SlideShare a Scribd company logo
1 of 13
Download to read offline
Socially-Augmented Software
Empowering Software Operation Through Social Contacts
Trans-Atlantic Research and Education Agenda in System of Systems
Raian Ali, Nan Jiang & Huseyin Dogan
www.bournemouth.ac.uk 2
Overview
 About me
 An example of a Socially-Augmented Operation
 Rationale: Power of Contacts
 Proposed Concept
 Benefits and Examples
 Application Illustration
 Challenges for Social-Augmentation
 Future Work
www.bournemouth.ac.uk 3
Socially-Augmented Operation
 Augmentation is the action or process of
making or becoming greater in size or amount
(Oxford Dictionaries, 2013)
 An example: Relocating and relying on a
friend to find an accommodation.
Socially-Augmented Software is the integration of the power of contacts
and machines to achieve a collective benefit, by ensuring contacts are
connected by the most appropriate means, and that they have the right
tools to make sense of the information and knowledge available to them.
www.bournemouth.ac.uk 4
Rationale: Power of Contacts
 Paradigm shift: the mind-set of managing network of contacts
using a software is already there.
 Some pros and cons of empowering software operations
through contacts:
+ can be very practical when it is relatively difficult to fulfil the
entire requirements of an individual through solely automated
means.
- allow a freestyle interaction that could lead to useless and
even harmful solutions causing e.g. information overload.
 Augmenting software with people is challenging and
restrictions need to be carefully designed to avoid discouraging or
confusing users when interacting and cooperating with software.
www.bournemouth.ac.uk 5
Proposed Concept
Socially-Augmented Software Process
www.bournemouth.ac.uk 6
Benefits and Examples
 Enables achieving a range of requirements that would not be
achievable through automated means e.g. smart-grip system.
 Enables alternative approaches for solving problems more cost-
effectively for certain domains, requirements and users e.g. relying on
contacts than an e-guide to provide and consume desired services.
 Avoids the deployment of expensive IT and business infrastructure
e.g. wireless network coverage through contacts.
 Enables the formulation of socially-customized solutions within a
community to which a user belongs e.g. knowing the habits of a friend
when booking a holiday.
 Enables a richer accommodation of, and adaptation to, changes e.g.
a fully automated tour guide may assume that the hotels in a certain
geographic area are unlikely to provide internet.
www.bournemouth.ac.uk 7
Application illustration
 Consider a museum-guide mobile information system giving
information about pieces of art, alerting of some events in the
museum helping on registering for services, etc.
 We divide the operation of socially-augmented software into three
stages
1. Requirements Activation
2. Solutions Evaluation
3. Solution Execution
Ref: Jim Wilson/The New York Times
www.bournemouth.ac.uk 8
Requirements Activation
1. Requirements Activation: requirements can be activated by social
requests through a users contacts on behalf of the user.
www.bournemouth.ac.uk 9
Solutions Evaluation
2. Solutions Evaluation: software could follow different alternative
solutions in order to fulfil users requirements.
www.bournemouth.ac.uk 10
Solution Execution
3. Solution Execution: the software has to execute or facilitate
execution of certain tasks which comprise information extraction
and processing.
www.bournemouth.ac.uk 11
Challenges for Social-Augmentation
 The baseline criteria for user to request or provide services:
Who – a set of contacts who can request and consume a service.
When/Where – the environment that surrounds both the provider and
the consumer on which they both have no control, i.e. their context.
What – the specification of the services to be provided, i.e. the
information to share and the tasks to execute.
Why – the reason for which a consumer asks for a service, i.e. the goal
which is intended to be achieved.
How – the way by which a contact provides a service. Two main
categories comprise (i) sharing with all and (ii) sharing under demand.
www.bournemouth.ac.uk 12
Future Work
 Revisit the access policies and roles privileges for organizational
information systems and find out how these will be aligned with users
social life and contacts.
 Investigate the influencers on data quality to enable better design for
quality e.g. reliability of user data and social penalties/sanctions.
 Test our entire vision on real life case studies and validate the
feasibility of socially-augmented software and consequently address
the issue of people acceptance of this novel software style.
Developers tend to solve socio-technical problems with
techno-social approaches.
Need to consider Human Factors related topics such as human
centered design, human cognition, situational awareness, information
overload, training, organizational and professional culture, and trust.
www.bournemouth.ac.uk 13
Contact us
Dr. Raian Ali
Email: rali@bournemouth.ac.uk
Dr. Nan Jiang
njiang@bournemouth.ac.uk
Dr. Huseyin Dogan
hdogan@Bournemouth.ac.uk

More Related Content

What's hot

TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementTRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementAnsgar Koene
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Kiran K.V.S.
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading servicesFabernovel
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...Marc Smith
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...AM Publications
 
Understanding and maintaining your market to maximise revenue generation opp...
Understanding and maintaining your market to maximise revenue generation opp...Understanding and maintaining your market to maximise revenue generation opp...
Understanding and maintaining your market to maximise revenue generation opp...Miguel Simões
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online socialijsptm
 
Web 3.0 social media and semantic technology - primal fusion - jan-27-10-no...
Web 3.0   social media and semantic technology - primal fusion - jan-27-10-no...Web 3.0   social media and semantic technology - primal fusion - jan-27-10-no...
Web 3.0 social media and semantic technology - primal fusion - jan-27-10-no...Primal
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_biasAnsgar Koene
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceTeklu_U
 
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...Kristen Yarmey
 
Dni2009 Phr Workshop Peter Part2
Dni2009 Phr Workshop Peter Part2Dni2009 Phr Workshop Peter Part2
Dni2009 Phr Workshop Peter Part2erdley
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Socio-technical influences on social media adoption
Socio-technical influences on social media adoptionSocio-technical influences on social media adoption
Socio-technical influences on social media adoptionAimee Jacobs
 

What's hot (18)

TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementTRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading services
 
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
2000-ACM-SigMobile-Mobile computing and communications review - Marc Smith - ...
 
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
Privacy Perspectives, Requirements and Design trade-offs of Encounter- based ...
 
Understanding and maintaining your market to maximise revenue generation opp...
Understanding and maintaining your market to maximise revenue generation opp...Understanding and maintaining your market to maximise revenue generation opp...
Understanding and maintaining your market to maximise revenue generation opp...
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Web 3.0 social media and semantic technology - primal fusion - jan-27-10-no...
Web 3.0   social media and semantic technology - primal fusion - jan-27-10-no...Web 3.0   social media and semantic technology - primal fusion - jan-27-10-no...
Web 3.0 social media and semantic technology - primal fusion - jan-27-10-no...
 
Dasts16 a koene_un_bias
Dasts16 a koene_un_biasDasts16 a koene_un_bias
Dasts16 a koene_un_bias
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social Intelligence
 
A1060104
A1060104A1060104
A1060104
 
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
When Students Go Mobile: The Effects of Smartphones on Information Literacy a...
 
Social computing
Social computingSocial computing
Social computing
 
Dni2009 Phr Workshop Peter Part2
Dni2009 Phr Workshop Peter Part2Dni2009 Phr Workshop Peter Part2
Dni2009 Phr Workshop Peter Part2
 
Kelleher ICA 2008
Kelleher ICA 2008Kelleher ICA 2008
Kelleher ICA 2008
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Socio-technical influences on social media adoption
Socio-technical influences on social media adoptionSocio-technical influences on social media adoption
Socio-technical influences on social media adoption
 

Similar to Socially augmented software empowering software operation through social contacts

Designing a recommender system based on social networks and location based se...
Designing a recommender system based on social networks and location based se...Designing a recommender system based on social networks and location based se...
Designing a recommender system based on social networks and location based se...IJMIT JOURNAL
 
DESIGNING A RECOMMENDER SYSTEM BASED ON SOCIAL NETWORKS AND LOCATION BASED ...
DESIGNING A RECOMMENDER SYSTEM BASED ON  SOCIAL NETWORKS AND LOCATION BASED  ...DESIGNING A RECOMMENDER SYSTEM BASED ON  SOCIAL NETWORKS AND LOCATION BASED  ...
DESIGNING A RECOMMENDER SYSTEM BASED ON SOCIAL NETWORKS AND LOCATION BASED ...IJMIT JOURNAL
 
final_research_paper on final fourth year project
final_research_paper on final fourth year projectfinal_research_paper on final fourth year project
final_research_paper on final fourth year projectAnmolSharma31477
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
Web_based_content_management_system_using_crowdsourcing_technology
Web_based_content_management_system_using_crowdsourcing_technologyWeb_based_content_management_system_using_crowdsourcing_technology
Web_based_content_management_system_using_crowdsourcing_technologyChamil Chandrathilake
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.docbutest
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst AdvisorIRJET Journal
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxturveycharlyn
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET Journal
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Wanted an Active, Viable, Collaborative On-line Community
Wanted an Active, Viable, Collaborative On-line CommunityWanted an Active, Viable, Collaborative On-line Community
Wanted an Active, Viable, Collaborative On-line CommunityLouis-Pierre Guillaume
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Social Network Analysis Helps Telecommunication Firms
Social Network Analysis Helps Telecommunication FirmsSocial Network Analysis Helps Telecommunication Firms
Social Network Analysis Helps Telecommunication FirmsMohammed Al Babeli
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVpkaviya
 

Similar to Socially augmented software empowering software operation through social contacts (20)

Designing a recommender system based on social networks and location based se...
Designing a recommender system based on social networks and location based se...Designing a recommender system based on social networks and location based se...
Designing a recommender system based on social networks and location based se...
 
DESIGNING A RECOMMENDER SYSTEM BASED ON SOCIAL NETWORKS AND LOCATION BASED ...
DESIGNING A RECOMMENDER SYSTEM BASED ON  SOCIAL NETWORKS AND LOCATION BASED  ...DESIGNING A RECOMMENDER SYSTEM BASED ON  SOCIAL NETWORKS AND LOCATION BASED  ...
DESIGNING A RECOMMENDER SYSTEM BASED ON SOCIAL NETWORKS AND LOCATION BASED ...
 
final_research_paper on final fourth year project
final_research_paper on final fourth year projectfinal_research_paper on final fourth year project
final_research_paper on final fourth year project
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Web_based_content_management_system_using_crowdsourcing_technology
Web_based_content_management_system_using_crowdsourcing_technologyWeb_based_content_management_system_using_crowdsourcing_technology
Web_based_content_management_system_using_crowdsourcing_technology
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
BenMartine.doc
BenMartine.docBenMartine.doc
BenMartine.doc
 
Product Analyst Advisor
Product Analyst AdvisorProduct Analyst Advisor
Product Analyst Advisor
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
IRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster WarningIRJET- Event Detection and Text Summary by Disaster Warning
IRJET- Event Detection and Text Summary by Disaster Warning
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Agent basedqos
Agent basedqosAgent basedqos
Agent basedqos
 
Wanted an Active, Viable, Collaborative On-line Community
Wanted an Active, Viable, Collaborative On-line CommunityWanted an Active, Viable, Collaborative On-line Community
Wanted an Active, Viable, Collaborative On-line Community
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Social Network Analysis Helps Telecommunication Firms
Social Network Analysis Helps Telecommunication FirmsSocial Network Analysis Helps Telecommunication Firms
Social Network Analysis Helps Telecommunication Firms
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IV
 

More from Engineering and Social Informatics (ESOTICS)

More from Engineering and Social Informatics (ESOTICS) (20)

Digital addiction and what you need to know
Digital addiction and what you need to knowDigital addiction and what you need to know
Digital addiction and what you need to know
 
Pragmatic requirements for adaptive systems a goal driven modeling and analys...
Pragmatic requirements for adaptive systems a goal driven modeling and analys...Pragmatic requirements for adaptive systems a goal driven modeling and analys...
Pragmatic requirements for adaptive systems a goal driven modeling and analys...
 
Mitigating circumstances in cyber crime
Mitigating circumstances in cyber  crimeMitigating circumstances in cyber  crime
Mitigating circumstances in cyber crime
 
The design of software based peer groups to combat digital addiction
The design of software based peer groups to combat digital addiction The design of software based peer groups to combat digital addiction
The design of software based peer groups to combat digital addiction
 
Crowdsourcing transparency requirements through structured feedback and social
Crowdsourcing transparency requirements through structured feedback and socialCrowdsourcing transparency requirements through structured feedback and social
Crowdsourcing transparency requirements through structured feedback and social
 
Persuasive and culture aware feedback acquisition
Persuasive and culture aware feedback acquisitionPersuasive and culture aware feedback acquisition
Persuasive and culture aware feedback acquisition
 
Adaptive software based feedback acquisition a personas-based design
Adaptive software based feedback acquisition a personas-based designAdaptive software based feedback acquisition a personas-based design
Adaptive software based feedback acquisition a personas-based design
 
A modelling language for transparency requirements in business information sy...
A modelling language for transparency requirements in business information sy...A modelling language for transparency requirements in business information sy...
A modelling language for transparency requirements in business information sy...
 
Modelling and analysing contextual failures for dependability requirements
Modelling and analysing contextual failures for dependability requirementsModelling and analysing contextual failures for dependability requirements
Modelling and analysing contextual failures for dependability requirements
 
Engineering software based motivation a persona-based approach
Engineering software based motivation a persona-based approachEngineering software based motivation a persona-based approach
Engineering software based motivation a persona-based approach
 
REfine a gamifiedplatform for participatory requirements engineering
REfine a gamifiedplatform for participatory requirements engineeringREfine a gamifiedplatform for participatory requirements engineering
REfine a gamifiedplatform for participatory requirements engineering
 
The Emerging Requirement for Digital Addiction Labels
The Emerging Requirement for Digital Addiction LabelsThe Emerging Requirement for Digital Addiction Labels
The Emerging Requirement for Digital Addiction Labels
 
Gamification for volunteer cloud computing
Gamification for volunteer cloud computingGamification for volunteer cloud computing
Gamification for volunteer cloud computing
 
Crowd centric requirements engineering - ra
Crowd centric requirements engineering - raCrowd centric requirements engineering - ra
Crowd centric requirements engineering - ra
 
Towards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po emTowards a code of ethics for gamification at enterprise po em
Towards a code of ethics for gamification at enterprise po em
 
Consideration in software mediated social interaction
Consideration in software mediated social interactionConsideration in software mediated social interaction
Consideration in software mediated social interaction
 
Software evaluation via users’ feedback at runtime
Software evaluation via users’ feedback at runtimeSoftware evaluation via users’ feedback at runtime
Software evaluation via users’ feedback at runtime
 
Crowdsourcing Software Evaluation
Crowdsourcing Software EvaluationCrowdsourcing Software Evaluation
Crowdsourcing Software Evaluation
 
Digital addiction REFSQ 14
Digital addiction REFSQ 14 Digital addiction REFSQ 14
Digital addiction REFSQ 14
 
The design of adaptive acquisition of users feedback an empirical study (rcis...
The design of adaptive acquisition of users feedback an empirical study (rcis...The design of adaptive acquisition of users feedback an empirical study (rcis...
The design of adaptive acquisition of users feedback an empirical study (rcis...
 

Recently uploaded

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Recently uploaded (20)

Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Socially augmented software empowering software operation through social contacts

  • 1. Socially-Augmented Software Empowering Software Operation Through Social Contacts Trans-Atlantic Research and Education Agenda in System of Systems Raian Ali, Nan Jiang & Huseyin Dogan
  • 2. www.bournemouth.ac.uk 2 Overview  About me  An example of a Socially-Augmented Operation  Rationale: Power of Contacts  Proposed Concept  Benefits and Examples  Application Illustration  Challenges for Social-Augmentation  Future Work
  • 3. www.bournemouth.ac.uk 3 Socially-Augmented Operation  Augmentation is the action or process of making or becoming greater in size or amount (Oxford Dictionaries, 2013)  An example: Relocating and relying on a friend to find an accommodation. Socially-Augmented Software is the integration of the power of contacts and machines to achieve a collective benefit, by ensuring contacts are connected by the most appropriate means, and that they have the right tools to make sense of the information and knowledge available to them.
  • 4. www.bournemouth.ac.uk 4 Rationale: Power of Contacts  Paradigm shift: the mind-set of managing network of contacts using a software is already there.  Some pros and cons of empowering software operations through contacts: + can be very practical when it is relatively difficult to fulfil the entire requirements of an individual through solely automated means. - allow a freestyle interaction that could lead to useless and even harmful solutions causing e.g. information overload.  Augmenting software with people is challenging and restrictions need to be carefully designed to avoid discouraging or confusing users when interacting and cooperating with software.
  • 6. www.bournemouth.ac.uk 6 Benefits and Examples  Enables achieving a range of requirements that would not be achievable through automated means e.g. smart-grip system.  Enables alternative approaches for solving problems more cost- effectively for certain domains, requirements and users e.g. relying on contacts than an e-guide to provide and consume desired services.  Avoids the deployment of expensive IT and business infrastructure e.g. wireless network coverage through contacts.  Enables the formulation of socially-customized solutions within a community to which a user belongs e.g. knowing the habits of a friend when booking a holiday.  Enables a richer accommodation of, and adaptation to, changes e.g. a fully automated tour guide may assume that the hotels in a certain geographic area are unlikely to provide internet.
  • 7. www.bournemouth.ac.uk 7 Application illustration  Consider a museum-guide mobile information system giving information about pieces of art, alerting of some events in the museum helping on registering for services, etc.  We divide the operation of socially-augmented software into three stages 1. Requirements Activation 2. Solutions Evaluation 3. Solution Execution Ref: Jim Wilson/The New York Times
  • 8. www.bournemouth.ac.uk 8 Requirements Activation 1. Requirements Activation: requirements can be activated by social requests through a users contacts on behalf of the user.
  • 9. www.bournemouth.ac.uk 9 Solutions Evaluation 2. Solutions Evaluation: software could follow different alternative solutions in order to fulfil users requirements.
  • 10. www.bournemouth.ac.uk 10 Solution Execution 3. Solution Execution: the software has to execute or facilitate execution of certain tasks which comprise information extraction and processing.
  • 11. www.bournemouth.ac.uk 11 Challenges for Social-Augmentation  The baseline criteria for user to request or provide services: Who – a set of contacts who can request and consume a service. When/Where – the environment that surrounds both the provider and the consumer on which they both have no control, i.e. their context. What – the specification of the services to be provided, i.e. the information to share and the tasks to execute. Why – the reason for which a consumer asks for a service, i.e. the goal which is intended to be achieved. How – the way by which a contact provides a service. Two main categories comprise (i) sharing with all and (ii) sharing under demand.
  • 12. www.bournemouth.ac.uk 12 Future Work  Revisit the access policies and roles privileges for organizational information systems and find out how these will be aligned with users social life and contacts.  Investigate the influencers on data quality to enable better design for quality e.g. reliability of user data and social penalties/sanctions.  Test our entire vision on real life case studies and validate the feasibility of socially-augmented software and consequently address the issue of people acceptance of this novel software style. Developers tend to solve socio-technical problems with techno-social approaches. Need to consider Human Factors related topics such as human centered design, human cognition, situational awareness, information overload, training, organizational and professional culture, and trust.
  • 13. www.bournemouth.ac.uk 13 Contact us Dr. Raian Ali Email: rali@bournemouth.ac.uk Dr. Nan Jiang njiang@bournemouth.ac.uk Dr. Huseyin Dogan hdogan@Bournemouth.ac.uk