首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 638 毫秒
1.
There are only a few ethical regulations that deal explicitly with robots, in contrast to a vast number of regulations, which may be applied. We will focus on ethical issues with regard to “responsibility and autonomous robots”, “machines as a replacement for humans”, and “tele-presence”. Furthermore we will examine examples from special fields of application (medicine and healthcare, armed forces, and entertainment). We do not claim to present a complete list of ethical issue nor of regulations in the field of robotics, but we will demonstrate that there are legal challenges with regard to these issues.
Michael Nagenborg (Corresponding author)Email: URL: www.michaelnagenborg.de
Rafael CapurroEmail:
Jutta WeberEmail:
Christoph PingelEmail:
  相似文献   

2.
A number of mobile applications have emerged that allow users to locate one another. However, people have expressed concerns about the privacy implications associated with this class of software, suggesting that broad adoption may only happen to the extent that these concerns are adequately addressed. In this article, we report on our work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others (e.g. friends, family, and colleagues). The objective of our work has been to better understand people’s attitudes and behaviors towards privacy as they interact with such an application, and to explore technologies that empower users to more effectively and efficiently specify their privacy preferences (or “policies”). These technologies include user interfaces for specifying rules and auditing disclosures, as well as machine learning techniques to refine user policies based on their feedback. We present evaluations of these technologies in the context of one laboratory study and three field studies.
Norman Sadeh (Corresponding author)Email:
Jason HongEmail:
Lorrie CranorEmail:
Patrick KelleyEmail:
  相似文献   

3.
Unpacking Tasks: The Fusion of New Technology with Instructional Work   总被引:1,自引:0,他引:1  
This paper discusses how a new technology (designed to help pupils with learning about Shakespeare’s Macbeth) is introduced and integrated into existing classroom practices. It reports on the ways through which teachers and pupils figure out how to use the software as part of their classroom work. Since teaching and learning in classrooms are achieved in and through educational tasks (what teachers instruct pupils to do) the analysis explicates some notable features of a particular task (storyboarding one scene from the play). It is shown that both ‘setting the task’ and ‘following the task’ have to be locally and practically accomplished and that tasks can operate as a sense-making device for pupils’ activities. Furthermore, what the task ‘is’, is not entirely established through the teacher’s initial formulation, but progressively clarified through pupils’ subsequent work, and in turn ratified by the teacher.
Christian GreiffenhagenEmail:
  相似文献   

4.
This viewpoint argues that the introduction of most computer-based system to an organization transforms the organization and changes the work patterns of the system’s users in the organization. These changes interact with the users’ values and beliefs and trigger emotional responses which are sometimes directed against the software system and its proponents. A requirements engineer must be aware of these emotions.
Isabel RamosEmail:
Daniel M. Berry (Corresponding author)Email:
  相似文献   

5.
The move toward digital switchover increases content and introduces interactive services available through the television. UK legislation advocates universal access and equitable provision of services, across all platforms and equipment, particularly for ‘vulnerable’ groups. However, key aspects of usability and accessibility have been overlooked by those responsible for encouraging this new infrastructure’s inclusive development. Aspects of previous interactive television provision and developments in web accessibility appear to have been ignored, along with findings from relevant user-centred research and even from specifically commissioned reports. This paper will identify these issues and discuss their impact on the inclusiveness of DTV.
Alex CarmichaelEmail:
  相似文献   

6.
This paper addresses the possibility of measuring perceived usability in an absolute way. It studies the impact of the nature of the tasks performed in perceived software usability evaluation, using for this purpose the subjective evaluation of an application’s performance via the Software Usability Measurement Inventory (SUMI). The paper reports on the post-hoc analysis of data from a productivity study for testing the effect of changes in the graphical user interface (GUI) of a market leading drafting application. Even though one would expect similar evaluations of an application’s usability for same releases, the analysis reveals that the output of this subjective appreciation is context sensitive and therefore mediated by the research design. Our study unmasked a significant interaction between the nature of the tasks used for the usability evaluation and how users evaluate the performance of this application. This interaction challenges the concept of absolute benchmarking in subjective usability evaluation, as some software evaluation methods aspire to provide, since subjective measurement of software quality will be affected most likely by the nature of the testing materials used for the evaluation.
Humberto Cavallin (Corresponding author)Email:
W. Mike MartinEmail:
Ann HeylighenEmail:
  相似文献   

7.
Mary Flanagan 《AI & Society》2006,20(4):493-505
This paper provides an overview of creating games for change from within an academic context, focusing specifically on the development of educational computer games for middle school girls. The essay addresses larger issues such as the cultural importance of computer games, the difficulty in categorizing a diverse user group such as “girls,” and the ways in which one could design game goals to promote diverse play and learning styles. Through such alternate design strategies, both media makers and students can incorporate significant social intervention into media work.
Mary FlanaganEmail: Phone: +1-212-7724949
  相似文献   

8.
Students frame activities in school in specific ways which are fundamental for their learning and problem solving. The introduction of digital technology and multimedia applications leads to additional aspects to consider, creating a need for research on interaction and activities in relation to new tools. The aim of this study is to analyze how students frame computer-supported collaborative learning situations. The analytic agenda is based on sociocultural assumptions of learning. Data have been collected through video documentation of secondary school students’ interactions with educational software in mathematics. The results show that when the students work with task solving in educational software and “get stuck”, they negotiate how to understand the activity; sometimes they search for the answer in their own actions, and sometimes they consider the answer to be within the technology. Goffman’s concept of frameworks can be applied to understand this alternative as a continuous shift between employing social frameworks where the students themselves are playing an active role in the understanding of the task, and employing natural frameworks, where their difficulties are understood to be, in Goffman’s words, due to natural determinants, that is, to the design of the technology. The main conclusion is that, in interactional activities using digital technology, there is a possibility that the participants’ activities are framed in such a way that they do not consider themselves as being accountable for the lack of understanding of the educational content.
Annika Lantz-AnderssonEmail:
  相似文献   

9.
ONTRACK: Dynamically adapting music playback to support navigation   总被引:3,自引:3,他引:0  
Listening to music on personal, digital devices whilst mobile is an enjoyable, everyday activity. We explore a scheme for exploiting this practice to immerse listeners in navigation cues. Our prototype, ONTRACK, continuously adapts audio, modifying the spatial balance and volume to lead listeners to their target destination. First we report on an initial lab-based evaluation that demonstrated the approach’s efficacy: users were able to complete tasks within a reasonable time and their subjective feedback was positive. Encouraged by these results we constructed a handheld prototype. Here, we discuss this implementation and the results of field-trials. These indicate that even with a low-fidelity realisation of the concept, users can quite effectively navigate complicated routes.
Matt Jones (Corresponding author)Email:
Steve JonesEmail:
Gareth BradleyEmail:
Nigel WarrenEmail:
David BainbridgeEmail:
Geoff HolmesEmail:
  相似文献   

10.
Multimodal support to group dynamics   总被引:1,自引:1,他引:0  
The complexity of group dynamics occurring in small group interactions often hinders the performance of teams. The availability of rich multimodal information about what is going on during the meeting makes it possible to explore the possibility of providing support to dysfunctional teams from facilitation to training sessions addressing both the individuals and the group as a whole. A necessary step in this direction is that of capturing and understanding group dynamics. In this paper, we discuss a particular scenario, in which meeting participants receive multimedia feedback on their relational behaviour, as a first step towards increasing self-awareness. We describe the background and the motivation for a coding scheme for annotating meeting recordings partially inspired by the Bales’ Interaction Process Analysis. This coding scheme was aimed at identifying suitable observable behavioural sequences. The study is complemented with an experimental investigation on the acceptability of such a service.
Fabio Pianesi (Corresponding author)Email:
Massimo ZancanaroEmail:
Elena NotEmail:
Chiara LeonardiEmail:
Vera FalconEmail:
Bruno LepriEmail:
  相似文献   

11.
We present a study of using camera-phones and visual-tags to access mobile services. Firstly, a user-experience study is described in which participants were both observed learning to interact with a prototype mobile service and interviewed about their experiences. Secondly, a pointing-device task is presented in which quantitative data was gathered regarding the speed and accuracy with which participants aimed and clicked on visual-tags using camera-phones. We found that participants’ attitudes to visual-tag-based applications were broadly positive, although they had several important reservations about camera-phone technology more generally. Data from our pointing-device task demonstrated that novice users were able to aim and click on visual-tags quickly (well under 3 s per pointing-device trial on average) and accurately (almost all meeting our defined speed/accuracy tradeoff of 6% error-rate). Based on our findings, design lessons for camera-phone and visual-tag applications are presented.
Eleanor Toye (Corresponding author)Email:
Richard SharpEmail:
Anil MadhavapeddyEmail:
David ScottEmail:
Eben UptonEmail:
Alan BlackwellEmail:
  相似文献   

12.
This paper describes the simulated car racing competition that was arranged as part of the 2007 IEEE Congress on Evolutionary Computation. Both the game that was used as the domain for the competition, the controllers submitted as entries to the competition and its results are presented. With this paper, we hope to provide some insight into the efficacy of various computational intelligence methods on a well-defined game task, as well as an example of one way of running a competition. In the process, we provide a set of reference results for those who wish to use the simplerace game to benchmark their own algorithms. The paper is co-authored by the organizers and participants of the competition.
Julian Togelius (Corresponding author)Email:
Simon LucasEmail:
Ho Duc ThangEmail:
Jonathan M. GaribaldiEmail:
Tomoharu NakashimaEmail:
Chin Hiong TanEmail:
Itamar ElhananyEmail:
Shay BerantEmail:
Philip HingstonEmail:
Robert M. MacCallumEmail:
Thomas HaferlachEmail:
Aravind GowrisankarEmail:
Pete BurrowEmail:
  相似文献   

13.
To get the maximum benefit from ambient intelligence (AmI), we need to anticipate and react to possible drawbacks and threats emerging from the new technologies in order to devise appropriate safeguards. The SWAMI project took a precautionary approach in its exploration of the privacy risks in AmI and sought ways to reduce them. It constructed four “dark scenarios” showing possible negative implications of AmI, notably for privacy protection. Legal analysis of the depicted futures showed the shortcomings of the current legal framework in being able to provide adequate privacy protection in the AmI environment. In this paper, the authors, building upon their involvement in SWAMI research as well as the further advancement of EU privacy analysis, identify various outstanding issues regarding the legal framework that still need to be resolved in order to deal with AmI in an equitable and efficacious way. This article points out some of the lacunae in the legal framework and postulates several privacy-specific safeguards aimed at overcoming them.
Paul De HertEmail:
Serge Gutwirth (Corresponding author)Email:
Anna MoscibrodaEmail:
David WrightEmail:
Gloria González FusterEmail:
  相似文献   

14.
The purposes of this study are (a) to establish a measurement for evaluating conversational impressions of group discussions, and (b) to make an exploratory investigation on their interactional processes which may affect to form those impressions. The impression rating and factor analysis undertaken first give us four factors concerning conversational impressions of “focus group interviews (FGIs)”: conversational activeness, conversational sequencing, the attitudes of participants and the relationships of participants. In relation to the factors of conversational activeness and conversational sequencing in particular, the microanalysis of four selected topical scenes from our database further shows that the behavior of the moderator and the interviewees is organized not independently but with reference to each other. The study thus emphasizes the importance of the integration of quantitative and qualitative approaches towards human interactions.
Kana Suzuki (Corresponding author)Email: Email:
Ikuyo MorimotoEmail:
Etsuo MizukamiEmail:
Hiroko OtsukaEmail:
Hitoshi IsaharaEmail:
  相似文献   

15.
The quality of software systems are determined in part by their optimal configurations. Optimal configurations are desired when the software is being deployed and during its lifetime. However, initial deployment and subsequent dynamic reconfiguration of a software system is difficult because of the interplay of many interdependent factors, including cost, time, application state, and system resources. As the size and complexity of software systems increases, procedures (manual or automated) that assume a static software architecture and environment are becoming untenable. We have developed a novel technique for carrying out the deployment and reconfiguration planning processes that leverages recent advances in the field of temporal planning. We describe a tool called Planit, which manages the deployment and reconfiguration of a software system utilizing a temporal planner. Given a model of the structure of a software system, the network upon which the system should be hosted, and a goal configuration, Planit will use the temporal planner to devise possible deployments of the system. Given information about changes in the state of the system, network and a revised goal, Planit will use the temporal planner to devise possible reconfigurations of the system. We present the results of a case study in which Planit is applied to a system consisting of various components that communicate across an application-level overlay network. An earlier version of this paper was presented at ICTAI’03.
Naveed Arshad (Corresponding author)Email:
Dennis HeimbignerEmail:
Alexander L. WolfURL: http://www.doc.ic.ac.uk/~alw/
  相似文献   

16.
We provide the complete record of methodology that let us evolve BrilliAnt, the winner of the Ant Wars contest. Ant Wars contestants are virtual ants collecting food on a grid board in the presence of a competing ant. BrilliAnt has been evolved through a competitive one-population coevolution using genetic programming and fitnessless selection. In this paper, we detail the evolutionary setup that lead to BrilliAnt’s emergence, assess its direct and indirect human-competitiveness, and describe the behavioral patterns observed in its strategy.
Wojciech JaśkowskiEmail:
Krzysztof Krawiec (Corresponding author)Email:
Bartosz WielochEmail:
  相似文献   

17.
Quantitative usability requirements are a critical but challenging, and hence an often neglected aspect of a usability engineering process. A case study is described where quantitative usability requirements played a key role in the development of a new user interface of a mobile phone. Within the practical constraints of the project, existing methods for determining usability requirements and evaluating the extent to which these are met, could not be applied as such, therefore tailored methods had to be developed. These methods and their applications are discussed.
Timo Jokela (Corresponding author)Email:
Jussi KoivumaaEmail:
Jani PirkolaEmail:
Petri SalminenEmail:
Niina KantolaEmail:
  相似文献   

18.
The present study has explored how pairs of students deployed digital tools (spelling software) as resources in spontaneously occurring corrections of spelling errors. Drawing on the sociocultural theory of learning and ethnomethodological (Conversation Analytic) insights into social interaction, it has identified a range of consistent practices and uses of the spelling tools that were emergent in the everyday educational activities. As demonstrated, technology-assisted error corrections constituted a complex situation, where a number of socioculturally significant factors (goals of the task, properties of the software, and physical access to computer applications) shaped the trajectories of joint work. The present analysis shows in detail how the students approached the visually manifested language production errors by using two kinds of software resources, spelling lists, and a diagnostic tool. The inherent conceptual distinctions, characteristic of these tools, configured joint interpretative work and efforts to correct the errors in different ways. Recurrently, the students’ technology-based corrections were designed as autonomous, stepwise, locally improvised problem solutions, which were subsequently submitted for the evaluation of the diagnostic software. Overall, the study shows that the under-specification of the software’s instructions opened a space for the students’ creative engagement. The potentials of joint spelling software-assisted corrections for collaborative learning are discussed.
Asta CekaiteEmail:
  相似文献   

19.
The goal of this article is to compare some optimised implementations on current high performance platforms in order to highlight architectural trends in the field of embedded architectures and to get an estimation of what should be the components of a next generation vision system. We present some implementations of robust motion detection algorithms on three architectures: a general purpose RISC processor—the PowerPC G4—a parallel artificial retina dedicated to low level image processing—Pvlsar34—and the Associative Mesh, a specialized architecture based on associative net. To handle the different aspects and constraints of embedded systems, execution time and power consumption of these architectures are compared.
Alain MérigotEmail:
  相似文献   

20.
Using trust assumptions with security requirements   总被引:1,自引:1,他引:0  
Assumptions are frequently made during requirements analysis of a system about the trustworthiness of its various components (including human components). These trust assumptions, whether implicit or explicit, affect the scope of the analysis, derivation of security requirements, and in some cases how functionality is realized. This paper presents trust assumptions in the context of analysis of security requirements. A running example shows how trust assumptions can be used by a requirements engineer to help define and limit the scope of analysis and to document the decisions made during the process. The paper concludes with a case study examining the impact of trust assumptions on software that uses the secure electronic transaction specification.
Charles B. Haley (Corresponding author)Email:
Robin C. LaneyEmail:
Jonathan D. MoffettEmail:
Bashar NuseibehEmail:
  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号