Search results for "computer.software_genre"
showing 10 items of 3858 documents
Evaluating the Authenticity of Virtual Environments: Comparison of Three Devices
2016
Immersive virtual environments (VEs) have the potential to provide novel cost effective ways for evaluating not only new environments and usability scenarios, but also potential user experiences. To achieve this, VEs must be adequately realistic. The level of perceived authenticity can be ascertained by measuring the levels of immersion people experience in their VE interactions. In this paper the degree of authenticity is measured via anauthenticity indexin relation to three different immersive virtual environment devices. These devices include (1) a headband, (2) 3D glasses, and (3) a head-mounted display (HMD). A quick scale for measuring immersion, feeling of control, and simulator sick…
Assisting immersive virtual reality development with user experience design approach
2017
In our study we explored how to design a biography of a late Finnish artist as a VR experience. We conducted a development process assisted by user experience (UX) design methods, which increased the process efficiency, and resulted in a research prototype. Through previous research and our development process, we identified components affecting the user experience. These components are: Immersion, Presence, Disorientation, Sense of Control, Pleasantness, Exploration and Simulator Sickness. From our user study with 13 participants, we were able to draw implications that relate to these components. While the set of components could be incomplete or subject to change, shows that further resea…
Immersion revisited:A review of existing definitions of immersion and their relation to different theories of presence
2016
The term immersion continues to be applied inconsistently within and across different fields of research connected with the study of virtual reality and interactive media. Moreover, immersion is oftentimes used interchangeably with the terms presence and engagement. This article details a review of existing definitions of immersion originating within the study of video games, virtual environments, and literary works of fiction. Based on this review, a three-dimensional taxonomy of the various conceptualizations of immersion is proposed. That is, the existing definitions of immersion may be broadly divided into three categories, each representing a dimension of the taxonomy: immersion as a p…
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…
2018
This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…
The Role of Information in Art Museum Communication Process
2013
Abstract The way that nowadays world is constantly changing influences both individuals and organizations. They have to act in an innovative, fast environment, pursuing their goals. The amount of information increases and it becomes difficult to filtrate and transform it. This is a conceptual paper, which aims at analysing art museums in nowadays society from a communication perspective. It starts out by describing how the museum institution managed to adapt during time and the way it modified under the action of innovation. It describes the needs and functions that such an institution has in society and corroborates them with the information sending process, offering scenario in which an e…
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
2019
Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, a hypervisor-based method for memory acquisition was proposed (Qi et al., 2017; Martignoni et al., 2010). This method obtains a reliable (atomic) memory image of a running system. The method achieves this by making all memory pages non-writable until they are copied to the memory image, thus preventing uncontrolled modification of these pages. Unfortunately, the proposed method has two deficiencies: (1) the method does not support multiprocessing and (2) the method does…
An Efficient Implementation of Parallel Parametric HRTF Models for Binaural Sound Synthesis in Mobile Multimedia
2020
The extended use of mobile multimedia devices in applications like gaming, 3D video and audio reproduction, immersive teleconferencing, or virtual and augmented reality, is demanding efficient algorithms and methodologies. All these applications require real-time spatial audio engines with the capability of dealing with intensive signal processing operations while facing a number of constraints related to computational cost, latency and energy consumption. Most mobile multimedia devices include a Graphics Processing Unit (GPU) that is primarily used to accelerate video processing tasks, providing high computational capabilities due to its inherent parallel architecture. This paper describes…
Development of Network Security Education
2021
Distance education has grown tremendously over the last decade. Internet technologies have enabled a large-scale dispensation of lectures, exercises, and training. Virtual Learning Management Systems (LMSs) offer a number of tools to realize distance education and distance learning. In this work, we present a virtual system architecture for training cyber security professionals with hands-on skills. The architecture is based on a VirtualBox virtualization environment. Guest machines are installed on an instance of VirtualBox. The installed environment offers a safe and isolated workbench for experiments. After installation and configuration of the environment, students perform a number of i…
Evaluating End-user Support : Validating the Use of Multiple Media in a CSCW Application
2006
Human-centred views on information systems are gaining more and more attention in IS community. The need to evaluate information systems from such a perspective is thus evident. In this paper, we exploit our earlier developed theoretical framework for evaluating end-user support in information systems, and demonstrate its usage in validating the use of multiple communication and collaboration media in a CSCW application. The evaluation is performed in terms of user perception in ISD process, users’ role in organizational information processing, and users’ behavioural nuances. Our study shows that a context specific theoretical framework is useful in validating the empirical results of syste…