187 research outputs found

    Personalization by Partial Evaluation.

    Get PDF
    The central contribution of this paper is to model personalization by the programmatic notion of partial evaluation.Partial evaluation is a technique used to automatically specialize programs, given incomplete information about their input.The methodology presented here models a collection of information resources as a program (which abstracts the underlying schema of organization and flow of information),partially evaluates the program with respect to user input,and recreates a personalized site from the specialized program.This enables a customizable methodology called PIPE that supports the automatic specialization of resources,without enumerating the interaction sequences beforehand .Issues relating to the scalability of PIPE,information integration,sessioniz-ling scenarios,and case studies are presented

    Computer-Supported Collaborative Production

    Get PDF
    This paper proposes the concept of collaborative production as a focus of concern within the general area of collaborative work. We position the concept with respect to McGrath's framework for small group dynamics and the more familiar collaboration processes of awareness, coordination, and communication (McGrath 1991). After reviewing research issues and computer-based support for these interacting aspects of collaboration, we turn to a discussion of implications for how to design improved support for collaborative production. We illustrate both the challenges of collaborative production and our design implications with a collaborative map-updating scenario drawn from the work domain of geographical information systems

    Mobile User\u27s Privacy Decision Making: Integrating Economic Exchange and Social Justice Perspectives

    Get PDF
    Recent advances in wireless computing and communication have led to the proliferation of location-based services (LBS). While LBS offer users the flexibility of accessing network services on the move, potential privacy violations have emerged as a contentious issue because details of user identities, movements and behaviors are available to LBS providers. Drawing on the economic exchange and social justice theories, this research addresses privacy issues by examining key mechanisms that can alleviate users’ privacy concerns. A theoretical framework is developed to link three privacy assurance mechanisms (technology control, industry self-regulation, and government legislation) to the individual privacy decision making process. In addition, as the individual privacy decision making is usually dynamic and context-specific, the research model will be tested in three different contexts with three different types of LBS applications (safety, advertising, and social networking applications). This research contributes to a better understanding of the dynamic and dialectic nature of information privacy through a combination of theoretical and empirical research efforts. The interplay between social and technological issues associated with the privacy assurance will be the interests for application developers, service providers and policy makers

    Effectiveness of Elicitation Techniques in Distributed Requirements Engineering

    Get PDF
    Software development teams are often geographically distributed from their customers and end users. This creates significant communication and coordination challenges that impact the effectiveness of requirements engineering. Travel costs, and the local availability of quality technical staff increase the demand for effective distributed software development teams. This research reports an empirical study of how groupware can be used to aid distributed requirements engineering for a software development project. Six groups of seven to nine members were formed and divided into separate remote groups of customers and engineers. The engineers conducted a requirements analysis and produced a software requirements specification (SRS) document through distributed interaction with the remote customers. We present results and conclusions from the research including: an analysis of factors that effected the quality of the Software Requirements Specification document written at the conclusion of the requirements process and the effectiveness of requirements elicitation techniques which were used in a distributed setting for requirements gathering

    The Challenges of Web Engineering and Requirements for Better Tool Support

    Get PDF
    We report the experiences of semi-professional developers regarding the challenges, tools, and processes within the domain of web application development. The paper summarizes the main problems in web development, characterizes the habits of programmers and concludes with a "developer's wish list" for improvements to web technologies and tools. The report is based on two independent sources - a survey of 31 web developers and an in-depth interview study with 10 participants

    Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach

    Get PDF
    Protecting adolescents from online safety risks is a major contemporary concern, and researching adolescent online safety is equally as challenging. Relatively few researchers have studied adolescent online safety, but the studies that do exist have documented threats from privacy breaches, cyberbullying, sexual predation, and other types of risk exposure. The grand challenge, however, is how we can approach these problems in a way that will protect adolescents while allowing them to engage socially online. We discuss two key challenges: operationalizing online safety; and defining online risks. We propose that Information Systems (IS) researchers should leverage family systems theory, a methodological approach grounded in developmental psychology, in order to address adolescent online safety issues
    • …
    corecore