909 resultados para computer-mediated communications


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cipher Cities was a practice-led research project developed in 3 stages between 2005 and 2007 resulting in the creation of a unique online community, ‘Cipher Cities’, that provides simple authoring tools and processes for individuals and groups to create their own mobile events and event journals, build community profile and participate in other online community activities. Cipher Cities was created to revitalise peoples relationship to everyday places by giving them the opportunity and motivation to create and share complex digital stories in simple and engaging ways. To do so we developed new design processes and methods for both the research team and the end user to appropriate web and mobile technologies. To do so we collaborated with ethnographers, designers and ICT researchers and developers. In teams we ran a series of workshops in a wide variety of cities in Australia to refine an engagement process and to test a series of iteratively developed prototypes to refine the systems that supported community motivation and collaboration. The result of the research is 2 fold: 1. a sophisticated prototype for researchers and designers to further experiment with community engagement methodologies using existing and emerging communications technologies. 2. A ‘human dimensions matrix’. This matrix assists in the identification and modification of place based interventions in the social, technical, spatial, cultural, pedagogical conditions of any given community. This matrix has now become an essential part of a number of subsequent projects and assists design collaborators to successfully conceptualise, generate and evaluate interactive experiences. the research team employed practice-led action research methodologies that involved a collaborative effort across the fields of interaction design and social science, in particular ethnography, in order to: 1. seek, contest, refine a design methodology that would maximise the successful application of a dynamic system to create new kinds of interactions between people, places and artefacts’. 2. To design and deploy an application that intervenes in place-based and mobile technologies and offers people simple interfaces to create and share digital stories. Cipher Cities was awarded 3 separate CRC competitive grants (over $270,000 in total) to assist 3 stages of research covering the development of the Ethnographic Design Methodologies, the development of the tools, and the testing and refinement of both the engagement models and technologies. The resulting methodologies and tools are in the process of being commercialised by the Australasian CRC for Interaction Design.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computers not only increase the speed and efficiency of our mental efforts, but in the process they also alter the problem-solving tasks we are faced with and, in so doing, they alter the cognitive processes we use to solve problems. Computers are fundamentally changing our forms of thinking (Colc & Griffin, 1980). Therefore, the computer should be seen as not only having the potential to amplify human mental capabilities, but also of providing a catalyst for intellectual development.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In Australia, the Queensland fruit fly (B. tryoni), is the most destructive insect pest of horticulture, attacking nearly all fruit and vegetable crops. This project has researched and prototyped a system for monitoring fruit flies so that authorities can be alerted when a fly enters a crop in a more efficient manner than is currently used. This paper presents the idea of our sensor platform design as well as the fruit fly detection and recognition algorithm by using machine vision techniques. Our experiments showed that the designed trap and sensor platform is capable to capture quality fly images, the invasive flies can be successfully detected and the average precision of the Queensland fruit fly recognition is 80% from our experiment.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In two experiments, we study how the temporal orientation of consumers (i.e., future-oriented or present-oriented), temporal construal (distant future, near future), and product attribute importance (primary, secondary) influence advertisement evaluations. Data suggest that future-oriented consumers react most favorably to ads that feature a product to be released in the distant future and that highlight primary product attributes. In contrast, present-oriented consumers prefer near-future ads that highlight secondary product attributes. Study 2 shows that consumer attitudes are mediated by perceptions of attribute diagnosticity (i.e., the perceived usefulness of the attribute information). Together, these experiments shed light on how individual differences, such as temporal orientation, offer valuable insights into temporal construal effects in advertising.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In two experiments, we show how a consumer’s susceptibility to normative influence (SNI) offers useful insights into the effectiveness of two types of testimonials: a typical person endorsement (Study 1) and a celebrity endorsement (Study 2). Specifically, we suggest that two variables moderate testimonial effects—SNI and product attribute information. Results show that in forming their evaluations, high-SNI consumers place a greater emphasis on the testimonial than on the attribute information. In contrast, low-SNI consumers are more influenced by attribute information. A mediation analysis shows that advertising attitudes for high-SNI consumers are mediated by testimonial thoughts, whereas the attitudes for low-SNI consumers are mediated by their attribute thoughts. Theoretical and managerial implications are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In two experiments, we show that the beliefs women have about the controllability of their weight (i.e., weight locus of control) influences their responses to advertisements featuring a larger-sized female model or a slim female model. Further, we examine self-referencing as a mechanism for these effects. Specifically, people who believe they can control their weight (“internals”), respond most favorably to slim models in advertising, and this favorable response is mediated by self-referencing. In contrast, people who feel powerless about their weight (“externals”), self-reference larger-sized models, but only prefer larger-sized models when the advertisement is for a non-fattening product. For fattening products, they exhibit a similar preference for larger-sized models and slim models. Together, these experiments shed light on the effect of model body size and the role of weight locus of control in influencing consumer attitudes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information and Communications Technologies globally are moving towards Service Oriented Architectures and Web Services. The healthcare environment is rapidly moving to the use of Service Oriented Architecture/Web Services systems interconnected via this global open Internet. Such moves present major challenges where these structures are not based on highly trusted operating systems. This paper argues the need of a radical re-think of access control in the contemporary healthcare environment in light of modern information system structures, legislative and regulatory requirements, and security operation demands in Health Information Systems. This paper proposes the Open and Trusted Health Information Systems (OTHIS), a viable solution including override capability to the provision of appropriate levels of secure access control for the protection of sensitive health data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Digital rights management allows information owners to control the use and dissemination of electronic documents via a machine-readable licence. This paper describes the design and implementation of a system for creating and enforcing licences containing location constraints that can be used to restrict access to sensitive documents to a defined area. Documents can be loaded onto a portable device and used in the approved areas, but cannot be used if the device moves to another area. Our contribution includes a taxonomy for access control in the presence of requests to perform non-instantaneous controlled actions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tertiary education is increasingly a contested space where advances in Information Communications Technologies and their application to technology-mediated e-learning environments have forced university administrators and educators to dislocate themselves from traditional correspondence modes of student engagement. Compounding this paradigmatic shift within the traditional sphere of distance education pedagogy are multiple and conflicting pressures on academics to develop flexible, engaging, cost-effective and sustainable interactive learning resources that incorporate both multimedia and hypermedia. This chapter reports on a study that examined factors that influence educators’ decision to adopt and integrate educational technology and convert traditional print-based distance education materials into interactive multimodal e-learning formats. Although the broader study was conducted in a single Australian university and investigated pedagogical, institutional and individual factors, this chapter restricts its focus to solely the pedagogical motivations and concerns of educators. It is argued that findings from the study have significance at the institutional level, particularly in terms of developing an underlying pedagogical rationale that can permeate the e-learning culture throughout the university, while at the same time, providing a roadmap for educators who are yet to fully engage with the e-learning format.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information uncertainty which is inherent in many real world applications brings more complexity to the visualisation problem. Despite the increasing number of research papers found in the literature, much more work is needed. The aims of this chapter are threefold: (1) to provide a comprehensive analysis of the requirements of visualisation of information uncertainty and their dimensions of complexity; (2) to review and assess current progress; and (3) to discuss remaining research challenges. We focus on four areas: information uncertainty modelling, visualisation techniques, management of information uncertainty modelling, propagation and visualisation, and the uptake of uncertainty visualisation in application domains.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rapid advances in educational and information communications technology (ICT)have encouraged some educators to move beyond traditional face to face and distance education correspondence modes toward a rich, technology mediated e-learning environment. Ready access to multimedia at the desktop has provided the opportunity for educators to develop flexible, engaging and interactive learning resources incorporating multimedia and hypermedia. However, despite this opportunity, the adoption and integration of educational technologies by academics across the tertiary sector has typically been slow. This paper presents the findings of a qualitative study that investigated factors influencing the manner in which academics adopt and integrate educational technology and ICT. The research was conducted at a regional Australian university, the University of Southern Queensland (USQ), and focused on the development of e-learning environments. These e-learning environments include a range of multimodal learning objects and multiple representations of content that seek to cater for different learning styles and modal preferences, increase interaction, improve learning outcomes, provide a more inclusive and equitable curriculum and more closely mirror the on campus learning experience. This focus of this paper is primarily on the barriers or inhibitors academics reported in the study, including institutional barriers, individual inhibitors and pedagogical concerns. Strategies for addressing these obstacles are presented and implications and recommendations for educational institutions are discussed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Traditional media are under assault from digital technologies. Online advertising is eroding the financial basis of newspapers and television, demarcations between different forms of media are fading, and audiences are fragmenting. We can podcast our favourite radio show, data accompanies television programs, and we catch up with newspaper stories on our laptops. Yet mainstream media remain enormously powerful. The Media and Communications in Australia offers a systematic introduction to this dynamic field. Fully updated and revised to take account of recent developments, this third edition outlines the key media industries and explains how communications technologies are impacting on them. It provides a thorough overview of the main approaches taken in studying the media, and includes new chapters on social media, gaming, telecommunications, sport and cultural diversity. With contributions from some of Australia's best researchers and teachers in the field, The Media and Communications in Australia is the most comprehensive and reliable introduction to media and communications available. It is an ideal student text, and a reference for teachers of media and anyone interested in this influential industry.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Monitoring unused or dark IP addresses offers opportunities to extract useful information about both on-going and new attack patterns. In recent years, different techniques have been used to analyze such traffic including sequential analysis where a change in traffic behavior, for example change in mean, is used as an indication of malicious activity. Change points themselves say little about detected change; further data processing is necessary for the extraction of useful information and to identify the exact cause of the detected change which is limited due to the size and nature of observed traffic. In this paper, we address the problem of analyzing a large volume of such traffic by correlating change points identified in different traffic parameters. The significance of the proposed technique is two-fold. Firstly, automatic extraction of information related to change points by correlating change points detected across multiple traffic parameters. Secondly, validation of the detected change point by the simultaneous presence of another change point in a different parameter. Using a real network trace collected from unused IP addresses, we demonstrate that the proposed technique enables us to not only validate the change point but also extract useful information about the causes of change points.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer aided joint replacement surgery has become very popular during recent years and is being done in increasing numbers all over the world. The accuracy of the system depends to a major extent, on accurate registration and immobility of the tracker attachment devices to the bone. This study was designed to asses the forces needed to displace the tracker attachment devices in the bone simulators. Bone simulators were used to maintain the uniformity of the bone structure during the study. The fixation devices tested were 3mm diameter self drilling, self tapping threaded pin, 4mm diameter self tapping cortical threaded pin, 5mm diameter self tapping cancellous threaded pin and a triplanar fixation device ‘ortholock’ used with three 3mm pins. All the devices were tested for pull out, translational and rotational forces in unicortical and bicortical fixation modes. Also tested was the normal bang strength and forces generated by leaning on the devices. The forces required to produce translation increased with the increasing diameter of the pins. These were 105N, 185N, and 225N for the unicortical fixations and 130N, 200N, 225N for the bicortical fixations for 3mm, 4mm and 5mm diameter pins respectively. The forces required to pull out the pins were 1475N, 1650N, 2050N for the unicortical, 1020N, 3044N and 3042N for the bicortical fixated 3mm, 4mm and 5mm diameter pins. The ortholock translational and pull out strength was tested to 900N and 920N respectively and still it did not fail. Rotatory forces required to displace the tracker on pins was to the magnitude of 30N before failure. The ortholock device had rotational forces applied up to 135N and still did not fail. The manual leaning forces and the sudden bang forces generated were of the magnitude of 210N and 150N respectively. The strength of the fixation pins increases with increasing diameter from three to five mm for the translational forces. There is no significant difference in pull out forces of four mm and five mm diameter pins though it is more that the three mm diameter pins. This is because of the failure of material at that stage rather than the fixation device. The rotatory forces required to displace the tracker are very small and much less that that can be produced by the surgeon or assistants in single pins. Although the ortholock device was tested to 135N in rotation without failing, one has to be very careful not to put any forces during the operation on the tracker devices to ensure the accuracy of the procedure.