Scalable Human Computer Interaction in Control Rooms as Pervasive Computing Environments

被引:0
|
作者
Flegel, Nadine [1 ]
Van Laerhoven, Kristof [2 ]
Mentler, Tilo [1 ]
机构
[1] Trier Univ Appl Sci, Trier, Germany
[2] Univ Siegen, Siegen, Germany
关键词
Scalability; Safety-Critical Systems; Control Rooms; Interaction Design Patterns; Pervasive Computing Environment;
D O I
10.1145/3552327.3552351
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private and professional life contexts must be viewed as pervasive computing environments, with the aim to address peoples' needs and tasks as well as cooperation and communication issues. However, there is a risk, that this results in handling a growing number of devices and complex interactions. The question arises to what extent interaction concepts that were designed for single or a few devices can be transferred to such environments. This can be seen as a scaling problem in terms of cognitive ergonomics. This is also an important issue in safety-critical domains, where control rooms serve as central units, as the demands on operators are increasing. Support is needed in decision-making, communication and collaboration. This paper describes the research questions and methodology of the development of design principles for scalable interaction design in control rooms from a cognitive ergonomics perspective. The expected outcome is a set of concepts that are specifically suited for safety-critical pervasive computing environments.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Agile middleware of pervasive computing environments
    Niemelä, E
    Vaskivuo, T
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 192 - 197
  • [32] Trust management for pervasive computing environments
    Trček, Denis
    World Academy of Science, Engineering and Technology, 2010, 37 : 185 - 190
  • [33] Context management in pervasive computing environments
    Anagnostopoulos, C
    Tsounis, A
    Hadjiefthymiades, S
    International Conference on Pervasive Services 2005, Proceedings, 2005, : 421 - 424
  • [34] Active Authentication for pervasive computing environments
    Matsumiya, K
    Aoki, S
    Murase, M
    Tokuda, H
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 28 - 41
  • [35] Pervasive computing: a computer in every pot
    Vrana, G
    EDN, 2002, 47 (03) : 75 - 78
  • [36] A novel privacy preserving authentication and access control scheme for pervasive computing environments
    Ren, Kui
    Lou, Wenjing
    Kim, Kwangjo
    Deng, Robert
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2006, 55 (04) : 1373 - 1384
  • [37] Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments
    Choi, Jung Hwan
    Kang, Dong Hyun
    Jang, Hyunsu
    Eom, Young Ik
    2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 491 - 498
  • [38] Integrating Access Control Obligations in the Session Initiation Protocol for Pervasive Computing Environments
    Sharghi, Hassan
    Liscano, Ramiro
    E-TECHNOLOGIES: EMBRACING THE INTERNET OF THINGS, MCETECH 2017, 2017, 289 : 24 - 40
  • [39] A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments
    Zhu, Zhou
    Xu, Renzuo
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4572 - 4577
  • [40] Privacy in pervasive computing environments - A contradiction in terms?
    Cas, J
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2005, 24 (01) : 24 - 33