Item

Involvement Matters: The Proper Involvement of Users and Behavioural Theories in the Design of a Medical Teleconferencing Application

Loading...
Thumbnail Image

Fulltext URI

Document type

Additional Information

Date

Journal Title

Journal ISSN

Volume Title

Publisher

Association for Computing Machinery

Abstract

WoundLog is a mobile application that enables district nurses to consult dermatologists, while being in the home situation of the patient. Next to communication tools for teleconferencing and multimedia messaging, it also provides a wound logbook service, and presence, location and availability information of various healthcare professionals. In this paper, we describe the applied user-centred design approach, and a conducted user experiment. The results of the experiment reveal that even district nurses with modest (or no) computing experiences can work adequately with WoundLog. Moreover, they expect that using WoundLog will increase the quality and efficiency of wound care.

Description

Biemans, Margit; Swaak, Janine; Hettinga, Marike; Schuurman, Jan Gerrit (2005): Involvement Matters: The Proper Involvement of Users and Behavioural Theories in the Design of a Medical Teleconferencing Application. Proceedings of the 2005 ACM International Conference on Supporting Group Work. DOI: 10.1145/1099203.1099255. New York, NY, USA: Association for Computing Machinery. pp. 304–312. Sanibel Island, Florida, USA

Keywords

WoundLog, teleconferencing, mobile application, user-centred design, healthcare, user experiment

Citation

URI

Collections

Endorsement

Review

Supplemented By

Referenced By


Number of citations to item: 10

  • Syed Moudud-Ul-Huq, Rebeka Sultana Swarna, Mahmuda Sultana (2021): Elderly and middle-aged intention to use m-health services: an empirical evidence from a developing country, In: Journal of Enabling Technologies 1(15), doi:10.1108/jet-04-2020-0018
  • Wei Wei Goh, Siew Fun Tang, Chee Leong Lim (2016): Assessing Factors Affecting Students’ Acceptance and Usage of X-Space Based on UTAUT2 Model, In: Assessment for Learning Within and Beyond the Classroom, doi:10.1007/978-981-10-0908-2_6
  • Rowena Luk, Melissa Ho, Paul M. Aoki (2008): Asynchronous remote medical consultation for Ghana, In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, doi:10.1145/1357054.1357173
  • Nahar Albudoor, Elizabeth D. Peña (2021): Factors influencing US speech and language therapists’ use of technology for clinical practice, In: International Journal of Language & Communication Disorders 3(56), doi:10.1111/1460-6984.12614
  • Babita Gupta, Subhasish Dasgupta, Atul Gupta (2008): Adoption of ICT in a government organization in a developing country: An empirical study, In: The Journal of Strategic Information Systems 2(17), doi:10.1016/j.jsis.2007.12.004
  • Siti Fatimah Abd Rahman, Melor Md Yunus, Harwati Hashim (2021): Applying UTAUT in Predicting ESL Lecturers Intention to Use Flipped Learning, In: Sustainability 15(13), doi:10.3390/su13158571
  • Manteaw Seth Awuku, Folitse Benjamin Yao, Swanzy Felix Kweku, Mahama Samuel, Adjeley Tracy Akosua (2023): The dynamics of mobile phone usage among small-scale oil palm processors: Evidence from the Eastern Region, Ghana, In: Cogent Social Sciences 1(9), doi:10.1080/23311886.2023.2222570
  • Sandra M.C. Loureiro, Luisa Cavallero, Francisco Javier Miranda (2018): Fashion brands on retail websites: Customer performance expectancy and e-word-of-mouth, In: Journal of Retailing and Consumer Services, doi:10.1016/j.jretconser.2017.12.005
  • Lucy Mulugo, Florence Birungi Kyazze, Paul Kibwika, Enoch Kikulwe, Aman Bonaventure Omondi, Susan Ajambo (2019): Unravelling technology-acceptance factors influencing farmer use of banana tissue culture planting materials in Central Uganda, In: African Journal of Science, Technology, Innovation and Development 4(12), doi:10.1080/20421338.2019.1634900
  • Michael D Williams, Nripendra P Rana, Yogesh K Dwivedi (2015): The unified theory of acceptance and use of technology (UTAUT): a literature review, In: Journal of Enterprise Information Management 3(28), doi:10.1108/jeim-09-2014-0088
Please note: Providing information about citations is only possible thanks to to the open metadata APIs provided by crossref.org and opencitations.net. These lists may be incomplete due to unavailable citation data.source: opencitations.net, crossref.org