February 2007 Ubiquitous Computing Ubicomp: What's it good for? David Knight.

Slides:



Advertisements
Similar presentations
The Instant Team How to Collaborate with Anyone, Anywhere, Anytime LawNet 2003 Andrea J. Daeubler.
Advertisements

School/Centre: Reflecting on the effectiveness of Self-Evaluation Resource The levels on the board are as in How Good Is Our school? Above the board, type.
Training to care for people with dementia Dementia Training Partner logo here Training support Skills development Competency Assessment Scholarships Education.
Virtual University - Human Computer Interaction 1 © Imran Hussain | UMT Imran Hussain University of Management and Technology (UMT) Lecture 20 User Research.
These slides are designed to accompany Web Engineering: A Practitioner’s Approach (The McGraw-Hill Companies, Inc.) by Roger Pressman and David Lowe, copyright.
Provisional draft ICT for Independent Living and Inclusion European Commission, DG Information Society and Media E-Inclusion Unit (H3) Challenge 7.
Semester wrap-up …my final slides.. More on HCI Class on Ubiquitous Computing next spring Courses in visualization, virtual reality, gaming, etc. where.
Evaluating User Interfaces Walkthrough Analysis Joseph A. Konstan
Elementary School Engineering Design Workshop Day 2 Copyright 2013, Oregon University System, All Rights Reserved.
21 st Century 2.0 Project Creating a 21 st Century Learning Environment at Hillview School.
CHAPTER 1 Theories, issues and influences in human resource management.
Geographic Information Systems and Science SECOND EDITION Paul A. Longley, Michael F. Goodchild, David J. Maguire, David W. Rhind © 2005 John Wiley and.
A Framework for Developing and Understanding Digital Competence in Europe Barbara Brecko Yves Punie EC JRC IPTS.
Design Process … and some design inspiration. Course ReCap To make you notice interfaces, good and bad – You’ll never look at doors the same way again.
Human-Computer Interaction at CMU Jodi Forlizzi Jason Hong.
Role of Policy in Behavior Change. Contents of the Lecture.
Role of Policy in Behavior Change. Contents of the Lecture.
Lecture 7 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS 1.
Universal Design for Learning Creating Curb Cuts Creating Curb Cuts.
Putting Social Media to Good Use Jeff Moriarty, Sitewire Director Social Media Strategy.
1 Design and evaluation methods: Objectives n Design life cycle: HF input and neglect n Levels of system design: Going beyond the interface n Sources of.
Webinar 3: Multiple Means of Engagement February 26, 2014 Grace Meo 1.
1 Presentation by I.D. PRASAD Chief Consultant (Corporate Development) APITCO Limited 8 th Floor, Parisrama Bhavanam, Basheerbagh, Hyderabad. Ph: ,
Human Computer Interaction Lecture 10 Interaction Paradigms.
HCC 831 User Interface Design and Evaluation. What is Usability?
Chapter 1: Roles and Opportunities for Information Technology in Meeting Sustainability Challenges Helynranta Viola Parkkila Vilma
Prototyping: Lo-fi, Hi-fi A summary of prototyping theory and history, with a focus on lo-fi prototyping and how it relates to the Coffee-room problem.
Learning Goals Explain the importance of information to the company
Victorian Curriculum: Unpacking Design and Technologies
Ethical Issues in Public Health and Health Services
Posted on Box.com Cone Communications Green Gap Trend Tracker Re:Thinking Consumptionhttps://pac.box.com/s/8hm52qjnhgn12paand7r.
WRTVC INTERNATIONAL GUIDELINES Requirements for
Fundamentals of Information Systems, Sixth Edition
Chapter 14 Designing Qualitative Research
CIS 376 Bruce R. Maxim UM-Dearborn
Johannes Jutting Secretariat Manager, PARIS21 CCSA Meeting
Chapter 6 Interaction in Groups
System Design Basics IB Computer Science.
NSA Added Value to CAADP Policy Formulation and Implementation
Aaker, Kumar, Day Ninth Edition Instructor’s Presentation Slides
PowerPoint® Slides to Accompany
User Experience Research Group
Planning Phase: Project Control and Deliverables
Human Computer Interaction Lecture 10 Interaction Paradigms
Chapter- 5.
Consumer Communication Solutions
Global Virtual Gaming Market Global virtual gaming market, size, share, company profiles,
Leaders of Character GIVING VOICE TO VALUES
BUS 600 Education for Service-- snaptutorial.com
BUS 600 Teaching Effectively-- snaptutorial.com
From Obligation to Responsiveness to Responsibility
Acknowledgements.
Model based design.
Principles of Persuasive Face-to-Face Education
A Reflection and Assessment Tool
Usability Techniques Lecture 13.
CSSSPEC6 SOFTWARE DEVELOPMENT WITH QUALITY ASSURANCE
User Interface Design and Evaluation
Interaction design basics
A POCKET GUIDE TO PUBLIC SPEAKING 3rd Edition Section 35
@ProductDesignSwanseaCollegeofArtUWTSD #discoverproductdesign
Coordination and Support Actions
Managing Marketing Information
In Focus: A Closer Look at & Calendaring at Stanford
ROLE OF «electronic virtual enhanced research-engaged student teams» WEB PORTAL IN SOLUTION OF PROBLEM OF COLLABORATION INTERNATIONAL TEAMS INSIDE ONE.
Principles of Management Learning Session # 13 Dr. A. Rashid Kausar.
Data mining Data mining is the process of analyzing data from different perspectives and summarizing it into useful information.
Environment and Development Policy Section
Core Value Statement Workshops – February 2019
Presentation transcript:

February 2007 Ubiquitous Computing Ubicomp: What's it good for? David Knight

February 2007Ubiquitous Computing Humanistic Research Strategy Current focus is misguided –Technology feasibility –Scenario innovation Basis: Purpose in life is to develop talents and use them for the service of humanity User-centered design Value-sensitive design

February 2007Ubiquitous Computing Humanistic Strategy Process RelevanceUnderstanding Research Goals Empowerment Sequential Iterative? Glue of the design stage design evaluate prototype

February 2007Ubiquitous Computing Relevance Population trends –40,000 ft view of society –Where are we going? –Identify opportunities for systems Motivations and Actions –Needs: personal, navigational, socially determined –Market research is a poor method –Find new needs in people’s motivations

February 2007Ubiquitous Computing Understanding Ethnography Ethnomethodology –Go beyond description to modeling –Limitations in models –Turntaking approach Bodystorming –Can vary from on-site to pretend Simulation –Find preconditions for design –Cost? Evaluation?

February 2007Ubiquitous Computing Empowerment EventTagger –Memory assistance for elderly –Supports user autonomy CoffeeMug –Holds recently edited documents –Control is back in the hands of the user InfoRadar –Location-aware messaging –Empowerment by subtraction

February 2007Ubiquitous Computing What’s it good for? Where’s the killer app? How different is this process? How did they get details out of the data? More costly or inexpensive?

February 2007Ubiquitous Computing Engaging Experiences Calm computing is failing us –“Hard” vs “Soft” ubicomp –Proactive computing >>> proactive people –Servant role is unrealistic –Making computers human A new agenda –Don’t hide the computer –use it as a tool

February 2007Ubiquitous Computing Play and Learning Sandbox - physical digital place –Design environments for non-experts to create systems –Is this UbiComp? –Profitability –Challenges and issues for designers?

February 2007Ubiquitous Computing

February 2007Ubiquitous Computing

February 2007Ubiquitous Computing

February 2007Ubiquitous Computing Scientific Practices Environmental science –Sharing information –Information overload –Interaction techniques

February 2007Ubiquitous Computing Persuasive Practices Allow people to change their behavior Nintendo’s Pocket Pikachu –Pedometer to monitor physical activity –Emotional attachment to virtual pets

February 2007Ubiquitous Computing Ethical Guidelines Challenges –Quality of interaction –Privacy related choices “Now is the time” –Is this a critical point in time? –…or is it always “the sooner the better”? Impact on civil liberty –Many people will feel violated –Some people may welcome being watched

February 2007Ubiquitous Computing Ethics in Ubicomp Principle 0 First, do no harm Principle 1 Default to harmlessness Principle 2 Be self-disclosing Principle 3 Be conservative of face Principle 4 Be conservative of time Principle 5 Be deniable