972 resultados para critical intraband interaction
Resumo:
Increasingly the fields of Human Computer Interaction (HCI) and art are intersecting. Interactive artworks are being evaluated by HCI methods and artworks are being created that employ and repurpose technology for interactive environments. In this paper we steer a path between empirical and critical–theoretical traditions, and discuss HCI research and art works that also span this divide. We address concerns about ‘new’ ethnography raised by Crabtree et al. (2009) in “Ethnography Considered Harmful”, a critical essay that positions ethnographic and critical-theoretical views at odds with each other. We propose a mediated view for understanding interactions within open-ended interactive artworks that values both perspectives as we navigate boundaries between art practice and HCI.
Resumo:
In the first Modern Language Association newsletter for 2006, renowned poetry critic and MLA President, Marjorie Perloff, remarked on the growing ascendency of Creative Writing within English Studies in North America. In her column, Perloff notes that "[i]n studying the English Job Information List (JIL) so as to advise my own students and others I know currently on the market, I noticed what struck me as a curious trend: there are, in 2005, almost three times as many positions in creative writing as in the study of twentieth-century literature" (3). The dominance of Creative Writing in the English Studies job list in turn reflects the growing student demand for undergraduate and postgraduate degrees in the field—over the past 20 years, BA and MA degrees in Creative Writing in North American tertiary institutions have quadrupled (3)...
Resumo:
User-generated content plays a pivotal role in the current social media. The main focus, however, has been on the explicitly generated user content such as photos, videos and status updates on different social networking sites. In this paper, we explore the potential of implicitly generated user content, based on users’ online consumption behaviors. It is technically feasible to record users’ consumption behaviors on mobile devices and share that with relevant people. Mobile devices with such capabilities could enrich social interactions around the consumed content, but it may also threaten users’ privacy. To understand the potentials of this design direction we created and evaluated a low-fidelity prototype intended for photo sharing within private groups. Our prototype incorporates two design concepts, namely, FingerPrint and MoodPhotos that leverage users’ consumption history and emotional responses. In this paper, we report user values and user acceptance of this prototype from three participatory design workshops.
Resumo:
Accounting education is critical and any improvements in tertiary education of accounting students should result in better prepared graduates entering the profession. This study evaluates accounting students’ learning styles and the interaction of learning styles and teaching methodologies during degree programmes. Nine classes of accounting students (648 students) spread across four years and two degree programmes were evaluated. Students self-evaluated their learning style, pre-instruction. They were then subject to two separate teaching techniques (one active and one passive) in each course. Learning styles were then re-assessed and teaching techniques evaluated. Accounting students displayed a preference for passive learning, even those far advanced in their degrees. Furthermore, when learning styles matched teaching methods used, usefulness was assessed as high but when learning styles and teaching methods differed, usefulness deteriorated. Overall, the teaching methods were deemed more effective by active rather than passive learners. The implications are significant. To maximise educational benefit for the accounting profession, student learning styles should be assessed before designing appropriate teaching methodologies. This has resource implications which would have to be considered.
Resumo:
Despite board meetings representing the main arena where directors discharge their duties and make critical corporate decisions, we know little about what occurs in the boardroom. Consequently, there is increasing academic interest in understanding how meetings are run and how directors participate. This study contributes to this emerging literature by exploring the impact of board meeting arrangements on directors’ interactions and perceptions of meeting effectiveness. We video-taped board meetings at two Australian corporations operating in the same industry and use an in-depth analysis of interactions and board processes to reveal that a rather small difference in meeting arrangements (i.e. the timing and length of meetings) had a significant influence on interaction patterns. Specifically, given significant amounts of environmental turbulence in the sector, director inclusiveness and participation were reduced as time pressure increased due to shorter meetings, lowering director perceptions of meeting effectiveness.
Resumo:
A new era of cyber warfare has appeared on the horizon with the discovery and detection of Stuxnet. Allegedly planned, designed, and created by the United States and Israel, Stuxnet is considered the first known cyber weapon to attack an adversary state. Stuxnet's discovery put a lot of attention on the outdated and obsolete security of critical infrastructure. It became very apparent that electronic devices that are used to control and operate critical infrastructure like programmable logic controllers (PLCs) or supervisory control and data acquisition (SCADA) systems lack very basic security and protection measures. Part of that is due to the fact that when these devices were designed, the idea of exposing them to the Internet was not in mind. However, now with this exposure, these devices and systems are considered easy prey to adversaries.
Resumo:
This paper discusses the idea and demonstrates an early prototype of a novel method of interacting with security surveillance footage using natural user interfaces in place of traditional mouse and keyboard interaction. Current surveillance monitoring stations and systems provide the user with a vast array of video feeds from multiple locations on a video wall, relying on the user’s ability to distinguish locations of the live feeds from experience or list based key-value pair of location and camera IDs. During an incident, this current method of interaction may cause the user to spend increased amounts time obtaining situational and location awareness, which is counter-productive. The system proposed in this paper demonstrates how a multi-touch screen and natural interaction can enable the surveillance monitoring station users to quickly identify the location of a security camera and efficiently respond to an incident.
Resumo:
We explored the mediation effect of caregiver self-efficacy on the influences of behavioral and psychological symptoms (BPSD) of dementia care recipients (CRs) or family caregivers’ (CGs) social supports (informational, tangible and affectionate support and positive social interaction) on CGs’ mental health. We interviewed 196 CGs, using a battery of measures including demographic data of the dyads, CRs’ dementia-related impairments, and CGs’ social support, self-efficacy and the Medical Outcome Study (MOS) Short-Form (SF-36) Health Survey. Multiple regression analyses showed that gathering information on self-efficacy and managing CG distress self-efficacy were the partial mediators of the relationship between positive social interaction and CG mental health. Managing caregiving distress self-efficacy also partial mediated the impact of BPSD on CG mental health. We discuss implications of the results for improving mental health of the target population in mainland China.
Resumo:
The concept of affordance has different interpretations in the field of Human-Computer Interaction (HCI). However, its treatment has been merely as a one-to-one relationship between a user and a technology. We believe that a broader view of affordances is needed which encompasses social and cultural aspects of our everyday life. We propose an interaction-centered view of affordance that can be useful for developing better understandings of designed artefacts. An interaction-centered view of affordance suggests that affordance is an interpretative relationship between users and the technology that emerges during the users' interaction with the technology in the lived environments. We distinguish two broad classes of affordances: affordance in Information and affordance in Articulation. Affordance in information refers to users' understanding of a technology based on their semantic and syntactic interpretation; and affordance in articulation refers to users' interpretations about the use of the technology. We also argue that the notion of affordance should be treated at two levels: at the 'artefact level' and at the 'practice level'. Consequently, we provide two examples to demonstrate our arguments.
Resumo:
There has been a greater focus on strengthening evaluation capacity building (ECB) within development organisations in recent years. This can be attributed in part to the growing appreciation of the value of participatory and collaborative forms of evaluation. Evaluation is increasingly seen as an ongoing learning process and an important means of strengthening capacity and improving organisational performance (Horton et al., 2003:7). While there are many benefits of using participatory methodologies in ECB projects, our experiences and a review of the literature in this area highlight the many challenges, issues and contradictions that can affect the success of such ECB efforts. We discuss these issues, drawing on our learnings from the ongoing participatory action research (PAR) project 'Assessing Communication for Social Change’ (AC4SC). This four year project, which began in 2007, is a collaboration between communication and development academics and evaluation specialists from two Australian universities and communication for development practitioners and monitoring and evaluation (M&E) staff in the NGO Equal Access Nepal (EAN). The aim is to develop, implement, and evaluate a participatory methodology for assessing the social change impacts of community radio programs produced by EAN. It builds on previous projects that used ethnographic action research (EAR) methodology (Tacchi et al., 2007).
Resumo:
"In this chapter the authors present a critique of Participatory Evaluation as worked in development projects, in this case, in Nepal. The article works between established claims that Participatory Evaluation builds capacity at programmatic and organisational levels, and the specific experiences of these claims in the authors’ current work. They highlight the need to address key difficulties such as high turn-over of staff and resulting loss of capacity to engage in Participatory Evaluation, and the difficulty of communication between academic as compared with local practical wisdoms. A key issue is the challenge of addressing the inevitable issues of power inequities that such approaches encounter. While Participatory Evaluation has been around for some time, it has only enjoyed more widespread recognition of its value in comparatively recent times, with its uptake in international development environments. To this extent, the practice is still in its early stages of development, and Jo, June and Michael’s work contributes to strengthening and more comprehensively understanding it. With regard to the meta-theme of this publication, this chapter is an example of how context not only influences the methodology to be used and the praxis of how it is to be used, but contributes to early explication of the core nature of an emerging methodology."
Resumo:
E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.
Resumo:
Transition zones between bridge decks and rail tracks suffer early failure due to poor interaction between rail vehicles and sudden changes of stiffness. This has been an ongoing problem to rail industry and yet still no systematic studies appear to have been taken to maintain a gradually smoothening transmission of forces between the bridge and its approach. Differential settlement between the bridge deck and rail track in the transition zone is the fundamental issue, which negatively impacts the rail industry by causing passenger discomfort, early damage to infrastructure and vehicle components, speed reduction, and frequent maintenance cycles. Identification of mechanism of the track degradation and factors affecting is imperative to design any mitigation method for reducing track degradation rate at the bridge transition zone. Unfortunately this issue is still not well understood, after conducting a numbers of reviews to evaluate the key causes, and introducing a wide range of mitigation techniques. In this study, a comprehensive analysis of the available literature has been carried out to develop either a novel design framework or a mitigation technique for the bridge transition zone. This paper addresses three critical questions in relation to the track degradation at transition zone: (1) what are the causes of bridge transition track degradation?; (2) what are the available mitigation techniques in reducing the track degradation rate?; (3) what are the factors affecting on poor performance of the existing mitigation techniques?. It is found that the absence of soil-water response, dynamic loading response, and behaviour of geotechnical characteristics under long-term conditions in existing track transition design frameworks critically influence on the failures of existing mitigation techniques. This paper also evaluates some of the existing design frameworks to identify how each design framework addresses the track degradation at the bridge transition zone.