136,315 research outputs found

    Shifting realities: Tron cyberspace and the “New” consciousness in 21st Century technoscapes

    Get PDF
    The existing direction of the (mis)use of information technologies founded on the deceptively secular rationalised heritage of scientism, arguably spells the increasing proximity to a dystopian nightmare that is far from mere fiction and imbued with the eternal religious symbolic of the battle between good and evil, as depicted in the 2010 science fiction film Tron: Legacy . The historical contextualisation of events in the film reveals the promise of the unfolding of an advanced sensibility alongside these concerns, in which fantasy and science converge to liberate humanity from an increasingly limiting worldview, and information and images serve as conduits to the sacred. The critical role information stands to play in humanity’s conscious evolution is outlined in the proposed development of a “dream systems theory”, where dreams capes are defined as interconnected systems of imaginal data

    Global perspectives on legacy systems

    Get PDF
    Summarises findings of two international workshops on legacy systems, held in conjunction with an EPSRC managed programme. Issues covered include the nature and dynamics of legacy systems, the co-evolution of software and organisations, issues around software as a technology (its engineering and its management), and organisational/people issues

    The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions

    Get PDF
    One of the great innovations of the modern world is the Smartphone app. The sheer multitude of available apps attests to their popularity and general ability to satisfy our wants and needs. The flip side of the functionality these apps offer is their potential for privacy invasion. Apps can, if granted permission, gather a vast amount of very personal and sensitive information. App developers might exploit the combination of human propensities and the design of the Android permission-granting interface to gain permission to access more information than they really need. This compromises personal privacy. The fact that the Android is the globally dominant phone means widespread privacy invasion is a real concern. We, and other researchers, have proposed alternatives to the Android permission-granting interface. The aim of these alternatives is to highlight privacy considerations more effectively during app installation: to ensure that privacy becomes part of the decision-making process. We report here on a study with 344 participants that compared the impact of a number of permission-granting interface proposals, including our own (called the COPING interface — COmprehensive PermIssioN Granting) and two Android interfaces. To conduct the comparison we carried out an online study with a mixed-model design. Our main finding is that the focus in these interfaces ought to be on improving the quality of the provided information rather than merely simplifying the interface. The intuitive approach is to reduce and simplify information, but we discovered that this actually impairs the quality of the decision. Our recommendation is that further investigation is required in order to find the “sweet spot” where understandability and comprehensiveness are maximised

    Modelling legacy telecommunications switching systems for interaction analysis

    Get PDF
    No abstract avaliabl
    • 

    corecore