SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Kolkowska Ella 1972 ) "

Search: WFRF:(Kolkowska Ella 1972 )

  • Result 1-50 of 75
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  •  
3.
  • Gerdin, Marcus, 1995-, et al. (author)
  • What Goes Around Comes Around : Effects of Unclear Questionnaire Items in Information Security Research
  • 2023
  • In: Human Aspects of Information Security and Assurance. - : Springer. - 9783031385292 - 9783031385322 - 9783031385308 ; , s. 470-481
  • Conference paper (peer-reviewed)abstract
    • The credibility of research on information system security is challenged by inconsistent results and there is an ongoing discussion about research methodology and its effect on results within the employee non-/compliance to information security policies literature. We add to this discussion by investigating discrepancies between what we cl/aim to measure (theoretical properties of variables) and what we actually measure (respondents’ interpretations of our operationalized variables). The study asks: (1) How well do respondents’ interpretations of variables correspond to their theoretical definitions? (2) What are the characteristics and causes of any discrepancies between variable definitions and respondent interpretations? We report a pilot study including interviews with seven respondents to understand their interpretations of the variable Perceived severity from the Protection Motivation Theory (PMT).We found that respondents’ interpretations differ substantially from the theoretical definitions which introduces error in measurement. There were not only individual differences in interpretations but also, and more importantly, systematic ones; When questions are not well specified, or do not cover respondents’ practice, respondents make interpretations based on their practice. Our results indicate three types of ambiguities, namely (i) Vagueness in part/s of the measurement item causing inconsistencies in interpretation between respondents, (ii) Envision/Interpret ‘new’ properties not related to the theory, (iii) ‘Misses the mark’ measurements whereby respondents misinterpret the fundamentals of the item. The qualitative method used proved conducive to understanding respondents’ thinking, which is a key to improving research instruments.
  •  
4.
  • Gerdin, Marcus, 1995-, et al. (author)
  • What goes around comes around : an in-depth analysis of how respondents interpret ISP non-/compliance questionnaire items
  • 2024
  • In: Information and Computer Security. - : Emerald Group Publishing Limited. - 2056-4961.
  • Journal article (peer-reviewed)abstract
    • Purpose: Research on employee non-/compliance to information security policies suffers from inconsistent results and there is an ongoing discussion about the dominating survey research methodology and its potential effect on these results. This study aims to add to this discussion by investigating discrepancies between what the authors claim to measure (theoretical properties of variables) and what they actually measure (respondents' interpretations of the operationalized variables). This study asks: How well do respondents' interpretations of variables correspond to their theoretical definitions? What are the characteristics of any discrepancies between variable definitions and respondent interpretations?Design/methodology/approach: This study is based on in-depth interviews with 17 respondents from the Swedish public sector to understand how they interpret questionnaire measurement items operationalizing the variables Perceived Severity from Protection Motivation Theory and Attitude from Theory of Planned Behavior.Findings: The authors found that respondents' interpretations in many cases differ substantially from the theoretical definitions. Overall, the authors found four principal ways in which respondents interpreted measurement items - referred to as property contextualization, extension, alteration and oscillation - each implying more or less (dis)alignment with the intended theoretical properties of the two variables examined.Originality/value: The qualitative method used proved vital to better understand respondents' interpretations which, in turn, is key for improving self-reporting measurement instruments. To the best of the authors' knowledge, this study is a first step toward understanding how precise and uniform definitions of variables' theoretical properties can be operationalized into effective measurement items.
  •  
5.
  •  
6.
  •  
7.
  •  
8.
  • Kajtazi, Miranda, 1983-, et al. (author)
  • New Insights Into Understanding Manager’s Intentions to Overlook ISP Violation in Organizations through Escalation of Commitment Factors
  • 2015
  • In: Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015). - Pöymouth : Plymouth University. - 9781841023885
  • Conference paper (peer-reviewed)abstract
    • This paper addresses managers’ intentions to overlook their employees’ Information Security Policy (ISP) violation, in circumstances when on-going projects have to be completed and delivered even if ISP violation must take place to do so. The motivation is based on the concern that ISP violation can be influenced by escalation of commitment factors. Escalation is a phenomenon that explains how employees in organizations often get involved in nonperforming projects, commonly reflecting the tendency of persistence, when investments of resources have been initiated. We develop a theoretical understanding based on Escalation of Commitment theory that centres on two main factors of noncompliance, namely completion effect and sunk costs. We tested our theoretical concepts in a pilot study, based on qualitative and quantitative data received from 16 respondents from the IT – industry, each representing one respondent from the management level. The results show that while some managers are very strict about not accepting any form of ISP violation in their organization, their beliefs start to change when they realize that such form of violation may occur when their employees are closer to completion of a project. Our in-depth interviews with 3 respondents in the follow-up study, confirm the tension created between compliance with the ISP and the completion of the project. The results indicate that the larger the investments of time, efforts and money in a project, the more the managers consider that violation is acceptable
  •  
9.
  •  
10.
  • Karlsson, Fredrik, 1974-, et al. (author)
  • Attempts to share information between public sector organisations over time : A case-based exploration of value conflicts
  • 2021
  • In: Information Polity. - : IOS Press. - 1570-1255 .- 1875-8754. ; 26:3, s. 289-310
  • Journal article (peer-reviewed)abstract
    • Despite the importance of inter-organisational information sharing (IOIS) in the public sector, such endeavours often fail. Existing research has shown that the values held by collaborating organisations are one important factor affecting these kinds of initiatives. However, research has sought only to a limited extent to address how value conflicts come into play over time. Therefore, this paper aims to explore how conflicting values shape an inter-organisational information-sharing practice in the public sector over time. Using the local/global network framework, we analyse four years’ worth of information sharing in an inter-organisational advisory group in the context of Swedish nuclear waste management. We conclude that different value conflicts are emphasised to different extents at different points in time. That is, values do not uniformly affect IOIS activities, and such conflicts over time reduce the set of potential IOIS activities. We also conclude that when IOIS activities are driven by an individual organisation’s values, individual value rational activities may co-exist with a dysfunctional long-term IOIS practice.
  •  
11.
  •  
12.
  •  
13.
  •  
14.
  • Karlsson, Fredrik, 1974-, et al. (author)
  • Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis
  • 2022
  • In: Computers & security (Print). - : Elsevier. - 0167-4048 .- 1872-6208. ; 114
  • Journal article (peer-reviewed)abstract
    • When end users have to prioritize between different rationalities in organisations there is a risk of non-compliance with information security policies. Thus, in order for information security managers to align information security with the organisations’ core work practices, they need to understand the competing rationalities. The Value-based compliance (VBC) analysis method has been suggested to this end, however it has proven to be complex and time-consuming. Computerized software may aid this type of analysis and make it more efficient and executable. The purpose of this paper is to elicit a set of requirements for computerized software that support analysis of competing rationalities in relation to end users’ compliance and non-compliance with information security policies. We employed a design science research approach, drawing on design knowledge on VBC and elicited 17 user stories. These requirements can direct future research efforts to develop computerized software in this area.
  •  
15.
  • Karlsson, Fredrik, 1974-, et al. (author)
  • Inter-organisational information security : a systematic literature review
  • 2016
  • In: Information & Computer Security. - : Emerald Group Publishing Limited. - 2056-4961. ; 24:5, s. 418-451
  • Research review (peer-reviewed)abstract
    • Purpose: The purpose of this paper is to survey existing inter-organisational information securityresearch to scrutinise the kind of knowledge that is currently available and the way in which thisknowledge has been brought about.Design/methodology/approach: The results are based on a literature review of inter-organisational information security research published between 1990 and 2014.Findings: The authors conclude that existing research has focused on a limited set of research topics.A majority of the research has focused management issues, while employees’/non-staffs’ actualinformation security work in inter-organisational settings is an understudied area. In addition, themajority of the studies have used a subjective/argumentative method, and few studies combinetheoretical work and empirical data.Research limitations/implications: The findings suggest that future research should address abroader set of research topics, focusing especially on employees/non-staff and their use of processes andtechnology in inter-organisational settings, as well as on cultural aspects, which are lacking currently;focus more on theory generation or theory testing to increase the maturity of this sub-field; and use abroader set of research methods.Practical implications: The authors conclude that existing research is to a large extent descriptive,philosophical or theoretical. Thus, it is difficult for practitioners to adopt existing research results, suchas governance frameworks, which have not been empirically validated.Originality/value: Few systematic reviews have assessed the maturity of existinginter-organisational information security research. Findings of authors on research topics, maturity andresearch methods extend beyond the existing knowledge base, which allow for a critical discussionabout existing research in this sub-field of information security.
  •  
16.
  • Karlsson, Fredrik, 1974-, et al. (author)
  • Inter-organisational information sharing : Between a rock and a hard place
  • 2015
  • In: Proceedings of the Ninth International Symposium on Human Aspects of Information  Security & Assurance (HAISA 2015). - Plymouth UK : Plymouth University. - 9781841023885 ; , s. 71-81
  • Conference paper (peer-reviewed)abstract
    • Although inter-organisational collaboration is common, most information security (IS) research has focused on IS issues within organisations. Confidentiality, integrity of data and availability (CIA) and responsibility, integrity of role, trust, and ethicality (RITE) are two sets of principles for managing IS that have been developed from an intra-organisational, rather static, perspective. The aim of this paper is thus to investigate the relation between the CIA and RITE principles in the context of an inter-organisational collaboration, i.e., collaboration between organisations. To this end we investigated inter-organisational collaboration and information sharing concerning Swedish cooper corrosion research in the field a long-term nuclear waste disposal. We found that in an inter-organisational context, responsibility, integrity of role and ethicality affected the CIA-principles, which in turn affected the collaborating actors’ trust in each other over time.
  •  
17.
  • Karlsson, Fredrik, 1974-, et al. (author)
  • Inter-organisational information sharing in the public sector : A longitudinal case study on the reshaping of success factors
  • 2017
  • In: Government Information Quarterly. - : Elsevier. - 0740-624X .- 1872-9517. ; 34:4, s. 567-577
  • Journal article (peer-reviewed)abstract
    • Today, public organisations need to share information in order to complete their tasks. Over the years, scholars have mapped out the social and organisational factors that affect the success or failure of these kinds of endeavours. However, few of the suggested models have sought to address the temporal aspect of inter-organisational information sharing. The aim of this paper is to investigate the reshaping of social and organisational factors of inter-organisational information sharing in the public sector over time. We analysed four years' worth of information sharing in an inter-organisational reference group on copper corrosion in the context of nuclear waste management. We could trace how factors in the model proposed by Yang and Maxwell (2011) were reshaped over time. Two factors in the model – concerns of information misuse and trust – are frequently assessed by organisations and are the most likely to change. In the long run we also found that legislation and policies can change.
  •  
18.
  • Karlsson, Fredrik, 1974-, et al. (author)
  • Using the Delphi Method to Elicit Requirements for an International Master’s Program in Information Security Management
  • 2023
  • In: Cybersecruity Teaching in Higher Education. - Cham : Springer. - 9783031242151 - 9783031242168 ; , s. 37-57
  • Book chapter (peer-reviewed)abstract
    • In today's complex environments, safeguarding organizations’ information assets is difficult and requires more than solely technical skills. In order to meet the need for future information security specialists, in 2018 the Informatics department at Örebro University launched an International Master’s Program in Information Security Management. The program content was developed in collaboration with industry and governmental partners. One of the challenges with this co-design effort was to elicit the requirements of the courses in the program from a diverse set of actors. Also, an educational program has a finite number of teaching hours, which means that a limited number of requirements, or topics on information security, can be covered. Consequently, there was a need to prioritize between the elicited requirements and make the partners prioritize. To both these ends, we employed the Delphi method. In this chapter, we give an account of the process of eliciting and prioritizing course requirements using an adapted Delphi method. The adopted process included three iterations, for which workshops and surveys were used to collect the necessary data. The implementation has been far from instrumental, and in this chapter we discuss the details related to design choices made and the rationale behind these choices.
  •  
19.
  • Karni, Liran, 1979-, et al. (author)
  • EMPARK : Internet of Things for Empowerment and Improved Treatment of Patients with Parkinson's Disease
  • 2018
  • Conference paper (pop. science, debate, etc.)abstract
    • Objective: This study aims to assess the effects of patient-directed feedback from remote symptom, medication, and disease activity monitoring on patient empowerment and treatment in Parkinson’s disease (PD).Background: There is a need to empower patients with PD to be able to understand better and control their disease using prescribed medication and following recommendations on lifestyle. The research project EMPARK will develop an Internet of Things system of sensors, mobile devices to deliver real-time, 24/7 patient symptom information with the primary goal to support PD patients empowerment and better understanding of their disease. The system will be deployed in patient homes to continuously measure movements, time-in-bed and drug delivery from a micro-dose levodopa system. Subjective symptom scoring, time of meals and physical activities will be reported by the patients via a smartphone application. Interfaces for patients and clinicians are being developed based on the user center design methodology to ensure maximal user acceptance. Methods: This is a randomized controlled trial where 30 PD patients from 2 university clinics in Sweden will be randomized to receive (intervention group) or not (control group) continuous feedback from the results of the EMPARK home monitoring for 2 weeks. Disease-specific (UPDRS, PDQ-39), Quality of Life (QoL) (modified EuroQoL EQ-5D) and empowerment questionnaires will be collected prior and after the intervention. The correlation of technology-based objective and patient-reported subjective parameters will be assessed in both groups. Interviews will be conducted with the clinicians and observations will be made about the patient-clinician interaction to assess the potential treatment benefits of the intervention.Results: Preliminary results from workshops with patients and clinicians show potential to improve patient empowerment and disease control among patients. Completion of the trial will show the degree of patient empowerment, individualized treatment, and patientclinician interactions.Conclusions: Raising patients’ awareness about disease activity and home medication is possible among PD patients by providing them with feedback from the results of a home monitoring system. This randomized, controlled trial aims to provide evidence that this approach leads to improved patient empowerment and treatment results.
  •  
20.
  • Kirikova, Marite, et al. (author)
  • Addressing Complexity of Contexts of IT Solutions for Older Adults
  • 2019
  • In: BIR-WS 2019: BIR 2019 Workshops and Doctoral Consortium. - : Technical University of Aachen. ; , s. 51-61
  • Conference paper (peer-reviewed)abstract
    • In the last decades a large number and variety of prototyped and commercial IT solutions have been dedicated to older adults with the purpose to make their activities as meaningful and diverse as possible; and to establish the environment around them as comfortable as possible. However, in most cases the requirements for the tools are derived from user surveys or are just a result of some innovative ideas of researchers and practitioners. This might be one of the reasons why the spectrum of possible IT solutions is much larger than the spectrum of actually used solutions. In this paper we propose to view IT solu-tions that are developed for older adults in the context, which is represented as a socio-cyber-physical system. Enterprise modeling is proposed as a means for context representation and analysis.
  •  
21.
  • Kirikova, Marite, et al. (author)
  • Towards Aligning IT and Daily Routines of Older Adults
  • 2019
  • In: Lecture Notes in Business Information Processing. - Cham : Springer. - 1865-1348 .- 1865-1356. - 9783030366902 - 9783030366919 ; 373, s. 150-156
  • Journal article (peer-reviewed)abstract
    • Different IT solutions exist for supporting older adults. However, the ways in which these solutions are positioned usually concern only specific activities or specific problems. In this paper we analyze the current research state regarding activities of older adults, the contexts of their activities, and supportive IT solutions to create a background for further investigations regarding alignment of IT solutions and daily routines of older adults. The paper presents illustrative mapping between older adult activities and IT solution categories and derives therefrom some aspects that are to be taken into account for successful alignment between IT solutions and daily routines of older adults.
  •  
22.
  • Kolkowska, Ella, 1972-, et al. (author)
  • A user-centered ethical assessment of welfare technology for elderly
  • 2018
  • In: Lect. Notes Comput. Sci.. - Cham : Springer International Publishing. - 9783319920368 - 9783319920375 ; , s. 59-73
  • Conference paper (peer-reviewed)abstract
    • Welfare technology (WT) is often developed with a technical perspective, and little consideration is taken regarding the involvement of important ethical considerations and different values that come up during the development and implementation of WT. Safety, security and privacy are significant, as well as the usability and overall benefit of the tool, but to date assessments often lack a holistic picture of the WT as seen by the users. This paper suggests a user-centered ethical assessment (UCEA) framework for WT to be able to evaluate ethical consequences as a part of the user-centered aspects. Building on established methodologies from research on ethical considerations, as well as the research domain of human-computer interaction, this assessment framework joins knowledge of ethical consequences with aspects affecting the “digitalization with the individual in the center”, e.g. privacy, safety, well-being, dignity, empowerment and usability. The framework was applied during development of an interface for providing symptom information to Parkinson patients. The results showed that the UCEA framework directs the attention to values emphasized by the patients. Thus, functionality of the system was evaluated in the light of values and expected results of the patients, thereby facilitating follow-up of a user-centered assessment. The framework may be further developed and tested, but in this study it served as a working tool for assessing ethical consequences of WT as a part of user-centered aspects.
  •  
23.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Analyzing value conflicts for a work-friendly ISS policy implementation
  • 2012
  • In: Information Security and Privacy Research<em> </em>. - Berlin, Heidelberg : Springer. - 9783642304361 - 9783642304354 ; , s. 339-351
  • Conference paper (peer-reviewed)abstract
    • Existing research shows that the Information Systems Security policies' (ISSPs) inability to reflect current practice is a perennial problem resulting in users' non-compliant behaviors. While the existing compliance approaches are beneficial in many ways, they do not consider the complexity of Information Systems Security (ISS) management and practice where different actors adhere to different and sometimes conflicting values. The unsolved value conflicts often lead to unworkable ISS processes and users' resistance. To address this shortcoming, this paper suggests a value conflicts analysis as a starting point for implementing work-friendly ISSPs. We show that the design and implementation of a work-friendly ISSP should involve the negotiation for different values held by the different actors within an organization.
  •  
24.
  •  
25.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Data sharing mechanisms and privacy challenges in Data Collaboratives : Delphi study of most important issues
  • 2017
  • Conference paper (peer-reviewed)abstract
    • In this paper we explore the concept of ‘data collaboratives’ – cross sector partnerships to leverage new sources of digital data for addressing societal problems. Many of these new sources of digital data, such as “data exhaust” from mobile apps, search engines, personal sensors, are collected by companies. The paper identifies and defines the most important privacy challenges that need to be addressed in the context of data collaboratives. It provide guidance on how data can be successfully shared in data collaboratives while respecting data protection interests
  •  
26.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Defining Seniors’ Value-based Objectives for ICT-supported Governmental Elderly Care Services : Preliminary Lessons from Poland and Sweden
  • 2022
  • Conference paper (peer-reviewed)abstract
    • ICT-supported governmental elderly care services are often introduced in an ad-hoc, technology-driven manner, which results in a low level of acceptance by seniors. The current paper aims to address this shortcoming by applying a Value-focused thinking (VFT) approach to investigate value-based objectives of older adults. The presented solution is based on the interviews with seniors (65-85) in Poland and Sweden, two countries with very diverse approaches to governmental elderly care services. The designed research approach includes the analysis of the data gathered following the VFT approach, comparison of findings across the two countries, definition of fundamental and means objectives of seniors, and formulation of recommendations regarding strategies for the implementation of governmental elderly care services. The preliminary findings suggest that using VFT is promising in the identification of value-based objectives that can be included in policies guiding ICT-supported elderly care services.
  •  
27.
  •  
28.
  •  
29.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Implementation of ICT for Active and Healthy Ageing : Comparing Value-Based Objectives Between Polish and Swedish Seniors
  • 2018
  • In: Information Systems: Research, Development, Applications, Education. - Cham : Springer. - 9783030000592 - 9783030000608 ; , s. 161-173
  • Conference paper (peer-reviewed)abstract
    • Active and healthy ageing strategies are proposed in many European countries to address the challenges generated by ageing of the populations. Information and communication technology (ICT) plays an important role in the implementation of these strategies. By applying Value-focused thinking approach, this qualitative study investigates what objectives are important for successful implementation of ICT for active and healthy ageing according to older people in Sweden and Poland. The study shows that there are both differences and similarities between the objectives identified in these two countries that may have significant implications for development (analysis and design) and implementation of ICT solutions for active and healthy ageing.
  •  
30.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Information security goals in a Swedish hospital
  • 2009
  • In: Security, assurance and privacy. ; , s. Article no. 16-
  • Conference paper (peer-reviewed)abstract
    • One of the problems highlighted within the area of information security is that internatonal standards are implemented in organisations without adopting them to special organisational settings. This paper presents findings of information security goals found in policies, guidelines, and routines at a Swedish hospital. The purpose of the paper is to analyze the information security goals and relate them to confidentiality, integrity and availability (CIA) that are traditional objectives for managing information security in organisations. A critical view on the CIA-triad has been taken in the study, to see how it is related to a hospital setting. Seven main information security goals and 63 sub-goals supporting the main goals were identified. We found that the CIA-triad covers three of these main-goals. Confidentiality and integrity, however, have a broader definition in the hospital-setting than the traditional definitions. In addition, we found four main information security goals that the CIA-triad fails to cover. These are ‘Follow information security laws, rules and standards,’ ‘Traceability,’ ‘Standardized formation’ and ‘Informed patients and/or family.’ These findings shows that there is a need to adopt the traditional information security objective to special organisational settings.
  •  
31.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Intergerenational tensions in ICT adoption for independent and healthy ageing : preliminary insights from a value-focused thinking study in Poland and Sweden
  • 2023
  • Conference paper (peer-reviewed)abstract
    • Current literature highlights the importance of understanding intergenerational tensions that arise in the context of implementation of ICT for independent and healthy ageing. The current study aims to explore tensions between value-based objectives emphasized by seniors and younger adults in the context of ICT for independent and healthy ageing in Poland and Sweden. Value-based objectives were identified by applying the value-focused thinking approach. By comparing the identified objectives between young adults and seniors, we found several significant tensions, both in Poland and Sweden. In particular, we found that young adults might perceive seniors as a fragile and passive group, which clashes with how seniors perceive themselves. The analysis also revealed several areas of agreement, e.g. with Polish young and senior respondents unanimously emphasizing improvement of seniors’ health condition and ICT usefulness for families, and Swedes agreeing upon the importance of seniors’ autonomy, social contact, and equal access to digital solutions.
  •  
32.
  • Kolkowska, Ella, 1972- (author)
  • Lack of compliance with IS security rules : value conflicts in Social Services in Sweden
  • 2009
  • In: Security, assurance and privacy. ; , s. Article no. 15-
  • Conference paper (peer-reviewed)abstract
    • One of the problems highlighted within the ara of IS security is difficulty to handle humans’ security behaviors and praticularly a problem of lack of compliance between these behaviours and prescribed IS security rules. This paper presents findings form a case study at a municipality’s social services in Sweden. The aim of this study was to understand why social workers do not follow IS security rules. The understanding was gained by studying values behind prescribed IS security rules and values behind security behaviors. The major reason for lack of compliance with IS security rules among social workers were value conflicts between professional values and IS security values. The new IS security requirements required a culture change and developing of new work routines for social workers.
  •  
33.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Organizational power and information security rule compliance
  • 2013
  • In: Computers & security (Print). - : Elsevier BV. - 0167-4048 .- 1872-6208. ; 33, s. 3-11
  • Journal article (peer-reviewed)abstract
    • This paper analyzes power relationships and the resulting failure in complying with information security rules. It argues that an inability to understand the intricate power relationships in the design and implementation of information security rules leads to a lack of compliance with the intended policy. The argument is conducted through an empirical, qualitative case study set in a Swedish Social Services organization. Our findings indicate that various dimensions of power and how these relate to information security rules ensure adequate compliance. This also helps to improve configuration of security rules through proactive information security management.
  •  
34.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies
  • 2016
  • In: ICT systems security and privacy protection. - Cham : Springer. ; , s. 384-397
  • Conference paper (peer-reviewed)abstract
    • Today, simple analogue assistive technologies are transformed into complex and sophisticated sensor networks. This raises many new privacy issues that need to be considered. In this paper, we investigate how this new generation of assistive technology incorporates Privacy by Design (PbD) principles. The research is conducted as a case study where we use PbD principles as an analytical lens to investigate the design of the new generation of digitalized assistive technology as well as the users’ privacy preferences that arise in use of this technology in real homes. Based on the findings from the case study, we present guidelines for building in privacy in new generations of assistive technologies and in this way protect the privacy of the people using these technologies.
  •  
35.
  • Kolkowska, Ella, 1972- (author)
  • Privacy principles in design of smart homes systems in elderly care
  • 2015
  • In: Human Aspects of Information Security, Privacy, and Trust. - Cham : Springer. - 9783319203768 - 9783319203751 ; , s. 526-537
  • Conference paper (peer-reviewed)abstract
    • Privacy is considered as a main concern in developing and implementing smart home systems for elderly care (SHSEC). Privacy-by-Design (PbD) can help to ensure privacy in such systems and can support the designers in taking the protection of the privacy into account during the development of such systems. In this paper, we investigate the suitability of the PbD principles (PbDPs) suggested by Cavoukian et al. [1] in the context of SHSEC. This research is conducted as a qualitative case study, where we highlight limitations of existing PbDPs in this context. Based on our findings, we suggest seven additional PbDPs which complement the existing PbDPs and adjust them in the context of SHSEC.
  •  
36.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Socio-Technical Challenges in Implementation of Monitoring Technologies in Elderly Care
  • 2016
  • In: Human Aspects of IT for the Aged Population. - Cham : Springer. - 9783319399485 - 9783319399492 ; , s. 45-56
  • Conference paper (peer-reviewed)abstract
    • Although new monitoring technologies (MT) supporting aging in place are continuously developed and introduced on the market, attempts to implement these technologies as an integrated part of elderly care often fail. According to the literature, the reason for that may be the prevailing technical focus applied during development and implementation of monitoring technologies in real settings. The aim of this paper was to investigate the socio-technical challenges that arise during implementation of monitoring technologies in elderly care. We used a qualitative case study and semi-structured interviews to investigate socio-technical (S/T) challenges in implementation of monitoring technologies generally and social alarms especially. Based on our findings we suggest a framework for classification of S/T challenges arising during implementation of monitoring technologies in elderly care and in this way this paper contributes to a better understanding of these challenges.
  •  
37.
  •  
38.
  • Kolkowska, Ella, 1972- (author)
  • Tekniken utmanar äldres integritet
  • 2016
  • In: Äldre i centrum. - Stockholm : Stiftelsen Stockholms läns äldrecentrum. - 1653-3585. ; 4
  • Journal article (pop. science, debate, etc.)
  •  
39.
  • Kolkowska, Ella, 1972-, et al. (author)
  • To capture the diverse needs of welfare technology stakeholders – Evaluation of a value matrix
  • 2017
  • In: Third International Conference, ITAP 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017: Proceedings, Part II, Springer, 2017, 404-419 s.. - Cham : Springer International Publishing. - 9783319585352 ; , s. 404-419
  • Conference paper (peer-reviewed)abstract
    • Welfare technology (WT) is often developed with a technical perspective, which does not involve important ethical considerations and different values that come up during the development and implementation of WT within elderly care. This paper presents a study where we have applied an ethical value matrix to support systematic ethical assessments of WT intended for personal health monitoring. The matrix consists of values in a checklist and a number of stakeholders and it is possible to analyze which values are emphasized by which stakeholders. The aim was to assess the matrix and find out how the matrix supports identification of values and interests that drive the various stakeholders in the development and implementation of WT. We have realized that several values specified by different actors as especially important were not included in the matrix and that the values in the matrix did not visualize or enable identification of value conflicts.
  •  
40.
  • Kolkowska, Ella, 1972-, et al. (author)
  • Towards analysing the rationale of information security non-compliance : Devising a Value-Based Compliance analysis method
  • 2017
  • In: Journal of strategic information systems. - Amsterdam, Netherlands : Elsevier. - 0963-8687 .- 1873-1198. ; 6:1, s. 39-57
  • Journal article (peer-reviewed)abstract
    • Employees’ poor compliance with information security policies is a perennial problem. Current information security analysis methods do not allow information security managers to capture the rationalities behind employees’ compliance and non-compliance. To address this shortcoming, this design science research paper suggests: (a) a Value-Based Compliance analysis method and (b) a set of design principles for methods that analyse different rationalities for information security. Our empirical demonstration shows that the method supports a systematic analysis of why employees comply/do not comply with policies. Thus we provide managers with a tool to make them more knowledgeable about employees’ information security behaviours. 
  •  
41.
  • Kolkowska, Ella, 1972- (author)
  • Understanding privacy in smart homes systems used in elderly care
  • 2016
  • In: Online Proceedings of the 13th European, Mediterranean &amp; Middle Eastern Conference on Information Systems (EMCIS). - : University of Piraeus. - 9789606897092 ; , s. 444-455
  • Conference paper (peer-reviewed)abstract
    • Although privacy is considered as a main concern in developing and implementing smart home systems for elderly care (SHSEC), the concept of privacy in this context is unclear and there is a lack of tools supporting the analysis of privacy in this context. Moreover most of existing project aiming at development and implementation of SHSEC have a narrow technical focus ignoring the complex social and organizational context in which the technologies are used. In this paper we propose Actor Network Theory (ANT) as a suitable analytical tool for analyzing privacy in the context of SHSEC. The suitability will be illustrated through a case study. The paper also contributes to a better understanding of the socio-technical nature of privacy in this particular context where many different actors are involved and technology is an integrated part of the elderly’s life and home. As we will show, ANT can help us to understand how the privacy requirements are negotiated during the design process, which actors are involved, what their interests and preferences are regarding privacy and which actors clearly outweighed the others.
  •  
42.
  • Kolkowska, Ella, 1972- (author)
  • Values for information system security in an academic environment : a pilot study
  • 2006
  • Conference paper (peer-reviewed)abstract
    • In this paper we present a process of identifying individual and organizational values within an academic environment. These values have been identified by using Value Sensitive Approach (VSA) in the area of Information System Security (ISS). VSA is a methodological framework for identifying organizational and individual values. We believe that ISS objectives and ISS strategy suitable for each specific type of organization can be decided by eliciting these values. The study resulted in a number of value areas related to university general issues (UGV) and ISS issues important within an academic environment. The UGV and the ISS values can be further analyzed and transformed into ISS objectives suitable within an academic environment. Furthermore the identified values should be considered when ISS strategy to achieve those objectives is decided. Results presented in this paper will contribute to the ongoing research efforts to view security problems from a more holistic, socio-organizational perspective
  •  
43.
  •  
44.
  • Kristoffersson, Annica, 1980-, et al. (author)
  • Assessment of Expectations and Needs of a Sensor Network to Promote Elderly’s Sense of Safety and Security
  • 2014
  • In: CENTRIC 2014, The Seventh International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, Nice, October 12-16, 2014. - : International Academy, Research and Industry Association (IARIA). - 9781612083698 ; , s. 22-28
  • Conference paper (peer-reviewed)abstract
    • Many new technologies claiming to support independent living and prolonged possibilities of aging in place have been developed. To support independent living and increase the sense of safety and security both for the elderly themselves and for their relatives, the technologies have to be easily adaptable to match the divergent user’s personal expectations and needs. The study reported in this paper was conducted as seven case studies where a sensor network was deployed in homes of people with a self-perceived memory decline. We describe problems related to adaptive personalization of such technology in real settings and discuss what consequences these problems may have for the elderly people's and their relatives willingness to use the technology. Our results indicate that a lack of sufficient possibilities to adaptive personalization of the system makes it difficult to address individual user's expectations and needs. This, in turn, leads to a decreased trustworthiness of the technology and a risk of unwillingness to use the technology.
  •  
45.
  • Kristoffersson, Annica, 1980-, et al. (author)
  • En metod för mätning av ett sensornätverks inverkan på trygghet : Slutrapport
  • 2015
  • Reports (other academic/artistic)abstract
    • Stiftelsen Länsförsäkringsbolagens Forskningsfond finansierar forskningsprojekt som har för avsikt att stärka människors trygghet i sin nuvarande bostad. Detta dokument rapporterar forskning som skett inom ramen för utlysningen ”Tryggt boende”. Projektet som har titeln ”En metod för mätning av ett sensornätverks inverkan på trygghet” innefattar såväl kvalitativ som kvantitativ datainsamling från fem månaders testning av ett sensornätverk i hemmiljöer. Vi vill tacka forskningsfondens styrelse för förtroendet men också rikta ett varmt tack till vår referensgrupp i vilken Marie Villman (Örebro kommun), Susanne Lidmo (Länsförsäkringar) samt Ingvor Pettersson (Institutionen för Hälsovetenskap och medicin, Örebro universitet). Vi vill tacka Abilia som bistått vid installationer av sensornätverket, Örebro kommuns Minnesmottagning som hjälpt oss hitta testpersoner samt Örebroregionen Science Park som hjälpt oss att sprida information om detta projekt. Slutligen vill vi också tacka våra sju testpersoner med anhöriga som möjliggjort detta projekt. Slutrapporten är skriven för att kunna läsas av alla intresserade av projektet. För mer ingående information kring forskningsresultaten hänvisas till de forskningspublikationer som är, eller kommer att bli, resultat av studien. Örebro 2015-03-01 Annica Kristoffersson, tekn dr, Örebro universitetElla Kolkowska, fil dr, Örebro universitetAmy Loutfi, tekn dr, docent, lektor, projektledare (Örebro universitet (amy.loutfi@oru.se) 
  •  
46.
  •  
47.
  • Kristoffersson, Annica, et al. (author)
  • Summative evaluation of a sensor-based cognitive assistive technology : Impact on quality of life and perceived utility
  • 2019
  • In: Gerontechnology. - : International Society for Gerontechnology. - 1569-1101 .- 1569-111X. ; 18:2, s. 59-69
  • Journal article (peer-reviewed)abstract
    • Background Current research shows that perceived improvement of quality of life (QoL) is among the most important factors influencing acceptance of technology by older adults.Research Aim/question(s) The purpose of this study was to assess the utility of a sensor-based cognitive assistive technology (CAT) deployed in real homes and its impact on older adults’ and their informal caregivers’ perceived QoL.Methods During a period of five months, we conducted a summative evaluation by deploying a CAT in the home of couples in which one of the partners had a self-perceived memory decline. We applied a mixed method approach. Quantitative and qualitative data was collected via subjective forms, observations and 28 interviews conducted prior to the deployment, when the CAT was deployed and one month after the CAT removal.Results The study showed that the CAT had a psychosocial impact on older adults with a self-perceived memory decline and their informal caregivers but no impact on subjective forms measuring physiological and mental health, anxiety, depression or QoL. Additionally, we found that the CAT lacked a number of functionalities and that the test persons experienced several problems of different nature when using it in their homes. This affected the users’ experienced impact of the CAT.Conclusions This study contributes to the literature on sensor networks’ impact on QoL. While previous studies often use general forms intended to assess QoL, this summative evaluation indicates that using such instruments without considering contextual factors is not meaningful. The study also outlines a number of factors that sensor network providers might consider in order to increase their products impact on QoL and their perceived utility.
  •  
48.
  • Lagsten, Jenny, 1967-, et al. (author)
  • Mission Impossible? Applying AI Ethical Guidelines for Automation in Social Work
  • 2022
  • Conference paper (peer-reviewed)abstract
    • In this research we investigate how ethical guidelines can be applied in the context of a robotic process automation (RPA) that makes decisions on income support in a Swedish social work agency. Our purpose is to identify ethical concerns that might be subject for regulation and governance when new RPA technology has been implemented in the decision-making process.As a first step we apply the assessment list for trustworthy artificial intelligence (ALTAI) as the evaluation framework. The rapid growth of AI techniques has made both the public and private sector call for new ethical and regulatory frameworks (e.g., Stahl et al., 2021; Schneiderman, 2020). As a response, the area of ethical guidelines for AI has been particularly active where a diverse range of organizations, researchers and national bodies work with and debate ethical frameworks and principles to make use of, or control, these new techniques to serve people and society.Our research question is three-folded: i) How is the RPA implemented and how can the implementation be described? ii) What ethical concerns emerge when income support decision-making is handed over to a RPA? iii) Where can ALTAI provide support for identifying ethical concerns in the context of social work RPA decision-making? We contribute with a description of the RPA as an anatomy of the digital infrastructure for automation of income support in the case municipality and an analysis of the RPA in relation to each key requirement of ALTAI summarizing ethical concerns. We end with preliminary conclusions on the applicability of ALTAI to capture ethical considerations in the context of RPA in social work.
  •  
49.
  • Memedi, Mevludin, 1983-, et al. (author)
  • An interface for IoT : feeding back health-related data to Parkinson's disease patients
  • 2018
  • In: Journal of Sensor and Actuator Networks. - : MDPI. - 2224-2708. ; 7:1, s. 1-16
  • Journal article (peer-reviewed)abstract
    • This paper presents a user-centered design (UCD) process of an interface for Parkinson’s disease (PD) patients for helping them to better manage their symptoms. The interface is designed to visualize symptom and medication information, collected by an Internet of Things (IoT)-based system, which will consist of a smartphone, electronic dosing device, wrist sensor and a bed sensor. In our work, the focus is on measuring data related to some of the main health-related quality of life aspects such as motor function, sleep, medication compliance, meal intake timing in relation to medication intake, and physical exercise. A mock-up demonstrator for the interface was developed using UCD methodology in collaboration with PD patients. The research work was performed as an iterative design and evaluation process based on interviews and observations with 11 PD patients. Additional usability evaluations were conducted with three information visualization experts. Contributions include a list of requirements for the interface, results evaluating the performance of the patients when using the demonstrator during task-based evaluation sessions as well as opinions of the experts. The list of requirements included ability of the patients to track an ideal day, so they could repeat certain activities in the future as well as determine how the scores are related to each other. The patients found the visualizations as clear and easy to understand and could successfully perform the tasks. The evaluation with experts showed that the visualizations are in line with the current standards and guidelines for the intended group of users. In conclusion, the results from this work indicate that the proposed system can be considered as a tool for assisting patients in better management of the disease by giving them insights on their own aggregated symptom and medication information. However, the actual effects of providing such feedback to patients on their health-related quality of life should be investigated in a clinical trial.
  •  
50.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-50 of 75
Type of publication
conference paper (38)
journal article (15)
other publication (6)
reports (5)
research review (4)
doctoral thesis (3)
show more...
book chapter (3)
editorial proceedings (1)
show less...
Type of content
peer-reviewed (53)
other academic/artistic (14)
pop. science, debate, etc. (8)
Author/Editor
Kolkowska, Ella, 197 ... (72)
Karlsson, Fredrik, 1 ... (17)
Hedström, Karin, 196 ... (16)
Soja, Ewa (11)
Soja, Piotr (10)
Grönlund, Åke, 1954- (7)
show more...
Tsertsidis, Antonios ... (7)
Sjölinder, Marie (6)
Scandurra, Isabella, ... (6)
Nöu, Anneli Avatare (5)
Mutimukwe, Chantal, ... (5)
Kristoffersson, Anni ... (4)
Kirikova, Marite (4)
Frostenson, Magnus, ... (4)
Prenkert, Frans, 196 ... (4)
Helin, Sven, 1962- (3)
Loutfi, Amy, 1978- (3)
Lagsten, Jenny, 1967 ... (3)
Muceniece, Agneta (3)
Andersson, Annika, 1 ... (2)
Memedi, Mevludin, Ph ... (2)
Klein, Gunnar O., 19 ... (2)
Dhillon, Gurpreet (2)
Gerdin, Marcus, 1995 ... (2)
Karlsson, Fredrik, 1 ... (2)
Grönlund, Åke, profe ... (1)
Memedi, Mevludin, 19 ... (1)
Kristoffersson, Anni ... (1)
Furnell, Steven, Pro ... (1)
Karni, Liran, 1979- (1)
Johansson, Lars-Åke (1)
Axelsson, Karin, Pro ... (1)
Melin, Ulf (1)
Rapado, Irene (1)
Gao, Shang, 1982- (1)
Jusufi, Ilir, 1983- (1)
Chantal, Mutimukwe (1)
Harnesk, Dan (1)
Törner, Marianne (1)
Susha, Iryna, 1986- (1)
Kajtazi, Miranda, 19 ... (1)
Karlsson, Fredrik, p ... (1)
Hedström, Karin, pro ... (1)
Gao, Shang, docent, ... (1)
Bulgurcu, Burcu (1)
Petersson, Johan, 19 ... (1)
Avatare Nöu, Anneli (1)
De Decker, Bart (1)
van Loenen, Bastian (1)
Ernestam, Ingela (1)
show less...
University
Örebro University (75)
Mälardalen University (5)
RISE (4)
Uppsala University (3)
University of Borås (3)
Royal Institute of Technology (2)
show more...
Linnaeus University (2)
University of Gothenburg (1)
Jönköping University (1)
Blekinge Institute of Technology (1)
show less...
Language
English (67)
Swedish (8)
Research subject (UKÄ/SCB)
Social Sciences (52)
Natural sciences (26)
Medical and Health Sciences (4)
Engineering and Technology (2)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view