Pub Date : 2019-01-30DOI: 10.33965/ijwi_2019171104
P. Lam, Carmen Lau, Chi Him Chan
The flipped classroom approach is widely regarded to be able to enhance teaching and learning. Despite its many advantages, it is still in the early stage of implementation in Hong Kong. This may be due to the potential challenges such as learners’ limited participation and adaptation problems. The purpose of this article is to discuss the challenges based on Brame’s (2013) four key elements of the flipped classroom – exposure, incentive, assess, and activities. Particularly, we put emphasis on how teachers from Hong Kong higher education address the four aspects of challenges in their flipped classroom planning and design. Teachers of twenty-six courses in five universities in Hong Kong were invited to complete a teaching profile for their coming flipped courses which they were asked to elaborate their teaching goals and how they would execute the course. The teaching profiles revealed that the teachers devised a wealth of different strategies in implementing flipped classroom. We generalized their careful planning into eleven tips that can be seen as the collective wisdom of the teachers, as well as potential solutions to the flipped classroom challenges. This article summarizes the first phase of our study that eventually will examine the success factors of the flipped classroom approach in Hong Kong higher education.
{"title":"STRATEGIES TO FLIP A CLASSROOM: LESSONS LEARNT FROM A JOINT-UNIVERSITY PROJECT","authors":"P. Lam, Carmen Lau, Chi Him Chan","doi":"10.33965/ijwi_2019171104","DOIUrl":"https://doi.org/10.33965/ijwi_2019171104","url":null,"abstract":"The flipped classroom approach is widely regarded to be able to enhance teaching and learning. Despite its many advantages, it is still in the early stage of implementation in Hong Kong. This may be due to the potential challenges such as learners’ limited participation and adaptation problems. The purpose of this article is to discuss the challenges based on Brame’s (2013) four key elements of the flipped classroom – exposure, incentive, assess, and activities. Particularly, we put emphasis on how teachers from Hong Kong higher education address the four aspects of challenges in their flipped classroom planning and design. Teachers of twenty-six courses in five universities in Hong Kong were invited to complete a teaching profile for their coming flipped courses which they were asked to elaborate their teaching goals and how they would execute the course. The teaching profiles revealed that the teachers devised a wealth of different strategies in implementing flipped classroom. We generalized their careful planning into eleven tips that can be seen as the collective wisdom of the teachers, as well as potential solutions to the flipped classroom challenges. This article summarizes the first phase of our study that eventually will examine the success factors of the flipped classroom approach in Hong Kong higher education.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123800083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-30DOI: 10.33965/ijwi_2019171101
B. Engels
Data is the main resource of the digital economy. Accordingly, personal data constitutes the exchange value for the use of numerous online services such as social media. Many Internet users willingly disclose their data to these services. Oftentimes, there exists a discrepancy between individual privacy preferences and actual behavior. Against this background, this study examines the preferences of the so-called digital natives for privacy. 3,000 students aged between 14 and 21 in Germany were asked about their use of social media and their privacy preferences for these online services. In addition, their willingness to pay for privacy-friendly online services is analyzed. The study shows that while privacy is important to many digital natives, most are not willing to pay for it.
{"title":"PRIVACY CONCERNS OF DIGITAL NATIVES: DIGITAL ABOVE ALL?","authors":"B. Engels","doi":"10.33965/ijwi_2019171101","DOIUrl":"https://doi.org/10.33965/ijwi_2019171101","url":null,"abstract":"Data is the main resource of the digital economy. Accordingly, personal data constitutes the exchange value for the use of numerous online services such as social media. Many Internet users willingly disclose their data to these services. Oftentimes, there exists a discrepancy between individual privacy preferences and actual behavior. Against this background, this study examines the preferences of the so-called digital natives for privacy. 3,000 students aged between 14 and 21 in Germany were asked about their use of social media and their privacy preferences for these online services. In addition, their willingness to pay for privacy-friendly online services is analyzed. The study shows that while privacy is important to many digital natives, most are not willing to pay for it.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116766373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-30DOI: 10.33965/ijwi_2019171108
M. Lane, Wendy Hui, Karen Murcia, P. Wongthongtham
This article is an exploratory analysis and comparison of the demographic distributions of data collected from the 2016 New Coder Survey, with that obtained from the Integrated Postsecondary Education Data System (IPEDS). In comparing the data sets, the findings suggest that overall females were more likely to engage in online self-paced coding education, particularly when they had no background or previous study in an IT discipline. This contrasted strongly with females having an existing IT qualification. When looking at ethnicity, the research identified that those students who identify as an ethnic minority were more likely to undertake formal tertiary education in IT, rather than engage in online coding study. The research also confirmed that the average age was higher, and diversity of age groups was larger for those undertaking online study, when compared with those undertaking formal tertiary study. The practical implications of this analysis to diversity in Information Technology disciplines such as computer science, and more broadly with STEM-related disciplines are discussed.
{"title":"COMPUTER SCIENCE AND CODING STUDY PATHS FOR WOMEN, MATURE WORKERS, AND MINORITIES: MOOC OR UNIVERSITY - WHO DOES IT BETTER?","authors":"M. Lane, Wendy Hui, Karen Murcia, P. Wongthongtham","doi":"10.33965/ijwi_2019171108","DOIUrl":"https://doi.org/10.33965/ijwi_2019171108","url":null,"abstract":"This article is an exploratory analysis and comparison of the demographic distributions of data collected from the 2016 New Coder Survey, with that obtained from the Integrated Postsecondary Education Data System (IPEDS). In comparing the data sets, the findings suggest that overall females were more likely to engage in online self-paced coding education, particularly when they had no background or previous study in an IT discipline. This contrasted strongly with females having an existing IT qualification. When looking at ethnicity, the research identified that those students who identify as an ethnic minority were more likely to undertake formal tertiary education in IT, rather than engage in online coding study. The research also confirmed that the average age was higher, and diversity of age groups was larger for those undertaking online study, when compared with those undertaking formal tertiary study. The practical implications of this analysis to diversity in Information Technology disciplines such as computer science, and more broadly with STEM-related disciplines are discussed.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132822713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-21DOI: 10.33965/IJWI_2018161201
S. T. Zuhori, James Miller
Understanding user requirements based on their interactions with a website is becoming increasingly important. Hence, in this paper, a novel real-time navigation-support system is discussed. This system builds a personalized browsing assistant based on the current user request submitted to a web server. The process involves developing a behavior model using a Discrete Time Markov Chain (DTMCs) inference process. This is then used to monitor user activities, and thereafter suggest “where to go next”. Finally, it updates the model in real time using a Markovian Decision Process (MDP). To evaluate the system, we provide a user study, case studies and conduct experiments on two datasets to verify the effectiveness of our proposed system.
{"title":"REAL-TIME BROWSING ASSISTANT ON WEB","authors":"S. T. Zuhori, James Miller","doi":"10.33965/IJWI_2018161201","DOIUrl":"https://doi.org/10.33965/IJWI_2018161201","url":null,"abstract":"Understanding user requirements based on their interactions with a website is becoming increasingly important. Hence, in this paper, a novel real-time navigation-support system is discussed. This system builds a personalized browsing assistant based on the current user request submitted to a web server. The process involves developing a behavior model using a Discrete Time Markov Chain (DTMCs) inference process. This is then used to monitor user activities, and thereafter suggest “where to go next”. Finally, it updates the model in real time using a Markovian Decision Process (MDP). To evaluate the system, we provide a user study, case studies and conduct experiments on two datasets to verify the effectiveness of our proposed system.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-21DOI: 10.33965/IJWI_2018161202
Ashraf Khalil, Aishah Khan, Tasbeeh F. Raza, S. Abdallah
Emergence of new features on social media platforms have become a daily occurrence. Stories, live videos, memories and various other emerging features are a crucial part of most of the popular social media platforms. Through this study, we conduct a qualitative assessment of user adaptation to these revolutionizing social media features. The aim of this study is to understand user preferences based on platforms, their adaptability and usage of these features. This study derives conclusions based on a semi-structured interview conducted on 18 users in their early twenties in the UAE. The study derives conclusions on changes in user behavior on Facebook, user strategies for managing different audiences and content across social media platforms, views on cross-linking and cross-sharing of social platforms and using social media as a common portal to keep track of daily happenings. The study finds that users treat social media platforms distinctly while tending to share different contents on each platform depending on the nature of the content and the audience of each platform.
{"title":"INVESTIGATION OF USER ADAPTABILITY AND SHARING PATTERNS ON MULTIPLE SOCIAL MEDIA PLATFORMS","authors":"Ashraf Khalil, Aishah Khan, Tasbeeh F. Raza, S. Abdallah","doi":"10.33965/IJWI_2018161202","DOIUrl":"https://doi.org/10.33965/IJWI_2018161202","url":null,"abstract":"Emergence of new features on social media platforms have become a daily occurrence. Stories, live videos, memories and various other emerging features are a crucial part of most of the popular social media platforms. Through this study, we conduct a qualitative assessment of user adaptation to these revolutionizing social media features. The aim of this study is to understand user preferences based on platforms, their adaptability and usage of these features. This study derives conclusions based on a semi-structured interview conducted on 18 users in their early twenties in the UAE. The study derives conclusions on changes in user behavior on Facebook, user strategies for managing different audiences and content across social media platforms, views on cross-linking and cross-sharing of social platforms and using social media as a common portal to keep track of daily happenings. The study finds that users treat social media platforms distinctly while tending to share different contents on each platform depending on the nature of the content and the audience of each platform.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130699146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-21DOI: 10.33965/IJWI_2018161204
Isa Inuwa-Dutse, Bello Shehu Bello, Ioannis Korkontzelos, R. Heckel
The rise in the number of automated or bot accounts on Twitter engaging in manipulative behaviour is of great concern to studies using social media as a primary data source. Many strategies have been proposed and implemented, however, the sophistication and rate of deployment of bot accounts is increasing rapidly. This impedes and limits the capabilities of detecting bot strategies. Various features broadly related to account profiles, tweet content, network and temporal patterns have been utilised in detection systems. Tweet content has been proven instrumental in this process, but limited to the terms and entities occurring. Given a set of tweets with no obvious pattern, can we distinguish contents produced by social bots from those of humans? What constitutes engagement on Twitter and how can we measure the intensity of engagement among Twitter users? Can we distinguish between bot and human accounts based on engagement intensity? These are important questions whose answer will improve how detection systems operate to combat malicious activities by effectively distinguishing between human and social bot accounts on Twitter. This study attempts to answer these questions by analysing the engagement intensity and lexical richness of tweets produced by human and social bot accounts using large, diverse datasets. Our results show a clear margin between the two classes in terms of engagement intensity and lexical richness. We found that it is extremely rare for a social bot to engage meaningfully with other users and that lexical features significantly improve the performance of classifying both account types. These are important dimensions to explore toward improving the effectiveness of detection systems in combating the menace of social bot accounts on Twitter.
{"title":"THE EFFECT OF ENGAGEMENT INTENSITY AND LEXICAL RICHNESS IN IDENTIFYING BOT ACCOUNTS ON TWITTER","authors":"Isa Inuwa-Dutse, Bello Shehu Bello, Ioannis Korkontzelos, R. Heckel","doi":"10.33965/IJWI_2018161204","DOIUrl":"https://doi.org/10.33965/IJWI_2018161204","url":null,"abstract":"The rise in the number of automated or bot accounts on Twitter engaging in manipulative behaviour is of great concern to studies using social media as a primary data source. Many strategies have been proposed and implemented, however, the sophistication and rate of deployment of bot accounts is increasing rapidly. This impedes and limits the capabilities of detecting bot strategies. Various features broadly related to account profiles, tweet content, network and temporal patterns have been utilised in detection systems. Tweet content has been proven instrumental in this process, but limited to the terms and entities occurring. Given a set of tweets with no obvious pattern, can we distinguish contents produced by social bots from those of humans? What constitutes engagement on Twitter and how can we measure the intensity of engagement among Twitter users? Can we distinguish between bot and human accounts based on engagement intensity? These are important questions whose answer will improve how detection systems operate to combat malicious activities by effectively distinguishing between human and social bot accounts on Twitter. This study attempts to answer these questions by analysing the engagement intensity and lexical richness of tweets produced by human and social bot accounts using large, diverse datasets. Our results show a clear margin between the two classes in terms of engagement intensity and lexical richness. We found that it is extremely rare for a social bot to engage meaningfully with other users and that lexical features significantly improve the performance of classifying both account types. These are important dimensions to explore toward improving the effectiveness of detection systems in combating the menace of social bot accounts on Twitter.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127541610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-21DOI: 10.33965/IJWI_2018161205
Tiago Quaini, Alex Roehrs, C. Costa, R. R. Righi
Electronic health records (EHR) are usually maintained in a centralized way by health organizations, leaving aside an integration between different health organizations to view the complete health history of a given patient. This lack of EHR integration prevents patients and physicians to have a unified view of medical records, which are often stored in different health organizations. Recent studies have proposed using Blockchain technology in distributed architectures due to its security and integration properties. In this context, this article proposes an application architecture using Blockchain technology for distributed EHR integration, which is called UniRec (Unified Medical Records). In the proposed model we seek to understand its effectivity, performance and applicability, using a case study methodology. We developed a prototype, which is evaluated using a test scenario. The prototype proved to be effective for distributed EHR integration, allowing one healthcare institution to view an EHR previously added by different providers, after being granted permission. During the test scenario execution, we obtained an average response time of 2.77 seconds, 961.6 MiB of memory consumption, 21.5% CPU usage and a total disk usage of 34.6 MB. The results reinforce the potential and feasibility of employing Blockchain for managing and storing medical data.
电子健康记录(EHR)通常由卫生组织以集中的方式维护,不考虑不同卫生组织之间的集成,以查看给定患者的完整健康史。由于缺乏EHR集成,患者和医生无法统一查看通常存储在不同卫生组织中的医疗记录。由于其安全性和集成特性,最近的研究提出在分布式架构中使用区块链技术。在此背景下,本文提出了一种使用区块链技术进行分布式EHR集成的应用架构,称为UniRec (Unified Medical Records)。在提出的模型中,我们试图了解其有效性,性能和适用性,使用案例研究方法。我们开发了一个原型,使用测试场景对其进行评估。该原型被证明对于分布式EHR集成是有效的,允许一个医疗保健机构在获得许可后查看以前由不同提供者添加的EHR。在测试场景执行过程中,我们获得的平均响应时间为2.77秒,内存消耗为961.6 MiB, CPU使用率为21.5%,磁盘总使用率为34.6 MB。结果增强了使用区块链管理和存储医疗数据的潜力和可行性。
{"title":"A MODEL FOR BLOCKCHAIN-BASED DISTRIBUTED ELECTRONIC HEALTH RECORDS","authors":"Tiago Quaini, Alex Roehrs, C. Costa, R. R. Righi","doi":"10.33965/IJWI_2018161205","DOIUrl":"https://doi.org/10.33965/IJWI_2018161205","url":null,"abstract":"Electronic health records (EHR) are usually maintained in a centralized way by health organizations, leaving aside an integration between different health organizations to view the complete health history of a given patient. This lack of EHR integration prevents patients and physicians to have a unified view of medical records, which are often stored in different health organizations. Recent studies have proposed using Blockchain technology in distributed architectures due to its security and integration properties. In this context, this article proposes an application architecture using Blockchain technology for distributed EHR integration, which is called UniRec (Unified Medical Records). In the proposed model we seek to understand its effectivity, performance and applicability, using a case study methodology. We developed a prototype, which is evaluated using a test scenario. The prototype proved to be effective for distributed EHR integration, allowing one healthcare institution to view an EHR previously added by different providers, after being granted permission. During the test scenario execution, we obtained an average response time of 2.77 seconds, 961.6 MiB of memory consumption, 21.5% CPU usage and a total disk usage of 34.6 MB. The results reinforce the potential and feasibility of employing Blockchain for managing and storing medical data.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122184945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main focus of this study is to provide a new framework for business model design by using complex system modelling. The tool offers both entrepreneurs and investors a comprehensive view of value streams by comparing different business models based on the economic shared value creation during the go to market process.
{"title":"MODELLING E-HEALTH BUSINESS MODEL CANVAS BASED ON FINANCIAL FLOWS AND SHARED VALUE","authors":"Angela Martin, Corentin Canu, Camille Jean, Gabrièle Breda","doi":"10.33965/IJWI_2018161206","DOIUrl":"https://doi.org/10.33965/IJWI_2018161206","url":null,"abstract":"The main focus of this study is to provide a new framework for business model design by using complex system modelling. The tool offers both entrepreneurs and investors a comprehensive view of value streams by comparing different business models based on the economic shared value creation during the go to market process.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130840676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-21DOI: 10.33965/ijwi_2018161203
T. A. D. S. Silva, G. A. R. Barbosa, I. S. Silva, Flávio R. S. Coutinho
{"title":"EPHEMERAL NARRATIVE SYSTEMS' SOCIABILITY MEDIATED BY USER EXPERIENCE: A CASE STUDY OF INSTAGRAM STORIES","authors":"T. A. D. S. Silva, G. A. R. Barbosa, I. S. Silva, Flávio R. S. Coutinho","doi":"10.33965/ijwi_2018161203","DOIUrl":"https://doi.org/10.33965/ijwi_2018161203","url":null,"abstract":"","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133096083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-12DOI: 10.33965/IJWI_2018161101
D. Kotsopoulos, C. Bardaki, Thanasis G. Papaioannou, Stavros Lounis, K. Pramatari
Energy conservation in workplace environments is recognized as both important and impactful towards reducing worldwide CO2 emissions and protecting the environment. However, the focus of existing research has not primarily been on the employees’ energy consumption behavior, albeit its potential impact on workplace energy efficiency. Aiming to affect employee energy behavior change towards more conscious consumption patterns, we have adopted gamification, a contemporary instrument that, when carefully utilized can lead to employee behavior change. Furthermore, we have followed an Iterative & Incremental Agile User Centered Design (UCD) approach towards designing a gamified IoT-enabled mobile app that provides energy consumption-related feedback to employees at their workplace. We present the characteristics of the designed app, as well as explain the rationale behind their choice. Usability results derived from employees in 3 workplaces at 3 different EU countries indicate that through our approach we designed a prototype gamified solution very well perceived and engaging to our target audience, scoring high in both usability, as well as user experience aspects. We further enhanced the app with additional functionality, according to the test users’ feedback, towards producing the first integrated version. Initial results from testing this revised first integrated version of the app, revealed even more enhanced usability and user experience results, compared to the previous version. Overall, our derived evidence suggests that, by following an Iterative & Incremental Agile UCD approach within our field of application, we have derived a gamified app for energy-saving at the workplace that is conceived of as highly usable and provides for a positive user experience.
{"title":"AGILE USER-CENTERED DESIGN OF AN IOT-ENABLED GAMIFIED INTERVENTION FOR ENERGY CONSERVATION AT THE WORKPLACE","authors":"D. Kotsopoulos, C. Bardaki, Thanasis G. Papaioannou, Stavros Lounis, K. Pramatari","doi":"10.33965/IJWI_2018161101","DOIUrl":"https://doi.org/10.33965/IJWI_2018161101","url":null,"abstract":"Energy conservation in workplace environments is recognized as both important and impactful towards reducing worldwide CO2 emissions and protecting the environment. However, the focus of existing research has not primarily been on the employees’ energy consumption behavior, albeit its potential impact on workplace energy efficiency. Aiming to affect employee energy behavior change towards more conscious consumption patterns, we have adopted gamification, a contemporary instrument that, when carefully utilized can lead to employee behavior change. Furthermore, we have followed an Iterative & Incremental Agile User Centered Design (UCD) approach towards designing a gamified IoT-enabled mobile app that provides energy consumption-related feedback to employees at their workplace. We present the characteristics of the designed app, as well as explain the rationale behind their choice. Usability results derived from employees in 3 workplaces at 3 different EU countries indicate that through our approach we designed a prototype gamified solution very well perceived and engaging to our target audience, scoring high in both usability, as well as user experience aspects. We further enhanced the app with additional functionality, according to the test users’ feedback, towards producing the first integrated version. Initial results from testing this revised first integrated version of the app, revealed even more enhanced usability and user experience results, compared to the previous version. Overall, our derived evidence suggests that, by following an Iterative & Incremental Agile UCD approach within our field of application, we have derived a gamified app for energy-saving at the workplace that is conceived of as highly usable and provides for a positive user experience.","PeriodicalId":245560,"journal":{"name":"IADIS INTERNATIONAL JOURNAL ON WWW/INTERNET","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123953649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}