Human-centered e-science: A group-theoretic perspective on cyberinfrastructure design

Tyler Pace, Shaowen Bardzell, Geoffrey Fox

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Cyberinfrastructure (CI) is a rapidly growing area of global research and funding with a history for emphasizing the role technology will play in changing scientific work practices. This paper proposes a group-theoretic perspective on small group collaboration that is informative to CI research and the design of CI environments. To illustrate the relevancy of a group-theoretic perspective to CI, this paper presents a critical review of over 150 CI research papers published in the last decade through the lens of McGrath's seminal Time, Interaction and Performance theory of groups. After relating common CI research themes through a focus on groups, we propose a series of early design principles aimed at helping interaction designers and technologists to better design and implement group collaboration tools in CI applications.

    Original languageEnglish (US)
    Title of host publication2010 International Symposium on Collaborative Technologies and Systems, CTS 2010
    Pages153-162
    Number of pages10
    DOIs
    StatePublished - 2010
    Event2010 International Symposium on Collaborative Technologies and Systems, CTS 2010 - Chicago, IL, United States
    Duration: May 17 2010May 21 2010

    Publication series

    Name2010 International Symposium on Collaborative Technologies and Systems, CTS 2010

    Conference

    Conference2010 International Symposium on Collaborative Technologies and Systems, CTS 2010
    CountryUnited States
    CityChicago, IL
    Period5/17/105/21/10

    All Science Journal Classification (ASJC) codes

    • Computer Networks and Communications
    • Computer Science Applications
    • Hardware and Architecture
    • Human-Computer Interaction

    Fingerprint Dive into the research topics of 'Human-centered e-science: A group-theoretic perspective on cyberinfrastructure design'. Together they form a unique fingerprint.

    Cite this