16 research outputs found

    Augmented analyses: supporting the study of ubiquitous computing systems

    Get PDF
    Ubiquitous computing is becoming an increasingly prevalent part of our everyday lives. The reliance of society upon such devices as mobile phones, coupled with the increasing complexity of those devices is an example of how our everyday human-human interaction is affected by this phenomenon. Social scientists studying human-human interaction must now take into account the effects of these technologies not just on the interaction itself, but also on the approach required to study it. User evaluation is a challenging topic in ubiquitous computing. It is generally considered to be difficult, certainly more so than in previous computational settings. Heterogeneity in design, distributed and mobile users, invisible sensing systems and so on, all add up to render traditional methods of observation and evaluation insufficient to construct a complete view of interactional activity. These challenges necessitate the development of new observational technologies. This thesis explores some of those challenges and demonstrates that system logs, with suitable methods of synchronising, filtering and visualising them for use in conjunction with more traditional observational approaches such as video, can be used to overcome many of these issues. Through a review of both the literature of the field, and the state of the art of computer aided qualitative data analysis software (CAQDAS), a series of guidelines are constructed showing what would be required of a software toolkit to meet the challenges of studying ubiquitous computing systems. It outlines the design and implementation of two such software packages, \textit{Replayer} and \textit{Digital Replay System}, which approach the problem from different angles, the former being focussed on visualising and exploring the data in system logs and the latter focussing on supporting the methods used by social scientists to perform qualitative analyses. The thesis shows through case studies how this technique can be applied to add significant value to the qualitative analysis of ubiquitous computing systems: how the coordination of system logs and other media can help us find information in the data that would otherwise be inaccessible; an ability to perform studies in locations/settings that would otherwise be impossible, or at least very difficult; and how creating accessible qualitative data analysis tools allows people to study particular settings or technologies who could not have studied them before. This software aims to demonstrate the direction in which other CAQDAS packages may have to move in order to support the study of the characteristics of human-computer and human-human interaction in a world increasingly reliant upon ubiquitous computing technology

    Through a Glass, Darkly:The CIA and Oral History

    Get PDF
    This article broaches the thorny issue of how we may study the history of the CIA by utilizing oral history interviews. This article argues that while oral history interviews impose particular demands upon the researcher, they are particularly pronounced in relation to studying the history of intelligence services. This article, nevertheless, also argues that while intelligence history and oral history each harbour their own epistemological perils and biases, pitfalls which may in fact be pronounced when they are conjoined, the relationship between them may nevertheless be a productive one. Indeed, each field may enrich the other provided we have thought carefully about the linkages between them: this article's point of departure. The first part of this article outlines some of the problems encountered in studying the CIA by relating them to the author's own work. This involved researching the CIA's role in US foreign policy towards Afghanistan since a landmark year in the history of the late Cold War, 1979 (i.e. the year the Soviet Union invaded that country). The second part of this article then considers some of the issues historians must confront when applying oral history to the study of the CIA. To bring this within the sphere of cognition of the reader the author recounts some of his own experiences interviewing CIA officers in and around Washington DC. The third part then looks at some of the contributions oral history in particular can make towards a better understanding of the history of intelligence services and the CIA

    Complete Genome Sequences of Cluster A Mycobacteriophages BobSwaget, Fred313, KADY, Lokk, MyraDee, Stagni, and StepMih

    Get PDF
    Seven mycobacteriophages from distinct geographical locations were isolated, using Mycobacterium smegmatis mc2155 as the host, and then purified and sequenced. All of the genomes are related to cluster A mycobacteriophages, BobSwaget and Lokk in subcluster A2; Fred313, KADY, Stagni, and StepMih in subcluster A3; and MyraDee in subcluster A18, the first phage to be assigned to that subcluster
    corecore