Toward Social Role-Based Interruptibility Management

被引:1
|
作者
Anderson, Christoph [1 ]
Heinisch, Judith Simone [1 ]
Deldari, Shohreh [2 ]
Salim, Flora [3 ]
Ohly, Sandra [4 ]
David, Klaus [5 ]
Pejovic, Veljko [6 ]
机构
[1] Univ Kassel, Dept Commun Technol, D-34121 Kassel, Germany
[2] RMIT Univ, Comp Sci, Melbourne, Vic 3000, Australia
[3] Univ New South Wales, Sch Comp Sci & Engn, Digital Transport, Sydney, NSW 2052, Australia
[4] Univ Kassel, Business Psychol, D-34121 Kassel, Germany
[5] Univ Kassel, D-34121 Kassel, Germany
[6] Univ Ljubljana, Fac Comp & Informat Sci, Ljubljana 1000, Slovenia
基金
澳大利亚研究理事会;
关键词
Feature extraction; Task analysis; Performance evaluation; Radio frequency; Behavioral sciences; Sensors; Computational modeling; WORK; HOME;
D O I
10.1109/MPRV.2022.3229905
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Pervasive and ubiquitous computing facilitates immediate access to information in the sense of always-on. Information, such as news, messages, or reminders, can significantly enhance our daily routines but are rendered useless or disturbing when not being aligned with our intrinsic interruptibility preferences. Attention management systems use machine learning to identify short-term opportune moments, so that information delivery leads to fewer interruptions. Humans' intrinsic interruptibility preferences-established for and across social roles and life domains-would complement short-term attention and interruption management approaches. In this article, we present our comprehensive results toward social role-based attention and interruptibility management. Our approach combines on-device sensing and machine learning with theories from social science to form a personalized two-stage classification model. Finally, we discuss the challenges of the current and future AI-driven attention management systems concerning privacy, ethical issues, and future directions.
引用
收藏
页码:59 / 68
页数:10
相关论文
共 50 条
  • [1] Authorization management for role-based collaboration
    Ahn, GJ
    Zhang, LH
    Shin, DW
    Chu, B
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4128 - 4134
  • [2] Role-based privilege and trust management
    Shin, D
    Ahn, GJ
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 401 - 410
  • [3] Role-based rights in artificial social systems
    Boella, G
    van der Torre, L
    2005 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY, PROCEEDINGS, 2005, : 516 - 519
  • [4] A role-based infrastructure for the management of dynamic communities
    Schaeffer-Filho, Alberto
    Lupu, Emil
    Sloman, Morris
    Keoh, Sye-Loong
    Lobo, Jorge
    Calo, Seraphin
    RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 1 - +
  • [5] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [6] Extended role-based sensor management framework
    Kim, S
    Moon, M
    Yeom, K
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U175 - U180
  • [7] The Semantics of Role-Based Trust Management Languages
    Felkner, Anna
    Sacha, Krzysztof
    ADVANCES IN SOFTWARE ENGINEERING TECHNIQUES, 2012, 7054 : 179 - 189
  • [8] Intermediary roles in regulatory programs: Toward a role-based framework
    Kourula, Arno
    Paukku, Markus
    Peterman, Andrew
    Koria, Mikko
    REGULATION & GOVERNANCE, 2019, 13 (02) : 141 - 156
  • [9] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255
  • [10] Toward role-based agent coordination for mobile and ubiquitous services
    Sashima, Akio
    Izumi, Noriaki
    Kurumatani, Koichi
    Kotani, Yoshiyuki
    20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 262 - +