404 resultados para Intuition.
Resumo:
Level design is often characterised as “where the rubber hits the road” in game development. It is a core area of games design, alongside design of game rules and narrative. However, there is a lack of literature dedicated to documenting teaching games design, let alone the more specialised topic of level design. Furthermore, there is a lack of formal frameworks for best practice in level design, as professional game developers often rely on intuition and previous experience. As a result, there is little for games design teachers to draw on when presented with the opportunity to teach a level design unit. In this paper, we discuss the design and implementation of a games level design unit in which students use the StarCraft II Galaxy Editor. We report on two cycles of an action research project, reflecting upon our experiences with respect to student feedback and peer review, and outlining our plans for improving the unit in years to come.
Resumo:
Aim The aim of this paper was to explore the concept of expertise in nursing from the perspective of how it relates to current driving forces in health care in which it discusses the potential barriers to acceptance of nursing expertise in a climate in which quantification of value and cost containment run high on agendas. Background Expert nursing practice can be argued to be central to high quality, holistic, individualized patient care. However, changes in government policy which have led to the inception of comprehensive guidelines or protocols of care are in danger of relegating the ‘expert nurse’ to being an icon of the past. Indeed, it could be argued that expert nurses are an expensive commodity within the nursing workforce. Consequently, with this change to the use of clinical guidelines, it calls into question how expert nursing practice will develop within this framework of care. Method The article critically reviews the evidence related to the role of the Expert Nurse in an attempt to identify the key concepts and ideas, and how the inception of care protocols has implications for their role. Conclusion Nursing expertise which focuses on the provision of individualized, holistic care and is based largely on intuitive decision making cannot, should not be reduced to being articulated in positivist terms. However, the dominant power and decision-making focus in health care means that nurses must be confident in articulating the value of a concept which may be outside the scope of knowledge of those with whom they are debating. Relevance to clinical practice The principles of abduction or fuzzy logic may be useful in assisting nurses to explain in terms which others can comprehend, the value of nursing expertise.
Resumo:
This paper explores the concept of expertise in intensive care nursing practice from the perspective of its relationship to the current driving forces in healthcare. It discusses the potential barriers to acceptance of nursing expertise in a climate in which quantification of value and cost containment run high on agendas. It argues that nursing expertise which focuses on the provision of individualised, holistic care and which is based largely on intuitive decision-making cannot and should not be reduced to being articulated in positivist terms. The principles of abduction or fuzzy logic, derived from computer science, may be useful in assisting nurses to explain in terms, which others can comprehend, the value of nursing expertise.
Resumo:
This paper presents the prototype of an information retrieval system for medical records that utilises visualisation techniques, namely word clouds and timelines. The system simplifies and assists information seeking tasks within the medical domain. Access to patient medical information can be time consuming as it requires practitioners to review a large number of electronic medical records to find relevant information. Presenting a summary of the content of a medical document by means of a word cloud may permit information seekers to decide upon the relevance of a document to their information need in a simple and time effective manner. We extend this intuition, by mapping word clouds of electronic medical records onto a timeline, to provide temporal information to the user. This allows exploring word clouds in the context of a patient’s medical history. To enhance the presentation of word clouds, we also provide the means for calculating aggregations and differences between patient’s word clouds.
Resumo:
We present two unconditional secure protocols for private set disjointness tests. In order to provide intuition of our protocols, we give a naive example that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the intersection cardinality. More specifically, it discloses its lower bound. By using the Lagrange interpolation, we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. In this protocol, a verification test is applied to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are the first ones that have been designed without a generic secure function evaluation. More important, they are the most efficient protocols for private disjointness tests in the malicious adversary case.
Resumo:
We present efficient protocols for private set disjointness tests. We start from an intuition of our protocols that applies Sylvester matrices. Unfortunately, this simple construction is insecure as it reveals information about the cardinality of the intersection. More specifically, it discloses its lower bound. By using the Lagrange interpolation we provide a protocol for the honest-but-curious case without revealing any additional information. Finally, we describe a protocol that is secure against malicious adversaries. The protocol applies a verification test to detect misbehaving participants. Both protocols require O(1) rounds of communication. Our protocols are more efficient than the previous protocols in terms of communication and computation overhead. Unlike previous protocols whose security relies on computational assumptions, our protocols provide information theoretic security. To our knowledge, our protocols are first ones that have been designed without a generic secure function evaluation. More importantly, they are the most efficient protocols for private disjointness tests for the malicious adversary case.
Resumo:
Conceptual modeling is an important tool for understanding and revealing weaknesses of business processes. Yet, the current practice in reengineering projects often considers simply the as-is process model as a brain-storming tool. This approach heavily relies on the intuition of the participants and misses a clear description of the quality requirements. Against this background, we identify four generic quality categories of business process quality, and populate them with quality requirements from related research. We refer to the resulting framework as the Quality of Business Process (QoBP) framework. Furthermore, we present the findings from applying the QoBP framework in a case study with a major Australian bank, showing that it helps to systematically fill the white space between as-is and to-be process modeling.
Resumo:
Airports accommodate passengers with a range of prior experience, from frequent flyers, to passengers who fly every couple of years, to those who have never flown before. Passengers with varying levels of prior experience may use different visual elements when navigating the airport. Ensuring all passengers can navigate to the processing activities intuitively is important for passengers, airports and airlines. This paper examines how participants with Low, Medium and High airport familiarity navigate through the departures area at an Australian international airport. Three navigation activities are investigated: (i) navigating to the check-in row, (ii) navigating through the Liquids, Aerosols and Gels (LAGs) preparation area before security screening, and; (iii) navigating to either the boarding gate first or to a discretionary activity first, after exiting customs. In the three activities, differences were observed between the familiarity groups. These differences include the use of different information to locate the check-in desk, different actions when navigating through the LAG preparation area, and evidence that Low familiarity passengers have a desire to locate the boarding gate as soon as possible once through customs. This research provides evidence based design reccomendations for airports to benefit from intuitive passenger navigation.
Resumo:
This paper describes research investigating expertise and the types of knowledge used by airport security screeners. It applies a multi method approach incorporating eye tracking, concurrent verbal protocol and interviews. Results show that novice and expert security screeners primarily access perceptual knowledge and experience little difficulty during routine situations. During non-routine situations however, experience was found to be a determining factor for effective interactions and problem solving. Experts were found to use strategic knowledge and demonstrated structured use of interface functions integrated into efficient problem solving sequences. Comparatively, novices experienced more knowledge limitations and uncertainty resulting in interaction breakdowns. These breakdowns were characterised by trial and error interaction sequences. This research suggests that the quality of knowledge security screeners have access to has implications on visual and physical interface interactions and their integration into problem solving sequences. Implications and recommendations for the design of interfaces used in the airport security screening context are discussed. The motivations of recommendations are to improve the integration of interactions into problem solving sequences, encourage development of problem scheme knowledge and to support the skills and knowledge of the personnel that interact with security screening systems.
Resumo:
While organizations strive to leverage the vast information generated daily from social media platforms and both decision makers and consultants are keen to identify and exploit this information’s value, there has been little research into social media in the business context. Social media are diverse, varying in scope and functionality, this diversity entailing a complex of attributes and characteristics, resulting in confusion for both researchers and organizations. Taxonomies are important precursors in emerging fields and are foundational for rigorous theory building. Though aspects of social media have been studied from various discipline perspectives, this work has been largely descriptive. Thus, while the need for a rigorous taxonomy of social media is strong, previous efforts to classify social media suffer limitations – e.g. lack of a systematic taxonomic method, overreliance on intuition, disregard for the users’ perspective, and inadequate consideration of purpose. Thus, this study was mainly initiated by the overarching question “How can social media in the business context be usefully classified?” In order to address this gap, the current paper proposes a systematic method for developing a taxonomy appropriate to study social media in organizations context, combining Nickerson et al,’s (2012) IS taxonomy building guidelines and a Repertory grid (RepGrid) approach.
Resumo:
It is often said that Australia is a world leader in rates of copyright infringement for entertainment goods. In 2012, the hit television show, Game of Thrones, was the most downloaded television show over bitorrent, and estimates suggest that Australians accounted for a plurality of nearly 10% of the 3-4 million downloads each week. The season finale of 2013 was downloaded over a million times within 24 hours of its release, and again Australians were the largest block of illicit downloaders over BitTorrent, despite our relatively small population. This trend has led the former US Ambassador to Australia to implore Australians to stop 'stealing' digital content, and rightsholders to push for increasing sanctions on copyright infringers. The Australian Government is looking to respond by requiring Internet Service Providers to issue warnings and potentially punish consumers who are alleged by industry groups to have infringed copyright. This is the logical next step in deterring infringement, given that the operators of infringing networks (like The Pirate Bay, for example) are out of regulatory reach. This steady ratcheting up of the strength of copyright, however, comes at a significant cost to user privacy and autonomy, and while the decentralisation of enforcement reduces costs, it also reduces the due process safeguards provided by the judicial process. This article presents qualitative evidence that substantiates a common intuition: one of the major reasons that Australians seek out illicit downloads of content like Game of Thrones in such numbers is that it is more difficult to access legitimately in Australia. The geographically segmented way in which copyright is exploited at an international level has given rise to a ‘tyranny of digital distance’, where Australians have less access to copyright goods than consumers in other countries. Compared to consumers in the US and the EU, Australians pay more for digital goods, have less choice in distribution channels, are exposed to substantial delays in access, and are sometimes denied access completely. In this article we focus our analysis on premium film and television offerings, like Game of Thrones, and through semi-structured interviews, explore how choices in distribution impact on the willingness of Australian consumers to seek out infringing copies of copyright material. Game of Thrones provides an excellent case study through which to frame this analysis: it is both one of the least legally accessible television offerings and one of the most downloaded through filesharing networks of recent times. Our analysis shows that at the same time as rightsholder groups, particularly in the film and television industries, are lobbying for stronger laws to counter illicit distribution, the business practices of their member organisations are counter-productively increasing incentives for consumers to infringe. The lack of accessibility and high prices of copyright goods in Australia leads to substantial economic waste. The unmet consumer demand means that Australian consumers are harmed by lower access to information and entertainment goods than consumers in other jurisdictions. The higher rates of infringement that fulfils some of this unmet demand increases enforcement costs for copyright owners and imposes burdens either on our judicial system or on private entities – like ISPs – who may be tasked with enforcing the rights of third parties. Most worryingly, the lack of convenient and cheap legitimate digital distribution channels risks undermining public support for copyright law. Our research shows that consumers blame rightsholders for failing to meet market demand, and this encourages a social norm that infringing copyright, while illegal, is not morally wrongful. The implications are as simple as they are profound: Australia should not take steps to increase the strength of copyright law at this time. The interests of the public and those of rightsholders align better when there is effective competition in distribution channels and consumers can legitimately get access to content. While foreign rightsholders are seeking enhanced protection for their interests, increasing enforcement is likely to increase their ability to engage in lucrative geographical price-discrimination, particularly for premium content. This is only likely to increase the degree to which Australian consumers feel that their interests are not being met and, consequently, to further undermine the legitimacy of copyright law. If consumers are to respect copyright law, increasing sanctions for infringement without enhancing access and competition in legitimate distribution channels could be dangerously counter-productive. We suggest that rightsholders’ best strategy for addressing infringement in Australia at this time is to ensure that Australians can access copyright goods in a timely, affordable, convenient, and fair lawful manner.
Resumo:
An experiment in narrative play. Ten Threaders explored an urban physical space and creatively related what they encountered via mobile to their Weavers. Weavers creatively shaped this material to fashion a collaborative story on the fly, framed by a theme of loss and connection. The Weavers On Threader’s Day, during the hours of the lost, Threaders and Weavers collaborate to recover moments of connection and loss, of missed (or not) meetings and inevitable (or not) parting. Threaders: Your path begins near Brick Lane. Use your gift to discover threads. The threads may be thin at start, as fine as an inkling or as fleet as a passing memory. Yet they pull forth deep personal moments which in turn lead to the most powerful stories in human experience, ones that partake of the mythic inevitable. On a street in London, as the sun declines, Gilgamesh pursues, Orpheus sings, Perdita boards a ship, Eurydice walks forever toward the light… as the Lady of Shalott works her loom. Weavers: The fabric a Threader stitches through is the ancient story rediscovered every time one person follows or leads another. As your Threader describes the moments and aspects of this journey to you, in spoken words and written words and in images sent from their phone, you weave these impressions into a multithreaded story, in concert with the other Weavers. And you help guide your Threader across the storyscape, with your narrative intuition and by pulling the threads that connect to times in your own life.
Resumo:
“Guardians of Hidden Universes” is a playful story for experiencing on your phone in the street. You’re a Guardian of Hidden Universes, and when you check your Communication Terminal you find the Guild has made a terrible mistake they need you to repair. The experience lasts about 15-25 minutes, and takes you around whatever city you happen to be in. That’s right – you can play it in any city in the world! The app was launched at Popup Playground‘s 2013 Fresh Air Festival – a new pervasive gaming festival in Melbourne, Australia. This playful story is inspired by the idea of creating a locative-experience that is not site-specific. How can we have an experience than engages with the environment that also can work worldwide? The story is also playing with the idea of engaging with a character and a space and intuition within a short period of time. The short and playful experience is a Universe Creation 101 production. It was conceived, written, and designed by Christy Dena; with artwork, coding, and interface design by Elroy.
Resumo:
Governments, authorities, and organisations dedicate significant resources to encourage communities to prepare for and respond to natural hazards such as cyclones, earthquakes, floods, and bushfires. However, recent events, media attention, and ongoing academic research continue to highlight cases of non-compliance including swift water rescues. Individuals who fail to comply with instructions issued during natural hazards significantly impede the emergency response because they divert resources to compliance-enforcement and risk the lives of emergency service workers who may be required to assist them. An initial investigation of the field suggests several assumptions or practices that influence emergency management policy, communication strategy, and community behaviours during natural hazards: 1) that community members will comply with instructions issued by governments and agencies that represent the most authoritative voice, 2) that communication campaigns are shaped by intuition rather than evidence-based approaches (Wood et al., 2012), and 3) that emergency communication is linear and directional. This extended abstract represents the first stage of a collaborative research project that integrates industry and cross-disciplinary perspectives to provide evidence-based approaches for emergency and risk communication during the response and recovery phases of a natural hazard. Specifically, this abstract focuses on the approach taken and key elements that will form the development of a typology of compliance-gaining messages during the response phase of natural hazards, which will be the focus of the conference presentation.
Resumo:
Almost 10 years ago, Pullin and Knight (2001) called for an “effectiveness revolution in conservation” to be enabled by the systematic evaluation of evidence for conservation decision making. Drawing from the model used in clinicalmedicine, they outlined the concept of “evidencebased conservation” in which existing information, or evidence, from relevant and rigorous research is compiled and analyzed in a systematic manner to inform conservation actions (Cochrane 1972). The promise of evidencebased conservation has generated significant interest; 25 systematic reviews have been completed since 2004 and dozens are underway (Collaboration for Environmental Evidence 2010). However we argue that an “effectiveness revolution” (Pullin & Knight 2001) in conservation will not be possible unless mechanisms are devised for incorporating the growing evidence base into decision frameworks. For conservation professionals to accomplish the missions of their organizations they must demonstrate that their actions actually achieve objectives (Pullin & Knight 2009). Systematic evaluation provides a framework for objectively evaluating the effectiveness of actions. To leverage the benefit of these evaluations, we need resource-allocation systems that are responsive to their outcomes. The allocation of conservation resources is often the product of institutional priorities or reliance on intuition (Sutherland et al. 2004; Pullin & Knight 2005; Cook et al. 2010). We highlight the NICE technologyappraisal process because it provides an example of formal integration of systematic-evidence evaluation with provision of guidance for action. The transparent process, which clearly delineates costs and benefits of each alternative action, could also provide the public with new insight into the environmental effects of different decisions. This insight could stimulate a wider discussion about investment in conservation by demonstrating how changes in funding might affect the probability of achieving conservation objectives. ©2010 Society for Conservation Biology