126 resultados para 080504 Ubiquitous Computing

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to explore characteristics of human-computer interaction when the human body and its movements become input for interaction and interface control in pervasive computing settings.

Design/methodology/approach –
The paper quantifies the performance of human movement based on Fitt's Law and discusses some of the human factors and technical considerations that arise in trying to use human body movements as an input medium.

Findings – The paper finds that new interaction technologies utilising human movements may provide more flexible, naturalistic interfaces and support the ubiquitous or pervasive computing paradigm.

Practical implications –
In pervasive computing environments the challenge is to create intuitive and user-friendly interfaces. Application domains that may utilize human body movements as input are surveyed here and the paper addresses issues such as culture, privacy, security and ethics raised by movement of a user's body-based interaction styles.

Originality/value –
The paper describes the utilization of human body movements as input for interaction and interface control in pervasive computing settings.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ubiquitous and mobile computing has increased the level of social connectedness. In an era where technology has permeated into spaces of work, play and socializing, social influence has become an important consideration. The operationalization of the social influence construct in the technology adoption and use literature often assumes singular technology use contexts and purposes. We question whether social influence, as operationalized in IS, is reflective of the utilitarian, hedonic and social environment that many individuals operate in. We propose a framework to consider social influence more inclusively, drawing on differences in referent power and levels of expertise. We outline our research approach within the demographic segment of young working professionals. Research in this area is necessary to improve theoretical explanations of adoptive behavior of these technologies. We hope to contribute by suggesting a richer, more encompassing operationalization of the social influence construct for future IS research.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this research-in-progress paper we argue that technology in the ubiquitous computing era offers experiences to users that extend well beyond the functional, practical applications offered in the world of work. In this era a realm of engagement is opening up to the individual that transcends the utilitarian, to encompass hedonic and social existence. Our central argument, therefore, is that user satisfaction is a notion which must extend to encompass rich, holistic human experience involving complex and fleeting interactions, driven by highly personal circumstances. We argue that the expectations, requirements and value perceptions of individuals in this dynamic context may only be anticipated and understood if situational factors (such as location, time, context, history-of-use) and quality of life factors (such as life stage, mobility, health, income, background, education) are taken into account. We identify the fundamental differences in key characteristics of user satisfaction between the traditional and ubiquitous computing environments and provide details about our own research approach, in which we are exploring ubiquitous content provision from the perspective of content providers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper revisits the social influence construct in the era of ubiquitous computing. Despite its rather broad origins in psychology, social influence has to date been operationalized rather narrowly in the information technology adoption literature. We report on a study of mobile technology users in which we studied various social influences on these individuals. We isolate four distinct variants of social influence, operating in both inbound and outbound directions, each with positive and negative impacts. The study integrates three different dimensions of social influence into an analytical framework to facilitate future research. © 2012 IEEE.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Ubiquitous computing is an exciting paradigm shift where technology becomes virtually invisible in our lives. In the increasingly interconnected world, threats to our daily lives can come from unexpected sources and universal directions. Criminals and terrorists have recognized the value of leveraging the ubiquitous computing environments to facilitate the commission of crimes. The cyber criminals typically launch different forms of large-scale and coordinated attacks, causing huge financial loss and potential life hazard. In this talk, we report two innovative approaches to defend against large-scale and coordinated attacks in the ubiquitous environments: 1) Inferring the cyber crime's intent through network traffic classification to enable the early warning of potential attacks, and 2) Profiling the large-scale and coordinated cyber attacks through both microscopic and macroscopic modeling to provide better control of such attacks. These approaches are effective in finding weak symptoms caused by the attacks thus can successfully defend against the large-scale and coordinated attacks at their early stages.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Personal information and communication technologies (ICTs) have become commonplace. Today many people own, or have access to, a range of different computing and communication devices, information technologies, and services, which they incorporate into their everyday routines. Increasingly, these technologies impact the way that individuals work, socialize, and play. Workers are bringing their personal ICTs to the office, and organizations are tailoring their computing environments toward ubiquitous integration with personal ICTs. These developments are opening up new ways of working, but they also create new challenges for organizations in accommodating this “nonaffiliated” use as part of their information systems environments. In this article we propose a framework for analyzing the composition and impact of personal ICT ensembles. The framework is positioned as pre-theory that invites further development and empirical testing. We illustrate how the proposed framework could be applied to consider personal ICT use across the work/home context. Several implications stemming from the notion of a personal ICT ensemble are highlighted, including practical considerations for nonaffiliated use in organizations. We conclude with suggestions for further development of the proposed framework.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The following topics are dealt with: soft computing in intelligent multimedia; grid and pervasive computing security; interactive multimedia & intelligent services in mobile and ubiquitous computing; data management in ubiquitous computing; smart living space; software effectiveness and efficiency.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Distributed Denial of Service attacks is one of the most challenging areas to deal with in Security. Not only do security managers have to deal with flood and vulnerability attacks. They also have to consider whether they are from legitimate or malicious attackers. In our previous work we developed a framework called bodyguard, which is to help security software developers from the current serialized paradigm, to a multi-core paradigm. In this paper, we update our research work by moving our bodyguard paradigm, into our new Ubiquitous Multi-Core Framework. From this shift, we show a marked improvement from our previous result of 20% to 110% speedup performance with an average cost of 1.5 ms. We also conducted a second series of experiments, which we trained up Neural Network, and tested it against actual DDoS attack traffic. From these experiments, we were able to achieve an average of 93.36%, of this attack traffic.

Relevância:

80.00% 80.00%

Publicador:

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Privacy is an important aspect of pervasive and ubiquitous computing systems, and, in particular, pervasive healthcare. With reference to previous approaches on developing privacy sensitive pervasive healthcare applications, we detail a framework for the design of such systems that aims to minimise the impact of privacy on such systems. In reviewing previous approaches, we extract and combine common elements in order to unify the approaches and create a more formal methodology for designing privacy mechanisms in pervasive healthcare applications. In doing so we also consider the manner in which ubiquitous technologies impact on privacy and methods for reducing this impact. We demonstrate how the framework can be applied by using examples from the previous approaches. In addressing privacy issues, the framework aims to remove a large obstacle to deployment of pervasive healthcare systems, acceptance of the technology.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

In this paper we present a framework for addressing privacy issues raised by the monitoring of assisted living smart house environments. In home environments, the conflict between the goals of the surveillance, and the private nature of the home, raises the issue of occupant privacy. This issue needs to be addressed if applications are to be accepted by the occupant. We identify four key properties required for the design of privacy sensitive ubiquitous computing applications. Subsequently, we develop a dynamic and flexible method for implementing privacy measures through controlling access to data, and an interface to provide feedback to the occupant, enabling them to control the implemented privacy measures. We form a generic framework for implementing privacy sensitive ubiquitous computing applications based on previous applications within the field. This framework was then extended and used to develop a specific framework for a privacy sensitive smart house. The approach proposed in the framework dynamically applies privacy measures to multi-modal data according to the situation, or context, of the environment. We further test an implementation of the privacy measures, and detail methods to implement feedback and control. The approach aims to decrease the invasiveness of the surveillance, while retaining the purpose of the assisted living environment.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Radio frequency identification (RFID) system is a new technology which uses the open air to transmit information. RFID technology is one of the most promising technologies in the field of ubiquitous computing which is revolutionizing the supply chain. It has already been applied by many major retail chains such as Target, Wal-Mart, etc. The networked RFID system such as supply chain has very unique and special business needs which lead to special sets of RFID security requirements and security models. However, very little work has been done to analyze RFID security parameters in relation to networked RFID systems business needs. This paper presents a critical analysis of the networked application's security requirements in relation to their business needs. It then presents a comparative study of existing literature and the ability of various models to protect the security of the supply chain in a RFID deployment.