منابع مشابه
Designing Communication Design
Innovating in the field of new media genres requires methods for producing designs that can succeed in being disseminated and used outside of design research labs. This article uses the author’s experiences with the development of university courses in communication design to address the research question: How can we design courses to give students the competencies they need to work as designer...
متن کاملD02.04 -communication Network Design (rel.2) Information and Communication Technologies Communication Network Design (rel. 2) -d02.04 Communication Network Design (rel. 2) -d02.04
SUMMARY In this report, divided into 4 chapters, we report the final advances on WP2 and in particular on the task 3.2, " Communication network design ". It corresponds to an extended version of Deliverable 2.1 since it includes some novel contributes, namely Section 2.3. Chapter one introduces the developed arguments and presents parts of the literature review. Chapter two is devoted to networ...
متن کاملUser-Centered Privacy Communication Design
In this paper, we describe a user-centered privacy policy design project that we undertook at Stanford Legal Design Lab, in order to generate new models of business-to-consumer communications around data privacy. From our preliminary user research, rapid prototyping and testing, and refinement of new privacy communication designs, focused on a very particular archetype – a 20-40 year old who is...
متن کاملKnowledge Communication in Design Communities
Design is a rich domain in which to investigate barriers and biases in computersupported communication because it involves many different modes of communication in socialtechnical contexts. This chapter briefly describes different design approaches. It analyzes the biases and barriers of two different types of design communities: communities of practice and communities of interest. To address t...
متن کاملStructured Design of Communication Protocols *
We propose a compositional technique to design multifunction protocols. The technique involves rst designing the protocols performing the various functions separately and then combining them using a set of constraints. The constraints are used to specify the interactions between the component protocols. The interactions, for example, specify when a function has to be performed and whether two f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communication & Language at Work
سال: 2013
ISSN: 2245-5744
DOI: 10.7146/claw.v1i2.7889