Abstract
Ubiquitous applications are complex systems, and need to be evaluated with respect to their social compatibility in an encompassing and interdisciplinary approach. Interdisciplinary work bears the challenge of maintaining the strengths and specialities of each discipline while yielding consistent results at the same time. Also, the evaluation should be well-matched with other activities in the process of development. The presented system evaluation is designed to fulfill these goals as part of the VENUS Development Method . The system evaluation brings a development circle to a conclusion, and generates consistent results that facilitate decisions for next steps. The evaluation also yields suggestions for possible, further improvements. System evaluation unites four disciplines: usability engineering , trust engineering , legal compatible technology design , and security analysis . This chapter describes the starting points of each discipline, and derives an interdisciplinary approach which encompasses a concerted operating plan as well as contentual interdisciplinary cooperation. The system evaluation provides joint solutions for empirical work, but also leaves room for disciplinary analyses.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Behrenbruch, K., Kniewel, R., Hoberg, S., Schmidt, L.: Evaluationsmethoden im Kontext iterativer Gestaltungsmodelle für adaptive und auf Kooperation ausgerichtete Anwendungen. In: Mensch & Computer 2010: Workshop Evaluation Adaptiver Systeme (EASYS), Vortrag, Duisburg (2010)
Garfield, M.J.: Acceptance of ubiquitous computing. Inf. Syst. Manag. 22(4), 24–31 (2005)
Schmidt, L., Leimeister, J.M., Behrenbruch, K.: Methoden-Evolution für die Entwicklung ubiquitärer Anwendungen. In: Schmid, S., Elepfandt, M., Adenauer, J., Lichtenstein, A. (eds.) Reflexionen und Visionen der Mensch-Maschine-Interaktion - Aus der Vergangenheit lernen, Zukunft gestalten: 9. Berliner Werkstatt Mensch-Maschine-Systeme (Berlin 2011), pp. 186–187. VDI-Verlag, Düsseldorf (2011)
Behrenbruch, K., Jandt, S., Schmidt, L., Roßnagel, A.: Normative Anforderungsanalyse für ein RFID-basiertes Assistenzsystem für Arbeitsgruppen. In: Gesellschaft für Arbeitswissenschaft e. V (ed.) Gestaltung nachhaltiger Arbeitssysteme - Wege zur gesunden, effizienten und sicheren Arbeit: 58. Kongress der Gesellschaft für Arbeitswissenschaft (Kassel 2012), pp. 473–476. GfA-Press, Dortmund (2012)
Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27(3), 425–478 (2003). doi:10.2307/30036540
Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319–340 (1989). doi:10.2307/249008
Schmidtke, H.: Vom Sinn und Unsinn der Messung psychischer Belastung und Beanspruchung. Z. ARB. WISS. 56, 4–9 (2002)
Behrenbruch, K., Schmidt, L.: Gebrauchstauglichkeit im Labor objektiv evaluieren. In: Dittrich, E., Doria, L., Gross, A., Günzler, T., Smieszek, H. (eds.) 10. Berliner Werkstatt Mensch-Maschine-Systeme, pp. 118–126. Berlin (2013)
Schmidt-Atzert, L.: Lehrbuch der Emotionspsychologie. Kohlhammer, Stuttgart (1996)
Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 51–90 (2003)
Wang, W., Benbasat, I.: Trust in and adoption of online recommendation agents. J. Assoc. Inf. Syst. 6(3), 72–101 (2005)
Söllner, M., Hoffmann, A., Hoffmann, H., Leimeister, J.M.: Vertrauensunterstützung für sozio-technische ubiquitäre Systeme. Zeitschrift für Betriebswirtschaft (Suppl. 4), 109–140 (2012)
Allen, D.K., Colligan, D., Finnie, A., Kern, T.: Trust, power and interorganizational information systems: the case of the electronic trading community TransLease. Inf. Syst. J. 10(1), 21–40 (2000)
Dimoka, A.: What does the brain tell us about trust and distrust? Evidence from a functional neuroimaging study. MIS Q. 34(2), 373–396 (2010)
Pordesch, U., Roßnagel, A., Schneider, M.: Erprobung sicherheits- und datenschutzrelevanter Informationstechniken mit Simulationsstudien. DuD, 491–497 (1993)
Roßnagel, A., Sarbinowski, H.: Simulationsstudien zur Gestaltung von Telekooperationstechnik: Wir brauch(t)en eine neue Methode. Der GMD-Spiegel 23(2), 30–34 (1993)
Roßnagel, A., Haux, R., Herzog, W.: Mobile und sichere Kommunikation im Gesundheitswesen. DuD-Fachbeiträge. Vieweg, Braunschweig (1999)
Paulus, S.: Basiswissen Sichere Software. Dpunkt. Verlag, Heidelberg (2011)
Behrenbruch, K., Atzmüller, M., Evers, C., Schmidt, L., Stumme, G., Geihs, K.: A personality based design approach using subgroup discovery. In: Winckler, M., Forbrig, P., Bernhaupt, R. (eds.) 4th International Conference on Human-Centered Software Engineering (Toulouse 2012), pp. 259–266. Springer, Berlin (2012)
Söllner, M., Hoffmann, A., Hoffmann, H., Leimeister, J.: Understanding the formation of trust in IT artifacts. In: Proceedings of the International Conference on Information Systems (ICIS) 2012
Podsakoff, P.M., MacKenzie, S.B., Jeong-Yeon, L., Podsakoff, N.P.: Common method biases in behavioral research: a critical review of the literature and recommended remedies. J. Appl. Psychol. 88(5), 879 (2003)
Sharma, R., Yetton, P., Crawford, J.: Estimating the effect of common method variance: the method-method pair technique with an illustration from TAM research. MIS Q. 33(3), 473 (2009)
Söllner, M., Behrenbruch, K., Hoffmann, H., Leimeister, J.M.: Vertrauenswürdige Gestaltung von ubiquitären Systemen – Potentiale des Einsatzes von Methoden des NeuroIS. In: Dittrich, E., Doria, L., Gross, A., Günzler, T., Smieszek, H. (eds.) 10. Berliner Werkstatt Mensch-Maschine-Systeme. Berlin (2013)
Kieselmann, O., Kopal, N., Wacker, A.: Interdisziplinäre Sicherheitsanalyse. In: Dittrich, E., Doria, L., Gross, A., Günzler, T., Smieszek, H. (eds.) 10. Berliner Werkstatt Mensch-Maschine-Systeme, pp. 136–144. Berlin (2013)
Kniewel, R., Schmidt, L.: Das Design ubiquitärer Systeme am Beispiel von MyGroup. In: Schmid, S., Elepfandt, M., Adenauer, J., Lichtenstein, A. (eds.) Reflexionen und Visionen der Mensch-Maschine-Interaktion - Aus der Vergangenheit lernen, Zukunft gestalten: 9. Berliner Werkstatt Mensch-Maschine-Systeme (Berlin 2011), pp. 609–614. VDI-Verlag, Düsseldorf (2011)
Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering: Design Principles and Practical Applications. Wiley, Hoboken (2012)
Eckert, C.: IT-Sicherheit: Konzepte, Verfahren, Protokolle. Oldenbourg, München (2012)
Gregor, S.: The nature of theory in information systems. MIS Q. 30(3), 611–642 (2006)
Tomico, O., Mizutani, N., Levy, P., Takahiro, Y., Cho, Y., Yamanaka, T.: Kansei physiological measurements and constructivist psychological explorations for approaching user subjective experience during and after product usage. In: Proceedings of the DESIGN 2008, 10th International Design Conference, pp. 529–536
Baxter, G., Sommerville, I.: Socio-technical systems: from design methods to systems engineering. Interact. Comput. 23(1), 4–17 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Behrenbruch, K., Kieselmann, O., Schuldt, M., Söllner, M., Schmidt, L. (2014). System Evaluation . In: David, K., et al. Socio-technical Design of Ubiquitous Computing Systems. Springer, Cham. https://doi.org/10.1007/978-3-319-05044-7_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-05044-7_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05043-0
Online ISBN: 978-3-319-05044-7
eBook Packages: Computer ScienceComputer Science (R0)