8_sept_T&S

download 8_sept_T&S

of 7

Transcript of 8_sept_T&S

  • 7/23/2019 8_sept_T&S

    1/7

    When are intelligent sensor environments successful?

    Leo Pennings a,1, Thijs Veugen a,b,*, Annemieke de Korte a

    a TNO Information and Communication Technology, Delft, The Netherlandsb Multimedia Signal Processing group of Delft University of Technology, Delft, The Netherlands

    Keywords:Adoption

    Applications

    Intelligent sensor

    Privacy

    Sensors

    Social acceptance

    a b s t r a c t

    The success of an intelligent sensor environment is mainly determined by the extent towhich it is adopted by users. In order to understand how the adoption process works and

    when it is likely to be successful, we developed a general adoption model and applied it to

    the four main categories. Based on four case studies, we developed and tested question-

    naires that contribute as an instrument for evaluating existing sensor environments, or

    during the design phase. It turns out that each specic type of intelligent sensor envi-

    ronment has its own adoption issues.

    2010 Elsevier Ltd. All rights reserved.

    1. Introduction

    In todays society, sensor information is increasingly

    used to support decision-making processes. One example issensors that measure the humidity and stability of dikes for

    water management and to help Dutch engineers foresee

    a possible collapse of the dikes. Another example is the

    mobile phone, to which information about a product of

    interest to a customer can be sent to attract his or her

    attention.

    An environment inwhichsensor information is used and

    processed in a less straightforward manner to support

    human decision making is called an intelligent sensor

    environment. Such an environment usually consists of

    a sensor access network for creatingand transporting sensor

    information; a sensor informationinfrastructurefor storage,

    computation, transformation, and commercial transactionof sensorinformation; and users whoworkin the intelligent

    sensor environment or purchase sensor information.

    In this paper we are especially interested in the users of

    intelligent sensor environments. How do they experience that

    environment? Users have an important say in the success or

    failure of new intelligent sensor environments. This paper

    provides insight into the process of adoptionor rejection. Such

    information is useful for people who are concerned with the

    success of their intelligent sensor environment.

    2. Adoption model

    Before developing a model for the adoption of intelligent

    sensor environments, we studied a number of existing

    models of user acceptance of new technology. The models

    were developed from different perspectives of user accep-

    tance, such as individual aspects of adoption, risk and trust

    perspectives, constructive technology assessment, domes-

    tication, and the innovation diffusion theory. Our general

    model integrates elements from these various models.

    2.1. Theoretical background

    First, we summarize various models of user acceptance

    of technology.

    Individual adoption models d focus on the individual,

    and ask which aspects play a role in the acceptance of

    new technology as seen from the perspective of the

    individual? In 1989, Davis[1]developed the Technology

    Acceptance Model, which has since been extended by

    various researchers. One of the most detailed models is

    * Corresponding author. TNO Information and Communication Tech-

    nology, Delft, The Netherlands. Tel.: 31 15 285 7314; fax: 31 15 285

    7382.

    E-mail address:[email protected](T. Veugen).1 Leo Pennings died on 13 March 2009.

    Contents lists available atScienceDirect

    Technology in Society

    j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / t e c h s o c

    0160-791X/$

    see front matter

    2010 Elsevier Ltd. All rights reserved.doi:10.1016/j.techsoc.2010.07.009

    Technology in Society 32 (2010) 197203

    mailto:[email protected]://www.sciencedirect.com/science/journal/0160791Xhttp://www.elsevier.com/locate/techsochttp://dx.doi.org/10.1016/j.techsoc.2010.07.009http://dx.doi.org/10.1016/j.techsoc.2010.07.009http://dx.doi.org/10.1016/j.techsoc.2010.07.009http://dx.doi.org/10.1016/j.techsoc.2010.07.009http://dx.doi.org/10.1016/j.techsoc.2010.07.009http://dx.doi.org/10.1016/j.techsoc.2010.07.009http://www.elsevier.com/locate/techsochttp://www.sciencedirect.com/science/journal/0160791Xmailto:[email protected]
  • 7/23/2019 8_sept_T&S

    2/7

    Venkateshs Unied Theory of Acceptance and Use of

    Technology[2].

    Risk and trust perspectives d deal with a persons basic

    level of trust, that is, trust in the specic technology at

    hand, and/or trust in the actors involved in the devel-

    opment and supply of the technology. An example of

    these theories is a study by Cho in which risk and trust

    perspectives were related to aspects of individual

    adoption models[3].

    Constructive technology assessment d a theory on the

    methodology for developing new technologies. The idea

    is to test the impact and acceptance of a new technology

    as early as possible in its development, taking into

    account all the actors involved. This includes not only

    developers and end users but also society in general, in

    order to become aware of existing views and opinions

    in society on specic technologies or developments in

    technology[4].

    Domestication d explores how specic groups of

    people (e.g., elderly people) acquire new technologies

    and integrate them into their lives. Various phases of

    domestication have been identied. For our general

    model, we have selected four phases as identied by

    Zhao: imagination (awareness and image building),

    appropriation (acquisition), objectication (use), and

    conversion (integration into ones personal life)[57].

    Innovation Diffusion Theory d a theory developed by

    Rogers [8] that identies a link between individual

    models of adoption on the one hand and domestication

    on the other hand. The theory can be summarized by

    a bell curve, which identies different types of people

    with regard to the adoption of new technologies. Rogers

    identies ve categories of people in the innovation

    diffusion process: innovators (2.5%), early adopters

    (13.5%), early majority (34%), late majority (34%), and

    laggards (16%). Rogers also identied ve phases in the

    adoption process. The category to which a person

    belongs determines how he or she proceeds through

    these phases. The ve phases (although named differ-

    ently) correspond more or less to the phases identied

    in domestication theory: knowledge, persuasion, deci-

    sion, implementation, and conrmation.

    2.2. General model

    The core of the general model for the adoption of intel-

    ligent sensor environments consists of an integration of

    building blocks from different models of user acceptance of

    technology. The building blocks are grouped in four clus-

    ters: Preconditions, Trust, Acceptance, (phases in) Adoption.

    In addition, the model includes context aspects that could

    inuence how individuals or groups of people react to new

    technology applications. We describe the four clusters in

    more detail below, andFig. 1illustrates the model.

    2.2.1. Building blocks for the general model

    Preconditions d This cluster contains a persons general

    characteristics plus the typology of a person in terms of

    his general willingness to innovate (based on Rogers

    typology). A keyelement is the persons experience with

    the technology at hand, or experience with technology

    in general. Another element is the freedom to choose: to

    what extent is the choice to use the technology based on

    free choice, or is the user in a situation that makes it

    difcult for him to reject the technology? This is

    particularly important in work settings (the boss

    dictates the use of the new technology) or in cases

    where the use of the new technology is regulated by law

    or government rules. Finally, people have limited pro-

    cessing capacity, which means that a person has

    temporary saturation levels with regard to his ability to

    change and to accept new technology.

    Trust d This cluster includes elements from the risk and

    trust perspective. People differ in their basic level of

    trust, with some having a higher level of trust than

    others. Here, then, the issue is: how readily will an

    individual be able or willing to trust another person,

    a company, or an organisation? How does the individual

    handle peer pressure, or the inuence of peers on

    a persons opinion-forming. What kind of risks does

    a person associate with a technological application or

    the acquisition and use of this application? Different

    types of risk can be distinguished: possible bad perfor-

    mance by the product, time required to get to know the

    application, high costs involved in the maintenance of

    the product, possible negative psychological effects such

    as social implications or privacy attacks involved with

    the project. Creditability and behaviour of the supplier:

    to what extent do users believe the suppliers good

    intentions and efforts to do what is best for customers?

    Acceptance d This cluster refers to individual adoption

    models. For acceptance it is important to know what the

    users expectations are with regard to the performance

    of the application: to what extent will the application

    enhance an individuals performance? Of equal impor-

    tance is the estimation by the users of how much time

    and effort is needed to become familiar with the new

    application and learn how to use it? Social inuence has

    a considerable effect on acceptance; will a person be

    inuenced in a positive or negative way by his or her

    peers? Facilitating conditions: the extent to which

    a person believes that he or she will have access to the

    right support to use the technological application.

    Adoption d This cluster contains the four phases of the

    domestication model, which have been adjusted

    slightly:

    - Image building: the phase in which the user becomes

    aware of the existence of the new technology and

    formulates opinions about it.

    - Acquisition: the phase in which the user decides to

    buy (or not to buy) the new technology.

    - Use: the phase in which the new application is used

    and in which the user experiments with different

    functions.

    - Integration: the phase in which the new technology is

    incorporated into the persons daily life.

    2.2.2. Building blocks outside the core of the general model

    The general model shows four related aspects that are

    outside the core of our model but still inuence the even-

    tual success or failure of an intelligent sensor environment.

    L. Pennings et al. / Technology in Society 32 (2010) 197203198

  • 7/23/2019 8_sept_T&S

    3/7

    Technical aspects d The technical aspects of intelli-

    gent sensor environments involve the technical

    implementation of the system. The technical aspects

    are important for the success or failure of an intelli-

    gent sensor environment because they relate to scal-

    ability, user friendliness, interoperability with other

    systems, technical security risks, privacy and storage

    of personal information, speed of performance, costs

    of implementation, management and usage, and the

    like.

    Policy and legal aspects d Various policy instruments

    might be applicable to the use and adoption of new

    sensor technologies. On the one hand, specic laws or

    regulation might restrict the use or impact of sensor

    technologies. On the other hand, specic laws or regu-

    lations might stimulate the use of this technology by

    enforcing its use. Policy instruments might also be

    coordination measures aimed at self-regulation or co-

    regulation. In this context, the government might raise

    awareness by providing information on new intelligent

    sensor applications or by formulating guidelines. The

    government might play a specic role in stimulating the

    acceptance and adoption of intelligent sensor applica-

    tions by acting as a launching customer (by aggregation

    of demand or by specic acquisition of new innovative

    technology). Finally, we should not forget that the

    government can decide not to intervene, and let the

    market mechanism do its work.

    Societal and cultural aspects d The future success of

    innovations depends on their institutional context,

    on the interference and interdependency with their

    social cultural environment. This successdor possible

    failuredis difcult to predict and judge because of the

    complexity of its embeddingin the(social) system.Social

    and cultural trends are important drivers of adoption of

    innovation and the possible direction of social change.

    Trends offer a previewdsometimes merely a glimp-

    sedof future needs in society. In recent decades we have

    learned that, in many situations, a technology push

    approach often came with a high risk of commercial

    failure. When following a technology pull approach,

    people are more likely to adopt (and even embrace) the

    technological innovations that meet their needs. This

    requires serious research into peoples needs, or the

    improved organisation of their involvement in the

    innovation process.

    Concerning future innovations, there is not yet a reality

    that can be studied. Previous research shows that it is

    dif

    cult for survey respondents, such as focus groups, toimagine what future innovations will look like and what

    benets they will bring. In the early 1990s, when people

    were asked about the use of mobile phones, they said they

    would not really need one or would consider its benets to

    be minimal. Within a decade, the majority of people in the

    Western world owned a mobile phone and used it every-

    where. Analyses of social and cultural contexts help orga-

    nisations to develop their commercial intuition in terms of

    spotting new business opportunities and predicting the

    successof innovations.

    Economic aspects d Financial measurements, such as

    tax regulations, subsidies or loans might support the use

    of intelligent sensor technologies.

    Fig. 1. The general model.

    L. Pennings et al. / Technology in Society 32 (2010) 197203 199

  • 7/23/2019 8_sept_T&S

    4/7

    3. Instrument for examination

    We have developed an instrument for examining

    intelligent sensor environments. It can be used ex-postas

    well asex-antewith regard to the introduction and appli-

    cation of an intelligent sensor environment. The tool

    consists of a lengthy questionnaire that contains questions

    related to all the elements from the general model. In

    addition, a manual has been developed for conducting

    surveys based on this questionnaire. The manual also

    contains guidelines on how to interpret the results from

    completed questionnaires in relation to the general

    conceptual model.

    In the questionnaire, all the elements from the general

    conceptual model have been translated into questions,

    which makes it a good basis for surveys. However, in many

    cases the questionnaire will be too extensive for a specic

    survey, but it is possible to select specic questions from

    the main questionnaire and use them in a survey or

    personal interviews. The questions can be selected in

    relation to the application at hand or the specic context of

    the dedicated survey.

    4. Four social contexts as a framework for analyses

    We discuss four main categories of intelligent sensor

    environments, mainly from a users point of view. Each

    category is illustrated with a case. In order to gain new

    insights into the future adoption of sensor networks and

    applications in different social contexts, we studied four

    distinctive social contexts (seeFig. 2).

    The rst distinction in the framework for our case

    studies is a macro orientation whereby the party that

    benets is either an organisation or society as a whole

    (business or government), versus a micro orientation

    whereby the use of sensor networks is designed to benet

    a single individual as a consumer or citizen.

    The second criterion for choosing interesting and rele-

    vant case studies was the difference between aspecic use

    for a small group (niche market) and a broader group

    (general usage).

    The dimensions for the four categories are similar to the

    general model that we discussed in the previous section.

    Now we can analyse the four cases in terms of the general

    model. The two dimensions in the framework resulted in

    the following four cases, representing equal (future) social

    contexts for the adoption and use of intelligent sensor

    networks.

    Each of the selected cases is characterised by three

    perspectives: nancial, social, and security. In each case,

    our research focused on specic drivers and barriers that

    are likely to inuence future success or failure. Additionally,

    analyses of social trends provided us with greater insight in

    each category. This eldwork focused our knowledge and

    insight and can be applied in the future development of

    services.

    4.1. Case #1: intelligent sensors to improve quality of safetyd

    the IJkdijk

    The Dutch IJkdijk programme is a national test envi-

    ronment for the development of intelligent dike protection

    systems. Dikes, sensor technology, and scientic models

    are tested in controlled conditions. A consortium of busi-

    nesses, institutions, and water administrators examines the

    practical application of sensor technology to support water

    management, making use of new enabling technologies.

    This programme aims at more efcient control and even-

    tually a real-time monitoring system for dikes. Research in

    this programme will contribute to the development of early

    warning systems for existing and new dikes. The IJkdijk

    programme is also used to review innovative technologies

    and concepts that will enable an improved and/or more

    robust design of the infrastructure[9].

    Using sensors to improve the quality of a critical envi-

    ronmental process, such as guarding dikes to prevent

    oods or other disasters, the IJkdijk project represents an

    intelligent sensor to improve safety standards.

    We called this category RoboCop because it involves

    a hybrid combination of a natural dike (the Cop) with

    embedded sensor technology (the Robot), both functioning

    together as an automated system. If this could be consid-

    ered an archetype, another example is smart energy

    metering.

    4.2. Case #2: intelligent sensors to enable new information

    services on a national leveldthe National Data Warehouse

    In this example, intelligent sensor systems generate

    trafc data and patterns at the national level. The govern-

    ment uses measured data such as speed, travel time, and

    trafc congestion to manage trafc and to provide infor-

    mation services to motorists. All data are gathered in

    a National Data Warehouse (NDW) and are subsequently

    enriched, for example, with data on mobile phone use. This

    data must meet high qualitative standards. It is provided

    for road and trafc management purposes, but also for

    commercial information services[10].

    Using sensors to enable new social and environmental

    critical information services, for example, to improve

    transport and mobility processes, this case is directed at

    providing trafc data and patterns at the national level

    MinorityReport

    Nichemarket

    iCat

    PersonalAttention

    RoboCop

    Business(or government)

    Consumer (orcitizen)

    Generaluse

    Fig. 2. Framework for case studies.

    L. Pennings et al. / Technology in Society 32 (2010) 197203200

  • 7/23/2019 8_sept_T&S

    5/7

    with intelligent sensors that enable new information

    services relative to transport and travel needs.

    We called this category Minority report because it

    brings together several different data sources at the

    national level. If this could be considered an archetype,

    another example would be a national medical pass and

    ID card.

    4.3. Case #3: intelligent sensors enable mobile marketingda supermarket

    In a retail store such as a supermarket, intelligent

    sensors could enable mobile marketing applications to

    facilitate communication between producers and

    consumers. The supermarket selected for our case study is

    already using information and communication technology

    (ICT) applications such as narrowcasting and self-scanning.

    In addition, management has many ideas about new

    applications to communicate product-related information,

    for example, to a consumers mobile telephone, but there is

    not yet a clear business model. According to the manage-

    ment, this will meet the increasing need for product

    information on allergies (e.g., gluten or lactose allergies).

    Given the increasing cultural diversity of the population

    and the growing interest in health and wellness, more

    people are seeking information about product ingredients.

    A personal telephone could be a more effective alternative

    channel than narrowcasting. Another argument could be

    the funelement of in-store communication.

    Using sensors in mobile commerce to facilitate commu-

    nication between producers and consumers, we studied an

    innovative supermarket chain in the Netherlands, which

    had ideas and plans to use mobile devices to provide

    product information, personalised commercials, or on-the-

    spot offers in-store. Based on a long customised list of

    questions, we constructed a limited questionnaire for

    a survey on mobile marketing carried out in a supermarket.

    People were invited to answerquestions for about 10 minin

    a side room and were rewarded with a free shopping

    voucher worth ten euros.

    We called this category Personal Attention because of

    the mass customisation characteristic of this type of

    application, such as marketing for a wide public. If this

    could be considered an archetype, other examples would

    be personalised trafc information provided by navigation

    devices, or information about parking or train times via

    mobile phone.

    4.4. Case #4: intelligent sensors in living and careda housing

    facility for senior citizens

    Using sensors in the wide area of applications to living

    and care settings (such as for people with health problems,

    the disabled, or elderly), we studied a Dutch project where

    new services were implemented in a central housing

    facility for senior citizens. The complex of 180 apartments,

    with approximately 250 occupants, was built in the 1970s.

    The building is well-maintained and has many facilities.

    The owners association formulated a vision of the future

    for two to three years forward. They identied the need

    for a basic ICT infrastructure to facilitate telemedicine

    applications and home automation (also called domotics) of

    household appliances and features in residential dwellings.

    The plan provides for integrating several services such as

    re call centres, video communication, and a security

    system for the building and for individual occupants.

    We called this category iCat because of its orientation

    and focus on personal preferences and services adapted to

    individuals or small groups to improve quality and make

    intelligent use of sensors. If this could be considered an

    archetype, other examples would be individual health-

    monitoring applications and personalised e-shopping

    tools.

    Table 1summarises some of the research questions and

    ndings for each category.

    5. The general model applied to the case studies

    In general, ICT applications that support the basic

    requirements of human communication, such as a level of

    security, feeling part of a community, or supporting

    personal benets (i.e., whats in it for me?) are likely to be

    adopted fairly readily.

    On a generic level, we analysed various elements that

    inuence these new sensor applications. By analysing the

    different elements that comprise the general model,

    specic adoption issues were identied for each of the four

    different categories.

    On a specic level, if we look at the size of use or of the

    user group, uniformity within the model in terms of char-

    acteristics will be very high on the left-hand side of the

    model (Fig. 2), while the diversity within the model will be

    high on the right-hand side in our case-study framework.

    5.1. The Preconditionsbuilding block in the case studies

    The micro individual approach matches well with the

    Preconditions building block. In both the Personal

    Attention case (mobile marketing) and the iCat case

    (service apartments for senior citizens), personal charac-

    teristics are most relevant. In the other two cases, there is

    very little freedom of choice.

    In the mobile marketing research in a supermarket, we

    found that the consumers age, i.e., being a digital native or

    computer illiterate is very relevant as an adoption criterion

    for new sensor applications. This also applies to thegadget

    gapddifferences in the numbers and types of devices in

    each generation. Other relevant characteristics we found

    are the level of knowledge concerning new sensor tech-

    nology and individuals learning capabilities in terms of

    handling new applications.

    5.2. The Trustbuilding block in the case studies

    The macro societal approach matches, in particular, with

    the building block Trust. This was the case for IJkdijk (Robo-

    Cop) and the National Data Warehouse (Minority Report).

    In the IJkdijk case we concluded that new technology

    shouldrst prove its added value and reliability in order to

    be accepted.

    In the National Data Warehouse case we concluded that

    clear arrangements are required in order to provide sensor

    L. Pennings et al. / Technology in Society 32 (2010) 197203 201

  • 7/23/2019 8_sept_T&S

    6/7

    information. Also, because sensor data needs to be reliable,

    this should be veried. The same applies to ensuring

    availability.

    In the mobile marketing case, the fact that the integrity

    and reliability of information cannot always be guaranteed

    must be taken into account and will be an important

    precondition for success. It is important to payconsiderable

    attention to communication that involves privacy andsecurity issues; this communication should take the form of

    safety procedures, codes, and blocks and privacy protection.

    In the case of the service apartments we found the

    privacy aspects to be particularly important. Peer inuence

    also turned out to be an important issue; initiators are

    preferably known members of the group with high

    credibility.

    5.3. The Acceptancebuilding block in the case studies

    Based on the mobile marketing case, we concluded that

    there are basic requirements for adopting a product or

    service: comfort and ease of use (save time and money),

    matching the users needs, social contact and acceptance

    in peer groups, and universal use of the devices (not

    a new device for each different service). The basic

    requirements concerning use of the service are safety and

    privacy (of personal preferences and numbers/codes, and

    procedures when these are lost), reliability (does the

    service function as promised), and usability (simple user

    interface, also for disabled users).In the mobile marketing case we found that when

    launching a new sensor application it is important to pay

    extra attention to privacy measures and prevention of

    mistrust (e.g., a trial period to resolve problems, beta

    versions for innovators and early adopters in pilots with

    support), and pricing issues.

    6. Conclusions

    People arending that they must cope with increasingly

    sophisticated ICT technologies and applications. We expect

    ICT to provide solutions for improving data exchange and

    access to information, and make processes more effective.

    Table 1

    Research questions and ndings.

    Category Example research questions: Specic characteristics of this category:

    IJkdijk

    RoboCop

    How do the companies involved in

    IJkdijk cooperate?

    How does the staff responsible for

    the dikes experience the taking-over

    of tasks, and to what extent do they

    trust the data? Questions regarding the integrity of

    the sensors (correctness of measured values)

    and the integrity of the software and hardware used.

    What communication protocols and procedures

    are in place?

    The focus and aim of (large-scale) implementation

    is to improve quality (also safety, where relevant)

    and, indirectly, to reduce costs

    The applied sensors and their integration is often

    at research level.

    Users are not familiar with the new sensors. The freedom of choice for users is limited (use of

    the sensor system is obligatory).

    National Data

    Warehouse

    Minority Report

    How to guarantee that trafc data cannot be

    traced back to (the behaviour of) individual users.

    NDWs architecture seems to have a single-point-

    of-failure. How can the permanent availability of

    the system be ensured?

    The wide diversity of incoming sensor

    information (ows).

    Many parties are involved, either as suppliers

    or on the demand side.

    The various supply organisations entered

    into agreements about the quality of the information.

    The interfaces need to be protected against misuse.

    The overall central party has a coordinating role

    with a national, economic interest.

    The technologies and implementation are not

    mature or proven.

    The end user as a consumer is less involved.

    Mobile marketing in

    supermarket

    Personal Attention

    In what ways do people use their mobile

    phones in supermarkets?

    In what kinds of mobile marketing are

    customers interested?

    What kind of opportunities will mobile

    marketing applications provide for supermarkets

    in the short and longer term?

    Do parties involved in the logistics chain cooperate

    with each other?

    What will be thenancial drivers of this case?

    The sensors are used to facilitate convenience

    for end users and to promote products or services

    In order to offer users a personalised approach,

    personal data is registered, which may compromise

    privacy rights.

    The initiating central party has a direct commercial

    interest.

    Thesensors in these applications are widely used.

    Marketing is connected to nancial benets, which

    increases the risk of fraud.

    Service apartment for

    senior citizens

    iCat

    What perceptions do people have regarding sensor

    applications in care settings?

    Do occupants perceive services in and around theirhomes as luxuries, necessities, or patronising? Why?

    Are issues such as experience, generation gaps, and

    cultural factors of any relevance?

    Who are early adapters of new services (and why)?

    How do they inuence other groups?

    The target group is relatively small.

    The sensors used are state-of-the-art.

    The central implementing party has a directcommercial interest (new services generate

    additional turnover).

    Users often have to be convinced to participate.

    Relatively limited risk of fraud and/or misuse.

    L. Pennings et al. / Technology in Society 32 (2010) 197203202

  • 7/23/2019 8_sept_T&S

    7/7

    We believe that in the future ICT in general and sensor

    networks in particular will have a signicant impact on

    society in areas such as care, security, and commerce.

    Sensors create richer communication, including context-

    aware information. There is much potential for sensor

    networks in several sectors.

    The success of an intelligent sensor environment is

    mainly determined by the extent to which it is adopted by

    users. It is not yet clear how technological innovations will

    be designed, implemented, and adopted. Furthermore, the

    speed of innovation and adoption is difcult to estimate.

    To understand how the adoption process works and

    when it is likely to be successful, we developed a general

    adoption model and applied it to each of the four identied

    categories of sensor applications. It turns out that each

    specic type of intelligent sensor environment, in addition

    to general adoption, has its own adoption issues.

    References

    [1] Davis FD. Perceived usefulness, perceived ease of use, and useracceptance. MIS Quarterly 1989;13(3):31940.[2] Venkatesh V, Morris MG, Davis GB, Davis FD. User acceptance of

    information technology: towards a unied view. MIS Quarterly2003;27(3):42578.

    [3] Cho V. A study of the roles of trusts and risks in information-oriented online legal services using an integrated model. Informa-tion and Management 2006;43(4):50220.

    [4] Schot J, Rip A. The past and future of constructive technology assess-ment. Technology Forecasting and Social Change 1996;54:25168.

    [5] Silverstone R. Domesticating domestication: reections on the life ofa concept. In: Berker T, Hartmann M, Punie M, Ward KJ, editors.Domestication of media and technology. London: Open UniversityPress; 2006. p. 22948.

    [6] Silverstone R, Hirsch E, Morley D. Information and communicationtechnologies and the moral economy of the household. In:Silverstone R, Hirsch D, editors. Consuming technologies: Media and

    Information in Domestic Spaces. London: Routledge; 1992. p. 15

    31.[7] Zhao S. Theoretical review of technology mediated communication:Inuences on social structure. Centre for Mobile Communication

    Studies (CMCS) Working Paper. Princeton, NJ: Rutgers StateUniversity; 2005. pp. 120.

    [8] Rogers E. Diffusion of innovations. New York: Free Press; 1962.[9] IJkdijk website. For more information, see:.

    [10] National Data Warehouse website. For more information, see:.

    Annemieke de Korteis a researcher and consultant in the Future Scan-ning team of TNO Information and Communication Technology. Shegraduated from the Faculty of Social Sciences at Erasmus University Rot-terdam, with a degree in Sociology of Labour and Technology. Currentlyher work focuses on social trends and their impact on the future use ofinformation and communication technology. She has conducted severalstudies concerning telecommunications, care, education, energy, publicadministration, media, mobility, and safety. These are presented inpublications containing images of the future in concrete communicationcontexts. They aim to be a source of inspiration, enabling organisations tovisualise the future and translate visions into strategies, as a basis fordeveloping new product and service concepts.

    Thijs Veugenis a senior expert in the eld of information security. WithinTNO Information and Communication Technology he is responsible forthe strategic knowledge development of the security group. He hasa broad network of academic contacts and develops large projects forbuilding up and extending the strategic information security subjects. Hehas MSc degrees in both Mathematics and Computer Science from Eind-

    hoven University of Technology, both with distinction. He graduated incryptography from the Centre for Mathematics and Computer Science in1991. He has a PhD in information theory from Eindhoven University ofTechnology. From 1996 to 1999 he worked as a scientic software engi-neer at Statistics Netherlands. In 1999 he joined TNO in the area ofinformation security. In 2008 he also started as a part-time researcher atthe Multimedia Signal Processing group of Delft University of Technology.

    Leo Pennings was a senior researcher and consultant with TNO Infor-mation and Communication Technology, with a background in MolecularBiology (M.Sc. Biochemistry) and Communication (M.Sc. in Communica-tion and Innovation) and Education (B.A. in Education). Within TNOsdepartment of ICT & Policy he was responsible for strategic and policystudies relating to innovations in the information market and issuesrelating to knowledge management, business intelligence and acceptanceand adoption by users of new technology. He participated in variousEuropean projects. Earlier assignments were an EU study on expeditingadoption of e-working collaborative environments, and an EU study onemerging issues, challenges, and policy options for RFID technologies.

    L. Pennings et al. / Technology in Society 32 (2010) 197203 203

    http://www.ijkdijk.nl/http://www.nationaldatawarehouse.nl/http://www.nationaldatawarehouse.nl/http://www.ijkdijk.nl/