506 resultados para Mobile Computing
Resumo:
Highlights ► Provides a review of the history and development of locative media. ► Outlines different human-computer interaction techniques applied in locative media. ► Discusses how locative media applications have changed interaction affordances in and of physical spaces. ► Discusses practices of people in urban settings that evolved through these new affordances. ► Provides an overview on methods to investigate and elaborate design principles for future locative media.
Resumo:
Over less than a decade, we have witnessed a seismic shift in the way knowledge is produced and exchanged. This is opening up new opportunities for civic and community engagement, entrepreneurial behaviour, sustainability initiatives and creative practices. It also has the potential to create fresh challenges in areas of privacy, cyber-security and misuse of data and personal information. The field of urban informatics focuses on the use and impacts of digital media technology in urban environments. Urban informatics is a dynamic and cross-disciplinary area of inquiry that encapsulates social media, ubiquitous computing, mobile applications and location-based services. Its insights suggest the emergence of a new economic force with the potential for driving innovation, wealth and prosperity through technological advances, digital media and online networks that affect patterns of both social and economic development. Urban informatics explores the intersections between people, place and technology, and their implications for creativity, innovation and engagement. This paper examines how the key learnings from this field can be used to position creative and cultural institutions such as galleries, libraries, archives and museums (GLAM) to take advantage of the opportunities presented by these changing social and technological developments. This paper introduces the underlying principles, concepts and research areas of urban informatics, against the backdrop of modern knowledge economies. Both theoretical ideas and empirical examples are covered in this paper. The first part discusses three challenges: a. People, and the challenge of creativity: The paper explores the opportunities and challenges of urban informatics that can lead to the design and development of new tools, methods and applications fostering participation, the democratisation of knowledge, and new creative practices. b. Technology, and the challenge of innovation: The paper examines how urban informatics can be applied to support user-led innovation with a view to promoting entrepreneurial ideas and creative industries. c. Place, and the challenge of engagement: The paper discusses the potential to establish place-based applications of urban informatics, using the example of library spaces designed to deliver community and civic engagement strategies. The discussion of these challenges is illustrated by a review of projects as examples drawn from diverse fields such as urban computing, locative media, community activism, and sustainability initiatives. The second part of the paper introduces an empirically grounded case study that responds to these three challenges: The Edge, the Queensland Government’s Digital Culture Centre which is an initiative of the State Library of Queensland to explore the nexus of technology and culture in an urban environment. The paper not only explores the new role of libraries in the knowledge economy, but also how the application of urban informatics in prototype engagement spaces such as The Edge can provide transferable insights that can inform the design and development of responsive and inclusive new library spaces elsewhere. To set the scene and background, the paper begins by drawing the bigger picture and outlining some key characteristics of the knowledge economy and the role that the creative and cultural industries play in it, grasping new opportunities that can contribute to the prosperity of Australia.
Resumo:
People all over the world are regularly hit by floods, cyclones, and other natural disasters. Many use smart phones and social media to stay connected, seek help, improvise, and cope with crises or challenging situations. This column discusses these practices after dark or during disasters to unveil challenges and opportunities for innovative designs that increase resilience and safety.
Resumo:
Usability in HCI (Human-Computer Interaction) is normally understood as the simplicity and clarity with which the interaction with a computer program or a web site is designed. Identity management systems need to provide adequate usability and should have a simple and intuitive interface. The system should not only be designed to satisfy service provider requirements but it has to consider user requirements, otherwise it will lead to inconvenience and poor usability for users when managing their identities. With poor usability and a poor user interface with regard to security, it is highly likely that the system will have poor security. The rapid growth in the number of online services leads to an increasing number of different digital identities each user needs to manage. As a result, many people feel overloaded with credentials, which in turn negatively impacts their ability to manage them securely. Passwords are perhaps the most common type of credential used today. To avoid the tedious task of remembering difficult passwords, users often behave less securely by using low entropy and weak passwords. Weak passwords and bad password habits represent security threats to online services. Some solutions have been developed to eliminate the need for users to create and manage passwords. A typical solution is based on generating one-time passwords, i.e. passwords for single session or transaction usage. Unfortunately, most of these solutions do not satisfy scalability and/or usability requirements, or they are simply insecure. In this thesis, the security and usability aspects of contemporary methods for authentication based on one-time passwords (OTP) are examined and analyzed. In addition, more scalable solutions that provide a good user experience while at the same time preserving strong security are proposed.
Resumo:
In this chapter I position the iPhone as a “moment” in the history of cultural technologies. Drawing predominantly on advertising materials and public conversations about other "moments" in the history of personal computing and focusing on Apple’s role in this history, I argue that the design philosophy, marketing, and business models behind the iPhone (and now the iPad) have decisively reframed the values of usability that underpin software and interface design in the consumer technology industry, marking a distinctive shift in the history and contested futures of digital culture.
Resumo:
The final shape of the "Internet of Things" ubiquitous computing promises relies on a cybernetic system of inputs (in the form of sensory information), computation or decision making (based on the prefiguration of rules, contexts, and user-generated or defined metadata), and outputs (associated action from ubiquitous computing devices). My interest in this paper lies in the computational intelligences that suture these positions together, and how positioning these intelligences as autonomous agents extends the dialogue between human-users and ubiquitous computing technology. Drawing specifically on the scenarios surrounding the employment of ubiquitous computing within aged care, I argue that agency is something that cannot be traded without serious consideration of the associated ethics.
Resumo:
In this chapter we take a high-level view of social media, focusing not on specific applications, domains, websites, or technologies, but instead our interest is in the forms of engagement that social media engender. This is not to suggest that all social media are the same, or even that everyone’s experience with any particular medium or technology is the same. However, we argue common issues arise that characterize social media in a broad sense, and provide a different analytic perspective than we would gain from looking at particular systems or applications. We do not take the perspective that social life merely happens “within” such systems, nor that social life “shapes” such systems, but rather these systems provide a site for the production of social and cultural reality – that media are always already social and the engagement with, in, and through media of all sorts is a thoroughly social phenomenon. Accordingly, in this chapter, we examine two phenomena concurrently: social life seen through the lens of social media, and social media seen through the lens of social life. In particular, we want to understand the ways that a set of broad phenomena concerning forms of participation in social life is articulated in the domain of social media. As a conceptual entry-point, we use the notion of the “moral economy” as a means to open up the domain of inquiry. We first discuss the notion of the “moral economy” as it has been used by a number of social theorists, and then identify a particular set of conceptual concerns that we suggest link it to the phenomena of social networking in general. We then discuss a series of examples drawn from a range of studies to elaborate and ground this conceptual framework in empirical data. This leads us to a broader consideration of audiences and publics in social media that, we suggest, holds important lessons for how we treat social media analytically.
Resumo:
This thesis examines the role of mobile telephony in rural communities in Papua New Guinea (PNG). It is a threshold study which reports on research conducted in the earliest stages of mobile phone adoption in these areas. It explores the ways in which this new technology changes people’s lives, social structures and relationships. The research focuses on non-urban communities, which previously had little or no access to modern communication technologies, but which are in some cases still using traditional forms of communication such as drums. It has found that the introduction of mobile telecommunications has generally been viewed positively, although several negative concerns have been strongly felt. Specific benefits related to enhanced communication with relatives and friends living away from home villages, and use of the technology in time-critical emergencies or crises. Difficulties have arisen with respect to the cost of owning and operating a handset, as well as financial and logistical challenges when recharging handset batteries, particularly in areas with no mains electricity supply. Perceived damaging effects of mobile phone access related to sex, crime and pornography. The changes taking place are described through a social lens, by foregrounding the perceptions of villagers. The perspectives of key informants, such as telecommunication company managers, are also discussed. Employing the technique of triangulation (using different methods and sources) has helped to validate the findings of the research project. The sources constantly overlap and agree on the main themes, such as those outlined above. PNG is a developing country which performs poorly on a wide range of development indicators. A large majority of the people live outside of the major towns and cities. It is therefore worthwhile investigating the introduction of mobile phone technology in rural areas. These areas often have poor access to services, including transport, health, education and banking. Until 2007, communities in such regions fell outside of mobile phone coverage areas. In the case of all ten villages discussed in this thesis, there has never been any landline telephone infrastructure available. Therefore, this research on mobile phones is in effect documenting the first ever access to any kind of phone in these communities. This research makes a unique contribution to knowledge about the role of communication in PNG, and has implications for policy, practice and theory. In the policy arena, the thesis aids understanding of the impact which communication sector competition and regulation can have on rural and relatively isolated communities. There are three practical problems which have emerged from the research: cost, battery recharging difficulties and breakage are all major obstacles to uptake and use of mobile telephony in rural communities. Efforts to reduce usage costs, enable easier recharging, and design more robust handsets would allow for increased utilisation of mobile phones for a range of purposes. With respect to the realm of theory, this research sits amongst the most recent scholarship in the mobile phone field, located within the broader communication theory area. It recommends cautionary reading of any literature which suggests that mobile phones will reduce poverty and increase incomes in poor, rural communities in developing countries. Nonetheless, the present research adds weight to mobile phone studies which suggest that the primary advantages of mobile phones in such settings are for the satisfactions of communication of itself, and for social interaction among loved ones.
Resumo:
On obstacle-cluttered construction sites where heavy equipment is in use, safety issues are of major concern. The main objective of this paper is to develop a framework with algorithms for obstacle avoidance and path planning based on real-time three-dimensional job site models to improve safety during equipment operation. These algorithms have the potential to prevent collisions between heavy equipment vehicles and other on-site objects. In this study, algorithms were developed for image data acquisition, real-time 3D spatial modeling, obstacle avoidance, and shortest path finding and were all integrated to construct a comprehensive collision-free path. Preliminary research results show that the proposed approach is feasible and has the potential to be used as an active safety feature for heavy equipment.
Resumo:
Many current HCI, social networking, ubiquitous computing, and context aware designs, in order for the design to function, have access to, or collect, significant personal information about the user. This raises concerns about privacy and security, in both the research community and main-stream media. From a practical perspective, in the social world, secrecy and security form an ongoing accomplishment rather than something that is set up and left alone. We explore how design can support privacy as practical action, and investigate the notion of collective information-practice of privacy and security concerns of participants of a mobile, social software for ride sharing. This paper contributes an understanding of HCI security and privacy tensions, discovered while “designing in use” using a Reflective, Agile, Iterative Design (RAID) method.
Resumo:
This paper reports on an exploratory study of the role of web and social media in e-governments, especially in the context of Malaysia, with some comparisons and contrasts from other countries where such governmental efforts have been underway for awhile. It describes the current e-government efforts in Malaysia, and proposes that applying a theoretical framework would help understand the context and streamline these ongoing efforts. Specifically, it lays out a theoretical and cultural framework based on Mary Douglas’ (1996) Grid-Group Theory, Mircea Georgescu’s (2005) Three Pillars of E-Government, and Gerald Grant’s and Derek Chau’s (2006) Generic Framework for E-Government. Although this study is in its early stages, it has relevance to everyone who is interested in e-government efforts across the world, and especially relevant to developing countries.
Resumo:
Purpose – This study examines the nature of consumers’ perceptions of the value they derive from the everyday experiential consumption of mobile phones and how mobile marketing (m-marketing) can potentially enhance these value perceptions. Methodology – Q methodology is used to examine how consumers’ subjective perceptions and opinions are shared at a collective level. Forty participants undertook two Q sorts and the data was analysed using PQ-method. Findings – The first Q sort identified three profiles of perceived value: the Mobile Pragmatists, the Mobile Connectors and the Mobile Revellers. The second Q sort identified two profiles of perceived value of m-marketing: one emerging from the shared opinions of the Mobile Pragmatists and the Mobile Connectors, and the second from the Mobile Revellers. Implications/limitations – The findings show how consumers can be segmented based on their contextualised perceived value of consuming mobile phones and how the potential for m-marketing is perceived in ways that can enhance these value perceptions. Limitations relate to deriving statements for the Q sorts and the generalisability of the results. Practical implications – The findings highlight ways to tailor m-marketing strategies to complement consumers’ perceptions of the value offered through their mobile phones. Originality/value of paper – The study contributes to the literature through using Q methodology to examine two subjective areas of consumer behaviour, experiential consumption and consumer perceived value. Keywords mobile phones, mobile phone marketing, consumer perceived value, Q methodology, experiential consumption Classification Research paper
Resumo:
This study examines consumer adoption of 3G mobile technology in China. The qualitative study involved 45 in-depth interviews undertaken in three major Chinese cities to explore the beliefs and attitudes which determine Chinese consumers’ acceptance of the mobile technological innovation. The findings are compared and contrasted against those reported in Western studies. The variations underpinning adoption of 3G between consumers in the three regional cities were identified. Specifically, it was found that the regions differed in terms of the relative importance of the identified adoption determinants, such as perceived social outcomes for using the innovation and the effects of social influence on the adoption. These findings provide subtle insight into the nature of Chinese consumers’ responses to new mobile technologies and a better understanding of variations among regional Chinese consumers.
Resumo:
Pedestrians’ use of mp3 players or mobile phones can pose the risk of being hit by motor vehicles. We present an approach for detecting a crash risk level using the computing power and the microphone of mobile devices that can be used to alert the user in advance of an approaching vehicle so as to avoid a crash. A single feature extractor classifier is not usually able to deal with the diversity of risky acoustic scenarios. In this paper, we address the problem of detection of vehicles approaching a pedestrian by a novel, simple, non resource intensive acoustic method. The method uses a set of existing statistical tools to mine signal features. Audio features are adaptively thresholded for relevance and classified with a three component heuristic. The resulting Acoustic Hazard Detection (AHD) system has a very low false positive detection rate. The results of this study could help mobile device manufacturers to embed the presented features into future potable devices and contribute to road safety.