85,151 research outputs found

    Making Personal Digital Assistants Aware of What They Do Not Know

    Get PDF
    Abstract Personal digital assistants (PDAs) are spoken (and typed) dialog systems that are expected to assist users without being constrained to a particular domain. Typically, it is possible to construct deep multi-domain dialog systems focused on a narrow set of head domains. For the long tail (or when the speech recognition is not correct) the PDA does not know what to do. Two common fallback approaches are to either acknowledge its limitation or show web search results. Either approach can severely undermine the user's trust in the PDA's intelligence if invoked at the wrong time. In this paper, we propose features that are helpful in predicting the right fallback response. We then use these features to construct dialog policies such that the PDA is able to correctly decide between invoking web search or acknowledging its limitation. We evaluate these dialog policies on real user logs gathered from a PDA, deployed to millions of users, using both offline (judged) and online (user-click) metrics. We demonstrate that our hybrid dialog policy significantly increases the accuracy of choosing the correct response, measured by analyzing click-rate in logs, and also enhances user satisfaction, measured by human evaluations of the replayed experience

    Big Brother is Listening to You: Digital Eavesdropping in the Advertising Industry

    Get PDF
    In the Digital Age, information is more accessible than ever. Unfortunately, that accessibility has come at the expense of privacy. Now, more and more personal information is in the hands of corporations and governments, for uses not known to the average consumer. Although these entities have long been able to keep tabs on individuals, with the advent of virtual assistants and “always-listening” technologies, the ease by which a third party may extract information from a consumer has only increased. The stark reality is that lawmakers have left the American public behind. While other countries have enacted consumer privacy protections, the United States has no satisfactory legal framework in place to curb data collection by greedy businesses or to regulate how those companies may use and protect consumer data. This Article contemplates one use of that data: digital advertising. Inspired by stories of suspiciously well-targeted advertisements appearing on social media websites, this Article additionally questions whether companies have been honest about their collection of audio data. To address the potential harms consumers may suffer as a result of this deficient privacy protection, this Article proposes a framework wherein companies must acquire users\u27 consent and the government must ensure that businesses do not use consumer information for harmful purposes

    Teachers' TV second stage impact study research : qualitative research

    Get PDF

    College Students' Credibility Judgments in the Information-Seeking Process

    Get PDF
    Part of the Volume on Digital Media, Youth, and CredibilityThis chapter presents an in-depth exploration of how college students identify credible information in everyday information-seeking tasks. The authors find that credibility assessment is an over-time process rather than a discrete evaluative event. Moreover, the context in which credibility assessment occurs is crucial to understand because it affects both the level of effort as well as the strategies that people use to evaluate credibility. College students indicate that although credibility was an important consideration during information seeking, they often compromised information credibility for speed and convenience, especially when the information sought was less consequential

    Researching mobile learning - interim report to Becta. Period: April-December 2007

    Get PDF

    Reading with new tools: An evaluation of Personal Digital Assistants as tools for reading course materials

    Get PDF
    Lightweight, palmtop devices such as personal digital assistants (PDAs) can now be used for reading electronic text, opening up their potential as learning tools. This paper reports a study that evaluated the use of PDAs for reading course materials by students on an Open University master's course. The research is grounded in activity theory, which provides a useful framework for examining how the introduction of a new tool changes an existing activity. Student perceptions of the possibilities and constraints of the PDA, as determined by questionnaires and interviews, reveal the impact the new tool had upon reading. The PDA constrained reading with limitations such as the small screen size, new requirements for navigating through the text and awkward methods for taking notes. These conditions made it difficult for students to skim‐read the text, to move back and forth within the document and to interact with the text as easily as they could with paper. Nevertheless, students welcomed the opportunity to have the course materials on a portable, lightweight device that could be used at any time and in any place. This made it easier to fit the reading activity around the various other activities in which students were involved In addition, the PDA was used in conjunction with existing tools, such as the printed version of the course materials and the desktop computer. Therefore, it was not seen to replace paper but rather to extend and complement it. The findings are discussed using concepts from activity theory to interpret how the new tool modified the reading activity

    Information Outlook, July 2006

    Get PDF
    Volume 10, Issue 7https://scholarworks.sjsu.edu/sla_io_2006/1006/thumbnail.jp

    Teachers TV : education analysis report

    Get PDF

    ICT in schools 2008-11 : an evaluation of information and communication technology education in schools in England 2008–11

    Get PDF
    • 

    corecore