Empowering Patients through Mobile Patient Education Systems

AUTHOR
Dezhi Wu , Rob Robertson and Eric Freden

ABSTRACT

Mobile technologies have enabled people to access information anytime and anywhere, which makes our lives more convenient and efficient. Mobility has been greatly enhanced due to the implementation of cutting-edge mobile communications and networks. It is now common to see people on the go using their iPhones, iPads, and Android smart phones to check email, play games, and connect with friends and coworkers through the mobile version of social networking sites, such as Facebook, Twitter, and LinkedIn.

The rapid advancement of mobile technologies has made a large impact on our society; in particular, it has started to benefit the healthcare field, which is generally called mHealth. The mHealth area covers prevention, screening and diagnosis, disease management, rehabilitation and physical therapy, decision making, and so on. It creates a new emerging business model for the healthcare field through delivering care anytime and anywhere. Nowadays, the role of patients is being changed from a traditional passive receiver to an active partner with their doctors to make decisions concerning their health situations. Mobile technologies used in patient education programs empower the patients to be more knowledgeable on their health issues and to be more engaged in communicating with their doctors (Charles et al., 1999; McNutt, 2004). Mobile patient education software is playing a key role in this interactive process, creating more cost-effective, personalized, and convenient patient experiences, which improve the quality of patient care.

In practice, it was reported that over half of young medical doctors were using mobile devices in their clinics (Martin, 2003). A recent news item from 2011 (http://www.pwc.com/ ) indicates that a two-year study by the Mayo Clinic Department of Family Medicine shows mHealth systems enabled e-visits to eliminate 40% of in-office visits in 2531 cases. On average, about 40% of physicians said that using mobile health technologies such as remote monitoring, e-mail, or text messaging with patients greatly enhanced their work productivity and saved them time and money. In Europe, a mobile health application was designed for aging patients to undertake their self-diagnosis (Ahmad et al., 2008). The US army has started to design and implement mobile patient care systems for their soldiers using smart phones (Poropatich et al., 2010). Therefore, it is clear that the trend to adopt mHealth is rising, but there are still many technical barriers (www.ama-assn.org ), e.g. integration with the existing healthcare infrastructure or the capability to communicate with patients through a variety of mobile devices etc.

This paper reports a recent mobile patient education project conducted in the United States. We employed a user-centered design approach to develop and implement cross platform mobile patient education software, which is projected to greatly benefit patient care through cutting-edge mobile technologies. The mobile device technologies will enable expanded patient interaction with their doctors. All patient records and their privacy are protected according to the US Health Insurance Portability and Accountability Act (i.e., HIPAA), using cryptographic technologies through point-to-point encryption, secure protocols and secure Web servers in a private cloud.

Two focus groups with real patients were conducted in determining the design and content for this mobile patient education system. The first focus group included six patients who helped us identify the key design features, such as the interface design layout, color scheme, possible interactive content delivered through multimedia elements, such as text, images and videos, and the patient preferred navigation patterns. The second focus group, consisting of eight pregnant mothers in a local OB doctor’s office, was invited to attend a video lesson which was in line with the current stage of pregnancy. The educational videos instructed the mothers on the development of the baby/fetus and changes that occur in the mother’s body. The videos also highlighted specific weeks of baby/fetus development and what pregnant women could expect during that time frame. The mothers especially enjoyed the personalized educational content delivered in the videos, expressing that it helped them learn and better manage their own and their babies’ health during the pregnancy period.

Currently, the initial prototype developed for the iPad is working. We plan to complete the implementation of this mobile patient education system in the next six months. We will also conduct further usability studies to test and evaluate this system. In the meantime, a theoretical research framework is being developed to measure the system effectiveness, perceived patient learning outcomes, perceived patient control in terms of the users’ interface, security and privacy concerns, perceived enjoyment using the system, and potential patient behavior changes which improve their health. Research methodologies we propose to use in order to evaluate this mobile patient education system include a few longitudinal field studies in selected local physicians’ offices utilizing real patients, field observations in the doctors’ exam rooms, and a large survey in the doctors’ offices and hospitals which have adopted our system. We speculate that the mobile patient education system will greatly enhance the healthcare field, and empower patients to be more knowledgeable and capable in making better decisions to manage their personal health.

REFERENCES

Ahmad, D., Komninos, A. and Baillie, L. (2008) Future mobile health systems: Designing personal mobile applications to assist self diagnosis, Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction, Vol. 2, published by the British Computer Society.

Charles, C., Gafni, A. and Whelna, t. (1999) Decision-making in the physician-patient encounter: Revisiting the shared treatment decision-making model, Soc. Sci. Med. 49 (Sept, 1999), 651-661.

Martin, S. (2003) More than half of MDs under age 35 now using PDAs, Canadian Medical Association Journal, Oct. 28.

McNutt, R. A. (2004) Shared medical decision making: problems, process, progress, J. Am. Med. Assoc. 292, Nov., 2516-2518.

Poropatich, R., Pavliscsak, H. H., Rasche, J., Barrigan, C., Vigersky, R., and Fonda, S. J. (2010) Mobile healthcare in the US Army, Proceedings of ACM Wireless Health Conference, Oct. 5-7, 2010, San Diego, CA, USA.

www.ama-assn.org (Accessed on Jan. 30, 2011)

http://www.pwc.com/ (Accessed on Feb. 2, 2011)

The usefulness of the stakeholder theory in an analysis of the Internet-impacted business environment of contemporary organizations.

AUTHOR
Janusz Wielki, Ph.D.

ABSTRACT

The business environment in which every organization operates and the changes taking place in it are extremely important elements of an organization’s success. It is a collection of numerous entities, factors and forces which are more or less predictable in their behavior and which give an organization a chance to establish a competitive advantage and to develop further development. Conversely, these entities can also threaten the existence of an organization. As a result, the ability of an organization to analyze, understand and assess its business environment and the associated dynamics is essential.

As the contemporary business and economic reality becomes more and more complicated and decreasingly unambiguous, as compared to before the wide scale use of the Internet, an analysis of the business environment as conducted in the traditional way and also operating in this context in typical categories such as suppliers, customers or competitors, decreasingly fits in with the emerging new reality. The dynamics of the changes taking place are so big and the state of belonging to the above mentioned groups is so fluid and imprecise that it has become necessary to look at the forces influencing organizations through their business environment in a far wider and unconventional way. Additionally the whole “picture” is complicated by various entities which have either emerged with the development of the electronic space or have grown in power in the new reality.

This new marker situation provides an opportunity for analysis using the stakeholder theory, with considerations in its scope, beyond “traditional” stakeholders, entities and forces operating in developing around the Internet electronic space (understood as a global computer network based on the TCP/IP protocols). There are numerous important aspects which determine its usefulness and accuracy with reference to the contemporary economic and business reality. They include such issues as utilization, in the context of entities influencing functioning of organizations; a very broad-ranging and flexible notion of “stakeholders”, and a holistic view of an organization and its business environment connected with conducting an analysis from the systems theory point of view.

The paper is composed of four parts. In the first part an overview of the situation connected with the changes taking place in the business environment of organizations as a result of the Internet’s arrival within the contemporary economy is provided. The next part is focused on a review of the most common approaches used to analyze an organization’s business environment and the reasons for a particular usefulness of the stakeholder theory in this context. The following part is the core of this paper. It is devoted to the utilization of the stakeholder approach in the analysis of the Internet-impacted business environment of contemporary enterprises. First, a brief overview of its development and areas of utilization in management are provided. Also, a definition of stakeholders is proposed, in the context of the analysis conducted in the paper. Next, a review is made of the most important groups of stakeholders from the organization’s point of view. In this context, particular attention is focused on SIGs (special interest groups) as the influence of these groups has been rapidly growing in the new business reality. Their revised definition is also proposed.

Further analysis is conducted from the three-layered approach proposed by Donaldson and Preston including descriptive, instrumental, and normative aspects. Referring to the first layer, a division of stakeholders from the point of view of organizations using the Internet in their business activities is proposed. Next, referring to the instrumental layer and based on practical examples, various aspects connected with stakeholder management, including both real and potential ones, operating in electronic space in the context of organization’s performance and accomplishment of its goals are analyzed. Finally the focus of the attention moves to the normative point of view and an analysis of the potential social and ethical challenges emerging in the Internet-impacted business environment of contemporary enterprises. Particularly careful analysis is given to this in the context of this paper.

This three-layered analysis is conducted taking into consideration the changes taking place in an organization’s business environment with the evolution of the Internet and development of the Web 2.0 phase. In this context, the consequences of the access of stakeholders to new types of internet technology-based tools and the development of social computing are included in the analysis.

In the final part of the paper, the most significant conclusions and suggestions are offered.

REFERENCES

Austin R, Darby C.: The Myth of Secure Computing. „Harvard Business Review”. June 2003.

Bodwell C., Grawes S., Waddock S.: Responsibility: The new business imperative. „Academy of Management Executive”. Vol. 18, No. 2. 2002.

Clarkson: A stakeholder framework for analyzing and evaluating corporate social performance. „Academy of Management Review”. Vol 20, No. 1. January, 1995.

Colle S., Freeman E., Harrison J., Parmar B., Wicks A.: Stakeholder Theory: The State of the Art. Cambridge: Cambridge University Press, 2010.

Czubkowska S.: Firmy p?ac? za komentarze odno?nie swoich produktów w sieci. „Dziennik Gazeta Prawna”. [http://www.gazetaprawna.pl/drukowanie/469041]. 02.12.2010.

Donaldson T., Preston L.: The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications. „Academy of Management Review”. Vol. 20. No. 1, 1995.

Freeman E.: Strategic Management: A Stakeholder Approach. Boston: Pitman, 1984.

Freeman E., Harrison S., Wicks A.: Managing for Stakholders: Survival, Reputation, and Success. New Haven & London: Yale University Press, 2007.

Friedman A., Miles S.: Stakeholders: Theory and Practice. Oxford: Oxford University Press, 2006.

Gaudin S.: Web 2.0 tools like Twitter, Facebook can foster growth in hard times. „Computerworld”. [http://www.computerworld.com/s/article/335566/Web_2.0_tools_ like_ Twitter_Facebook_can_foster_growth_in_hard_times]. March 13, 2009.

Griffin R.: Management. Boston: Houghton Mifflin Company, 2005.

GUS: Spo?ecze?stwo informacyjne w Polsce. Wyniki bada? statystycznych z lat 2006 – 2010. [http://www.stat.gov.pl/cps/rde/xbcr/gus/PUBL_nts_spolecz_inform_w_polsce_2006-2010.pdf]. 2010.

Hitchcock J.: Net Crimes & Misdemeanors. Medford: Information Today, 2006.

Kesmodel D.:, Wilke J.: Whole Foods Is Hot, Wild Oats a Dud — So Said ‘Rahodeb’. „The Wall Street Jo-urnal”. [http://online.wsj.com/article/SB118418782959963745.html]. July 12, 2007.

Kramer M., Porter M.: Strategy & Society. The Link Between Competitive Adavantage and Corporate Social Responsibility. „Harvard Business Review”. December 2006.

Lee J.: Handling bad PR turns sticky for Nestle. “The Sydney Morning Herald”. [http://www.smh.com.au/ technology/enterprise/handling-bad-pr-turns-sticky-for-nestle-20100326-r0t2.html]. March 26, 2010.

McMillan R.: Siemens: Stuxnet worm hit industrial systems. „Computerworld”. [http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems]. Septem-ber 14, 2010.

Messmer E.: America’s 10 most wanted botnets. „NetworkWorld”. [http://www.networkworld.com/news/2009/072209-botnets.html]. July 22, 2009.

Purcell K., Rainie L., Smith A.: The social side of the internet. „Pew Internet & American Life Project”. [http://pewinternet.org/~/media//Files/Reports/2011/PIP_Social_Side_of_ the_Internet.pdf]. January 18, 2011.

Samcik M.: Zbuntowani klienci znów atakuj? mBank. „Gazeta Wyborcza”. [http://gospodarka.gazeta.pl/ pieniadze/2029020,29577,6746819.html]. 23.06.2009.

Smith J.: The Shareholders vs. Stakeholders Debate. „Sloan Management Review”. Vol. 44. No 4. Summer 2003.

Sophos: Security threat report 2011. [http://www.sophos.com/sophos/docs/eng/papers/sophos-security-threat-report-2011-wpna.pdf]. 2011.

Vijayan J.: Update: MasterCard, Visa others hit by DDoS attacks over WikiLeaks. „Computerworld”.[http://www.computerworld.com/s/ article/9200521/ Update_ MasterCard_Visa_others_hit_by_DDoS_attacks_over_WikiLeaks]. December 8, 2010.

Wielki J. : Social and ethical aspects connected with e-space development (revised version). “Journal of Information, Communication and Ethics in Society” – Volume 5 Issue 4, 2007.

Wielki J.: The impact of search engines on contemporary organizations – the social and ethical implications. [w:] Living, Working And Learning Beyond Technology. Proceedings of The Tenth ETHICOMP International Conference on the Social and Ethical Impacts of Information and Communication Technology ETHICOMP 2008. Bynum T. et al. Mantua: University of Pavia, 2008.

Zickuhr K.: Generations 2010. „Pew Internet & American Life Project”. [http://pewinternet.org/~/media//Files/Reports/2010/PIP_Generations_and_Tech10_ final.pdf]. December 16, 2010.

Australia and the question of Internet Control

AUTHOR
Matthew J. Warren and Shona Leitch

ABSTRACT

Introduction

Australia as a part of the Global Information Society will have to deal with a number of ethical issues in relation to the Internet; particularly, the distribution of illegal material and the impact of Web 2.0 on Australian society. In the Oceania region of the world there are 20.8 million Internet users, which represents 60% of the regions population (InternetWorld, 2009), this identifies the strong impact of the Internet in Australia.

Historically the initial focus of the Internet was the distribution of information in a static manner, but over time and through the development of technology the Internet has now developed into Web 2.0. The Web is no longer a collection of static pages of HTML that describe something in the world; increasingly, the Web is the world. Everything and everyone in the world casts an “information shadow,” an aura of data which, when captured and processed intelligently, offers extraordinary opportunity and mindbending implications (O’Reiley and Battelle, 2009).

In recent years the emergence of Web 2.0 and related internet sites such as Facebook have had a major impact upon the Internet in recent years. One of the interesting aspects of Facebook is the use of third party applications and the interactions that this allows. This means that individual Facebook pages now act as a web page, blog, instant messenger, email system and the use of third party applications allows for real time functionality (DiMicco and Millen, 2007; Shuen, 2008).

Australia Government Strategies

One of the proposals put forward by the Australian Federal Government to deal with the concerns of the Internet is the introduction of mandatory Internet filtering. The aim is that Internet service providers will run the mandatory Internet filtering system on behalf of the Federal Government. The overall aim being to remove access to Australians to information that is considered illegal in an Australian content.

As part of the process, in 2010 the Australian Federal Government via the Department of Broadband, Communications and the Digital Economy sought public views regarding dealing with illegal content via the Internet. This paper will analyse the public feedback that was obtained and determine current trends that exist within that data.

Structure of the paper

The structure of the paper will be:

1) A discussion of how Australia is dealing with the issues posed by the Internet and the associated new technologies;

2) The paper will discuss the strategies developed by the Australian Federal Government and in particular discuss the proposed mandatory Internet filtering;

3) An analysis of the public findings submitted to the Department of Broadband, Communications and the Digital Economy will be presented. The submission will be analysed and data trends will be discussed within the paper in particular the issues raised (for and against) in regards to mandatory Internet filtering.

4) An assessment of the next stage of the Federal Government proposals and the impact that it could have on Australia.

5) The paper will conclude by comparing Australian Government initiatives with initiatives from other countries around the world.

REFERENCES

DiMicco, J. M. and Millen, D. R. (2007) Identity management: Multiple presentations of self in Facebook. Proceedings of the 2007 International ACM conference on Supporting group work, Florida, USA.

InternetWorld (2009) Global Internet Statistics, URL: http://www.internetworldstats.com/stats.htm, Accessed 25th September, 2009.

Shuen, A. (2008) Web 2.0: a strategy guide. O’Reilly Media, Inc.

O’Reiley and Battelle (2009) Web Squared: Web 2.0 Five Years On, Proceedings of Web 2.0 Summit, San Francisco, USA.

Political blogging in Northern Ireland: A post-conflict society in the virtual world

AUTHOR
Ciaran Ward

ABSTRACT

The socio-political landscape of Northern Ireland has changed radically and rapidly over the course of the last 15-20 years. This period has seen the emergence and rapid growth of the online social media phenomenon, which has exercised a considerable influence over the politics and wider society of the region.

In 1998 devolved government returned to Northern Ireland in the form of a legislative assembly for the first time in 26 years following a prolonged period of civil unrest during which time direct rule was administered from London.

After an uncertain beginning including two periods of suspension and temporary return to direct rule the assembly was reconvened in 2007, since which time it has functioned continuously with a two-party coalition. The assembly’s existence has coincided roughly with the advent and development of blogging or citizen journalism. Since the birth of the first weblog dedicated specifically to Northern Irish politics “Slugger O’Toole” in 2002 dozens of blogs encompassing a vast spectrum of political views and party affiliations reflecting both the left/right and the unionist/nationalist divide have sprung up. These blogs are written by a wide range of actors including politicians, academics and journalists as well as private individuals and have become a significant addition to the input of the mainstream media. The ownership status of these blogs also varies considerably in that some are fully or partially independent of external influence, while others are linked to broadcasting organisations, newspapers, political parties, lobby groups and think tanks throughout the UK as well as in the Republic of Ireland. The tone of such blogs also varies from serious analysis to whimsical satire. It is also significant to note that not all actors within the Northern Irish blogosphere are physically based within the region. Participants, including authors, commenters and readers form a large online community whose members are based all over the world.

Since the end of the civil conflict of 1969-94 and the gradual normalisation of political life international news coverage of the region has markedly declined. This gap has been filled in part by the advent of the blog and related online media in that bloggers now chart news events on a daily basis, giving rise to extensive debate and commentary.

Although the practice of blogging is often panned by critics as little more than vanity publishing, its influence in forming political thought and provoking debate should not be underestimated. Unlike mainstream media sources blogs are not restricted by editorial control or neutrality policies and can therefore accommodate a vast range of views ranging from the moderate to the extremist ends of the spectrum. Other restrictive factors within conventional journalism such as time, space and money are largely irrelevant within the blogosphere. Similarly, blogs lack the hierarchical and often dictatorial culture often present in the more traditional media. Blogs alongside Freedom of Information legislation can contribute to government transparency and accountability. However one major flaw is the lack of veracity or authority in reporting purported facts, which as well as being ethically questionable can lead to the possibility of legal action. Furthermore the lack of regulation and the free-for-all nature of the medium means that quality can vary immensely. Comment threads can often alternate between mature political debate and abusive exchanges like a virtual wild west or school playground, in which the infamous “Godwin’s Law” is often invoked.

In more recent years the blog has been supplemented by other interactive social media phenomena such as Twitter, Facebook and YouTube, all of which feature prominently in the socio-political developments within the region and further afield.

The regional Assembly has had to face many challenges during its relatively short existence, such as the impact of the Freedom of Information Act and the financial crisis, the ongoing threat from dissident terrorism, devolution of policing and justice and financial misconduct by members, all of which have been covered extensively within the local blogosphere.

Important events such as elections, budgets, incidents of civil unrest and ministerial resignations can be discussed and debated on an instantaneous basis within these online communities. The blogosphere thus permits interaction on an unprecedented scale which would have been impossible in the pre-internet era.

Although blogging in Northern Ireland, a relatively liberal democratic society does not have the same radical impact as it would in countries with restrictions on democracy or freedom of speech it nevertheless plays a crucial role in the flow of information, the formation of opinions and the empowerment and organisation of political activists. This is aided in part by the small size of the region and its close-knit political community.

This paper examines and sets out to quantify the impact of the blog and related social networks within Northern Ireland’s socio-political landscape through empirical research comparative cases, source material and anecdotal evidence, charting both the negative and positive effects as well as the unintended consequences of the phenomenon.

Brain-Computer Interfaces: a technical approach to supporting privacy

AUTHOR
Kirsten Wahlstrom, Ben Fairweather and Helen Ashman

ABSTRACT

Introduction

Brain-Computer Interfaces (BCIs) facilitate communication between a brain and a computer and can be categorised according to function: interpretation of neural activity, stimulation of neural activity, and interpretation-stimulation. Warwick’s self-experiments with implants in the interpretation-stimulation category (Warwick and Gasson, 2004) demonstrate the technical feasibility of extending the human nervous system beyond its biological limits to other systems, and to other people, via the internet. Furthermore, there have been recent advances in interpreting passive neural activity (Coffey et al., 2010) and also in concurrent interpretation of visual and motor intentional neural activity (Allison et al., 2010). A future BCI (fBCI) integrating these technical features would concurrently interpret both intentional and passive neural activity in order to communicate information to systems and other people via the Internet.

In addition to these research advances, BCIs interpreting intentional neural activity via electroencephalography (EEG) are available to consumers (Emotiv Systems, Intendix). Should fBCI be commercially viable, an ethical and legal obligation to support privacy will exist.

Privacy emerges from a society’s communication practices (Westin, 2003). Although acculturation plays a role in shaping privacy expectations, the extent to which one person requires privacy may differ to that required by another (Gavison, 1980). In addition, a person’s perception of privacy is dependent on context (Solove, 2006). For example, I am likely to openly disclose details related to my health to my father, judiciously disclose these details to my friends, and withhold them completely from strangers. Thus, privacy requirements are diverse and susceptible to change.

Privacy is a component of freedom, autonomy and identity. When using technologies, people assert independence and autonomy by declining to participate, or by using anonymity or misinformation to create and maintain privacy (Lenhart and Madden, 2007, Fuster, 2009). When people opt out, adopt anonymity or engage in misinformation, the effectiveness of any technology reliant upon accurate and representative data is compromised.

The conceptualisation of privacy as culturally shaped and unique for each person and their immediate context is well understood, long-standing, and widely applied by law- and policy-makers. It forms the basis for legislative and other regulatory approaches such as the Australian Privacy Act, the EU’s Privacy Directives and the OECD’s Guidelines. These legal obligations, and further ethical obligations (Burkert, 1997), mandate support for privacy with respect to technologies. In addition, if technologies support privacy, people are more likely to provide accurate information, adding value to the technology itself. However, to the authors’ knowledge, there have been no investigations of technical approaches to supporting privacy in BCIs. This paper presents a conceptual model for consideration and critique.

BCI technology

BCIs identify and measure the electrical activity associated with activating specific neural pathways (Berger et al., 2007). These measurements are then applied to the control of external systems (Hochberg et al., 2006). With respect to BCI technologies, the identification and measurement of neural activity has been achieved with surgically invasive and non-invasive approaches. While surgical BCIs identify and measure neural activity with a higher level of accuracy, non-surgical approaches carry fewer health risks. Thus, there has been interest in improving the accuracy of non-surgical BCIs (Allison et al., 2010).

BCIs have neural networks which must be trained to identify a person’s neural activities and then to map specific neural activities to specific intentions. For example, consider a scenario in which Ann has purchased a new BCI to use with her mobile phone. She must spend time training the BCI to recognise the unique pattern of neural activity that matches with imagining each person in her mobile phone’s address book and to recognise neural activity corresponding to the ‘call’ and ‘hang up’ commands.

Conceptual model

If BCIs can identify and measure neural activity, then they can also identify and measure a person’s privacy perception and requirement. The person’s privacy requirement can then be applied to any information they may be sharing. For example, consider a scenario in which Bob is using a BCI to interact with his mobile phone. He is calling Charlie but does not want the call logged in the mobile phone’s memory. First, he thinks of Charlie and the mobile phone retrieves Charlie’s number. Then Bob thinks of not logging the call and the mobile phone saves this privacy requirement in its working memory. Finally, Bob thinks ‘call’ and the mobile phone places the call without logging it.

This scenario is a binary situation: log the call or don’t log the call. However, privacy requirements are much more diverse than this. If this conceptual model can be refined to support a diversity of privacy requirements, a technical prototype will be designed, implemented and tested.

The full paper will further conceptualise privacy with a view to informing a future prototype. Then the paper will describe the technologies underlying BCIs. These conceptual and technical descriptions will enable the proposition of technical conceptual model for the prototype which offers flexibility with respect to privacy and interoperability with respect to existing BCIs. Conclusions will stimulate consideration, discussion and critique.

REFERENCES

ALLISON, B. Z., BRUNNER, C., KAISER, V., MULLER-PUTZ, G. R., NEUPER, C. & PFURTSCHELLER, G. 2010. Toward a hybrid brain-computer interface based on imagined movement and visual attention. Journal of Neural Engineering, 7, 026007.

BERGER, T., CHAPIN, J., GERHARDT, G., MCFARLAND, D., PRINCIPE, J., SOUSSOU, W., TAYLOR, D. & TRESCO, P. 2007. International Assessment of Research and Development in Brain-Computer Interfaces.

BURKERT, H. 1997. Privacy-Enhancing Technologies: typology, critique, vision. Technology and privacy: the new landscape.

CAMPBELL, A., CHOUDHURY, T., HU, S., LU, H., MUKERJEE, M., RABBI, M. & RAIZADA, R. NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset. MobiHeld 2010, 2010. ACM.

COFFEY, E., BROUWER, A.-M., WILSCHUT, E. & VAN ERP, J. 2010. Brain-machine interfaces in space: Using spontaneous rather than intentionally generated brain signals. Acta Astronautica, 67, 1-11.

DRUMMOND, K. 2009. Pentagon Preps Soldier Telepathy Push. Wired.

EMOTIV SYSTEMS. Emotiv – Brain Computer Interface Technology [Online]. Available: http://emotiv.com.

FUSTER, G. 2009. Inaccuracy as a privacy-enhancing tool. Ethics and Information Technology.

GAVISON, R. 1980. Privacy and the Limits of Law. The Yale Law Journal, 89, 421-471.

HOCHBERG, L., SERRUYA, M., FRIEHS, G., MUKAND, J., SALEH, M., CAPLAN, A., BRANNER, A., CHEN, D., PENN, R. & DONOGHUE, J. 2006. Neuronal ensemble control of prosthetic devices by a human with tetraplegia. Nature, 442, 164-171.

INTENDIX Personal EEG-based Spelling System.

LENHART, A. & MADDEN, M. 2007. Teens, Privacy and Online Social Networks: How teens manage their online identities and personal information in the age of MySpace.

SHACHTMAN, N. 2008. Army Funds ‘Synthetic Telepathy’ Research. Wired.

SOLOVE, D. 2006. A Taxonomy of Privacy. University of Pennsylvania Law Review, 154, 477-560.

WARWICK, K. & GASSON, M. Extending the human nervous system through internet implants – experimentation and impact. IEEE International Conference on Systems, Man and Cybernetics, 2004 The Hague, Netherlands. 2046-2052.

WESTIN, A. 2003. Social and Political Dimensions of Privacy. Journal of Social Issues, 59, 431-453.

Lurking: finding one’s self while remaining hidden

AUTHOR
Richard Volkman

ABSTRACT

“Lurking” refers to the online behavior of gathering information from interactive resources like forums and social networking sites without participating in the interactivity that generates the online content and without disclosing one’s self as a consumer of that content. I propose to explore the ethical significance of lurking as it specifically relates to social networking sites like Facebook. This focus will reveal the deep relativity of the ethics of lurking to its particular context and motivations. In the context of social networking sites like Facebook, lurking and its compliment in the public disclosure of personal information are expressions of the particular characters of particular social animals situated in a particular social circumstance. Phenomena like lurking indicate the ethical significance of deliberations that cannot be readily undertaken in the language of impersonalist ethics, since lurking takes place at the vague and overlapping boundaries of self and other, friend and stranger, this community and that community. To deliberate effectively about such matters we do better to operate in the personalist language of character, self-discovery, and self-realization than the impersonalist discourse of overall consequences, moral rules, and political rights that characterizes so much of academic philosophy in ethics.

By “personalist” discourse, I mean ethical discourse that admits the relevance of particular persons and circumstances in properly judging what there is most reason to do or want or be. Aristotle’s virtue ethics or the heroic individualism of Emerson and Nietzsche are personalist in this sense. “Impersonalist” accounts of ethics strive for a level of impartiality and universality, whether in the form of some agent-neutral specification of the “overall good” in consequentialism, or in the specification of universal rules to govern conduct for “persons as such” in the deontology of Kant’s moral theory or Locke’s account of natural rights. The point of the essay is not to establish the absolute superiority of one or the other of these modes of discourse but to indicate the extent to which one’s account of the ethical universe will be impoverished if one altogether eschews personalist ethical discourse on the grounds that it is insufficiently impartial or universal in its application.

While there is a considerable literature on the ethics and motivations of lurking, there is relatively little investigation of it in the context of social networking and even less that reflects on the ultimate particularity of good judgement in that domain. There are many articles on the ethics of lurking in the context of formal research such as ethnography, and there are several articles examining the values of lurking versus more active participation in online learning communities. These are appropriate issues for academics to study, since they directly touch the pedagogical and policy concerns that shape our vocation, but we generally do not evaluate our everyday conduct in the terms of policy or professionalism. Meanwhile, treatments of lurking that focus on the free riding it may entail are appropriate to the investigation of the flourishing and success of online collaborative projects like Wikipedia or Slashdot or Reddit, but they do not seem particularly relevant to the motives or the consequences of lurking on social networking sites. In fact, one of the purposes that people bring to such sites is to disclose information about themselves, and this purpose would often be frustrated or at least undermined if there were no lurkers. This indicates a complimentary relation between “lurkers” and “disclosers” that may be present in other venues but which I will argue is an essential feature of social networking. Finally, analysis that focuses on hacking, violating terms of service, or other straightforward breeches of contract or policy is not directly relevant, since these issues are adequately addressed in impersonalist modes of discourse. It will be shown that lurking on social networking sites has obvious and profound privacy implications, but they are not the sort that can be neatly captured by an impersonalist discussion of privacy or the policies and social norms that attend it.

To orient the discussion, it is helpful to describe concrete cases in which lurking on a social networking site has plain ethical significance that cannot be easily captured without explicit reference to the particular person embedded in her particular circumstance and relations. This is a daunting task that cannot be neatly summed in an abstract, since it cannot proceed in the usual manner of “situated action ethics,” such that the story pumps an obvious intuition that is leveraged as evidence for or against some account of the rules or policies appropriate to the case. The point is that the particular facts matter, and this cannot be illustrated by leaving out the particular facts; nor is it possible to tell a story short of a novel that would include all those relevant facts. Instead, the cases will illustrate how many salient details are invariably left out of any such description, while also showing the case is an instance of real ethical significance and not a matter of mere taste or whim. The paper will proceed from a detailed investigation of such particular cases to illustrate that ethics is not simply a matter of evaluating actions or rules. One’s situated character matters.

In the end, it will be revealed that lurking on social networking sites cannot be categorically judged to be good or bad and that crude political tools for balancing privacy and the flow of information shed little light on the phenomena. To engage these matters, we need to engage the concrete realities of our particular lives in their full particularity. Ultimately, if we are to navigate the ethics of real life in the information age, we shall each need to engage our selves.

The Global Communication skill among educated youth of the Tharu tribe: A study in special reference to uses of internet-facilities

AUTHOR
Subhash Chandra Verma

ABSTRACT

The Tharu community is famous tribe of India and Nepal. The Tharus are indigenous people of the Himalayan Tarai area. Maximum population of this community lives on both sides of Indo-Nepal border. Tharu were already living in the Terai before Indo-Europeans arrived. Due to friendly relations between India and Nepal, the Indo-Nepal border is open for people of both countries; so Indian and Nepali Tharus are active in their socio-cultural relationship. This paper is based on primary & secondary data and it describes status of global communication & connectivity among educated youth of the Tharu tribe. There were 32 male and 18 female students in the selected samples. All these Tharu students belong to various villages. A self developed questionnaire has been used in interviewing all selected Tharu students for collection of information about awareness of global communication. Facts about use of internet, Social Networking, Chatting tools, developing of online communities have been collected from the internet. Facebook, Orkut, Yahoo Messenger, MSN Messenger, Skype, Google search have been used for searching those Tharus who are connected and active globally through the use of internet. Some information has been searched from the internet about the Nepali and Indian Tharus. Facts about use of internet, Social Networking, Chatting tools, developing of online communities have been collected from the internet. Facebook, Orkut, Yahoo Messenger, MSN Messenger, Skype, Google search have been used for searching those Tharus who are connected and active globally through the use of internet. It is a normal perception about the Tharus that they have very reserved and shy nature so they are backward. It has also been found in this study that they are really very poor in global connectivity due to their traditional habits. This situation is only in Indian Tharus because Nepali Tharus are more aware than Indian Tharus in use of internet and direct links to other people. This is why they are working at global level but Indian Tharus are still struggling for their basic needs in this era of globalization. Educated Indian Tharus are also backward and poor in use of global communication facilities like internet. Maximum (approx 75%) Indian Tharu students are not able to use computer and internet till now, though they know very well that use of modern technologies of communication is very helpful in development of any society. Hence they are always away from these facilities which are available in the college and market at very low price. There is need for more awareness about global communication and connectivity among Indian Tharus for their development. The Indian Tharu youth, who have access to higher education, are not so aware about globalization and global communication. Although they are aware of the significance of global communication in the development of any community in this era, but even then they are not active in global communication. There is no dearth of facilities which are available free of cost (at college) or at very low price in the market for global communication but Indian educated Tharu youths seem to have little interest in it. Nepali Tharu youths are more active than Indian Tharu youths in global communication by internet and direct contacts with people of other countries. There are many Nepali Tharu students studying in top grade Indian Institutes. But Indian Tharu youths have little awareness about studying in these institutes, though they have special facility of reservation for admission in these types of institutions. What is the real status of the global communication and what are the main problems of Indian Tharu youth about this matter? Why they are not interested in global communication? These are some main and big questions at present. On the basis of this analysis, of collected data from the Indian Tharu students and other available information by related literature & internet search, it should be said that Indian Tharu community is still poor and deprived in matter of global communication in this era of globalization. Lack of awareness about development and globalization is the reason of their backwardness in global communication. Due to poor English some Indian Tharus feel shyness and hesitation to keep global contacts by internet or directly. Educated Indian Tharus are also poor and slow in global communication due to their tipical traditional habits of hesitation and shyness. That is why the Indian Tharus have only one online community named as Rana Tharu Parishad but Nepali Tharus have lot of online communities for social networking (name of these online communities have also described above). Maximum educated Indian Tharus (3/4) are not able to use computer and internet till now. This is the era of globalization so the global communication is must for development of every community. That’s why the Indian Tharus need to be connected with global communication stream. Tharu youth are very important wing of their community. They are playing very creative role in their community. But they are not connected with mainstream of development. Some youths are trying to get higher education and advanced technology but they are very few. They are neither advanced nor are intricately linked with their traditional culture. They should have access to modern education, communication, technology and new life style but the care of traditional culture is necessary to keep their own identity.

Web Deception Detanglement

AUTHOR
Anna Vartapetiance and Lee Gillam

ABSTRACT

Suppose we wished to create an intelligent machine, and the web was the choice of information. More specifically, suppose we relied on Wikipedia as a resource from which this intelligent machine would derive its knowledge base. Any acts of Wikipedia vandalism would then impact upon the knowledge base of this intelligent system, and the system might develop confidence in entirely incorrect information. Ethically, should we develop a machine which can craft its own knowledge base without reference to the veracity of the material it considers? If we did, what kinds of “beliefs” might such a machine start to encompass? How do we address the veracity of such materials so that such a learning machine might distinguish between truth and lie, and what kinds of conclusions might be derived about our world as a consequence? If trying to construct an ethical machine, how appropriate can ethical outcomes be considered in the presence of deceptive data? And, finally, how much of the Web is deceptive?

In this paper, we will investigate the nature and, importantly the detectability, of deception at large, and in relation to the web. Deception appears to be increasingly prevalent in society, whether deliberate, accidental, or simply ill-informed. Examples of deception are readily available, from individuals deceiving potential partners on dating websites, to surveys which make headlines about “Coffee causing Hallucinations” with no medical evidence and very little scientific rigour , . to companies which collapsed due to deceptive financial practices (e.g. Enron, WorldCom), and segments of the financial industry allegedly misrepresenting risk in order to derive substantial profits . We envisage a Web Filter which could be used equally well as an assistive service for human readers, and as a mechanism within a system that learns from the web.

So-called Deception Theory, and the possibility to model human deception processes, is interesting to experts in different subject fields for differing reasons and with different foci. Most research has been directed towards human physical reactions in relation to co-located (face-to-face, synchronous) deception, largely considering non-verbal cues involving body language, eye movements, vocal pitch and so on, and how to detect deceptions on the basis of such cues. Such research is interesting for sociologists in terms of how deception is created, criminologists in trying to differentiate the deceptive from the truthful, and computer vision researchers in relating identifying such cues automatically across participants within captured video. Alternative communication mediums, in which participants are distributed, communications asynchronous, and cues can only be captured from the artefact of the communication, the verbal, requires entirely different lines of expertise and investigation.

To try to recognize deception in verbal communication, lexical and grammatical analysis is typical. Such approaches may be suitable for identifying deception on the web. It is assumed that deception leads to identifiable, yet unconscious, lexical selection and the forming of certain grammatical structures (Toma and Hancock, 2010), and these may act as generally useful cues for deceptive writing. From numerous researchers (Burgoon et al 2003, Pennebaker et al 2003, Newman et al 2003, Zhou et al 2003), we find that the presence of such cues can be divided into four principal groups:

1. Use of more negative emotion words

2. Use distancing strategies – fewer self references

3. Use of larger proportions of rare and/or long words

4. Use of more emotion words

To demonstrate that deception detection might be possible, Pennebaker and colleagues developed a text analysis program called Linguistic Inquiry and Word Count (LIWC) which analyzes texts against an internal dictionary (Pennebaker, Francis, & Booth, 2001, Pennebaker, Booth, & Francis, 2007). Each word in the text can belong to one or more of LIWC’s 70 dimensions, which include general text measures (e.g. word count); psychological indicators (e.g. emotions), and semantically-related words (e.g. temporally and spatially related words). We submitted the BBC’s “’Visions link’ to coffee intake” article, alluded to earlier, to the free online version of LIWC. Results, included below, show an absence of self-references, few positive emotions, and a large proportion of “big words”. Of course, such an analysis is inconclusive as such features may also be true of scientific articles, or textbooks, and LIWC leaves the interpretation up to us.
web_deception_fig1
Our aim is to create a system that can identify deceptive texts, but also explains which are the most deceptive sentences. Such a system could act as an effective Web Filter for both human and machine use. We assume that such a system should be geared towards the peaks of deception which may occur in texts which are otherwise not deceptive, so such deceptions may be lost in the aggregate. We must also account for systematic variations as exist in different text genres in order to control for them, and to ascertain the threshold values for the various factors which give us appropriate confidence in our identification.

The full paper will initially review the literature relating to deception in general, and distinguish between deceptions and lies. In the process, we will offer up some interesting – and occasionally amusing – examples of deception. We will then focus towards text-based deception, and we will include discuss initial experiments geared towards the development of the system mentioned above. One of these experiments may even demonstrate how a paper supposedly geared towards deception detection, whose conclusions fail to fit the aim, was never likely to achieve its aim, and make mention of one or two other interesting examples of academic deception and/or lies.

REFERENCES

Toma, C.L. and Hancock, J.T. (2010). Reading between the Lines: Linguistic Cues to Deception in Online Dating Profiles. Proceedings of the ACM conference on Computer-Supported Cooperative Work (CSCW 2009)

Burgoon, J.K., Blair, J.P., Qin, T., and Nunamaker, J.F. (2003). Detecting deception through linguistic analysis. Intelligence and Security Informatics, 2665.

Pennebaker, J.W., Booth, R.J., & Francis, M.E. (2007). “Linguistic Inquiry and Word Count: LIWC 2007”. Austin, TX: LIWC (www.liwc.net).

Pennebaker, J.W., Francis, M.E., and Booth, R.J. (2001). “Linguistic Inquiry and Word Count: LIWC 2001”. Mahwah, NJ: Erlbaum Publishers.

How to Address Ethics of Emerging ICTs: A critique of Human Research Ethics Reviews and the Search for Alternative Ethical Approaches and Governance Models

AUTHOR
Bernd Carsten Stahl

ABSTRACT

The purpose of this paper is to explore how ethical issues arising from emerging technologies can currently be addressed using the mechanism of ethical review, which dominates the approach to ethics on the European level. The paper discusses which blind spots arise due to this approach and ends with a discussion of alternative and complementary approaches.

The paper arises from the EU FP7 project Ethical Issues of Emerging ICT Applications (ETICA). ETICA ran from 04/2009 to 05/2011 (www.etica-project.eu). Its main focus was on exploring which emerging ICTs can be reasonably expected to become relevant in the next 10 to 15 years, to explore their ethical consequences and propose ways of addressing these. The current abstract gives a brief review of the approach and findings of the project and then concentrates on the way ethical issues are currently addressed in technical research in the EU, namely by ethics review. The abstract argues that this approach will be incapable of dealing with a significant number of ethical issues identified by ETICA and it will discuss other ways of doing so. The rest of the abstract develops this argument in some more depth.

In order to assess whether processes of ethics governance will be fit for purpose, the first task is to come to a sound understanding of which technologies are likely to emerge. The methodology employed to identify emerging ICTs was a structured discourse analysis of documents containing visions of future technologies. Two types of documents were analysed: 1) high level governmental and international policy and funding documents and 2) documents by research institutions.

The grid of analysis used to explore these documents is shown in the following figure:
stahl_fig1
Data analysis found more than 100 technologies, 70 application examples and 40 artefacts . These were synthesised into the following list of emerging ICTs:

  • Affective Computing
  • Ambient Intelligence
  • Artificial Intelligence
  • Bioelectronics
  • Cloud Computing
  • Future Internet
  • Human-machine symbiosis
  • Neuroelectronics
  • Quantum Computing
  • Robotics
  • Virtual / Augmented Reality

By “technology” we mean a high-level socio-technical system that has the potential to significantly affect the way humans interact with the world.

Having identified likely emerging ICTs, the next task was to explore which ethical issues these are likely to raise. In order to identify likely ethical issues of emerging ICTs, a literature analysis of the ICT ethics literature from 2003 was undertaken. This started out with a novel bibliometric approach that mapped the proximity of different concepts in the ICT ethics literature. The following figure is a graphical representation of this bibliometric analysis:
stahl_fig2
Using this bibliometric analysis as a starting point, a comprehensive analysis of the ICT ethics literature was undertaken for each technology.

The following mind map represents the headings of the ethical issues identified for the different technologies:
stahl_fig3
Figure 3: Ethical issues of emerging ICTS

The ethical analysis showed that there are numerous ethical issues that are discussed with regards to the technologies. The number and detail of these ethical issues varies greatly. This variation is caused by the differing levels of detail and length of time of discussion of the technologies. Several recurring issues arise, notably those related to:

• privacy,

• data protection,

• intellectual property,

• security.

In addition to these, there were numerous ethical issues that are less obvious and currently not regulated. These include:

• autonomy, freedom, agency,

• possibility of persuasion or coercion,

• responsibility, liability,

• the possibility of machine ethics

• access, digital divides

• power issues

• consequences of technology for our view of humans

• conceptual issues (e.g. notions of emotions, intelligence),

• link between and integration of ethics into law,

• culturally different perceptions of ethics.

This non-comprehensive list shows that there are numerous ethical issues we can expect to arise.

In order to motivate policy development, the relevance and severity of these issues were evaluated. Evaluation of the emerging ICTs and their ethical issues was done from four different perspectives:

• Law:

The analysis was based on the principles of human dignity, equality and the rule of law. A review of 182 EU legal documents revealed that the legal implications of emerging technologies were not adequately reflected.

• (Institutional) ethics:

The earlier ethical analysis was contrasted by looking at opinions and publications of European and national ethics panels or review bodies. The review furthermore covered the implied normative basis of technology ethics in the EU.

• Gender:

A review of the gender and technology literature showed that in the case of five technologies such gender implications had already been raised in the literature.

• Technology assessment:

This analysis asked how far developed the ICTs are and what their prospects of realisation are. The expected benefits and possible side effects were discussed as well as the likelihood of controversy arising from the different technologies.

This literature-based analysis was supplemented and validated by an expert evaluation workshop. The evaluation found that several of the technologies are so closely related that they should be treated in conjunction. Building on the criteria of likelihood of coming into existence and raising ethical debate, the following ranking was suggested:

1. Ambient Intelligence

2. Augmented and virtual reality

3. Future Internet

4. Robotics and Artificial Intelligence and Affective computing

5. Neuroelectronics and Bioelectronics and Human-Machine Symbiosis

6. Cloud Computing

7. Quantum Computing

This ranking will allow for the prioritisation of activities and policies.

Ethics is described as an important part of technical research in the EU. The European Union is based on shared values as laid out in the Charter of Fundamental Rights of the European Union and implemented in the Europe 2020 and other strategies and policies. Information and communication technologies (ICTs) are needed to achieve numerous policy objectives.

It is therefore important to ensure that development and use of ICTs lead to consequences that are compatible with European values. ICT research projects funded by the EU 7th Framework Programme have to reflect on ethical issues and how to resolve them. This is currently verified by an ethics checklist. This checklist is filled in by project proposers and evaluated by technical experts during the evaluation of the project. If these experts flag the project up as ethically relevant, then it is reviewed by an ethics review panel.

In order to understand whether this approach is suitable for dealing with the ethical issues, the issues were classified as follows:
stahl_fig4
Figure 4: Top level categories of ethical issues in emerging ICTs.

A more detailed analysis of the last two, social consequences and impact on individuals can be seen in the following figure:
stahl_fig5
Figure 5: Categories of ethical issues related to impact on individuals and social consequences

The colour coding in this figure refers to the question whether existing ethics processes are likely to pick up these issues and deal with them in a satisfactory manner. Green means that these are established issues that the ethics checklist and subsequent review are likely to identify. Issues depicted in yellow are less clear and red issues are unlikely to be addressed by the current approach.

Having thus established that the EU’s current way of dealing with ethical issues is unlikely to be able to satisfactorily deal with all problems and does not measure up to the EU’s rhetoric, the next question is how this can be addressed. The full paper will go through the computer ethics literature and explore whether alternative approaches offer more promising avenues of addressing these issues.

Overall, the paper will contribute to a theoretically sound and practically relevant way of understanding, evaluating and dealing with ethics in emerging technologies.

Eeny, Meeny, Miny, Masquerade! Advergames and Dutch Children; A Controversial Marketing Practice.

AUTHOR
Isolde Sprenkels and Dr. Irma van der Ploeg

ABSTRACT

In a society increasingly inundated with digital technology, children in the Netherlands learn from a very young age how to use new information and communication technologies (ICTs). These technologies offer them ways to play, learn, explore and develop their sense of identity, as well as interact and communicate with adults and peers. Children spend ever more time in front of computer and mobile screens with gaming as one of their favourite activities. One type of game many children enjoy playing are online casual or mini games. These short, ‘free’ and easy to learn games have friendly designs with bright colours and fun tasks to perform, and are developed to entertain, educate or deliver a particular commercial message. This paper focuses on the latter ‘advertisement as game’ that is developed around a particular brand or product and which can be described as an ‘advergame’.

Advergames are used by companies to build brand awareness, prolong contact time, stimulate product purchase and consumption, drive traffic to a brand’s website, generate consumer data and build and expand digital profiles of consumers. Especially when played by children, these advergames can be considered to be problematic and controversial, as they are seen to exploit children by taking advantage of their state of psycho-social development and by integrating unseen technological features. They bring together several issues related to identity, consumption, marketing, profiling and datamining. Using insights from surveillance studies, science and technology studies, (sociological) studies of identity construction in relation to ICTs, and studies on children and consumption, this paper will analyse several advergames targeted to Dutch children. It examines how this new form of marketing communication fits into corporate objectives and why this can be considered controversial with children.

First, advergames will be examined against a discourse that suggest that it is immoral to economically exploit children; that children are considered vulnerable and it is inappropriate to take advantage of this vulnerability by using sophisticated marketing strategies on them. As children’s cognitive skills are not yet fully developed and they have little life experience, their ability to interpret and assess commercial messages is limited. This makes persuasive strategies unethical as children are still in the process of distinguish messages and unable to make choices that would protect themselves from certain forms of marketing manipulation (Moore 2004; see also Buijzen and Valkenburg 2003).Research has shown that children find it difficult to distinguish between advertising and editorial content in online environments (Nielsen 2002; Mijn Kind Online 2008). There is also an increasing lack of parental supervision in children’s use of the internet (Qrius 2007). This implies that many children are on their own when it comes to identifying commercial content online and developing digital information skills. Codes of conduct such as the Dutch Advertising Code prescribes that the distinction between advertising and editorial content should always be made recognizable. However, when it comes to advergames, this distinction is not made explicit in any way, making it a very difficult task for children to discriminate between an advertisement and entertainment in these ‘seamless environments’ (Moore 2004).

Arguably, this is part of a marketing strategy. Eliminating the recognition or identification of the commercial message and marketer practitioners’ intentions and tactics fits the strategy of ‘kidsmarketing’ to tailor messages, design products, packages, websites and advertisements in a way that appeals to childrens’ ‘wants and needs’, and are identifiable to them, with ‘play and fun’ at its core (Cook 2010). Advergames appear to be the ultimate form of this ‘play and fun’ approach; a ‘masquerade’, where marketer practitioners hide behind a screen full of play and fun, allowing them to reach their own commercial goals in the meantime. More specifically, while advergames may be seen as an opportunity to play something fun for free, children remain unaware of the commercial intent and manipulation behind the (adver)game that can be seen to mediate and even transform their play, their sense of self and their understanding of the world around them. Not only they are offered what they ‘want and need’ following the viewpoint of the marketer practitioner, what they ‘want and need’ appears to be produced by this very same strategy.

Second, in order to reach corporate goals such as building brand awareness, stimulating consumption, and generating consumer data, certain features are designed into advergames and will be taken into account. A study on children and advergames shows that many of these advergames include features to encourage children in repeat play and product purchase by offering such things as multiple game levels, public displays of high scores and game tips within product packages (Moore 2006). Another study indicated that there is a relationship between the capacity of the advergame to induce a state of flow, a mental state of subjective absorption within an activity, and a change in the buying behaviour of (in this specific case adult) players (Gurau 2008). Advergame research also shows how some of these games include product related polls or quizzes, offering valuable information for market research on children’s habits and preferences (Moore 2006; Grimes 2008). They may also encourage players to register and share their gaming experience with friends or family, collecting personal identifiable information (Gurau 2008). Combined with an analysis of in-game-behaviour and activities, marketers are able to construct detailed consumer profiles, based on the aggregation of these behavioural and demographic data (Grimes 2008; Chung & Grimes 2005). Through this, advergames can be described as ‘electronic surveillance devices’, as they enable a new form of tracking children’s activities. In addition, studies on online communities for children and advertising discuss marketers using immersive advertising campaigns such as advergames, encouraging children to play with particular products, enabling them at a later point in time to identify the brand (Grimes & Shade 2005), and to create a ‘personal relationship’ with the product (Steeves 2006). They teach children to trust brands, consider them their friends, not only recommending products, but becoming ‘role models for the child to emulate, in effect embedding the product right into a child’s identity’ (Steeves 2006).

REFERENCES

Chung, G. & Grimes, S. (2005) ‘Data Mining the Kids: Surveillance and Market Research Strategies in Children’s Online Games’, Canadian Journal of Communication, vol. 30, no.4, pp. 527-548.