SlideShare uma empresa Scribd logo
1 de 36
Baixar para ler offline
2.3 Digital empowerment of older users 1
CONFIDENTIAL Template Innovation Day 2018CONFIDENTIAL
DIGITAL EMPOWERMENT OF
OLDER USERS
Lene Schroyen
Project Manager
lene.schroyen@verhaert.com
TRACK 2 - DIGITAL TECHNOLOGIES FOR A BETTER WORLD
2.3 Digital empowerment of older users 2
CONFIDENTIAL
1
2
3
4
5
CONTENT
The aging population
Living independently
Digital and real world integrate
Digital empowerment today
Project Vizier
2.3 Digital empowerment of older users 3
CONFIDENTIAL
POPULATIONS ARE GETTING OLDER
2.3 Digital empowerment of older users 4
CONFIDENTIAL
LIVING INDEPENDENTLTY
Aging at home – what does it mean?
2.3 Digital empowerment of older users 5
CONFIDENTIAL
• To keep important old connections (be involved, contribute)
• Because they long for familiar streets and faces
• To remain independent
• Because a nursing home is unavailable or not affordable
WHY PEOPLE WANT TO AGE AT HOME
2.3 Digital empowerment of older users 6
CONFIDENTIAL
• People’s future care needs are hard to predict
• Help at home is a challenge to organize
• Studies show that for some, home alone is mostly just alone
THE REALITY OF AGING AT HOME
2.3 Digital empowerment of older users 7
CONFIDENTIAL
1. Physical environment
• Allowing the users to get around both indoors and outdoors
• Accommodate their limitations and be affordable
• Solve transportation
2. Social aspects
• Living in a community
• Socializing, attending events
• Having opportunities to work if they wish
• Have ways to communicate with others
• Have ways to get information
• Healthcare facilities nearby
PROBLEMS-TO-BE-SOLVED WHEN AGING AT HOME
Source – 2017 Deseret News article
2.3 Digital empowerment of older users 8
CONFIDENTIAL
TECHNOLOGY AS A PART OF THE SOLUTION
The assistive potential of available technology
Access
Communication
EntertainmentHealth
Memory &
cognition
2.3 Digital empowerment of older users 9
CONFIDENTIAL
Why are older adults not using technology?
Why does the tablet end up in the drawer?
THE DIGITAL DIVIDE
2.3 Digital empowerment of older users 10
CONFIDENTIAL
Innovations are often too complex.
BARRIER
“I’ve seen elderly users
write paper notes on
how to use note-taking
software.”
2.3 Digital empowerment of older users 11
CONFIDENTIAL
The technology is hard-to-imagine and a lot of elderly
don’t feel the need of technology in their homes.
BARRIER
“At the age of 70, I’m enthusiastic about
travel and about reading long history
books. But about replacing my traditional
home thermostat with a WiFi model like
Nest – I’m unenthusiastic.”
2.3 Digital empowerment of older users 12
CONFIDENTIAL
Products ‘for elderly’ are not desirable.
BARRIER
2.3 Digital empowerment of older users 13
CONFIDENTIAL
Needing to learn to work with
a new interface for each application.
BARRIER
2.3 Digital empowerment of older users 14
CONFIDENTIAL
Example: go one step back
BARRIER
2.3 Digital empowerment of older users 15
CONFIDENTIAL
Limitation of vision, dexterity and memory.
BARRIER
2.3 Digital empowerment of older users 16
CONFIDENTIAL
DIGITAL AND REAL WORLD INTEGRATE
What will the future be like?
2.3 Digital empowerment of older users 17
CONFIDENTIAL
THE DIGITAL WORLD IS REAL
2.3 Digital empowerment of older users 18
CONFIDENTIAL
THE VIRTUAL COMPANION IS REAL
2.3 Digital empowerment of older users 19
CONFIDENTIAL
FUTURE EXPERIENCE FOR OLDER USERS
REMOTE CONTACT
Messages
Video calls
Social media
VIRTUAL CONTACT SENSORS DEVICES< AI
2.3 Digital empowerment of older users 20
CONFIDENTIAL
DIGITAL EMPOWERMENT TODAY
VIZIER
Stay active - mentally, socially and physically
Get daily life organized
2.3 Digital empowerment of older users 21
CONFIDENTIAL
1. Desirability first
VIZIER - DIGITALIZATION APPROACH
“Create a fun-to-have system, to
get users in. The extras become
the core.”
2.3 Digital empowerment of older users 22
CONFIDENTIAL
1. Desirability first
2. A familiar user interface
DIGITALIZATION APPROACH
“Filter the information according
to the user preferences and show
it through one simple interface.”
2.3 Digital empowerment of older users 23
CONFIDENTIAL
1. Desirability first
2. A familiar user interface
3. Open and extendable
DIGITALIZATION APPROACH
“The Vizier system is meant to plug
in on any other (open) system,
allowing the user to customize his
version of the system.”
2.3 Digital empowerment of older users 24
CONFIDENTIAL
PROJECT VIZIER
First steps to digital empowerment
2.3 Digital empowerment of older users 25
CONFIDENTIAL
THE VIZIER CONCEPT
GRAPHICAL SPEECH
FRIENDLY
INTERFACE
SMART
PLATFORM
ONLINE
SERVICES
SENSORS
& DEVICES
AVAILABLE
SOLUTIONS
2.3 Digital empowerment of older users 26
CONFIDENTIAL
The companion and the tablet work together
VIZIER’S FRIENDLY INTERFACE
2.3 Digital empowerment of older users 27
CONFIDENTIAL
Bring UI guidelines to life
VIZIER’S FRIENDLY INTERFACE
Textual clarification It has been noticed that older adults often interpret icons in another way which may be
confusing
Manipulate screen Older adult users can find it difficult to use multiple fingers across the screen. Actions
like zoom in and out, scrolling with two fingers, rotation and dragging gestures. Multi-
touch gestures should have button-based alternatives6.
Sort linear sequences
of tasks
Organize information into a small number of "chunks“. Minimize the interferences on the
screen and make them very straightforward and short, so as not to overload the older
adult’s mental space and working memory abilities.
Use ‘real-world’
metaphors
e.g. desktop metaphor, folder metaphor, trash can metaphor
User-centered wording e.g. "there was a problem in copying a file to your disk" rather than "execution error 159"
Feedback Articulatory (system beeps, mouse click, key clicks etc.), semantic (e.g. highlighting an
item being chosen from a list), status indicators (e.g. the copy bar when copying files, an
hour glass icon when a process is being executed etc.).
Some examples from UI guidelines
2.3 Digital empowerment of older users 28
CONFIDENTIAL
CO-CREATION
concreteabstract
2.3 Digital empowerment of older users 29
CONFIDENTIAL
PAPER DESIGNS
(2-3 options)
2.3 Digital empowerment of older users 30
CONFIDENTIAL
MOCKUP APP
(clickable buttons)
2.3 Digital empowerment of older users 31
CONFIDENTIAL
MOCKUP APP
(clickable buttons)
2.3 Digital empowerment of older users 32
CONFIDENTIAL
CLICK TO INSERT SLIDE TITLE
1. Click to insert text
FOCUS GROUP
(feedback survey)
2.3 Digital empowerment of older users 33
CONFIDENTIAL
CONCLUSIONS
2.3 Digital empowerment of older users 34
CONFIDENTIAL
REMEMBER …
… we ain’t seen nothing yet
2.3 Digital empowerment of older users 35
CONFIDENTIAL
REMEMBER …
… it’s a must to co-create
… and to apply user-centered design
2.3 Digital empowerment of older users 36
CONFIDENTIAL
One group, five brands
Our services are marketed through 5 brands each
addressing specific missions in product development.
INTEGRATED PRODUCT DEVELOPMENT
ON-SITE
PRODUCT
DEVELOPMENT
DIGITAL
PRODUCTS
DEVELOPMENT
OPTICAL
PRODUCTS
DEVELOPMENT
VENTURING

Mais conteúdo relacionado

Mais procurados

Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information Technology
AnKit Mhatre
 
UbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at HomeUbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at Home
Fahim Kawsar
 
Network Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior ModelingNetwork Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior Modeling
Fahim Kawsar
 

Mais procurados (20)

IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
Basics of Internet of Things
 Basics of Internet of Things Basics of Internet of Things
Basics of Internet of Things
 
2015 State of the Smart Home Report | Icontrol Networks
2015 State of the Smart Home Report | Icontrol Networks2015 State of the Smart Home Report | Icontrol Networks
2015 State of the Smart Home Report | Icontrol Networks
 
Smart home evolution
Smart home evolutionSmart home evolution
Smart home evolution
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
NSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade AheadNSConclave2020 The Decade Behind And The Decade Ahead
NSConclave2020 The Decade Behind And The Decade Ahead
 
Dell Software is Future Ready - no movie
Dell Software is Future Ready - no movieDell Software is Future Ready - no movie
Dell Software is Future Ready - no movie
 
Cybersecurity In India - The Decade Ahead
Cybersecurity In India - The Decade AheadCybersecurity In India - The Decade Ahead
Cybersecurity In India - The Decade Ahead
 
frog POV: Now That Data is Everything
frog POV: Now That Data is Everythingfrog POV: Now That Data is Everything
frog POV: Now That Data is Everything
 
Ethics in development of Information Technology
Ethics in development of Information TechnologyEthics in development of Information Technology
Ethics in development of Information Technology
 
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
Cybersecurity And Sovereignty - A Look At Society's Transformation In CyberspaceCybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
Cybersecurity And Sovereignty - A Look At Society's Transformation In Cyberspace
 
UbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at HomeUbiComp 2013 Talk on Device Dynamics at Home
UbiComp 2013 Talk on Device Dynamics at Home
 
Network Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior ModelingNetwork Intelligence Driven Human Behavior Modeling
Network Intelligence Driven Human Behavior Modeling
 
تعلم الانترنيت
تعلم الانترنيتتعلم الانترنيت
تعلم الانترنيت
 
Dr Jimmy Schwarzkopf Keynote @STKI Summit 2011
Dr Jimmy Schwarzkopf  Keynote @STKI Summit 2011Dr Jimmy Schwarzkopf  Keynote @STKI Summit 2011
Dr Jimmy Schwarzkopf Keynote @STKI Summit 2011
 
Multi-vendor integration and interoprability to be critical success factor in...
Multi-vendor integration and interoprability to be critical success factor in...Multi-vendor integration and interoprability to be critical success factor in...
Multi-vendor integration and interoprability to be critical success factor in...
 
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
Стас Павлов «Построение безопасной архитектуры IoT решений на примере Azure I...
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
BYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoorBYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoor
 
SMART HOMES
SMART HOMES SMART HOMES
SMART HOMES
 

Semelhante a Digital empowerment of older users (by Lene Schroyen)

informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
jaspreetkaur908049
 
Af 5 it-wavesthatwilldisrupt
Af 5 it-wavesthatwilldisruptAf 5 it-wavesthatwilldisrupt
Af 5 it-wavesthatwilldisrupt
Jerry R Rick
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
Arpan Patel
 
Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013
Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013
Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013
TechnoArk
 

Semelhante a Digital empowerment of older users (by Lene Schroyen) (20)

IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
GK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).pptGK NU CS 101 Session 1B (1).ppt
GK NU CS 101 Session 1B (1).ppt
 
The Internet of Things: Designing for a new dimension in user experience
The Internet of Things: Designing for a new dimension in user experienceThe Internet of Things: Designing for a new dimension in user experience
The Internet of Things: Designing for a new dimension in user experience
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Topik 2 : Pengenalan kepada Multimedia
Topik 2 : Pengenalan kepada MultimediaTopik 2 : Pengenalan kepada Multimedia
Topik 2 : Pengenalan kepada Multimedia
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
Good for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good designGood for who? Understanding the challenges of implementing good design
Good for who? Understanding the challenges of implementing good design
 
Everything is changing in IT
Everything is changing in IT Everything is changing in IT
Everything is changing in IT
 
Af 5 it-wavesthatwilldisrupt
Af 5 it-wavesthatwilldisruptAf 5 it-wavesthatwilldisrupt
Af 5 it-wavesthatwilldisrupt
 
Accessibility Means Business
Accessibility Means BusinessAccessibility Means Business
Accessibility Means Business
 
IRJET- Smart Mirror
IRJET- Smart  MirrorIRJET- Smart  Mirror
IRJET- Smart Mirror
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery
 
Ubiquitous computing presentation 2
Ubiquitous computing presentation 2Ubiquitous computing presentation 2
Ubiquitous computing presentation 2
 
Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013
Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013
Michaël Dupertuis (Geroco) - Conférence TechnoArk 2013
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery-report
Digital jewellery-reportDigital jewellery-report
Digital jewellery-report
 
Being digital
Being digitalBeing digital
Being digital
 
Montclair share preso
Montclair share presoMontclair share preso
Montclair share preso
 

Mais de Verhaert Masters in Innovation

Mais de Verhaert Masters in Innovation (20)

Technology watch - AI in chemical industry
Technology watch - AI in chemical industryTechnology watch - AI in chemical industry
Technology watch - AI in chemical industry
 
Software language over the last 50 years, what will be next (by Pieter Zulian...
Software language over the last 50 years, what will be next (by Pieter Zulian...Software language over the last 50 years, what will be next (by Pieter Zulian...
Software language over the last 50 years, what will be next (by Pieter Zulian...
 
Geospatial technologies, the evolution and impact on our daily life (by Nicol...
Geospatial technologies, the evolution and impact on our daily life (by Nicol...Geospatial technologies, the evolution and impact on our daily life (by Nicol...
Geospatial technologies, the evolution and impact on our daily life (by Nicol...
 
Advanced human interfaces, the underestimated enabler for innovation (by Bert...
Advanced human interfaces, the underestimated enabler for innovation (by Bert...Advanced human interfaces, the underestimated enabler for innovation (by Bert...
Advanced human interfaces, the underestimated enabler for innovation (by Bert...
 
The first humanoid robot, wabot 1 (by Robrecht Van Velthoven)
The first humanoid robot, wabot 1 (by Robrecht Van Velthoven)The first humanoid robot, wabot 1 (by Robrecht Van Velthoven)
The first humanoid robot, wabot 1 (by Robrecht Van Velthoven)
 
The government as launching customer, a great opportunity for companies (by R...
The government as launching customer, a great opportunity for companies (by R...The government as launching customer, a great opportunity for companies (by R...
The government as launching customer, a great opportunity for companies (by R...
 
Landing on the moon, the impact and future opportunities (by Sam Waes)
Landing on the moon, the impact and future opportunities (by Sam Waes)Landing on the moon, the impact and future opportunities (by Sam Waes)
Landing on the moon, the impact and future opportunities (by Sam Waes)
 
Building an innovation culture, steering individual and team behavior (by Möb...
Building an innovation culture, steering individual and team behavior (by Möb...Building an innovation culture, steering individual and team behavior (by Möb...
Building an innovation culture, steering individual and team behavior (by Möb...
 
The era of pretotyping has arrived (by Kevin Douven)
The era of pretotyping has arrived (by Kevin Douven)The era of pretotyping has arrived (by Kevin Douven)
The era of pretotyping has arrived (by Kevin Douven)
 
Is the start-up way of working really different than the corporate one (by Fr...
Is the start-up way of working really different than the corporate one (by Fr...Is the start-up way of working really different than the corporate one (by Fr...
Is the start-up way of working really different than the corporate one (by Fr...
 
Behind the waterfall methodology (by Jan Buytaert)
Behind the waterfall methodology (by Jan Buytaert)Behind the waterfall methodology (by Jan Buytaert)
Behind the waterfall methodology (by Jan Buytaert)
 
Is the house of quality still a valid model to manage innovation (by Dany Rob...
Is the house of quality still a valid model to manage innovation (by Dany Rob...Is the house of quality still a valid model to manage innovation (by Dany Rob...
Is the house of quality still a valid model to manage innovation (by Dany Rob...
 
How to shape your innovation ecosystem to create impact in your organization ...
How to shape your innovation ecosystem to create impact in your organization ...How to shape your innovation ecosystem to create impact in your organization ...
How to shape your innovation ecosystem to create impact in your organization ...
 
The evolution of the bicycle industry 50 years after eddy merckx' victory (by...
The evolution of the bicycle industry 50 years after eddy merckx' victory (by...The evolution of the bicycle industry 50 years after eddy merckx' victory (by...
The evolution of the bicycle industry 50 years after eddy merckx' victory (by...
 
The acceleration of Artificial Intelligence (by Jochem Grietens)
The acceleration of Artificial Intelligence (by Jochem Grietens)The acceleration of Artificial Intelligence (by Jochem Grietens)
The acceleration of Artificial Intelligence (by Jochem Grietens)
 
The drivers of value creation, 50 years of research (by Dany Robberecht)
The drivers of value creation, 50 years of research (by Dany Robberecht)The drivers of value creation, 50 years of research (by Dany Robberecht)
The drivers of value creation, 50 years of research (by Dany Robberecht)
 
Multi-sided business models in smart cities (IoT Convention 2019)
Multi-sided business models in smart cities (IoT Convention 2019)Multi-sided business models in smart cities (IoT Convention 2019)
Multi-sided business models in smart cities (IoT Convention 2019)
 
Space for Artificial Intelligence
Space for Artificial IntelligenceSpace for Artificial Intelligence
Space for Artificial Intelligence
 
Dany Robberecht - The benefits of cross industry innovation
Dany Robberecht - The benefits of cross industry innovationDany Robberecht - The benefits of cross industry innovation
Dany Robberecht - The benefits of cross industry innovation
 
Space 4.0 and the Belgian start-up ecosystem by Omar Mohout
Space 4.0 and the Belgian start-up ecosystem by Omar MohoutSpace 4.0 and the Belgian start-up ecosystem by Omar Mohout
Space 4.0 and the Belgian start-up ecosystem by Omar Mohout
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Digital empowerment of older users (by Lene Schroyen)

  • 1. 2.3 Digital empowerment of older users 1 CONFIDENTIAL Template Innovation Day 2018CONFIDENTIAL DIGITAL EMPOWERMENT OF OLDER USERS Lene Schroyen Project Manager lene.schroyen@verhaert.com TRACK 2 - DIGITAL TECHNOLOGIES FOR A BETTER WORLD
  • 2. 2.3 Digital empowerment of older users 2 CONFIDENTIAL 1 2 3 4 5 CONTENT The aging population Living independently Digital and real world integrate Digital empowerment today Project Vizier
  • 3. 2.3 Digital empowerment of older users 3 CONFIDENTIAL POPULATIONS ARE GETTING OLDER
  • 4. 2.3 Digital empowerment of older users 4 CONFIDENTIAL LIVING INDEPENDENTLTY Aging at home – what does it mean?
  • 5. 2.3 Digital empowerment of older users 5 CONFIDENTIAL • To keep important old connections (be involved, contribute) • Because they long for familiar streets and faces • To remain independent • Because a nursing home is unavailable or not affordable WHY PEOPLE WANT TO AGE AT HOME
  • 6. 2.3 Digital empowerment of older users 6 CONFIDENTIAL • People’s future care needs are hard to predict • Help at home is a challenge to organize • Studies show that for some, home alone is mostly just alone THE REALITY OF AGING AT HOME
  • 7. 2.3 Digital empowerment of older users 7 CONFIDENTIAL 1. Physical environment • Allowing the users to get around both indoors and outdoors • Accommodate their limitations and be affordable • Solve transportation 2. Social aspects • Living in a community • Socializing, attending events • Having opportunities to work if they wish • Have ways to communicate with others • Have ways to get information • Healthcare facilities nearby PROBLEMS-TO-BE-SOLVED WHEN AGING AT HOME Source – 2017 Deseret News article
  • 8. 2.3 Digital empowerment of older users 8 CONFIDENTIAL TECHNOLOGY AS A PART OF THE SOLUTION The assistive potential of available technology Access Communication EntertainmentHealth Memory & cognition
  • 9. 2.3 Digital empowerment of older users 9 CONFIDENTIAL Why are older adults not using technology? Why does the tablet end up in the drawer? THE DIGITAL DIVIDE
  • 10. 2.3 Digital empowerment of older users 10 CONFIDENTIAL Innovations are often too complex. BARRIER “I’ve seen elderly users write paper notes on how to use note-taking software.”
  • 11. 2.3 Digital empowerment of older users 11 CONFIDENTIAL The technology is hard-to-imagine and a lot of elderly don’t feel the need of technology in their homes. BARRIER “At the age of 70, I’m enthusiastic about travel and about reading long history books. But about replacing my traditional home thermostat with a WiFi model like Nest – I’m unenthusiastic.”
  • 12. 2.3 Digital empowerment of older users 12 CONFIDENTIAL Products ‘for elderly’ are not desirable. BARRIER
  • 13. 2.3 Digital empowerment of older users 13 CONFIDENTIAL Needing to learn to work with a new interface for each application. BARRIER
  • 14. 2.3 Digital empowerment of older users 14 CONFIDENTIAL Example: go one step back BARRIER
  • 15. 2.3 Digital empowerment of older users 15 CONFIDENTIAL Limitation of vision, dexterity and memory. BARRIER
  • 16. 2.3 Digital empowerment of older users 16 CONFIDENTIAL DIGITAL AND REAL WORLD INTEGRATE What will the future be like?
  • 17. 2.3 Digital empowerment of older users 17 CONFIDENTIAL THE DIGITAL WORLD IS REAL
  • 18. 2.3 Digital empowerment of older users 18 CONFIDENTIAL THE VIRTUAL COMPANION IS REAL
  • 19. 2.3 Digital empowerment of older users 19 CONFIDENTIAL FUTURE EXPERIENCE FOR OLDER USERS REMOTE CONTACT Messages Video calls Social media VIRTUAL CONTACT SENSORS DEVICES< AI
  • 20. 2.3 Digital empowerment of older users 20 CONFIDENTIAL DIGITAL EMPOWERMENT TODAY VIZIER Stay active - mentally, socially and physically Get daily life organized
  • 21. 2.3 Digital empowerment of older users 21 CONFIDENTIAL 1. Desirability first VIZIER - DIGITALIZATION APPROACH “Create a fun-to-have system, to get users in. The extras become the core.”
  • 22. 2.3 Digital empowerment of older users 22 CONFIDENTIAL 1. Desirability first 2. A familiar user interface DIGITALIZATION APPROACH “Filter the information according to the user preferences and show it through one simple interface.”
  • 23. 2.3 Digital empowerment of older users 23 CONFIDENTIAL 1. Desirability first 2. A familiar user interface 3. Open and extendable DIGITALIZATION APPROACH “The Vizier system is meant to plug in on any other (open) system, allowing the user to customize his version of the system.”
  • 24. 2.3 Digital empowerment of older users 24 CONFIDENTIAL PROJECT VIZIER First steps to digital empowerment
  • 25. 2.3 Digital empowerment of older users 25 CONFIDENTIAL THE VIZIER CONCEPT GRAPHICAL SPEECH FRIENDLY INTERFACE SMART PLATFORM ONLINE SERVICES SENSORS & DEVICES AVAILABLE SOLUTIONS
  • 26. 2.3 Digital empowerment of older users 26 CONFIDENTIAL The companion and the tablet work together VIZIER’S FRIENDLY INTERFACE
  • 27. 2.3 Digital empowerment of older users 27 CONFIDENTIAL Bring UI guidelines to life VIZIER’S FRIENDLY INTERFACE Textual clarification It has been noticed that older adults often interpret icons in another way which may be confusing Manipulate screen Older adult users can find it difficult to use multiple fingers across the screen. Actions like zoom in and out, scrolling with two fingers, rotation and dragging gestures. Multi- touch gestures should have button-based alternatives6. Sort linear sequences of tasks Organize information into a small number of "chunks“. Minimize the interferences on the screen and make them very straightforward and short, so as not to overload the older adult’s mental space and working memory abilities. Use ‘real-world’ metaphors e.g. desktop metaphor, folder metaphor, trash can metaphor User-centered wording e.g. "there was a problem in copying a file to your disk" rather than "execution error 159" Feedback Articulatory (system beeps, mouse click, key clicks etc.), semantic (e.g. highlighting an item being chosen from a list), status indicators (e.g. the copy bar when copying files, an hour glass icon when a process is being executed etc.). Some examples from UI guidelines
  • 28. 2.3 Digital empowerment of older users 28 CONFIDENTIAL CO-CREATION concreteabstract
  • 29. 2.3 Digital empowerment of older users 29 CONFIDENTIAL PAPER DESIGNS (2-3 options)
  • 30. 2.3 Digital empowerment of older users 30 CONFIDENTIAL MOCKUP APP (clickable buttons)
  • 31. 2.3 Digital empowerment of older users 31 CONFIDENTIAL MOCKUP APP (clickable buttons)
  • 32. 2.3 Digital empowerment of older users 32 CONFIDENTIAL CLICK TO INSERT SLIDE TITLE 1. Click to insert text FOCUS GROUP (feedback survey)
  • 33. 2.3 Digital empowerment of older users 33 CONFIDENTIAL CONCLUSIONS
  • 34. 2.3 Digital empowerment of older users 34 CONFIDENTIAL REMEMBER … … we ain’t seen nothing yet
  • 35. 2.3 Digital empowerment of older users 35 CONFIDENTIAL REMEMBER … … it’s a must to co-create … and to apply user-centered design
  • 36. 2.3 Digital empowerment of older users 36 CONFIDENTIAL One group, five brands Our services are marketed through 5 brands each addressing specific missions in product development. INTEGRATED PRODUCT DEVELOPMENT ON-SITE PRODUCT DEVELOPMENT DIGITAL PRODUCTS DEVELOPMENT OPTICAL PRODUCTS DEVELOPMENT VENTURING