Skip to main content

Ring the Alarm - Identification and Evaluation of Users’ Requirements for a V2X-Smartphone App

  • Conference paper
  • First Online:
Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018) (IEA 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 822))

Included in the following conference series:

  • 2114 Accesses

Abstract

The fast developing and intertwining fields of mobility and technology focus human-centered designs more than ever. V2X-technology is one of the major players on that research field, which will influence the people’s behavior in traffic in terms of safety and efficiency. To include all participating members of traffic, four important message features for a V2X-smartphone application are analyzed. Using a two-tiered research approach, we focused on possible information scenarios in traffic, the most important features (type of data, correctness of warning, battery consumption and data recipient) and a practical recommendation for interaction from a users’ perspective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. United Nations (2017) Department of Economic and Social Affairs: Population division: world urbanization prospects, the 2017 revision: highlights

    Google Scholar 

  2. Schmidt T, Philipsen R, Themann P, Ziefle M (2016) Public perception of v2x-technology-evaluation of general advantages, disadvantages and reasons for data sharing with connected vehicles. In: 2016 IEEE intelligent vehicles symposium (IV). IEEE, pp 1344–1349

    Google Scholar 

  3. Statistisches B (2017) Mehr Unfälle, aber weniger Verkehrstote als jemals zuvor (more accidents, but less fatalities). Pressemitteilung 6, Juli 2017, p 230/17

    Google Scholar 

  4. Schmidt T, Philipsen R, Dzafic D, Ziefle M (2017) Watch out! In: International conference on digital human modeling and applications in health, safety, ergonomics and risk management. Springer, pp 365–383

    Google Scholar 

  5. Otte D, Jänsch M, Haasper C (2012) Injury protection and accident causation parameters for vulnerable road users based on german in-depth accident study gidas. Accid Anal Prev 44(1):149–153

    Article  Google Scholar 

  6. Constant A, Lagarde E (2010) Protecting vulnerable road users from injury. PLoS Med 7(3):e1000228

    Article  Google Scholar 

  7. Andreone L, Visintainer F, Wanielik G (2007) Vulnerable road users thoroughly addressed in accident prevention: the watch-over european project. In: 14th world congress on intelligent transport systems

    Google Scholar 

  8. Scholliers J, Bell D, Morris A, García AB (2014) Improving safety and mobility of vulnerable road users through its applications. Transp Res Arena 14–17

    Google Scholar 

  9. Engel S, Katzsch C, David K (2013) Car2pedestrian-communication: protection of vulnerable road users using smartphones. In: Advanced microsystems for automotive applications 2013. Springer, pp 31–41

    Google Scholar 

  10. Liebner M, Klanner F, Stiller C (2013) Active safety for vulnerable road users based on smartphone position data. In: 2013 IEEE intelligent vehicles symposium (IV). IEEE, pp 256–261

    Google Scholar 

  11. Dhondge K, Song S, Choi BY, Park H (2014) Wifihonk: smartphone-based beacon stuffed Wifi car2x-communication system for vulnerable road user safety. In: 2014 IEEE 79th vehicular technology conference (VTC Spring). IEEE, pp 1–5

    Google Scholar 

  12. Wu X, Miucic R, Yang S, Al-Stouhi S, Misener J, Bai S, Chan W (2014) Cars talk to phones: a dsrc based vehicle-pedestrian safety system. In: 2014 IEEE 80th vehicular technology conference (VTC Fall). IEEE, pp 1–7

    Google Scholar 

  13. Anaya JJ, Talavera E, Giménez D, Goméz N, Felipe J, Naranjo JE (2015) Vulnerable road users detection using v2x communications. In: 2015 IEEE 18th international conference on intelligent transportation systems (ITSC). IEEE, pp 107–112

    Google Scholar 

  14. Beier G (2004) Kontrollüberzeugung im Umgang mit Technik: Ein Persönlichkeitsmerkmal mit Relevanz für die Gestaltung technischer Systeme [locus control in a technological context]. Ph.D. thesis, dissertation premium. dissertation.de, Berlin

    Google Scholar 

Download references

Acknowledgements

We would like to thank the research group on mobility at RWTH Aachen University. This research was supported partly by the Excellence Initiative of German State and Federal Government (Project CERM - Center for European Research on Mobility) and partly by the German Ministry of Research and Education (Project I2EASE: reference number 16EMO0142 K). Our gratitude goes also to Manuel Scherberich, Chen Tao, Susanne Gohr, and Imke Haverkämper for their valuable research input.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Teresa Brell .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Brell, T., Philipsen, R., Ziefle, M. (2019). Ring the Alarm - Identification and Evaluation of Users’ Requirements for a V2X-Smartphone App. In: Bagnara, S., Tartaglia, R., Albolino, S., Alexander, T., Fujita, Y. (eds) Proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018). IEA 2018. Advances in Intelligent Systems and Computing, vol 822. Springer, Cham. https://doi.org/10.1007/978-3-319-96077-7_70

Download citation

Publish with us

Policies and ethics