Refine
Departments, institutes and facilities
- Fachbereich Informatik (34)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (18)
- Institut für Verbraucherinformatik (IVI) (18)
- Fachbereich Ingenieurwissenschaften und Kommunikation (14)
- Fachbereich Wirtschaftswissenschaften (12)
- Institut für Cyber Security & Privacy (ICSP) (12)
- Institute of Visual Computing (IVC) (10)
- Fachbereich Sozialpolitik und Soziale Sicherung (4)
- Zentrum für Innovation und Entwicklung in der Lehre (ZIEL) (4)
- Fachbereich Angewandte Naturwissenschaften (3)
Document Type
- Conference Object (83) (remove)
Year of publication
- 2020 (83) (remove)
Keywords
- Usable Security (3)
- Artificial Intelligence (2)
- Evolutionary computation (2)
- Peer-to-Peer (2)
- Quality diversity (2)
- Shared autonomous vehicles (2)
- Sustainability (2)
- Usable Privacy (2)
- robotics (2)
- sustainability (2)
- usability (2)
- 2D Level Design (1)
- 3D interfaces (1)
- AMD Family 15h (1)
- ANN (1)
- AOP (1)
- Active Learning (1)
- Antimicrobial activity (1)
- Application in electrochemistry (1)
- Appropriation (1)
- Authentication (1)
- Autoencoder (1)
- Automatic Short Answer Grading (1)
- Autonomous Driving (1)
- Bayesian optimization (1)
- Blockchain (1)
- CPUID instruction (1)
- Cache-independent (1)
- Care (1)
- Caregiver (1)
- Claim personal data (1)
- Co-located Collaboration (1)
- Collaborating industrial robots (1)
- Community (1)
- Complex systems modeling and simulation (1)
- Compliant Manipulation (1)
- Computational fluid dynamics (1)
- Computer-supported Cooperative Work (1)
- Covert channel (1)
- Critical power (1)
- Cross-core (1)
- DC-cascade (1)
- Data takeout (1)
- Datenschutz (1)
- Datenschutzerklärungen (1)
- Dementia (1)
- Digital common goods (1)
- Domestic Robots (1)
- Economy (1)
- Embedded system (1)
- Exergame (1)
- FPGA (1)
- Folk theories (1)
- Food (1)
- Food security (1)
- Functional safety (1)
- Future Work (1)
- GDPR (1)
- Gaussian processes (1)
- Grassroots (1)
- Group Behavior (1)
- Groupware (1)
- HFI (1)
- HTTP (1)
- Human computer interaction (1)
- Human-Centered Robotics (1)
- Human-Robot Collaboration (1)
- ICT (1)
- Impaired (1)
- Index-one DAEs (1)
- Information hiding (1)
- Informational self-determination (1)
- Instruction scheduling (1)
- Jobs (1)
- Kompetenz (1)
- Learning (1)
- Learning analytics (1)
- Learning and Adaptive Systems (1)
- Learning data mining (1)
- Legal Design (1)
- Maker space (1)
- Makers (1)
- Mental Models (1)
- Mental models (1)
- Misconception (1)
- Mobility (1)
- Modal Shift (1)
- Multi-objective optimization (1)
- Multimodal optimization (1)
- Multithreaded and multicore architecture (1)
- NIR-point sensor (1)
- Non-linear optimization (1)
- OER (1)
- Order reduction (1)
- Organisation (1)
- Organisationsentwicklung (1)
- PID (1)
- Parameter identification (1)
- Passengers (1)
- Password (1)
- Perceived AI (1)
- Performance profiling (1)
- Phenotypic niching (1)
- Platform economy (1)
- Privacy (1)
- Privacy in the workplace (1)
- Privacy perceptions (1)
- Probabilistic model (1)
- REST (1)
- Re-authentication (1)
- Remote Work (1)
- Risk-based Authentication (1)
- Risk-based Authentication (RBA) (1)
- Robo-taxi (1)
- Robots (1)
- Rosenbrock-Wanner Methods (1)
- Service Design (1)
- Shared Autonomous Vehicles (1)
- Sharing Economy (1)
- Skin detection (1)
- Smart Contracts (1)
- Smart InGaAs camera-system (1)
- Social sustainability (1)
- Surrogate models (1)
- Sustainable HCI (1)
- TOC (1)
- Task Frame Formalism (1)
- Taxi (1)
- Teleoperation (1)
- Trust (1)
- Two-factor Authentication (1)
- Ultrasonic array (1)
- User Experience (1)
- User Roles (1)
- User studies (1)
- W methods (1)
- WWW (1)
- Web components (1)
- Western Africa (1)
- Wizard of Oz (1)
- Zweckbindung (1)
- Zweckspezifizierung (1)
- active packaging (1)
- appropriation (1)
- asset transfer (1)
- biobased (1)
- biodegradable (1)
- blockchain (1)
- breakdowns (1)
- carsharing (1)
- change management (1)
- cognitive radio (1)
- connected car (1)
- cooperative path planning (1)
- cooperative sensing (1)
- cryptocurrency (1)
- cryptographic apis (1)
- developer console (1)
- digital design (1)
- e-learning (1)
- end-to-end security (1)
- energy detection (1)
- farmer trainings (1)
- first-year teaching (1)
- focus groups (1)
- food loss (1)
- fusion centre (1)
- haptics (1)
- iOER (1)
- insect farming and processing (1)
- medium voltage insulation (1)
- melting heater (1)
- mesoscopic agents (1)
- multi-layer display (1)
- navigation (1)
- neural networks (1)
- ozonation (1)
- ozone (1)
- participatory design (1)
- payment protocol (1)
- permanent magnet synchronous generator (PMSG) (1)
- plastic industry (1)
- power converter (1)
- project passed learning (1)
- rebound effects (1)
- reinforcement learning (1)
- remote lab (1)
- robot action diagnosability (1)
- robot execution failures (1)
- security (1)
- security warning design (1)
- semantic image seg-mentation (1)
- sharing (1)
- signature (1)
- software development (1)
- spectrum sensing (1)
- stereoscopic vision (1)
- technological platform (1)
- telepresence (1)
- temperature controller (1)
- throughput maximization (1)
- ultrapure water (1)
- un-manned aerial vehicle (1)
- unmanned ground vehicle (1)
- usable secure email (1)
- user interface design (1)
- video lectures (1)
- voice interaction (1)
- web caching (1)
- wind energy conversion systems (WECS) (1)
Towards an Interaction-Centered and Dynamically Constructed Episodic Memory for Social Robots
(2020)
Computers can help us to trigger our intuition about how to solve a problem. But how does a computer take into account what a user wants and update these triggers? User preferences are hard to model as they are by nature vague, depend on the user’s background and are not always deterministic, changing depending on the context and process under which they were established. We pose that the process of preference discovery should be the object of interest in computer aided design or ideation. The process should be transparent, informative, interactive and intuitive. We formulate Hyper-Pref, a cyclic co-creative process between human and computer, which triggers the user’s intuition about what is possible and is updated according to what the user wants based on their decisions. We combine quality diversity algorithms, a divergent optimization method that can produce many, diverse solutions, with variational autoencoders to both model that diversity as well as the user’s preferences, discovering the preference hypervolume within large search spaces.
Listen to Developers! A Participatory Design Study on Security Warnings for Cryptographic APIs
(2020)
Validierung einer Web-Applikation zum Fern-Monitoring von Belastungs- und Erholungsparametern
(2020)
Simultan zur agilen Entwicklung einer Web-Applikation, die Parameter der Belastungs- und Beanspruchungssteuerung erfasst, wurden die implementierten Belastungs- und Erholungs-parameter an freiwilligen Testern/innen in der Praxis überprüft. Um sowohl die Applikation als auch die z.T. selbst entwickelten Kenngrößen auf ihre externe Validität hin zu bewerten, werden diese regressionsanalytisch bearbeitet.
Autonomous driving enables new mobility concepts such as shared-autonomous services. Although significant re-search has been done on passenger-car interaction, work on passenger interaction with robo-taxis is still rare. In this paper, we tackle the question of how passengers experience robo-taxis as a service in real-life settings to inform the interaction design. We conducted a Wizard of Oz study with an electric vehicle where the driver was hidden from the passenger to simulate the service experience of a robo-taxi. 10 participants had the opportunity to use the simulated shared-autonomous service in real-life situations for one week. By the week's end, 33 rides were completed and recorded on video. Also, we flanked the study conducting interviews before and after with all participants. The findings provided insights into four design themes that could inform the service design of robo-taxis along the different stages including hailing, pick-up, travel, and drop-off.
This paper aspires to develop a deeper understanding of the sharing/collaborative/platform economy, and in particular of the technical mechanisms upon which the digital platforms supporting it are built. In surveying the research literature, the paper identifies a gap between studies from economical, social or socio-technical angles, and presentations of detailed technical solutions. Most cases study larger, ‘monotechnological’ platforms, rather than local platforms that lend components from several technologies. Almost no literature takes a design perspective. Rooted in Sharing & Caring, an EU COST Action (network), the paper presents work to systematically map out functionalities across domains of the sharing economy. The 145 technical mechanisms we collected illustrate how most platforms are depending on a limited number of functionalities that lack in terms of holding communities together. The paper points to the necessity of a better terminology and concludes by discussing challenges and opportunities for the design of future and more inclusive platforms.
Diese Studie untersucht die Aneignung und Nutzung von Sprachassistenten wie Google Assistant oder Amazon Alexa in Privathaushalten. Unsere Forschung basiert auf zehn Tiefeninterviews mit Nutzern von Sprachassistenten sowie der Evaluation bestimmter Interaktionen in der Interaktionshistorie. Unsere Ergebnisse illustrieren, zu welchen Anlässen Sprachassistenten im heimischen Umfeld genutzt werden, welche Strategien sich die Nutzer in der Interaktion mit Sprachassistenten angeeignet haben, wie die Interaktion abläuft und welche Schwierigkeiten sich bei der Einrichtung und Nutzung des Sprachassistenten ergeben haben. Ein besonderer Fokus der Studie liegt auf Fehlinteraktionen, also Situationen, in denen die Interaktion scheitert oder zu scheitern droht. Unsere Studie zeigt, dass das Nutzungspotenzial der Assistenten häufig nicht ausgeschöpft wird, da die Interaktion in komplexeren Anwendungsfällen häufig misslingt. Die Nutzer verwenden daher den Sprachassistenten eher in einfachen Anwendungsfällen und neue Apps und Anwendungsfälle werden gar nicht erst ausprobiert. Eine Analyse der Aneignungsstrategien, beispielsweise durch eine selbst erstellte Liste mit Befehlen, liefert Erkenntnisse für die Gestaltung von Unterstützungswerkzeugen sowie die Weiterentwicklung und Optimierung von sprachbasierten Mensch-Maschine-Interfaces.
Die nutzerInnenfreundliche Formulierung von Zwecken der Datenverarbeitung von Sprachassistenten
(2020)
2019 wurde bekannt, dass mehrere Anbieter von Sprachassistenten Sprachaufnahmen ihrer NutzerInnen systematisch ausgewertet haben. Da in den Datenschutzhinweisen angegeben war, dass Daten auch zur Verbesserung des Dienstes genutzt würden, war diese Nutzung legal. Für die NutzerInnen stellte diese Auswertung jedoch einen deutlichen Bruch mit ihren Privatheitsvorstellungen dar. Das Zweckbindungsprinzip der DSGVO mit seiner Komponente der Zweckspezifizierung fordert neben Flexibilität für den Verarbeiter auch Transparenz für den Verbraucher. Vor dem Hintergrund dieses Interessenkonflikts stellt sich für die HCI die Frage, wie Verarbeitungszwecke von Sprachassistenten gestaltet sein sollten, um beide Anforderungen zu erfüllen. Für die Erhebung einer Nutzerperspektive analysiert diese Studie zunächst Zweckangaben in den Datenschutzhinweisen der dominierenden Sprachassistenten. Darauf aufbauend präsentieren wir Ergebnisse von Fokusgruppen, die sich mit der wahrgenommenen Verarbeitung von Daten von Sprachassistenten aus Nutzersicht befassen. Es zeigt sich, dass bestehende Zweckformulierungen für VerbraucherInnen kaum Transparenz über Folgen der Datenverarbeitung bieten und keine einschränkende Wirkung im Hinblick auf legale Datennutzung erzielen. Unsere Ergebnisse über von Nutzern wahrgenommene Risiken erlauben dabei Rückschlüsse auf die anwenderfreundliche Gestaltung von Verarbeitungszwecken im Sinne einer Design-Ressource.
Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. RBA monitors additional features during login, and when observed feature values differ significantly from previously seen ones, users have to provide additional authentication factors such as a verification code. RBA has the potential to offer more usable authentication, but the usability and the security perceptions of RBA are not studied well.
We present the results of a between-group lab study (n=65) to evaluate usability and security perceptions of two RBA variants, one 2FA variant, and password-only authentication. Our study shows with significant results that RBA is considered to be more usable than the studied 2FA variants, while it is perceived as more secure than password-only authentication in general and comparably secure to 2FA in a variety of application types. We also observed RBA usability problems and provide recommendations for mitigation. Our contribution provides a first deeper understanding of the users' perception of RBA and helps to improve RBA implementations for a broader user acceptance.
When a robotic agent experiences a failure while acting in the world, it should be possible to discover why that failure has occurred, namely to diagnose the failure. In this paper, we argue that the diagnosability of robot actions, at least in a classical sense, is a feature that cannot be taken for granted since it strongly depends on the underlying action representation. We specifically define criteria that determine the diagnosability of robot actions. The diagnosability question is then analysed in the context of a handle manipulation action, such that we discuss two different representations of the action – a composite policy with a learned success model for the action parameters, and a neural network-based monolithic policy – both of which exist on different sides of the diagnosability spectrum. Through this comparison, we conclude that composite actions are more suited to explicit diagnosis, but representations with less prior knowledge are more flexible. This suggests that model learning may provide balance between flexibility and diagnosability; however, data-driven diagnosis methods also need to be enhanced in order to deal with the complexity of modern robots.
Gone But Not Forgotten: Evaluating Performance and Scalability of Real-Time Mesoscopic Agents
(2020)
Telepresence robots allow people to participate in remote spaces, yet they can be difficult to manoeuvre with people and obstacles around. We designed a haptic-feedback system called “FeetBack," which users place their feet in when driving a telepresence robot. When the robot approaches people or obstacles, haptic proximity and collision feedback are provided on the respective sides of the feet, helping inform users about events that are hard to notice through the robot’s camera views. We conducted two studies: one to explore the usage of FeetBack in virtual environments, another focused on real environments.We found that FeetBack can increase spatial presence in simple virtual environments. Users valued the feedback to adjust their behaviour in both types of environments, though it was sometimes too frequent or unneeded for certain situations after a period of time. These results point to the value of foot-based haptic feedback for telepresence robot systems, while also the need to design context-sensitive haptic feedback.
Usability und User Experience (UX) haben als Design-Aspekte in der Produktentwicklung zunehmend an Bedeutung gewonnen. Daher ist es sinnvoll, die organisationale Kompetenz zur Entwicklung von Produkten mit einer positiven UX zu stärken. Veränderungen in Organisationen sind jedoch mit großem Aufwand verbunden. Deshalb müssen Organisationen entscheiden, welche Aktivitäten zur Veränderung der eigenen Kompetenz durchgeführt werden sollen und welche nicht. Die bisherige Forschung hat sich weitgehend auf die Anwendbarkeit bestimmter Methoden im Projekt- und Produktkontext konzentriert. Um geeignete Aktivitäten zur Verbesserung der organisationalen UX-Kompetenz zu identifizieren, wurden 17 UX-Professionals befragt. Diese UX-Professionals haben mindestens zehn Jahre Erfahrung durch die Arbeit in mehreren Unternehmen und durch die Übernahme einer Führungsrolle im Bereich UX gesammelt. Aus diesen Interviews wurden 13 mögliche Maßnahmen zur Steigerung der UX-Kompetenz von Organisationen abgeleitet. Dazu gehören beispielsweise die Erhöhung der Kompetenz einzelner Mitarbeiter, das Teilen von UX-Erfolgsgeschichten oder das Ermöglichen von User Research.
In 1991 the researchers at the center for the Learning Sciences of Carnegie Mellon University were confronted with the confusing question of “where is AI” from the users, who were interacting with AI but did not realize it. Three decades of research and we are still facing the same issue with the AItechnology users. In the lack of users’ awareness and mutual understanding of AI-enabled systems between designers and users, informal theories of the users about how a system works (“Folk theories”) become inevitable but can lead to misconceptions and ineffective interactions. To shape appropriate mental models of AI-based systems, explainable AI has been suggested by AI practitioners. However, a profound understanding of the current users’ perception of AI is still missing. In this study, we introduce the term “Perceived AI” as “AI defined from the perspective of its users”. We then present our preliminary results from deep-interviews with 50 AItechnology users, which provide a framework for our future research approach towards a better understanding of PAI and users’ folk theories.
Bei der sechsten Ausgabe des wissenschaftlichen Workshops ”Usable Security und Privacy” auf der Mensch und Computer 2020 werden wie in den vergangenen Jahren aktuelle Forschungs- und Praxisbeiträge präsentiert und anschließend mit allen Teilnehmenden diskutiert. Drei Beiträge befassen sich dieses Jahr mit dem Thema Privatsphäre, einer mit dem Thema Sicherheit. Mit dem Workshop wird ein etabliertes Forum fortgeführt und weiterentwickelt, in dem sich Expert*innen aus unterschiedlichen Domänen, z. B. dem Usability- und Security-Engineering, transdisziplinär austauschen können.
Efficient and comprehensive assessment of students knowledge is an imperative task in any learning process. Short answer grading is one of the most successful methods in assessing the knowledge of students. Many supervised learning and deep learning approaches have been used to automate the task of short answer grading in the past. We investigate why assistive grading with active learning would be the next logical step in this task as there is no absolute ground truth answer for any question and the task is very subjective in nature. We present a fast and easy method to harness the power of active learning and natural language processing in assisting the task of grading short answer questions. A webbased GUI is designed and implemented to incorporate an interactive short answer grading system. The experiments show that active learning saves the time and effort of graders in assessment and reaches the performance of supervised learning with less amount of graded answers for training.
Evaluation of a Multi-Layer 2.5D display in comparison to conventional 3D stereoscopic glasses
(2020)
In this paper we propose and evaluate a custom-build projection-based multilayer 2.5D display, consisting of three layers of images, and compare performance to a stereoscopic 3D display. Stereoscopic vision can increase the involvement and enhance game experience, however may induce possible side effects, e.g. motion sickness and simulator sickness. To overcome the disadvantage of multiple discrete depths, in our system perspective rendering and head-tracking is used. A study was performed to evaluate this display with 20 participants playing custom-designed games. The results indicated that the multi-layer display caused fewer side effects than the stereoscopic display and provided good usability. The participants also stated a better or equal spatial perception, while the cognitive load stayed the same.
Compliant manipulation is a crucial skill for robots when they are supposed to act as helping hands in everyday household tasks. Still, nowadays, those skills are hand-crafted by experts which frequently requires labor-intensive, manual parameter tuning. Moreover, some tasks are too complex to be specified fully using a task specification. Learning these skills, by contrast, requires a high number of costly and potentially unsafe interactions with the environment. We present a compliant manipulation approach using reinforcement learning guided by the Task Frame Formalism, a task specification method. This allows us to specify the easy to model knowledge about a task while the robot learns the unmodeled components by reinforcement learning. We evaluate the approach by performing a compliant manipulation task with a KUKA LWR 4+ manipulator. The robot was able to learn force control policies directly on the robot without using any simulation.
Long-term variability of solar irradiance and its implications for photovoltaic power in West Africa
(2020)
West Africa is one of the least developed regions in the world regarding the energy availability and energy security. Located close to the equator West Africa receives high amounts of global horizontal irradiance (GHI). Thus, solar power and especially photovoltaic (PV) systems seem to be a promising solution to provide electricity with low environmental impact. To plan and to dimension a PV power system climatological data for global horizontal irradiance (GHI) and its variability need to be taken into account. However, ground based measurements of irradiances are not available continuously and cover only a few discrete locations.
This work presents the development of a measuring system for the quality control of ultrapure water. The new systems combines ozonation and UV radiation for the oxidation of organic substances. The change in conductivity caused by the oxidation is furthermore correlated with the TOC of the solution.
Exploring Future Work - Co-Designing a Human-robot Collaboration Environment for Service Domains
(2020)
There has been increasing interest in the application of humanoid robots in service domains like retail or care homes in recent years. Here, most use cases focus on serving customer needs autonomously. Frequently, human intervention becomes necessary to support the robot in exceptional situations. However, direct intervention of service operators is often not possible and requires specialized personnel. In a co-design process with 13 service operators from a pharmacy, we designed a remote working environment for human-robot collaboration that enables first-time experiences and collaboration with robots. Five participants took part in an assessment study and reported on their experiences about the utility, usability and user experience. Results show that participants were able to control and train the robot through the remote control environment. We discuss implications of our results for future work in service domains and emphasize a shift of focus from full robot automatization to human-robot collaboration forms.
Risikobasierte Authentifizierung (RBA) ist eine adaptive Sicherheitsmaßnahme zur Stärkung passwortbasierter Authentifizierung. Sie zeichnet Merkmale während des Logins auf und fordert zusätzliche Authentifizierung an, wenn sich Ausprägungen dieser Merkmale signifikant von den bisher bekannten unterscheiden. RBA bietet das Potenzial für gebrauchstauglichere Sicherheit. Bisher jedoch wurde RBA noch nicht ausreichend im Bezug auf Usability, Sicherheit und Privatsphäre untersucht. Dieser Extended Abstract legt das geplante Dissertationsvorhaben zur Erforschung von RBA dar. Innerhalb des Vorhabens konnte bereits eine Grundlagenstudie und eine darauf aufbauende Laborstudie durchgeführt werden. Wir präsentieren erste Ergebnisse dieser Studien und geben einen Ausblick auf weitere Schritte.
Risk-based Authentication (RBA) is an adaptive security measure that improves the security of password-based authentication by protecting against credential stuffing, password guessing, or phishing attacks. RBA monitors extra features during login and requests for an additional authentication step if the observed feature values deviate from the usual ones in the login history. In state-of-the-art RBA re-authentication deployments, users receive an email with a numerical code in its body, which must be entered on the online service. Although this procedure has a major impact on RBA's time exposure and usability, these aspects were not studied so far.
We introduce two RBA re-authentication variants supplementing the de facto standard with a link-based and another code-based approach. Then, we present the results of a between-group study (N=592) to evaluate these three approaches. Our observations show with significant results that there is potential to speed up the RBA re-authentication process without reducing neither its security properties nor its security perception. The link-based re-authentication via "magic links", however, makes users significantly more anxious than the code-based approaches when perceived for the first time. Our evaluations underline the fact that RBA re-authentication is not a uniform procedure. We summarize our findings and provide recommendations.
The encoding of solutions in black-box optimization is a delicate, handcrafted balance between expressiveness and domain knowledge between exploring a wide variety of solutions, and ensuring that those solutions are useful. Our main insight is that this process can be automated by generating a dataset of high-performing solutions with a quality diversity algorithm (here, MAP-Elites), then learning a representation with a generative model (here, a Varia-tional Autoencoder) from that dataset. Our second insight is that this representation can be used to scale quality diversity optimization to higher dimensions-but only if we carefully mix solutions generated with the learned representation and those generated with traditional variation operators. We demonstrate these capabilities by learning an low-dimensional encoding for the inverse kinemat-ics of a thousand joint planar arm. The results show that learned representations make it possible to solve high-dimensional problems with orders of magnitude fewer evaluations than the standard MAP-Elites, and that, once solved, the produced encoding can be used for rapid optimization of novel, but similar, tasks. The presented techniques not only scale up quality diversity algorithms to high dimensions, but show that black-box optimization encodings can be automatically learned, rather than hand designed.
This paper introduces FaceHaptics, a novel haptic display based on a robot arm attached to a head-mounted virtual reality display. It provides localized, multi-directional and movable haptic cues in the form of wind, warmth, moving and single-point touch events and water spray to dedicated parts of the face not covered by the head-mounted display.The easily extensible system, however, can principally mount any type of compact haptic actuator or object. User study 1 showed that users appreciate the directional resolution of cues, and can judge wind direction well, especially when they move their head and wind direction is adjusted dynamically to compensate for head rotations. Study 2 showed that adding FaceHaptics cues to a VR walkthrough can significantly improve user experience, presence, and emotional responses.
There has been increasing interest in designing for dementia in recent years. Empirical investigation is now needed of the long-term role of caregivers in appropriating ICTs into the complex daily life of people with dementia (PwD). We present here the outcomes of a 4-month evaluation of the individual, social and institutional impact of a videogame-based training system. The everyday behavior and interactions of 52 PwD and 25 caregivers was studied qualitatively, focusing on the role played by caregivers in integrating the system into daily routines. Our results indicate that the successful appropriation of ICT for PwD depends partly on the physical, cognitive and social benefits for PwD, but especially on the added value perceived by their social care-network. We discuss the need for design in dementia to develop more socially embedded innovations that can address the social actors involved and thus contribute to practical solutions for professional and private care.
Trust is the lubricant of the sharing economy. This is true especially in peer-to-peer carsharing, in which one leaves a highly valuable good to a stranger in the hope of getting it back unscathed. Nowadays, ratings of other users are major mechanisms for establishing trust. To foster uptake of peer-to-peer carsharing, connected car technology opens new possibilities to support trust-building, e.g., by adding driving behavior statistics to users' profiles. However, collecting such data intrudes into rentees' privacy. To explore the tension between the need for trust and privacy demands, we conducted three focus group and eight individual interviews. Our results show that connected car technologies can increase trust for car owners and rentees not only before but also during and after rentals. The design of such systems must allow a differentiation between information in terms of type, the context, and the negotiability of information disclosure.
This paper presents groupware to study group behavior while conducting a creative task on large, high-resolution displays. Moreover, we present the results of a between-subjects study. In the study, 12 groups with two participants each prototyped a 2D level on a 7m x 2.5m large, high-resolution display using tablet-PCs for interaction. Six groups underwent a condition where group members had equal roles and interaction possibilities. Another six groups worked in a condition where group members had different roles: level designer and 2D artist. The results revealed that in the different roles condition, the participants worked significantly more tightly and created more assets. We could also detect some shortcomings for that configuration. We discuss the gained insights regarding system configuration, groupware interfaces, and groups behavior.
Bei genauer Betrachtung heutiger Sharing Plattformen wie AirBnB, Uber, Drivy oder Fairleihen fällt auf, dass diese eines gemein haben. Als Plattformökonomien basieren sie auf mindestens zwei Nutzergruppen, Anbietern und Nachfragern für Güter oder Dienstleistungen. Ein Problem solcher zweioder mehrseitigen Märkte ist jedoch häufig, dass der Wertezuwachs, der durch die Nutzer generiert wird, nicht gleichmäßig unter der Plattform und den aktiven Nutzern verteilt wird, sondern meist ausschließlich als Gewinn an die Plattformen geht. Mit der Blockchain-Technologie könnte dieses Problem gelöst werden, indem der Informations- und Wertetransfer sicher und dezentral organisiert wird und viele Funktionen traditioneller Intermediäre dadurch obsolet werden. Diese Arbeit bietet einen Überblick über Anwendungsfelder und das Grundkonzept der Sharing Economy. Wir zeigen auf, wie sich Geschäftsmodelle und Infrastrukturen in einer Blockchain abbilden lassen, welche Potentiale eine Blockchain-basierte Infrastruktur bietet, wann diese in der Sharing Economy sinnvoll sein kann und welche Probleme dadurch gelöst werden können.
An essential measure of autonomy in assistive service robots is adaptivity to the various contexts of human-oriented tasks, which are subject to subtle variations in task parameters that determine optimal behaviour. In this work, we propose an apprenticeship learning approach to achieving context-aware action generalization on the task of robot-to-human object hand-over. The procedure combines learning from demonstration and reinforcement learning: a robot first imitates a demonstrator’s execution of the task and then learns contextualized variants of the demonstrated action through experience. We use dynamic movement primitives as compact motion representations, and a model-based C-REPS algorithm for learning policies that can specify hand-over position, conditioned on context variables. Policies are learned using simulated task executions, before transferring them to the robot and evaluating emergent behaviours. We additionally conduct a user study involving participants assuming different postures and receiving an object from a robot, which executes hand-overs by either imitating a demonstrated motion, or adapting its motion to hand-over positions suggested by the learned policy. The results confirm the hypothesized improvements in the robot’s perceived behaviour when it is context-aware and adaptive, and provide useful insights that can inform future developments.