560,656 research outputs found

    Introduction to the Special Section on Social Computing and Social Internet of Things

    Get PDF
    The papers in this special section focus on social computing and the social Internet of Things (SIoT). SIoT is a new and latest paradigm that extends Internet of Things. This provides an ideal platform for interconnected devices and objects to effectively interact across social platforms for the betterment of the community on a whole. Any Social Internet of things based system means that the data is distributed in nature and focuses on the interest of a larger group of people than a particular individual. Thus social Internet of things have a wide scope and can be used to develop a wide range of applications that involves a group of people or community working towards accomplishing a common objective such as joint ventures, office setup, co-ownerships and so on. Social Computing may be defined as the study of the collaborative behavior of a group of computer users working on some common objectives

    The Current State of Normative Agent-Based Systems

    Get PDF
    Recent years have seen an increase in the application of ideas from the social sciences to computational systems. Nowhere has this been more pronounced than in the domain of multiagent systems. Because multiagent systems are composed of multiple individual agents interacting with each other many parallels can be drawn to human and animal societies. One of the main challenges currently faced in multiagent systems research is that of social control. In particular, how can open multiagent systems be configured and organized given their constantly changing structure? One leading solution is to employ the use of social norms. In human societies, social norms are essential to regulation, coordination, and cooperation. The current trend of thinking is that these same principles can be applied to agent societies, of which multiagent systems are one type. In this article, we provide an introduction to and present a holistic viewpoint of the state of normative computing (computational solutions that employ ideas based on social norms.) To accomplish this, we (1) introduce social norms and their application to agent-based systems; (2) identify and describe a normative process abstracted from the existing research; and (3) discuss future directions for research in normative multiagent computing. The intent of this paper is to introduce new researchers to the ideas that underlie normative computing and survey the existing state of the art, as well as provide direction for future research.Norms, Normative Agents, Agents, Agent-Based System, Agent-Based Simulation, Agent-Based Modeling

    The other side of the social web: A taxonomy for social information access

    Get PDF
    The power of the modern Web, which is frequently called the Social Web or Web 2.0, is frequently traced to the power of users as contributors of various kinds of contents through Wikis, blogs, and resource sharing sites. However, the community power impacts not only the production of Web content, but also the access to all kinds of Web content. A number of research groups worldwide explore what we call social information access techniques that help users get to the right information using "collective wisdom" distilled from actions of those who worked with this information earlier. This invited talk offers a brief introduction into this important research stream and reviews recent works on social information access performed at the University of Pittsburgh's PAWS Lab lead by the author. Copyright © 2012 by the Association for Computing Machinery, Inc. (ACM)

    Social Security Incidence under Uncertainty Assessing Italian Reforms

    Get PDF
    This paper analyzes the welfare effects of the Italian social security system in an economy with uncertainty on wages, financial market returns and life expectancy. The introduction of a pension system reproducing the Italian statutory scheme turns out to decrease ex-ante individual welfare, unless restrictions are assumed on retirement behavior. Overall, risk insurance effects of social security play a minor role in determining welfare variations. The new Italian NDC pension system is shown to yield a slight ex-ante welfare improvement from a purely risk-insurance perspective. This relative gain stems from risk diversification across working-life wages in computing benefits.social security reforms, uncertainty, risk insurance

    E-Voting in an ubicomp world: trust, privacy, and social implications

    Get PDF
    The advances made in technology have unchained the user from the desktop into interactions where access is anywhere, anytime. In addition, the introduction of ubiquitous computing (ubicomp) will see further changes in how we interact with technology and also socially. Ubicomp evokes a near future in which humans will be surrounded by “always-on,” unobtrusive, interconnected intelligent objects where information is exchanged seamlessly. This seamless exchange of information has vast social implications, in particular the protection and management of personal information. This research project investigates the concepts of trust and privacy issues specifically related to the exchange of e-voting information when using a ubicomp type system

    Computing in a social context : gender difference in participation

    Full text link
    The thesis reviews the literature relating to girls and computing within a framework which is structured around three specific questions. First, are there differences between girls and boys in their participation in class computing activities and/or in non-class computing activities? Second, do these differences in participation in computing activities have broader implications which justify the growing concern about the under-representation of girls? Third, wahy are girls under-represented in these activities? Although the available literature is predominantly descriptive, the underlying implicit theoretical model is essentially a social learning model. Girl\u27s differential participation is attributed to learned attitudes towards computing rathan to differences between girls and boys in general ability. These attitudes, which stress the masculine, mathematical, technological aspects of computing are developed through modelling, direct experience, intrinsic and extrinsic reinforcement and generalisation from pre-existing, attitudes to related curriculum areas. In the literature it is implicitly assumed that these attitudes underlie girl\u27s decisions to self-select out of computing activities. In this thesis predictions from a social learning model are complemented by predictions derived from expectancy-value, cognitive dissonance and self-perception theories. These are tested in three separate studies. Study one provides data from a pretest-posttest study of 24 children in a year four class learning BASIC. It examines pre- and posttest differences between girls and boys in computing experience, knowledge and achievement as well as the factors relating to computing achievement. Study two uses a pretest-posttest control group design to study the gender differences in the impact of the introduction of Logo into years 1, 3, 5 and 7 in both a coeducational and single-sex setting using a sample of 222 children from three schools. Study three utilises a larger sample of 1176 students, drawn from three secondary schools and five primary schools, enabling an evaluation of gender differences in relation to a wide range of class computing experiences and in a broader range of school contexts. The overall results are consistent across the three studies, supporting the contention that social factors, rather than ability differences influence girls\u27 participation and achievement in computing. The more global theoretical framework, drawing on social learning, expectancy-value, cognitive dissonance and self-perception theories, provides a more adequate explanation of gender differences in participation than does any one of these models

    Big Data Analytics and Application Deployment on Cloud Infrastructure

    Get PDF
    This dissertation describes a project began in October 2016. It was born from the collaboration between Mr.Alessandro Bandini and me, and has been developed under the supervision of professor Gianluigi Zavattaro. The main objective was to study, and in particular to experiment with, the cloud computing in general and its potentiality in the data elaboration field. Cloud computing is a utility-oriented and Internet-centric way of delivering IT services on demand. The first chapter is a theoretical introduction on cloud computing, analyzing the main aspects, the keywords, and the technologies behind clouds, as well as the reasons for the success of this technology and its problems. After the introduction section, I will briefly describe the three main cloud platforms in the market. During this project we developed a simple Social Network. Consequently in the third chapter I will analyze the social network development, with the initial solution realized through Amazon Web Services and the steps we took to obtain the final version using Google Cloud Platform with its charateristics. To conclude, the last section is specific for the data elaboration and contains a initial theoretical part that describes MapReduce and Hadoop followed by a description of our analysis. We used Google App Engine to execute these elaborations on a large dataset. I will explain the basic idea, the code and the problems encountered

    Legal and Ethical Implications of Mobile Live-Streaming Video Apps

    Get PDF
    The introduction of mobile apps such as Meerkat, Periscope, and Facebook Live has sparked enthusiasm for live-streaming video. This study explores the legal and ethical implications of mobile live-streaming video apps through a review of public-policy considerations and the computing literature as well as analyses of a mix of quantitative and qualitative user data. We identify lines of research inquiry for five policy challenges and two areas of the literature in which the impact of these apps is so far unaddressed. The detailed data gathered from these inquiries will significantly contribute to the design and development of tools, signals or affordances to address the concerns that our study identifies. We hope our work will help shape the fields of ubiquitous computing and collaborative and social computing, jurisprudence, public policy and applied ethics in the future

    Learning Sciences for Computing Education

    Get PDF
    his chapter discusses potential and current overlaps between the learning sciences and computing education research in their origins, theory, and methodology. After an introduction to learning sciences, the chapter describes how both learning sciences and computing education research developed as distinct fields from cognitive science. Despite common roots and common goals, the authors argue that the two fields are less integrated than they should be and recommend theories and methodologies from the learning sciences that could be used more widely in computing education research. The chapter selects for discussion one general learning theory from each of cognition (constructivism), instructional design (cognitive apprenticeship), social and environmental features of learning environments (sociocultural theory), and motivation (expectancy-value theory). Then the chapter describes methodology for design-based research to apply and test learning theories in authentic learning environments. The chapter emphasizes the alignment between design-based research and current research practices in computing education. Finally, the chapter discusses the four stages of learning sciences projects. Examples from computing education research are given for each stage to illustrate the shared goals and methods of the two fields and to argue for more integration between them
    corecore