Invisible Computing

نویسندگان

  • Yohan Choi
  • Yong-Young Kim
  • Douglas M. Schutz
چکیده

The computer is no longer a tool solely used for enhancing the productivity of organizational tasks. Rather, computing capability now is embedded into our everyday artifacts, enabling our daily activities to become smarter and easier. As a result, the way we interact with computers has radically changed in the past few years: computing is now being designed for activity-oriented users. Thus, as IS and HCI scholars have discussed, computing should be designed to be invisible. By invisible we mean the phenomenon that users are not conscious of the computing that they are using. The degree of invisibility largely depends on user interfaces of computing. The concept of invisibility has been used among IS and HCI scholars. However, detailed analysis on invisibility as a construct has not been conducted. Therefore, in this paper, we will investigate 1) where and how the concept of invisibility has been used in the literature, 2) a new theoretical framework for the concept of invisibility in computing, and 3) how this concept can provide practical implications by applying it to a related case. In this paper, we focus on the relation between computing devices and users at the individual level with respect to degrees of invisibility.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Invisible Computing

Invisible computing creates better everyday devices by augmenting them with computation and communication. The native interface of a particular device suffices, with computation and communication occurring transparently to the user. An invisible computing device does not require setup or maintenance overhead and can be deployed incrementally without prerequisite infrastructure. Low-cost invisib...

متن کامل

Invisible Phenomena in the Overall Personality of Man, in the Interpretive Study of the Verses 38 and 39 of Haqqah

There is a visible and invisible element in all creatures. There are also realities in human beings, some of which are visible and most of which are invisible. The preference of the invisible is not limitted only to quantities but includes qualitaties also. This division is inspired by the verses 38 and 39 of Haqqah: Most commentators of the Holy Qur'an believe that the external instances of th...

متن کامل

Invisible Information Systems

This article introduces the concept of ‘invisible information systems’, information systems that seamlessly integrate with and support collective work activity especially in routine operational contexts. Systems designed by traditional methods and implemented with traditional computing technology tend to ‘get in the way’ of skilful time-constrained performance in these work domains. We argue th...

متن کامل

Real World Object Annotation for See-Through Displays

A tremendous growth of the Internet over the past years together with the growing availability of wireless communication technologies in the wide, local and personal area, and the maturing of miniaturized Internet hardware technologies like tiny web servers has fertilized the emergence of “smart appliances”: wirelessly ad-hoc networked, mobile, autonomous special purpose computing devices, prov...

متن کامل

Improve Invisible Ink Production by the Europium Complexes

The invisible inks have many applications, including the use of banknote printing, code load, securitydocuments and much of its application in the exchange of security information. Photoluminescenceproperties of lanthanide compounds that attracted the attention of many scholars in recent decades are one ofthe important factors in drying and fluidity of the ink. The solvent eva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013