scholarly journals Computer-Supported Cooperative Work – Revisited

i-com ◽  
2021 ◽  
Vol 20 (3) ◽  
pp. 215-228
Author(s):  
Angelika Bullinger-Hoffmann ◽  
Michael Koch ◽  
Kathrin Möslein ◽  
Alexander Richter

Abstract Due to the COVID-19 lockdowns and the related mandated work for home, we have seen a massive increase of the use of collaboration tools in various work settings in the last 18 months. Whereas this might have been a new terrain for some, IT-supported work and the related research domain Computer-Supported Cooperative Work (CSCW) have been around for decades. In this article we briefly review what CSCW has to offer for the currently increasing demand in setting up remote collaboration – and share our own observations about what happened when collaboration tools have been introduced in the pandemic. As a summary, we present some learnings from the experience – both for the current state of CSCW research and for future work.

Author(s):  
Thomas Ludwig ◽  
Oliver Stickel ◽  
Peter Tolmie ◽  
Malte Sellmer

Abstract10 years ago, Castellani et al. (Journal of Computer Supported Cooperative Work, vol. 18, no. 2–3, 2009, pp. 199–227, 2009) showed that using just an audio channel for remote troubleshooting can lead to a range of problems and already envisioned a future in which augmented reality (AR) could solve many of these issues. In the meantime, AR technologies have found their way into our everyday lives and using such technologies to support remote collaboration has been widely studied within the fields of Human-Computer Interaction and Computer-Supported Cooperative Work. In this paper, we contribute to this body of research by reporting on an extensive empirical study within a Fab Lab of troubleshooting and expertise sharing and the potential relevance of articulation work to their realization. Based on the findings of this study, we derived design challenges that led to an AR-based concept, implemented as a HoloLens application, called shARe-it. This application is designed to support remote troubleshooting and expertise sharing through different communication channels and AR-based interaction modalities. Early testing of the application revealed that novel interaction modalities such as AR-based markers and drawings play only a minor role in remote collaboration due to various limiting factors. Instead, the transmission of a shared view and especially arriving at a shared understanding of the situation as a prerequisite for articulation work continue to be the decisive factors in remote troubleshooting.


Author(s):  
Mohd Dilshad Ansari ◽  
Ekbal Rashid ◽  
S Siva Skandha ◽  
Suneet Kumar Gupta

Background: image forensics deal with the problem of authentication of pictures or their origins. There are two types of forensics techniques namely active and passive. Passive forgery is also known as blind forensics technique. In passive forgery, copy-move (cloning) image forensics is most common forgery technique. In this approach, an object or region of a picture is copied and positioned somewhere else in the same image. Active method used watermarking to solve picture genuineness problem. It has limitations like human involvement or particularly equipped cameras. To overwhelm these limitations, numerous passive authentication approaches have been developed. Moreover, both approaches do not require any prior information about the picture. Objective: The prime objective of this survey is to provide an inclusive summary as well as recent advancement, challenges and future direction in image forensics. In Today’s digital era the digital pictures and videos are having great impact on our life as well as society, as they became the important source of information. Though earlier it was very difficult to doctor the picture, nowadays digital pictures can be doctored easily with the help of editing tools and internet. These practices make pictures as well as videos genuineness deceptive. Conclusion: This paper presents the current state-of- the-art of passive (cloning) image forensics techniques, challenges and future direction of this research domain. Further, the major open issues in developing a robust cloning image forensics detector with their performance are discussed. Lastly, the available benchmark datasets are also discussed


Author(s):  
Charlotte P. Lee ◽  
Kjeld Schmidt

The study of computing infrastructures has grown significantly due to the rapid proliferation and ubiquity of large-scale IT-based installations. At the same time, recognition has also grown of the usefulness of such studies as a means for understanding computing infrastructures as material complements of practical action. Subsequently the concept of “infrastructure” (or “information infrastructures,” “cyberinfrastructures,” and “infrastructuring”) has gained increasing importance in the area of Computer-Supported Cooperative Work (CSCW) as well as in neighboring areas such as Information Systems research (IS) and Science and Technology Studies (STS). However, as such studies have unfolded, the very concept of “infrastructure” is being applied in different discourses, for different purposes, in myriad different senses. Consequently, the concept of “infrastructure” has become increasingly muddled and needs clarification. The chapter presents a critical investigation of the vicissitudes of the concept of “infrastructure” over the last 35 years.


Author(s):  
Kjeld Schmidt

The emergence of practice-centered computing (e.g., Computer-Supported Cooperative Work, or CSCW) raises the crucial question: How can we conceptualize the practices into which the prospective technology is to be integrated? How can we, reasonably, say of two observed activities or events that they are, or are not, instances of the same type? These are crucial questions. This chapter therefore attempts to clarify the concepts of “practice” and “technique.” First, since our ordinary concepts of “practice” and “technique” developed as part of the evolution of modern technology, as tools for practitioners’ and scholars’ reflections on the role of technical knowledge in work, the chapter outlines the major turning points in the evolution of these concepts, from Aristotle (via the scholastics), to enlightenment thinkers such as Diderot and Kant, and finally to Marx and Marxism. The chapter thereafter moves on to analyze the concepts as we use them today in ordinary discourse.


Author(s):  
Paul B. Miller

This chapter charts new frontiers of scholarly inquiry in fiduciary law. The chapter first orients the reader by taking stock of the current state of play in fiduciary scholarship. It then identifies a range of important questions that should inspire future work in the field. More specifically, it identifies pressing questions of legal theory (conceptual and normative analysis), economic and empirical legal studies (including classical and behavioral economic analysis), and historical and sociological inquiry. The chapter also raises questions of interest to private law theorists and scholars interested in exploring the significance of fiduciary principles within various subfields, from trust and corporate law to health law and legal ethics.


2012 ◽  
Vol 510 ◽  
pp. 776-780 ◽  
Author(s):  
Li Li An ◽  
Qiang Xu ◽  
Dong Lai Xu ◽  
Zhong Yu Lu

This paper presents a review of developing of creep damage constitutive equations for high chromium alloy (such as P91 alloy). Firstly, it briefly introduces the background of creep damage for P91 materials. Then, it summarizes the typical creep damage constitutive equations developed and applied for P91 alloy, and the main deficiencies of KRH (Kachanov-Robatnov-Hayhurst) type and Xus type constitutive equations. Finally it suggests the directions for future work. This paper contributes to the knowledge for the developing creep damage constitutive equations for the specific material.


Sign in / Sign up

Export Citation Format

Share Document