1,796 research outputs found

    Human-Machine Communication: Complete Volume. Volume 3. Diffusion of Human-Machine Communication During and After the COVID-19 Pandemic

    Get PDF
    This is the complete volume of HMC Volume 3. Diffusion of Human-Machine Communication During and After the COVID-19 Pandemi

    Proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET 2013)

    Get PDF
    "This book contains the proceedings of the International Workshop on EuroPLOT Persuasive Technology for Learning, Education and Teaching (IWEPLET) 2013 which was held on 16.-17.September 2013 in Paphos (Cyprus) in conjunction with the EC-TEL conference. The workshop and hence the proceedings are divided in two parts: on Day 1 the EuroPLOT project and its results are introduced, with papers about the specific case studies and their evaluation. On Day 2, peer-reviewed papers are presented which address specific topics and issues going beyond the EuroPLOT scope. This workshop is one of the deliverables (D 2.6) of the EuroPLOT project, which has been funded from November 2010 – October 2013 by the Education, Audiovisual and Culture Executive Agency (EACEA) of the European Commission through the Lifelong Learning Programme (LLL) by grant #511633. The purpose of this project was to develop and evaluate Persuasive Learning Objects and Technologies (PLOTS), based on ideas of BJ Fogg. The purpose of this workshop is to summarize the findings obtained during this project and disseminate them to an interested audience. Furthermore, it shall foster discussions about the future of persuasive technology and design in the context of learning, education and teaching. The international community working in this area of research is relatively small. Nevertheless, we have received a number of high-quality submissions which went through a peer-review process before being selected for presentation and publication. We hope that the information found in this book is useful to the reader and that more interest in this novel approach of persuasive design for teaching/education/learning is stimulated. We are very grateful to the organisers of EC-TEL 2013 for allowing to host IWEPLET 2013 within their organisational facilities which helped us a lot in preparing this event. I am also very grateful to everyone in the EuroPLOT team for collaborating so effectively in these three years towards creating excellent outputs, and for being such a nice group with a very positive spirit also beyond work. And finally I would like to thank the EACEA for providing the financial resources for the EuroPLOT project and for being very helpful when needed. This funding made it possible to organise the IWEPLET workshop without charging a fee from the participants.

    The Forgotten Right "to Be Secure"

    Get PDF
    Surveillance methods in the United States operate under the general principle that “use precedes regulation.” While the general principle of “use precedes regulation” is widely understood, its societal costs have yet to be fully realized. In the period between “initial use” and “regulation,” government actors can utilize harmful investigative techniques with relative impunity. Assuming a given technique is ultimately subjected to regulation, its preregulation uses are practically exempted from any such regulation due to qualified immunity (for the actor and municipality) and the exclusionary rule’s good faith exception (for any resulting evidence). This expectation of impunity invites strategic government actors to make frequent and arbitrary uses of harmful investigative techniques during preregulation periods. Regulatory delays tend to run long (often a decade or more) and are attributable in no small part to the stalling methods of law enforcement (through assertions of privilege, deceptive funding requests, and strategic sequencing of criminal investigations). While the societal costs of regulatory delay are high, rising, and difficult to control, the conventional efforts to shorten regulatory delays (through expedited legislation and broader rules of Article III standing) have proved ineffective. This Article introduces an alternative method to control the costs of regulatory delay: locating rights to be “protected” and “free from fear” in the “to be secure” text of the Fourth Amendment. Courts and most commentators interpret the Fourth Amendment to safeguard a mere right to be “spared” unreasonable searches and seizures. A study of the “to be secure” text, however, suggests that the Amendment can be read more broadly: to guarantee a right to be “protected” against unreasonable searches and seizures, and possibly a right to be “free from fear” against such government action. Support for these broad readings of “to be secure” is found in the original meaning of “secure,” the Amendment’s structure, and founding-era discourse regarding searches and seizures. The rights to be “protected” and “free from fear” can be adequately safeguarded by a judicially-created rule against government “adoption” of an investigative method that constitutes an unregulated and unreasonable search or seizure. The upshot of this Fourth Amendment rule against “adoption” is earlier standing to challenge the constitutionality of concealed investigative techniques. Earlier access to courts invites earlier j

    Sensitive Calligraphy Robot & Design Review Creation

    Get PDF
    The calligraphy robot is a proof-of-concept platform for a high precision combined control system with position and force control. The platform is a gantry system and an end-effector with series elastic actuators. PVT control was utilized to achieve smooth curves without noticeable shaking or jagged lines. This design has potential implications for surgical robots. The Cornell Cup competition required design reviews to mimic a professional engineering process. However, there is a lack of helpful guides to critically approaching the creation of a design review. The Cornell Cup reviews are the analytical basis for a study of choices made during creation and the forces that influence those choices which culminated in a handout guide to help other students improve their design reviews

    Human-Machine Communication: Complete Volume. Volume 4

    Get PDF
    This is the complete volume of HMC Volume 4

    Framing in the Wild: Expressions of Decisions in Real-World Situations

    Get PDF
    An important phenomenon in the study of behavioral decision-making is the surprising finding that people who are given choices framed in positive vs. negative terms exhibit different preferences. This study focused on a newer question: what factors influence the selection of frames by decision-makers? The development of a decision frame that has positive or negative overall value is a process that can be influenced by a number of factors. Several theoretical approaches to decision-making were examined with respect to making predictions regarding factors that would influence frame selection: mental accounting, task complexity, mental workload, expertise, regulatory focus, and message formulation goals. Predictions were extrapolated from each of these approaches and tested with data from a real-world decision-making situation - planning conversations from a set of NASA mission control meetings. The planning statements were transcribed and coded for frame selection and other behavioral/situational elements that were predicted to be related to frame selection. Mental accounting was not found to be related to frame selection. A predominance of positive framing, along with minimal use of negations, provided some support for the influence of positive expression bias. There was also evidence for aspiration mode impacting the selection of frame. The strongest predictor of frame selection, however, was an increase in expertise that occurred over the course of the mission. Between early and late mission phases, there was a significant decrease in positive framing, and this decrease interacted with task complexity. Based on these results, the hypothesis was proposed that decision-makers use opportunities for action as a means to frame decisions

    Common Law Property Metaphors on the Internet: The Real Problem with the Doctrine of Cybertrespass

    Get PDF
    The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to examine the implications of transposing property metaphors to the world of the Internet, characterized by the absence of resource rivalry and the reality of positive value enhancement through increased usage (i.e., a network effect, whereby participation in use by many is a condition for value in use by any). It is argued that the transposition of proprietary concepts to the Internet is done for purely instrumental reasons—reasons that derive neither from the nature of the resource nor its usage. The paper then evaluates whether such an instrumental use of proprietary concepts on the Internet has any effect on the meaning ordinarily attributed to the concept of property and the identification of property as an independent institution of moral significance. It concludes by showing that the relative neglect that doctrines such as cybertrespass have for identifying the boundaries of the res over which the property right is to operate, is capable of undermining the minimum core of any understanding of property as an independent institution

    Common Law Property Metaphors on the Internet: The Real Problem with the Doctrine of Cybertrespass

    Get PDF
    The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to examine the implications of transposing property metaphors to the world of the Internet, characterized by the absence of resource rivalry and the reality of positive value enhancement through increased usage (i.e., a network effect, whereby participation in use by many is a condition for value in use by any). It is argued that the transposition of proprietary concepts to the Internet is done for purely instrumental reasons--reasons that derive neither from the nature of the resource nor its usage. The paper then evaluates whether such an instrumental use of proprietary concepts on the Internet has any effect on the meaning ordinarily attributed to the concept of property and the identification of property as an independent institution of moral significance. It concludes by showing that the relative neglect that doctrines such as cybertrespass have for identifying the boundaries of the res over which the property right is to operate, is capable of undermining the minimum core of any understanding of property as an independent institution
    • 

    corecore