. Katz,et al.  Above the Clouds: A Berkeley View of Cloud Computing , 2009 .

[64]  K. Mani Chandy,et al.  Event Processing - Designing IT Systems for Agile Companies , 2009 .

[65]  Azzedine Boukerche,et al.  Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks , 2004, Mob. Networks Appl..

[66]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[67]  Gabriela Csurka,et al.  Visual categorization with bags of keypoints , 2002, eccv 2004.

[68]  Hacène Fouchal,et al.  Efficient Communications over Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[69]  Roberto Basili,et al.  Creating Rich Metadata in the TV Broadcast Archives Environment: The PrestoSpace Project , 2006, 2006 Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS'06).

[70]  Wolfgang Prinz,et al.  What Happened to our Document in the Shared Workspace? The Need for Groupware Conventions , 1997, INTERACT.

[71]  U. Quasthoff,et al.  The Poisson Collocation Measure and its Applications , 2002 .

[72]  Eric Horvitz,et al.  Collaborative Filtering by Personality Diagnosis: A Hybrid Memory and Model-Based Approach , 2000, UAI.

[73]  Michael Herczeg,et al.  NEMO: the network environment for multimedia objects , 2010, IITM '10.

[74]  Harald Sack,et al.  The Path is the Destination - Enabling a New Search Paradigm with Linked Data , 2010, LDSI@FIA.

[75]  Aditya Goel,et al.  Performance Analysis of Mobile Ad-hoc Network Using AODV Protocol , 2009 .

[76]  Harald Sack,et al.  Named Entity Recognition for User-Generated Tags , 2011, 2011 22nd International Workshop on Database and Expert Systems Applications.

[77]  Abdellatif Mtibaa,et al.  Video shot boundary detection using motion activity descriptor , 2010, ArXiv.

[78]  Donald A. Adjeroh,et al.  Adaptive Edge-Oriented Shot Boundary Detection , 2009, EURASIP J. Image Video Process..

[79]  J. Kruskal Nonmetric multidimensional scaling: A numerical method , 1964 .

[80]  Abigail Sellen,et al.  Getting the right design and the design right , 2006, CHI.

[81]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[82]  Toni C. Antonucci,et al.  Social Networks, Support, and Integration , 2007 .

[83]  Norbert Wehn,et al.  Energy modelling in sensor networks , 2007 .

[84]  Amit N. Thakare,et al.  Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks , 2010 .

[85]  E. Rogers,et al.  Diffusion of innovations , 1964, Encyclopedia of Sport Management.

[86]  A. Mahmood,et al.  Factors Influencing Protection Motivation and IS Security Policy Compliance , 2006, 2006 Innovations in Information Technology.

[87]  C. V. Ramamoorthy,et al.  Social and Expert Research in Online Communities , 2010 .

[88]  Volkmar Schau Ellipsis - Konzeption und Implementierung einer vereinheitlichten und leistungsfähigen Architektur für Multi-Agenten-Systeme (MAS) auf Basis frei verfügbarer IT-Infrastrukturkomponenten unter besonderer Berücksichtigung internationaler Standards , 2012 .

[89]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[90]  Hakim Weatherspoon,et al.  RACS: a case for cloud storage diversity , 2010, SoCC '10.

[91]  Martin Gilje Jaatun,et al.  A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages , 2011, 2011 IEEE Third International Conference on Cloud Computing Technology and Science.

[92]  Robert P. Minch,et al.  Application of Protection Motivation Theory to Adoption of Protective Technologies , 2009, 2009 42nd Hawaii International Conference on System Sciences.

[93]  John Krogstie,et al.  Process Modeling Value Framework , 2006, ICEIS.

[94]  Bastian Ulke,et al.  Navigation in the P2Life Networked Virtual Marketplace Environment , 2012, Autonomous Systems: Developments and Trends.

[95]  Mikko T. Siponen,et al.  Which Factors Explain Employees' Adherence to Information Security Policies? An Empirical Study , 2007, PACIS.

[96]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[97]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[98]  Paul Dourish,et al.  Taking the work out of workflow: Mechanisms for document-centered collaboration , 1999, ECSCW.

[99]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[100]  B. McCarthy NEW ECONOMICS OF SOCIOLOGICAL CRIMINOLOGY , 2002 .

[101]  Rafael A. Gonzalez Crisis response simulation combining discrete-event and agent-based modeling , 2009 .

[102]  Idit Keidar,et al.  Trusting the cloud , 2009, SIGA.

[103]  Alan L. Rector,et al.  Editing Description Logic Ontologies with the Protégé OWL Plugin , 2004, Description Logics.

[104]  H. Raghav Rao,et al.  Protection motivation and deterrence: a framework for security policy compliance in organisations , 2009, Eur. J. Inf. Syst..

[105]  Eric Grosse,et al.  Cloud Computing Roundtable , 2010, IEEE Security & Privacy Magazine.

[106]  Cordelia Schmid,et al.  Local Features and Kernels for Classification of Texture and Object Categories: A Comprehensive Study , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[107]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[108]  Alan Cooper,et al.  About Face 3: the essentials of interaction design , 1995 .

[109]  Maria Calle,et al.  MAC Protocols Used by Wireless Sensor Networks and a General Method of Performance Evaluation , 2012, Int. J. Distributed Sens. Networks.

[110]  Alan L. Rector,et al.  MEDICAL INFORMATICS , 1990, The Lancet.

[111]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[112]  R. Cardell-Oliver,et al.  Field testing a wireless sensor network for reactive environmental monitoring [soil moisture measurement] , 2004, Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, 2004..

[113]  Ted Dunning,et al.  Accurate Methods for the Statistics of Surprise and Coincidence , 1993, CL.

[114]  Timothy Roscoe,et al.  Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.

[115]  Yonatan Wexler,et al.  Detecting text in natural scenes with stroke width transform , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.

[116]  Gerard Salton,et al.  A vector space model for automatic indexing , 1975, CACM.

[117]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[118]  Haojin Yang,et al.  Text detection in video images using adaptive edge detection and Stroke Width verification , 2012, 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP).

[119]  Martin Gilje Jaatun,et al.  Deliverance from trust through a Redundant Array of Independent Net-storages in Cloud Computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[120]  John Krogstie,et al.  Integrated Quality of Models and Quality of Maps , 2009, BMMDS/EMMSAD.

[121]  E. Burton Swanson,et al.  Characteristics of application software maintenance , 1978, CACM.

[122]  Harald Wesenberg Enterprise Modeling in an Agile World , 2011, PoEM.

[123]  Mica R. Endsley,et al.  Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.

[124]  Charles R. McLean,et al.  Towards standards for integrated gaming and simulation for incident management , 2007, SCSC.

[125]  Tejaswini Herath,et al.  Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness , 2009, Decis. Support Syst..

[126]  John Krogstie,et al.  Assessing Business Process Modeling Languages Using a Generic Quality Framework , 2006 .

[127]  Ulrik Brandes,et al.  Social Networks , 2013, Handbook of Graph Drawing and Visualization.

[128]  John Krogstie,et al.  Interactive Models for Supporting Networked Organisations , 2004, CAiSE.

[129]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[130]  J. Leeuw Applications of Convex Analysis to Multidimensional Scaling , 2000 .

[131]  John Krogstie,et al.  Information Systems Engineering: Conceptual Modeling in a quality perspective , 2003 .

[132]  John Krogstie,et al.  A longitudinal study of development and maintenance , 2010, Inf. Softw. Technol..

[133]  M. Guechari,et al.  Dynamic solution for detecting Denial of Service attacks in wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[134]  Weiyi Zhang,et al.  A secured cost-effective multi-cloud storage in cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[135]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[136]  Kevin Li,et al.  Faceted metadata for image search and browsing , 2003, CHI '03.

[137]  Arslan Brömme,et al.  BIOSIG 2007: biometrics and electronic signatures , 2007 .

[138]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[139]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[140]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[141]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[142]  Witold Dzwinel,et al.  Parallel Implementation of Multidimensional Scaling Algorithm Based on Particle Dynamics , 2009, PPAM.

[143]  Manfred Tscheligi,et al.  Paper prototyping - what is it good for?: a comparison of paper- and computer-based low-fidelity prototyping , 2003, CHI Extended Abstracts.

[144]  L. R. Dice Measures of the Amount of Ecologic Association Between Species , 1945 .

[145]  Michael Herczeg,et al.  Software-Ergonomie: Theorien, Modelle und Kriterien für gebrauchstaugliche interaktive Computersysteme , 2009 .

[146]  Wil M. P. van der Aalst,et al.  Intra- and Inter-Organizational Process Mining: Discovering Processes within and between Organizations , 2011, PoEM.

[147]  J. Kruskal Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis , 1964 .

[148]  Irene Woon,et al.  A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.

[149]  John Krogstie,et al.  Software maintenance in Norway: a survey investigation , 1994, Proceedings 1994 International Conference on Software Maintenance.

[150]  Jalel Ben-Othman,et al.  Enhancing data security in ad hoc networks based on multipath routing , 2010, J. Parallel Distributed Comput..

[151]  Peter Braun,et al.  Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit , 2004 .

[152]  Harald Sack,et al.  Towards exploratory video search using linked data , 2009, 2009 11th IEEE International Symposium on Multimedia.

[153]  Gerald Eichler,et al.  Self Organization in Enterprise 2.0 Communities: To Introduce a New Experts' Exchange Application , 2012, Autonomous Systems: Developments and Trends.

[154]  L. G. Tornatzky,et al.  Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.

[155]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..