{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:02:05Z","timestamp":1754157725234,"version":"3.41.2"},"reference-count":27,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T00:00:00Z","timestamp":1281398400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8,10]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to describe some of the methodological challenges of investigating privacy and ubiquitous computing in the home, particularly among the healthy elderly.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper is based on focus groups with 60 senior citizens either living independently or in an assisted living facility. Prototypes of home\u2010based ubiquitous computing devices were created and deployed in a home\u2010like living lab setting; elders were brought to the lab to interact with the prototypes, then brought together in focus groups to discuss their insights and concerns.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Initial analyses suggest that extant metaphors of privacy may be inadequate for understanding pervasive computing in the home. Concepts of data, affective concerns, and the creation of appropriate prototypes for eliciting privacy are considered. Considerations for future studies of the elderly and privacy are made.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The homogeneity of the study population in terms of socioeconomic status, location, and community networks suggests that the study needs to be repeated with wider populations.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Although a number of projects and studies have examined the usability of home\u2010based ubiquitous computing and design for aging, there has been little integration of privacy and ethical concerns into general research discourse.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14779961011071051","type":"journal-article","created":{"date-parts":[[2010,8,14]],"date-time":"2010-08-14T07:12:14Z","timestamp":1281769934000},"page":"236-248","source":"Crossref","is-referenced-by-count":6,"title":["Pervasive computing and an aging populace"],"prefix":"10.1108","volume":"8","author":[{"given":"Kalpana","family":"Shankar","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022031720485288800_b28","doi-asserted-by":"crossref","unstructured":"Benett, G., Lindgaard, G., Tsuji, B., Connelly, K.H. and Siek, K.A. (2006), \u201cReality testing: HCI challenges in non\u2010traditional environments\u201d, Proceedings of the Conference on Human Factors in Computing Systems: CHI'06 extended abstracts on Human Factors in Computing Systems, available at: http:\/\/portal.acm.org\/citation.cfm?id=1125451.1125761 (accessed July 22, 2009).","DOI":"10.1145\/1125451.1125761"},{"key":"key2022031720485288800_b2","unstructured":"Caine, K.E., Fisk, A.D. and Rogers, W.A. (2007), \u201cDesigning privacy conscious aware homes for older adults\u201d, Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting, Santa Monica, CA."},{"key":"key2022031720485288800_b3","doi-asserted-by":"crossref","unstructured":"Camp, L.J. and Connelly, K.H. (2007), \u201cBeyond consent: privacy in ubicomp\u201d, in Acquisiti, A., Gritzalis, S., Lambrinoudakis, C. and De Capitani di Vimercati, S. (Eds), Digital Privacy: Theory, Technologies, and Practices, Taylor and Francis, New York, NY, pp. 327\u201047.","DOI":"10.1201\/9781420052183.ch16"},{"key":"key2022031720485288800_b29","unstructured":"Connelly, K.H., Siek, K.A., Rogers, Y., Jones, J., Kraus, M.A., Perkins, S., Trevino, L.T. and Welch, J.L. (2005), \u201cDesigning a PDA interface for dialysis patients to monitor diet in their everyday life\u201d, Proceedings of HCI International 2005, available at: www.cs.indiana.edu\/surg\/Publications\/HCI\u2010I.pdf (accessed August 11, 2008)."},{"key":"key2022031720485288800_b7","doi-asserted-by":"crossref","unstructured":"Consolvo, S. and Towle, J. (2005), \u201cEvaluating an ambient display for the home\u201d, Proceedings of the CHI'05 Extended Abstracts on Human Factors in Computing Systems, ACM, Portland, OR, pp. 1304\u20107.","DOI":"10.1145\/1056808.1056902"},{"key":"key2022031720485288800_b6","doi-asserted-by":"crossref","unstructured":"Consolvo, S., Roessler, P. and Shelton, B.E. (2004), \u201cThe CareNet display: lessons learned from an in\u2010home evaluation of an ambient display\u201d, Proceedings of the 6th International Conference on Ubicomp Computing (Ubicomp'04), ACM, Nottingham, pp. 1\u201017.","DOI":"10.1007\/978-3-540-30119-6_1"},{"key":"key2022031720485288800_b8","doi-asserted-by":"crossref","unstructured":"Demiris, G., Hensel, B.K., Skubic, M. and Rantz, M. (2008), \u201cSenior residents: perceived need of and preferences for \u2018smart home\u2019 sensor technologies\u201d, International Journal of Technology Assessment in Health Care, Vol. 24 No. 1, pp. 120\u20104.","DOI":"10.1017\/S0266462307080154"},{"key":"key2022031720485288800_b9","doi-asserted-by":"crossref","unstructured":"Friedman, B. and Nissenbaum, H. (1996), \u201cBias in computer systems\u201d, ACM Transactions on Information Systems (TOIS\u2009), Vol. 14, pp. 330\u201047.","DOI":"10.1145\/230538.230561"},{"key":"key2022031720485288800_b10","unstructured":"Friedman, B., Kahn, P.H. and Borning, A. (2006), \u201cValue sensitive design and information systems\u201d, in Galletta, D. and Zhang, P. (Eds), Human\u2010computer Interaction and Management Information Systems: Applications, Vol. 6, M.E. Sharpe, London, pp. 348\u201072."},{"key":"key2022031720485288800_b11","doi-asserted-by":"crossref","unstructured":"Gerdes, A. (2007), \u201cThe clash between standardization and engagement\u201d, Journal of Information, Communication, and Ethics in Society, Vol. 6 No. 1, pp. 46\u201059.","DOI":"10.1108\/14779960810866792"},{"key":"key2022031720485288800_b12","doi-asserted-by":"crossref","unstructured":"Hilty, L.M., Som, C. and Kohler, A. (2004), \u201cAssessing the human, social, and environmental risks of pervasive computing\u201d, Human and Ecological Risk Assessment, Vol. 10 No. 4, pp. 853\u201074.","DOI":"10.1080\/10807030490513874"},{"key":"key2022031720485288800_b13","doi-asserted-by":"crossref","unstructured":"Kimel, J. and Lundell, J. (2007), \u201cExploring the nuances of Murphy's Law: long\u2010term deployments of pervasive technology into the homes of older adults\u201d, Interactions, Vol. 14 No. 4, pp. 38\u201041.","DOI":"10.1145\/1273961.1273983"},{"key":"key2022031720485288800_b14","doi-asserted-by":"crossref","unstructured":"Kwasny, M., Caine, K.E., Rogers, W.A. and Fisk, A.D. (2008), \u201cPrivacy and technology: folk definitions and perspectives\u201d, paper presented at Conference on Human Factors in Computing Systems (CHI), Georgia Institute of Technology, School of Psychology, Human Factors and Aging Laboratory, Atlanta, GA.","DOI":"10.1145\/1358628.1358846"},{"key":"key2022031720485288800_b17","doi-asserted-by":"crossref","unstructured":"Mayhorn, C.B., Fisk, A.D. and Whittle, J.D. (2002), \u201cDecisions, decisions: analysis of age, cohort, and time of testing on framing of risky decision options\u201d, Human Factors, Vol. 44, pp. 515\u201021.","DOI":"10.1518\/0018720024496935"},{"key":"key2022031720485288800_b19","doi-asserted-by":"crossref","unstructured":"Mynatt, E.D. and Rogers, W.A. (2002), \u201cDeveloping technology to support the functional independence of older adults\u201d, Ageing International, Vol. 27, pp. 24\u201041.","DOI":"10.1007\/s12126-001-1014-5"},{"key":"key2022031720485288800_b18","doi-asserted-by":"crossref","unstructured":"Mynatt, E.D., Melenhorst, A.\u2010S., Fisk, A.\u2010D. and Rogers, W.A. (2004), \u201cAware technologies for aging in place: understanding user needs and attitudes\u201d, Pervasive Computing IEEE, Vol. 3 No. 2, pp. 36\u201041.","DOI":"10.1109\/MPRV.2004.1316816"},{"key":"key2022031720485288800_b20","doi-asserted-by":"crossref","unstructured":"Nardi, B.A. (1999), Information Ecologies: Using Technology with Heart, MIT Press, Cambridge, MA.","DOI":"10.7551\/mitpress\/3767.001.0001"},{"key":"key2022031720485288800_b21","doi-asserted-by":"crossref","unstructured":"Nichols, T.A., Rogers, W.A. and Fisk, A.D. (2003), \u201cDo you know how old your participants are? Recognizing the importance of participant age classifications\u201d, Ergonomics in Design, Vol. 11, pp. 22\u20106.","DOI":"10.1177\/106480460301100305"},{"key":"key2022031720485288800_b22","doi-asserted-by":"crossref","unstructured":"Rege, R., Jung, H., Hazelwood, W., Orlov, G., Connelly, K.H. and Shankar, K. (2008), \u201cExploring early evaluation techniques of ambient health promoting devices in home environments of senior citizens living independently\u201d, paper presented at HealthNet'08, Breckenridge, CO, available at: www.aal\u2010deutschland.de\/veranstaltungen\/acm\u2010healthnet\u20102008.","DOI":"10.1145\/1515747.1515764"},{"key":"key2022031720485288800_b23","unstructured":"Shilton, K., Burke, J.A., Estrin, D., Hansen, M. and Srivastava, M. (2008), \u201cParticipatory privacy in urban sensing\u201d, paper presented at MODUS: International Workshop on Mobile Device and Urban Sensing, St Louis, MO, Article 2149."},{"key":"key2022031720485288800_b24","doi-asserted-by":"crossref","unstructured":"Strickland, L.S. and Hunt, L.E. (2004), \u201cTechnology, security, and individual privacy: new tools, new threats, and new public perceptions\u201d, Journal of the American Society for Information Science and Technology, Vol. 56, pp. 221\u201034.","DOI":"10.1002\/asi.20122"},{"key":"key2022031720485288800_b26","doi-asserted-by":"crossref","unstructured":"Vuokko, R. (2008), \u201cSurveillance at workplace and at home: social issues in transforming care with mobile technology\u201d, Journal of Information, Communication, and Ethics in Society, Vol. 6 No. 1, pp. 60\u201075.","DOI":"10.1108\/14779960810866800"},{"key":"key2022031720485288800_b27","doi-asserted-by":"crossref","unstructured":"Walker, S.A. and Sarfatti, M. (2007), \u201cTechnology and aging: the untapped potential\u201d, Interactions, Vol. 14 No. 4, pp. 22\u20103.","DOI":"10.1145\/1273961.1273978"},{"key":"key2022031720485288800_frd2","unstructured":"Cantor, M.D. (2006), \u201cNo information about me without me: technology, privacy, and home monitoring\u201d, Generations, The Journal of the American Society on Aging, Vol. 30 No. 2, pp. 49\u201053."},{"key":"key2022031720485288800_frd4","unstructured":"Lindgaard, G., Tsuji, B., Connelly, K.H. and Siek, K.A. (2006), \u201cReality testing: HCI challenges in nontraditional environments\u201d, CHI'06 Extended Abstracts on Human Factors in Computing Systems, pp. 1679\u201082, available at: http:\/\/doi.acm.org\/10.1145\/1125451.1125761 (accessed August 11, 2008)."},{"key":"key2022031720485288800_frd5","unstructured":"Marshall, C. and Rossman, G.B. (1999), Designing Qualitative Research, 3rd ed., Sage, Thousand Oaks, CA."},{"key":"key2022031720485288800_frd6","unstructured":"United States Administration on Aging (1998), \u201cProfile of older Americans\u201d, available at: www.aarp.org\/research\/reference\/statistics\/aresearch\u2010import\u2010519.html (accessed August 11, 2008)."}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14779961011071051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961011071051\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779961011071051\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:14Z","timestamp":1753402394000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/8\/3\/236-248\/217149"}},"subtitle":["Methodological challenges for understanding privacy implications"],"short-title":[],"issued":{"date-parts":[[2010,8,10]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,8,10]]}},"alternative-id":["10.1108\/14779961011071051"],"URL":"https:\/\/doi.org\/10.1108\/14779961011071051","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2010,8,10]]}}}