Aude Cabrera, M. Ranasinghe, Cedric Frossard, N. Postel-Vinay, C. Boyer
{"title":"AN EXPLORATORY EMPIRICAL ANALYSIS OF THE QUALITY OF MOBILE HEALTH APPS","authors":"Aude Cabrera, M. Ranasinghe, Cedric Frossard, N. Postel-Vinay, C. Boyer","doi":"10.33965/icwi2019_201913l013","DOIUrl":"https://doi.org/10.33965/icwi2019_201913l013","url":null,"abstract":"Introduction: Owning a smartphone is now almost a given, and with smartphone use comes the benefit of access to a large pool of apps on every topic conceivable, including health. So, it is not surprising that mHealth apps development is on the rise, as is the use of mHealth apps. However, unlike apps intended for other purposes, the use of mHealth apps carry, not only the advantage of improved health but also the burdens of potential misuse, misleading content and possible security breach of personal data. In this paper, we attempt to evaluate the possible hazards of some of the most popular mHealth apps in app stores from France. Objectives: To (1) examine the top 10 most downloaded health apps in term of security and transparency of content (2) identify the trends of the most downloaded apps (3) to assess the applicability of the mHONcode guidelines to identify main issues on health apps (4) to describe the still main risks of health apps and (5) to propose basic rules to overcome them. Results: As expected, the 10 apps displayed varying degrees of quality and trustworthiness or lack thereof. Only 20% of the apps disclose the editorial team and the funding source. 80% of the apps use tracking tools such as analytics, crash reporting without prior consent or before the consent. 2 out of 10 apps did not used a https web address for health content and advertisement display. One app activates the location functionality without any justification in the app. end-user with trustworthy and quality tools to help in the management and maintenance of their healthcare.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":" 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BEING WATCHED BY TV: SURVEILLANCE AT HOME","authors":"Ananda Mitra","doi":"10.33965/icwi2019_201913c024","DOIUrl":"https://doi.org/10.33965/icwi2019_201913c024","url":null,"abstract":"The Television (TV) that became a ubiquitous part of households in many parts of the World since World War II has been witnessing a significant transformation since the turn of the Twenty-First Century. Starting in the early 2000s, the TV has morphed in many ways such as in the size and quality of picture it delivers, the kind of content it can offer, and the multiple ways in which it can be used. Yet, in spite of these changes, it has been the case that the TV has remained a site to consume narratives. It is only in the past few years, with the advent of the “smart” TV has the tool been connected to the Internet and can gather information about the viewer in front of the TV instrument. In this essay I argue that the TV, originally the conduit for offering passive narratives to the audience, is transforming into a tool that can watch over the audience and construct a dynamic narrative of the audience, thus operating as tool for surveillance.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE CHALLENGES OF DESIGNING THE INTERACTION DESIGN OF A COLLABORATIVE ART PROJECT","authors":"J. Maric","doi":"10.33965/icwi2019_201913l011","DOIUrl":"https://doi.org/10.33965/icwi2019_201913l011","url":null,"abstract":"While many of us researchers dream about the opportunity to design a collaborative art project that would connect our youth with big, mainstream cultural and educational institutions, we seldom analyse the challenges of such collaborations. This paper presents the most prevailing issues that arose during the user-centred, interdisciplinary interaction design (ID) of the collaborative digital art project. The design is made in collaboration with the young participants of the Meet the Ministry project run by the Dance Company of the Opera House (DCOH) in Gothenburg, and the members of The Swedish School of Library and Information Science Social Media Studies (TSLIS) research group. Using the research through design approach to augment the outreach of the collaborative digital art project, enhance youth engagement with the contemporary dance, and learn from the young participants, we analyse the implications introduced by inter-institutional and interdisciplinary collaboration. Finally, by looking at the results of this project, we claim that interdisciplinary collaborations are extremely risky because they are unpredictable in their cost, process, and outcome. Even though literature offers advice for successful interdisciplinary cooperation there are no guarantees that the risks can be fully avoided. Still, we argue that such collaborations are necessary and need to be continuously developed as they seem to be successful tools for interdisciplinary learning and bridging social capital acquisition. If nothing else, we should at least foster the practices of learning from our younger generations who seem to be interested in partnering with us in exploring communication and collaboration in digital art projects creation.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LOYALTY PROGRAMS IN TOURISM - HOW INFLUENCERS AND COMMUNITIES CHANGE WORD-OF-MOUTH MARKETING","authors":"J. Fäs, D. Zumstein","doi":"10.33965/icwi2019_201913l008","DOIUrl":"https://doi.org/10.33965/icwi2019_201913l008","url":null,"abstract":"Conventional loyalty programs in the hotel industry often are outdated and should adapt to the digital age. This research shows that common loyalty programs have negative connotations, because hotel guests are inundated with them and the immediate benefits are not noticeable from the customers’ point of view. A sustainable loyalty program ideally offers playful incentives so that guests do not lose interest in it. Research found that many guests like to be part of an exclusive online community, where loyalty programs should be based on. Building a community, it is important that all stakeholders can derive added value and do not feel exploited. Moreover, empirical results show that hotel guests expect personalized incentives and offers. To provide these, tourism companies should cooperate with third-party partners. Communities on digital platforms like Instagram or Facebook can generate new guests by word of mouth, short eWOM. Experiences show that recommendations are made when expectations are exceeded: To increase this effect, incentives are still seen to be meaningful, but the nature and (digital) communication channels are changing. Social incentives, such as exclusive events, services or personal guest care, are clearly preferred instead of monetary incentives. It is also human interaction that binds guests to a hotel, which cannot be compensated by monetary incentives only. When guests are individually and immediately rewarded and when their expectations are met, word-of-mouth on social media lead to new customers. Moreover, research indicates that guests often act as micro-influencers on social media and ratings platforms. If they are convinced and find \"instagrammable moments\", they intrinsically report about a hotel and their services on social media. To recommend a hotel to friends, most guests do not expect anything in return, because they want to be credible and authentic.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115605219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GAMIFICATION STUDY: REVIEW AND RETRIEVAL","authors":"O. Kononova, D. Prokudin","doi":"10.33965/icwi2019_201913c018","DOIUrl":"https://doi.org/10.33965/icwi2019_201913c018","url":null,"abstract":"The digital transformations of the modern society often outstrip the processes of science transformation, forcing science to constantly improve both technologies and applied software. The phenomenon especially characterizes scientific studies in research areas such as the Digital Economy and the Smart City. In order to the urban environment becomes smarter, gamification technologies act as the motivational mechanisms, maintaining citizens’ social activity and stimulating social growth. The purpose of the paper is an identification of development trends of gamification in the context of the sociocultural urban information space. Comparative analysis results of the publications’ number, Russian scientific discourse about considered subject domains as well as its correspondence to the global trends are presented. The study has applied the synthetic method for the automated extraction and explication of contextual knowledge from an array of textual modality resources.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"38 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRIVACY IN BRAZIL: ANALYSIS ON THE NEW LAW ON DATA PROTECTION","authors":"Eduardo Helfer de Farias, G. Rached","doi":"10.33965/icwi2019_201913c025","DOIUrl":"https://doi.org/10.33965/icwi2019_201913c025","url":null,"abstract":"","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115146286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSING EGOVERNMENT RESEARCH: CURRENT AREAS AND DIMENSIONS","authors":"D. Sarantis","doi":"10.33965/icwi2019_201913l014","DOIUrl":"https://doi.org/10.33965/icwi2019_201913l014","url":null,"abstract":"In recent years, there has been rapid growth in the volume of research output on the topic of eGovernment. The analysis of the literature reveals significant insights about the evolution of eGovernment research over time, the assessment of which serves as a basis for recommendations for future research on this global phenomenon. To understand this research better, the specific study has selected papers that contribute to the development of eGovernment research through conceptualizations and clarifications of the field, as well as by addressing significant issues and trends. Through reviewing those studies in eGovernment literature this paper categorises the outcomes and identifies three research areas and twenty dimensions in which the research community targets its efforts.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE APPLICATION OF RECOMMENDER SYSTEMS TO DATA-DRIVEN DIGITAL MEMORY","authors":"Tingyu Luo, M. Nunes","doi":"10.33965/icwi2019_201913l007","DOIUrl":"https://doi.org/10.33965/icwi2019_201913l007","url":null,"abstract":"Data-driven digital memory applications lack predefined navigation paths and strict hierarchical structures. They are based on large collections of memory items that can become overwhelming to users. Recommender systems can improve user experience through the proposal of personalized relevant items. However, very little academic literature has been dedicated to discussing this type of filtering of digital memory resources and the provision of customized contents to active users. In this paper, an architecture of a hybrid enhanced recommender (HER) system, which integrates collaborative filtering and content based filtering techniques and resolves most of the weaknesses of the individual approaches. This architecture also proposes an ontology to build semantic user profiles and represent memory items to mitigate the lack of semantics of traditional content-based method. Through combining those techniques, this architecture has the potential to cope with data sparsity problems, avoid overspecialization issues and partially resolve cold start problems.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130172400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ARCHITECTURES FOR DELIVERING PROACTIVE NETWORK SERVICES IN DIVERSE BUSINESS ENVIRONMENTS","authors":"Don Allen","doi":"10.33965/icwi2019_201913l006","DOIUrl":"https://doi.org/10.33965/icwi2019_201913l006","url":null,"abstract":"The introduction and adoption of cloud-based, as-a-service capabilities have had a dramatic impact on the network service management capabilities and the software architectures required to address the varied deployment requirements of customers. Historically customers were constrained, by cost, regulations, or technology, on how they designed and deployed their networks. In those environments customers deployed network management systems to manage the operations of their IT capabilities composed of vendor and opensource software. These systems were typically reserved for business-critical systems and had an operating cost above and beyond those of the business systems themselves. These support systems initially provided basic monitoring and alerting and over time expanded to include high value services such as security checks, compliance checks, policy management, and health monitoring. Over the previous decade there has been a move to migrate not only business capabilities but also the associated support systems into the cloud to reduce both software and administrative costs. This migration has not been ubiquitous across all industries due to regulatory, compliance, and security concerns as well as the nature of the company’s inherent business. This has driven the need for network service management companies to develop architectures that adapt to these new deployment models. This paper identifies 4 canonical service deployment architectures under development to address the diversity of on premise, cloud, in-a-box, and hybrid business system deployment models.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123783772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NO AD BLOCKERS FOR OLD MEN? DEMOGRAPHIC EVIDENCE FOR AD BLOCKER USAGE FROM GERMANY","authors":"V. Stallone","doi":"10.33965/icwi2019_201913c023","DOIUrl":"https://doi.org/10.33965/icwi2019_201913c023","url":null,"abstract":"Web users are turning to ad blockers to avoid ads because they perceive them as an invasion of privacy, as annoying or as slackening their internet browsing experience. There has been significant research into factors driving ad blocker adoption. In this paper, the author will highlight significance correlation between ad blocker usage and age. The author conducted an online survey and built two groups, ad blocker users and non-users. When checking for significant differences in the demographic data, the author has found significant difference in the age of ad blocker users.","PeriodicalId":270658,"journal":{"name":"Proceedings of the 18th International Conference on WWW/Internet 2019","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122301677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}