Rehabilitation Therapists as Software Creators?

Author(s):  
Daniel Tetteroo ◽  
Henk Seelen ◽  
Annick Timmermans ◽  
Panos Markopoulos

The authors discuss the feasibility of End-User Development (EUD) for non-information workers in the context of neurorehabilitation. The authors present a three-week long field deployment of TagTrainer, a system that enables therapists to create, share, and use exercises for arm-hand training with a tangible interactive tabletop application. The experiences suggest that therapists are capable and motivated to create content that is tailored to the training needs of their patients. Three key challenges are identified for enabling EUD practices in a clinical setting, which appear to have a broader relevance outside the specific domain of neurorehabilitation: more support for retrieval and sharing of existing solutions developed by end users, guiding end-user developers to ensure usability and software quality for their creations, and aligning with the revenue model of the organization.

2010 ◽  
Vol 22 (1) ◽  
pp. 1-22 ◽  
Author(s):  
Margaret Burnett

End-user programming has become ubiquitous; so much so that there are more end-user programmers today than there are professional programmers. End-user programming empowers—but to do what? Make bad decisions based on bad programs? Enter software engineering’s focus on quality. Considering software quality is necessary, because there is ample evidence that the programs end users create are filled with expensive errors. In this paper, we consider what happens when we add considerations of software quality to end-user programming environments, going beyond the “create a program” aspect of end-user programming. We describe a philosophy of software engineering for end users, and then survey several projects in this area. A basic premise is that end-user software engineering can only succeed to the extent that it respects that the user probably has little expertise or even interest in software engineering.


2018 ◽  
Vol 52 (1) ◽  
pp. 75-90 ◽  
Author(s):  
Katja Kous ◽  
Maja Pušnik ◽  
Marjan Heričko ◽  
Gregor Polančič

To ensure a certain degree of usability, a library website should be carefully designed, especially since end users constitute a multitude of people with different needs and demands. The focal objective of this research was to investigate how different types of end users (i.e. pupils, students, the working population, seniors and researchers) respond to a library website in terms of its effectiveness, efficiency and satisfaction, which together represent its usability. The answers were obtained by performing formal usability testing, including think-aloud protocol, log analysis and questionnaires. The results of the statistical analysis show that different groups of end users achieve different levels of effectiveness and efficiency, while there is no significant difference between groups in satisfaction level. The results also indicate that participants did not achieve the threshold for a usable website. Based on the identified weaknesses, researchers present recommendations for improving a website’s usefulness, especially for non-experienced users. This research has two main contributions: (1) the connection between the theoretical definition and practical use of ISO 9241-11 attributes and (2) a usability testing procedure with a measurement framework applicable for different types of users in a specific domain, which could be applied to other domains.


Author(s):  
Margaret Burnett

End-user programming has become ubiquitous; so much so that there are more end-user programmers today than there are professional programmers. End-user programming empowers—but to do what? Make bad decisions based on bad programs? Enter software engineering’s focus on quality. Considering software quality is necessary, because there is ample evidence that the programs end users create are filled with expensive errors. In this paper, we consider what happens when we add considerations of software quality to end-user programming environments, going beyond the “create a program” aspect of end-user programming. We describe a philosophy of software engineering for end users, and then survey several projects in this area. A basic premise is that end-user software engineering can only succeed to the extent that it respects that the user probably has little expertise or even interest in software engineering.


2020 ◽  
Vol 30 (Supplement_5) ◽  
Author(s):  
S Houwaart

Abstract End-user (e.g. patients or the public) testing of information material is becoming more common in the German public health care system. However, including the end-user (in this case patients) in an optimisation process and thus enabling a close collaboration while developing PIMs is still rare. This is surprising, given the fact that patients provide the exact perspective one is trying to address. Within the isPO project, a patient organization is included as a legal project partner to act as the patient representative and provide the patient's perspective. As such, the patient organization was included in the PHR approach as part of the PIM-optimisation team. During the optimisation process, the patients gave practical insights into the procedures of diagnosing and treating different types of cancer as well as into the patient's changing priorities and challenges at different time points. This was crucial information for the envisioned application of the individual PIMs and their hierarchical overview. Moreover, the developed PIM-checklist enabled the patients to give detailed feedback to the PIMs. With their experience of being in the exact situation in which the PIMs will be applied, their recommendations, especially on the wording and layout of the materials, have been a valuable contribution to the PIM optimisation process. In this part of the seminar, we will take a closer look at the following skill building aspects: What is gained from including patients as end-users in the development and optimization of PIM?How can we reach patients to contribute to a PIM optimization process? Which requirements and prerequisites do patients have to provide to successfully work on an optimisation team?How to compromise and weigh opinions when different ideas occur? Altogether, this part will construct a structured path of productive patient involvement and help to overcome uncertainties regarding a collaboration with patient organizations.


Energies ◽  
2020 ◽  
Vol 13 (24) ◽  
pp. 6674
Author(s):  
Sebastian Hoffmann ◽  
Fabian Adelt ◽  
Johannes Weyer

This paper presents an agent-based model (ABM) for residential end-users, which is part of a larger, interdisciplinary co-simulation framework that helps to investigate the performance of future power distribution grids (i.e., smart grid scenarios). Different modes of governance (strong, soft and self-organization) as well as end-users’ heterogeneous behavior represent key influential factors. Feedback was implemented as a measure to foster grid-beneficial behavior, which encompasses a range of monetary and non-monetary incentives (e.g., via social comparison). The model of frame selection (MFS) serves as theoretical background for modelling end-users’ decision-making. Additionally, we conducted an online survey to ground the end-user sub-model on empirical data. Despite these empirical and theoretical foundations, the model presented should be viewed as a conceptual framework, which requires further data collection. Using an example scenario, representing a lowly populated residential area (167 households) with a high share of photovoltaic systems (30%), different modes of governance were compared with regard to their suitability for improving system stability (measured in cumulated load). Both soft and strong control were able to decrease overall fluctuations as well as the mean cumulated load (by approx. 10%, based on weekly observation). However, we argue that soft control could be sufficient and more societally desirable.


Author(s):  
Nitin Vishnu Choudhari ◽  
Dr. Ashish B Sasankar

Abstract –Today Security issue is the topmost problem in the cloud computing environment. It leads to serious discomfort to the Governance and end-users. Numerous security solutions and policies are available however practically ineffective in use. Most of the security solutions are centered towards cloud technology and cloud service providers only and no consideration has been given to the Network, accessing, and device securities at the end-user level. The discomfort at the end-user level was left untreated. The security of the various public, private networks, variety of devices used by end-users, accessibility, and capacity of end-users is left untreated. This leads towards the strong need for the possible modification of the security architecture for data security at all levels and secured service delivery. This leads towards the strong need for the possible adaption of modified security measures and provisions, which shall provide secured hosting and service delivery at all levels and reduce the security gap between the cloud service providers and end-users. This paper investigates the study and analyze the security architecture in the Cloud environment of Govt. of India and suggest the modifications in the security architecture as per the changing scenario and to fulfill the future needs for the secured service delivery from central up to the end-user level. Keywords: Cloud Security, Security in GI Cloud, Cloud Security measures, Security Assessment in GI Cloud, Proposed Security for GI cloud


2004 ◽  
Vol 4 (2) ◽  
pp. 111-123 ◽  
Author(s):  
Peter Goldsmith ◽  
Karen Bender

Dynamics in the global food system, along with a cascade of technologies, drive demands for capturing information and sharing information vertically within the supply chain. Food safety, genetic engineering, and animal welfare all have contributed to the need for enhanced information flow within the supply chain. Identity preservation in grains and oilseeds is an emerging issue that may influence the structure of agriculture in the longer term. This research addresses the following questions. While demand for high-information grains appears to be growing, where and how along the supply chain is the value created and captured? Though it appears that the economy demands ever-increasing amounts of differentiation, why do opportunities for producers and life science companies to create and capture significant new sources of value remain elusive? To answer these questions needs assessments were conducted with grain procurement executives. Their responses reveal the "buyer's calculus" where buyers balance investment in specific relationship assets with the market uplift or risk mitigation return it generates. Buying from a competitively structured industry has numerous benefits. There is a "cost" or tradeoff leaving the spot market procurement model in favor of a relationship-based model; hence the calculus. The current equilibrium state reflects the current risk-adjusted value proposition suppliers deliver to end users. Though end-user benefits are on the horizon with the next generation of biotechnologies, their emergence is insufficient to guarantee farmers and life science greater returns. End users will always balance the risk mitigation and market uplift features of a supply offering with the risks of narrowing their supply base. To drive value up the chain, suppliers need to shift away from focusing solely on the products of the future and focus on the technologies, delivery systems, and organizational models that, when bundled with new products solve problems and make end users more competitive.


2018 ◽  
Author(s):  
Hwayoung Cho ◽  
Dakota Powell ◽  
Adrienne Pichon ◽  
Jennie Thai ◽  
Josh Bruce ◽  
...  

BACKGROUND Mobile health (mHealth) apps have the potential to be a useful mode of delivering HIV prevention information, particularly for young men (13-24 years) who account for 21% of new HIV diagnoses in the United States. We translated an existing evidence-based, face-to-face HIV prevention curriculum into a portable platform and developed a mobile Web app: MyPEEPS Mobile. OBJECTIVE The purpose of this study was to assess the usability of MyPEEPS Mobile from both expert and end user perspectives. METHODS We conducted a heuristic evaluation with five experts in informatics to identify violations of usability principles and end user usability testing with 20 young men aged 15 to 18 years in New York, NY, Birmingham, AL, and Chicago, IL to identify potential obstacles to their use of the app. RESULTS Mean scores of the overall severity of the identified heuristic violations rated by experts ranged from 0.4 and 2.6 (0=no usability problem to 4=usability catastrophe). Overall, our end users successfully completed the tasks associated with use case scenarios and provided comments/recommendations on improving usability of MyPEEPS Mobile. The mean of the overall Post-Study System Usability Questionnaire scores rated by the end users was 1.63 (SD 0.65), reflecting strong user acceptance of the app. CONCLUSIONS The comments made by experts and end users will be used to refine MyPEEPS Mobile prior to a pilot study assessing the acceptability of the app across diverse sexual minority young men in their everyday lives.


2021 ◽  
Author(s):  
◽  
Amardeep Mohanlal Dugar

<p>'Tangible lighting controls' is used as an umbrella term to describe lighting control systems that are easy to understand and pleasurable to use by end-users. The crucial question posed is, what is the nature of interface designs sought by end-users for maximising interaction with lighting control systems? The manner in which this question is posed implies a fundamental assumption that improved usability and end-user experience are the primary goals. The concept of end-user understanding of lighting control interfaces is proposed as a basis for improving the usability and end-user experience of lighting control interfaces. Usability engineering methods involving survey research, experimental mock-ups and prototyping have been used to enable end-users to design and evaluate lighting control interfaces. The essential difference is to include end-users' point of view about ease of understanding control functions and pleasure of performing control tasks along with a technical point of view about meeting required standards. Manufacturers' claims about the effectiveness of existing lighting control interfaces are challenged, and an entirely different way of thinking about interface design is revealed. Such a change of thinking may be seen as a new framework for improved designs of lighting control interfaces as well as evaluation of their usability and end-user experience.</p>


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Abdulsalam Alammari ◽  
Salman Abdul Moiz ◽  
Atul Negi

AbstractThe reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is evaluated using Yet Another Fog Simulator in different scenarios (numbers of users, sensors, actuators, and areas). A comparison was made for Sensing and Actuating as a Service (SAaaS) with/without layered fog, and layered fog with/without (failure reassignment, pre-specified cases in fog nodes, and offloading). The comparison was conducted in terms of computing/communication latencies and the number of missed messages for both observations and actuation commands. Results show that failure reassignment prevented losing messages and maintained network connectivity. Also, wisely selecting the monitoring fog node per end user pre-specified cases and the offloading scheme decreased actuation latency.


Sign in / Sign up

Export Citation Format

Share Document