SlideShare une entreprise Scribd logo
1  sur  19
Télécharger pour lire hors ligne
Studying the Impact of
Ubiquitous Monitoring
Technology on Office Worker
Behaviours: The Value of
Sharing Research Data
Stuart Moran, Irene Lopez de Vallejo, Keiichi
Nakata, Ruth Conroy-Dalton, Rachael Luck,
Peter McLennan and Steve Hailes
Introduction
 Pervasive Computing
 Benefits in the workplace
 Gaps on how to use data
    ◦ Method/Guide to using data
------------------------------------------------------
 Monitoring changes behaviour
 Undesirable effects
    ◦ Method for predicting
      behavioural responses
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
Methodology
   Positivism / Mixed Methods
    ◦ Reality is believed to be directly observable and measureable
 Thematic Content Analysis
 Questionnaire and Statistical Analysis
 Simulation developed in VenSim
 Triangulate VenSim prediction with Interview Data


   Interpretivism / Mixed Methods
    ◦ Reality is believed to only be understood through subjective
      interpretation
 Interviews and Observation data triangulated to portray
  complex socio technical system
 Research allowed to evolve and unfold, rather than constrain
  it through structure
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
Data
 Six week temporary pilot project (2005)
 Testing of wearable location tracking
  technology in office
 Two wearable RFID tags
 28 semi structured interviews
 This data was shared

                                                                      Buffer




                                                   


                                  


                                            Cell 2
                   Cell 1
                                                         
                                

                                                             Sensor
                          

                                             
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
“I don’t understand how the
                                         technology works and what

Analysis                                will happen at the end of the
                                                    trial”


   Deduction
    ◦ Use factors as coding
   Induction
    ◦ Allow themes to emerge

    Vallejo et al. Themes     Moran and Nakata Factors
       Understanding and           Informed User, and
        Communication            Application Assumptions
       Temporary Nature
                                     Temporal Effects
      of the Deployment
                                Perceived Privacy Invasion,
          Privacy and
                                  Device Obtrusion and
            Intrusio
                                  Positioning of Device
                                  Perceived Usefulness,
         Attitudes and
                                Undesirable Behaviours and
     Organisational Culture
                                   Influencing Attitude
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
Interview Conclusions
   Cross Comparison demonstrated very similar
    conclusions

   Different approaches adopted by researchers
    add confidence to comparison

   Moran and Nakata’s factors confirmed as
    effective monitoring based coding scheme
Mutual
                Project 1                   Project 2
                             Aspects

Background    Engineering                   Sociology

                             Impact of
Motivation
                              PerCom

 Questions     Literature                  Real World

               Positivism                 Interpretivism
Methodology
              /Mix.Method                  /Mix.Method
                             Interview
   Data
                                Data

  Analysis    Deduction                     Induction


Conclusion                  Conclusions

               Predictive
  Output                                  Methodology
                 Model
Output
   Project 1: developed the PSA-BI model for
    predicting monitored user behaviour
                                                                           Exogenous Moderating Variables

                                         Moderating Anchors
                                   Past         Computer
                                                                 Context           Age          Gender       Environment       Role          Culture
                                Experience      Skill Level



                                                                                                              Behavior Based
                                                                            Social Influence                     Attitudes

           External Variables                Object Based
           Anchors                           Beliefs                   Object Based Attitudes


                  Application                   Application                  Attitude toward
                    Space                       Perceptions                    Application
                                                                                                         Attitude toward              Behaviour
                                                                                                            Behaviour                 Intention

                 Technology                     Technology                   Attitude toward
                   Space                        Perceptions                   Technology




                                       Adjusters                              Facilitating
                                                                              Conditions
                             New
                                       Experience         Time
                         Information




   Project 2: developed a guide on how to
    make use of accurate location data in
    understanding flow interaction dynamics in
    organisations
Conclusions
   Different projects, aims and methods

   Same question, data and conclusions

   Reminder that there is value in sharing
    research data between researchers and
    across disciplines

   Online repository of qualitative and
    quantitative to facilitate the sharing of data
Questions?
Discussion Questions
 Why is research data not more frequently
  and widely shared?
 How can we (in this room) collaborate and
  share resources?
 What immediate benefits can really be
  gained from Pervasive technology in the
  next 5 years?
 What social implications are we already
  aware of?

Contenu connexe

Tendances

0810ijdms02
0810ijdms020810ijdms02
0810ijdms02ayu dewi
 
Research methods for socio-technical systems analysis (LSCITS EngD 2012)
Research methods for socio-technical systems analysis (LSCITS EngD 2012)Research methods for socio-technical systems analysis (LSCITS EngD 2012)
Research methods for socio-technical systems analysis (LSCITS EngD 2012)Ian Sommerville
 
NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)
NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)
NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)Maryam Farooq
 
Image text duke_political_conference(25_may2010)presentation
Image text duke_political_conference(25_may2010)presentationImage text duke_political_conference(25_may2010)presentation
Image text duke_political_conference(25_may2010)presentationHan Woo PARK
 
Research methods miriam 2011 for uploading
Research methods miriam 2011 for uploadingResearch methods miriam 2011 for uploading
Research methods miriam 2011 for uploadingMarilen Parungao
 
BAEB601 Chapter 1(part 2): Introduction to Research Methodology
BAEB601 Chapter 1(part 2): Introduction to Research MethodologyBAEB601 Chapter 1(part 2): Introduction to Research Methodology
BAEB601 Chapter 1(part 2): Introduction to Research MethodologyDr Nur Suhaili Ramli
 
Acceptance of Mobile Technology in Hedonic Scenarios
Acceptance of Mobile Technology in Hedonic ScenariosAcceptance of Mobile Technology in Hedonic Scenarios
Acceptance of Mobile Technology in Hedonic ScenariosMarkel Vigo
 
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesDistinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesIOSR Journals
 
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREASON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAScscpconf
 

Tendances (12)

0810ijdms02
0810ijdms020810ijdms02
0810ijdms02
 
Research methods for socio-technical systems analysis (LSCITS EngD 2012)
Research methods for socio-technical systems analysis (LSCITS EngD 2012)Research methods for socio-technical systems analysis (LSCITS EngD 2012)
Research methods for socio-technical systems analysis (LSCITS EngD 2012)
 
NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)
NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)
NYAI #23: Using Cognitive Neuroscience to Create AI (w/ Dr. Peter Olausson)
 
Image text duke_political_conference(25_may2010)presentation
Image text duke_political_conference(25_may2010)presentationImage text duke_political_conference(25_may2010)presentation
Image text duke_political_conference(25_may2010)presentation
 
icmi2233-bixler
icmi2233-bixlericmi2233-bixler
icmi2233-bixler
 
Research methods miriam 2011 for uploading
Research methods miriam 2011 for uploadingResearch methods miriam 2011 for uploading
Research methods miriam 2011 for uploading
 
BAEB601 Chapter 1(part 2): Introduction to Research Methodology
BAEB601 Chapter 1(part 2): Introduction to Research MethodologyBAEB601 Chapter 1(part 2): Introduction to Research Methodology
BAEB601 Chapter 1(part 2): Introduction to Research Methodology
 
Acceptance of Mobile Technology in Hedonic Scenarios
Acceptance of Mobile Technology in Hedonic ScenariosAcceptance of Mobile Technology in Hedonic Scenarios
Acceptance of Mobile Technology in Hedonic Scenarios
 
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis TechniquesDistinguishing Cognitive Tasks Using Statistical Analysis Techniques
Distinguishing Cognitive Tasks Using Statistical Analysis Techniques
 
Myung - Cognitive Modeling and Robust Decision Making - Spring Review 2012
Myung - Cognitive Modeling and Robust Decision Making - Spring Review 2012Myung - Cognitive Modeling and Robust Decision Making - Spring Review 2012
Myung - Cognitive Modeling and Robust Decision Making - Spring Review 2012
 
MobiMed: Comparing Object Identification Techniques on Smartphones
MobiMed: Comparing Object Identification Techniques on SmartphonesMobiMed: Comparing Object Identification Techniques on Smartphones
MobiMed: Comparing Object Identification Techniques on Smartphones
 
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREASON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
ON SOFT COMPUTING TECHNIQUES IN VARIOUS AREAS
 

Similaire à Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Behaviours: The Value of Sharing Research Data

Architectural Research Methods Table
Architectural  Research  Methods    TableArchitectural  Research  Methods    Table
Architectural Research Methods TableGalala University
 
Ph d defense heidi tscherning
Ph d defense heidi tscherningPh d defense heidi tscherning
Ph d defense heidi tscherningHeidi Tscherning
 
Study on Different Human Emotions Using Back Propagation Method
Study on Different Human Emotions Using Back Propagation MethodStudy on Different Human Emotions Using Back Propagation Method
Study on Different Human Emotions Using Back Propagation Methodijiert bestjournal
 
Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...
Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...
Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...summersocialwebshop
 
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...IRJET Journal
 
Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...
Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...
Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...Sebastian Deterding
 
Ph d defense all slides no effects_heidi tscherning
Ph d defense all slides no effects_heidi tscherningPh d defense all slides no effects_heidi tscherning
Ph d defense all slides no effects_heidi tscherningHeidi Tscherning
 
Intelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn ApproachIntelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn ApproachWouter Beek
 
Semantic Web powering Enterprise and Web Applications
Semantic Web powering Enterprise and Web ApplicationsSemantic Web powering Enterprise and Web Applications
Semantic Web powering Enterprise and Web ApplicationsAmit Sheth
 
Using Ontological Contexts to Assess the Relevance of Statements in Ontol…
Using Ontological Contexts to Assess the Relevance of Statements in Ontol…Using Ontological Contexts to Assess the Relevance of Statements in Ontol…
Using Ontological Contexts to Assess the Relevance of Statements in Ontol…fzablith
 
Use of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionUse of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionkamalsrit
 
Visual Analytics in Omics - why, what, how?
Visual Analytics in Omics - why, what, how?Visual Analytics in Omics - why, what, how?
Visual Analytics in Omics - why, what, how?Jan Aerts
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancerpaperpublications3
 
IRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating RepertoireIRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating RepertoireIRJET Journal
 
In sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIn sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIRJET Journal
 

Similaire à Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Behaviours: The Value of Sharing Research Data (20)

Metacogn pres 2
Metacogn pres 2Metacogn pres 2
Metacogn pres 2
 
Architectural Research Methods Table
Architectural  Research  Methods    TableArchitectural  Research  Methods    Table
Architectural Research Methods Table
 
Ph d defense heidi tscherning
Ph d defense heidi tscherningPh d defense heidi tscherning
Ph d defense heidi tscherning
 
Study on Different Human Emotions Using Back Propagation Method
Study on Different Human Emotions Using Back Propagation MethodStudy on Different Human Emotions Using Back Propagation Method
Study on Different Human Emotions Using Back Propagation Method
 
Machine reasoning
Machine reasoningMachine reasoning
Machine reasoning
 
How a behavioral scientist can work productively with an HCI researcher?
How a behavioral scientist can work productively with an HCI researcher?How a behavioral scientist can work productively with an HCI researcher?
How a behavioral scientist can work productively with an HCI researcher?
 
The End of Privacy Hypothesis
The End of Privacy HypothesisThe End of Privacy Hypothesis
The End of Privacy Hypothesis
 
Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...
Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...
Jana Diesner, "Words and Networks: Considering the Content of Text Data for N...
 
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
Semantic Sentiment Analysis using Machine Learning for Suicidal Tendency Pred...
 
Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...
Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...
Coding conduct: Games, Play, and Human Conduct Between Technical Code and Soc...
 
Ph d defense all slides no effects_heidi tscherning
Ph d defense all slides no effects_heidi tscherningPh d defense all slides no effects_heidi tscherning
Ph d defense all slides no effects_heidi tscherning
 
Albus
AlbusAlbus
Albus
 
Intelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn ApproachIntelligent Tutoring Systems: The DynaLearn Approach
Intelligent Tutoring Systems: The DynaLearn Approach
 
Semantic Web powering Enterprise and Web Applications
Semantic Web powering Enterprise and Web ApplicationsSemantic Web powering Enterprise and Web Applications
Semantic Web powering Enterprise and Web Applications
 
Using Ontological Contexts to Assess the Relevance of Statements in Ontol…
Using Ontological Contexts to Assess the Relevance of Statements in Ontol…Using Ontological Contexts to Assess the Relevance of Statements in Ontol…
Using Ontological Contexts to Assess the Relevance of Statements in Ontol…
 
Use of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognitionUse of artificial neural network in pattern recognition
Use of artificial neural network in pattern recognition
 
Visual Analytics in Omics - why, what, how?
Visual Analytics in Omics - why, what, how?Visual Analytics in Omics - why, what, how?
Visual Analytics in Omics - why, what, how?
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancer
 
IRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating RepertoireIRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
IRJET-In sequence Polemical Pertinence via Soft Enumerating Repertoire
 
In sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating RepertoireIn sequence Polemical Pertinence via Soft Enumerating Repertoire
In sequence Polemical Pertinence via Soft Enumerating Repertoire
 

Dernier

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Behaviours: The Value of Sharing Research Data

  • 1. Studying the Impact of Ubiquitous Monitoring Technology on Office Worker Behaviours: The Value of Sharing Research Data Stuart Moran, Irene Lopez de Vallejo, Keiichi Nakata, Ruth Conroy-Dalton, Rachael Luck, Peter McLennan and Steve Hailes
  • 2.
  • 3. Introduction  Pervasive Computing  Benefits in the workplace  Gaps on how to use data ◦ Method/Guide to using data ------------------------------------------------------  Monitoring changes behaviour  Undesirable effects ◦ Method for predicting behavioural responses
  • 4. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 5. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 6. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 7. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 8. Methodology  Positivism / Mixed Methods ◦ Reality is believed to be directly observable and measureable  Thematic Content Analysis  Questionnaire and Statistical Analysis  Simulation developed in VenSim  Triangulate VenSim prediction with Interview Data  Interpretivism / Mixed Methods ◦ Reality is believed to only be understood through subjective interpretation  Interviews and Observation data triangulated to portray complex socio technical system  Research allowed to evolve and unfold, rather than constrain it through structure
  • 9. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 10. Data  Six week temporary pilot project (2005)  Testing of wearable location tracking technology in office  Two wearable RFID tags  28 semi structured interviews  This data was shared Buffer       Cell 2 Cell 1   Sensor    
  • 11. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 12. “I don’t understand how the technology works and what Analysis will happen at the end of the trial”  Deduction ◦ Use factors as coding  Induction ◦ Allow themes to emerge Vallejo et al. Themes Moran and Nakata Factors Understanding and Informed User, and Communication Application Assumptions Temporary Nature Temporal Effects of the Deployment Perceived Privacy Invasion, Privacy and Device Obtrusion and Intrusio Positioning of Device Perceived Usefulness, Attitudes and Undesirable Behaviours and Organisational Culture Influencing Attitude
  • 13. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 14. Interview Conclusions  Cross Comparison demonstrated very similar conclusions  Different approaches adopted by researchers add confidence to comparison  Moran and Nakata’s factors confirmed as effective monitoring based coding scheme
  • 15. Mutual Project 1 Project 2 Aspects Background Engineering Sociology Impact of Motivation PerCom Questions Literature Real World Positivism Interpretivism Methodology /Mix.Method /Mix.Method Interview Data Data Analysis Deduction Induction Conclusion Conclusions Predictive Output Methodology Model
  • 16. Output  Project 1: developed the PSA-BI model for predicting monitored user behaviour Exogenous Moderating Variables Moderating Anchors Past Computer Context Age Gender Environment Role Culture Experience Skill Level Behavior Based Social Influence Attitudes External Variables Object Based Anchors Beliefs Object Based Attitudes Application Application Attitude toward Space Perceptions Application Attitude toward Behaviour Behaviour Intention Technology Technology Attitude toward Space Perceptions Technology Adjusters Facilitating Conditions New Experience Time Information  Project 2: developed a guide on how to make use of accurate location data in understanding flow interaction dynamics in organisations
  • 17. Conclusions  Different projects, aims and methods  Same question, data and conclusions  Reminder that there is value in sharing research data between researchers and across disciplines  Online repository of qualitative and quantitative to facilitate the sharing of data
  • 19. Discussion Questions  Why is research data not more frequently and widely shared?  How can we (in this room) collaborate and share resources?  What immediate benefits can really be gained from Pervasive technology in the next 5 years?  What social implications are we already aware of?