223,655 research outputs found

    Towards a multidisciplinary user-centric design framework for context-aware applications

    Get PDF
    The primary aim of this article is to review and merge theories of context within linguistics, computer science, and psychology, to propose a multidisciplinary model of context that would facilitate application developers in developing richer descriptions or scenarios of how a context-aware device may be used in various dynamic mobile settings. More specifically, the aim is to:1. Investigate different viewpoints of context within linguistics, computer science, and psychology, to develop summary condensed models for each discipline. 2. Investigate the impact of contrasting viewpoints on the usability of context-aware applications. 3. Investigate the extent to which single-discipline models can be merged and the benefits and insightfulness of a merged model for designing mobile computers. 4. Investigate the extent to which a proposed multidisciplinary modelcan be applied to specific applications of context-aware computing

    Toward a multidisciplinary model of context to support context-aware computing

    Get PDF
    Capturing, defining, and modeling the essence of context are challenging, compelling, and prominent issues for interdisciplinary research and discussion. The roots of its emergence lie in the inconsistencies and ambivalent definitions across and within different research specializations (e.g., philosophy, psychology, pragmatics, linguistics, computer science, and artificial intelligence). Within the area of computer science, the advent of mobile context-aware computing has stimulated broad and contrasting interpretations due to the shift from traditional static desktop computing to heterogeneous mobile environments. This transition poses many challenging, complex, and largely unanswered research issues relating to contextual interactions and usability. To address those issues, many researchers strongly encourage a multidisciplinary approach. The primary aim of this article is to review and unify theories of context within linguistics, computer science, and psychology. Summary models within each discipline are used to propose an outline and detailed multidisciplinary model of context involving (a) the differentiation of focal and contextual aspects of the user and application's world, (b) the separation of meaningful and incidental dimensions, and (c) important user and application processes. The models provide an important foundation in which complex mobile scenarios can be conceptualized and key human and social issues can be identified. The models were then applied to different applications of context-aware computing involving user communities and mobile tourist guides. The authors' future work involves developing a user-centered multidisciplinary design framework (based on their proposed models). This will be used to design a large-scale user study investigating the usability issues of a context-aware mobile computing navigation aid for visually impaired people

    Philosophy of Blockchain Technology - Ontologies

    Get PDF
    About the necessity and usefulness of developing a philosophy specific to the blockchain technology, emphasizing on the ontological aspects. After an Introduction that highlights the main philosophical directions for this emerging technology, in Blockchain Technology I explain the way the blockchain works, discussing ontological development directions of this technology in Designing and Modeling. The next section is dedicated to the main application of blockchain technology, Bitcoin, with the social implications of this cryptocurrency. There follows a section of Philosophy in which I identify the blockchain technology with the concept of heterotopia developed by Michel Foucault and I interpret it in the light of the notational technology developed by Nelson Goodman as a notational system. In the Ontology section, I present two developmental paths that I consider important: Narrative Ontology, based on the idea of order and structure of history transmitted through Paul Ricoeur's narrative history, and the Enterprise Ontology system based on concepts and models of an enterprise, specific to the semantic web, and which I consider to be the most well developed and which will probably become the formal ontological system, at least in terms of the economic and legal aspects of blockchain technology. In Conclusions I am talking about the future directions of developing the blockchain technology philosophy in general as an explanatory and robust theory from a phenomenologically consistent point of view, which allows testability and ontologies in particular, arguing for the need of a global adoption of an ontological system for develop cross-cutting solutions and to make this technology profitable. CONTENTS: Abstract Introducere Tehnologia blockchain - Proiectare - Modele Bitcoin Filosofia Ontologii - Ontologii narative - Ontologii de intreprindere Concluzii Note Bibliografie DOI: 10.13140/RG.2.2.24510.3360

    Visualization in cyber-geography: reconsidering cartography's concept of visualization in current usercentric cybergeographic cosmologies

    Get PDF
    This article discusses some epistemological problems of a semiotic and cybernetic character in two current scientific cosmologies in the study of geographic information systems (GIS) with special reference to the concept of visualization in modern cartography. Setting off from Michael Batty’s prolegomena for a virtual geography and Michael Goodchild’s “Human-Computer-Reality-Interaction” as the field of a new media convergence and networking of GIS-computation of geo-data, the paper outlines preliminarily a common field of study, namely that of cybernetic geography, or just “cyber-geography) owing to the principal similarities with second order cybernetics. Relating these geographical cosmologies to some of Science’s dominant, historical perceptions of the exploring and appropriating of Nature as an “inventory of knowledge”, the article seeks to identify some basic ontological and epistemological dimensions of cybernetic geography and visualization in modern cartography. The points made is that a generalized notion of visualization understood as the use of maps, or more precisely as cybergeographic GIS-thinking seems necessary as an epistemological as well as a methodological prerequisite to scientific knowledge in cybergeography. Moreover do these generalized concept seem to lead to a displacement of the positions traditionally held by the scientist and lay-man citizen, that is not only in respect of the perception of the matter studied, i.e. the field of geography, but also of the manner in which the scientist informs the lay-man citizen in the course of action in the public participation in decision making; a displacement that seems to lead to a more critical, or perhaps even quasi-scientific approach as concerns the lay-man user

    Presence and rehabilitation: toward second-generation virtual reality applications in neuropsychology

    Get PDF
    Virtual Reality (VR) offers a blend of attractive attributes for rehabilitation. The most exploited is its ability to create a 3D simulation of reality that can be explored by patients under the supervision of a therapist. In fact, VR can be defined as an advanced communication interface based on interactive 3D visualization, able to collect and integrate different inputs and data sets in a single real-like experience. However, "treatment is not just fixing what is broken; it is nurturing what is best" (Seligman & Csikszentmihalyi). For rehabilitators, this statement supports the growing interest in the influence of positive psychological state on objective health care outcomes. This paper introduces a bio-cultural theory of presence linking the state of optimal experience defined as "flow" to a virtual reality experience. This suggests the possibility of using VR for a new breed of rehabilitative applications focused on a strategy defined as transformation of flow. In this view, VR can be used to trigger a broad empowerment process within the flow experience induced by a high sense of presence. The link between its experiential and simulative capabilities may transform VR into the ultimate rehabilitative device. Nevertheless, further research is required to explore more in depth the link between cognitive processes, motor activities, presence and flow

    Children, Humanoid Robots and Caregivers

    Get PDF
    This paper presents developmental learning on a humanoid robot from human-robot interactions. We consider in particular teaching humanoids as children during the child's Separation and Individuation developmental phase (Mahler, 1979). Cognitive development during this phase is characterized both by the child's dependence on her mother for learning while becoming awareness of her own individuality, and by self-exploration of her physical surroundings. We propose a learning framework for a humanoid robot inspired on such cognitive development

    Vulnerabilities and responsibilities: dealing with monsters in computer security

    Get PDF
    Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.\ud \ud Design/methodology/approach – Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.\ud \ud Findings – It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.\ud \ud Research limitations/implications – The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.\ud \ud Practical implications – The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.\ud \ud Originality/value – This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk
    • 

    corecore