Making sure that the application does not interfere with everyday life (invisibility of technology) |
Setting the requirements of the security of this applications (how secure is secure enough?) |
Striking the right balance between user friendliness, reliability, and functionality |
Making sure that end users (patients, their family & friends, and clinicians) are able and willing to use the application |
Starting a broad societal discussion about the desirability of these kinds of (monitoring) applications |
Addressing questions related to data storage and data access (legal aspects) |
Inventorying/monitoring potential risks of the present application |
Identify how technological choices affect the social acceptance |