Search results for "information"

showing 10 items of 14916 documents

Visual-manual in-car tasks decomposed: text entry and kinetic scrolling as the main sources of visual distraction

2013

Distraction effects of in-car tasks with a touch screen based navigation system user interface were studied in a driving simulator experiment with eye tracking. The focus was to examine which particular in-car task components visually distract drivers the most. The results indicate that all of the visual-manual in-car tasks led to increased levels of experienced demands and to lower driving speeds. The most significant finding was that text entry and kinetic scrolling of lists were the main sources of visual distraction whereas simple selection tasks with familiar target locations led to least severe distraction effects.

ta113Focus (computing)InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Computer sciencebusiness.industryDriving simulatorNavigation systemTask (computing)ScrollingDistractionEye trackingComputer visionArtificial intelligenceUser interfacebusiness
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

A Generic Architecture for a Social Network Monitoring and Analysis System

2011

This paper describes the architecture and a partial implementation of a system designed for the monitoring and analysis of communities at social media sites. The main contribution of the paper is a novel system architecture that facilitates long-term monitoring of diverse social networks existing and emerging at various social media sites. It consists of three main modules, the crawler, the repository and the analyzer. The first module can be adapted to crawl different sites based on ontology describing the structure of the site. The repository stores the crawled and analyzed persistent data using efficient data structures. It can be implemented using special purpose graph databases and/or …

ta113Graph databaseDatabaseRelational databaseComputer scienceSystems architectureGraph (abstract data type)Persistent data structureOntology (information science)computer.software_genreSoftware architectureData structurecomputer2011 14th International Conference on Network-Based Information Systems
researchProduct

Revisiting rainfall to explore exam questions and performance on CS1

2015

The Rainfall problem comprises small tasks that have been used to investigate student performance in introductory programming. We conducted several kinds of analyses to inform our understandings of student performance in CS1 relating to this problem. We analyzed implementation approaches and program errors, as in related studies, and also explored the role of test writing vis-a-vis the most common student error. Finally, using correlation analyses and manual inspection of the exam answers, we studied how well the Rainfall problem served as an exam question. The students' implementation choices reflected their familiarity with particular loop constructs, while the single most common error co…

ta113Guard (information security)novice programmersUnit testingCommon errorRainfall problemDivision by zeroCode (semiotics)Test (assessment)PedagogyComputingMilieux_COMPUTERSANDEDUCATIONMathematics educationta516CS1PsychologyKnowledge transferProceedings of the 15th Koli Calling Conference on Computing Education Research
researchProduct

How and Why to Start and Run a SIGCHI Local Chapter

2015

There is a vast and increasing interest towards local HCI communities around the globe and in particular on geographical areas in which HCI has only recently started to gain increasing interest by local industries as well as academic institutions. A SIGCHI Local Chapter is one of the ways a local HCI community can organize and get visibility and support for their activities. However, many active volunteers in this field might not be aware of this possibility. The main goal of the Chapters' SIG in CHI'15 is to inform interested parties of SIGCHI Local Chapters and to find ways in which SIGCHI could better support local HCI communities with their various needs all over the world.

ta113Human-Computer Interaction (HCI)ComputingMilieux_THECOMPUTINGPROFESSIONMultimediabusiness.industryField (Bourdieu)local communitiesVisibility (geometry)GlobePublic relationsSpecial Interest Groupcomputer.software_genreLocal communityspecial interest groupsInformationSystems_MODELSANDPRINCIPLESmedicine.anatomical_structurePolitical sciencemedicineInformationSystems_MISCELLANEOUSbusinesscomputerProceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
researchProduct

Co-evolution between Trust in Teachers and Higher Education Enabled by ICT Advancement – A Suggestion to ICT Growing Economies

2016

In light of the increasing significance of trust-based higher education towards digitally-rich learning environments, co-evolution dynamism between trust in teachers and higher education enabled by ICT advancement was analyzed. Using the rate of trust in teachers for good education in the Global Teacher Status Index, together with statistics on higher education level and ICT advancement, an empirical numerical analysis of 20 countries was attempted. It was identified that while ICT advanced countries have constructed a co-evolution between ICT, higher education and trust, ICT growing countries have not succeeded due to a vicious cycle between ICT and trust. Finland’s educational success can…

ta113Index (economics)Knowledge managementHigher educationbusiness.industrysulautuva opetusblended learningPublic relationseducational productivity paradoxlogistic growthBlended learningtrust in teachersInformation and Communications TechnologyPolitical scienceProductivity paradoxComputingMilieux_COMPUTERSANDEDUCATIONta516pedagogical loveDynamismDisengagement theorybusinessJournal of Technology Management for Growing Economies
researchProduct

Comparing the cost-efficiency of CoAP and HTTP in Web of Things applications

2014

Abstract Constrained Application Protocol (CoAP) has been introduced as a simpler alternative to the Hypertext Transfer Protocol (HTTP) for connecting constrained smart objects to the Web. The adoption of the protocol depends on its relative advantage, and the cost–benefit associated with the use of the protocol is a significant factor affecting a protocol adoption decision. This paper aims at deepening the understanding of the cost–benefits of CoAP and identifies the application scenarios where its use is likely to be economically justifiable. The paper analyzes the costs of using CoAP and HTTP in the Web of Things (WoT) applications, by identifying the components of the total cost of owne…

ta113Information Systems and ManagementHypertext Transfer Protocolta213Cost efficiencyComputer scienceSmart objectsbusiness.industrycomputer.internet_protocolta111Computer securitycomputer.software_genreManagement Information SystemsConstrained Application ProtocolWeb of ThingsArts and Humanities (miscellaneous)Developmental and Educational PsychologyOverhead (computing)businessta512Protocol (object-oriented programming)computerInformation SystemsComputer networkDecision Support Systems
researchProduct

Role of Acquisition Intervals in Private and Public Cloud Storage Costs

2014

The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in the foreseeable future to reach 8 ZB by 2015. Traditionally, organizations proactively have built and managed their private storage facilities to cope with the growing demand for storage capacity. Recently, many organizations have instead welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services due to the proliferation of public cloud infrastructure offerings. The comparative cost-efficiency of these two alternatives depends on a number of factors, such as the prices of the public and private stor…

ta113Information Systems and Managementbusiness.industryDigital contentmedia_common.quotation_subjectControl (management)Volume (computing)ProvisioningCloud computingEnvironmental economicsManagement Information SystemsOutsourcingArts and Humanities (miscellaneous)Service (economics)Developmental and Educational PsychologyOperations managementBusinessCloud storageInformation Systemsmedia_commonDecision Support Systems
researchProduct

Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work

2013

Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.

ta113Information Systems and Managementbusiness.industrymedia_common.quotation_subjectAffect (psychology)Work relatedInterpersonal behaviorManagement Information SystemsWork (electrical)PhenomenonThe InternetHabitbusinessPsychologySocial psychologyInformation SystemsSocial influencemedia_commonInformation & Management
researchProduct

Investigating serendipity in recommender systems based on real user feedback

2018

Over the past several years, research in recommender systems has emphasized the importance of serendipity, but there is still no consensus on the definition of this concept and whether serendipitous items should be recommended is still not a well-addressed question. According to the most common definition, serendipity consists of three components: relevance, novelty and unexpectedness, where each component has multiple variations. In this paper, we looked at eight different definitions of serendipity and asked users how they perceived them in the context of movie recommendations. We surveyed 475 users of the movie recommender system, MovieLens regarding 2146 movies in total and compared tho…

ta113Information retrievalComputer scienceSerendipityuutuudetpalautesuosittelujärjestelmätNoveltyserendipityContext (language use)02 engineering and technologyVariation (game tree)Recommender systemunexpectednessPreferenceMovieLenssattumanovelty020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)relevancerecommender systemsProceedings of the 33rd Annual ACM Symposium on Applied Computing
researchProduct