A Comparison of Two Navigational Aids for Hypertext Mark Alan Satterfield Iowa State University

Total Page:16

File Type:pdf, Size:1020Kb

A Comparison of Two Navigational Aids for Hypertext Mark Alan Satterfield Iowa State University Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1992 A comparison of two navigational aids for hypertext Mark Alan Satterfield Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Business and Corporate Communications Commons, and the English Language and Literature Commons Recommended Citation Satterfield, Mark Alan, "A comparison of two navigational aids for hypertext" (1992). Retrospective Theses and Dissertations. 14376. https://lib.dr.iastate.edu/rtd/14376 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. A Comparison of two navigational aids for h3q5ertext by Mark Alan Satterfield A Thesis Submitted to the Gradxiate Facultyin Partial Fulfillment ofthe Requirements for the Degree of MASTER OF ARTS Department: English Major; English (Business and Technical Communication) Signatureshave been redactedforprivacy Iowa State University Ames, Iowa 1992 Copyright © Mark Alan Satterfield, 1992. All rights reserved. u TABLE OF CONTENTS Page ACKNOWLEDGEMENTS AN INTRODUCTION TO USER DISORIENTATION AND NAVIGATION IN HYPERTEXT 1 Navigation Aids 3 Backtrack 3 History 4 Bookmarks 4 Guided tours 5 Indexes 6 Browsers 6 Graphic browsers 7 Table-of-contents browsers 8 Theory of Navigation 8 Schemas ^ 9 Cognitive maps 9 Schemas and maps in text navigation 10 Context 11 Schemas, cognitive maps, and context 12 Metaphors for navigation ' 13 Studies of Navigation Effectiveness 15 Paper vs. hypertext 15 Comparisons between different kinds of aids 17 Implementations of the same aid 18 Comparisons of structure. 19 lU Comparisons of browsers 22 Questions Raised by Previous Work 22 Purpose of the Current Study 23 Variables used in the study 24 . Expected results 26 II. METHOD 28 Subjects 29 Materials 30 The pretest 30 The hypertext documents 31 The task questions 33 The procedural instructions 33 The exit letter 34 Procedure 34 Threats to Internal Validity 36 Data Analysis 37 III. RESULTS 38 Profile Data 38 Directed Task Data 42 IV. DISCUSSION AND CONCLUSIONS 47 Predicted vs. Actual Results 47 Some Factors Affecting the Study 49 Low browser utilization 49 Hypertext size 50 Further study 51 IV Validation studies 51 Presentation strategies 52 Browser tasks 52 V. BIBLIOGRAPHY 54 VI. APPENDIX A: EXAMPLE GRAPHIC BROWSER SCREENS 57 VII. APPENDIX B: EXAMPLE TABLE OF CONTENTS (TOC) BROWSER SCREENS 61 VIII. APPENDIX C: THE PRETEST 65 IX. APPENDIX D: EXAMPLE DATA SCREENS 70 X. APPENDIX E; THE DIRECTED TASK QUESTIONS 73 XI. APPENDIX F: THE PROCEDURAL INSTRUCTIONS 76 XII. APPENDIX G: THE EXIT LETTER 82 V ACKNOWLEDGEMENTS I would like to thank Dr. Patricia Goubil-Gambrell ofIowa State University for allowing me to use her technical writing classes as subjects in this study. I would also like to thank those members ofDr. Goubil-Gambrell's English 314 classes for volunteering to take part in this study. Finally, I would like to thank Anita McVey of Statistical Consulting Services at Iowa State University for her aid in performing the statistical analysis of the data after it was collected. 1 I, AN INTRODUCTION TO USER DISORIENTATION AND NAVIGATION IN HYPERTEXT Hjrpertext is a new form ofcommimication that has been vmder development since the early 1960s (Nielsen, H3rpertext 41). It is commonly defined as a group ofindependent text segments called nodes that are connected ' by links. A link is an associative connection that is maintained by the computer. These links allow the reader to access a node from any other node, which eliminates the single sequential order that is commonly fotmd in most printed texts. Because the reader is given a choice ofpaths through the text, h3rpertext documents are non-sequential in nature (Nielsen, H3TDertext 1). This non sequential reading order is probably one of the most important characteristics of h5rpertext and is simultaneously both an advantage and a disadvantage. A non-sequential reading order is an advantage because it allows technical information to be accessed in a way that meets the needs ofthe audience (Yoimggren 78). Thus, the same document can provide background information to novices in the form of"pop up windows" while giving more advanced users the ability skip the information entirelyifthey so desire (Brown and Russell 163). On the other hand, a non-sequential reading order is a disadvantage because people often become disoriented when they try to find information within the document. This disorientation occurs when they cannot answer three questions: 1. Where should I go next? 2. How can I get back to....? 3. Where am I now? (Wright and Lickorish 97) 2 This problem with user disorientation was noticed early in hypertext research by Van Dam when he was working on the H3^ertext Editing System (889), and he still considered it a serious problem in 1987. His concern about user disorientation was expressed in his ke5mote address at the Association for Computing Machinery's Hypertext '87 conference where he mentioned itas an area that needed further research (894). At the same time in the journal IEEE Computer. Conklin pointed out the "disorientation problem" as one of the two major issues that threaten to limit hypertext's usefulness (38). While the emphasis on the importance of the disorientation problem has not changed much since 1987, some people have not completely supported this view. In 1988, Mark Bernstein asserted that in some situations, such as school assignments, disorientation is not an issue. This assertion was based on his assumption that school assignments are read by instructors who are so familiar with the material that they could not get lost. But Bernstein did acknowledge that user disorientation should be minimized in other situations, such as using technical manuals or other kinds ofscientific or engineering applications of h5^ertext (Bernstein, Compass 35-6). In 1991, he went beyond this stance to call the concern about disorientation "misplaced," and he asserted that user disorientation "is indistinguishable from bad writing" (Bernstein, Deeply 42). While Bernstein made this point in reference to hypertext in general, his argument doesn't completely take into consideration the stringent goals of technical docimientation. These goals include helping the user to find information quickly and with a minimum of effort (Simpson arid Casey 39). Because the purpose of these goals is to help people get their own work done by providing needed information, any problem that disturbs the transfer of knowledge to the 3 reader should not be taken lightly. Therefore, research into the creation ofaids to user navigation and the application of these aids is an important part ofhypertext documentation research. Navigation Aids In the course of conducting research into user disorientation, many different types ofnavigation aids have been invented. The complexity ofthese aids range from a simple backtrack mechanism to a complex integration of artificial intelligence with h3^ertext documents (Carlson 60). The following aids are the ones that are identified most frequently in the literature on hypertext. They are (1) backtrack, (2) history, (3) bookmark, (4) guided tour, (5) indexes, and (6) browsers. The backtrack, history, and bookmark aids are presented first because they are djmaniie. The actual screens that these aids access can change each time the hypertextis used. The last three, on the other hand, are static. They are set up by the author ofthe h5rpertext and they will always provide access to the same screens every time the hypertext is used. Because this study examines browsers, they will be described more completely than the other types of navigational aids. Backtrack The backtrack facility allows the user to jump back to screens that have been previously visited. It greatly reduces any mental stress caused by navigation because users know that they can always invoke the backtrack command to return to an earlier screen. Nielsen considers this to be one ofthe most important of the navigation aids. In order to guarantee its usefiilness, he 4 recommends that the backtrack should be consistently implemented so that it is always invoked in the same manner (Nielsen, Hj^ertext 129), Also, there should not be a limit on the niimber oftimes that a user can backtrack to the next earlier screen from the current screen. The optimimi backtrack implementation would allow the user to retrace his or her path to the starting screen ofthe document. The final point about the backtrack facility is that it should always be available to the user ( Nielsen, Hypertext 129). There should not be any part of the hypertext from which this aid is inaccessible. History A second" way to help the user navigate is the history facility. Like the backtrack facility, it allows the user to return to nodes that have already been visited. But unlike the backtrack facility, which forces the user to retrace his or her path sequentiallyin the data, the history facility allows the user to pick which screen he or she wants to see again. There is no need to travel through other nodes to get to the desired node (Nielsen, Hypertext 129). Bookmarks Because hypertext users may become apprehensive about losing themselves in the doctmient, Mark Bernstein has suggested that a bookmark might help alleviate that fear (Bookmark, 39). The bookmark facility allows the hypertext's readers to save a node to a listifthey think that they will need to return to that node later (Nielsen, Hypertext 130). The resulting list would look much like a history list. The difference is that the contents ofthe bookmark list are totally under the control of the hj^ertext user. This control can be a problem 5 because users may not always immediately realize that the contents ofa node is relevant and therefore fail to put it on the bookmark list.
Recommended publications
  • Rdfa in XHTML: Syntax and Processing Rdfa in XHTML: Syntax and Processing
    RDFa in XHTML: Syntax and Processing RDFa in XHTML: Syntax and Processing RDFa in XHTML: Syntax and Processing A collection of attributes and processing rules for extending XHTML to support RDF W3C Recommendation 14 October 2008 This version: http://www.w3.org/TR/2008/REC-rdfa-syntax-20081014 Latest version: http://www.w3.org/TR/rdfa-syntax Previous version: http://www.w3.org/TR/2008/PR-rdfa-syntax-20080904 Diff from previous version: rdfa-syntax-diff.html Editors: Ben Adida, Creative Commons [email protected] Mark Birbeck, webBackplane [email protected] Shane McCarron, Applied Testing and Technology, Inc. [email protected] Steven Pemberton, CWI Please refer to the errata for this document, which may include some normative corrections. This document is also available in these non-normative formats: PostScript version, PDF version, ZIP archive, and Gzip’d TAR archive. The English version of this specification is the only normative version. Non-normative translations may also be available. Copyright © 2007-2008 W3C® (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark and document use rules apply. Abstract The current Web is primarily made up of an enormous number of documents that have been created using HTML. These documents contain significant amounts of structured data, which is largely unavailable to tools and applications. When publishers can express this data more completely, and when tools can read it, a new world of user functionality becomes available, letting users transfer structured data between applications and web sites, and allowing browsing applications to improve the user experience: an event on a web page can be directly imported - 1 - How to Read this Document RDFa in XHTML: Syntax and Processing into a user’s desktop calendar; a license on a document can be detected so that users can be informed of their rights automatically; a photo’s creator, camera setting information, resolution, location and topic can be published as easily as the original photo itself, enabling structured search and sharing.
    [Show full text]
  • The Web 2.0 Way of Learning with Technologies Herwig Rollett
    Int. J. Learning Technology, Vol. X, No. Y, xxxx 1 The Web 2.0 way of learning with technologies Herwig Rollett* Know-Center, Inffeldgasse 21a A-8010 Graz, Austria E-mail: [email protected] *Corresponding author Mathias Lux Department for Information Technology University of Klagenfurt Universitätsstraße 65–67 A-9020 Klagenfurt, Austria E-mail: [email protected] Markus Strohmaier Department of Computer Science University of Toronto 40 St. George Street Toronto, Ontario M5S 2E4, Canada Know-Center, Inffeldgasse 21a A-8010 Graz, Austria E-mail: [email protected] Gisela Dösinger Know-Center, Inffeldgasse 21a A-8010 Graz, Austria E-mail: [email protected] Klaus Tochtermann Know-Center Institute of Knowledge Management Graz University of Technology Inffeldgasse 21a, A-8010 Graz, Austria E-mail: [email protected] Copyright © 200x Inderscience Enterprises Ltd. 2 H. Rollett et al. Abstract: While there is a lot of hype around various concepts associated with the term Web 2.0 in industry, little academic research has so far been conducted on the implications of this new approach for the domain of education. Much of what goes by the name of Web 2.0 can, in fact, be regarded as a new kind of learning technologies, and can be utilised as such. This paper explains the background of Web 2.0, investigates the implications for knowledge transfer in general, and then discusses its particular use in eLearning contexts with the help of short scenarios. The main challenge in the future will be to maintain essential Web 2.0 attributes, such as trust, openness, voluntariness and self-organisation, when applying Web 2.0 tools in institutional contexts.
    [Show full text]
  • Hypertext Newswriting Effects on Satisfaction, Comprehension and Attitudes João Canavilhas Universidade Da Beira Interior Key-W
    Hypertext newswriting effects on satisfaction, comprehension and attitudes João Canavilhas Universidade da Beira Interior Key-words: hypertext; web journalism; online jornalism Abstract More than a decade after the beginning of online journalism, the great expectations of this field of expertise remain unfulfilled. Hypertextuality, multimediality, and interactivity remain original marks as yet unexplored by journalism made on the web (though not for the web). In the specific case of hypertextuality, the subject of this study, its little use is linked with journalists’ time constraints, the absence of an organizational model not limited to copying printed papers, and the fear that readers may reject non-linear reading (Paul, 2005). The latter reason is likely what is most hindering the evolution of web journalism, despite the great potential of online news formed by networks of linked texts. To begin with, it frees the reader, giving them the option to create their own path of reading. Additionally, it offers extra contextual information about the subject, allowing readers to increase their knowledge on the subject according to their own interests. Despite the apparent advantages, such textual networks demand an additional effort of readers to interact with the theme. They must follow links, and skip from text to text, which may be perceived as obstructive to their reading. The passivity imposed by the most powerful medium, television, and the recipients’ deeply-rooted habit of linear readings raise an important question: Will readers value the hypertext contexts to such an extent that they will make that additional effort, or are the newspapers right in their fears of the readers’s reaction? In an attempt to answer this question, an experimental study was carried out assessing the effects of hypertext on levels satisfaction, perception, comprehension, and attitudes 1 of online news readers.
    [Show full text]
  • An Analysis of Dewey Linked Data
    Palabra Clave (La Plata) ISSN: 1853-9912 [email protected] Universidad Nacional de La Plata Argentina Classification on the Web: an analysis of Dewey Linked Data Tomoyose, Kazumi; Simionato Arakaki, Ana Carolina Classification on the Web: an analysis of Dewey Linked Data Palabra Clave (La Plata), vol. 9, núm. 2, 2020 Universidad Nacional de La Plata, Argentina Disponible en: http://www.redalyc.org/articulo.oa?id=350562513005 DOI: https://doi.org/10.24215/18539912e092 PDF generado a partir de XML-JATS4R por Redalyc Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Palabra Clave (La Plata), 2020, 9(2), Abril-Septiembre, ISSN: 1853-9912 Avances de investigación Classification on the Web: an analysis of Dewey Linked Data La Clasificación en la web: un análisis de Dewey Linked Data Kazumi Tomoyose DOI: https://doi.org/10.24215/18539912e092 Universidade Federal de São Carlos, Brasil Redalyc: http://www.redalyc.org/articulo.oa? [email protected] id=350562513005 Ana Carolina Simionato Arakaki Universidade Federal de São Carlos, Brasil [email protected] Recepción: 23 Agosto 2019 Aprobación: 12 Noviembre 2019 Abstract: With the availability of information in the World Wide Web its access and retrieval by the users is facilitated, and the Library and Information Science (LIS) field’s knowledge and techniques can be applied to this environment in order to help with the process. e present study is descriptive, qualitative and exploratory, based on bibliographical sources, in which it was explored how the Classification discipline interacts with Linked Data, focusing on the analysis of Dewey Linked Data.
    [Show full text]
  • XHTML Rdfa Modules XHTML Rdfa Modules
    XHTML RDFa Modules XHTML RDFa Modules XHTML RDFa Modules Modules to support RDF annotation of elements W3C Editor’s Draft 11 August 2007 This version: http://www.w3.org/MarkUp/2007/ED-xhtml-rdfa-20070811 Latest version: http://www.w3.org/TR/xhtml-rdfa Previous Editor’s Draft: http://www.w3.org/MarkUp/2007/ED-xhtml-rdfa-20070705 Diff from previous Editor’s Draft: xhtml-rdfa-diff.html Editors: Mark Birbeck, x-port.net Ltd. Shane McCarron, Applied Testing and Technology, Inc. This document is also available in these non-normative formats: PostScript version, PDF version, ZIP archive, and Gzip’d TAR archive. The English version of this specification is the only normative version. Non-normative translations may also be available. Copyright © 2007 W3C® (MIT, ERCIM, Keio), All Rights Reserved. W3C liability, trademark and document use rules apply. Abstract The XHTML RDFa (RDF using attributes) modules define a collection of elements and attributes that enhance a document authors ability to annotate the relationships of content within and among documents. These modules can be integrated into any markup language based upon XHTML Modularization [XHTMLMOD [p.45] ]. Status of This Document This section describes the status of this document at the time of its publication. Other documents may supersede this document. A list of current W3C publications and the latest revision of this technical report can be found in the W3C technical reports index at http://www.w3.org/TR/. - 1 - Table of Contents XHTML RDFa Modules This document is an internal editors draft for development purposes. However, its content is based upon mature materials from [XHTML2 [p.45] ] and is therefore considered nearly complete.
    [Show full text]
  • An Overview of Hypertext Transfer Protocol Service Security on Business Domain
    2012 International Conference on Management and Education Innovation IPEDR vol.37 (2012) © (2012) IACSIT Press, Singapore An Overview of Hypertext Transfer Protocol service Security on Business Domain + Burra Venkata Durga Kumar Taylor’s Business School, Taylor’s University-Malaysia Abstract. Network protocols define the way data is transported between computers in a networked environment. Network protocols completely hide business functionality from higher level services and protocols, which can simply assume that, by providing the assigned name of another computer and company can transit a message or open a continuous communication stream without dealing with the intricacies of data transport. Populates Internet began to grow rapidly like expands with new tools, that is the new standard Hypertext Transfer Protocol and Hypertext Markup Language were introduced to the public. Hypertext Transfer Protocol to make accessing information through the Transfer Control Protocol or Internet Protocol is easier than ever. Hypertext Markup Language allows people to present information that is visually more interesting. Appearance of Hypertext Transfer Protocol and Hypertext Markup Language made people knows so popular, that is often considered synonymous with the Internet itself to the World Wide Web. The purpose of this paper is that knowing what kinds of security methods are appropriate for this Hypertext Transfer Protocol service and then explanations on World Wide Web and Hypertext Transfer Protocol works mechanisms. Proving the security methods of the answers obtained from what are assumed from the issues and included all models. Keywords: Network Protocols, Hypertext Transfer Protocol, Hypertext Markup Language, Transfer Control Protocol, Security, Business. 1. Introduction Nowadays, Internet service become very widely in business purpose and functionality, and for two popular internet services that common used by people, such as FTP (File Transfer Protocol) and HTTP (Hypertext Transfer Protocol).
    [Show full text]
  • Web 2.0: Hypertext by Any Other Name?
    Web 2.0: Hypertext by Any Other Name? David E. Millard and Martin Ross Electronics and Computer Science University of Southampton Southampton, UK +44 (0) 23 8059 3255 {dem, mar302}@ecs.soton.ac.uk ABSTRACT be the inventor of hypertext, and ever since his original work Web 2.0 is the popular name of a new generation of Web others have been refining his approach, both in terms of what applications, sites and companies that emphasis openness, hypertext should offer, how it is interpreted by readers, and also community and interaction. Examples include technologies such in concrete systems and studies. as Blogs and Wikis, and sites such as Flickr. In this paper we Walker has noted that the new generation of Web applications compare these next generation tools to the aspirations of the has created a new form of feral hypertext, unrestrained by early Hypertext pioneers to see if their aims have finally been systems or ownership [22]. In this paper we analyse the field of realized. hypertext research in order to draw out the aspirations of its pioneers and their subsequent refinements by the community, we Categories and Subject Descriptors then compare these aspirations with a number of Web 2.0 H.5.4 [ Hypertext/Hypermedia ]: Theory systems in order to draw conclusions about how well those earlier ideas have been realised in the modern Web. General Terms Design, Theory 2. ASPIRATIONS In 1987, Halasz took the aspirations of the earlier pioneers and, based on the systems around at the time, described seven issues Keywords that had to be considered and resolved in order to progress Web 2.0, Hypertext Pioneers, Hypertext Functionality towards the systems envisioned; these included composite structures, versioning, collaboration and search [12].
    [Show full text]
  • Maps and Their Place in Mesopotamia, Egypt, Greece, and Rome
    bibliography Adam, J.-P. 1994. Roman Building: Materials ———. 2005. Les routes de la navigation antique: and Techniques. Translated by A. Mathews. Itinéraires en Méditerranée. Paris: Errance. London: Batsford. ———. 2007. “Diocletian’s Prices Edict: The Aillagon, J.-J., ed. 2008. Rome and the Barbar- Prices of Seaborne Transport and the Average ians: The Birth of a New World. Milan: Skira. Duration of Maritime Travel.” Journal of Ro- Alföldy, G. 2000. Provincia Hispania Superior. man Archaeology 20:321– 36. Schriften der Philosophisch- historischen ———. 2007– 8. “Texte et carte de Marcus Klasse der Heidelberger Akademie der Agrippa: Historiographie et données tex- Wissenschaften 19. Heidelberg: Winter. tuelles.” Geographia Antiqua 16– 17:73– 126. al- Jadir, W. 1987. “Une bibliothèque et ses Arnaud- Lindet, M.-P., ed. and trans. 1993. Aide- tablettes.” Archèologia (Dijon) 224:18– 27. mémoire (Liber memorialis). By L. Ampelius. al- Karaji. 1940. Inbat al- miyah al- khafi yya. Paris: Les Belles Lettres. Hyderabad: Da’irat al- ma’arif al- ’uthmaniya. ———, ed. and trans. 1994. Abrégé des hauts faits Reprinted in F. Sezgin et al., eds., Water- du peuple romain. By Festus. Paris: Les Belles Lifting Devices in the Islamic World: Texts Lettres. and Studies, 302– 98 (Frankfurt: Institute Ashby, T. 1935. The Aqueducts of Ancient Rome. for the History of Arabic- Islamic Science, Oxford: Oxford University Press. 2001). Ashmore, W., and A. B. Knapp, eds. 1999. Andreu, G., and C. Barbotin, eds. 2002. Les Archaeologies of Landscape: Contemporary Per- artistes de Pharaon: Deir el- Médineh et la spectives. Malden, MA: Blackwell Publishers. Vallée des Rois. Turnhout: Brepols. Baines, J. 1987. Fecundity Figures.
    [Show full text]
  • Urls Hypertext
    Universal Resource Locator (URL) Mendel Rosenblum CS142 Lecture Notes - URLs Hypertext ● Text with links to other text ○ Click on links takes you somewhere else ○ Old idea: ■ Ted Nelson coined the term (early '60s), built Xanadu system ■ Doug Englebart: "Mother of all demos" in 1968 ■ HyperCard for the Macintosh: 1987 ● Web adapted the idea, link specification: ○ Uniform Resource Locators (URL) - Provided names for web content <a href="https://en.wikipedia.org/wiki/URL">URL</a> CS142 Lecture Notes - URLs Parts of an URL http://host.company.com:80/a/b/c.html?user=Alice&year=2008#p2 Scheme (http:): identifies protocol used to fetch the content. Host name (//host.company.com): name of a machine to connect to. Server's port number (80): allows multiple servers to run on the same machine. Hierarchical portion (/a/b/c.html): used by server to find content. Query parameters (?user=Alice&year=2008): provides additional parameters Fragment (#p2): Have browser scroll page to fragment (html: p2 is anchor tag) Used on the browser only; not sent to the server. CS142 Lecture Notes - URLs URL: schemes (e.g. http) http: is the most common scheme; it means use the HTTP protocol https: is similar to http: except that it uses SSL encryption file: means read a file from the local disk mailto: means open an email program composing a message There are several other schemes, such as ftp:, but they aren't used much anymore. CS142 Lecture Notes - URLs URL: Hierarchical portion (/a/b/c.html) ● Passed to the web server for interpretation. Early web servers: ○ Path name for a static HTML file.
    [Show full text]
  • How Spatial Is Hyperspace? Interacting with Hypertext Documents: Cognitive Processes and Concepts
    CYBERPSYCHOLOGY & BEHAVIOR Volume 4, Number 1, 2001 Mary Ann Liebert, Inc. How Spatial Is Hyperspace? Interacting with Hypertext Documents: Cognitive Processes and Concepts PATRICIA M. BOECHLER ABSTRACT The World Wide Web provides us with a widely accessible technology, fast access to massive amounts of information and services, and the opportunity for personal interaction with nu- merous individuals simultaneously. Underlying and influencing all of these activities is our basic conceptualization of this new environment; an environment we can view as having a cognitive component (hyperspace) and a social component (cyberspace). This review argues that cognitive psychologists have a key role to play in the identification and analysis of how the processes of the mind interact with the Web. The body of literature on cognitive processes provides us with knowledge about spatial perceptions, strategies for navigation in space, memory functions and limitations, and the formation of mental representations of environ- ments. Researchers of human cognition can offer established methodologies and conceptual frameworks toward investigation of the cognitions involved in the use of electronic envi- ronments like the Web. INTRODUCTION only a new cognitive environment (“hyper- space”) where information is perceived, stored, OR CENTURIES, TEXT-BASED LITERATURE has manipulated, and retrieved in new ways, but Fbeen the primary mode for disseminating also a new social environment (“cyberspace”), and receiving information. The cognitive where one individual’s cognitions about this processes involved in reading and writing new environment interact with those of other books have been studied extensively for people who share it. Unlike physical space, the decades as they have played a crucial role in World Wide Web is not constrained by dis- the development of humankind.
    [Show full text]
  • Visualization Complex Cognitive Networks
    2012 3rd International Conference on e-Education, e-Business, e-Management and e-Learning IPEDR vol.27 (2012) © (2012) IACSIT Press, Singapore Visualization Complex Cognitive Networks + MENG Shimin 1 1 DNAgent Lab @Youlinkme.net Co., Ltd. Wuyishan, Fujian China Abstract. Cognitive flow is the important applications of information flow, workflow, social flow after, but need to break through the difficulties in cognitive mapping and materialized. Use visualization techniques to build a simulation platform to realize cognitive schema, cognitive map, flow and other visual cognitive projection, make the invisible visible understanding, building cognitive materialized, visualization mode. Base visualize digital network technology innovation Visualization Complex Cognitive Networks (VCCN) platform, achieve "symbol, mathematical, process" visual computing architecture, and the formation of cognitive visual paradigm. Base VCCN research in human-computer system needs to establish the cognitive interface to build field of cognitive, modulation of cognitive coupled states, through the acquisition of Cognitive Symbol Sequence(CSS), and cognitive activity is mapped to VCCN. It is framed for cognitive nodes, relation, chain, flow, maps, schema, and achieved cognitive object editing, storage, switching, routing, navigation, evaluation, and cognitive flow coupling, excitation, propagation, and be the cognitive visual, functional simulation, power system studies provide new ideas, new paradigm of brain information. VCCN similar negatives shot to the brain cognitive activity with CSS, for the reconstruction of cognitive activity to provide a method. Keywords: complex networks, cognitive visualization, cognitive schema, cognitive map, cognitive symbol sequence, cognitive coupling. 1. Cognitive Flow The brain is a material, energy and information dissipation structure, brain research is to use instruments to stimulation, probe, scan of the brain material, energy, information process, and shooting, collecting data, use the data to understand brain.
    [Show full text]
  • On Using JSON-LD to Create Evolvable Restful Services
    On Using JSON-LD to Create Evolvable RESTful Services Markus Lanthaler 1, 2 Christian Gütl 1, 2 1 Institute for Information Systems and Computer Media 2 School of Information Systems Graz University of Technology Curtin University of Technology Graz, Austria Perth, Australia [email protected] [email protected] ABSTRACT being solved, issues on how to integrate these hugely hetero- As the amount of data and devices on the Web experiences geneous datasets into a scalable system become increasingly exponential growth issues on how to integrate such hugely important. Reusing the Web’s underlying architectural style, i.e., heterogeneous components into a scalable system become increa- REST [1], has proven to be a viable solution to transform islands singly important. REST has proven to be a viable solution for of data into an integrated Web of Data. It provides a set of archi- such large-scale information systems. It provides a set of archi- tectural constraints that, when applied as a whole, result in a tectural constraints that, when applied as a whole, result in bene- concrete system architecture that “emphasizes scalability of com- fits in terms of loose coupling, maintainability, evolvability, and ponent interactions, generality of interfaces, independent scalability. Unfortunately, some of REST’s constraints such as the deployment of components, and intermediary components to ones that demand self-descriptive messages or require the use of reduce interaction latency, enforce security, and encapsulate hypermedia as the engine of application state are rarely imple- legacy systems” [1]. mented correctly. This results in tightly coupled and thus brittle While some of REST’s constraints such as stateless interaction, systems.
    [Show full text]