Free Essay

Ubicomp

In: Computers and Technology

Submitted By jorisbij
Words 712
Pages 3
Essay Ubicomp

Dat is geen Punt(en) Ubicomp heeft een groot raakvlak. Je kunt het zo gek niet bedenken of je kunt Ubicomp ontdekken in het dagelijks dingen. En het verwerken ervan is ook niet meer zo moeilijk als het vooreen was. Sensoren en ander registratie apparatuur worden steeds goedkoper en kleiner waardoor je ze overal in kunt verwerken. Dit kan het leven een stuk makkelijker en leuker maken. De laatste tijd komt het woord gamification steeds vaker naar voren als je het over u Ubicomp hebt. Het technologie-onderzoeksbureau Garter heeft gamification in de lijst met hypes gezet. Hierdoor word het steeds vaker toegepast. Maar hoe werkt deze gamification nou eigenlijk. Is het een makkelijk truc om mensen te vermaken door de punten en achievements te geven of zit er een complexe gedrachtsverandering op basis van diepere menselijke psychologie. (1) Een van de meest evectieve systemen zijn de systemen die overeenkomen met de score& puntenengines uit de gamewereld. Deze systemen zijn gespecialiseerd in het meten van de gebruikers acties en geven hier geprogrammeerde feedback op. Maar wat hier wel een nadeel van is is dat het succes van de gebruikerservaring bij het design van de game. Je moet erg letten op hoe je de punten gaat geven aan de gebruiker. Hier zit natuurlijk ook wel een Mogelijkheid. Je kunt de voorkant van het spel keer op keer veranderen waardoor je een andere look en feel krijgt. Hierdoor kan je het zelfde spel aan meerdere doelgroepen aanpassen.(2) In marketing word ook al vaak gamification gebruikt, ook al zijn er marketeers die er nog niet heel er enthousiast over zijn, maar zien er wel potentie in. Bijvoorbeeld het betrokken houden en het gemotiveerd maken van je doelgroep. Het kan zelfs een manier zijn van problemen oplossen. (3) Er zijn een aantal verschillende type gamers. Ik denk dit interessant is omdat je game hier op moet aanpassen er moet iets zijn waar iedereen zich in kan vinden en een positieve en leuke beleving mee heeft. De vier types of player die men heeft aangenomen zijn: - Socializers - Explorers - Achievers - killers Wat je bij gamification maakt is niet iets nieuw maar je maakt iets anders. (3) Bij gamification verander je patronen van mensen die je normaal moeilijk te veranderen zijn. Je moet hun dagelijkse bezigheden veranderen door het altijd in hun leven zijn. Je gebruikt game mechanismen in een non game context. Je stimuleert gedag dat ze normaal niet zouden doen door het toekenen van punten. Er zijn een aantal motivaties waarom mensen mee zouden doen. Als eerste vinden mensen het leuk als ze een beloning krijgen als ze iets doen. Je geeft ze het idee dat ze het goed doen en goed bezig zijn. Dit kun je ook verkeert gebruiken waardoor je mensen verkeert gedrag aan leert. Maar als je het verantwoord gebruikt is dit een hele effectieve manier van mensen manipuleren.

Daarnaast zijn mensen heel erg commutatief. Ze willen beter zijn dan andere en daarom gaan ze letten op dingen waar ze punten voor kunnen scoren. Ze zijn de hele dag bezig om hun doel te halen en na een tijdje gat dit in hun patroon zitten waardoor ze het automatisch doen. De vraag is wel als je alles een game gaat maken, word het dan niet gewoon en moet alles een game worden. De oplossing hiervoor is om gamification exclusief te houden. Je wordt niet dood gegooid met verschillende games. Wat hier dan weer het probleem van is is dat je bedrijven niet kunt verbieden deze technieken te gebruiken. Wat je tegenwoordig ziet bij grote games al Call of Duty is dat ze elk jaar een nieuwe versie uitgeven met aantal toevoegingen. Door het jaar heen komen er steeds meer toepassingen bij. Hierdoor hou je het interessant voor de gebruikers.

(1) http://www.frankwatching.com/archive/2012/03/16/gamification-hoe-maak-je-het-effectiefvoor-jouw-organisatie/ Gepulseerd op : vrijdag 16 maart 2012 | 08:00 uur Gelezen op : zondag 04 november Gepubliceerd op : Christian Kromme (2) http://www.marketingfacts.nl/berichten/gamification-de-front-end-bepaalt-het-succes/ Gepulseerd op : 19 september 2012 Gelezen op : zondag 04 november Gepubliceerd op : Sven Cooler (3) http://www.marketingfacts.nl/berichten/20120127_gamification_serious_business/ Gepulseerd op : 30 januari 2012 Gelezen op : zondag 04 november Gepubliceerd op : John Meulemans

Similar Documents

Free Essay

Ubicomp Computing

...the tablet and IPAD making computing easy and eliminating the need to sit in front of a desktop or lug around storage mediums such as cds. Mark Weiser, most often referred to as the father of ubiquitous computing (ubicomp), coined the term in 1988. Ubiquitous means to exist everywhere at the same time or to be constant. His forward thinking brought about the possibility to compute on the go and from nearly anywhere. Innovation news daily provides readers with insight on innovative technologies and inventions that shaped ubiquitous computing and many other technologies. In an article entitled “In the Future, Computing is (Cunningly) Constant”, the details of ubiquitous computing are outlined. It also features contributing components and the effect of such an evolution in lifestyles and business. Ubiquitous computing has been “under construction” for more than two decades. According to the article, it originated in a Xerox PARC research lab where the father of ubicomp (Weiser) worked. Innovation news refers to it as a state in which mobile devices such as the IPAD combine forces with high speed internet connections, Google docs, and cloud computing to reduce the need for the computer in the computing process. Along with eliminating the need for the computer, ubicomp in the years to come is expected to save the consumer space, on the desk and the headache of trying to find a computer and systems that work for your lifestyle. Consumers will shop for data systems such as......

Words: 635 - Pages: 3

Premium Essay

Demo

...specification intended to be used as an interface by software components to communicate with each other. An API may include specifications for routines, data structures, object classes, and variables. An API specification can take many forms, including an International Standard such as POSIX or vendor documentation such as the Microsoft Windows API, or the libraries of a programming language, e.g. Standard Template Library in C++ or Java API. In computer science and information science, an ontology formally represents knowledge as a set of concepts within a domain, and the relationships between those concepts. It can be used to reason about the entities within that domain and may be used to describe the domain. Ubiquitous computing (ubicomp) is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. In the course of ordinary activities, someone "using" ubiquitous computing engages many computational devices and systems simultaneously, and may not necessarily even be aware that they are doing so. This model is usually considered an advancement from the desktop paradigm. More formally Ubiquitous computing is defined as "machines that fit the human environment instead of forcing humans to enter theirs."[1] Recursion is the process of repeating items in a self-similar way. For instance, when the surfaces of two mirrors are exactly parallel with each other the nested images that......

Words: 7787 - Pages: 32

Free Essay

Routing Approaches of Delay Tolerant Networks

...Routing,” Microsoft Technical Report, MR-TR, 2006. [41] Y. Liao, K. Tan, Z. Zhang, and L. Gao, “Estimation based erasure coding routing in delay tolerant networks,” International Wireless Communications and Mobile Computing Conference, 2006. [42] Y. Lin, B. Liang, and B. Li, “Performance Modeling of Network Coding in Epidemic Routing,” MobiOpp’07, June 11, 2007. [43] A. Lindgren, A. Doria, and O. Schelen, “Probabilistic routing in intermittently connected networks,” ACM SIGMOBILE CCR, 7(3), 2003, pp. 19–20. 13 ©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 17 [44] A. G. Miklas, K. K. Gollu, K. K.W. Chan, Stefan Saroiu, K. P. Gummadi and E. Lara, “Exploiting Social Interactions in Mobile Systems,” UbiComp 2007, pp. 409–428. [45] M. Musolesi and C. Mascolo, “A Community Mobility Model for Ad Hoc Network Research,” Proceedings of ACM/SIGMOBILE REALMAN, 2006. [46] M. Musolesi and C. Mascolo, “CAR: Context-aware Adaptive Routing for Delay Tolerant Mobile Networks,” IEEE Transactions on Mobile Computing, Feb 2009. [47] E. C. R. de Oliveira and C´ elio V. N. de Albuquerque, “NECTAR: A DTN Routing Protocol Based on Neighbourhood Contact History,” SAC’09 March 2009. [48] R. Ramanathan, R. Hansen, P. Basu, R. Rosales-Hain and R. Krishnan, “Prioritized Epidemic Routing for Opportunistic Networks,” MobiOpp’07, June 11, 2007. [49] G. Sandulescu and S. Nadjm-Tehrani, “Opportunistic DTN Routing with Window-aware Adaptive Replication,” AINTEC’08,......

Words: 6818 - Pages: 28

Free Essay

Wireless Networking

...Research Institute. [Online]. Available: http://awarehome.imtc.gatech.edu [9] Network NightMare: Network Emulator. [Online]. Available: http://www.networknightmare.net [10] M. J. Dong, G. Yung, and W. J. Kaiser, “Low power signal processing architectures for network microsensors,” in Proc. ISLPED, Aug. 1997, pp. 173–177. [11] W. Su and I. F. Akyildiz, “A stream enabled routing (SER) protocol for sensor networks,” in Proc. Med-hoc-Net, Sep. 2002. [12] J. Su, J. Scott, P. Hui, E. Upton, M. H. Lim, C. Diot, J. Crowcroft, A. Goel, and E. d. Lara, “Haggle: Seamless networking for mobile applications,” in Proc. UbiComp, Sep. 2007. [13] S. Davidoff, M. K. Lee, C. Yiu, J. Zimmerman, and A. Dey, “Principles of smart home control,” in Proc. UbiComp, Sep. 2006. [14] M. Beigl, A. Krohn, T. Zimmer, C. Decker, and P. Robinson, “AwareCon: Situation aware context communication,” in Proc. UbiComp, Oct. 2003. [15] P. V. Beek and M. U. Demircin, “Delay-constrained rate adaptation for robust video transmission over home networks,” in Proc. IEEE ICIP’05, Sep. 2005, pp. 173–176. [16] X. Zhu and B. Girod, “Video streaming over wireless networks,” in Proc. EUSIPCO’07, Sep. 2007. [17] L. Haratcherev, J. Taal, K. Langendoen, R. Lagendijk, and H. Sips, “Optimized video streaming over 802.11 by cross-layer signaling,” IEEE Commun. Mag., vol. 44, no. 1, pp. 115–121, Jan. 2006. [18] Y. Yu, B. Krishnamachari, and V. K. .Prasanna, “Issues in designing middleware for wireless sensor networks,” IEEE Netw.,......

Words: 7488 - Pages: 30

Premium Essay

Artificial Intelligence and Software Engineering: Status and Future Trends

...Science Foundation (DFG). For example, several scenarios describing the vision of the EU were published in [32], and the integrated project WearIT@Work is funded at the University of Bremen which emphasizes AmI for work processes. In Germany, the DFG funded the „Forschungsschwerpunkt Ambient Intelligence“ at the University of Kaiserslautern (http://www.eit.unikl.de/AmI). Various workshops and conferences on AmI were established to foster exchange about AmI. Examples for these meetings are the European Symposium on Ambient Intelligence (EUSAI) [3], Workshop on Ambient Intelligence (WAI), Workshop on Ambient Intelligence for Scientific Discovery (AMDI), Workshop on Ambient intelligence @ Work, International Conference on Ubiquitous Computing (UbiComp) [22], or the Workshop on Agents for Ubiquitous Computing (UbiAgents). References SEKE 2002: the 14th International Conference on Software Engineering and Knowledge Engineering. Ischia, Italy: New York: ACM, 2002. [2] Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE). Montreal, Quebec, Canada: IEEE Computer Society, ISBN: 0769-52035-9, 2003. [3] Aarts E. H. L., Ambient intelligence: First European symposium (EUSAI 2003), vol. 2875. Veldhoven, The Netherlands: Springer-Verlag, 3540204180, 2003. [4] Abecker A., "Wissensbasierte Systeme," Berufsakademie Mosbach, Lecture Notes 2002. [5] Aha D. W., Becerra-Fernandez I., Maurer F., and Muñoz-Avila H., Exploring synergies of knowledge:......

Words: 6393 - Pages: 26

Premium Essay

Marketing

...business-to-business markets: how organizational customers account for supplier corporate social responsibility engagement. Journal of Marketing, 77, 54-72. Lackes, R., & Borgermann, C. (2012, July 30). Optimal pricing strategies for cell phone provider to ender saturated markets. Journal of Management & Economics, 99-104. Mancine, M. (2009). Segmentation and Customer Loyalty. Neilsen, 1-70. Market research report-worldwide mobile app revenues to reach $20.4 billion by 2012. (2013, March 7). Marketwire. Mobile apps help drive business success. (2012). CIO Insight, 1. Shetty, K. S., & Singh, S. (2011). Cloud based application development for accessing restaurant information on mobile device using LBS. International Journal of Ubicomp, 2, 37-49. http://dx.doi.org/Retrieved from Turcotte, S. (2012). The wait is over. Fast Company, 168, 36-37. Itest, imeasure. (2010). R&D Magazine, 52, 28-30....

Words: 6966 - Pages: 28

Free Essay

User Generated Data

...Kostakos, V., O’Neill, E. and Shahi, A. (2006) Building common ground for face to face interactions by sharing mobile device context. LOCA 2006, LNCS 3987, 222-238. 6. Ohkubo, M., Suzuki, K., and Kinoshita, S. (2005) RFID privacy issues and technical challenges. Commun. ACM 48 (9), 66-71. 7. Patel, S.N., Kientz, J.A., Hayes, G.R., Bhat, S. and Abowd, G.D. (2006) Farther than you may think: an empirical investigation of the proximity of users to their mobile phones. Ubicomp 2006, Springer LNCS 4206, 123-140. 36 E. O’Neill et al. 8. Pering, T., Ballagas, R., and Want, R. (2005) Spontaneous marriages of mobile devices and interactive spaces. Commun. ACM 48 (9), 53-59. 9. Riekki, J., Salminen, T. and Alakarppa, I. (2006) Requesting pervasive services by touching RFID tags. IEEE Pervasive Computing, 5 (1), 40-46. 10. Rukzio, E., Leichtenstern, K., Callaghan, V., Holleis, P., Schmidt, A. and Chin, J. (2006) An experimental comparison of physical mobile interaction techniques: touching, pointing and scanning. Ubicomp 2006, Springer LNCS 4206, 87-104. 11. Scott, D., Sharp, R., Madhavapeddy, A., and Upton, E. (2005) . Using visual tags to bypass Bluetooth device discovery. SIGMOBILE Mob. Comput. Commun. Rev. 9, 1 (Jan. 2005), 41-53. 12. Toye, E., Sharp, R., Madhavapeddy, A. and Scott, D. (2005) Using smart phones to access site-specific services. IEEE Pervasive Computing 4 (2), 60-66. 13. Want, R. (2006) An introduction to RFID technology. IEEE Pervasive Computing JanMar......

Words: 8155 - Pages: 33

Free Essay

Big Data

...AUD Residence: 7 AUD Illnesses: 30 AUD New job: 8 AUD Reduce weight: 11 AUD Pregnancy: 11 AUD House moving: 8.5 AUD Chair of Information Management Lecture on Big Data at Macquarie University 19 What is a fair amount to be paid for personal data? • Controversial study of Staiano and colleagues supported by Telefonica and Telecom Italia • What is the lowest price you are willing to accept for your data? • Daily valuation of PII of 60 participants in a second bet reverse auction • The median bid across all the data categories was 2 EUR (2.8 AUD) a day -> 730 EUR (1022 AUD) a year for one category Source: Staiano et al. (2014): Money Walks: A Human-Centric Study on the Economics of Personal Mobile Data, in Ubicomp 2014. Chair of Information Management Lecture on Big Data at Macquarie University 20 Why do we share our data with profit organizations (almost) for free? • A new loyalty card is introduced to the customers • You would get an initial discount if you join now • A game theory approach: No Would you join? Others (would they join) Yes good very bad Nash bad bad Equilibrium 21 No Pareto ok ok Efficient Yes Chair of Information Management very bad good Lecture on Big Data at Macquarie University Agenda Why Big Data? Where does the big data come from? What are the technologies? Big data, a friend or foe? Chair of Information Management Lecture on Big Data at Macquarie......

Words: 1847 - Pages: 8

Premium Essay

An Evolution of Computer Science Research

...ICDCS, SPAA, PPoPP, HiPC, DISC, CLUSTER, WDAG, SRDS, PACT, IPDPS, IPPS, SPDP, CCGrid, DSN, ICPP, Euro-Par, SIROCCO, OPODIS, ICPADS, Grid, Coordination, SC, SUPER, ICS, HPDC, PPSC, IWCC, ICSE, FSE, TACAS, PEPM, RTA, ICSM, ASE, SAT, FM, SAS, MoDELS, UML, RE, ICSR, ICECCS, CAV, FME, FORTE, WSA SOSP, OSDI, USENIX, FAST, EuroSys, HotOS, NOSSDAV, Middleware, MSST ASPLOS, ISCA, MICRO, HPCA, SPD, ASP-DAC, ISLPED, FCCM, FPGA, ISSS, CODES+ISSS, ISPD, ARVLSI, ISCAS, RTSS, RTAS, LCTES, CASES, CHES, EMSOFT, ECRTS, SCOPES, DAC, ICCAD, DATE, SIGCOMM, NSDI, SIGMETRICS, IMC, INFOCOM, ICC, CONEXT, HotNets, IPTPS, ICNP, PAM, IWQoS, SenSys, MASCOTS, IM, P2P, ICCCN, Networking, LCN, HotMobile, GlobeCom, MobiCom, MobiHoc, MobiSys, WMCSA, IPSN, Ubicomp, PerCom, EWSN, ISWC, MSWiM, MobiQuitous, WoWMoM, SECON, WiOpt, DCOSS, MASS, IEEE RFID Oakland, USENIX, CCS, NDSS, ESORICS, RAID, ANTS, CRYPTO, EUROCRYPT, ACNS, TCC, CSF, CSFW, PKC, ASIACRYPT, FSE, RSA, CHES, SECRYPT, INDOCRYPT SIGMOD, VLDB, PODS, SIGIR, WWW, KDD, ICDE, CIDR, ICDM, ICDT, EDBT, SDM, CIKM, ICIS, SSTD, SSD, WebDB, SSDBM, CAiSE, ECIS AAAI, IJCAI, AISB, NLDB, AAMAS, ATAL, ICMAS, ICAPS, AIPS, ECP, ICML, NIPS, COLT, EuroCOLT, ECML PKDD, ECML, KR, PKDD, EWSL, ECAI, RuleML, FOGA, IJCAR, CADE, COLING, TABLEAUX, LPAR, WoLLIC, ICCV, CVPR, ECCV, BMVC, CICLing, ACCV, ICPR, CAIP, SCIA, PSIVT, SSIAI, ACL, NAACL, EACL, UAI SIGGRAPH, I3D, SI3D, I3DG, MM, ACMMM, DCC, ICME, ICMCS, Vis, Eurographics, ACM SIGGRAPH, InfoVis,......

Words: 15250 - Pages: 61

Premium Essay

Augmented Reality

...tracking for augmented reali‐ ty. In ISMAR ‘04, pp. 192-201, 2005. [44] Newman, J., Ingram, D., Hopper, A. Augmented reality in a wide area sentient envi‐ ronment. In ISMAR ‘01, pp. 77-86, 2001. [45] Norman, D. A. The Design of Everyday Things. New York: Doubleday Business (1988). [46] Olwal, A., Lindfors, C., Gustafsson, J., Kjellberg, T., Mattsson, L. ASTOR: An autostereoscopic optical see-through augmented reality system. In ISMAR ‘05, pp. 24-27, 2005. [47] Park, J., Jiang, B., Neumann, U. Vision-based pose computation: Robust and accurate augmented reality tracking. In IWAR ‘99, pp. 3-12, 1999. [48] Pinhanez, C. The Everywhere Displays projector: A device to create ubiquitous graphical interfaces.Proc. Ubiquitous Computing 2001 (Ubicomp '01), Atlanta, Georgia, September 2001, pp. 315- 331. Springer Lecture Notes In Computer Science, v. 2201. [49] Pinz, A., Brandner, M., Ganster, H., Kusej, A., Lang, P., Ribo, M. Hybrid tracking for augmented reality. ÖGAI Journal, 21:1, 17-24, 2002. [50] Pressigout, M., Marchand, É. Hybrid tracking algorithms for planar and non-planar structures subject to illumination changes. In ISMAR ‘06, pp. 52-55, 2006. [51] Reitmayr, G., Drummond, T. Going out: Robust model-based tracking for outdoor augmented reality. In ISMAR ‘06, pp. 109-118, 2006. [52] Rodrigo Silva, L.S. Introduction to augmented reality. http://virtual.lncc.br/~rodrigo/ links/AR/node19.html. 2003. [53] Rolland, J. P., Hopkins, T. A Method of Computational......

Words: 8102 - Pages: 33

Premium Essay

Humen Resource Manegment

...1193–1294. Kavanagh, M. J., Gueutal, H. G., & Tannenbaum, S. I. (1990). Human resource systems: Development and application information. : PWS Publication. Kavanagh, M., & Thite, M. (2009). Human resource information systems: Basics, applications, and future directions (1 ed.). : Sage Publications, Inc. Kissel, R., Stine, K., Scholl, M., Rossman, H., Fahlsing, J., & Guilick, J. (2008). Security considerations in the system development life cycle. Available at. http://csrc. nist.gov/publications/nistpubs/800-64-Rev2/SP800-64-Revision2.pdf Retrieved February 04 2010. Korhonen, I., Paavilainen, P., & Särelä, A. (2003). Application of ubiquitous computing technologies for support of independent living of the elderly in real life settings. Ubicomp. Kotulic, A. G., & Clark, J. G. (2004). Why there aren't more information security research studies. Information & Management, 41, 597–607. Kovach, K., & Cathcart, C. (1999). Human resource information systems (HRIS): Providing business with rapid data access, information exchange and strategic advantage. Public Personnel Management, 28, 275–282. Kovach, K., Hughes, A., Fagan, P., & Maggitti, P. (2002). Administrative and strategic advantages of HRIS. Employment Relations Today, 29, 43–48. Lacey, D. (2010). Understanding and transforming organizational security culture. Information Management & Computer Security, 18, 4–13. Lam, W. (2005). Investigating success factors in enterprise application integration: A case-driven......

Words: 7376 - Pages: 30

Free Essay

Introduction to Information System Security

...(comprehension) Strawman draft version: February 2012 HC/Design for non-mouse interfaces [elective] Motivation: As technologies evolve, new interaction styles are made possible. This knowledge unit should be considered extensible, to track emergent technology. Topics: • • • Choosing interaction styles and interaction techniques Representing information to users: navigation, representation, manipulation Approaches to design, implementation and evaluation of non-mouse interaction o Touch and multi-touch interfaces o New Windows (iPhone, Android) o [Speech recognition and natural language processing – cross reference to Intelligent Systems] o Wearable and tangible interfaces o Persuasive interaction and emotion o Ubiquitious and context-aware (Ubicomp) o Bayesian inference (e.g. predictive text, guided pointing) o Ambient/peripheral display and interaction Learning Outcomes Students should be able to apply the principles of HCI foundations to: 1. Describe when non-mouse interfaces are appropriate (knowledge) 2. Discuss the advantages (and disadvantages) of non-mouse interfaces (application) 3. Understand the interaction possibilities beyond mouse-and-pointer interfaces (comprehension) HC/Collaboration and communication [elective] Motivation: Computer interfaces not only support users in achieving their individual goals but also in their interaction with others, whether that is task-focussed (work or gaming) or taskunfocussed (social networking). Topics: • • • •......

Words: 1936 - Pages: 8