Mobile Age aimed to ensure the inclusion of older adults in digital public services by developing user-friendly mobile applications based on open government data. To achieve this, Mobile Age developed a platform to allow developers to more easily create apps aimed at older adults [1]. It performed a series of co-creation activities [2] to develop demonstrator apps to fulfil the needs of participants, whist demoing the functionality of the platform [3].

Lancaster’s specific aim was to improve independent living (through reducing social isolation and loneliness)—the first demonstrator app aimed to improve social inclusion [4]. My responsibilities on the project included: design and facilitation of co-creation activities with older adults; development of an analytics Software-as-a-Service (SaaS) module for 3rd party developers to use when creating their own Mobile Age apps [5]; development of demonstrator apps and RESTful services; liaise and coordinate with partner institutions; and writing EU project deliverable reports.


  1. Christopher N. Bull et al. Designing Mobile Applications for Older Adults. In: 19th International Workshop on Mobile Computing Systems and Applications (HotMobile’18) (2018). | PDF
  2. Bran Knowles et al. Examining Interdependencies and Constraints in Co-Creation. In: Proceedings of the 2019 Designing Interactive Systems Conference (DIS ‘19). ACM. 2019, pp. 291–302. | DOI
  3. Christopher N. Bull et al. Mobile Age: Open Data Mobile Apps to Support Independent Living. In: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems (CHI EA ’17). ACM, 2017, pp. 2410–2415. | DOI
  4. Peter Shaw et al. Helping to Tackle Social Isolation and Loneliness of Older Adults Using Mobile Applications. In: Proceedings of the 20th International Workshop on Mobile Computing Systems and Applications (HotMobile’19). ACM. 2019, pp. 185–185. | DOI
  5. Mateusz Mikusz et al. Supporting Older Adults Using Privacy-Aware IoT Analytics. In: Living in the Internet of Things: Cybersecurity of the IoT (2019). | DOI