38,520 research outputs found

    Articulation(s) of Culture(s): Mobilizing knowledge, ecological justice, and media convergence

    Get PDF
    This paper draws on articulation(s) as a multi-method countermethodology in the design of educational research. We use this form of critical\ud inquiry to examine ecological literacies and digital epistemologies associated with\ud Dow’s 2006 worldwide advertising campaign, “The Human Element”.\ud Articulation(s) draw from research that continues to evolve reflexively and that\ud openly questions deterministic institutional explanations. Our interpretation of\ud articulation(s) include(s) critical processes for gathering, analyzing, and\ud interpreting data. A critique of Dow‘s “The Human Element” ad is provided as an\ud example of how multimodal forms of information have been mobilized,\ud (re)presented, (re)mixed, and (re)mediated using media convergence, how various\ud points of view intersect formations of everyday digital media networks, and how\ud communication practices entail subtle and complex relationships associated with\ud social and political meanings and values. Our focus is on social justice issues of\ud ecology as mobilized through media convergence. We argue that an integrated and\ud negotiated approach to critical inquiry linking ecological justice through education\ud can help researchers, teachers, and students analyze conditions of culture(s) within\ud the contexts of complex political and social conditions that are prevalent in most\ud societies

    Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

    Full text link
    Smartphones have become the most pervasive devices in people's lives, and are clearly transforming the way we live and perceive technology. Today's smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as accelerometer, gyroscope, microphone, and camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this paper, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the current state-of-the-art on the topic. We also outline novel research challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN

    Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science

    Get PDF
    e-Science projects face a difficult challenge in providing access to valuable computational resources, data and software to large communities of distributed users. Oil the one hand, the raison d'etre of the projects is to encourage members of their research communities to use the resources provided. Oil the other hand, the threats to these resources from online attacks require robust and effective Security to mitigate the risks faced. This raises two issues: ensuring that (I) the security mechanisms put in place are usable by the different users of the system, and (2) the security of the overall system satisfies the security needs of all its different stakeholders. A failure to address either of these issues call seriously jeopardise the success of e-Science projects.The aim of this paper is to firstly provide a detailed understanding of how these challenges call present themselves in practice in the development of e-Science applications. Secondly, this paper examines the steps that projects can undertake to ensure that security requirements are correctly identified, and security measures are usable by the intended research community. The research presented in this paper is based Oil four case studies of c-Science projects. Security design traditionally uses expert analysis of risks to the technology and deploys appropriate countermeasures to deal with them. However, these case studies highlight the importance of involving all stakeholders in the process of identifying security needs and designing secure and usable systems.For each case study, transcripts of the security analysis and design sessions were analysed to gain insight into the issues and factors that surround the design of usable security. The analysis concludes with a model explaining the relationships between the most important factors identified. This includes a detailed examination of the roles of responsibility, motivation and communication of stakeholders in the ongoing process of designing usable secure socio-technical systems such as e-Science. (C) 2007 Elsevier Ltd. All rights reserved

    Creating personas for political and social consciousness in HCI design

    Get PDF
    Personas have become an important tool for Human-Computer Interaction professionals. However, they are not immune to limitations and critique, including stereotyping. We suggest that while some of the criticisms to personas are important, the use of personas is open to them in part because of an unquestioned focus on explicating user needs and goals in traditional persona research and creation. This focus, while helping designers, obscures some other potentially relevant aspects. In particular, when the goal of the product or software being designed is associated with social and political goals rather than with bringing a product to the market, it may be relevant to focus personas on political aspirations, social values and the will or capacity of personas to take action. We argue that it is possible when producing personas (and associated scenarios) to partially move away from representing needs and embrace personas which more explicitly represent political or social beliefs and values. We also suggest that a phenomenographic approach to user data analysis is one way to achieve this. We provide empirical evidence for our position from two large-scale European projects, the first one in the area of Social Innovation and the second in the area of eParticipation

    Supporting requirement analysis through requirement rationale capture and traceability

    Get PDF
    Manufacturers of complex engineering systems are increasingly recognising the importance of identifying, understanding and satisfying stakeholders’ needs in order to produce high-quality products. The analysis of these needs into a formal requirement specification is a time consuming and complex process for which little support is offered to design engineers. This can result in requirements being poorly documented and with little or no traceability to their origins. This dissertation reports an investigation to understand the process of requirement analysis and develop computational support for this important phase of the engineering design process. The key argument of this research is that the existing practice of requirement analysis can be improved by providing better support for requirement rationale capture and enabling greater requirement traceability. The research consisted of three main phases. In the first phase, literature related to the requirement analysis was reviewed and led to the creation of a requirement analysis model. In the second phase, the practices of a global engineering organisation were investigated using document analysis as well as interviews with and shadowing of company engineers. The research found that requirement analysis lacks support for requirement rationale capture and traceability. On the basis of this result, a workflow for requirement analysis was proposed. The workflow involves the use of the Decision Rationale editor tool to capture requirement rationale and enable requirement traceability. In the third phase, four studies were undertaken to validate the workflow. These studies investigated: 1) application of the workflow to requirements generated through reverse-engineering a low-complexity consumer product; 2) requirements extracted from documents produced by a graduate engineering team during a twelve-week project; 3) the requirement analysis process undertaken by two graduate engineering teams during twelve-week projects; and 4) requirements for a new aircraft engine development programme. The studies showed that the proposed workflow is feasible, practical, and scalable when applied to engineering projects. Requirement rationales were classified into categories, namely product design and use, pre-existing rationale, and project management. In order to fully support requirement traceability, it was found that it is important to make traceable four types of requirement transformations: newly introduced, copied, updated, and deleted requirements. The research demonstrated that the proposed workflow is a successful proof-of-concept and can lead to improved quality of requirement documentation and requirement traceability.Open Acces
    • 

    corecore