20,277 research outputs found

    Towards solutions for assistive technology

    Get PDF
    Introduction What is assistive technology? The agreed World Health Organisation definition is "Assistive technology can be defined as “any piece of equipment, or product, whether it is acquired commercially, modified, or customized, that is used to increase, maintain, or improve the functional capabilities of individuals with disabilities” (WHO, 2011) The array of possible assistive technology products and solutions reflects the diversity of the needs of people with disabilities – ranging from digital technologies that can support social engagement, communication, employment, learning, memory, planning and safe guarding services through to products and devices that support mobility and personal care requirements. Typically as the complexities of assistive technology solutions increase, so do the costs and potential risks (if not appropriately set up or maintained). This document is primarily focused on the Assistive Technology solutions derived from aids and equipment. Home and vehicle modifications and prosthetics have not yet been explored in the same level of detail and will be subject of further work. Proposed approach The proposed assistive technology service approach has been developed in line with the strategic goals of the NDIA. It is one aspect of a broader strategic approach the NDIA has to using technologies to enhance its engagement and management of relationships, services and supports with suppliers, providers, participants and the Australian community. The NDIA’s goal is to use technology in its various forms to ensure that services, supports, and communications between all stakeholders are as streamlined as possible and services are timely and effective. This document outlines the elements of a proposed service delivery approach for individuals to access assistive technology solutions and is based on the three key objectives outlined above

    Final report of work-with-IT: the JISC study into evolution of working practices

    Get PDF
    Technology is increasingly being used to underpin business processes across teaching and learning, research, knowledge exchange and business support activities in both HE and FE. The introduction of technology has a significant impact on the working practices of staff, often requiring them to work in a radically different way. Change in any situation can be unsettling and problematic and, where not effectively managed, can lead to poor service or functionality and disenfranchised staff. These issues can have a direct impact on institutional effectiveness, reputation and the resulting student experience. The Work-with-IT project, based at the University of Strathclyde, sought to examine changes to working practices across HE and FE, the impact on staff roles and relationships and the new skills sets that are required to meet these changes

    Emotions in context: examining pervasive affective sensing systems, applications, and analyses

    Get PDF
    Pervasive sensing has opened up new opportunities for measuring our feelings and understanding our behavior by monitoring our affective states while mobile. This review paper surveys pervasive affect sensing by examining and considering three major elements of affective pervasive systems, namely; “sensing”, “analysis”, and “application”. Sensing investigates the different sensing modalities that are used in existing real-time affective applications, Analysis explores different approaches to emotion recognition and visualization based on different types of collected data, and Application investigates different leading areas of affective applications. For each of the three aspects, the paper includes an extensive survey of the literature and finally outlines some of challenges and future research opportunities of affective sensing in the context of pervasive computing

    Visual analytics for non-expert users in cyber situation awareness

    Get PDF
    Situation awareness is often described as the perception and comprehension of the current situation, and the projection of future status. Whilst this may be well understood in an organisational cybersecurity context, there is a strong case to be made for effective cybersecurity situation awareness that is tailored to the needs of the Non-Expert User (NEU). Our online usage habits are rapidly evolving with smartphones and tablets being widely used to access resources online. In order for NEUs to remain safe online, there is a need to enhance awareness and understanding of cybersecurity concerns, such as how devices may be acting online, and what data is being shared between devices. In this paper, we extend our proposal of the Enhanced Personal Situation Awareness (ePSA) framework to consider the key details of cyber situation awareness that would be of concern to NEUs, and we consider how such information can be effectively conveyed using a visual analytic approach. We present the design of our visual analytics approach to show how this can represent the key details of cyber situation awareness whilst maintaining a simple and clean design scheme so as to not result in information-overload for the user. The guidance developed through the course of this work can help practitioners develop tools that could help NEUs better understand their online actions, with the aim of giving users greater control and safer experiences when their personal devices are acting online

    Mobile information access in the real world: A story of three wireless devices

    Get PDF
    This is the post-print version of the Article. The official published version can be accessed from the link below - Copyright @ 2008 ElsevierThe importance of the user perspective to the wireless information access experience cannot be understated: simply put, users will not indulge in devices that are perceived to be difficult to use and in technologies that do not offer quality infotainment – combined information and entertainment – content. In this paper, we investigate the impact that mobile devices have on the user wireless infotainment access experience in practice. To this end, we have undertaken an empirical study placed in a ‘real-world’ setting, in which participants undertook typical infotainment access tasks on three different wireless-enabled mobile devices: a laptop, a personal digital assistant and a head mounted display device. Results show that, with the exception of participants’ level of self-consciousness when using such devices in public environments, the user wireless information access experience is generally unaffected by device type. Location was shown, though, to be a significant factor when users engage in tasks such as listening to online music or navigation. Whilst the interaction between device and environment was found to influence entertainment-related tasks in our experiments, the informational ones were not affected. However, the interaction effects between device and user type was found to affect both types of tasks. Lastly, a user’s particular computing experience was shown to influence the perceived ease of wireless information access only in the case of online searching, irrespective of whether this is done for primarily informational purposes or entertainment ones

    How\u27s My Network - Incentives and Impediments of Home Network Measurements

    Get PDF
    Gathering meaningful information from Home Networking (HN) environments has presented researchers with measurement strategy challenges. A measurement platform is typically designed around the process of gathering data from a range of devices or usage statistics in a network that are specifically behind the HN firewall. HN studies require a fine balance between incentives and impediments to promote usage and minimize efforts for user participation with the focus on gathering robust datasets and results. In this dissertation we explore how to gather data from the HN Ecosystem (e.g. devices, apps, permissions, configurations) and feedback from HN users across a multitude of HN infrastructures, leveraging low impediment and low/high incentive methods to entice user participation. We look to understand the trade-offs of using a variety of approach types (e.g. Java Applet, Mobile app, survey) for data collections, user preferences, and how HN users react and make changes to the HN environment when presented with privacy/security concerns, norms of comparisons (e.g. comparisons to the local environment and to other HNs) and other HN results. We view that the HN Ecosystem is more than just “the network” as it also includes devices and apps within the HN. We have broken this dissertation down into the following three pillars of work to understand incentives and impediments of user participation and data collections. These pillars include: 1) preliminary work, as part of the How\u27s My Network (HMN) measurement platform, a deployed signed Java applet that provided a user-centered network measurement platform to minimize user impediments for data collection, 2) a HN user survey on preference, comfort, and usability of HNs to understand incentives, and 3) the creation and deployment of a multi-faceted How\u27s My Network Mobile app tool to gather and compare attributes and feedback with high incentives for user participation; as part of this flow we also include related approaches and background work. The HMN Java applet work demonstrated the viability of using a Web browser to obtain network performance data from HNs via a user-centric network measurement platform that minimizes impediments for user participation. The HMN HN survey work found that users prefer to leverage a Mobile app for HN data collections, and can be incentivized to participate in a HN study by providing attributes and characteristics of the HN Ecosystem. The HMN Mobile app was found to provide high incentives, with minimal impediments, for participation with focus on user Privacy and Security concerns. The HMN Mobile app work found that 84\% of users reported a change in perception of privacy and security, 32\% of users uninstalled apps, and 24\% revoked permissions in their HN. As a by-product of this work we found it was possible to gather sensitive information such as previously attached networks, installed apps and devices on the network. This information exposure to any installed app with minimal or no granted permissions is a potential privacy concern

    Electronic information resource use: Implications for teaching and library staff

    Get PDF
    Traditionally, guidance from teaching staff to students on the use of information sources has taken the form of reading lists containing a mix of books and journal articles, and the assumption is that information specialists within the library will provide whatever additional help is needed to access these resources. Given the rapidly increasing availability of electronic sources of information, and changes in the learning and teaching environment, such an approach can no longer be regarded as appropriate. This paper addresses the issue of the best way of helping students make effective use of electronic information resources, thereby developing their information‐gathering skills. Reference is made to the lessons learned from undertaking a small action research project in this field. Consideration is also given to a number of broader, more contextual issues, such as the ongoing shift towards more independent learning by students and changing relationships between teaching staff and information specialists. We conclude that more research is urgently needed if ways are to be found of ensuring that students maximize the potential of electronic information resources, and argue that there should be greater collaboration between teaching staff and information specialists, and that their roles and responsibilities in providing appropriate support and in assessing the information‐gathering skills of students need to be redefined

    Exploring DIY practices of complex home technologies

    Get PDF
    We are surrounded by increasingly complex networks of smart objects, yet our understanding and attachment to them is rather limited. One way to support stronger end users’ engagement with such complex technologies is by involving them in the design process and with the advent of Arduino prototyping platform, even in their making. While DIY practice offers the potential for stronger user engagement with physical artifacts, we know little about end users’ DIY practice of making complex electronic technologies and their potential to ensure engagement with such devices. In this paper, we report on interviews with 18 participants from two green communities who built and used an open source DIY energy monitor, with the aim to explore the end users DIY practices of making such complex electronic devices. Findings indicate four key qualities of DIY monitors: transparent modularity, open-endedness, heirloom and disruptiveness, and how they contribute to more meaningful engagement with the DIY monitors, elevating them from the status of unremarkable objects to that of things. We conclude with three implications for design for supporting end user development of complex electronic DIY: designing transparent open hardware technologies, standardizing communication protocols for the current and future DIY of IoT; and deliberately calling for personal investment and labor in the assembling of DIY kits
    • 

    corecore