Context Awareness and External Factors

被引:0
作者
Shishkov, Boris [1 ,2 ,3 ]
机构
[1] Bulgarian Acad Sci, Inst Math & Informat, Sofia, Bulgaria
[2] Univ Lib Studies & Informat Technol, Fac Informat Sci, Sofia, Bulgaria
[3] Inst IICREST, Sofia, Bulgaria
来源
BUSINESS MODELING AND SOFTWARE DESIGN, BMSD 2024 | 2024年 / 523卷
关键词
Context awareness; Public values; Regulations; Norms;
D O I
10.1007/978-3-031-64073-5_16
中图分类号
F [经济];
学科分类号
02 ;
摘要
The adequate functioning of most current software systems assumes the capability to adaptwith regard to numerous circumstances; we call a (software) system "context-aware" if it can deliver "behavior" that is relevant to a particular context situation, as opposed to rigid systems that cannot easily adapt to the changing environment. Most context-aware (software) systems are sensitive to changes in the situation of the user while others are sensitive to changes concerning their own operation. Nevertheless, sensitivity to changes that concern external factors (such as public values, regulations, and norms) is insufficiently covered by most current context-aware software systems. This paper touches upon context awareness and external factors, justifying the need for a more thorough consideration of public values, regulations, and norms in the specification of context-aware software systems. Our analytical contribution is not backed by proof-of-principle / proof-of-concept because we report research in progress and plan to do this in the future.
引用
收藏
页码:251 / 257
页数:7
相关论文
共 24 条
[1]   Context-Aware Services Engineering: Models, Transformations, and Verification [J].
Abeywickrama, Dhaminda B. ;
Ramakrishnan, Sita .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2012, 11 (03)
[2]   Engineering context-aware systems and applications: A survey [J].
Alegre, Unai ;
Augusto, Juan Carlos ;
Clark, Tony .
JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 117 :55-83
[3]  
Alferez German H., 2011, Proceedings of the 2011 15th International Software Product Line Conference (SPLC 2011), P100, DOI 10.1109/SPLC.2011.21
[4]  
Bartneck C., 2020, SpringerBriefs in Ethics, DOI [10.1007/978-3-030-51110-4_10, DOI 10.1007/978-3-030-51110-4_10]
[5]  
Bosems S, 2014, LECT NOTES COMPUT SC, V8842, P37, DOI 10.1007/978-3-662-45550-0_6
[6]   A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications [J].
Dey, AK ;
Abowd, GD ;
Salber, D .
HUMAN-COMPUTER INTERACTION, 2001, 16 (2-4) :97-+
[7]  
Dey AK, 2009, CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P859
[8]   A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks [J].
Fotohi, Reza ;
Abdan, Masoud ;
Ghasemi, Sanaz .
JOURNAL OF GRID COMPUTING, 2022, 20 (03)
[9]  
Friedman Batya, 1996, Interactions, V3, P16, DOI [DOI 10.1145/242485.242493, 10.1145/242485.242493]
[10]  
Ghanavati S, 2014, LECT NOTES COMPUT SC, V8824, P415, DOI 10.1007/978-3-319-12206-9_35