Abstract
This paper suggests a method to provide the users with better experiences in designing the products with integration of multiple functions and multitasks in aspects of modality. The studies on modality and interruption were carried out from the perspective of cognitive burden on the users when the modality before and after tasks are the same in continuous tasks based on multiple resource theory. Based on this, this study attempted to examine the multitasking support and types of modalities of tasks as well as the interruption orders and frequency when an interruption occurs during a task and how they affect the task performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lee, K.H., Jung, S.K., Kim, H.J., Lee, I., Kim, J.: Interruption in Digital Convergence: Focused on Multi-Modality and Multi-Tasking. Journal of the Ergonomics Society of Korea 26(3), 67–80 (2007)
Fensham, P.J.: Knowledge to Deal with Challenges to Science Education from Without and Within. In: The Professional Knowledge Base of Science Teaching, pp. 295–317 (2011)
Haigney, D.E.: Mobile phones and driving: A literature review. RoSPA, Birmingham (1997)
Neerincx, M.A., Van Doorne, H., Ruijsendaal, M.: Attuning computer-supported work to human knowledge and processing capacies in ship conter centers. In: Cognitive Task Analysis, pp. 341–361. Erlbaum, Mahwah (2000)
Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741–748. Springer, Heidelberg (2006)
Park, N.: Security Scheme for Managing a Large Quantity of Individual Information in RFID Environment. In: Zhu, R., Zhang, Y., Liu, B., Liu, C. (eds.) ICICA 2010. CCIS, vol. 106, pp. 72–79. Springer, Heidelberg (2010)
Park, N.: Secure UHF/HF Dual-Band RFID: Strategic Framework Approaches and Application Solutions. In: Jędrzejowicz, P., Nguyen, N.T., Hoang, K. (eds.) ICCCI 2011, Part I. LNCS, vol. 6922, pp. 488–496. Springer, Heidelberg (2011)
Park, N.: Implementation of Terminal Middleware Platform for Mobile RFID computing. International Journal of Ad Hoc and Ubiquitous Computing 8(4), 205–219 (2011)
Park, N., Kim, Y.: Harmful Adult Multimedia Contents Filtering Method in Mobile RFID Service Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 193–202. Springer, Heidelberg (2010)
Park, N., Song, Y.: AONT Encryption Based Application Data Management in Mobile RFID Environment. In: Pan, J.-S., Chen, S.-M., Nguyen, N.T. (eds.) ICCCI 2010, Part II. LNCS (LNAI), vol. 6422, pp. 142–152. Springer, Heidelberg (2010)
Park, N.: Customized Healthcare Infrastructure Using Privacy Weight Level Based on Smart Device. In: Lee, G., Howard, D., Ślęzak, D. (eds.) ICHIT 2011. CCIS, vol. 206, pp. 467–474. Springer, Heidelberg (2011)
Park, N.: Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment. In: Katarzyniak, R., Chiu, T.-F., Hong, C.-F., Nguyen, N.T. (eds.) Semantic Methods. SCI, vol. 381, pp. 319–327. Springer, Heidelberg (2011)
Park, N., Song, Y.: Secure RFID Application Data Management Using All-Or-Nothing Transform Encryption. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds.) WASA 2010. LNCS, vol. 6221, pp. 245–252. Springer, Heidelberg (2010)
Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)
Park, N., Song, Y., Won, D., Kim, H.: Multilateral Approaches to the Mobile RFID Security Problem Using Web Service. In: Zhang, Y., Yu, G., Bertino, E., Xu, G. (eds.) APWeb 2008. LNCS, vol. 4976, pp. 331–341. Springer, Heidelberg (2008)
Park, N., Kim, H., Kim, S., Won, D.: Open Location-based Service using Secure Middleware Infrastructure in Web Services. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3481, pp. 1146–1155. Springer, Heidelberg (2005)
Park, N., Kim, S., Won, D.: Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. In: Wegrzyn-Wolska, K.M., Szczepaniak, P.S. (eds.) Advances in Intelligent Web Mastering. ASC, vol. 43, pp. 278–283. Springer, Heidelberg (2007)
Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation Leveraging Globally Networked RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494–505. Springer, Heidelberg (2006)
Kim, Y.: Harmful-word Dictionary DB based Text Classification for Improving Performances of Precesion and Recall. Sungkyunkwan University, Ph.D. Thesis (2009)
Kim, Y., Park, N., Hong, D.: Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits. In: Lee, R. (ed.) Computers, Networks, Systems, and Industrial Engineering 2011. SCI, vol. 365, pp. 201–208. Springer, Heidelberg (2011)
Kim, Y., Park, N., Hong, D., Won, D.: Adult Certification System on Mobile RFID Service Environments. Journal of Korea Contents Association 9(1), 131–138 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, J.W., Kim, G., Park, N. (2012). A Study on the Learner Participation Interaction for Multi-modality Integration for Smart Devices. In: Kim, Th., et al. Computer Applications for Security, Control and System Engineering. Communications in Computer and Information Science, vol 339. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35264-5_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-35264-5_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35263-8
Online ISBN: 978-3-642-35264-5
eBook Packages: Computer ScienceComputer Science (R0)