Socially Adept Technologies. Steve Marsh National Research Council Canada firstname.lastname@example.org http://www.stephenmarsh.ca/ March 21st, 2002. Motivation. An introduction to the field Pointers to relevant work Questions about ‘suitability’ Suggestions for future projects A wake-up call
Socially Adept Technologies
National Research Council Canada
March 21st, 2002
When an individual enters the presence of others, they commonly seek to acquire information about him or bring into play information about him already possessed ... Information about the individual helps to define the situation, enabling others to know in advance what he will expect of them and what they may expect of him.
GOFFMAN, E., page 13, 1959; “The Presentation of Self in Everyday Life”, Penguin: Middlesex.
Tx(y,a) =Ux(a) * Ix(a)*Tx(y)
C_Tx(y,a) = (Rx(a) / Cx(y, a)) * Ix(a)
Marsh(1994) see: http:// www.iit.nrc.ca/~steve/pubs/Trust
Portions of this work were carried out in collaboration with researchers at University of New Brunswick’s Faculty of Computer Science…
Thanks to Profs Ali Ghorbani and Virendra Bhavsar in particular, who have taken ACORN from its humble beginnings to new heights…
Students and programmers that have worked on this project are: Youssef Masrour, Hui Yu, Leigh Wetmore, and Jonathan Carter.
Seals of Approval
Web Site Architecture
Without systems being able to sense that the user is there, who they are, what they’re doing or need, and lots of other physical and mental things, this stuff is doomed to ultimate failure
(consider the average traffic light)
The human in the loop is the key to Social Adeptness...