Developing value framework of ubiquitous computing

Lee Jungwoo, Lee Younghee, Park Jaesung

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)


In this study, a value framework for ubiquitous computing is developed and presented. Using 'value focused thinking' approach suggested by Keeney, twenty-two potential users of ubiquitous computing were interviewed and 435 statements describing values expected from ubiquitous technology were obtained from these interviews. Subsequent purification and redundancy removal reduces these 435 statements into 166 objectives that these users have in their mind when thinking about ubiquitous computing. These 166 objectives were factorized into 35 objectives through clustering by three experts. These 35 objectives were classified into a means-ends network diagram by analyzing reciprocal relationships among them in a focus group activity of another three experts. Resulting means-ends network reveals a value framework inherent in users' perception about ubiquitous computing technologies. This framework will be useful as a reference in developing new business models for ubiquitous computing as well as developing useful technologies themselves.

Original languageEnglish
Title of host publicationComputational Science - ICCS 2007 - 7th International Conference, Proceedings
Number of pages7
EditionPART 4
Publication statusPublished - 2007
Event7th International Conference on Computational Science, ICCS 2007 - Beijing, China
Duration: 2007 May 272007 May 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 4
Volume4490 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other7th International Conference on Computational Science, ICCS 2007

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Developing value framework of ubiquitous computing'. Together they form a unique fingerprint.

Cite this