Search results for "INFORMATION"
showing 10 items of 14916 documents
Visual-manual in-car tasks decomposed: text entry and kinetic scrolling as the main sources of visual distraction
2013
Distraction effects of in-car tasks with a touch screen based navigation system user interface were studied in a driving simulator experiment with eye tracking. The focus was to examine which particular in-car task components visually distract drivers the most. The results indicate that all of the visual-manual in-car tasks led to increased levels of experienced demands and to lower driving speeds. The most significant finding was that text entry and kinetic scrolling of lists were the main sources of visual distraction whereas simple selection tasks with familiar target locations led to least severe distraction effects.
A modelling framework for social media monitoring
2013
This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…
A Generic Architecture for a Social Network Monitoring and Analysis System
2011
This paper describes the architecture and a partial implementation of a system designed for the monitoring and analysis of communities at social media sites. The main contribution of the paper is a novel system architecture that facilitates long-term monitoring of diverse social networks existing and emerging at various social media sites. It consists of three main modules, the crawler, the repository and the analyzer. The first module can be adapted to crawl different sites based on ontology describing the structure of the site. The repository stores the crawled and analyzed persistent data using efficient data structures. It can be implemented using special purpose graph databases and/or …
Revisiting rainfall to explore exam questions and performance on CS1
2015
The Rainfall problem comprises small tasks that have been used to investigate student performance in introductory programming. We conducted several kinds of analyses to inform our understandings of student performance in CS1 relating to this problem. We analyzed implementation approaches and program errors, as in related studies, and also explored the role of test writing vis-a-vis the most common student error. Finally, using correlation analyses and manual inspection of the exam answers, we studied how well the Rainfall problem served as an exam question. The students' implementation choices reflected their familiarity with particular loop constructs, while the single most common error co…
How and Why to Start and Run a SIGCHI Local Chapter
2015
There is a vast and increasing interest towards local HCI communities around the globe and in particular on geographical areas in which HCI has only recently started to gain increasing interest by local industries as well as academic institutions. A SIGCHI Local Chapter is one of the ways a local HCI community can organize and get visibility and support for their activities. However, many active volunteers in this field might not be aware of this possibility. The main goal of the Chapters' SIG in CHI'15 is to inform interested parties of SIGCHI Local Chapters and to find ways in which SIGCHI could better support local HCI communities with their various needs all over the world.
Co-evolution between Trust in Teachers and Higher Education Enabled by ICT Advancement – A Suggestion to ICT Growing Economies
2016
In light of the increasing significance of trust-based higher education towards digitally-rich learning environments, co-evolution dynamism between trust in teachers and higher education enabled by ICT advancement was analyzed. Using the rate of trust in teachers for good education in the Global Teacher Status Index, together with statistics on higher education level and ICT advancement, an empirical numerical analysis of 20 countries was attempted. It was identified that while ICT advanced countries have constructed a co-evolution between ICT, higher education and trust, ICT growing countries have not succeeded due to a vicious cycle between ICT and trust. Finland’s educational success can…
Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications
2014
Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…
Role of Acquisition Intervals in Private and Public Cloud Storage Costs
2014
The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in the foreseeable future to reach 8 ZB by 2015. Traditionally, organizations proactively have built and managed their private storage facilities to cope with the growing demand for storage capacity. Recently, many organizations have instead welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services due to the proliferation of public cloud infrastructure offerings. The comparative cost-efficiency of these two alternatives depends on a number of factors, such as the prices of the public and private stor…
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work
2013
Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.
Investigating serendipity in recommender systems based on real user feedback
2018
Over the past several years, research in recommender systems has emphasized the importance of serendipity, but there is still no consensus on the definition of this concept and whether serendipitous items should be recommended is still not a well-addressed question. According to the most common definition, serendipity consists of three components: relevance, novelty and unexpectedness, where each component has multiple variations. In this paper, we looked at eight different definitions of serendipity and asked users how they perceived them in the context of movie recommendations. We surveyed 475 users of the movie recommender system, MovieLens regarding 2146 movies in total and compared tho…