Human-to-Human Interaction: The Killer Application of Ubiquitous Computing?
Twenty-five years past the Weiser’s vision of Ubiquitous Computing, and there is not a clear understanding of what is or is not a pervasive system. Due to the loose boundaries of such paradigm, almost any kind of remotely accessible networked system is classified as a pervasive system. We think that is mainly due to the lack of killer applications that could make this vision clearer. Actually, we think that the most promising killer application is already here, but we are so used to it that we do not see it, as a perfect fitting of the Weiser’s vision: the Human-to-Human Interaction mediated by computers.
KeywordsUbiquitous computing Social factors Computer-Mediated communication
This paper is funded on a research grant by the Italian Ministry of University and Research, namely project NEPTIS (Grant no. PON03PE_00214_3).
- 3.Norman, D.A.: The Invisible Computer: Why Good Products Can Fail, the Personal Computer is So Complex, and Information Appliances are the Solutions. The MIT Press, Cambridge (1998)Google Scholar
- 4.Boca, S., Gentile, A., Ruggieri, S., Sorce, S.: An evaluation of HCI and CMC in information systems within highly crowded large events. In: Sixth International Workshop on Intelligent Interfaces for Human-Computer Interaction (IIHCI-2013), pp. 600–604, Asia University, Taichung, Taiwan, 3‒5 July 2013. doi: 10.1109/CISIS.2013.108
- 6.Brown, R.: Group Processes: Dynamics Within and Between Groups, 2nd edn. Blackwell, Oxford (2000)Google Scholar
- 10.Daft, R.L., Lengel, R.H.: Information richness: A new approach to managerial behavior and organization design. Res. Organ. Behav. 6, 191–233 (1984)Google Scholar
- 13.Clark, H.H., Brennan, S.E.: Grounding in communication. In: Resnick, L.B., Levine, J.M., Teasley, S.D. (eds.), Perspectives on Socially Shared Cognition, pp. 13–1991. American Psychological Association (1991)Google Scholar
- 14.Gentile, V., Sorce, S., Gentile, A.: Continuous hand openness detection using a Kinect-like device. In: Proceedings of the Eighth International Conference on Complex, Intelligent and Software Intensive Systems (CISIS), pp. 553–557. IEEE (2014). doi: 10.1109/CISIS.2014.80