229,339 research outputs found

    Characterizing HCI Research in China: Streams, Methodologies and Future Directions

    Get PDF
    This position paper takes the first step to attempt to present the initial characterization of HCI research in China. We discuss the current streams and methodologies of Chinese HCI research based on two well-known HCI theories: Micro/Marco-HCI and the Three Paradigms of HCI. We evaluate the discussion with a survey of Chinese publications at CHI 2019, which shows HCI research in China has less attention to Macro-HCI topics and the third paradigms of HCI (Phenomenologically situated Interaction). We then propose future HCI research directions such as paying more attention to Macro-HCI topics and third paradigm of HCI, combining research methodologies from multiple HCI paradigms, including emergent users who have less access to technology, and addressing the cultural dimensions in order to provide better technical solutions and support

    Human computer interaction for international development: past present and future

    Get PDF
    Recent years have seen a burgeoning interest in research into the use of information and communication technologies (ICTs) in the context of developing regions, particularly into how such ICTs might be appropriately designed to meet the unique user and infrastructural requirements that we encounter in these cross-cultural environments. This emerging field, known to some as HCI4D, is the product of a diverse set of origins. As such, it can often be difficult to navigate prior work, and/or to piece together a broad picture of what the field looks like as a whole. In this paper, we aim to contextualize HCI4D—to give it some historical background, to review its existing literature spanning a number of research traditions, to discuss some of its key issues arising from the work done so far, and to suggest some major research objectives for the future

    Agricultural information dissemination using ICTs: a review and analysis of information dissemination models in China

    Get PDF
    Open Access funded by China Agricultural UniversityOver the last three decades, China’s agriculture sector has been transformed from the traditional to modern practice through the effective deployment of Information and Communication Technologies (ICTs). Information processing and dissemination have played a critical role in this transformation process. Many studies in relation to agriculture information services have been conducted in China, but few of them have attempted to provide a comprehensive review and analysis of different information dissemination models and their applications. This paper aims to review and identify the ICT based information dissemination models in China and to share the knowledge and experience in applying emerging ICTs in disseminating agriculture information to farmers and farm communities to improve productivity and economic, social and environmental sustainability. The paper reviews and analyzes the development stages of China’s agricultural information dissemination systems and different mechanisms for agricultural information service development and operations. Seven ICT-based information dissemination models are identified and discussed. Success cases are presented. The findings provide a useful direction for researchers and practitioners in developing future ICT based information dissemination systems. It is hoped that this paper will also help other developing countries to learn from China’s experience and best practice in their endeavor of applying emerging ICTs in agriculture information dissemination and knowledge transfer

    Spam

    Get PDF
    With the advent of the electronic mail system in the 1970s, a new opportunity for direct marketing using unsolicited electronic mail became apparent. In 1978, Gary Thuerk compiled a list of those on the Arpanet and then sent out a huge mailing publicising Digital Equipment Corporation (DEC—now Compaq) systems. The reaction from the Defense Communications Agency (DCA), who ran Arpanet, was very negative, and it was this negative reaction that ensured that it was a long time before unsolicited e-mail was used again (Templeton, 2003). As long as the U.S. government controlled a major part of the backbone, most forms of commercial activity were forbidden (Hayes, 2003). However, in 1993, the Internet Network Information Center was privatized, and with no central government controls, spam, as it is now called, came into wider use. The term spam was taken from the Monty Python Flying Circus (a UK comedy group) and their comedy skit that featured the ironic spam song sung in praise of spam (luncheon meat)—“spam, spam, spam, lovely spam”—and it came to mean mail that was unsolicited. Conversely, the term ham came to mean e-mail that was wanted. Brad Templeton, a UseNet pioneer and chair of the Electronic Frontier Foundation, has traced the first usage of the term spam back to MUDs (Multi User Dungeons), or real-time multi-person shared environment, and the MUD community. These groups introduced the term spam to the early chat rooms (Internet Relay Chats). The first major UseNet (the world’s largest online conferencing system) spam sent in January 1994 and was a religious posting: “Global alert for all: Jesus is coming soon.” The term spam was more broadly popularised in April 1994, when two lawyers, Canter and Siegel from Arizona, posted a message that advertized their information and legal services for immigrants applying for the U.S. Green Card scheme. The message was posted to every newsgroup on UseNet, and after this incident, the term spam became synonymous with junk or unsolicited e-mail. Spam spread quickly among the UseNet groups who were easy targets for spammers simply because the e-mail addresses of members were widely available (Templeton, 2003)

    Sharing, privacy and trust issues for photo collections

    Get PDF
    Digital libraries are quickly being adopted by the masses. Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible collections. However, users may not be fully aware of the potential privacy implications of submitting their documents to a digital library, and may hold misconceptions of the technological support for preserving their privacy. We present results from 18 autoethnographic investigations and 19 observations / interviews into privacy issues that arise when people make their personal photo collections available online. The Adams' privacy model is used to discuss the findings according to information receiver, information sensitivity, and information usage. Further issues of trust and ad hoc poorly supported protection strategies are presented. Ultimately while photographic data is potentially highly sensitive, the privacy risks are often hidden and the protection mechanisms are limited

    Mapping Big Data into Knowledge Space with Cognitive Cyber-Infrastructure

    Full text link
    Big data research has attracted great attention in science, technology, industry and society. It is developing with the evolving scientific paradigm, the fourth industrial revolution, and the transformational innovation of technologies. However, its nature and fundamental challenge have not been recognized, and its own methodology has not been formed. This paper explores and answers the following questions: What is big data? What are the basic methods for representing, managing and analyzing big data? What is the relationship between big data and knowledge? Can we find a mapping from big data into knowledge space? What kind of infrastructure is required to support not only big data management and analysis but also knowledge discovery, sharing and management? What is the relationship between big data and science paradigm? What is the nature and fundamental challenge of big data computing? A multi-dimensional perspective is presented toward a methodology of big data computing.Comment: 59 page

    Exploring personality-targeted UI design in online social participation systems

    Get PDF
    We present a theoretical foundation and empirical findings demonstrating the effectiveness of personality-targeted design. Much like a medical treatment applied to a person based on his specific genetic profile, we argue that theory-driven, personality-targeted UI design can be more effective than design applied to the entire population. The empirical exploration focused on two settings, two populations and two personality traits: Study 1 shows that users' extroversion level moderates the relationship between the UI cue of audience size and users' contribution. Study 2 demonstrates that the effectiveness of social anchors in encouraging online contributions depends on users' level of emotional stability. Taken together, the findings demonstrate the potential and robustness of the interactionist approach to UI design. The findings contribute to the HCI community, and in particular to designers of social systems, by providing guidelines to targeted design that can increase online participation. Copyright © 2013 ACM

    Motion in place: a case study of archaeological reconstruction using motion capture

    Get PDF
    Human movement constitutes a fundamental part of the archaeological process, and of any interpretationof a site’s usage; yet there has to date been little or no consideration of how movement observed (incontemporary situations) and inferred (in archaeological reconstruction) can be documented. This paper reports on the Motion in Place Platform project, which seeks to use motion capture hardware and data totest human responses to Virtual Reality (VR) environments and their real-world equivalents using round houses of the Southern British Iron Age which have been both modelled in 3D and reconstructed in the present day as a case study. This allows us to frame questions about the assumptions which are implicitlyhardwired into VR presentations of archaeology and cultural heritage in new ways. In the future, this will lead to new insights into how VR models can be constructed, used and transmitted
    corecore