9,593 research outputs found
Methodological development
Book description: Human-Computer Interaction draws on the fields of computer science, psychology, cognitive science, and organisational and social sciences in order to understand how people use and experience interactive technology. Until now, researchers have been forced to return to the individual subjects to learn about research methods and how to adapt them to the particular challenges of HCI. This is the first book to provide a single resource through which a range of commonly used research methods in HCI are introduced. Chapters are authored by internationally leading HCI researchers who use examples from their own work to illustrate how the methods apply in an HCI context. Each chapter also contains key references to help researchers find out more about each method as it has been used in HCI. Topics covered include experimental design, use of eyetracking, qualitative research methods, cognitive modelling, how to develop new methodologies and writing up your research
S-BPM in the Wild
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that were discovered during the respective study and lead to suggesting S-BPM novelties. For each case, the authors explain step-by-step how the story develops, and provide readers guidance by detailing the respective rationale. The studies covered are clustered according to three main S-BPM themes: Part I âBusiness Operation Supportâ documents approaches to the practical development of S-BPM solutions in various application domains and organizational settings, while Part II âConsultancy and Education Supportâ highlights cases that can help to train readers in S-BPM modeling and knowledge acquisition for S-BPM lifecycle iterations. It also refers to architecting S-BPM solutions for application cases based on hands-on experience. Part III âTechnical Execution Supportâ focuses on concepts for utilizing specific theories and technologies to execute S-BPM models. It also addresses how to create reference models for certain settings in the field. Lastly, the appendix covers all relevant aspects needed to grasp S-BPM modeling and apply it based on fundamental examples. Its format reconciles semantic precision with syntactic rigor.>Addressing the needs of developers, educators and practitioners, this book will help companies to learn from the experiences of first-time users and to develop systems that fit their business processes, explaining the latest key methodological and technological S-BPM developments in the fields of training, research and application
Recommended from our members
mHealth Research Applied to Regulated and Unregulated Behavioral Health Sciences
Behavioral scientists are developing new methods and frameworks that leverage mobile health technologies to optimize individual level behavior change. Pervasive sensors and mobile apps allow researchers to passively observe human behaviors âin the wildâ 24/7 which supports delivery of personalized interventions in the real-world environment. This is all possible because these technologies contain an incredible array of sensors that allow applications to constantly record user location and can contextualize current environmental conditions through barometers, thermometers, and ambient light sensors and can also capture audio and video of the user and their surroundings through multiple integrated high-definition cameras and microphones. These tools are a game changer in behavioral health research and, not surprisingly, introduce new ethical, regulatory/legal and social implications described in this article
Finding Streams in Knowledge Graphs to Support Fact Checking
The volume and velocity of information that gets generated online limits
current journalistic practices to fact-check claims at the same rate.
Computational approaches for fact checking may be the key to help mitigate the
risks of massive misinformation spread. Such approaches can be designed to not
only be scalable and effective at assessing veracity of dubious claims, but
also to boost a human fact checker's productivity by surfacing relevant facts
and patterns to aid their analysis. To this end, we present a novel,
unsupervised network-flow based approach to determine the truthfulness of a
statement of fact expressed in the form of a (subject, predicate, object)
triple. We view a knowledge graph of background information about real-world
entities as a flow network, and knowledge as a fluid, abstract commodity. We
show that computational fact checking of such a triple then amounts to finding
a "knowledge stream" that emanates from the subject node and flows toward the
object node through paths connecting them. Evaluation on a range of real-world
and hand-crafted datasets of facts related to entertainment, business, sports,
geography and more reveals that this network-flow model can be very effective
in discerning true statements from false ones, outperforming existing
algorithms on many test cases. Moreover, the model is expressive in its ability
to automatically discover several useful path patterns and surface relevant
facts that may help a human fact checker corroborate or refute a claim.Comment: Extended version of the paper in proceedings of ICDM 201
Clitics in the wild
This collective monograph is the first data-oriented, empirical in-depth study of the system of clitics on Bosnian, Croatian and Serbian. It fills the gap between the theoretical and normative literature by including solid data on variation found in dialects and spoken language and obtained from massive Web Corpora and speakersâ acceptability judgements. The authors investigate three primary sources of variation: inventory, placement and morphonological processes. A separate part of the book is dedicated to the phenomenon of clitic climbing, the major challenge for any syntactic theory. The theory of complexity serves as the explanation for the very diverse constraints on clitic climbing established in the empirical studies. It allows to construct a series of hierarchies where the factors relevant for predicting clitic climbing interact with each other. Thus, the study pushes our understanding of clitics away from fine-grained descriptions and syntactic generalisations towards a probabilistic modelling of syntax
Pioneers in the Wild West: Managing Data Collections
During the last few years, many academic libraries have accepted the challenge of helping
their users locate and acquire the numeric data they need. To meet their usersâ ever-increasing
need for data, librarians are purchasing data sets one at a time (âsmall dataâ). This service, though
important to our users, raises many issues in the areas of collection scope, acquisition procedures,
and discovery and access. The authors conducted a survey of data librarians in summer 2015 and
followed up by interviewing five data librarians in depth to report on how academic libraries
collect and manage small data and to explore the strengths and weaknesses of various approaches
- âŠ