Skip to main content

Abstract

Ubiquitous applications are complex systems, and need to be evaluated with respect to their social compatibility in an encompassing and interdisciplinary approach. Interdisciplinary work bears the challenge of maintaining the strengths and specialities of each discipline while yielding consistent results at the same time. Also, the evaluation should be well-matched with other activities in the process of development. The presented system evaluation is designed to fulfill these goals as part of the VENUS Development Method . The system evaluation brings a development circle to a conclusion, and generates consistent results that facilitate decisions for next steps. The evaluation also yields suggestions for possible, further improvements. System evaluation unites four disciplines: usability engineering , trust engineering , legal compatible technology design , and security analysis . This chapter describes the starting points of each discipline, and derives an interdisciplinary approach which encompasses a concerted operating plan as well as contentual interdisciplinary cooperation. The system evaluation provides joint solutions for empirical work, but also leaves room for disciplinary analyses.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Behrenbruch, K., Kniewel, R., Hoberg, S., Schmidt, L.: Evaluationsmethoden im Kontext iterativer Gestaltungsmodelle für adaptive und auf Kooperation ausgerichtete Anwendungen. In: Mensch & Computer 2010: Workshop Evaluation Adaptiver Systeme (EASYS), Vortrag, Duisburg (2010)

    Google Scholar 

  2. Garfield, M.J.: Acceptance of ubiquitous computing. Inf. Syst. Manag. 22(4), 24–31 (2005)

    Article  Google Scholar 

  3. Schmidt, L., Leimeister, J.M., Behrenbruch, K.: Methoden-Evolution für die Entwicklung ubiquitärer Anwendungen. In: Schmid, S., Elepfandt, M., Adenauer, J., Lichtenstein, A. (eds.) Reflexionen und Visionen der Mensch-Maschine-Interaktion - Aus der Vergangenheit lernen, Zukunft gestalten: 9. Berliner Werkstatt Mensch-Maschine-Systeme (Berlin 2011), pp. 186–187. VDI-Verlag, Düsseldorf (2011)

    Google Scholar 

  4. Behrenbruch, K., Jandt, S., Schmidt, L., Roßnagel, A.: Normative Anforderungsanalyse für ein RFID-basiertes Assistenzsystem für Arbeitsgruppen. In: Gesellschaft für Arbeitswissenschaft e. V (ed.) Gestaltung nachhaltiger Arbeitssysteme - Wege zur gesunden, effizienten und sicheren Arbeit: 58. Kongress der Gesellschaft für Arbeitswissenschaft (Kassel 2012), pp. 473–476. GfA-Press, Dortmund (2012)

    Google Scholar 

  5. Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003). doi:10.2307/30036540

    Google Scholar 

  6. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989). doi:10.2307/249008

    Article  Google Scholar 

  7. Schmidtke, H.: Vom Sinn und Unsinn der Messung psychischer Belastung und Beanspruchung. Z. ARB. WISS. 56, 4–9 (2002)

    Google Scholar 

  8. Behrenbruch, K., Schmidt, L.: Gebrauchstauglichkeit im Labor objektiv evaluieren. In: Dittrich, E., Doria, L., Gross, A., Günzler, T., Smieszek, H. (eds.) 10. Berliner Werkstatt Mensch-Maschine-Systeme, pp. 118–126. Berlin (2013)

    Google Scholar 

  9. Schmidt-Atzert, L.: Lehrbuch der Emotionspsychologie. Kohlhammer, Stuttgart (1996)

    Google Scholar 

  10. Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 51–90 (2003)

    Google Scholar 

  11. Wang, W., Benbasat, I.: Trust in and adoption of online recommendation agents. J. Assoc. Inf. Syst. 6(3), 72–101 (2005)

    Google Scholar 

  12. Söllner, M., Hoffmann, A., Hoffmann, H., Leimeister, J.M.: Vertrauensunterstützung für sozio-technische ubiquitäre Systeme. Zeitschrift für Betriebswirtschaft (Suppl. 4), 109–140 (2012)

    Google Scholar 

  13. Allen, D.K., Colligan, D., Finnie, A., Kern, T.: Trust, power and interorganizational information systems: the case of the electronic trading community TransLease. Inf. Syst. J. 10(1), 21–40 (2000)

    Article  Google Scholar 

  14. Dimoka, A.: What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Q. 34(2), 373–396 (2010)

    Google Scholar 

  15. Pordesch, U., Roßnagel, A., Schneider, M.: Erprobung sicherheits- und datenschutzrelevanter Informationstechniken mit Simulationsstudien. DuD, 491–497 (1993)

    Google Scholar 

  16. Roßnagel, A., Sarbinowski, H.: Simulationsstudien zur Gestaltung von Telekooperationstechnik: Wir brauch(t)en eine neue Methode. Der GMD-Spiegel 23(2), 30–34 (1993)

    Google Scholar 

  17. Roßnagel, A., Haux, R., Herzog, W.: Mobile und sichere Kommunikation im Gesundheitswesen. DuD-Fachbeiträge. Vieweg, Braunschweig (1999)

    Google Scholar 

  18. Paulus, S.: Basiswissen Sichere Software. Dpunkt. Verlag, Heidelberg (2011)

    Google Scholar 

  19. Behrenbruch, K., Atzmüller, M., Evers, C., Schmidt, L., Stumme, G., Geihs, K.: A personality based design approach using subgroup discovery. In: Winckler, M., Forbrig, P., Bernhaupt, R. (eds.) 4th International Conference on Human-Centered Software Engineering (Toulouse 2012), pp. 259–266. Springer, Berlin (2012)

    Google Scholar 

  20. Söllner, M., Hoffmann, A., Hoffmann, H., Leimeister, J.: Understanding the formation of trust in IT artifacts. In: Proceedings of the International Conference on Information Systems (ICIS) 2012

    Google Scholar 

  21. Podsakoff, P.M., MacKenzie, S.B., Jeong-Yeon, L., Podsakoff, N.P.: Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879 (2003)

    Article  Google Scholar 

  22. Sharma, R., Yetton, P., Crawford, J.: Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research. MIS Q. 33(3), 473 (2009)

    Google Scholar 

  23. Söllner, M., Behrenbruch, K., Hoffmann, H., Leimeister, J.M.: Vertrauenswürdige Gestaltung von ubiquitären Systemen – Potentiale des Einsatzes von Methoden des NeuroIS. In: Dittrich, E., Doria, L., Gross, A., Günzler, T., Smieszek, H. (eds.) 10. Berliner Werkstatt Mensch-Maschine-Systeme. Berlin (2013)

    Google Scholar 

  24. Kieselmann, O., Kopal, N., Wacker, A.: Interdisziplinäre Sicherheitsanalyse. In: Dittrich, E., Doria, L., Gross, A., Günzler, T., Smieszek, H. (eds.) 10. Berliner Werkstatt Mensch-Maschine-Systeme, pp. 136–144. Berlin (2013)

    Google Scholar 

  25. Kniewel, R., Schmidt, L.: Das Design ubiquitärer Systeme am Beispiel von MyGroup. In: Schmid, S., Elepfandt, M., Adenauer, J., Lichtenstein, A. (eds.) Reflexionen und Visionen der Mensch-Maschine-Interaktion - Aus der Vergangenheit lernen, Zukunft gestalten: 9. Berliner Werkstatt Mensch-Maschine-Systeme (Berlin 2011), pp. 609–614. VDI-Verlag, Düsseldorf (2011)

    Google Scholar 

  26. Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering: Design Principles and Practical Applications. Wiley, Hoboken (2012)

    Google Scholar 

  27. Eckert, C.: IT-Sicherheit: Konzepte, Verfahren, Protokolle. Oldenbourg, München (2012)

    Book  Google Scholar 

  28. Gregor, S.: The nature of theory in information systems. MIS Q. 30(3), 611–642 (2006)

    Google Scholar 

  29. Tomico, O., Mizutani, N., Levy, P., Takahiro, Y., Cho, Y., Yamanaka, T.: Kansei physiological measurements and constructivist psychological explorations for approaching user subjective experience during and after product usage. In: Proceedings of the DESIGN 2008, 10th International Design Conference, pp. 529–536

    Google Scholar 

  30. Baxter, G., Sommerville, I.: Socio-technical systems: from design methods to systems engineering. Interact. Comput. 23(1), 4–17 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ludger Schmidt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Behrenbruch, K., Kieselmann, O., Schuldt, M., Söllner, M., Schmidt, L. (2014). System Evaluation . In: David, K., et al. Socio-technical Design of Ubiquitous Computing Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-05044-7_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05044-7_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05043-0

  • Online ISBN: 978-3-319-05044-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics