74 research outputs found

    Accessible Chats for Computer Supported Collaborative Learning Environments in Mobile Devices (Doctoral Consortium),

    Get PDF
    Proceedings of: Seventh IEEE International Conference on Research Challenges in Information Science. Took place May 29-31, 2013 in Paris (France). The event Web site is http://www.rcis-conf.com/rcis2013/The use of chats in Mobile Devices (MD) for learning environments is being increased in the last decade. However, they present many accessibility barriers that prevent people from using them. As a result, some people do not have the same opportunities to learn. This research aims to solve the accessibility barriers of chats in learning environments for its use in MDs. Thus, this paper presents the proposal of an model-based design and the strategy development process to create an accessible chatThis research work has been partially supported by the Regional Government of Madrid under the Research Network MA2VICMR (S2009/TIC-1542) and by the Spanish Ministry of Economy under the project MULTIMEDICA (TIN2010-20644-C03-01)Publicad

    Citizen Science: Reducing Risk and Building Resilience to Natural Hazards

    Get PDF
    Natural hazards are becoming increasingly frequent within the context of climate change—making reducing risk and building resilience against these hazards more crucial than ever. An emerging shift has been noted from broad-scale, top-down risk and resilience assessments toward more participatory, community-based, bottom-up approaches. Arguably, non-scientist local stakeholders have always played an important role in risk knowledge management and resilience building. Rapidly developing information and communication technologies such as the Internet, smartphones, and social media have already demonstrated their sizeable potential to make knowledge creation more multidirectional, decentralized, diverse, and inclusive (Paul et al., 2018). Combined with technologies for robust and low-cost sensor networks, various citizen science approaches have emerged recently (e.g., Haklay, 2012; Paul et al., 2018) as a promising direction in the provision of extensive, real-time information for risk management (as well as improving data provision in data-scarce regions). It can serve as a means of educating and empowering communities and stakeholders that are bypassed by more traditional knowledge generation processes. This Research Topic compiles 13 contributions that interrogate the manifold ways in which citizen science has been interpreted to reduce risk against hazards that are (i) water-related (i.e., floods, hurricanes, drought, landslides); (ii) deep-earth-related (i.e., earthquakes and volcanoes); and (iii) responding to global environmental change such as sea-level rise. We have sought to analyse the particular failures and successes of natural hazards-related citizen science projects: the objective is to obtain a clearer understanding of “best practice” in a citizen science context

    ECSCW 2013 Adjunct Proceedings The 13th European Conference on Computer Supported Cooperative Work 21 - 25. September 2013, Paphos, Cyprus

    Get PDF
    This volume presents the adjunct proceedings of ECSCW 2013.While the proceedings published by Springer Verlag contains the core of the technical program, namely the full papers, the adjunct proceedings includes contributions on work in progress, workshops and master classes, demos and videos, the doctoral colloquium, and keynotes, thus indicating what our field may become in the future

    AMAN-DA : Une approche basée sur la réutilisation de la connaissance pour l'ingénierie des exigences de sécurité

    Get PDF
    In recent years, security in Information Systems (IS) has become an important issue that needs to be taken into account in all stages of IS development, including the early phase of Requirement Engineering (RE). Considering security during early stages of IS development allows IS developers to envisage threats, their consequences and countermeasures before a system is in place. Security requirements are known to be “the most difficult of requirements types”, and potentially the ones causing the greatest risk if they are not correct. Moreover, requirements engineers are not primarily interested in, or knowledgeable about, security. Their tacit knowledge about security and their primitive knowledge about the domain for which they elicit security requirements make the resulting security requirements poor and too generic.This thesis explores the approach of eliciting requirements based on the reuse of explicit knowledge. First, the thesis proposes an extensive systematic mapping study of the literature on the reuse of knowledge in security requirements engineering identifying the diferent knowledge forms. This is followed by a review and classification of security ontologies as the main reuse form.In the second part, AMAN-DA is presented. AMAN-DA is the method developed in this thesis. It allows the elicitation of domain-specific security requirements of an information system by reusing knowledge encapsulated in domain and security ontologies. Besides that, the thesis presents the different elements of AMANDA: (i) a core security ontology, (ii) a multi-level domain ontology, (iii) security goals and requirements’s syntactic models, (iv) a set of rules and mechanisms necessary to explore and reuse the encapsulated knowledge of the ontologies and produce security requirements specifications.The last part reports the evaluation of the method. AMAN-DA was implemented in a prototype tool. Its feasibility was evaluated and applied in case studies of three different domains (maritime, web applications, and sales). The ease of use and the usability of the method and its tool were also evaluated in a controlled experiment. The experiment revealed that the method is beneficial for the elicitation of domain specific security requirements, and that the tool is friendly and easy to use.Au cours de ces dernières années, la sécurité des Systèmes d'Information (SI) est devenue une préoccupation importante, qui doit être prise en compte dans toutes les phases du développement du SI, y compris dans la phase initiale de l'ingénierie des exigences (IE). Prendre en considération la sécurité durant les premieres phases du dévelopment des SI permet aux développeurs d'envisager les menaces, leurs conséquences et les contre-mesures avant qu'un système soit mis en place. Les exigences de sécurité sont connues pour être "les plus difficiles des types d’exigences", et potentiellement celles qui causent le plus de risque si elles ne sont pas correctes. De plus, les ingénieurs en exigences ne sont pas principalement intéressés à, ou formés sur la sécurité. Leur connaissance tacite de la sécurité et leur connaissance primitive sur le domaine pour lequel ils élucident des exigences de sécurité rendent les exigences de sécurité résultantes pauvres et trop génériques.Cette thèse explore l'approche de l’élucidation des exigences fondée sur la réutilisation de connaissances explicites. Tout d'abord, la thèse propose une étude cartographique systématique et exhaustive de la littérature sur la réutilisation des connaissances dans l'ingénierie des exigences de sécurité identifiant les diférentes formes de connaissances. Suivi par un examen et une classification des ontologies de sécurité comme étant la principale forme de réutilisation.Dans la deuxième partie, AMAN-DA est présentée. AMAN-DA est la méthode développée dans cette thèse. Elle permet l’élucidation des exigences de sécurité d'un système d'information spécifique à un domaine particulier en réutilisant des connaissances encapsulées dans des ontologies de domaine et de sécurité. En outre, la thèse présente les différents éléments d'AMAN-DA : (i) une ontologie de sécurité noyau, (ii) une ontologie de domaine multi-niveau, (iii) des modèles syntaxique de buts et d’exigences de sécurité, (iv) un ensemble de règles et de mécanismes nécessaires d'explorer et de réutiliser la connaissance encapsulée dans les ontologies et de produire des spécifications d’exigences de sécurité.La dernière partie rapporte l'évaluation de la méthode. AMAN-DA a été implémenté dans un prototype d'outil. Sa faisabilité a été évaluée et appliquée dans les études de cas de trois domaines différents (maritimes, applications web, et de vente). La facilité d'utilisation et l’utilisabilité de la méthode et de son outil ont également été évaluées dans une expérience contrôlée. L'expérience a révélé que la méthode est bénéfique pour l’élucidation des exigences de sécurité spécifiques aux domaines, et l'outil convivial et facile à utiliser
    • …
    corecore