1,796 research outputs found
Human-Machine Communication: Complete Volume. Volume 3. Diffusion of Human-Machine Communication During and After the COVID-19 Pandemic
This is the complete volume of HMC Volume 3. Diffusion of Human-Machine Communication During and After the COVID-19 Pandemi
Proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET 2013)
"This book contains the proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET) 2013 which was held on 16.-17.September 2013 in Paphos (Cyprus) in conjunction with the EC-TEL conference. The workshop and hence the proceedings are divided in two parts: on Day 1 the EuroPLOT project and its results are introduced, with papers about the specific case studies and their evaluation. On Day 2, peer-reviewed papers are presented which address specific topics and issues going beyond the EuroPLOT scope. This workshop is one of the deliverables (D 2.6) of the EuroPLOT project, which has been funded from November 2010 â October 2013 by the Education, Audiovisual and Culture Executive Agency (EACEA) of the European Commission through the Lifelong Learning Programme (LLL) by grant #511633. The purpose of this project was to develop and evaluate Persuasive Learning Objects and Technologies (PLOTS), based on ideas of BJ Fogg. The purpose of this workshop is to summarize the findings obtained during this project and disseminate them to an interested audience. Furthermore, it shall foster discussions about the future of persuasive technology and design in the context of learning, education and teaching. The international community working in this area of research is relatively small. Nevertheless, we have received a number of high-quality submissions which went through a peer-review process before being selected for presentation and publication. We hope that the information found in this book is useful to the reader and that more interest in this novel approach of persuasive design for teaching/education/learning is stimulated. We are very grateful to the organisers of EC-TEL 2013 for allowing to host IWEPLET 2013 within their organisational facilities which helped us a lot in preparing this event. I am also very grateful to everyone in the EuroPLOT team for collaborating so effectively in these three years towards creating excellent outputs, and for being such a nice group with a very positive spirit also beyond work. And finally I would like to thank the EACEA for providing the financial resources for the EuroPLOT project and for being very helpful when needed. This funding made it possible to organise the IWEPLET workshop without charging a fee from the participants.
Recommended from our members
We have to do this and that? You must be joking: Constructing and responding to paradox through humour
This paper adopts a practice approach to paradox, examining the role of micro-practices in shaping constructions of and responses to paradox. Our approach is inductively motivated. During an ethnographic study of an organization implementing paradoxical goals we noticed a strong incidence of humor, joking and laughter. Examining this practice closely, we realized that humor was used to surface, bring attention to, and make communicable experience of paradox in the moment by drawing out some specific contradiction in their work. Humor thus allowed actors to socially construct paradox, as well as - in interaction with others â construct potential responses to the multiple small incidences of paradox in their everyday work. In doing so, humor cast the interactional dynamics that were integral in constructing two response paths: (i) âentrenching a responseâ, whereby an existing response was affirmed, thereby continuing on a particular response path, and (ii) âshifting a responseâ, whereby actors moved from one response to paradox to another, thereby altering how the team collectively responded to paradoxical issues. Drawing on these findings, we reconceptualize paradox as a characteristic of everyday life, which is constructed and responded to in the moment
The Forgotten Right "to Be Secure"
Surveillance methods in the United States operate under the general principle that âuse precedes regulation.â While the general principle of âuse precedes regulationâ is widely understood, its societal costs have yet to be fully realized. In the period between âinitial useâ and âregulation,â government actors can utilize harmful investigative techniques with relative impunity. Assuming a given technique is ultimately subjected to regulation, its preregulation uses are practically exempted from any such regulation due to qualified immunity (for the actor and municipality) and the exclusionary ruleâs good faith exception (for any resulting evidence). This expectation of impunity invites strategic government actors to make frequent and arbitrary uses of harmful investigative techniques during preregulation periods. Regulatory delays tend to run long (often a decade or more) and are attributable in no small part to the stalling methods of law enforcement (through assertions of privilege, deceptive funding requests, and strategic sequencing of criminal investigations). While the societal costs of regulatory delay are high, rising, and difficult to control, the conventional efforts to shorten regulatory delays (through expedited legislation and broader rules of Article III standing) have proved ineffective. This Article introduces an alternative method to control the costs of regulatory delay: locating rights to be âprotectedâ and âfree from fearâ in the âto be secureâ text of the Fourth Amendment. Courts and most commentators interpret the Fourth Amendment to safeguard a mere right to be âsparedâ unreasonable searches and seizures. A study of the âto be secureâ text, however, suggests that the Amendment can be read more broadly: to guarantee a right to be âprotectedâ against unreasonable searches and seizures, and possibly a right to be âfree from fearâ against such government action. Support for these broad readings of âto be secureâ is found in the original meaning of âsecure,â the Amendmentâs structure, and founding-era discourse regarding searches and seizures. The rights to be âprotectedâ and âfree from fearâ can be adequately safeguarded by a judicially-created rule against government âadoptionâ of an investigative method that constitutes an unregulated and unreasonable search or seizure. The upshot of this Fourth Amendment rule against âadoptionâ is earlier standing to challenge the constitutionality of concealed investigative techniques. Earlier access to courts invites earlier j
Sensitive Calligraphy Robot & Design Review Creation
The calligraphy robot is a proof-of-concept platform for a high precision combined control system with position and force control. The platform is a gantry system and an end-effector with series elastic actuators. PVT control was utilized to achieve smooth curves without noticeable shaking or jagged lines. This design has potential implications for surgical robots. The Cornell Cup competition required design reviews to mimic a professional engineering process. However, there is a lack of helpful guides to critically approaching the creation of a design review. The Cornell Cup reviews are the analytical basis for a study of choices made during creation and the forces that influence those choices which culminated in a handout guide to help other students improve their design reviews
Human-Machine Communication: Complete Volume. Volume 4
This is the complete volume of HMC Volume 4
Framing in the Wild: Expressions of Decisions in Real-World Situations
An important phenomenon in the study of behavioral decision-making is the surprising finding that people who are given choices framed in positive vs. negative terms exhibit different preferences. This study focused on a newer question: what factors influence the selection of frames by decision-makers? The development of a decision frame that has positive or negative overall value is a process that can be influenced by a number of factors. Several theoretical approaches to decision-making were examined with respect to making predictions regarding factors that would influence frame selection: mental accounting, task complexity, mental workload, expertise, regulatory focus, and message formulation goals. Predictions were extrapolated from each of these approaches and tested with data from a real-world decision-making situation - planning conversations from a set of NASA mission control meetings. The planning statements were transcribed and coded for frame selection and other behavioral/situational elements that were predicted to be related to frame selection. Mental accounting was not found to be related to frame selection. A predominance of positive framing, along with minimal use of negations, provided some support for the influence of positive expression bias. There was also evidence for aspiration mode impacting the selection of frame. The strongest predictor of frame selection, however, was an increase in expertise that occurred over the course of the mission. Between early and late mission phases, there was a significant decrease in positive framing, and this decrease interacted with task complexity. Based on these results, the hypothesis was proposed that decision-makers use opportunities for action as a means to frame decisions
Common Law Property Metaphors on the Internet: The Real Problem with the Doctrine of Cybertrespass
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to examine the implications of transposing property metaphors to the world of the Internet, characterized by the absence of resource rivalry and the reality of positive value enhancement through increased usage (i.e., a network effect, whereby participation in use by many is a condition for value in use by any). It is argued that the transposition of proprietary concepts to the Internet is done for purely instrumental reasonsâreasons that derive neither from the nature of the resource nor its usage. The paper then evaluates whether such an instrumental use of proprietary concepts on the Internet has any effect on the meaning ordinarily attributed to the concept of property and the identification of property as an independent institution of moral significance. It concludes by showing that the relative neglect that doctrines such as cybertrespass have for identifying the boundaries of the res over which the property right is to operate, is capable of undermining the minimum core of any understanding of property as an independent institution
Common Law Property Metaphors on the Internet: The Real Problem with the Doctrine of Cybertrespass
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to examine the implications of transposing property metaphors to the world of the Internet, characterized by the absence of resource rivalry and the reality of positive value enhancement through increased usage (i.e., a network effect, whereby participation in use by many is a condition for value in use by any). It is argued that the transposition of proprietary concepts to the Internet is done for purely instrumental reasons--reasons that derive neither from the nature of the resource nor its usage. The paper then evaluates whether such an instrumental use of proprietary concepts on the Internet has any effect on the meaning ordinarily attributed to the concept of property and the identification of property as an independent institution of moral significance. It concludes by showing that the relative neglect that doctrines such as cybertrespass have for identifying the boundaries of the res over which the property right is to operate, is capable of undermining the minimum core of any understanding of property as an independent institution
- âŠ