Search
Search Results
-
Smell and Taste-Based Interactions Enabled Through Advances in Digital Technology
Innovations around smell and taste interfaces are quickly emerging in the literature and practice, they include fully controllable sensory delivery... -
An Embodied Conversational Agent to Support Wellbeing After Injury: Insights from a Stakeholder Inclusive Design Approach
Embodied conversational agents (ECAs) are increasingly being included in digital health and wellbeing programs. Whilst initial evaluations of ECAs in... -
DROP DASH: A Persuasive Mobile Game to Promote Healthy Hydration Choices Using Machine Learning
The increasing consumption of unhealthy beverages is a significant public health concern, contributing to a range of health issues. Recognized as... -
Exploring the Influence of Persuasive Strategies on Student Motivation: Self-determination Theory Perspective
The role of persuasive strategies is crucial in designing systems to influence behaviour. Understanding how students are affected by these strategies... -
Experiential Learning or Direct Training: Fostering Ethical Cybersecurity Decision-Making via Serious Games
Achieving secure cybersecurity systems requires a dual focus on technological aspects and human factors, both of which raise questions around ethical... -
The Effect of Dark Patterns and User Knowledge on User Experience and Decision-Making
Dark patterns, aka deceptive designs, have become prevalent in the online environment. In this paper, we examined how dark patterns and knowledge of... -
Counterfactual Reasoning Using Predicted Latent Personality Dimensions for Optimizing Persuasion Outcome
Customizing persuasive conversations related to the outcome of interest for specific users achieves better persuasion results. However, existing... -
Exploring Self-competition as a Viable Motivation to Promote Physical Activity
Persuasive systems design encompasses a wide range of concepts that may help users be motivated to achieve the targeted goal or behavior change. This... -
A Simple Distributed Approach for Running Machine Learning Based Simulations in Intrusion Detection Systems
Intrusion Detection Systems (IDS) that use Machine Learning (ML) are a must-have for success protection when thinking of network traffic.... -
Planning of Urban Freight Delivery During Peak and Off-Peak Traffic Periods
Paper present influence of time windows during the day on efficiency of urban freight delivery. Field research was obtained to gathering freight... -
Curricular Excursions on the Internet of Everything
Including dispositions and skills in computing curricula is beginning to take root in education circles. These two dimensions complement the... -
From Women to Gender and Diversity
In this chapter, we look carefully into the genealogy and formation of WG 9.8: Gender, Diversity, and ICT. In our inquiry, we have looked into... -
From Technology and Virtuality to “Our Digital Lives”
Following the work of scholars who see technology as intertwined with society, in this chapter we start with the history of our revamped working... -
Introduction
This chapter considers how the organizational structure of the International Federation for Information Processing (IFIP) influenced the format of... -
Rethinking the Role of ICT for Sustainable Development: From Incremental Improvements Towards Sustainable Societal Transformation
This chapter provides an overview of past, present and future perspectives on the relationship between ICT and sustainable development in research,... -
Impacts on Specific Industries
In this section, I analyze some of the industries potentially impacted by AI/ML. -
-
The Horizon for AI in Our Society
In this section, I will check some of the current trends in technology and estimate how they can possibly impact society. -
The Impact on People
Like most high-impact technologies, AI has the potential to create new jobs. They can fall into two categories. One directly related to the... -
Enhancing Cloud Data Integrity Verification Scheme with User Legitimacy Check
Users employ cloud servers to store data and depend on third-party audits to guarantee data integrity. However, this auditing system poses certain...