Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-jbqgn Total loading time: 0 Render date: 2024-06-26T19:48:24.791Z Has data issue: false hasContentIssue false

8 - Contextualized attention metadata

Published online by Cambridge University Press:  04 February 2011

Claudia Roda
Affiliation:
The American University of Paris, France
Get access

Summary

We describe and justify the use of a schema for contextualized attention metadata (CAM) and a framework for capturing and exploiting such data. CAM are data about computer-related activities and the foci of attention for computer users. As such, they are a prerequisite for the personalization of both information and task environments. We outline the possibilities of utilizing CAM, with a focus on technology-enhanced learning (TEL) scenarios, presenting the MACE system for architecture education as a CAM test bed.

Introduction

Contextualized attention metadata

The contextualized attention metadata (CAM) format, defined by an XML schema, is a format for data about the foci of attention and activities of computer users. Contextualized attention metadata describe which data objects attract the users' attention, which actions users perform with these objects and what the use contexts are. As such, they are a prerequisite for generating context-specific user profiles that help to personalize and optimize task and information environments. They can be employed for annotating data objects with information about their users and usages, thereby rendering possible object classifications according to use frequency, use contexts and user groups. Moreover, they can be crucial for supporting cooperative work: they may be utilized for monitoring distributed task processing, for identifying and sharing knowledge of critical information, and for bringing together working groups (Schuff et al. 2007; Hauser et al. 2009; Adomavicius and Tuzhilin 2005, among others).

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Adomavicius, G., and Tuzhilin, A. 2005. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions, IEEE Transactions on Knowledge and Data Engineering 17(6): 734–49CrossRefGoogle Scholar
,Attention.XML. 2004. Attention.XML Draft Specification. Retrieved 3 February 2007 from: http://developers.technorati.com/wiki/attentionxml
Atterer, R. 2006. Logging usage of AJAX applications with the ‘UsaProxy’ HTTP Proxy, in Proceedings of the WWW 2006 Workshop on Logging Traces of Web Activity: The Mechanics of Data Collection, Edinburgh
Brin, S., and Page, L. 1998. The anatomy of a large-scale hypertextual Web search engine, Computer Networks and ISDN System 30(1–7): 107–17CrossRefGoogle Scholar
Çelik, T. 2005. Attention.xml technology overview. Retrieved 10 June 2008 from: http://tantek.com/presentations/2005/01/attentionxml.html
Chernov, S., Sergyukov, P., Chirita, P. A., Demartini, G., and Neijdl, W. 2007. Building a desktop search test-bed, in Proceedings of the 29th European Conference on Information Retrieval (ECIR), RomeGoogle Scholar
Dragunov, A. N., Dietterich, T. G., Johnsrude, K., McLaughlin, M., Li, L., and Herlocker, J. L. 2005. TaskTracer: A desktop environment to support multi-tasking knowledge workers, in Proceedings of the International Conference on Intelligent User Interfaces, San Diego, 9–12 January 2005Google Scholar
Fiedler, K. 2008. The implicit meta-theory that has inspired and restricted LCM research, Journal of Language and Social Psychology 27(2): 182–96CrossRefGoogle Scholar
Hauser, J. R., Urban, G. L., Liberali, G., and Braun, M. 2009. Website morphing, Marketing Science 28(2): 202–23
Hölscher, C., and Strube, G. 2000. Web search behavior of internet experts and newbies, Computer Networks 33(1–6): 337–46CrossRefGoogle Scholar
Koper, R., and Tattersall, C. 2005. Learning Design: A Handbook on Modeling and Delivering Networked Education and Training. Heidelberg: SpringerCrossRefGoogle Scholar
Memmel, M., and Kockler, M., and Schirru, R. 2008. Providing multi-source tag recommendations in a social resource sharing platform, in Proceedings of I-MEDIA '08, Graz, Austria: 226–33Google Scholar
Mole, C. 2009. Attention, in Symons, J. and Calvo, P. (eds.), The Routledge Companion to the Philosophy of Psychology. Abingdon, Oxfordshire: Routledge: 499–508Google Scholar
Pentland, A. 2005. Socially aware computation and communication, IEEE Computer, 38(3): 33–40CrossRefGoogle Scholar
Ram, A. 1991. Theory of questions and question asking, Journal of the Learning Sciences 1(3–4): 273–318CrossRefGoogle Scholar
Rapp, D. N. 2006. The value of attention aware systems in educational settings, Computers in Human Behavior 22(4): 603–14CrossRefGoogle Scholar
Schuff, D., Turetken, O., D'Arcy, J., and Croson, D. 2007. Managing e-mail overload: Solutions and future challenges, Computer 40(2): 31–6CrossRefGoogle Scholar
Semin, G. R. 2008. Language puzzles. A prospective retrospective on the linguistic category model, Journal of Language and Social Psychology 27(2): 197–209CrossRefGoogle Scholar
Shaw, E. D. 2008. System and method for computerized psychological content analysis for computer and media generated communications to produce communications management support, indications and warnings of dangerous behavior, assessment of media images, and personnel selection support, United States Patent Application Publication: Pub. No. US 2008/0109214 A1
Simon, B., Massart, D., Assche, F., Ternier, S., Duval, E., Brantner, S., Olmedilla, D., and Miklos, Z. 2005. A Simple Query Interface for interoperable learning repositories, in Proceedings of the 1st Workshop on Interoperability of Web-based Educational Systems, Chiba, Japan: 11–18Google Scholar
Stefaner, M., Vecchia, E., Condotta, M., Wolpers, M., Sprecht, M., Apelt, S., and Ducal, E. 2007. MACE – Enriching architectural learning objects for experience multiplication, in Ducal, E., Klamma, R. and Wolpers, M. (eds.), Creating New Learning Experiences on a Global Scale. Heidelberg: Springer: 322–36CrossRefGoogle Scholar
Sweeney, L. 2002. k-anonymity: A model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5): 557–70CrossRefGoogle Scholar
Ternier, S., Massart, D., Assche, F., Smith, N., Simon, B., and Duval, E. 2008. A simple publishing interface for learning object repositories, in Proceedings of the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2008, Chesapeake, VA: 1840–5Google Scholar
Verbert, K., Jovanovic, J., Gasevic, D., and Duval, E. 2005. Repurposing learning object components, in Proceedings of the OTM 2005 Workshop on Ontologies, Semantics and E-Learning, Agia Napa, Cyprus: 1169–78Google Scholar
Weintraub, W. 1964. The application of verbal behavior analysis to the study of psychological defense mechanisms. II. Speech pattern associated with impulsive behavior, Journal of Nervous and Mental Disease 139: 75–82CrossRefGoogle Scholar
Wolpers, M., Najjar, J., Verbert, K., and Duval, E. 2007. Tracking actual usage: The attention metadata approach, Educational Technology and Society 10(3): 106–21Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×