130,313 research outputs found

    Evaluating Collaborative Information Seeking Interfaces with a Search-Oriented Inspection Method and Re-framed Information Seeking Theory

    No full text
    Despite the many implicit references to the social contexts of search within Information Seeking and Retrieval research, there has been relatively little work that has specifically investigated the additional requirements for collaborative information seeking interfaces. Here, we re-assess a recent analytical inspection framework, designed for individual information seeking, and then apply it to evaluate a recent collaborative information seeking interface: SearchTogether. The framework was built upon two models of solitary information seeking, and so as part of the re-assessment we first re-frame the models for collaborative contexts. We re-frame a model of search tactics, providing revised definitions that consider known collaborators. We then re-frame a model of user profiles to analyse support for different group dynamics. After presenting an analysis of SearchTogether, we reflect on its accuracy, showing that the framework identified 8 known truths, 8 new insights, and no known-to-be-untrue insights into the design. We conclude that the framework a) can still be applied to collaborative information seeking interfaces; b) can successfully produce additional requirements for collaborative information seeking interfaces; and c) can successfully model different dynamics of collaborating searchers

    USBcat - Towards an Intrusion Surveillance Toolset

    Full text link
    This paper identifies an intrusion surveillance framework which provides an analyst with the ability to investigate and monitor cyber-attacks in a covert manner. Where cyber-attacks are perpetrated for the purposes of espionage the ability to understand an adversary's techniques and objectives are an important element in network and computer security. With the appropriate toolset, security investigators would be permitted to perform both live and stealthy counter-intelligence operations by observing the behaviour and communications of the intruder. Subsequently a more complete picture of the attacker's identity, objectives, capabilities, and infiltration could be formulated than is possible with present technologies. This research focused on developing an extensible framework to permit the covert investigation of malware. Additionally, a Universal Serial Bus (USB) Mass Storage Device (MSD) based covert channel was designed to enable remote command and control of the framework. The work was validated through the design, implementation and testing of a toolset.Comment: In Proceedings AIDP 2014, arXiv:1410.322

    Visual analytics for supply network management: system design and evaluation

    Full text link
    We propose a visual analytic system to augment and enhance decision-making processes of supply chain managers. Several design requirements drive the development of our integrated architecture and lead to three primary capabilities of our system prototype. First, a visual analytic system must integrate various relevant views and perspectives that highlight different structural aspects of a supply network. Second, the system must deliver required information on-demand and update the visual representation via user-initiated interactions. Third, the system must provide both descriptive and predictive analytic functions for managers to gain contingency intelligence. Based on these capabilities we implement an interactive web-based visual analytic system. Our system enables managers to interactively apply visual encodings based on different node and edge attributes to facilitate mental map matching between abstract attributes and visual elements. Grounded in cognitive fit theory, we demonstrate that an interactive visual system that dynamically adjusts visual representations to the decision environment can significantly enhance decision-making processes in a supply network setting. We conduct multi-stage evaluation sessions with prototypical users that collectively confirm the value of our system. Our results indicate a positive reaction to our system. We conclude with implications and future research opportunities.The authors would like to thank the participants of the 2015 Businessvis Workshop at IEEE VIS, Prof. Benoit Montreuil, and Dr. Driss Hakimi for their valuable feedback on an earlier version of the software; Prof. Manpreet Hora for assisting with and Georgia Tech graduate students for participating in the evaluation sessions; and the two anonymous reviewers for their detailed comments and suggestions. The study was in part supported by the Tennenbaum Institute at Georgia Tech Award # K9305. (K9305 - Tennenbaum Institute at Georgia Tech Award)Accepted manuscrip

    Artefact Ecologies: Supporting Embodied Meeting Practices with Distance Access

    Get PDF
    Frameworks such as activity theory, distributed cognition and structuration theory, amongst others, have shown that detailed study of contextual settings where users work (or live) can help the design of interactive systems. However, these frameworks do not adequately focus on accounting for the materiality (and embodiment) of the contextual settings. Within the IST-EU funded AMIDA project (Augmented Multiparty Interaction with Distance Access) we are looking into supporting meeting practices with distance access. Meetings are inherently embodied in everyday work life and that material artefacts associated with meeting practices play a critical role in their formation. Our eventual goal is to develop a deeper understanding of the dynamic and embodied nature of meeting practices and designing technologies to support these. In this paper we introduce the notion of "artefact ecologies" as a conceptual base for understanding embodied meeting practices with distance access. Artefact ecologies refer to a system consisting of different digital and physical artefacts, people, their work practices and values and lays emphasis on the role artefacts play in embodiment, work coordination and supporting remote awareness. In the end we layout our plans for designing technologies for supporting embodied meeting practices within the AMIDA project. \u

    Modelling an End to End Supply Chain system Using Simulation

    Get PDF
    Within the current uncertain environment industries are predominantly faced with various challenges resulting in greater need for skilled management and adequate technique as well as tools to manage Supply Chains (SC) efficiently. Derived from this observation is the need to develop a generic/reusable modelling framework that would allow firms to analyse their operational performance over time (Mackulak and Lawrence 1998, Beamon and Chen 2001, Petrovic 2001, Lau et al. 2008, Khilwani et al. 2011, Cigollini et al. 2014). However for this to be effectively managed the simulation modelling efforts should be directed towards identifying the scope of the SC and the key processes performed between players. Purpose: The research attempts to analyse trends in the field of supply chain modelling using simulation and provide directions for future research by reviewing existing Operations Research/Operations Management (OR/OM) literature. Structural and operational complexities as well as different business processes within various industries are often limiting factors during modelling efforts. Successively, this calls for the end to end (E2E) SC modelling framework where the generic processes, related policies and techniques could be captured and supported by the powerful capabilities of simulation. Research Approach: Following Mitroff’s (1974) scientific inquiry model and Sargent (2011) this research will adopt simulation methodology and focus on systematic literature review in order to establish generic OR processes and differentiate them from those which are specific to certain industries. The aim of the research is provide a clear and informed overview of the existing literature in the area of supply chain simulation. Therefore through a profound examination of the selected studies a conceptual model will be design based on the selection of the most commonly used SC Processes and simulation techniques used within those processes. The description of individual elements that make up SC processes (Hermann and Pundoor 2006) will be defined using building blocks, which are also known as Process Categories. Findings and Originality: This paper presents an E2E SC simulation conceptual model realised through means of systematic literature review. Practitioners have adopted the term E2E SC while this is not extensively featured within academic literature. The existing SC studies lack generality in regards to capturing the entire SC within one methodological framework, which this study aims to address. Research Impact: A systematic review of the supply chain and simulation literature takes an integrated and holistic assessment of an E2E SC, from market-demand scenarios through order management and planning processes, and on to manufacturing and physical distribution. Thus by providing significant advances in understanding of the theory, methods used and applicability of supply chain simulation, this paper will further develop a body of knowledge within this subject area. Practical Impact: The paper will empower practitioners’ knowledge and understanding of the supply chain processes characteristics that can be modelled using simulation. Moreover it will facilitate a selection of specific data required for the simulation in accordance to the individual needs of the industry

    Ontology-driven conceptual modeling: A'systematic literature mapping and review

    Get PDF
    All rights reserved. Ontology-driven conceptual modeling (ODCM) is still a relatively new research domain in the field of information systems and there is still much discussion on how the research in ODCM should be performed and what the focus of this research should be. Therefore, this article aims to critically survey the existing literature in order to assess the kind of research that has been performed over the years, analyze the nature of the research contributions and establish its current state of the art by positioning, evaluating and interpreting relevant research to date that is related to ODCM. To understand and identify any gaps and research opportunities, our literature study is composed of both a systematic mapping study and a systematic review study. The mapping study aims at structuring and classifying the area that is being investigated in order to give a general overview of the research that has been performed in the field. A review study on the other hand is a more thorough and rigorous inquiry and provides recommendations based on the strength of the found evidence. Our results indicate that there are several research gaps that should be addressed and we further composed several research opportunities that are possible areas for future research
    corecore