Tag: e-Health

NordiCHI Workshop – Call for Participation

Design Methods in Connected Health

We are excited to invite you to our interactive workshop, which will explore and advance design methods for Connected Health applications.

Full day on 13 October 2024, On-site at Ekonomikum, Uppsala University

The Design Methods in Connected Health workshop aims to bring together researchers, practitioners, and designers in eHealth to explore innovative design approaches and philosophies that can enhance the user experience, accessibility, and overall effectiveness of electronic health technologies. Connected health is a multifaceted concept encompassing technology to improve healthcare delivery and patient outcomes. Design methods are processes and tools for creating effective user experiences in technology development. 

This workshop will explore diverse design approaches from various fields, including Human-Computer Interaction (HCI), Information Systems (IS), Health Informatics, and Healthcare. 

It aims to foster the exchange of ideas and methodologies across these domains. The aims and objectives include 

  • to explore the diverse design methods in the context of eHealth applications, 
  • to discuss the impact of design on user engagement, and overall health outcomes, 
  • to share best practices and case studies of eHealth design implementations, 
  • to foster collaboration between researchers and practitioners for future advancements in eHealth design, and 
  • to collaborate on drafting a joint paper for a scientific journal, drawing upon the collective insights gained. 

The workshop will explore design methods, analyzing their strengths and weaknesses to determine the most suitable approach for different situations. Through a mix of presentations, group discussions, and collaborative activities like a gallery walk (an activity where participants rotate through stations to evaluate and discuss ideas), participants will engage in a dynamic learning experience. The workshop culminates in a collaborative effort to draft a joint paper for a scientific journal, drawing upon the collective insights gained.

The workshop will be in person and will feature an introduction to various design practices used in the eHealth field using a fishbowl discussion method. This will be followed by discussions on these philosophies using an interactive method called Gallery Walk, which is an activity where participants rotate through stations to evaluate and discuss ideas. This is followed by a wrap-up session. 

Who Should Attend?

  •    Researchers in design and Connected Health.
  •    UX designers specializing in Connected Health projects.
  •    Healthcare professionals interested in developing Connected Health solutions.

What to Expect:

  • Interactive Sessions: Participate in engaging discussions and a “gallery walk” to critically assess and compare different design methods.
  • Collaborative Paper: Collaborate with other attendees to co-author a paper intended for publication in a scientific journal, leveraging the collective expertise and insights acquired during the workshop.
  • Sharpen Your Skills: Improve your understanding of Connected Health design methods and acquire actionable knowledge to create user-centric Connected Health solutions.

Submission

The submission should be a maximum of 3 pages long.

  • Format: Please use the old SIGCHI extended abstract format.
  • Title and Author Information: Clear and descriptive title of the submission. Name(s), affiliation(s), and email address(es).
  • Abstract: 100-150 words. A brief overview of the design method, its context, and the key takeaways.
  • Introduction: Provide background information and relevance of the design method to Connected Health. Outline the specific areas or challenges or issues the method addresses in Connected Health.
  • Design Method Description: Describe the design method in detail. Outline the steps, tools, and techniques involved. Mention any theoretical or conceptual frameworks underpinning the method.
  • Application and Context: Describe a specific use case or example where the design method was applied. Provide context about how the method was implemented, including settings, participants, and any technological tools used. Discuss any challenges encountered during the application of the method.
  • Outcomes and Lessons Learned: Summarize the outcomes or results achieved through the application of the design method. Share key insights or lessons learned from the experience. Discuss how the design method impacted user engagement, accessibility, or health outcomes.
  • Discussion: Analyze the strengths and weaknesses of the design method. If applicable, compare with other design methods used in similar contexts. Suggest potential improvements or future applications of the method in Connected Health.
  • Conclusion: Recap the key points of the submission. Propose next steps for research or practice in Connected Health design.
  • Appendices (Optional): Any supplementary material, such as diagrams, detailed tables, or screenshots of the design method in action.

Important Dates:

  • Deadline for Abstract Submission – 10 August 2024
  • Notification of Acceptance – 20 August 2024
  • Workshop Date – 13 October 2024

Email your submissions to: Shweta Premanandan (shweta.premanandan@im.uu.se), Awais Ahmad (awais.ahmad@it.uu.se)

Workshop Organizers:

  • Åsa Cajander, Department of Information Technology, Uppsala University (asa.cajander@it.uu.se)
  • Sofia Ouhbi, Department of Information Technology, Uppsala University (sofia.ouhbi@it.uu.se)
  • Shweta Premanandan, Department of Informatics and Media, Uppsala University (shweta.premanandan@im.uu.se)
  • Awais Ahmad, Department of Information Technology, Uppsala University (awais.ahmad@it.uu.se)

How vulnerable are we?

This post was actually started in late 2023, when the Swedish Church had become the victim of a cyberattack with ransomware, which took place November 22. The church organization at that time decided that it will not pay the ransom (in order not to make this a successful attack) but will instead recover the systems manually over time. However, this recovery takes a lot of time, and as long as the systems are not completely recovered, it is not possible to make any bookings for baptizing and weddings. In case of a funeral, it has still been possible to make a booking, but, the data had to be taken down using pen and paper (i.e., post-it notes).

We are very vulnerable if we only depend on our digital systems.

Head of information services at the Swedish church

In Sweden, the church has been separated from the government, but it is also still responsible for a number of national and regional bookkeeping services, like funerals. Also, a large number of people will still use the church services for baptizing and weddings, where in the latter case it also fulfills its role as an official administrative unit, in parallel with the weddings that are registered by the government. Suffice it to say that the church depends heavily on digital administration for its work. Consequently, some parts of the Swedish society also depends on the same computer systems being intact.

More attacks…

In 2024, there has now been a number of similar events, mostly through the use of ransomware, but also with overloading web servers. The systems affected this time have been in other organizations and governmental institutions. The most famous of them this time is probably the HR management system Primula, which is also used by the defense organizations and industries, among many others (including universities). This time the attacks are suspected to be made Russian hackers, possibly as part of a destabilization campaign as part of the ongoing war in Ukraine.

Again, the main issue is not that there have been attacks that have been successful, but rather that the backup systems are insufficient or, in most cases seemingly missing. Hopefully the systems will soon be up and running again, but if there is an attack on systems that are more central to the functions in society, then the problem is not only in small organizations, but may affect larger systems including systems for money transfers. Recently shops have been forced to close, when there have been longer problems with the money services.

In this context it is also important to point to the problem with paying. The Swedish Civil Contingencies Agency (MSB), which is responsible for helping society prepare for major accidents, crises and the consequences of war, recently sent out a message to the public, advising them to always have at list 2000 SEK in cash at home. The question is whether the society is prepared to revert to using cash money for the transactions. A large number of shops and services no longer accept cash as payment.

What now

When interviewed, the head of the information service for the Swedish church said that one lesson they have learned from this event is that they have to be less dependent on computer services than before. He did not specify how in any more detailed way, but the message was more or less clear: “We are very vulnerable if we only depend on our digital systems”. His conclusion is neither new, nor especially controversial. When our computer systems or the Internet fails, we are more or less helpless in many places. However, most of the time, the threats are envisioned in terms of disk crashes, physical damage or other similar factors. The increased risk of cyber attacks is not mentioned to the public to any larger extent.

We depend on our IT-support units to handle any possible interrupt as fast as possible, but the question is whether this is enough. Are there backups of the data? Are there backup systems that are ready to be launched in case the old system is failing? Are there backup non-computer based procedures that can replace the computer systems if there is a longer breakdown of the computer systems? Even if it is costly to maintain these backup systems/procedures, it is quite likely that we will need to add a higher level of security in order to not end up with a social disaster, where a large part of the society is essentially incapacitated.

What are the consequences?

We can just imagine what would happen if, as mentioned above, the central systems for bank transfers fails badly or gets “cyber-kidnapped”. Credit cards will not work, neither will mobile money transfers or other electronic payment options. There will be no way to pay our bills, and we may not even get the bills at first hand. Probably even the ATM machines will cease to work, so that there is no possibility to get cash either. Imagine now that this failure will last for days and weeks. What are the consequences?

But we don’t have to look at this national disaster scenario. It is enough to think about what will happen if the computer systems in universities or other large organizations are attacked by cyber-criminals. Not to mention the effects on critical health care, where minutes and seconds can count. Do we have any possibilities to continue the work, reaching journals or other important documents, schedule meetings, planning operations and other important events? Are we really ready to start working on paper again, if necessary? I fear not!

With the current situation in the world, with wars and possible also challenges from deteriorating environmental factors, a lack of emergency plans for our digital systems may not only be causing serious problems, but may really turn out to be disastrous in case of any larger international crisis. Looking at what happens around the world currently, it is easy to see that the risk for cyber-attacks in international crisis situations has increased to a high degree. In many cases the (possible) plans on how to proceed are not known to people who work in the organizations. Is your work protected? Do you know what to do if the systems fail?

Unfortunately, we cannot continue to hope that “this will never happen”. Even if the most extreme of the possible scenarios may not happen, we are still very vulnerable to attacks, e.g., with ransomware or “Denial of service” from “normal cyber-criminals” and this can be just as bad on the local scene, when a whole organization is brought to a halt due to a computer system failing badly. Therefore we need to be acting proactively in order to not be stuck if/when the systems fail. Because, it is quite certain that they will fail at some point of time.

And how will YOUR organization handle that kind of situation? Do YOU know?

Empowering Unsung Heroes: Carer-eSupport – An Online Intervention for Caregivers of Head and Neck Cancer

Cancer is a devastating disease that affects not only the patient but also their informal caregivers, who play a crucial role in caring for them, especially in the home environment. The role of a caregiver can be physically and emotionally exhausting, leading to stress, anxiety, depression, and post-traumatic stress disorder. With limited resources and information available to informal caregivers, the situation becomes even more challenging. In this context, eHealth applications might help caregivers to cope with their caregiving responsibilities and enhance their well-being.

Carer-eSupport project

The Carer-eSupport project is a commendable effort to provide support to informal caregivers of head and neck cancer patients. I am part of the Carer-eSupport project as a PhD student. The project’s overall goal is to prepare caregivers for their caregiving role and decrease their caregiving burden who often struggle to balance their caregiving responsibilities with their personal and professional lives.

In this project, we first gathered user needs and preferences from caregivers and healthcare professionals to ensure that the intervention is user-friendly, effective and acceptable. Based on these findings, the first version of Carer-eSupport is developed, followed by feasibility studies to evaluate its effectiveness and acceptability. The results from these studies will inform the design of the second version of Carer-eSupport. Thereafter, it will be tested through a randomized controlled trial, which will provide robust evidence of the intervention’s effectiveness. The project’s study protocol, “Internet-based support for informal caregivers to individuals with head and neck cancer (Carer-eSupport): a study protocol for the development and feasibility testing of a complex online intervention,” provides more detailed information. By prioritizing the needs and well-being of caregivers, the Carer-eSupport project has the potential to make a significant impact on the lives of informal caregivers of head and neck cancer patients.

An initial prototype of Carer-eSupport

User-centred Positive Design (UCPD) framework

To support informal caregivers’ subjective well-being, we proposed a User-centred Positive Design (UCPD) framework that combines User-Centred Design (UCD) and Positive Design Framework (PDF) as shown in the figure below. UCD is a systematic approach that considers users and their needs in all steps of design and development. PDF, on the other hand, describes how design can enhance the subjective well-being of users. By focusing on the subjective well-being of users, the UCPD framework aims to create eHealth applications that not only solve the user’s problem but also have a long-lasting and positive impact on their well-being.

User-centred Positive Design Framework

In conclusion, the UCPD framework provides a theoretical framework for designing internet-based support systems that have a positive, holistic impact on users’ well-being. The Carer-eSupport project serves as an excellent example of how the UCPD framework can be applied in designing eHealth applications for informal caregivers of cancer patients. With further research, the UCPD framework has the potential to enhance the subjective well-being of users across various domains of healthcare.

Research Team

Our research team comprises researchers from different disciplines, including human-computer interaction (HCI), software engineering, cancer nursing, and medical research. Following are the team members.

Further readings