Search results for "Cognitive"
showing 10 items of 10389 documents
Minéralité du vin: représentations mentales de consommateurs suisses et français
2014
Minerality in wines: mental expectations of Swiss and French consumers Today the concept of minerality in wines is omnipresent. It appears in marketing discourses, in oenological critics and commercial communication. However, there is no common agreement on a general definition. This paper aims to study the different expectations that Swiss and French consumers have about minerality. The multidimensionality of the term is reflected through stereotypes like the odor of flint, the impression of "sucking a stone", or referring to acidity or to the Terroir. Thus, the term minerality appears as a unstable concept and providing a precise definition remains consequently difficult for many consumer…
T9+HUD: Physical Keypad and HUD can Improve Driving Performance while Typing and Driving
2016
We introduce T9+HUD, a text entry method designed to decrease visual distraction while driving and typing. T9+HUD combines a physical 3x4 keypad on the steering wheel with a head-up-display (HUD) for projecting output on the windshield. Previous work suggests this may be a visually less demanding way to type while driving than the popular case which requires shifts of visual attention away from the road. We present a prototype design and report first results from a controlled evaluation in a driving simulator. While driving, the T9+HUD text entry rate was equal compared to a dashboard-mounted touchscreen device, but it reduced lane deviations by 70%. Furthermore, there was no significant di…
Employees’ adherence to information security policies: An exploratory field study
2014
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…
SearchBot: Supporting voice conversations with proactive search
2018
Searching during conversations and social interactions is becoming increasingly common. Although searching could be helpful for solving arguments, building common ground, and reinforcing mutual assumptions, it can also cause inter-actional problems. Proactive search approaches can enrich conversations with additional information without neglecting the shared and established social norms of being attentive to ongoing interaction. This demo showcases SearchBot, a tool that minimizes the issues associated with the practice of searching during conversations. It accomplishes this by tracking conversational background speech and then providing continuous recommendations of related documents and e…
Measuring Distraction at the Levels of Tactical and Strategic Control: The Limits of Capacity-Based Measures for Revealing Unsafe Visual Sampling Mod…
2011
The control theory of driving suggests that driver distraction can be analyzed as a breakdown of control at three levels. Common approach for analyzing distraction experimentally is to utilize capacity-based measures to assess distraction at the level of operational control. Three driving simulation experiments with 61 participants were organized to evaluate which kind of measures could be used to analyze drivers' tactical visual sampling models and the related effects of distraction while searching textual information on in-car display. The effects of two different text types were evaluated. The utilized capacity-based measures seemed to be insufficient for revealing participants' tactical…
User session level diverse reranking of search results
2018
Most Web search diversity approaches can be categorized as Document Level Diversification (DocLD), Topic Level Diversification (TopicLD) or Term Level Diversification (TermLD). DocLD selects the relevant documents with minimal content overlap to each other. It does not take the coverage of query subtopics into account. TopicLD solves this by modeling query subtopics explicitly. However, the automatic mining of query subtopics is difficult. TermLD tries to cover as many query topic terms as possible, which reduces the task of finding a query's subtopics into finding a set of representative topic terms. In this paper, we propose a novel User Session Level Diversification (UserLD) approach bas…
Open-ended projects opened up — aspects of openness
2017
Abstract—One of the most important areas of competence for professional engineers is the ability to function well in project work, in particular they need to be able to efficiently solve open-ended problems in different collaborative settings. The development of this ability is however not prominent in engineering education despite numerous authors suggesting openended problems as a pedagogical tool to promote development of collaborative problem solving competence by including elements of group or project work in courses. In our own long experience of using open-ended problems in collaborative student projects, we have identified a lack of systematic progression in learning outcomes and sk…
Schemata, Acculturation, and Cognition : Expatriates in Japan's Software Industry
2016
This multiple case based empirical study expands the knowledge around North American software and IT workers in Japan as well as the expatriate literature and discussion of cognitive schemata in cross cultural settings. The study includes eleven individuals, nine of them in software. Evidence of selection, rejection, and adjustment of cognitive schemata found in Japan's business world is presented. Changes in schemata drive cultural adjustment and acculturation. North American software and IT workers in Japan must maneuver through unfamiliar and often complex schemata to motivate, lead, manipulate, and communicate with coworkers and partners and thereby gain success.
Linear fusion of interrupted reports in cooperative spectrum sensing for cognitive radio networks
2015
Interrupted reporting has recently been introduced as an effective method to increase the energy efficiency of cooperative spectrum sensing schemes in cognitive radio networks. In this paper, joint optimization of the reporting and fusion phases in a cooperative sensing with interrupted reporting is considered. This optimization aims at finding the best weights used at the fusion center to construct a linear fusion of the received interrupted reports, jointly with Bernoulli distributions governing the statistical behavior of the interruptions. The problem is formulated by using the deflection criterion and as a nonconvex quadratic program which is then solved for a suboptimal solution, in a…
Sensory modalities and mental content in product experience
2015
Contemporary research in human-technology interaction emphasises the need to focus on what people experience when they interact with technological artefacts. Understanding how people experience products requires detailed investigation of how physical design properties are mentally represented, and the theorisation of how people represent information obtained through different modalities still needs work. The objective of this study is to investigate how people experience modality-related affective aspects of products, using the psychological concept of mental content. For this purpose, we adopt the framework of user psychology, which is the sub-area of psychology involved with investigating…