Zbornik 20. mednarodne multikonference INFORMACIJSKA DRUŽBA - IS 2017 Zvezek D Proceedings of the 20th International Multiconference INFORMATION SOCIETY - IS 2017 Volume D Kognitonika Cognitonics Uredila / Edited by Vladimir A. Fomichov, Olga S. Fomichova http://is.ijs.si 9.–13. oktober 2017 / 9–13 October 2017 Ljubljana, Slovenia Zbornik 20. mednarodne multikonference INFORMACIJSKA DRUŽBA – IS 2017 Zvezek D Proceedings of the 20th International Multiconference INFORMATION SOCIETY – IS 2017 Volume D Kognitonika Cognitonics Uredila / Edited by Vladimir A. Fomichov, Olga S. Fomichova http://is.ijs.si 9. - 13. oktober 2017 / 9th – 13th October 2017 Ljubljana, Slovenia Urednika: Vladimir A. Fomichov School of Business Informatics, Faculty of Business and Management, National Research University Higher School of Economics Kirpichnaya str. 33, 105187 Moscow, Russia Olga S. Fomichova Division "Dialogue of Sciences", State Budget Professional Educational Institution “Sparrow Hills” Universitetsky prospect 5, 119296 Moscow, Russia Založnik: Institut »Jožef Stefan«, Ljubljana Priprava zbornika: Mitja Lasič, Vesna Lasič, Lana Zemljak Oblikovanje naslovnice: Vesna Lasič Dostop do e-publikacije: http://library.ijs.si/Stacks/Proceedings/InformationSociety Ljubljana, oktober 2017 Kataložni zapis o publikaciji (CIP) pripravili v Narodni in univerzitetni knjižnici v Ljubljani COBISS.SI-ID=4943355 ISBN 978-961-264-115-3 (pdf) PREDGOVOR MULTIKONFERENCI INFORMACIJSKA DRUŽBA 2017 Multikonferenca Informacijska družba (http://is.ijs.si) je z dvajseto zaporedno prireditvijo osrednji srednjeevropski dogodek na področju informacijske družbe, računalništva in informatike. Letošnja prireditev je ponovno na več lokacijah, osrednji dogodki pa so na Institutu »Jožef Stefan«. Informacijska družba, znanje in umetna inteligenca so spet na razpotju tako same zase kot glede vpliva na človeški razvoj. Se bo eksponentna rast elektronike po Moorovem zakonu nadaljevala ali stagnirala? Bo umetna inteligenca nadaljevala svoj neverjetni razvoj in premagovala ljudi na čedalje več področjih in s tem omogočila razcvet civilizacije, ali pa bo eksponentna rast prebivalstva zlasti v Afriki povzročila zadušitev rasti? Čedalje več pokazateljev kaže v oba ekstrema – da prehajamo v naslednje civilizacijsko obdobje, hkrati pa so planetarni konflikti sodobne družbe čedalje težje obvladljivi. Letos smo v multikonferenco povezali dvanajst odličnih neodvisnih konferenc. Predstavljenih bo okoli 200 predstavitev, povzetkov in referatov v okviru samostojnih konferenc in delavnic. Prireditev bodo spremljale okrogle mize in razprave ter posebni dogodki, kot je svečana podelitev nagrad. Izbrani prispevki bodo izšli tudi v posebni številki revije Informatica, ki se ponaša s 40-letno tradicijo odlične znanstvene revije. Odlične obletnice! Multikonferenco Informacijska družba 2017 sestavljajo naslednje samostojne konference:  Slovenska konferenca o umetni inteligenci  Soočanje z demografskimi izzivi  Kognitivna znanost  Sodelovanje, programska oprema in storitve v informacijski družbi  Izkopavanje znanja in podatkovna skladišča  Vzgoja in izobraževanje v informacijski družbi  Četrta študentska računalniška konferenca  Delavnica »EM-zdravje«  Peta mednarodna konferenca kognitonike  Mednarodna konferenca za prenos tehnologij - ITTC  Delavnica »AS-IT-IC«  Robotika Soorganizatorji in podporniki konference so različne raziskovalne institucije in združenja, med njimi tudi ACM Slovenija, SLAIS, DKZ in druga slovenska nacionalna akademija, Inženirska akademija Slovenije (IAS). V imenu organizatorjev konference se zahvaljujemo združenjem in inštitucijam, še posebej pa udeležencem za njihove dragocene prispevke in priložnost, da z nami delijo svoje izkušnje o informacijski družbi. Zahvaljujemo se tudi recenzentom za njihovo pomoč pri recenziranju. V 2017 bomo petič podelili nagrado za življenjske dosežke v čast Donalda Michija in Alana Turinga. Nagrado Michie-Turing za izjemen življenjski prispevek k razvoju in promociji informacijske družbe bo prejel prof. dr. Marjan Krisper. Priznanje za dosežek leta bo pripadlo prof. dr. Andreju Brodniku. Že šestič podeljujemo nagradi »informacijska limona« in »informacijska jagoda« za najbolj (ne)uspešne poteze v zvezi z informacijsko družbo. Limono je dobilo padanje slovenskih sredstev za akademsko znanost, tako da smo sedaj tretji najslabši po tem kriteriju v Evropi, jagodo pa »e-recept«. Čestitke nagrajencem! Bojan Orel, predsednik programskega odbora Matjaž Gams, predsednik organizacijskega odbora i FOREWORD - INFORMATION SOCIETY 2017 In its 20th year, the Information Society Multiconference (http://is.ijs.si) remains one of the leading conferences in Central Europe devoted to information society, computer science and informatics. In 2017 it is organized at various locations, with the main events at the Jožef Stefan Institute. The pace of progress of information society, knowledge and artificial intelligence is speeding up, and it seems we are again at a turning point. Will the progress of electronics continue according to the Moore’s law or will it start stagnating? Will AI continue to outperform humans at more and more activities and in this way enable the predicted unseen human progress, or will the growth of human population in particular in Africa cause global decline? Both extremes seem more and more likely – fantastic human progress and planetary decline caused by humans destroying our environment and each other. The Multiconference is running in parallel sessions with 200 presentations of scientific papers at twelve conferences, round tables, workshops and award ceremonies. Selected papers will be published in the Informatica journal, which has 40 years of tradition of excellent research publication. These are remarkable achievements. The Information Society 2017 Multiconference consists of the following conferences:  Slovenian Conference on Artificial Intelligence  Facing Demographic Challenges  Cognitive Science  Collaboration, Software and Services in Information Society  Data Mining and Data Warehouses  Education in Information Society  4th Student Computer Science Research Conference  Workshop Electronic and Mobile Health  5th International Conference on Cognitonics  International Conference of Transfer of Technologies - ITTC  Workshop »AC-IT-IC«  Robotics The Multiconference is co-organized and supported by several major research institutions and societies, among them ACM Slovenia, i.e. the Slovenian chapter of the ACM, SLAIS, DKZ and the second national engineering academy, the Slovenian Engineering Academy. In the name of the conference organizers we thank all the societies and institutions, and particularly all the participants for their valuable contribution and their interest in this event, and the reviewers for their thorough reviews. For the fifth year, the award for life-long outstanding contributions will be delivered in memory of Donald Michie and Alan Turing. The Michie-Turing award will be given to Prof. Marjan Krisper for his life-long outstanding contribution to the development and promotion of information society in our country. In addition, an award for current achievements will be given to Prof. Andrej Brodnik. The information lemon goes to national funding of the academic science, which degrades Slovenia to the third worst position in Europe. The information strawberry is awarded for the medical e-recipe project. Congratulations! Bojan Orel, Programme Committee Chair Matjaž Gams, Organizing Committee Chair ii KONFERENČNI ODBORI CONFERENCE COMMITTEES International Programme Committee Organizing Committee Vladimir Bajic, South Africa Matjaž Gams, chair Heiner Benking, Germany Mitja Luštrek Se Woo Cheon, South Korea Lana Zemljak Howie Firth, UK Vesna Koricki Olga Fomichova, Russia Mitja Lasič Vladimir Fomichov, Russia Robert Blatnik Vesna Hljuz Dobric, Croatia Aleš Tavčar Alfred Inselberg, Israel Blaž Mahnič Jay Liebowitz, USA Jure Šorn Huan Liu, Singapore Mario Konecki Henz Martin, Germany Marcin Paprzycki, USA Karl Pribram, USA Claude Sammut, Australia Jiri Wiedermann, Czech Republic Xindong Wu, USA Yiming Ye, USA Ning Zhong, USA Wray Buntine, Australia Bezalel Gavish, USA Gal A. Kaminka, Israel Mike Bain, Australia Michela Milano, Italy Derong Liu, Chicago, USA Toby Walsh, Australia Programme Committee Bojan Orel, chair Mitja Luštrek Niko Schlamberger Franc Solina, co-chair Marko Grobelnik Stanko Strmčnik Viljan Mahnič, co-chair Nikola Guid Jurij Šilc Cene Bavec, co-chair Marjan Heričko Jurij Tasič Tomaž Kalin, co-chair Borka Jerman Blažič Džonova Denis Trček Jozsef Györkös, co-chair Gorazd Kandus Andrej Ule Tadej Bajd Urban Kordeš Tanja Urbančič Jaroslav Berce Marjan Krisper Boštjan Vilfan Mojca Bernik Andrej Kuščer Baldomir Zajc Marko Bohanec Jadran Lenarčič Blaž Zupan Ivan Bratko Borut Likar Boris Žemva Andrej Brodnik Janez Malačič Leon Žlajpah Dušan Caf Olga Markič Saša Divjak Dunja Mladenič Tomaž Erjavec Franc Novak Bogdan Filipič Vladislav Rajkovič Andrej Gams Grega Repovš Matjaž Gams Ivan Rozman iii Invited lecture AN UPDATE FROM THE AI & MUSIC FRONT Gerhard Widmer Institute for Computational Perception Johannes Kepler University Linz (JKU), and Austrian Research Institute for Artificial Intelligence (OFAI), Vienna Abstract Much of current research in Artificial Intelligence and Music, and particularly in the field of Music Information Retrieval (MIR), focuses on algorithms that interpret musical signals and recognize musically relevant objects and patterns at various levels -- from notes to beats and rhythm, to melodic and harmonic patterns and higher-level segment structure --, with the goal of supporting novel applications in the digital music world. This presentation will give the audience a glimpse of what musically "intelligent" systems can currently do with music, and what this is good for. However, we will also find that while some of these capabilities are quite impressive, they are still far from (and do not require) a deeper "understanding" of music. An ongoing project will be presented that aims to take AI & music research a bit closer to the "essence" of music, going beyond surface features and focusing on the expressive aspects of music, and how these are communicated in music. This raises a number of new research challenges for the field of AI and Music (discussed in much more detail in [Widmer, 2016]). As a first step, we will look at recent work on computational models of expressive music performance, and will show some examples of the state of the art (including the result of a recent musical 'Turing test'). References Widmer, G. (2016). Getting Closer to the Essence of Music: The Con Espressione Manifesto. ACM Transactions on Intelligent Systems and Technology 8(2), Article 19. iv KAZALO / TABLE OF CONTENTS Kognitonika / Cognitonics ......................................................................................................................................... 1 PREDGOVOR / FOREWORD ................................................................................................................................. 3 PROGRAMSKI ODBORI / PROGRAMME COMMITTEES ..................................................................................... 5 Terror: The lack of ethos and the initiation into a distorted mythology / Christofidou Angela ................................ 7 The Student-Self Oriented Learning Model as a Paradigm for Supporting and Developing Emotional Intelligence and Creativity / Fomichov Vladimir, Fomichova Olga .................................................................. 11 The Methods of Cognitonics as the Basis for Designing Intelligent Tutoring Systems Developing Emotional Intelligence of the Learners / Fomichova Olga, Fomichov Vladimir A. ......................................... 17 To Fear or Not To Fear the Tor Communication System / Haraty Ramzi, Khan Muhammad, Saddique M., Pirzada Umar, Zohaib M., Ali A., Wadud B., Ahmad Imran ............................................................................. 22 Dilemmas Connected With Preservation of Contemporary Art / Jadzinska Monika ........................................... 26 A Cognitonics Methodology for Artificial Persons / Kane Thomas B. ................................................................... 30 Logical Characteristic of Analogy and Its Classification / Kim Joonho ................................................................. 34 Virtual Personal Psychosocial Counsellor / Krivec Jana, Gams Matjaz .............................................................. 38 Cognitive Computing Within the Evaluation Process / Liverić Dijana, Vrzan Juraj, Gjergjeska Ljubinka ............ 43 Learning Processes for a Cognitive Democracyin Information Society / Micarelli Rita, Pizziolo Giorgio ........... 47 Suicide Attacks, Mass Media, and Data Mining / Minaidou Eleni ........................................................................ 52 Architectural Cognition Sociology / Oksala Tarkko, Toivanen Susanna, Oksala Aino ......................................... 57 Goals of Cognitonics in Formal Ict Education / Panev Ida, Panev Ivan, Gjergjeska Ljubinka ............................. 61 Serendipity as a Design Principle for Social Media / Reviglio Urbano ................................................................. 66 Evaluating a Reading Companion Service / Roa Seiler Nena, Rao Natasha, Korgaonkar Varun, Dhason Sujin .................................................................................................................................................................. 71 Recovery in Children in the Digital Age / Shah Shradhdha .................................................................................. 77 Mobile Mental Health Support for Chinese University Students / Wan Ke ........................................................... 79 Indeks avtorjev / Author index ................................................................................................................................ 83 v vi Zbornik 20. mednarodne multikonference INFORMACIJSKA DRUŽBA – IS 2017 Zvezek D Proceedings of the 20th International Multiconference INFORMATION SOCIETY – IS 2017 Volume D Kognitonika Cognitonics Uredila / Edited by Vladimir A. Fomichov, Olga S. Fomichova http://is.ijs.si 9. - 10. oktober 2017 / 9th – 10th October 2017 Ljubljana, Slovenia 1 2 FOREWORD Since October 2009, the biannual international scientific conference on Cognitonics (“Kognitonika” in Slovenian) is a part of the international scientific multiconference “Information Society” (Slovenia, Ljubljana, Jozef Stefan Institute). The first objective of cognitonics, or the science about the human being in the digital world, is to explicate the distortions in the perception of the world caused by the peculiarities of information society and globalization. The second, principal objective of cognitonics is to cope with these distortions in different fields by means of elaborating systemic solutions for compensating the negative implications of the kind for the personality and society, in particular, for creating cognitive-cultural preconditions of the harmonic development of the personality in the information society and knowledge society and for ensuring the successful development of national cultures and national languages. Cognitonics formulates a new, large-scale goal for the software industry and Web science: to develop a new generation of culture-oriented computer programs and online courses intended for supporting and developing positively-oriented creativity, emotional intelligence (EI), communication culture, social responsibility, the appreciation of the roots of the national cultures, the awareness of the integrity of the cultural space in the information and knowledge society and for supporting and developing symbolic information processing and linguistic skills, associative and reasoning abilities of children, adolescents, and university students. From the standpoint of educational practice, cognitonics proposes an answer to the following question: what precious ideas and images accumulated by the mankind, at what age, and in what a way are to be inscribed into the world's conceptual picture of a person in order to harmonize his/her intellectual and spiritually-coloured emotional development and to contribute to the successful development of national cultures and national languages? Being a relatively young scientific discipline, cognitonics both is of high social significance just now and has great prospects of the kind. It is due to the fact that it suggests new, deep and constructive ideas, new angles of look and original, effective solutions to a number of socially significant problems emerged in adjacent fields, including education. The examples of such solutions are as follows. During last decade, big international companies, fulfilling the casting of the specialists for vacant positions, have been paying a high attention to the level of EI of the pretenders. Cognitonics suggested a highly effective system of teaching methods aimed at supporting and developing EI of the learners. This system includes, in particular, a many-staged method of early children's socialization in information and knowledge society and a method of developing creativity, figurative thinking, the skill of integrating information from numerous dispersed sources. Cognitonics enriched psychology by means of introducing the notion of Thought-Producing Self and of suggesting the most deep today (on the world level) model of developing conscious control in the childhood: control of thought, emotions, and actions. Art cognitonics - one of the most developed branches of cognitonics - makes a considerable contribution to cultural studies and theory of up-bringing. It develops a complex method of using the works of art for 3 positive development of the child's, adolescent's, and university student's personality. Art cognitonics suggests a new paradigm of delivering lectures on art. The goal of the conference is to combine the efforts of the scholars from numerous scientific fields and educators in order to establish a new synergy aimed at ensuring the harmonic, well-balanced development of the personality, national cultures, and national languages in the modern information society and knowledge society and, as a consequence, to compensate a number of broadly observed negative distortions. The Program Committee has accepted for the conference 16 long papers and one short paper from 16 countries of three parts of the world: Asia (PR China, Lebanon, India, Japan, Pakistan), Europe (Croatia, Cyprus, Finland, Italy, Macedonia, Poland, Russia, Slovenia, Sweden, United Kingdom), and North America (USA). The editors would like to thank the authors of the papers for their contributions and the members of the Program Committee for their precious comments ensuring the high quality of the accepted papers and making the reading as well the editing of this volume a rewarding activity. Vladimir A. Fomichov, Olga S. Fomichova 4 PROGRAMSKI ODBOR / PROGRAMME COMMITTEE Vladimir A. Fomichov, Co-Chair Olga S. Fomichova, Co-Chair Mario Allegra Maria Bontila Rosa Maria Bottino Dumitru Dan Burdescu Angela Christofidou Paul Craig Vasileios Dagdilelis Monika Jadzińska Thomas B. Kane Joonho Kim Jana Krivec Felipe Lara-Rosano Marian Cristian Mihaescu Ivan Pogarcic Jens Pohl Anastasia D. Vakaloudi 5 6 Terror: The lack of ethos and the initiation into a distorted mythology Angela Christofidou Writer, Journalist 11 Verenikis Street, 2002, Nicosia, Cyprus Tel: +357 99286185 email: Angela.Christofidou.ean@outlook.com ABSTRACT and customs, they have to deal with the separation from a natural landscape and their “unconscious identity”. The goal of this study is to question the myth of martyrdom that is Separated from their familiar mythological, cultural and religious publicly attributed to suicide terrorism attacks, by proposing that norms, adolescents but also adults that have migrated away from the root of this phenomenon is on the contrary the lack of their landscape find themselves separated from their ethos. They mythology and ethos. Located in a society without recognizable sometimes mentally return in the comforting past, dream of their rituals, unable to relate stories depicted in their minds with an symbols and supernatural forces, they nurture obligations to the alien environment, suicide attackers are initiated to the rituals of dead and experience feelings of anxiety and anger [6]. gangs and internet communication channels. The demythologized world of economics, combined with the constant flow of news of The virtual internet cosmos resembles rituals in metaphor as they destruction and violence replaces the sanctification of the local are transformed in a psychological atmosphere that is monitored landscape, an organic synergy of mythology that is no longer by the communication channels that use this distorted metaphor functional [1]. The new myth lacks connotations and becomes for the recruitment of suicide attackers. The rules of propaganda their distorted metaphor. find their perfect medium: an audio-visual space, the messages of which can be reproduced innumerable times “for the deliberate and systematic pursuit of an individual or group to control the General Terms attitude of other individuals or groups by using any possible Security means of communication and purposefully provoking a desired Keywords for the source behaviour of the target” [7]. The suicide attacker is not experiencing the hero myth liberated, ready to contribute to Ethos, mythology, violence. the achievements in a useful life. Dissociated from his/her identity, he/she is initiated in a distorted scene of an altar full of as 1. INTRODUCTION many victims as possible. In Ancient Greece Ethos primarily had the meaning of the usual 2. THE HOMELAND OF OUR SYMBOLS place of residence to be developed later to the meaning of habit, custom and finally to character. The dual meaning of the word As infinite as its mother nature, our psyche appears in fragments reflects a cause and effect semantic relation. The landscape and of a mosaic, the archetypal symbols, full of connotations, that are residence give birth to the customs that create the character that is depicted in our collective unconscious [8]. Narrated in our myths, inseparably rooted in its source. Ethos as a synthesis of our dreams, literature, religions, folklore, the story of our psyche, environmental and internal physiognomies activate maturity and from its source to its developed form, is carried forward, tied on character development [2]. Ethos vitalities the process of self- the familiar chariot of our initiatory images. The wisdom of our actualization [3]. However, the moral and spiritual traditions of mother land functions through metaphors that embroider the modern individual are separated from his/her life and the void patterns in the paths of which, we follow the steps of our course in come to fill economics, violence, destruction and alienation. This the world. And as small parts of a living organism we reflect the disorientation is reinforced by the separation of the individual form of our unity with all our past generations. Supported by our from his/her meaningful mythological landscape resulting in enlarged icon, as individuals we are called to save our collective moral and social decay [4]. body [9]. It is common in modern age for cultures to try to identify Our stories are not merely shaped as the landscape that is our themselves in the void between broken traditions and a mosaic of home, they participate in the existence of the landscape, as the contemporary perceptions and in this new environment, together sphere of nature and humans are not separated [10]. with other vital rites, the rite of passage is lost, since it follows the changes of the community values [5]. In the new demythologized world, a distorted version of rite passage is being processed. All this is magnified in the case of migrants that in addition to the unclear picture of a dehumanized world, that ignores their values 7 2.1 Living at the end of an era 2.4 Without this dialogue homeostasis is The time when the individual was embodied in the cosmic reality, unbalanced when all phenomena were for him/her the comprehensible “thou”, The deep inner energy, painted in picture syllables and words, has become today the alien, inexplicable “it” [11]. Economics, narrate our myths while in the contemporary. Outside world violence, destruction consist an “it” that disintegrates humans another alphabet is being developed. A harmonic dialogue from their tradition and this dissociation is a synonym to isolation. between these two worlds is essential for the healthy development The lack of the spiritual support of a consistent mythology, rite of the individual. Citizens that find themselves in alien and symbolism create a vast void that is difficult to fill. The environments find themselves unable to keep the balance between mythological symbols cannot be technically created, even if their inner truths and the outside realities. The natural modern individual will keep trying to mentally touch them, even homeostasis of their mythology dysfunctions. In defense, the in his/her dreams. Sealed in the distant shadows of the past, the individual can only choose the extreme ends. imprisoned cosmic energy of our existence can cause neurotic incidents, as we remain fixed to the frozen images of our infancy, unable to follow the passages to our adulthood [12]. 3. LOST IN AN ALIEN LANDSCAPE OF When the conscious and the unconscious are separated the AN ALIEN TIME psychology of the individual reaches the line that distinguishes a healthy condition from psychological pathology [13]. The loss of the collective identity is not caused during the lifetime 2.2 Rites and structure of one generation. It can survive in generations to come, especially if it is as deeply rooted as religion that is dissipated in The complexity of structure defines the complexity of life form. all levels of life and is facing a liberal secular society. After six This axiom reflects the importance of structure in the line of centuries of scientific progress Islam stopped taking into account evolution. From the innate, stereotyped functions to the open to the collective energy of the community. Gender equality and imprinting mechanisms of human psyche that is embroidered by sexual liberalization are areas where Islam and Western societies the culture of society, structure imports the development of our can’t meet half way. Also, the Sharia law will challenge and will organizations. Rituals are the chariots that carry the imprinting of be challenged by democracy [19]. In addition, western Democracy society to the accessible psyche of adolescents [14]. Rites in and secularism in Europe is not free of values either [20]. It process reflect and are attracted by the archetypal myths of our derives from a collective identity as strong and as deeply rooted. distant shadow. These factors differ according to the citizen’s education, age, Hunger for structure is not weaker than the hunger for stimuli and gender and income but the contradictions are very much present recognition. We strive to structure our time with ritualistic in the general public. interplay, aiming at the acceptance of our local environment. A historical, cultural and personal path leads us from the formal Of a vulnerable planet population, the most vulnerable are the rituals to the semi-ritualistic interaction to the individual games ones who no longer live in a familiar region and are divided [15]. between a world that is lost and a world that is alien. They grieve and the cultural norms around them cannot help them deal with this grief. The loss of the sense of identity causes reactions rooted 2.3 The loss of the rites of passage deeply in the unconscious and the results have negative names: We are born adults and we remain adolescents lost in adolescent guilt, thoughts of death, morbid thoughts and feelings of societies. Since early childhood we have access to all information. worthlessness, psychological dysfunction, hallucinations [21]. All is shallow and nothing goes deeper than our skin. Facebook is Eisenbruch invented a cultural bereavement interview in order to our Prometheus and we are offered the fire of its knowledge that diagnose cultural bereavement and find ways of healing it [22]. has been transformed to information, even before we go to school. But most of the cases of individuals lost in an alien landscape do We do not remember ourselves in the memory-realization evoking not heal, on the contrary they are nurtured by the hatred that is moment of the rites of passage, we do not eavesdrop the rhythm of constantly communicated through the Mass Media, that quite our nature, we pass by our rebirth [16]. Lertzman notes that the often validate rites, in contemporary form [23]. moments of transitional development should be emphasized by rites, creating a map that will help the individual not to lose 3.1 Gang prestige his/her way on life’s journey [17]. Van Gennep distinguished A group that is organized, has a name and members that share a between physiological and social puberty [18]. common criminal record is often the first small community that offers to the lost adolescent all that he/she needs: recognition, sense of belonging, support, personal relations, prestige. The An individual thrives in the context of the community. The gangs that welcome the individual who seeks to reaffirm his/her community today is visible only to an astronaut fondly staring at identity are usually affiliated with terrorists and function as a first the planet earth from his distant spacecraft. And our virtual stage of initiation towards the passage that will lead the counter- community is as impersonal as the wire that kindly brings it to us. hero to the threshold of mass murder. Today we are not only lost between lost communities. We are lost between a dying era and an era that is not yet born. 8 3.2 Games towards destruction the opposite attitude. The media use the vocabulary the As substitutes to intimacy, games humans play fill the structured propaganda uses, thus adopting the desired concepts of the source. “Who time until the final act that could lead to a miracle or death, or/and ever learns the language of a nation secures himself from its evil” (Arab Prover) [27 death. The more disturbed an individual is the harder he/she plays ]. the game [24]. He/she will follow the game to its last drop falling into the dark waters of death and destruction. And the game has an organic truth: emotions are regulated. 4.1 On the altar, he is not alone In the hero myth, the hero is unable to find connotations to his/her adult world, unless he/she has managed to extricate 3.3 Blue Whale himself/herself from the psyche and gain autonomy. The hero is A recent example of a game that demonstrated the power of aware, he is spontaneous, he can experience intimacy. The hero initiation, through the regulation of the emotions of an adolescent transcends all generalized classifications, he/she stands opposite hungry for structure and games is the internet suicide game Blue the programming of the past and criticizes it, he is ready to be Whale, that was mainly active in Russia, Kazakhstan and open and intimate. He/she must be liberated and deepen into the Kyrgyzstan but had also operated in Europe and other parts of the meaning of his/her consciousness, in order to live a useful life, world. The game would begin with an initiator/Blue Whale contribute to society and achieve the feeling of self-distinction. curator explaining to the youth that once in the game there is no But the hero myth greatly differs from the initiation rite. For the way out. The curator would guide the youth each time to a hero strives to achieve his/her goal, he/she spears no efforts, destructive act. The game ends with the youth committing suicide. he/she participates with all his/her will to accomplish his/her dreams. While the lost adolescent, the inflexible novice, ready for initiation and programming, is giving up all ambition, all hope 4. A VIRTUAL THRESHOLD LEADING and all desire and submits to the ordeal. He/she must be ready to TO THE ALTAR die. He/she must be ready to kill. He/she must be ready to place on that altar as many victims as possible. The initiator said so. The more distinctly a culture expects something in the future the more precise is the rite of passage that is exercised. In the same 5. ACKNOWLEDGMENTS respect, a rite with a visible goal to be achieved in the future will create the right atmosphere by applying the right scenario to a I express my warmest thanks to Froso Parresiadou for her constant metaphor. The virtual cosmos of internet resembles the ritual in metaphor, in the context of what Heim defines as “psychic support and encouragement. framework” [25]. And the wrong people, using the right I always thank my three children, Eleni, Andreas and Nikolas for communication channels for the wrong reasons, create a distorted their amazing presence in my life. metaphor for the lost adolescent. A subjective reality, seen through the right lenses: mythology, culture, history, fear. 6. REFERENCES Because terrorism is a psychological warfare and it needs the right [1] Campbell, J. 1988. The Power of Myth. With Bill Moyers. tools. The distorted rite of passage can succeed only if it targets Anchor Books, New York. the most deeply rooted myths, fears and beliefs of the individual. Only then it touches the sphere of the collective consciousness. [2] Nikolaou, N. 2015. Human Ethos: The Parameters of its The computer screen starts its ritual. Radical Islamic motifs, formation. songs, video recordings. The language orates: murders are [3] Eggins, H.. 2014. Drivers and Barriers to Achieving Quality “executions”, criminals are “martyrs”. The semantics create the in Higher Education. Durham University, UK. Sense right bonds. A whole virtual community is ready to witness this Publishers, Rotterdam/Boston/TAIDE1, Lifelong Learning glorified rite of passage. You are being recruited, you belong Programme. somewhere [26]. While the channel of communication is transformed to a rite of passage, leading to the initiation of a [4] Jung, C.. 1964. Man and His Symbols. Dell Publishing, New murderer the rest of the world is watching the news, helpless in York, NY. the streets of the western cities that have lost their safety. Is there [5] Liang, R-H. 2001. Ritual in Virtual World. Information a way out of this mess? Management Department, Shih-Chien University. The Organization for Security and Cooperation in Europe (OSCE) [6] Bhugra, D. and Becker, A. 2005. Migration, Cultural and the United Nations try to raise international awareness of this Bereavement and Cultural Identity. World Psychiatry. dangerous tool of initiation to mass murder and to advise [7] Christofides, A. 1966/2016. Introduction to Propaganda. recommendations of action. Also, the same channels of Cyprus Broadcasting Corporation. communication could work backwards, showing the way back to [8] Jung, C. 1964. Man and His Symbols. Dell Publishing, New the source that is spreading the propaganda. Young citizens are York, NY. not trained to be able to recognize and nurture their abilities. They remain, fixated fossils, depicting some patterns of the past that are [9] Campbell, J. 2008. The Hero with a Thousand Faces. inexplicable to them. Bollingen Series XVII, third edition. New World Library, California. The failure to reinforce the resistance of the audience by educating the public rests at a great extend to the fact that the same means, internet, websites, are not used for the cultivation of 9 [10] Frankfort, H., Frankfort, H.A., Wilson J.A., Jacobsen, T. [20] Hamid, S. 2011. The Major Roadblock to Muslim 1959. Before Philosophy, The Intellectual Adventure of Assimilation in Europe. The Atlantic. (online) Ancient Man. Pelican Books. [21] Bhugra D., Becker A. 2005. Migration, Cultural [11] Frankfort, H., Frankfort, H.A., Wilson J.A., Jacobsen, T. Bereavement and Cultural Identity. World Psychiatry. 1959. Before Philosophy, The Intellectual Adventure of [22] Eisenbruch, M. 1990. The Cultural Bereavement Interview: Ancient Man. Pelican Books. A New Clinical Research Approach for Refugees. Psychiatr. [12] Campbell, J. 2008. The Hero with a Thousand Faces. Clin. North. Am. Bollingen Series XVII, third edition. New World Library, [23] Grimes, R. 2006. Rite out of place: Ritual, Media and the California. Arts. [13] Jung, C. 1964. Man and His Symbols. Dell Publishing, New [24] Berne, E. 1964. Games People Play. Clays Ltd, USA. York, NY. [25] Liang, R-H. 2001. Ritual in Virtual World. Information [14] Campbell, J. 1972. Myths to Live B y. The Viking Press, Inc. Management Department, Shih-Chien University. USA. [26] Whine, M. 2006. Common Motifs on Jihadi and Far Right [15] Berne, E. 1964. Games People Play. Clays Ltd, USA. Websites. Hypermedia Seduction for Terrorist [16] Scott, W. Rites of Passage and the Story of Our Times. Recruiting/ NATO, Science for Peace and Security Series, E: School of Lost Borders. Vision Fasts and Training. Adult Human and Societal Dynamics, Vol. 25. Vision Fasts. [27] Mimran, Y. 2006. Aspects of Communication and Message [17] Lertzman, D.A. 2002. Rediscovering Rites of Passage: Design in the Arab Culture. Hypermedia Seduction for Education, Transformation and the Transition to Terrorist Recruiting/ NATO, Science for Peace and Security Sustainability, Conservation Ecology 5 (2): 30. (online) Series, E: Human and Societal Dynamics, Vol. 25. [18] Van Gennep, A. 1909/1960. The Rites of Passage. Chicago, IL: University of Chicago Press. [19] Norris I, R. and P. 2009. Muslim Integration into Western Cultures: Between Origins and Destinations. HKS Faculty Research Working Paper Series TWP09-007, John F. Kennedy School of Government, Harvard University. 10 The Student-Self Oriented Learning Model as a Paradigm for Supporting and Developing Emotional Intelligence and Creativity Vladimir A. Fomichov Olga S. Fomichova School of Business Informatics Division "Dialogue of Sciences" Faculty of Business and Management, National State Budget Professional Educational Research University Institution “Sparrow Hil s” Higher School of Economics Universitetsky prospect 5 Kirpichnaya str. 33, 105187 Moscow 119296 Moscow, Russia Russia vfomichov@gmail.com vfomichov@hse.ru ABSTRACT second most significant demand seems to be the ability to quickly generate new knowledge, the skill of integrating knowledge pieces obtained from numerous dispersed information sources, the ability Proceeding from broadly accepted role of emotional intelligence of creative thinking while processing new knowledge and its (EI) in professional and personal life, the paper suggests a new connections with available knowledge. learning model (LM) called Student-Self Oriented LM (SSOL- model). It is defined as the model being beneficial for self- The analysis of the literature shows that the scholars from many cognition and self-construction through the prism of the acquired countries consider the problem of supporting and developing knowledge and life experience. A successful implementation of creativity of the learners as a highly acute problem. Until the the SSOL-model is shortly described. It is the system of 2000s, the majority of publications on creativity studied the emotional-imaginative teaching (the EIT-system), developed by peculiarities of intelligent activity of outstanding scientists, the authors in the 1990s and expanded in the 2000s. This system painters, writers, poets, etc. (see., e.g., [16]). This kind of is underpinned by the authors’ Theory of Dynamic Conceptual creativity is often called in modern literature “big C creativity” Mappings (the DCM-theory). The EIT-system includes an original (BCC), this term was introduced in [21]. method of developing figurative thinking and creativity at the However, the realities of information society transforming in lessons of second language (English for Russian children)., many countries into KS caused the emergence of the term “little C creativity” (LCC) literature and poetry in English and Russian, symbolic language [2]. The birth of this term reflects the demand of painting, and communication culture. It is stated that this of everyday creative thinking. The two criteria of BCC are the method may be used as an effective starting framework for originality and high significance for big groups of people. education in knowledge society. The DCM-theory and the EIT- Creativity demonstrated by children usually is subjective, it is system became the starting point for developing the foundations determined by their prior knowledge. An important characteristic of a new scientific discipline called cognitonics. The significance of children’s creativity is imagination. of its well developed branch - art cognitonics for helping the The realities of KS demand to support and develop LCC in order learners to answer the encountered moral questions is indicated. to increase the proportion of the specialists possessing BCC. But it is not obvious how to achieve this global goal. The paper [20] General Terms analyses the results of a large scale study carried out in USA and focused on the evolution of average level of intelligence and Human Factors, Languages, Theory creativity during two decades, since the early 1990s. The diapason Keywords of participants was from young children in kindergartens to 12th grade students and adults. The results of the study showed a Emotional intelligence, art cognitonics, creativity development, steady decline of creative thinking from 1990 to 2008 among serendipity, intelligent tutoring system, early socialization of inhabitants of USA. This decline is especially considerable in children, theory of dynamic conceptual mappings, system of kindergarten through third grade. Besides, the results of the study emotional-imaginative teaching, cognitive engagement indicated that young children "are tending to grow up more narrow-minded, less intellectually curious, and less open to new 1. INTRODUCTION experience" [20, p. 1]. Taking this into account, Kim [20] The progress of science and technology in the end of the 20th – the expressed the opinion that it is necessary to encourage creative beginning of the 21st century, globalization process underpinned thinking in preschool or before. by the stormy expansion of the Internet have posed new demands Parallelly with the term “creativity”, the notion “emotional to education. Likely, the most significant demand is the formation intelligence” (EI) belongs to the set of concepts most often used of the preconditions of mastering several professions during the in scientific publications in the field of education. According to life: for the most part of people, it is impossible in knowledge [1], EI is the other kind of smart. The studies carried out during society (KS) to have only one profession during the life. The two decades after the birth of this notion in 1995 [17] have shown 11 that EI is the crucial factor distinguishing star performers of underpinned by the curiosity and strong aspiration to discover the various professional roles among all performers of these roles. digital world, on the one hand, and by the desire to emulate the EI determines the manner of a person to manage behavior, deal grown-ups and become as smart and powerful as the grown-ups or with social complexities, and make decisions leading to positive even much smarter and much more powerful. results. EI is the unity of four core skills forming two primary The concept of Self is based upon our images of ourselves. The competences: personal competence and social competence. Self develops as it interacts with the most important of According to [1], personal competence is composed by two skills: environmental influences. Through this social interaction the Self self-awareness and self-management. The first skill is the ability defines itself as a social being, which influences, and is influenced of a person to accurately perceive his/her emotions and stay away by others [22] . of them as they happen. self-management is the ability of a person Student-self oriented learning model (SSOL-model) is defined as to use awareness of his/her emotions for staying flexible and for the model being beneficial for self-cognition and self-construction positively directing his/her behaviour. Social competence is through the prism of the acquired knowledge and life experience. defined by Bradberry [1] as the ability of a person to understand Natural language is the tool for constructing social reality [26]. other people’s moods, behaviour, and motives for improving the The Self develops through the social interaction and co-creative quality of his /her relationships. work, because creative work suggests personal involvement and is During the last two decades, the psychologists have discovered a underpinned with strong emotions (e.g., inspiration). The process huge role of well-developed EI in taking successful business is always emotionally coloured. decisions. That is why now the big companies throughout the Under the framework of standard model, the process of world pay a very high attention to the state of EI while hiring, knowledge acquisition often seems to the students to be first promoting, and increasing qualification of their employees [18]. gloomy (no interest, no personal involvement), then pleasant and Since early 1990s, we have been looking for more effective afterwards filled with never-ending delights. In case with the principles of teaching and learning in comparison with the SSOL-model, the process of learning seems to the students to be broadly used ones. The accumulated theoretical and practical pleasant and curious from the very beginning. Afterwards it is experience shows that modern education as a whole filled with never ending delight. The new model helps to exclude underestimates the significance of basing on EI for making easier from the perception of educational process such characteristics as for the students grasping central ideas of theoretical materials to “gloomy”. As a result, it arises the interaction with the be learned. environmental influences and causes cognitive engagement of the The structure of this paper is as follows. Section 2 introduces a students. learning model (LM) aimed at supporting and developing EI and This idea is intuitively clear to very many experienced lecturers. creativity. Section 3 considers two components of an original EI suggests Self, because Self is always emotionally coloured. conceptual learning environment for studying second language One is never tired when the subject of the conversation (or (English for young Russian children). Section 4 gives a very short lecture) touches his/her Self in a positive and curious way. You information about the System of Emotional-Imaginative Teaching are never tired if we are speaking about you and want to know (the EIT-system), being a successful implementation of the your life experience, you are in the centre of attention. suggested LM. Section 5 interprets the EIT-system as a balanced Strength of materials (or mechanics of materials) is known as one approach to combined development of EI, reasoning skills, and of most difficult disciplines for the university students – future creativity, outlines the significance of this approach for education engineers. However, 61 years ago one scientist found a thrilling in KS. Section 6 indicates the importance of art cognitonics and way to introduce basic ideas of his discipline. This scientist is the methods of achieving cognitive engagement at the lessons of Charles Seim, he wrote the article “A Stress Analysis of a art for improving emotional well-being of the learners. Section 7 Strapless Evening Gown” in the year 1956. This article was shows the broad prospects of using the developed educational published in the book "A Stress Analysis of a Strapless Evening methods. Gown and Other Essays for a Scientific Age" (Robert A. Baker, 1969, 212 pages). The translation of this book under the title “The 2. STUDENT-SELF ORIENTED LEARNING physicists are joking” became very popular in Russia in the 1970s. MODEL The core of the proposed model consists of self-cognition, self- construction, and self-regulation of self-conscious emotions. Let’s We believe that modern education may find the ways to explicate these notions. Self-cognition is active transfiguration but effectively deal with numerous open problems as a result of not passive reflexion. Self is constructed through the interaction accepting a new LM taking into account the significance of EI in with the world (through the discovery of the world). The professional and personal life. particular facets of the personality are improved as a result of new experience and as a result of processing the semantic trace left by The broadly accepted student oriented LM determines the a strong emotion caused by that new experience (it is the activities launched by the goal to discover the world: acquisition improvement of emotional experience). Self is always coloured by of information, information processing, knowledge construction. emotions. That is why this semantic trace deepens the emotional The resulting activities are constructing a new text and experience and, as a consequence, improves the emotional constructing a new sense. Then the achieved cognitive-emotional intelligence of the student [23] . state is as follows: a student is well-educated but not intellectually Firstly, the realization of this new model leads to Student – and spiritually mature. Digital World balanced partnership. It means the spiritual Discovering the world is based on a brand-new culture on the maturity and cultural level of the student become equal to the basis of digital opportunities and ideology. Its essence is to catch outstanding breakthrough in digital technologies. Secondly, the up with new technologies (but not to find one’s way and realization of the new model leads to the improvement of incorporate it into modern reality as a new vision). It is serendipity and turns information into serendipitous information 12 (unexpected but desirable). Serendipity is the ability to make state of minute is obvious (when somebody scoops a precious, pleasant and unexpected discoveries entirely by chance [19]. It significant, or just a particular minute out of the river of time). leads to much higher level of socialization and to much higher Due to the usage of the proposed approach at lessons of English level of responsibility. as a second language (SL), the Russian students begin to employ To sum up, the suggested model determines the humanistic filling this tense eagerly while speaking. It makes the lessons of English of education in the digital world. The new model suggests: grammar socially coloured and more interesting for the students. - a conceptual learning environment instead of a Besides, this method reveals the essence of the English character. memorization-based one (it means making emotionally coloured the concepts to be learned 4. THE SYSTEM OF EMOTIONAL- and, as a consequence, making much easier IMAGINATIVE TEACHING AS A grasping these concepts); - the methods of achieving cognitive SUCCESSFUL IMPLEMENTATION OF engagement of the students; THE SSOL-MODEL - a system of self-oriented questions in the In early 1990s we came to the conclusion that educational process of knowledge acquisition; potential of young learners (5-6-7 years old) is much higher then - the methods of encouraging the students to it was broadly accepted to believe. The key to more effective discover the world aimed at self-cognition and realization of this potential should be the ways of establishing a self-construction; correspondence between a piece of material to be studied and a - a method of teaching the students how to certain bright fragment of the learner’s conceptual picture of the process serendipitous information. world. We called such correspondences dynamic conceptual mappings [4]. That is why we started in early 1990s a study aimed 3. EXAMPLES: A CONCEPTUAL at finding more effective ways of teaching and learning due to LEARNING ENVIRONMENT FOR systemic basing on young learners’ emotional experience accumulated, in particular, during the breakfasts and lunches, the STUDYING SECOND LANGUAGE walks in gardens and parks and along a river, while visiting Example 1. The experience shows that it is very difficult for five - school and theatres, playing various games, sport activities, etc. six year old Russian students to understand why they should use Step by step, we obtained several scientific and practical results of in simple phrases different words "am", "is", "are" and how one high social significance, and these results stood apart from the should combine these words with the words "I", "you", "he", principal trends in education of the 1990s and early 2000s [15]. It "she", "it", "we", "they". Our approach to this problem is as was done due to our original Theory of Dynamic Conceptual follows. Assume that a teacher knows that her young student Julia Mappings ( the DCM-theory) [4 - 7, 12] and our System of has a beautiful dress for theatre, a dress for kindergarten, and a Emotional-Imaginative Teaching ( the EIT-system), based on the dress for a bathroom. Julia agrees that she never doubts what DCM-theory. The EIT-system is aimed at systematic development dress to wear. Then the words "am", "is", "are" may be called the of EI, reasoning skills, sound creativity, language skills, and different dresses of the verb "to be" (children at this age have very communication culture at the lessons of language - mother tongue vivid imagination). Besides, "am" may be called a dress for and SL, literature and poetry in two languages (on the example of visiting the house where the word "I' lives, "are" - a dress for Russian and English), symbolic languages of painting, sculpture, visiting the house where the words "you", "we", "they" live, and garden-park art, classic dance. We have accumulated the 27-year- "is" - a dress for visiting the house where the words "he", "she", long successful experience of using the EIT-system in extra "it" live [5]. education in Moscow, Russia. Many aspects of the EIT-system are Example 2. In English grammar we have the Present Continuous described in our papers published in the proceedings of the First – Tense. We propose a new approach to explaining this Tense, the Fourth international conferences on cognitonics (see, in particular, motive is that our many year experience has shown that this [11, 13, 14]) and in the papers [3 - 10, 12]. approach provides the possibility to minimize the number of Let’s consider now such aspects of the EIT-system that concern errors. The peculiarity of this piece of grammar for Russian basing on and developing EI and Self of the students. learners is the lack of similar tense in the grammar of Russian Self is always creative, because it is a personal way of viewing the language. This tense is very important tense, because it reveals the world, based on the world’s conceptual picture of the beholder emotional state of an interlocutor and emotionally colours the and his/her estimation of the events. speech. It is possible to call it the Emotional Tense – the tense which reveals our emotions. For example, saying “Look, she is Example. The famous Russian poet Boris Pasternak gives the reading”, we attract somebody’s attention to something or picture of the early spring, writing: somebody, because we are not indifferent to it. When we are - Is it only dirt you notice talking and drinking in a cafe, we say: “I am readying an - Does the thaw not catch your glance? interesting book now”, it means that we are carried away by the We ask the students what makes Pasternak think that the thaw is book (at least we are not indifferent towards it if we mention it beautiful. The answers of young students (7 years old) are as while talking and drinking). We use this tense speaking about the follows: weather, about changing situation, irritation (“You are always wearing my slippers”), to express - The thaw is like a herd of dapple grey deer basking in admiration (“What a nice hat you are wearing!”), personal arrangements, etc. the spring sun; - It is like a surface of the moon dotted with craters; This tense shows emotionally coloured attitude towards - A table served for breakfast with blue cups and black something, it doesn’t just state the fact, doesn’t denote something ice tea with a piece of Sun. which is true in general. The personal involvement is high, the 13 This approach helps young students to understand and penetrate children get a developed creativity. Our approach to early the very essence of beautiful poetical lines written by the great creativity development excellently correlates with the opinion of poet. Besides, it expands their way of viewing the world, makes the surrounding world much more colourful, and their way of viewing it much more creative. This approach helps them also to understand painting (and modern painting, in particular). Learner's Self An acute educational problem is early socialization of children in KS. Let’s illustrate the approach of the EIT-system to solving this problem. Emotional intelligence Example. In the fairy-tale “Snow White” the Queen asks: “Looking-glass on the wall who is fairest of us all?”. The students Reasoning skills are asked whether it is a question in fact or she is sure that she is beautiful. The young students give the following explanations: - If she wants to know as a researcher, she wouldn’t be Creativity furious. - She does it every morning simultaneously with having coffee or brushing her hair. It means that she is sure in the answer. - She is selfish and she doesn’t think about the good for the others, even the King. That is why she can’t be Theory of beautiful. May be attractive, like Cinderella’s sisters, but not beautiful. Dynamic Art - When the hunter promises to take Snow White into the Conceptual Cognitonics woods, he doesn’t promise to kill her. But the Queen is sure that he does. It is a cognitive trap: she doesn’t Mappings expect anybody to protest, to disagree, to disobey her. It is one more prove that she is selfish and doesn’t listen to anyone. It will mislead her. - System of Emotional- Our educational results obtained in the 1990s due to the EIT- system were retrospectively interpreted during last decade as a Imaginative Teaching significant contribution to developmental psychology and to positive movement in psychology [3, 10]. The The 5. A BALANCED APPROACH TO methods of methods of COMBINED DEVELOPMENT OF creating achieving EMOTIONAL INTELLIGENCE, conceptual cognitive REASONING SKILLS, AND CREATIVITY learning engage - Showing the diminishment of creativity level in USA during two last decades, Kim [20] indicated the necessity of starting the environ - ment of the development of creativity in kindergartens. An important role in ments learners achieving this goal is to be played by calm, free, friendly atmosphere at lessons. We believe that now, as a whole, cognitive potential of five-seven The methods of teaching to year olds is underestimated. The analysis shows that the DCM- theory and the EIT-system may be interpreted as an effective process serendipitous theoretical framework for starting education in KS. The principal advantages of our approach to creating the information preconditions of effectively starting education in KS are as follows. Young learners (five-seven years old) get accustomed to the beauty expressed in various ways. It is well known that it is Figure 1. A scheme of a new look at combined development of highly important not only for the painters, sculpturers, poets, dress emotional intelligence, reasoning skills, and creativity. designers but also for mathematicians, physicists, designers of ships and airplanes to have a well developed feeling of harmony, feeling of beauty. That is why our approach is of high value as a Piaget [24] about the significance of "reflective abstraction'. i.e., starting mechanism for education in KS. about the crucial role of processing and constructing knowledge As a consequence of getting a developed figurative reasoning (due in the course of mental actions performed on the perceived and to several kinds of intellectual games, intellectual competition), imaginary objects and causing generation of new ideas. 14 As for early socialization, the young students became careful, The same situation we have in every-day life. “Multiple debs, tactful, thoughtful, they acquire the feeling of empathy and start reflections” prevent us from grasping the sense of what is appreciating the harmony in everything, including human happening. As in case with impressionists’ canvases, we have to relationships. It is important to do before the age of “teen”, when have a look at the situation from a distance, and distance in this children are ready to discuss and follow the social rules. In this case is equal to time distance. We need some time to better case, beauty becomes the core of their system of values [3, 9, understand what has happened, and this will help us to cope with 10], and it helps a lot at the moment they are twelve and are going the situation (see another examples in [11]). on thirteen – the transition age. Figure 1 illustrates a new look at The paper [9] contains an algorithm of resisting emotional attacks combined development of EI, reasoning skills, and creativity. from social networks by means of transforming the negative The EIT-system includes the original methods of teaching to emotions into the positive ones. This algorithm is based on the process serendipitous information. According to Kim [20], a very idea described immediately above. large scaled study carried out in USA showed that during last Cognitive engagement ( CE) is defined in [10, 14] as the process decade of the XXth century and first decade of the XXIst century of highly motivated intellectual activity when the interest towards children became less able to connect seemingly irrelevant things. the subject under discussion is so strong that the students loose That is why our methods of teaching how to process serendipitous the track of time and, as a result, they are not tired. The students’ information are very topical. interest determines the level of involvement. The emotional Well developed feeling of beauty creates for the student the response is very close to inspiration, because they are making preconditions of being successful at arts lessons. It is broadly their own discoveries, and their mental efforts are appreciated. It accepted to believe that art education supports and develops helps to provide a conceptual learning environment instead of a creativity of young children and teenagers, develops emotional memorization based one and enhances the motivation. CE is intelligence, improves emotional well-being, self-confidence, and created mainly by the components called in [10, 14] focused attention, positive effect, aesthetics, endurance, novelty, life skills of the students [25]. motivation. A fundamental significance of our approach for education in KS is determined also by the formulation of the cognitive precondition of the situation when it is possible to start systematic 7. BROAD PROSPECTS OF USING THE acquaintance of children with the computer. It is the realization of DEVELOPED EDUCATIONAL METHODS the Thought-Producing Self of the child [7, 8, 12]. The EIT-system has been mainly realized at lessons of English as a SL for Russian-speaking children and at the lessons of poetry 6. ART COGNITONICS AND COGNITIVE and literature in English, at lessons devoted to explaining the symbolic language of painting, the culture of communication, and ENGAGEMENT AT ARTS LESSONS the symbolic language of classical dance. These kinds of lessons Art cognitonics (AC) [11] is one of the principal branches of are considered in numerous countries as highly appropriate for cognitonics, or the science about the human being in the digital young children and teenagers. The carefully selected collection of world [8 - 11, 13, 14]. The DCM-theory and the EIT-system texts used at lessons is provided by a number of classical, world- belong to the constructive core of cognitonics. AC aims at tuning known fairy-tales and novels, in particular, “Snow White”, the EI of the young children and adolescents with the help of “Cinderella”, “Sleeping Beauty”, “Pinocchio”, “Pollyanna”, “The well-known works of art. The goal is to create a bright semantic Life and Adventures of Santa Claus“ by L. Frank Baum, “Alice in trace in the world’s conceptual picture of the learner Wonder Land” by Lewis Carroll, “The Wind in the Willows” by corresponding to an idea explaining or illustrating a moral value, Kenneth Grahame, “The Hundred and One Dalmatians” by Dodie communicative situation, a situation of making a decision, Smith, etc. That is why the EIT-system may be used (after a cognitive process itself, the process of self-cognition and certain adaptation requiring a small time) in English-speaking consideration, the seething cocktail of emotions, a way of viewing countries and in numerous countries where the English language the world around, etc. is learned as a SL. AC establishes the links between the objects, situation, processes, views of a person (a beholder) and the work of art that becomes a 8. CONCLUSION metaphor or a vivid illustration (vivid mental representation) of We believe that the proposed SSOL-model possess the properties something the beholder is considering about. That is why the enabling its usage as a paradigm for education in KS. The focus consciousness of the beholder receives a considerable impulse to on the student's Self at the lessons means that the lessons are developing the ability of establishing diverse analogies and emotionally coloured, and this very much contributes to the consequently to finding a new look at a situation [11]. success of the learning process. Example. For enriching the colour of their canvases, the Now there is at least one successful implementation of the SSOL- impressionists made use of what is know as division of colour and model, and it is our EIT-system, tested during 27 years in Russia. optical blending. E.g., to represent a green meadow, they put little The principal distinguishing features of the EIT-system are an tabs of blue and yellow on the canvas which are supposed to be effective, many-staged method of sustaining and developing combined to form green in the eye of the beholder – a far more creativity in young children and adolescents, supporting and intense green than one taken straight from the artist’s palette. That developing EI, basing on EI for making much easier the grasping is why it is impossible to understand the idea of a picture standing of the materials to be studied. close to the canvas. We have to step aside and look at it from a Our numerous publications in English describe many aspects of certain distance to enjoy it and to have the desired effect. the EIT-system. The scholars from various countries do have the 15 possibility to develop their original implementations of the SSOL- [13] Fomichova, O. S. and Fomichov, V. A. 2009. Cognitonics model with respect to their mother tongue and national culture. as an Answer to the Challenge of Time. In Proceedings of the 12th International Multiconference Information Society 9. REFERENCES - IS 2009, Slovenia, Ljubljana, 12 – 16 October 2009. The Conference Kognitonika/Cognitonics. Jozef Stefan [1] Bradberry, T. 2014. Emotional Intelligence - EQ; Institute, Ljubljana, 2009, 431-434. http://www.forbes.com/sites/travisbradberry/2014/01/09/e [14] Fomichova, O. S. and Fomichov, V. A. 2013. The Risk of motional-intelligence/#216e16f61ac0; retrieved 21.07.17. Postponing Early Socialization of Smart Young Generation [2] Craft, A. 2001. Little c creativity. In A. Craft, B. Jeffrey and in Modern Information Society. In M. Gams, R. Piltaver, D. M. Leibling (Eds.), Creativity in Education. Continuum, Mladenic et al (Eds.), Proceedings of the 16th London, 45-61. International. Multiconference Information Society – IS 2013, Slovenia, Ljubljana, 7 – 11 October 2013. Vol. A. The Conference Kognitonika/Cognitonics. Jozef Stefan [3] Fomichov, V. A. 2015. Conscious Control during Institute, Ljubljana, 430-434. Childhood, Development of. In International Encyclopedia of the Social and Behavioral Sciences, Second Edition .Vol. 4. Elsevier, Oxford, 666-672. [15] Fomichova,, O. S. and Fomichov, V. A. 2017. The [4] Fomichov, V. A. and Fomichova, O. S. 1994. The Theory Methods of Cognitonics as the Basis for Designing of Dynamic Conceptual Mappings and its Significance for Intelligent Tutoring Systems Developing Emotional Education, Cognitive Science, and Artificial Intelligence. Intelligence of the Learners. In Informacijska druzba - IS Informatica. An International Journal of Computing and 2017. Proceedings of the 20th International Informatics (Slovenia), 8, 2, 31-148. Multiconference - IS 2017, Edited by V. A. Fomichov, O. S. [5] Fomichov, V. A. and Fomichova, O. S. 1995. The artificial Fomichova. Vol. Kognitonika/Cognitonics. October 9th- intelligence theory and highly effective methods of 10th, 2017, Ljubljana, Slovenia . Jozef Stefan Institute, teaching young children foreign languages. Cybernetica Ljubljana. (Belgium, Namur). XXXVIII, 321-344. [16] Gardner, H. 1993. Creating Minds: an Anatomy of Creativity Seen Through the Lives of Freud, Einstein, [6] Fomichov, V.A. and Fomichova, O.S. 1997. An Infor- Picasso, Stravinsky, Eliot, Graham, and Gandhi. Basic mational Conception of Developing the Consciousness of Books, New York. the Child. Informatica. An Intern.l Journal of Computing [17] Goleman, D. 1995. Emotional Intelligence. Bantam Books, and Informatics (Slovenia), 21, 371-390. New York. [7] Fomichov, V. A. and Fomichova, O. S. 2000. The social [18] Goleman, D. 2016. Emotional Intelligence; responsibility of computer science specialists for the http://www.danielgoleman.info/topics/emotional- creative potential of the young generation. Intern. l Journal intelligence; retrieved 12.09.2016. of Artificial Intelligence in Education. 11, 208-219. [19] Hornby, A. S. 1995. Oxford Advanced Learner's Dictionary [8] Fomichov, V .A. and Fomichova, O. S. 2006. Cognitonics of Current English. Fifth edition. Oxford University Press. as a New Science and Its Significance for Informatics and [20] Kim, K. H. 2011. The creativity crisis: the decrease in Information Society; Informatica. An International Journal creative thinking scores on the Torrance Tests of Creative of Computing and Informatics (Slovenia), 30, pp. 387-398. Thinking. Creativity Research Journal. 23, 4, 285-295 . [9] Fomichov, V. A. and Fomichova, O. S. 2012. A [21] Kudryavtsev, V. T. 2011. The phenomenon of child Contribution of Cognitonics to Secure Living in creativity. International Journal of Early Years Education. Information Societ. Informatica. An International Journal 19, 1, 45-53. of Computing and Informatics (Slovenia), 36, 121-130. [22] Neisser, U. 1997. The roots of self-knowledge: perceiving Self, It, and Thou. In Snodgrass, J.G. and Tompson, R.L. [10] Fomichov, V.A. and Fomichova, O.S. 2014. An Imperative (eds.). The Self Across Psychology. Self-Recognition, Self- of a Poorly Recognized Existential Risk: Early Socializa- Awareness, and the Self Concept. Annals, Vol. 818. The tion of Smart Young Generation in Information Society. New York Academy of Sciences, 19-33. Informatica. An International Journal of Computing and [23] Padovan, C. and Versace, R. 1998. The representation of Informatics, 38, 1, 59-70. emotion in long term memory. In Apprentissage: des principes naturels aux methodes artificielles, sous la [11] Fomichov V. A. and Fomichova, O. S. 2015. Early direction de G. Ritschard, A. Berchtold, F. Duc, and D.A. Development of the Human Being Ideal Constituent and Zighed. HERMES, Paris, 111-123. Art Cognitonics as the Answer to the Challenge of Knowledge Society. In: Informacijska druzba - IS 2015. [24] Piaget, J. 1981. Creativity. In J. M. Gallagher and D. K. Proceedings of the 18th International Multiconference - IS Reid (Eds.), The Learning Theory of Piaget and Inhelder. 2015, Edited by V. A. Fomichov, O. S. Fomichova. Vol. F: Brooks-Cole, Monterey, CA, 221-229. Kognitonika/Cognitonics. Oct. 12th-13th, 2015, Ljubljana, [25] Roege. G. B. and Kim. K. H. 2013. Why we need arts Slovenia . Jozef Stefan Institute, . Ljubljana, 27-32. education. Empirical Studies of the Arts. 31, 2, 121-130. [12] Fomichova, O. S. and Fomichov, V. A. 2000. Computers [26] Searle, J.R. 1995. The Construction of Social Reality. The and the Thought-Producing Self of the Young Child; The Penguine Press. British Journal of Educational Technology, Vol. 31, pp. 213-220. 16 The Methods of Cognitonics as the Basis for Designing Intelligent Tutoring Systems Developing Emotional Intelligence of the Learners Olga S. Fomichova Vladimir A. Fomichov Division "Dialogue of Sciences" School of Business Informatics State Budget Professional Educational Faculty of Business and Management, National Institution “Sparrow Hills" Research University Higher School of Economics Universitetsky prospect 5 Kirpichnaya str. 33, 105187 Moscow 119296 Moscow, Russia Russia vfomichov@gmail.com vfomichov@hse.ru ABSTRACT fact this term is interpreted in the scientific literature much more The constructive core of cognitonics, or the science about the narrowly: as learning with broad use of mobile devices: tablet human being in the digital world, includes the system of the computers, androids, etc. This definition reflects the focus on methods of emotional-imaginative teaching (the EIT-system). This technical means of learning. There are reasons to believe that the dominant part of the scholars don’t notice the fundamental system is aimed at systematic development of emotional intelligence (personal competence and social competence), problem of perfecting, improving the principles of teaching and reasoning skills, sound creativity, language skills, and learning. communication culture at the lessons of language (mother tongue We suggest here a much broader definition of SmL, taking into and second language), literature and poetry in two languages (on account the significance of basing educational methods on the example of Russian and English), symbolic languages of emotional intelligence (EI) and of supporting and developing EI painting, sculpture, garden-park art, classic dance. The goal of this of the learners (see [11]). We believe that SmL is a collection of paper is revealing to the designers of intelligent tutoring systems theoretical ideas and practical methods of teaching and learning (ITSs) the broad prospects of constructing a new generation of developed by smart specialists in education theory, information ITSs opened by the EIT-system. The principal peculiarities of the and communication technologies, mathematics, humanities, arts, discussed new generation of ITSs are to be: (a) taking into and many adjacent fields for creating cognitive-cultural and account emotional intelligence of children as the basis for technical preconditions of up-bringing young generation being designing ITSs; (b) as a consequence, making much easier for personally and professionally successful in smart society. children and adolescents the grasping of the pieces of theoretical The analysis of scientific literature shows that a high proportion materials to be learned; (c) for the majority of the systems of elementary, middle, and high school students encounter belonging to this new class, contributing to early socialization of considerable difficulties as concerns grasping the main ideas of children. the pieces of theory to be studied. Let’s consider the main social consequences of this situation. General Terms 1. The US Public Health Service prepared in the year 2000 a report on children’s mental health [20]. According to Design, Human Factors, Languages, Theory this report, approximately one fifth of children and Keywords adolescents experienced problems showing their need for mental health services. One of the main reasons for Emotional intelligence, social competence, cognitonics, creativity this need is the intellectual and emotional obstacles on development, intelligent tutoring system, early socialization of the way of successful learning faced by the school children, theory of dynamic conceptual mappings, system of students in conditions of too short time for relaxation emotional-imaginative teaching, cognitive engagement and refreshing the brain as a consequence of many-hour interaction with the Internet, in particular, with 1. INTRODUCTION computer games. During last decade, information society in many countries has 2. Rather often, the breaks of discipline at lessons been transforming into knowledge society (KS), or smart society. encountered by the students in the process of grasping Its main distinguished features are effective knowledge the materials to be learned cause the growth of processing, generation of new knowledge, establishing the links aggressiveness towards the teachers and the classmates between remote knowledge fields, the possession by the with higher grades. The breaks of discipline negatively specialists in various spheres of creating thinking and the ability influence the total learning result of the class. Besides, of integrating information from numerous dispersed sources. these breaks and the aggressiveness of some students towards the teacher prevent a considerable part of gifted One of the terms being most popular in the sphere of education is persons with the abilities of good educator from smart learning (SmL). At the first sight, it may seem that SmL is a choosing the profession of teacher for himself/herself. new stage of education satisfying the demands of KS. However, in 17 3. The negative consequences of students’ aggressive attitude towards their classmates may be very severe The aim of this paper is revealing to the designers of ITSs the (posting in social networks false information about a broad prospects of constructing a new generation of ITSs opened classmate, false erotic pictures, etc.) and even tragic in by cognitonics. More exactly, these prospects are opened by the cases of cyber bullying [21]. EIT-system [3-10, 12-15] (see also next section). The principal 4. In many cases, the attacks of young hackers against peculiarities of the discussed new generation of ITSs are to be as socially important technical systems may be explained follows: (a) taking into account EI of children as the basis for as a result of expressing the aggressiveness. The designing ITSs; (b) as a consequence, making much easier for intelligent power of applied computer systems is being children and adolescents the grasping of the pieces of theoretical permanently increased. That is why the negative materials to be learned; (c) for the majority of the systems consequences of the hackers’ attacks promise to be belonging to this new class, contributing to early socialization of increasing too. Taking this dangerous tendency into children. account, and, besides, the aggressiveness of some The structure of this paper is as follows. Section 2 sets forth a students towards their classmates and the teachers, a rationale for creating the foundations of cognitonics. Section 3 socially very significant task is to find the ways of sets forth a script (a collection of instructions) of designing an ITS making easier for the students the grasping of the pieces contributing to the socialization of young children. The system is of theory to be learned (there are reasons to believe that, based on using the world known fairy-tale “Sleeping Beauty”. very often, the experience of success in the process of Section 4 indicates the significance of using in the ITSs the learning eliminates the student’s aggressiveness). vocabulary and images extracted from young children’s speech. 5. In KS, many countries encounter the problem of Section 5 outlines the possible directions of future research. insufficiently developed social lifts. The following scientific fact says about the high significance of solving this problem: in 2. THE RATIONALE FOR FOUNDING A different strata of people living in one country, various gifts are distributed approximately in the same way. That is why it would NEW SCIENTIFIC DISCIPLINE – be important to have the situation when the adolescents from COGNITONICS different social-economic strata possessing the gifts being crucial for a certain socially significant profession (a medicine, a lawyer, etc.) would enter a university for mastering this profession. In early 1990s we started a study aimed at finding more effective Unfortunately, in many countries the real situation is quite ways of teaching and learning due to systemic basing on young opposite. E.g., it applies to UK. As it is shown in [16], the learners’ personal experience, including emotional experience Organisation for Economic Co-operation and Development accumulated, in particular, during the breakfasts and lunches, the (OECD) describes the United Kingdom’s troubling social walks in gardens and parks and along a river, while visiting mobility problems: more than 50% of youngsters will grow up to school and theatres, playing various games, sport activities, etc. have the same salary as their father [18]. The Sutton Trust[19] Our main motive was the feeling that educational potential of shows that 53% of the UK’s most influential people were young learners (5 - 7 years old) is much higher than it was broadly independently educated, including 24% of university vice- accepted to believe. As a key to more effective realization of this chancellors, 32% of Members of Parliament, 51% of medical potential, we saw the ways of establishing a correspondence consultants, 54% of top journalists, 70% of High Court judges between a piece of material to be studied and a certain fragment of when only 7% of the UK population are. the learner’s conceptual picture of the world. We called such During last twenty years, the intelligent tutoring systems (ITSs) correspondences dynamic conceptual mappings [4]. have been broadly used throughout the world for helping children In three - four years, we obtained several scientific and practical and adolescents to grasp theoretical materials. The big subclasses results of high social significance, and these results stood apart of ITSs help to study (a) second language (SL), (b) mathematics. from the principal trends in education of the 1990s and early However, one has been able to find in the literature only separate 2000s. It was done due to our original Theory of Dynamic examples of the systems oriented at developing the personality of Conceptual Mappings ( the DCM-theory) [4-6, 14, 15] and due to the learners. In particular, the interactive multimedia courseware the EIT-system, based on the DCM-theory. package CITRA is a tool for moral values education using The EIT-system is composed by (a) several complex methods traditional Malay oral narratives [17]. Two collaborative combing teaching/learning with the development of the student’s videogames described in [1, 2] not only develop mathematical and personality and (b) an original program of extra-scholastic language skills of the eight – ten year old children in Mexico but humanitarian education covering 12 years of continuous studies, also support and develop in Mexican children the skill of effective where the starting age is five – six – seven years. The system is collaboration in a team, hence develop social competence. aimed at systematic development of EI (personal competence and Our paper [11] introduces a new learning model (LM) called social competence), reasoning skills, sound creativity, language Student-Self Oriented LM (SSOL-model). Its principal skills, and communication culture at the lessons of language distinguished feature is basing on EI and developing EI of the (mother tongue and SL), literature and poetry in two languages learners. We believe that the SSOL-model may be interpreted as a (on the example of Russian and English), symbolic languages of paradigm for education in KS, i.e., as a paradigm of SmL in the painting, sculpture, garden-park art, classic dance. We do have expanded sense of this term. The SSOL-model has at least one accumulated the 27-year-long successful experience of using the successful implementation - the System of Emotional-Imaginative EIT-system in extra-scholastic education in Moscow, Russia [3-6, Teaching (the EIT-system), it belongs to the constructive core of 8, 12-15]. cognitonics, or the science about the human being in the digital We mean here, first of all, the following four scientific and world (see [7-10]). educational results that stood apart from the principal trends in education of the 1990s and early 2000s: 18 1. An original and effective method of information and smart society, and for supporting and developing supporting and developing figurative thinking of five-six- symbolic information processing and linguistic skills, associative seven year old children was proposed. Its essence is teaching and reasoning abilities of children and university students. young students to decode and to compose metaphors. This In October 2009, 2011, 2013, 2015, four international scientific method may be interpreted as the foundation of an original, conferences on cognitonics (Cognit-2009 – Cognit-2015) took many-staged method of developing creative thinking of place under the framework of the international scientific multi- young children and adolescents and realizing their Thought- conferences “Information Society” (IS-2009, IS-2011, IS-2013, Producing Self (the same mechanism does function in case of and IS-2015, Slovenia, Ljubljana, Jozef Stefan Institute). The both foreign language and mother tongue) [3, 6, 7, 15]. access to the proceedings of the conferences Cognit-2009 – 2. In the 1990s and 2000s, according to the Cognit-2015 is open, see https://is.ijs.si/proceedings.php. A part generally accepted methods of learning SL by young children of cognitonics-based scientific and practical results is presented in (five - seven year old), young learners were taught short the Second Edition of the International Encyclopedia of Social poems, songs, and the usage of fixed phrases in standard and Behavioral Studies [3]. communication situations. They didn’t generate speech from lexical units. Our original approach based on EI of children 3. A SCRIPT OF AN enabled us to teach young children to read complex texts in INTELLIGENT TUTORING English (fairy-tales) with understanding and to generate speech while discussing various situations. The speech of SYSTEM CONTRIBUTING TO children demonstrated the command of constructing EARLY SOCIALIZATION OF THE sentences in SL (English) in Present Simple and Past Simple LEARNERS tenses and building questions in Present Simple [4-6, 12-14]. 3. A discovery: the consciousness of five-six- year old children demands a very rich language for The analysis shows that the methods of cognitonics open broad representing the emotions from the pictures of nature [6, 8]. prospects for the development of a new generation of ITSs. Their 4. One of the most precious distinguishing principal distinguished features should be orientation at culture, at features of the EIT-system is no problem with discipline at developing EI of the learners. lessons. This applies both to the lessons with five-six-year New, culture-oriented scripts under the framework of cognitonics old and seventeen-year old students. This phenomenon is a may be divided into three main groups. consequence of highest cognitive engagement at lessons due Group 1: Socialization-oriented scripts. to the basing on EI of the learners [10]. Group 2. Improvement of the language (mother tongue and SL) as a tool of thinking in order to oppose the phenomenon of poor In early 2000s, we realized that it is possible and desirable to do language and, as a consequence, poor cognitive process, that is, an much more for the development of the child’s personality underdeveloped tool of constructing social reality. (reasoning skills and EI, including social competence) than it is Group 3. The scripts aimed at demonstrating the possibilities of broadly accepted to do throughout the world. This conclusion was expressing the same idea by means of different languages, for drawn in the context of numerous observed negative implications instance, by means of natural language and the language of of the Internet’s stormy progress and the globalization process painting. The goal is the development of the ability to see underpinned by it. something extraordinary in an ordinary thing or situation, to find a After thoroughly thinking over this situation, we came to the new look at an object of interest and to make a discovery, to conclusion that it is necessary to create a new scientific discipline develop the ability of processing serendipitous information. for combining the efforts of the scholars throughout the world for Let’s consider a script of a culture-oriented ITS based on the idea compensating negative implications for the personality of social conventions. The literary source of this script is the fairy- development of the Internet’s stormy expansion and for creating tale “Sleeping Beauty”. The script is associated with two aims. cognitive-cultural preconditions of successful personality’s The first aim is to explain how it is possible for the student to development. We suggested to call this new discipline escape in the life the meeting with the 13th fairy. It means not to “cognitonics” [7]. Later we interpreted cognitonics as the science make a person act in a provocative way. The reason is that such about the human being in the digital world. kind of behaviour would make harm both to an initiator and to a From the standpoint of educational practice, cognitonics proposes person. In case of the considered fairy-tale, a fairy turned into a an answer to the following question: what precious ideas and witch, because she could not cope with emotions and gave way to images accumulated by the mankind, at what age, and in what a hatred. The second aim is to develop the Ecological Self of the way are to be inscribed into the world's conceptual picture of a student. person in order to harmonize his/her intellectual and spiritually- Instruction 1 for the designers. coloured emotional development and to contribute to the Construct a dwelling (a hut, a castle, a palace, a cottage, etc.) successful development of national cultures and national appropriate for a King and a Queen and for the 13th fairy. languages? Put the dwelling into appropriate surrounding (garden, park, edge Cognitonics formulates a new, large-scale goal for the software of the forest, etc.). industry and Web science: to develop a new generation of culture- Choose the interior revealing the characters of the story. oriented computer programs and online courses (in the Choose the time of the day, the season. Dress the characters up collaboration with educators, linguists, art historians, and choose some occupations for them. psychologists) - the computer programs and online courses Instruction 2. intended for supporting and developing positively-oriented According to the logic of Instruction 1, create a big album creativity, EI, the appreciation of the roots of the national containing the photos of the characters in different situations. One cultures, the awareness of the integrity of the cultural space in the part of the photos adequately illustrates the life of the personages. 19 Another part falsely illustrates the actions of the personages (in ready to sacrifice the necessary things and not to have new such cases an action or situation contradicts the properties of the clothes, because they would not have the spindles to spin. character). Instruction 7. Motivate the students to select the photos for the album of each Preliminary stage. Ask five-six-seven-year-old children being character. The aim of this subsystem of the ITS is to develop the acquainted with the fairytale “Sleeping Beauty” to describe the ability of the student to correctly associate the actions of a preparations in the Kingdom to the birth of a princess. Construct a character with the essence of this character. collection containing all proposed creatures and their actions of Instruction 3. the kind. Create a subsystem motivating students to construct a dynamic Main stage. Ask children to select the creatures and their picture showing the extensive preparations in the Kingdom for the preparations to the birth of a princess. Christening Party. Step 1: The construction of a picture showing all kinds of the 4. CHILDREN’S SPEECH AS A living beings (in particular, the carpenter, the animals, and the SOURCE OF VOCABULARY birds) in the Royal Park. Step 2: Ask the student to select the living beings for active AND IMAGES FOR THE preparation for the Christening Party. DESIGNERS OF TUTORING Step 3: For each considered living being, select one of four-five actions. SYSTEMS Example. It is possible that for the birds a student will select the action “sing the songs”. The inner world’s picture of young children is very different from Instruction 4. the picture of adults. Young children have a vivid imagination, In general terms, the task is to realize the step explicating the and they easily go from the reality into the world of fantasy. That essence of social responsibility. The details of this step are as is why it is very important for the designers of ITSs to use in the follows. computer systems the vocabulary and images extracted from The King should be sure that every guest has received the children’s examples collected at the preliminary stage of invitation and has accepted the invitation. In order to be sure, the developing a system. King is to receive a confirmation from every guest that the guest We have collected, in particular, the following examples given by has received and has accepted the invitation. The violation of the children: rule leads to misunderstanding. In our case, the 13th fairy didn’t Preparation of gifts receive the invitation, though the King had sent an invitation, and (1) The gardener prepares fountains and flower beds; (2) the regarded the lack of invitation as a mark of disrespect on his part. carpenter makes the cradle shaped like (a) a swan, (b) dolphin Instruction 5. Explain to children how the violation of etiquette which always rescues, (c) see-shell in which the princess will be will mislead them. Preventing a violation of etiquette means not to like a pearl, (d) a flower which opens its petals at dawn; (3) the make a person act in a provocative way. The reason is that such beasts prepare (a) milk taken from forest plants, (b) pick up glow- kind of behaviour would make harm both to an initiator and to a worms; the birds sing songs; the kittens are purring a lullaby; the person. In case of the considered fairy-tale, the fairy turned into a baby-squirrels have picked up nuts; the mother-dogs are knitting witch, because she could not cope with emotions and gave way to mittens; the mother-squirrels are sewing the dresses for the dolls hatred. Consider possible examples. of the princess. Example 1. One meets a classmate but doesn’t greet him/her. It Preparation in the palace may lead to offense. (1) The birds are bringing in the beaks the field flowers; (2) the Example 2. One may take a pencil of a classmate without the chipmunks are bringing the baskets with drops of dew in order to permission. The classmate may become cross with him/her. water field flowers; (3) in the evening the star peeps through the Example 3. One may eat a cake without expressing his/her curtain to light the room; (4) the little angel descends in order to gratitude to a classmate. The classmate may think that he/she is fill the nursery with kind dreams and to kiss the princess good not polite. night. Example 4. When he/she does something wrong and doesn’t 5. 5. POSSIBLE DIRECTIONS OF apologize, then the classmate may think that he/she is rude with FUTURE STUDIES him/her. Example 5. When a classmate brings a mouse, though he/she The considered script allows us to get an initial impression about knows that the girl is afraid of mice, it means that he/she is selfish, the possibilities of using the methods of emotional-imaginative because he/she doesn’t take into account the peculiarities of the teaching as the basis for developing ITSs of a new generation. girl. This script may be compared with a single piece of a big, Instruction 6. The essence of this step is to construct the chains complicated mosaic picture to be created. The EIT-system revealing the behaviour of the character of the book who is provides original effective methods for designing ITSs solving the thinking and acting in terms of public good. following tasks: Example 1. The 12th fairy was attentive and ready to help, she - developing imagination, creativity by means of made up the situation and tried to make not only the princess but teaching to decode metaphors and invent metaphors; the whole kingdom fall asleep. The motive of the fairy was not to - contributing to early socialization of the learners on make the princess lonely when she woke. the example of etiquette as a social agreement Example 2. The people of the kingdom were ready to help, and (etiquette makes the behaviour of the humans they brought their spindles to the square to make a fire. They were predictable, it is very important for understanding 20 each other and in order not to heart the feelings of [10] Fomichov, V. A. and Fomichova, O. S. 2014. An people); Imperative of a Poorly Recognized Existential Risk: Early - making thrilling the mastering of SL grammar (on the Socialization of Smart Young Generation in Information example of English); Society. Informatica. An International Journal of - teaching the learners to integrate information Computing and Informatics (Slovenia). 38, 1, 59-70. dispersed in various sources and to establish time- causal relationships between the extracted facts; [11] Fomichov, V. A. and Fomichova,, O. S. 2017. The - revealing cross-culture differences for avoiding Student-Self Oriented Learning Model as a Paradigm for misunderstanding during communication. Supporting and Developing Emotional Intelligence and Creativity. In Informacijska druzba - IS 2017. Proceedings of 6. REFERENCES the 20th International Multiconference - IS 2017, Edited by V. A. Fomichov, O. S. Fomichova. Vol. Kognitonika/Cognitonics. [1] Craig, P., Roa-Seïler, N., Martínez Díaz, M., and Lara October 9th-10th, 2017, Ljubljana, Slovenia . Jozef Stefan Rosano, F. 2013. Assessing the Potential of Colaborative Institute, Ljubljana. Video Games to Improve Education in La Mixteca Region [12] Fomichova, O.S. 2009. Humanitarian Education – an of Mexico. In: Gams, M., Piltaver, R., Mladenic, D. et al. Answer to the Challenge of Time. Moscow University Press, (Eds.). Proceedings of the 16th International Moscow (in Russian). Multiconference Information Society – IS 2013, Slovenia, [13] Fomichova, O.S. 2011. The Unput Questions of Ljubljana, 7 – 11 October 2013. The Conference Humanitarian Education Moscow University Press, Moscow Kognitonika/Cognitonics. Jozef Stefan Institute; pp. 413- (in Russian). 417; https://is.ijs.si/archive/proceedings/2013/. [14] Fomichova, O.S., and Fomichov, V.A. 1996. Theoretical [2] Craig , P., Roa-Seiler, N., Martínez Díaz, M., and Lara foundations of a new method of teaching children effective Rosano, F. 2014. A Cognitonics Approach to Computer information processing. Informatica. An International Journal Supported Learning in the Mexican State of Oaxaca. of Computing and Informatics. 20, 3, 381-399. Informatica. An International Journal of Computing and [15] Fomichova, O.S., and Fomichov, V.A. 2000. Computers Informatics (Slovenia), 38, 3, 241-248. and the Thought-Producing Self of the Young Child; The [3] Fomichov, V.A. 2015. Conscious Control during British Journal of Educational Technology. 31, 3, 213-220. Childhood, Development of. In: James D. Wright (editor- [16] Kane, T. B. 2014. Using Cognitive Tunnels in a New in-chief). International Encyclopedia of the Social and Approach to Building Social Elevators in the Information Behavioral Sciences, 2nd edition, Vol. 4. Elsevier, Oxford, Society. Informatica. An International Journal of Computing 666-672. and Informatics (Slovenia). 38, 263-271. [4] Fomichov, V.A. and Fomichova, O.S. 1994. The Theory of [17] Mukti, N.A. and Hwa, S.P. 2004. Malaysian perspective: Dynamic Conceptual Mappings and its Significance for designing interactive multimedia learning environment for Education, Cognitive Science, and Artificial Intelligence. moral values education. Educational Technology and Society. 7, Informatica. An International Journal of Computing and 4, 143-152. Informatics (Slovenia), 8, 2, 131-148. [18] OECD. 2010. A Family Affair: Intergenerational Social [5] Fomichov, V. A. and Fomichova, O. S. 1995. The artificial Mobility across OECD Countries. In OECD, Economic Policy intelligence theory and highly effective methods of teaching Reforms 2010: Going for Growth, OECD Publishing. Doi: young children foreign languages. Cybernetica (Belgium, 10.1787/growth-2010-38-en Namur). XXXVIII, 4, 321-344 [19] The Sutton Trust, Educational Backrounds Reports, [6] Fomichov, V.A. and Fomichova, O.S. 1997. An http://www.suttontrust.com/our-work/research/professions/. Informational Conception of Developing the [20] US Public Health Service. 2000. Report on the Surgeon’s Consciousness of the Child. Informatica. An International General’s Conference on Children’s Mental Health: a national Journal of Computing and Informatics. 21, 3, 371-390. action agenda. Washington, DC., Department of Health and [7] Fomichov, V.A. and Fomichova, O.S. 2006. Cognitonics Human Services. as a New Science and Its Significance for Informatics and [21] Yasuda, H. 2009. An information system in school for a Information Society; Informatica. An International Journal risk management of the Internet: preventing cyberbulling of Computing and Informatics (Slovenia), 30,4, 387-398. without prohibitions. In M. Bohanec et al. (Eds.), Proceedings [8] Fomichov, V.A. and Fomichova, O.S. 2011. A Map of of the 12th International Multiconference Information Society - Cognitive Transformations Realized for Early Socialization IS 2009, Slovenia, Ljubljana, 12 – 16 October 2009. The of Children in the Internet Age. In M. Bohanec, M. Gams et Conference Kognitonika/Cognitonics. Vol. A. Jozef Stefan al (eds.). Proceedings of the 14th Intern. Multiconference Institute, 435-439; available online at Information Society – IS 2011, Ljubljana, 10 – 14 October https://is.ijs.si/archive/proceedings/2009/ 2011. Vol. A. The Conference Kognitonika/Cognitonics. Jozef Stefan Institute, Ljubljana, 353-357; available online at https://is.ijs.si/archive/proceedings/2011/. [9] Fomichov, V. A. and Fomichova, O. S. 2012. A contribution of cognitonics to secure living in information society. Informatica. An Internatinal Journal of Comouting and Informatics(Slovenia). 36, 2, 121-130. 21 To Fear or Not to Fear the TOR Communication System Ramzi A. Haraty M. Khan, M. Saddique, U. Imran Ahmad Department of Computer Pirzada, M. Zohaib, A. Ali, University of Engineering and Science and Mathematics B. Wadud Technology Lebanese American University, Peshawar, Pakistan Cecos University of IT & Beirut, Lebanon Emerging Sciences, Peshawar, imran221975@yahoo.com rharaty@lau.edu.lb Pakistan icrg.csit@gmail.com ABSTRACT To help protect everyday confidentiality by letting on the user to Whenever a user tries communicating with another recipient on be anonymous, Tor acts as an excellent system for those who want the Internet, vibrant information is sent over different networks to make outbound links that prohibit the use of certain protocols. until the information is intercepted or normally reaches the Tor is one of the best services which provide anonymity online recipient. Precarious information crisscrossing networks is usually [4]. It routes data, packed into equally sized frames, along a encrypted. In order to conceal the sender’s identity, different (cryptographically) secured path called onion routers. The routing implementations have proven successful - one of which is the follows the principles of CSN (circuit-switched networks), from invention of anonymous communication systems. There are many where the terminology is provided to Tor. Each router only knows anonymous communication systems developed but, the Onion the predecessor and successor. This is achieved by limiting the Router (Tor) is the greatest organized anonymous communication perspective of onion routers on a circuit, which in return gives a system, which offers online anonymity and privacy. There are a high level of anonymity. In every jump a “coating” of vast number of obstacles in security that have to be considered cryptography is removed or added which depends on the direction when deploying Tor. This paper thoroughly investigates and of flow. A client, who wants to connect to a remote server presents these security issues in Tor. anonymously, uses Tor as a proxy. All the connections and messages go through Tor first, then to the server. Thus, the client Categories and Subject Descriptors is hidden by the server because the server believes that the C.2: [Computer-Communication Networks]: Network connection is coming from Tor. The Tor system is made up of a Architecture and Design, Network Operations network of relays. Each relay is a volunteer machine. The client picks three relays from the network to form a circuit: the entry General Terms node, the middle node, and the exit node. The client establishes a Security connection with the entry node, then using the entry node as a proxy, extends that connection to the middle node, and finally, Keywords extends the same connection to the exit node. Currently, there are Tor, onion routing, design and non-design objectives, and security more than 500, 000 users in Tor and more than 6,000 relay nodes issues. [5]. At first sight, the anonymity of navigating through the Internet 1. INTRODUCTION may be used mainly by people with malicious intentions. However, the analysis shows that the real situation is much more Tor is a network of implicit channels that enables a user to complex. connect to a manager with heightened confidentiality via the Internet [1]. Remote hosts can be introduced by using Tor from learning a user’s location (IP address). The basic working of Tor The relative technical easiness of recording the navigation routes of numerous Internet users creates the preconditions of getting to is that it routes the outgoing connections from a client’s computer via “onion routers”. know and accumulating their interests of various kinds. This “To create a confidential structure - information may be used by malicious people (probably, acting passageway - with Tor, the software of the user/client increasingly with the help of intelligent robots) for inventing the ways of makes a circuit of networks, which are encrypted on the net making attractive for certain categories of Internet users some through the servers. The circuit, which is created, is then actions (purchases, donations, etc.) resulting in a considerable lengthened through one jump at a time and each server only damage for these users. knows from where the data is coming from and to whom will it be transferred to. None of the servers ever knows the complete path. That is why the use of anonymous communication systems like For each jump, the client uses a set of encryption keys, which are TOR protects very many Internet users from the attacks of people separate, so that each jump should not be traced as these links are with malicious intentions. As a consequence, the usage of TOR by passing through [2]. When a circuit is constructed, different forms normal people contributes to their harmonic existence in of data can be traded and different types of software (applications) knowledge society, and this corresponds quite well to basic can be utilized over the Tor network [3].The use of traffic inquiry objectives of cognitonics [6]. - to link the networks destination and source - cannot be done because in the circuit each server cannot see more than one hop, The premise of anonymity provided by Tor relies on the three (neither by an adversary nor a malicious server). relays used by the client to be non-colluding. Moreover, the 22 identity of the three relays used by a client to connect to a server The following are the design goals/non-goals of Tor: is hidden. If an adversary could somehow identify the three relays used by a client, this breaks some of the anonymity of the client as Goals(Table 1):Anonymous systems are designed for low– it reveals which three Tor relays the client chose, as after the Tor latency. Tor defends against attackers from connecting as relays in the circuit have been identified, and the identity of the communication companions and its users from connecting to client is also leaked. Thus, de-anonymizing the three relays used multiple communications. by a client is the first step towards identifying which client is communicating with which server. This has a colossal tremble on Table 1: Design goals of Tor Tor as the anonymity of any Tor user can be compromised [7]. Design Developments Open/simple Tor is open source; simple This paper takes a deeper look at Tor, and highlights its security protocol; with security and other open issues. The remainder of the paper is organized as parameters paving the way follows. Section 2 provides a background of Tor. The design and for its defense non-design goals are presented in section 3. Sections 4 and 5 Accessibility on different Tor is easily accessible on provide the research and open issues in TOR. And section 6 platforms different platforms (e.g., concludes the paper. Windows, Linux, Mac, etc.) Design is deployed Tor is deployed in the real 2. BACKGROUND world and volunteers are willingly making it possible The Onion Router (Tor), as depicted in Figure 1, is a circuit- Flexibility Tor’s flexible and well- based, low latency, overlay network which provides anonymity identified protocol makes it and privacy. It is the most deployed/available anonymous a hotspot for future research communication system in present era. Its users are in hundreds of thousands, e.g. military, intelligence agencies, journalists etc. and in more than 75 countries with over 6000, relays to provide online Non-goals(Table 2): Tor’s deployable and simple design left anonymity and privacy. The idea inside Tor is of "onion routing". unsolved questions, which need to be addressed. David Goldschlag, Paul Syverson , Michael Reed developed it in the mid-1990s. It is funded by the U.S. Naval Research Table 2: Non-design goals of Tor Laboratory. Work required in its design Protocol As like Privoxy or For anonymous communication anonymity over computer/internet Anonymizer, Tor does not is provided by Onion Routing (OR). Messages are encrypted and provide protocol then forwarded to nodes known as onion routers. A header is normalization peeled and the instructions for routing to next router are End-to-end attacks Traffic confirmation or performed. This process occurs in repetition. No initial node or end-to-end timing attack intermediate nodes know where the message is being passed send requires attention in the or received [8]. There are three nodes/relays in Tor as depicted in Tor community Figure 1: entry node, middle node, and exit node. As a Steganography Steganography is not communication system, there are four basic components in Tor: concealed in a Tor sender, receiver, onion routers and directory servers. network No peer-to-peer A Tor network is non- peer-to-peer 4. RESEARCH AREAS IN TOR The current areas of research in TOR include: Security: A traffic confirmation attack [10] is possible when an attacker is controlling the relays on both ends of a Tor circuit and comparing traffic timing, volume, and other characteristics. This makes it possible to locate that the two relays are in on the same circuit. If the first (entry guard)and last relays (exit node) know the direction of the destination and the source in the circuit, then together they can de-anonymize it, which demolishes the security of the data as well as the IP of the server and the destination. More work need to be done to avoid these types of attacks so that security is guaranteed. Confidentiality: Overall, Tor networks are susceptible to Figure 1.TheTor architecture [9]. numerous attacks. A path selection attack is an example of one such broad category of attacks. In Tor, the initiators choose the 3. DESIGN GOALS/NON-GOALS OF TOR nodes on the circuit so the last nodes cannot be combined. The length of the circuit is three by default. Because of this, latency is 23 kept to a minimum. This opens the door for connected attacks,  For the same path, routers should not be identical in a Tor which include congestion of the genuine Onion Routers to a point family. where they cannot require a fresh circuit to be built.  Un-valid or non-running router/relays are not selected. If their configuration is proper, then it is allowed to be The Tor last nodes pose a risk to confidentiality, since anybody connected in network. can offer to route a Tor node. An assailant would have full admittance of data which is being routed if the assailant occurs to route the last node in a circuit. While in MITM (Man in the 5. OPEN QUESTIONS IN TOR middle attack) [11] the exit nodes can similarly transmit attack by mentioning back a false text for the site the originator wants to The following is a list of open issues in Tor: join. * The previously discussed issues are based on active and passive Authentication: Each onion router keeps Transport Layer Security measurements (circuit latencies) as well as throughput estimations (TLS) connection with all other onion routers. Tor uses TLS for improving the performance of anonymous communication cipher suites with ephemeral keys. All TLS connections use short- channels provided by Tor. Work needs to be done on viable term ephemeral keys. Short-term ephemeral keys are Onion significance of new methods on security and anonymity of the encryption keys. Every onion router issues a router self-key. system. Moreover, directory servers keep a long term, authority self-key (stored offline) and a medium term authority signing key (3–12 * The Circuit Clogging Attack [16] can be used to identify all the months). The Onion Proxy does not have any identity keys. Tor Tor relays used in a circuit; however, it is an open question to uses a number of nodes located around the Internet to protect identify which of the relays are the entry, middle, and exit relays. users' privacy. It is important that originator can guarantee that his/her * There needs to be work done on the basis of onion proxies; communications with the many nodes is authenticated: if a i.e.,to prevent compromised onion proxies to send false malicious man-in-the-middle attack functioned or cooperated with information so that they can obtain high scores. Also needed is the one node to connect to the first node, then authentication is lost. maintenance of Tor performance when the mechanism for optimizing Tor node store and output mode reduces the choice of Performance: Many works have been done to improve the relay nodes. performance of Tor [12-13]. This led to improving the performance of Tor and moving it from a high latency to a low * Current algorithms may be modified to optimize performance by latency network. However, due to the constant processing of improving classification of the bulk traffic and considering cryptographic modules, Tor is slow in performing these actions. alternative strategies for distinguishing web from bulk For the improvement of Tor, more work needs to be done. connections. Additional approaches to rate-tuning are also of interest. For example, it may be possible to further improve web Anonymity: Tor is free of cost software for enabling online client performance using proportional fairness to schedule traffic anonymity. This feature makes it viable for users to search and on circuits. surf the Internet, making them untraceable (activity and location) by government agencies, corporations, or anyone else. However, * Reliable relay of information is very important for building more work is needed for improving anonymity (online) and paths with better performance; therefore, a Relay defending against attacks. Recommendation System (RRS) is needed for Tor to offer reliable relay material with better performance for building paths, ease Censorship resistance: Censorship circumvention systems such low-resource attacks, and enable operators to explore the as Tor are highly vulnerable to network-level filtering. Because compromises among anonymity and performance based on their the traffic generated by these systems is disjoint from normal needs. network traffic, it is easy to recognize and block; and once the censors identify network servers (e.g., Tor bridges) assisting in * The importance of the Tor network, as an online tool, is to circumvention, they can locate all of their users. Due to this, safeguard the confidentiality and to try to improve the Skype-morph [14] was introduced, but there is more work which performance of applications for interactive users. To do this, is needed to avoid the blocking of Tor relays/bridges. researchers proposed Personal Computer Transmission control Protocol or PC/TCP (IPsec over TCP for the circuit), a new Scalability: Tor’s insistence on deployability and simplicity of transport mechanism for Tor anonymous communication that design has led to the adoption of a clique topology and semi- allows you to design circuits protected by IP sec [17] TCP centralized directory that made the network model completely connection. There are some areas for improvement in this very visible to client knowledge. These properties cannot scale past a aspect. few hundred servers, but implementation experience will be useful to learn the relative importance of these bottlenecks. * The use of the path length is the key factor of path selection to provide flexible and easily deployed tunable options for users. It is Path selection/circuit creation: A Tor client initially contacts an open research to design more options utilizing more potential Directory Authorities to fetch the consensus. As a Tor client factors in Tor to provide fine-grained tunable functions. gathers information about existing relays, it tries to build circuit paths. The paths are created according to the following rules [15]: * Simple strategies are used to improve the selection method for relays with high bandwidth and TCP advertised window sizes.  The guard node should be the first node. Bandwidth is a key factor in Tor design and path selection. Anopen research question is to work on this inadequate balance in 24 the load distribution to enhance Tor circuit and the efficiency of Society. Informatica. An International Journal of Computing performance. and Informatics (Slovenia).Vol. 36.No. 2. P. 121-130. In (LASTor): A Low-Latency AS-Aware Tor Client, a technique [7] Haraty, R. and Zantout, B. 2014. The TOR data is used by agreeing on a value of 0 for low-latency and 1 for high- communication system. Journal of Communications and anonymity for parameter selection. An operator can select a Networks.ISSN 1229-2370. Volume 16, Number 4, pp. 415- suitable trade-off among anonymity and latency. An open research 420. question that needs to be further investigated. [8] Haraty, R. and Zantout, B. 2014. The TOR data * The nodes which are under the same person/organization are communication system – A Survey. In Proceedings of the called family nodes. There are many open research questions Sixth IEEE International Workshop on Performance regarding family nodes: examining Tor family’s influence, or Tor Evaluation of Communications in Distributed Systems and performance, availability and anonymity especially when family Web based Service Architectures (PEDISWESA’2014). nodes are under attack. Madeira, Portugal. Moreover, one needs to look deeper into Tor’s family mechanism [9] Tor - The Onion HTTP Router. Retrieved from and discovering potential family misconfigurations in the Tor http://tohr.sourceforge.net/ on July 10, 2017. network. [10] Murdoch, S. and Danezis, G. 2006. Low-cost traffic analysis 6. CONCLUSION of Tor.In Proceedings of the IEEE S&P, pp. 183–195. [11] Jansen, R., Syverson, P., and Hopper, N. 2012. Throttling Tor Tor isfree software which empowers censorship resistance and bandwidth parasites.In Security'12 Proceedings of the 21st provides online anonymity. In this paper, many research areas in USENIX Conference on Security Symposium, CA, USA, pp Tor were analyzed and described:performance, security, 10-18. anonymity, censorship resistance, scalability, and circuit creation/path selection. In recent years, Tor has become a research [12] Haraty, R. and Zantout, B. 2015. A collaborative-based hotspot in the anonymous communication systems research approach to avoiding traffic analysis and assuring data community. Future work involves conducting a detailed study to integrity in anonymous systems. Computers in Human compare Tor with other anonymous communication systems. Behavior Journal. Volume 51, Part B, pp. 780–791. 7. REFERENCES [13] Haraty, R., Assi, M., and Rahal, I. 2017. A systematic review of anonymous communication systems.In Proceedings of the [1] Dingledine, R, Mathewson, N. and Syverson, P. 2004. Tor: the 19th International Conference on Enterprise Information second-generation onion router. In Proceedings of the Systems, Porto, Portugal. 13thConference on USENIX Security Symposium- Volume 13. [14] Moghaddam, H. M., Li, B., Derakhshani, M., and Goldberg, I. 2012. Skype Morph: Protocol obfuscation for Tor [2] Reed, M., Syverson, P., and Goldschlag, D. 1998.Anonymous bridges.In Proceedings of the ACM Conference on connections and onion routing. IEEE Journal on Selected Computer and Communications Security, CCS’12, pp. 97- Areas in Communications– Volume 16(4), pp. 482–494. 108. [3] Syverson, P., Reed, M., and Goldschlag, D. 2000.Onion [15] The Tor System. Retrieved from routing access configurations. In Proceedings of DARPA http://tor.stackexchange.com/questions/113/how-does-a-tor- Information Survivability Conference and Exposition client-pick-tor-nodes-for-circuit-creation on July 5, 2017. (DISCEX 2000)- Volume 1, IEEE/CS Press, pp. 34–40. [16] Tin, C., Shin, J. and Yu, J. 2013. Revisiting circuit clogging [4] Acquisti, P., Dingledine, R. and Syverson, P. 2003.On the attacks on Tor. In Proceedings of the Availability, economics of anonymity, in Springer-Verlag, LNCS 2742, Reliability and Security (ARES) eighth International pp. 1-19. Conference, pp. 131 – 140. [5] The TOR Project. Retrieved from http://tor.eff.org/ on July 5, [17] Back, A., Moller, U., and Stiglic, A. 2001. Traffic analysis 2017. attacks and trade-offs in anonymity providing systems. In IH 2001, Springer-Verlag, LNCS 2137, pp. 245– 257. [6] Fomichov, V. A. and Fomichov,a O. S. 2012. A Contribution of Cognitonics to Secure Living in Information 25 Dilemmas Connected With Preservation of Contemporary Art Monika Jadzińska, PhD Department of Conservation and Restoration of Works of Art Academy of Fine Arts Wybrzeże Kościuszkowskie 37, 00-379 Warsaw, Poland Krakowskie Przedmieście 5, 00-068 Warsaw, Poland tel.: (+48 22) 625 12 51; fax: (+48 22) 622 96 49 monika.jadzinska@gmail.com ABSTRACT capable of moving them into another dimensions, and art is here a Art is a reflection, testimony and testament of its time. Re- great tool. Contemporary art has involved the audience to a evaluations that have taken place in the arts and in our daily life, greater degree, introducing a separate reality created by the artist; tremendous dynamics, diversity, and availability of new it requires interaction, it is founded in stimulation of all senses, to technology and materials have given artists the tools and leave an impression, experience, memory. Contemporary works capabilities they have never had before. Art ceased to be an object bond together, synthesize values of various disciplines: visual arts and theater (Tadeusz Kantor, Józef Szajna), stage design (Jerzy hanging on the wall or standing on the pedestal; through the use Grzegorzewski), provincial art (Władyslaw Hasior) and others. of various disciplines, it became a piece engaging the viewer, absorbing, stimulating all their senses. If we want such complex We experience synesthesia: a simultaneous perception of multi- art to survive, we must take proper care of its preservation. The sensory experiences, a perception of colors, sound, scent, space - paper presents the present standing of contemporary art, the role it in recent years taken up in neuroaesthetics research, inspired by plays, and why is it different form the traditional one. the cognitive science.1 Considerations included issues related to the change in technique, Turning away from the needs of an individual and looking more technology and materials, affecting its durability and, globally and prospectively, it could be said that culture and art consequently, the entire subject matter of care and conservation. have always been the reflection, testament, and legacy of its age, usually drawing on the full potential of the times. On one hand, General Terms reassessments that have taken place in the arts, on the other our Documentation, Performance, Design, Theory, Verification. daily life, tremendous dynamics, diversity, availability of new technology and materials presented artists with tools and capabilities they have never had before. The effects of their use Keywords determine our times. Art, preservation and conservation of contemporary art, modern materials, theory and practice of conservation 2. PRESERVATION OF CONTEMPORARY ART AS A CHALLENGE OF OUR TIME 1. INTRODUCTION Some reject contemporary art as overly hermetic, others say it so The times we live in are full of uncertainty, transitions in simple that "their kid would do it better". Many prophesy "the end ideological, ethical formats, prevalence and common acceptance of art", but it must be remembered that such a claim appeared of post-truths, post-politics, populism, virtual reality taking on the already on the occasion of the first exhibition of impressionists, actual one, the "liquid reality", as the Polish philosopher Zygmunt and then successively accompanied following genres of visual Bauman put it. What will remain of us? If there is something to arts. And art continues to be, reflecting civilization, technological remain, we should look after and take care of it now. This and social change. And it remains a major part of our cultural includes culture and art. Upbringing lacking constant contact with culture and art results not only in the terrible lack of taste in 1 everyday life, but also in a narrow perception of the world, the D. Folga-Januszewska, Synestezja jako proces. Jak lack of sensitivity, focus on material needs. Countries in which dokumentować i rekonstruować doznania? (Synesthesia as a every child has contact with art (for example, playing an process. How to document and reconstruct emotions? ), in: instrument) show a much higher rate of innovation and creativity, Sztuka w procesie/proces w sztuce. Ku nowej filozofii ochrony contributing to high development of individuals and the society as dziedzictwa kultury ( Art in the process/ Process in art. a whole. I believe that every person, regardless of the degree of Towards a new philosophy of the culture care), eds. I. Szmelter, education, social affiliation, or affluence, needs an aspect of life Wydawca Akademii Sztuk Pięknych, Warsaw 2016. 26 heritage. It ceased to be just an object hanging on the wall or standing on the pedestal, that evoked emotion or aesthetic pleasure, it began to absorb and engage the viewer. Artists started to use materials and measures that were not considered artistic or simply were not there before (e.g. plastics, multimedia). Figure 2. Contemporary art could be everything (light, sound, material) involving a viewer, Carsen Höller, Doubt (2016), Pirelli Hangar Bicocca, Milan, photo M. Jadzińska. 3. MATERIAL BODY OF ART This is of particular importance in the case of unconventional art or art made with materials that turn out to be less durable than traditional ones. Like plastics, known and used in every field of Figure 1. Old works of art are full of palimpsest, having its life for more than a hundred years, in art cause tremendous own history, painter unknown, Saint Antonii, XVI/XIX, photo problems due to their impermanence, bad state of preservation, M. Jadzińska. and terrible prospects for future. 3.1 Changing the technique and technology of Our ancestors are evaluated mostly by what they left behind. works of art and its impact on sustainability If we want the current and future generations to assess us and our In traditional art throughout the ages the rules of materials, times in terms of culture and art, we have to ensure their survival. technique and technology were rationally and systematically Conservation of modern and contemporary art has become a real improved, and artists' subordination to them ensured durability of challenge of our times. The extreme variety of means of their works. Since the end of the nineteenth century (and expression does not allow use of established rules. Cultural according to some researchers even earlier), the situation began to changes have generated new needs. New forms of art came into change, to change dramatically in the twentieth century. being, breaking away from the customary artistic disciplines in the Knowledge of the technique and technology, durability and sphere of ideas and their representation, as well as their immutability of material in the twentieth century began to be technology, materials and their durability. A work of visual art recognized by artists as unnecessary burden that inhibited their could then be everything: an object, but also a concept, creativity. Since the futurists non-durable materials got into use, performance, space, smell, taste, process, and could be created without reflection of the future of works developed with them. with anything, including materials which were intentionally or This happened even before - in 1881. Degas made his Little accidentally unstable, low quality, used in an experimental way or Dancer of Fourteen Years of wax, gauze, silk and hair. Of course, with no actual knowledge of their properties. such materials have been used in folk performances or, for example, in Spanish images of Madonna. However, beginning from the Cubist collage, artists adopted a program of inserting "scraps of everyday life", worn-out already at the time of being used by the artist. Such materials have had a dramatic effect on durability of the objects which already after leaving the studio exhibited signs of wear and tear, increasing over years due to improper conditions of storage, transport and exhibition. 3.2 Modern materials in art One type of materials used in art and presenting greatest conservation problems are the already mentioned plastics. Today artists reach for plastics more and more eagerly. A large number of works made in whole or in part of plastics can be seen at every major exhibition of modern and contemporary art, such as Venice Biennial (2013), Documenta in Kassel (2012), international art 27 shows in Basel. Objects involving plastics have been incorporated into major contemporary art collections (Tate Gallery, London), museums of art (MOMA in New York), or art and design (Victoria and Albert Museum, London, Pinakothek der Moderne, Munich), and private collections, where they constitute greater and greater share. Objects created from modern materials have also been present in public space. They have become a major part of our cultural heritage and a testament of social life over the last century. Artists appreciated diversity and application of plastics, such features as their plasticity, possibility to obtain a wide range of colors using different methods, transparency, and variety of forms - from foams and thin films, to plates of different thickness. They have used them as the main means of expression, as structural materials, but also in combination with traditional materials, such as wood, metal, plaster or stone. Often these combinations are destructive to objects (for example, a combination of plastic and metal). Seemingly plastics are a durable and resistant material, however Figure 3. The old art works’ conservation and restoration actually oftentimes they undergo ageing processes at a faster pace pertained to a material object of a particular stratigraphic than the traditional ones. Moreover, we know much less about structure, created according to established rules, photo M. them, and free use of plastics by artists can only raise legitimate Jadzińska. concerns about future of their works. Improper storage, transportation, and exhibition conditions, lack of knowledge and understanding of how these "young", and at the same time very Today we are confronted with objects that we can call "complex". sensitive materials are to be handled, contribute to the process of Complex art gives rise to many dilemmas. Some of them are destruction. Many valuable objects of art and design have already technical in nature, but a lot of them must be considered in terms disappeared and disintegrated. of ethics and philosophy. How should a work that is intended to self-destruct (objects from plants, ice and other ephemeral materials) be preserved? What about the authorship of an object 4. PROTECTION AND CONSERVATION made according to the artist's concept but not by the artist OF CONTEMPORARY ART themselves? How can we preserve performance art, land art, art Works of new art require protection both in their material, created using new, rapidly aging technology (time-based media) conceptual layer, but also in terms of the creator's intention, or materials that turn out to be dramatically unstable for future context, function, form, space, place, time, history and creation generations? How should we preserve "original" elements of a process. Therefore, analyzes and queries preceding conservation work when the artist mentions that at the next exhibition of a activities are indispensable. The ephemerality of works of work, some or all of them (as is often the case with installation contemporary art and their processual nature require a different art) can be replaced? The current theory and practice of approach and careful archiving of works. Conservation of conservation mainly refers to the traditional arts. contemporary art is complex in nature. 4.1 Dilemmas related to the protection of works of contemporary art In the old art conservation pertained to a material object of a particular stratigraphic structure, created according to established rules, from the best possible raw material, known or at least identifiable one. The assumption that works of art are stable comes from the Renaissance, along with a belief in the "original condition" of the object, despite the fact that the object over many centuries could have undergone radical and multiple changes. Figure 4. Today we are confronted with objects that we can call "complex" art of works. Tadeusz Kantor, Umarła klasa (Dead class), 1975/89, photo M. Jadzińska. 28 4.2 Paths for modern conservation and . restoration The complexity of contemporary art is a big challenge for 6. REFERENCES conservators. Environment, assemblage, kinetic art, installations, [1] Bauman, Z. 2000. Liquid Modernity, Polity Press, performance arts, and video require separate conservation Cambridge. procedures. These works are often unconventional, they result [2] Richmond, A. and Brecker, A. (eds). 2009. Conservation, from experimental artistic concepts, and their matter is made of Principles, Dilemmas and Uncomfortable Truths, non-durable materials or ready-made items. The protection of new Butterworth-Heinemann as an inprint of Elsevier&Victoria art requires a broad recognition of the work in both material and and Albert Museum, London. conceptual terms, and determining its value. A modern approach [3] Hummelen, Y. 2005. Conservation Strategies for Modern must be adapted to the nature of the work and allow for and Contemporary Art. Recent Development in the preservation methods such as making replicas, reconstruction, Netherland, Cr 3. emulation or re-enactment. Therefore, taking care of contemporary art calls for empowering the conservator to involve [4] http://nacca.eu/research-projects/contemporary-art- in recording, conserving, curating and ensuring integrity of works conservators-and-curators/. and their compatibility with the author's message. [5] Innovation Union scoreboard, European Commission, Conservators, often thoroughly educated, with extensive European Union 2013. experience, fluent in modern methods and technologies, try to [6] Scholte, T. and Wharton G. (eds.). 2011. Inside Installation. prevent degradation of a monument (conservation) and restore its Theory and Practice in the Care of Complex Artworks, artistic and aesthetic value (restoration). They adhere to the Amsterdam University Press, Amsterdam. established paradigms, impartially maintain the matter within the [7] Jadzińska, M. 2012. „A Big Work of Art.” Authenticity, care, object, apply the rule of minimal intervention, refute replacement conservation, (“Duże dzieło sztuki”. Autentyzm, zachowanie, of original parts, and retain the postulate of reversibility of all konserwacja sztuki instalacji), Universitas, Cracow. treatments. In the case of modern visual arts, this is not always the goal. These unconventional, conceptual and physical hybrids [8] Jokilehto, J. 1995. Authenticity: A General Framework for make routine conservation practices irrelevant. They require the Concept. In Nara Conference on Authenticity in Relation thorough insight and interpretation based on holistic research to the World Heritage Convention. Proceedings, ed. Larsen, using tools and instruments of chemistry, biology, microbiology, K. E. Unesco World Heritage Center, Nara. material science, history, history of art and culture, and other [9] Saving the Now, Crossing Boundaries to Conserve sciences and the humanities. Contemporary Works. 2016. IIC Los Angeles Congress Preprints, Studies in Conservation, Supplement 2, London. 5. CONCLUSION [10] The impact of culture on creativity. A study prepared for the Culture and art, in times of globalization, conflicts, the sense of European Commission (Directorate- General for Education danger, the omnipresence of modern technology and the virtual and Culture). 2009. KEA European Affairs. world, appear as a value for us, and a trace of our times for future generations. Not indispensable, but necessary. As Jean-Paul Sartre said: "Art is indeed not the bread, but the wine of life," and wine and art must be properly taken care of. 29 A Cognitonics Methodology for Artificial Persons Thomas B Kane Centre for Creative and Social Informatics Edinburgh Napier University 10 Colinton Road, Edinburgh +44 131 455 2668 t.kane@napier.ac.uk ABSTRACT can be established between natural persons (humans) and artificial Organisations (artificial persons) such as Facebook and Google, persons (organisations)[13]. This paper will explore the use organizational intelligence to offer social networking possibility of global ICT companies developing their own platforms for free, alongside for-profit business services for cognitonics methodology so that their business activities and businesses who wish to influence the users of their networks. products can be monitored in such a way as to allow any While many customer-influencing activities are essentially imbalances in societal development to be addressed, while at the same time protecting the company’s harmless, there are a few, such as the process of influencing a own financial security. person’s voting intentions during an election campaign, where the We ask if it would be possible for artificial persons to adopt a activity becomes a matter of concern for such disciplines as cognitonics methodology, particularly in pursuit of three key cognitonics. This paper will explore aspects of the organizational goals of cognitonics[9]: intelligence of Facebook over the years 2014-2017, where it 1. Resisting the preference for commercial values over developed tools in algorithmic artificial intelligence and applied human values, them in electoral voting settings, and will propose a means of introducing a cognitonics methodology for organisations in the 2. Resisting the subordination of national cultures to information society. globalization, 3. Recognition of the importance of emotional and General Terms spiritual values in the human condition. Management, Measurement, Reliability, Experimentation, We hope to show that it would be remiss for global ICT artificial Security, Human Factors. persons not to adopt a cognitonics methodology. 2. A NEED FOR COGNITONICS IN Keywords SOCIAL NETWORKING BUSINESSES Organisational intelligence, cognitonics, artificial person, We will look at the organisational intelligence of Facebook over information society, Chinese Room. the years from 2014 to 2017, as presented by Chief Executive Officer, Mark Zuckerberg, in his quarterly earnings call 1. INTRODUCTION transcripts In his 2014 transcript Mark Zuckerberg described 3, 5 and 10 year plans for Facebook[14]: Incorporated (embodied) Business Organisations are created by societal legal instruments: the owners of the business 1. Over the next three years, our main goals are around (shareholders) are declared, and the business organisation’s rights continuing to grow and serve our existing communities and obligations as a person under the law are established. and businesses and help them reach their full potential; Consequentially, the business organisation is recognised as a 2. “Over the next five years, our goals are around taking person under the law: an artificial person. Shortly after our next generation of services, Instagram, Messenger, incorporation, an artificial person develops its own organisational WhatsApp and Search and helping them connect intelligence: its ability to comprehend and use knowledge that is billions of people and become important businesses in relevant to its business purpose. Organisational intelligence[1]– their own right.” [4] is the possession of an artificial person; is constructed from 3. For the next 10 years our focus is on driving the many contributory elements, procedural, algorithmic and human; fundamental changes in the world that we need to and is creatively interpreted and used[5]–[7]. With organisational achieve our mission, connecting the whole world, intelligence a personhood emerges[8]: artificial persons understanding a world with big leaps in AIs and individuate, self-organise, and affect the world around them as developing the next generation of platforms, especially they pursue their business interests and serve their customers. in computing. In 2016, two elections that were surprising to general observers - Cognitonics [9] has been applied to areas of child development the Brexit vote of June 2016, and the US presidential elections of [10] and harmonic development of the personality [11]. November 2016 - saw criticisms levelled at Facebook for its new Regarding cognitonics for organisations, there has been some Artificial Intelligence tool, Facebook for Politics, which allows work on how organisations can work to improve harmonic human real-time targeting of custom chosen audiences. The tool works by development in education[12], and how a harmonic relationship addressing each targeted custom audience member’s 30 psychological profiles to achieve a cognitive change in the tool that has been the source of speculation regarding the 2016 person’s voting intentions. A premium is attached to altering the United States of America presidential election. The tool is voting intentions of users on social networks who have followers provided by Facebook and requires high-level information with who they will then influence. In his 2017 Q2[15] results which it can work. presentation meeting, Zuckerberg said, “Now you can put a creative message out there, and AI can help you figure out who will be most interested. A lot of the time you don't even need to The stages of application of the tool involve: target now because AI can do it more precisely and better than we 1. A political campaign (artificial person) compiles an email list of can manually. This makes the ads that you see more relevant for voters which it would like to target – this is absorbed into you and more efficient for businesses. Those are just a few of the Facebook as a “custom audience”. The custom audience is reasons why I'm optimistic about how AI is going to improve our delivered to Facebook along with any other information that the core services over the next few years.” campaign may have on each individual voter, such as what their There are questions that have been raised regarding the ethics of political habits are, what their real name is, their address, phone allowing businesses to influence voters in national elections. numbers, etc. This is the “intelligence” which the political Those questions become more difficult to explore when we are campaign has already gathered on the people they wish to faced with the black-box algorithms of companies such as influence. The intelligence on each individual is merged with the Facebook and Google who have business reasons for protecting knowledge that Facebook has accrued. This connection gives their proprietary AI algorithms. At the same time, people need to political operators access to some of the various forms of be able to discursively unpick unacceptable practices of such psychological knowledge that Facebook has of members within tools. We will explore how to deal with such systems. the Facebook universe. Custom audience members may be placed somewhere on the Openness-Conscientiousness-Extraversion- 3. FACEBOOK AND CHINESE ROOMS Agreeableness-Neuroticism (OCEAN) scale. Facebook will share Searle’s Chinese room Searle task-specific access to its knowledge while endeavoring to keep [16](p115) says: other valuable information of the Facebook Universe from the “Imagine a native English speaker, let’s say a man, who knows no political customer. This information, along with other AI tools can Chinese locked in a room full of boxes of Chinese symbols (a data be used to identify such things as who are the political influencers base) together with a book of instructions for manipulating the in the custom audience, and to make recommendations for ad symbols (the program). Imagine that people outside the room send content (based on psychological profiling) that will have in other Chinese symbols which, unknown to the person in the maximum impact on each custom audience member. room, are questions in Chinese (the input). And imagine that by 2. At the second stage, Influential contact is established with the following the instructions in the program the man in the room is custom audience members, in 2014 this was via a Facebook able to pass out Chinese symbols which are correct answers to the Exchange advertising tool (FBX), and since November 2016, a questions (the output). The program enables the person in the Dynamic Product Ads (DPA) interface tool. At this stage there is room to pass the Turing Test for understanding Chinese, but he does not understand a word of Chinese.” a real-time working together of the custom audience influence packages with the social networking activity of targeted customer In Searle’s room, the key activity is in translating text with audience members for the purposes of influencing each as agreed semantic integrity, and the person inside it is merely an operative. in the customer-sales agreement between Facebook and the Searle’s task was to show that no intelligence is encompassed in a political campaign. This work takes place over the time that is computer program which employs algorithmic artificial allocated to the campaign, and may take place over the whole intelligence to solve a language translation problem. election campaign, with reports being delivered to the business customer intermittently. 3. At the completion of the influencing period, a final report on the work that was done in the Facebook Universe along with evidence of change activity over the period of the campaign is presented. This information becomes part of the voter information which the campaign has amassed on the candidates which it has on their list. Although Facebook encrypts this data and does not maintain it after the duration of the commercial contract, the data passed to the political campaign, and consequently any person the political campaign shares the information with, could be used as the basis of further influential work in a related business area. Our observation is that each of these stages describes a Searleian Figure 1: Translating by Following Rules and Using Signs Chinese Room type of cognitive activity, and each may be a firm Searle argued that an embodied algorithmic artificial intelligence focus of philosophical inquiry. There are difficult philosophical could not be considered a minded-entity. The concern here is with and ethical issues to be explored, and all three stages involve a another type of room, one that has been prepared by high degree of organisational intelligence (the intelligence of the organisational intelligence. We will focus on a Facebook tool artificial person), which is designed to be of the organisation, and which has been used to alter the voting intentions of customers to for which no individual person is responsible. Wherever the room in democratic elections for the purposes of fulfilling a algorithmic artificial intelligence is used, it is scaffolded by the business model. Consider for a moment the political targeting organisational intelligence. 31 perspective, while not causing an organisation any compromise of Organisational intelligence may be the most successful form of its proprietary technology. artificial intelligence that is operational in the world today, and we Some fundamental questions for explorations of Chinese-Style- will adapt Searle’s metaphor to view Facebook activities, with its Rooms: voter product[17], in Cognitonics terms. 1. What is the Internet to companies such as Facebook? Is it a room? A workspace, only? Should companies 4. ARTIFICIAL PERSONS, CHINESE working in human spaces be forced to observe norms ROOMS AND COGNITONICS and laws of human interactivity? That being said, how The organisational intelligence that we have become concerned open should an organisation such as Facebook be with is non-human, subtly-embodied, perfectly reasonable regarding the operation of problematic Chinese-Style- intelligence, applied for the benefit of various businesses, and Rooms? may be very difficult to address except poetically. The difficulty 2. Organisations have been designed to have limited of addressing this organisational intelligence aside, it is clearly financial liability – they are now achieving limited more embedded within the real-world than algorithmic artificial cognitive liability. How can we personalize the intelligence is. activities of companies such as Facebook to ensure that liability for inappropriate business behavior is accepted? We explore how Facebook’s organisational intelligence can strike Regarding algorithms, how can we granularise the right balance between respecting people as voters, algorithmic activity sufficiently so that we can explore guaranteeing them the space to make up their own minds on the human dimensions of tools that manipulate the election issues, and the company determination to support a cognitive intensions of large numbers of mostly business organisation or network that wants to influence the unsuspecting people who use Facebook for other voting intentions of individuals on mass. purposes. We also ask how, in the face of a large-scale error in human 3. Although translating languages is interesting. Should harmonic development, an organisation such as Facebook could some human activities (such as electoral voting) be off- humanely address the issue and seek to remedy any harm that may limits to businesses who accrue profits from social have been caused as a consequence of its business activity, networking activities in digital business environments? organisational intelligence or corporate tools. There is a larger question of what are the social networking activities where it is not appropriate to allow business activities to interfere with their In the first instance, a philosophical basis for a methodology of development? If a discussion were to take place of cognitonics for an organisation Cogitonics might be: questions such as this, how best could an appropriate 1. Information and communication technologies (ICTs) are discursive setting between a global company such as being developed and deployed extremely quickly and Facebook, its users and other societal stakeholders be have been penetrated pervasively, not only into every facilitated? Would the stakeholders be represented by workspace, but also into every societal space and every appropriately constructed artificial persons? family environment; 4. Who would be in the appropriately constructed artificial 2. it is morally responsible and ethical for an artificial persons? And how could we ensure that it’s person to engage the power of modern ICT in order to organisational intelligence would be sufficient to the promptly address any negative distortions in society that task in hand and powerful enough to be heeded? How are ICT-induced, and to comprehensively disseminate could a global organisations legitimate business effective methods to compensate for those distortions, purposes be protected and encouraged alongside healthy wherever they appear: either in personality development human development? or in the evolution of national cultures throughout the 5. How could we disentangle the relationships between information society. governmental executives and busineses for the benefit of ordinary people? What human body could take on such a task of overseeing difficult discussions between With a philosophical background in place, it would now be business artificial persons and societal artificial valuable to explore how work could be done. As a company such persons? Would it be the United Nations? Or the Red as Google (with its search engine) and Facebook with its dynamic Cross? Or would some other global body be required? advertising products, perform their functions while not allowing a casual user access to the details of the algorithms that are 5. CONCLUSION involved, they are effectively building advanced algorithmic tools We have looked at the exciting period of artificial intelligence which only allow input/output access, in the same way as Searle’s development in the organisation of Facebook over the period Chinese Room does. Searle’s Chinese Room paradox has a 2014 to 2017, and have found there to be relevant Cognitonics particular attraction in this regard. We will describe any hidden questions to be raised over the use of tools to alter voter intentions algorithm which performs a human-like function as one that is during election campaigns. As a consequence, we have explored embedded in a Chinese-Style-Room. how Cognitonics might offer a set of principles for an It seems clear that some of the activities that take place in such organisation to follow that would allow them to pursue their rooms can be much more impactful than the task of translation legitimate business interests while safeguarding the harmonic that was envisaged by Searle. Consequently, we need to be able development of human beings and national cultures. to look at some of the actions of the room from a Cognitonics 32 6. REFERENCES Smart Young Generation in Information Society. Informatica. An International Journal of Computing and Informatics (Slovenia). 38, 1, 59-70, 2014. [1] G. Cohen and R. Kotorov. Organizational Intelligence: [11] V. A. Fomichov and O. S. Fomichova. A How Smart Companies Use Information to Become More Contribution of Cognitonics to Secure Living in Competitive and Profitable. Information Builders, Inc., Information Society. Informatica. An Internatinal Journal 2016. of Computing and Informatics (Slovenia). 36, 2, 121-130, [2] M. Hoefflinger. Becoming Facebook: The 10 Challenges That Defined the Company That’s Disrupting the World 2012. . New York, NY: AMACOM, 2017. [12] T. B. Kane, David and Leviathan: forming cognitive [3] G. Hofstede, G. J. Hofstede, and M. Minkov. Cultures and tunnels between classrooms and artificial people in the Organizations: Software of the Mind, Third Edition, 3 real-world. Informatica. , 38, 455–459, 2014. edition. New York: McGraw-Hill Professional, 2010. [13] T. B. Kane, Beginning to Live Poetically in a World of [4] J. Martin. Cultures in organizations: three perspectives. Near-Cognitive Organisations. In Informacijska druzba - New York: Oxford University Press, 1992. IS 2015. Proceedings of the 18th International Scientific [5] H. W. Chesbrough, Open Business Models: How To Thrive Multiconference Information Societry - IS 2015, October In The New Innovation Landscape, 1 edition. Boston, 12th-13th, 2015, Ljubljana, Slovenia, 2015, 42–46. Mass: Harvard Business School Press, 2006. [14] A. Shontell, ‘Mark Zuckerberg Just Revealed His Grand Vision For The Next 10 Years Of Facebook’, [6] J. Elton and A. O′Riordan, The Healthcare Disrupted: Next Business Generation Business Models and Strategies, 1 edition. Insider, 29-Oct-2014. [Online]. Available: Hoboken, New Jersey: John Wiley & Sons, 2016. http://uk.businessinsider.com/zuckerbergs-3-5-and-10- [7] P. Jaros, A Double Life: Personifying the Corporation from year-facebook-plan-2014-10. [Accessed: 06-Sep-2017]. Dartmouth College to Poe. Poe Stud. , 47, 4–35, 2014. [15] S. A. Transcripts, ‘Facebook (FB) Q2 2017 Results - Earnings Call Transcript’, [8] M. H. Bickhard. The emergent ontology of person. In The Seeking Alpha, 27-Jul-2017. Psychology of Personhood, J. Martin and M. H. Bickhard, [Online]. Available: Eds. Cambridge: Cambridge University Press, 2012, pp. https://seekingalpha.com/article/4091008-facebook-fb-q2- 165–180. 2017-results-earnings-call-transcript. [Accessed: 06-Sep- [9] V. A. Fomichov and O. S. Fomichova. Cognitonics as a 2017]. New Science and Its Significance for Informatics and [16] R. A. Wilson, The MIT Encyclopedia of the Cognitive Information Society. Informatica. An Internatinal Journal Sciences, New Ed edition. Cambridge, Mass.: MIT Press, of Computing and Informatics(Slovenia). 30, 4, 387–398, 2001. 2006. [17] C. Cadwalladr. The great British Brexit robbery: how our [10] V. A. Fomichov and O. S. Fomichova. An Imperative of a democracy was hijacked. The Observer, 07-May-2017. Poorly Recognized Existential Risk: Early Socialization of 33 Logical Characteristic of Analogy and its Classification Joonho KIM Department of International Relations Tokyo International University Matoba 2509, Kawagoe, Saitama, Japan joonho@tiu.ac.jp ABSTRACT When the general is applied to the particular, it is called deduction. When the particular is included in the general, then it is induction. Analogy has a distinct logical structure, which has been ignored. In The statement is the linkage between the particular and the general, this paper, analogy is reinterpreted as the synthesis of typical and we can build the inference table out of this linkage between two inference forms. By this analysis, three kinds of analogy are characteristics (Table 1). confirmed, and under these criteria several examples of analogy are classified into each category. Thus we can get broader Table 1. Inference table understanding of the analogical thinking. Y X Particular General Particular analogy induction Keywords General deduction Induction, deduction, logic, classification of analogy Analogy is, in a sense, the induction of one particular into the other particular. But it has the characteristic that it is necessarily mediated 1. INTRODUCTION: THE MEANING OF by the intervention of meta element. The essential characteristic of induction is the probability of the ANALOGY premise-conclusion relation. And that of deduction is the necessity. The identity sign (=) is one of the greatest inventions in human Intrinsic problem of analogy is that this probability is necessitated. intellectual history, because it reminds us of oneness of more than In other words, it is justified as the probability. It contains the two seemingly different things. And the same evaluation can be possibility of error in the premise-conclusion relation, and it has the applied to the sign of similarity (  ). The concept of ‘not the same content which is probable, as much as the error is excluded. This is but similar’ expands itself beyond that of identity to almost the possibility as well as the limitation, of the inference from the everything in nature and society. The universe is overlapped by particular to the particular.Therefore, in the analogic possibility are similarity. concealed logical probability and necessity. Analogy is about everything, for everything has some similarity to Analogy is the relevance of two entities as the whole and the parts. other things, from certain points of view. So that analogy can be As the result, it has the significance of structuralism: the whole used as general method of thinking which can explain a lot of consists of the parts and the parts have its meaning in the whole. phenomena around us. Similarity of the whole results in the correspondence of the parts. Analogy, as a way of thinking, is a logic based upon similarity, but Therefore, in analogy, similarity is the necessary condition of it seems to have been thought to be illogical and unscientific; correspondence, and correspondence is the sufficient condition of analogy is analogy, which is about two similar things, nothing more the similarity. or less.It gives us impression something like an intuitional In analogy the total recognition precedes.Without the intuition of correspondence from one thing to the other things. And it gives us Knower (in Figure 1) that X (Known) and Y (Unknown) are only a rough, and at best, a comparative understanding through similar1, analogy does not begin. Total similarity relates to the similarity. generality of Knowledge. Basic principle of analogy is that specific Nevertheless it is a logic and the synthesis of logics. In the similarity has the general commons. Here commons which mediate background of analogy, two typical concepts of logical inference the similarity is called meta. are structuralized about which no other studies had made clear Knowledge explanations. In this paper, I try to expand the logical characteristic of analogy, reasoning with inference rule, with simple figures. I suggest conceptual, structural character of analogy as the logic, which is shown in [3] by applying the basic concepts of the particular and Known( X) Unknown( Y) the general, as well as deduction and induction, and classify it into three categories with their examples. 2. THE LOGIC OF ANALOGY Knower 2.1 Logical characteristic of analogy Figure 1. Knowledge structure related to analogy Logic is the character of the statement, which can be used to judge true or false.According to Kant, judgement is the inclusion of the particular in the general. It is movement from premise ( X ) to conclusion ( Y ). The premise and the conclusion can be particular 1The term ‘whole’ is always only comparative (I. Kant) [4]. as well as general. . 34 2.2 Derivation of analogics2 analogy appear. Let’s call them analogy of the 1st kind, the 2nd kind, and the 3rd kind. Here we generalize the relationship of known – As was shown by Kim[3], the logical process is drawn in Figure 2. unknown in the 3rd kind, to that of base – target, so that Y can be X  A is inductive process, which has the movement from the redefined as known. As the result, Table 2 shows the classifications particular to the general. And A  Y is the deductive process, of three kinds of analogy and their characteristics. And in the which has the movement from the general to the particular. And figures below, the real line depicts the real movement, and the finally, this process is concluded as X  Y , which seems to show broken line depicts the metaphorical movement. the movement from the particular to the particular. I try to confirm the logical structure of analogy described above, A through several examples. These shows the proofs of general existence of particulars which have the meta logic in the 1 2 background. Here examples are classified according to the 3 kinds of analogics. All the examples of classified analogic objects are X Y synthesized in Table 3. 3 Table 2.Classification of analogy Figure2. The logic triangle Classification X Y Characteristic 1st kind Known Unknown Discovery These logic vectors in the triangle are written, as below. 2nd kind Known Unknown Adaptation 3rd kind Known Known Comparison 1 2 3 X   A  Y  X   Y This logic triangle is derived by using the method of elimination. 3.1 Analogy of the 1st kind (Heuristic Here the two objects, X and Y , are basic starting points as the known and the unknown. By mediation of the meta elements, the discovery=creative adaptation) relation of the three is established. Analogy of the 1st kind is heuristic. X is the known and Y is the unknown. We add A to X and The general principle constructed by induction process 1 is adapted Y to make the logic triangle.Then there appear 6 relationships to Y (process 2), to reach a new conclusion which results in a between these three elements ( A : the general, X and Y : the creative discovery or prospectas process 3: X  Y (Figure 4). particular). The arrows designate these relationships. As the result Here the unknown element is decided by the known fact. it produces 6 relations between the three points. Each has the The similarity of the two objects results in the similarity of premise and the conclusion. The starting point of the arrow is the structures, and the structure of the objects makes the logical premise, and the end point is the logical conclusion. correspondence of the elements possible. The movement 3 is possible, but the reverse direction Y  X This can be called heuristic, because it includes a creative problem cannot take place, because from the unknown to the known cannot solving. be deducted or inducted. Logic vector 1 is the abstraction X  A , which is inductive.ais the deduction A  X . 2 is the deduction A  Y .b is the A induction Y  A, which is impossible because induction from the unknown cannot be imagined. 1 2 So finally there remains the flow of 1, 2 and 3, because a is meaningless in this flow from X  Y , unless X and Y are X Y 3 known objects of comparison. We can have the logical relations as in the Figure 3. Here the analogy of the two objects, X and Y , Figure 4. Analogy of the 1st kind is logically completed. The examples of the 1st kind are listed below3. (1) Heuristic problem solving A Proportional correspondence of elements in the structure gives a solution for the unknown. Heuristic problem solving is the typical a b creative adaptation of analogical reasoning. 1 2 (2) Habitable zone in planetary systems 3 X Y A planet far from us is the unknown world. But this terra incognita c can be recognizable by expanding the facts and principles of the known, the earth. Figure 3. Logical possibilities Recently, we get many new information from astronomers, which show that similar physical or chemical conditions gives us the confidence there will be a possibility of life on the planets outside 3. THE CLASSIFICATION OF ANALOGY our solar system. Human being may be able to make a practical decision to send people to Mars, based upon the analogical AND ITS EXAMPLES conclusion that it is habitable. We cannot deduct (abstract) from the unknown, so that the direction (3) Concilience or interdisciplinary adaptation of theories of X  A  Y is determined. And when we adapt logical Economics and physics are similar in that they belong to applied character in comparing the two similar structures, three kinds of mathematics and the principles of physics are often adapted to economic theories. For example, price elasticity in economics resembles the elasticity 2 I suggested new terminology “analogics” in [3] to emphasize the laws in physics. Here price changes result in the change of demand logical aspects of analogy, which has the composite logical characters in the background, as well as to evade the confusion when using “analogic”, the adjective form of analogy. 3 Some of these examples are explained fully by Kim in [3]. 35 or supply quantity, and the size of this change is called the price structure, which shows similar patterns. elasticity of demand or supply. This is similar to the principle of The same pattern exists beyond big or small. So small structure is elasticity between force and the change of matter in physics. The adapted to the big one, this is adapted again to the bigger one. two disciplines share mathematical rate of change as the meta principle. 3.3 Analogy of the 3rd kind This kind of interdisciplinary similarity also forms the base of the concept ‘concilience’. (Comparison=deductive confirmation ofinductive principle) 3.2 Analogy of the 2nd kind Analogy of the 3rd kind is comparative. This is different from the 1st (Adaptation=metaphorical interpretation) and 2nd in that it is not the relation between the known and the Analogy of the 2nd kind is adaptive. unknown. It is the expansion of the Figure 2. Here Y is reinterpreted as known. Two facts are known and have a common This kind has the characteristic of the 1stkind, but it has rather metaphoric interpretation than creative conclusion (Figure 5). principle, which is inductively confirmed. The 2nd kind is different from the 1st kind, in that it has little to do This kind is mutual recognition of the two known objects. This is inductive inference to find a common principle or structure.This is with the problem solving, but it widens and deepens our understanding of the unknown.Adaptability is the essence of both aposteriori recognition that general principle is adaptable crossly to the 1st kind and 2nd kind, but the division line between them is the other (Figure 6). Therefore X and Y are compared, as the result to confirm whether they have creative finding or not. their similarity under the principle A . Here A in Figure6 is the relationship between objects of A comparison and it means the basic concern of the observer. We can find one general in many particulars as below. 1 2 X Y A 3 a b 1 2 Figure 5. Analogy of the 2nd kind 3 X Y c (1) Parables and fables Figure 6. Analogy of 3rd kind Parable explains the metaphysical religious truth, using the daily episodes. It has analogical reasoning between the truth and the (1) Analogy in physics story. It goes without saying that a parable with the story is easier Two physical phenomena have their own uniqueness. and softer to understand than mathematics. Phenomena of different world are linked by the commonality of the Buddhist “Poor woman’s lamp”and Christian “Widow’s mite” have flow in general. Material characteristics are different, but the meta the same structure and are summarized in a mathematical ratio, principle of flow is applied generally. which emphasizes more devotion than donation. Poiseuille’s Law of water flow, and Ohm’s Law of electric current Fables have structural similarity between animal world and the can be analogized to each other ([2] Gust et al.).Flow and current human society. The truth is given by the animal story with human are in general the same, regardless of their material particularity. wisdoms, which are experienced mainly in nature world.The goose (2) Golden ratio with the golden egg, the sun and the northwind, the hare and the The fraction below is called the golden ratio, which is found in many tortoise and the ant and the grasshopper are famous titles of Aesop’s natural, artificial creations. This number symbolizes the beautiful, fables.Fables have the same effects as religious parables. stable structure of those phenomena. This parable and fables are has successive structure: heaven - human world - animal world. And all these three worlds have the 𝑎 + 𝑏 𝑎 = = φ ≈ 1.618 truth which is similar to each other. Religious truth is explained by 𝑎 𝑏 human episode, and human world is paraphrased by animal words Flower petals, seed heads, pinecones, tree branches, shells, spiral and deeds. galaxies, hurricanes, fingers, animal bodies, DNA molecules4 are (2) Historical drama and contemporary politics some examples. People have expressed their political opinions through metaphoric How can φ of the shell be the sameφ of the sunflower. How can criticism for centuries. In many authoritarian states in the world, the Fibonacci number be common to all these different phenomena? historical drama or films express metaphorically the reality of No one particular object can explain the others, because they are contemporary politics by showing the historical facts of ancient, different. But by observing those objects we can abstract one medieval or modern eras, because the direct criticism of the definite number. This deepens our understanding of nature. This is government of the time is dangerous. the utility of the 3rd kind analogy, but the artificial adaptation of Here main figures of drama correspond to the contemporary this ratio in art or construction,in pursuit of beauty and function, politicians, and the flow and composition of the events in the past can be interpreted as the 1st kind. resemble the actual political structure in contemporary world. And (3) Exchange rate and turbulence the viewers of the drama guess their political situation. Hydrodynamic turbulence and foreign exchange market have the It is often heard that history repeats itself. This proverb itself similar elements and structure, in spite of the specificity of energy testifies the analogy of historic event in a new, modern version, in and information [1], which are the elements of flow in each reality or in drama. environment. Here information is metaphorically energy. (3) Fractal analogy A fractal is the structure which is similar in various levels of scale. This means that in spite of the differences of scale, there exists one 4http://www.livescience.com/37704-phi-golden-ratio.html 36 is as follows: 4. CONCLUSION: THE SIGNIFICANCE OF 1. It confirms again the meaning of logical characteristic of analogy, which is suggested in [3]. ANALOGICAL CLASSIFICATION 2. The classification is based upon the logical structure, not by Analogy is a creative thinking with a strong logical structure. It is approximate sorting of facts, based upon the simple principle: everything is similar. This means 3. By clarifying the distinction of analogy groups, the logical again that analogy is a general method of thinking. application of analogic function can be more effective. The fundamental task of analogy is; how a particular makes other More precise application of analogy based upon this classification particular possible, epistemologically. In other words, how can we will lead to scientific use of analogical thinking. find the significance or the meaning of a particular, in other particulars. So that analogy is quite important in itself beyond the 5. REFERENCES logic or inferential process. It is a fundamental way of questioning [1] Ghashghaie, S., Breymann, W.,Peinke, J.,Talkner, P. and Dodge, and method of how we see the things. Y. 1996. Turbulent cascades in foreign exchange markets, The significance of analogy lies in that everything in the world is Nature, Vol 381. similar. We find ourselves in others. We are not different from [2] Gust, H.,Krumnack,U.,Kühnberger, K-U., Schwering, A. 2008. others. From one fatherhood (meta theory) comes the brother and Analogical reasoning: a core of cognition, KI Zeitschrift sister. Analogy means this brotherhood and sisterhood of things. Künstliche Intelligenz, 1/08. Similarity means not the same. A thing consists of the common of [3] Kim, J. 2015. Analogics and its cognitive efficiency, and the different from others. Everything exists as diversity, Proceedings of the 18th International Multiconference, because it is not duplicated like clone, but it has something in Information Society - IS 2017. Vol. F: Kognitonika/Cognitonics. common. Analogy is based upon this coexistence of diversity and Oct. 12th-13th, 2015, Ljubljana, Slovenia . Jozef Stefan commons. Analogy is a philosophy as well as a logic. This Institute, .Ljubljana, 47-50. philosophy of analogy is universal, and so we face every day with [4] Magee, B. 1998. The History of Thought, Dorling Kindersley. the new similar things.And the logical structure of analogy, which was emphasized in this paper, signifies that the thinking of similarity is scientific. The significance of analogical classification suggested in this paper Table 3.Summary of analogy classification and the examples Classification Phenomena X Meta principle Y heuristic problem 1stkind known fact Common problem structure unknown fact solving e.g.) known elements of e.g.) unknown 1stkind geological heuristics Common geological structure triangle elements of triangle science interdisciplinary principle or science 1stkind consilience e.g.) physics common intellectual structure e.g.) economics 2ndkind parable human episode truth religious lesson 2ndkind fable animal society similar situation of daily life human society 2ndkind metaphor Indirect expression common semantic structure reality Common morphological 2ndkind fractal small form large form structure contemporary 2ndkind historical drama past events,history political, socialstructure political situation 3rdkind physics electricity flow water flow natural or social 3rdkind golden ratio natural or social phenomena φ ≈ 1.618 phenomena exchange rate 3rdkind economic physics turbulence flow movement 37 Virtual Personal Psychosocial Counsellor Jana Krivec Matjaž Gams School of Advanced Social Studies Jožef Stefan Institute Gregorčičeva 19 Jamova cesta 39 5000 Nova Gorica, Slovenia 1000 Ljubljana 0038641772778 (+386)(1) 4773 644 jana.krivec@fuds.si matjaz.gams@ijs.si ABSTRACT help, there is a big discrepancy between the initial state and the number of people who successfully finish therapy. Moreover, Mental health issues deriving from stress are ever more present in people may not seek help due to the inaccessibility, especially if the lives of many people. However, due to lack of knowledge, they live in a remote, rural area, far from a therapist’s office. Next, stigmatization and high price of counselling, people often do not scheduling, money, physical challenge, conflicting relationships, seek professional help and problems remain unsolved. One or misconceptions may also keep people from seeking help [17]. possible solution is an affordable and discrete professional Last but not least, searching for therapy outside the medical sector psychosocial support. This paper presents an attempt to provide can be tricky due to a vast number of unprofessional counselors. help through a virtual assistant named OSVET, based on expert Addis and Mahalik [1] showed that strategies based on problems knowledge and artificial intelligence algorithms. The assistant is as a normal part of one’s life enable an easier approach in seeking capable of online personal counselling for people with stress help to resolve them. Online psychosocial help is one of such overload. The application consists of an initial stress level strategies. diagnosis, detection of users’ typical mental errors, personalized professional counselling dialogue, appropriate tasks definition and psychoeducation. The application is human-friendly using natural 1.1 Online psychosocial help language communication. We anticipate that such assistance will For decades, people live part of their lives virtually with increase encourage more people in need to start solving their mental in recent years since virtual worlds have reached the mainstream. distress, since it will be easier to come up with appropriate In particular, younger people using their smartphones and tablets professional personalized treatment. Finally, this approach will for all of their social interactions live a substantial part of their life hopefully decrease the stigma of mental health care in society. effectively online. In relation to stress, for many people the Internet feels more private and helps them get past the barrier of General Terms stigma to seek help through e-therapy. In 2001, eighty percent of Algorithms, Documentation, Performance, Design, Security, Internet users or about 93 million Americans, have searched for a Human Factors. health-related topic online [3]. There are several different online facilities regarding psychological help. They can be classified in Keywords the following categories: Virtual assistant, psychosocial help, cognitive behavioral therapy, 1. Virtual communities: self-help groups on the internet, where artificial intelligence. the psychosocial topics are widely spread, e.g. AYAs or 7 Cups of Tea online support encourages members of the 1. INTRODUCTION community to exchange emotional and informational support, coping with difficult emotions through expression Most humans experience some amount of stress during our lives, [14], [31]. Tinyurl [27] is one of successful self-help whether at work, relationship issues, fears and phobias, etc. While platforms, encouraging people to seek for help at some of stress is not harmful, prolonged or intensive stress can depression. cause harmful consequences. According to Krivec and Suklan [13], 94,8% of Slovenians have experienced a state where a 2. E-therapy and adjunct services: counselling platforms, psychosocial professional help would be needed. If distress is not where a large net of counsellors perform different kind of treated properly and in time, it can cause serious psychological therapies using virtual tools. Services are typically offered conditions and mental health disorders that can affect daily lives. via email, real-time chat, and video conferencing with However, many of those in need do not receive the deserved professional psychologists in place of or in addition to face- treatment. One of the main reasons for this is stigma. Researches to-face meetings [16]. Examples of a good practice are [4], [13, 28] revealed that nearly two-thirds of people who need [24], [5] [21]. The formation of the International Society for mental health care never get it mainly because they are too Mental Health Online (ISMHO) was a milestone in the embarrassed to make in-person contact with a psychotherapist development of e-therapy [11]. incorporated into the medical system. According to Krivec and 3. Computerized therapy virtual assistant: In this case the Suklan [13], 60,5% of the interviewees think that computer is playing an active role in delivering the clinical psychotherapeutic practice should be widely accessible in societal content. There are several ways of computer activities: facilities and not incorporated into the medical system. Stigma a. Self-Help: The rules encapsulate clinical knowledge and also affects therapeutic process. Even if people find professional are used to deliver targeted interventions. Adding more 38 and more decision points and pieces of personalized depression. A virtual coach “Shelley” incorporates content, the computerized “self-help book” is getting patient education materials and uses conversations to thicker and more accurate. Eventually, each reader takes help the user make decisions and change behavior. a unique path through the book based on their own idiosyncratic mental profile. This, in a nutshell, is one of 1.2 Efficacy and benefits of online the key ideas behind computerized therapy [19]. There psychosocial help are several such applications already developed, such as A growing body of research on online counseling has established Mood Tracker – a mobile application that allows users the efficacy of online therapy with treatment outcomes being to self-monitor, track and reference their emotional similar to traditional in-office settings [16]. Researches [2, 7, 9, experiences; PTSD Coach – provides opportunities to 23, 29] showed that in the medium term, online psychotherapy find support and tools that can help users manage the yields same or even better results than conventional therapy. stresses of daily life with PTSD; LearnPanicCBT – self- Cristina Botell and her colleagues [20] confirmed the efficacy of treatment for panic disorder that is based on Cognitive using virtual reality in psychotherapy. Client satisfaction surveys Behavioral Therapy (CBT) principles; Stress Check - also tend to demonstrate a high level of client satisfaction with provides users with an overall stress score that online counseling [8]. In a recent survey of over 400 clients of illuminates their current level of stress; Cognitive Diary online therapists, more than 90% responded that working with a CBT Self-Help - helps to recognize thinking that therapist on the Internet helped them [17]. interferes with achieving your goals in life and how to change that thinking. Benefits of online psychosocial help: b. Virtual reality therapies: use computer demonstration of - allows the patient to attend sessions at a higher rate than reality most often to perform virtual exposure therapy traditional sessions and reduces the number of missed for different kinds of anxieties and phobias, e.g. fear of appointments [10] flying. Examples of such applications are: Virtually - good for clients located in areas under-served by traditional Better, Psious, VirtualRet, Mimerse [25]. counselors (such as rural area) or for disabled that traditionally under-utilize clinical services [16], for clients c. Robots: they are used as a human computer interaction who may have difficulty reaching appointments during such as Paro - a therapeutic robot in the form of a baby normal business hours [6] harp seal developed by The National Institute of - therapy in person is more likely after using e-therapy Advanced Industrial Science and Technology in Japan Change [6] showed that 64% of the persons moved on from to comfort dementia sufferers to increase their e-therapy to consult a therapist in person motivation, reduce stress of the patients and their - beneficial for young people, who are keen using computers caregivers and stimulates interaction between patients or intelligent phones. and caregivers [18]. - cheaper and thus more affordability d. Avatars: they are based on communication between - reduces social stigma human and computer in natural language. ELIZA is one - anonymity encourages people to disclose their problems, of the earliest and most well-known programs that emotions, thoughts or sensitive information. Patients admit attempted to act as a therapist and provide Rogerian that they feel less judged by the virtual therapist and more psychotherapy. Because Rogerian psychotherapy open to him/her, especially if they were told that (s)he was primarily encourages clients to talk more rather than operated automatically rather than by a remote person [15] engaging in a discussion, ELIZA takes the users text and - enhanced content: computerized therapy can incorporate rephrases it, putting the focus back on the user and more than text on a screen. The programs can be rich in encouraging him/her to talk more rather than multimedia content, with images, videos, animations, audio conversing. This approach works for some clients but voiceovers, and interactive exercises. A well-designed quickly becomes frustrating and useless. It might be treatment program can be a very compelling user worth mentioning that the version of ELIZA, developed experience. in our department, was among the most often visited in - virtual reality is a protected environment for the patient, the world. The reason was found years later – it mixed where one can deal with the feared situation in secrecy. replies from users online at the same time. Unfortunately, it was treated as non-privacy-preserving 2. Virtual stress assistant OSVET and eliminated as a consequence. Unlike ELIZA, a newer chat bot Ellie was able to talk about herself and 2.1 Scope generate a conversation rather than only rephrasing the The scope of our solution, called “OSVET”, is to help people in responses it received. Ellie’s aim was to treat people distress. It combines virtual community, e-therapies and avatars. It with depression and veterans with post-traumatic stress includes screening of the distress severity level, following by disorder (PTSD). The program recognizes facial personalized self-help and psychoeducation. The human-computer expressions and analyzes audio and posture to formulate interaction (HCI) is performed with communication in natural its response and adjust its tone. Nonetheless, Ellie was language, which gives the user a feeling as if she/he is interacting far from being able to provide the kind of understanding with a real human. In case of severe mental health issues, users a human therapist could [15]. More recent applications are encouraged to proceed to e-therapy or seek in person therapy are MoodKit [26] that helps the user identify and and appropriate contacts are provided to the user. With such an change unhealthy thoughts and chart the user’s state of approach we believe stigma will be reduced and people in need mind and Woebot [30] which uses CBT to reduce will get a pleasant experience searching for help, which will further encourage them to increase care of their mental health. 39 conversation. There is also an option for the user to pass initial screening and continue directly to conversation with 2.2 Basic assumptions virtual assistant. - Combination of several therapeutic techniques: OSVET - Cognitive distortion identification: CBT typically focuses uses screening of the user state, psychoeducation, self-help, on a specific problem, helping the patient to identify, communication with virtual assistant using natural language recognize and change disturbing thought patterns and and implements e-therapy if necessary. feelings that are leading to negative or destructive beliefs - Personalization: based on the information provided by the and behaviors [22]. In OSVET we identify the following 12 user, OSVET provides personalized answers, instructions common cognitive distortions from the users’ problem and assignments. description: - User friendly HCI: besides conversation in natural o Mental Filter: dwelling on the negatives and language, user experience is enriched with information ignoring the positives. about the stress overload issues, cognitive distortions, o Disqualifying the Positive: insisting that the user’s exercises, etc. accomplishments or positive qualities don’t count. - Safety: OSVET is based on the personalized o Overgeneralization: viewing a negative event as psychoeducation, which is safe and positive in nature. When never ending pattern of defeat. cognitive error is classified by OSVET, user is asked to o Catastrophizing: blowing things way out of confirm the assumption. If there is no confirmation, OSVET proportion or shrinking their importance asks for the clarification before moving to further steps. If inappropriately. higher level of stress or more serious mental issue is o Personalization: blaming oneself for something one detected, users are redirected to in person therapists. Last was not responsible for, or blaming other people and but not least, the content of the OSVET is designed by overlooking ways that the user’s own attitudes and experts in the field of psychosocial counselling. behavior might contribute to a problem. - Cognitive behavioral therapy (CBT) approach: OSVET is o Fortune telling: arbitrarily predicting things will based on CBT approach. This approach was chosen because turn out badly. it is one of the leading therapeutic approaches to dealing o with distress overload and anxiety disorders. Previous Mind reading: the user assumes that people are researches show that it is most suitable approach for reacting negatively to the user when there is no algorithmic delivery style and for counselling with virtual evidence for it. assistant [19]. Kessler et al. [12] showed that online CBT is o Shoulds and Oughts: criticizing oneself or other as effective as traditional "in-person" therapy for the people with “Shoulds” or “Shouldn’ts”, “musts”, treatment of depression. “oughts”, “have tos” and similar offenders. o Emotional Reasoning: reasoning from how one feels: “I feel like an idiot, so I really must be one.” 2.3 OSVET architecture Or “I don’t feel like doing this, so I will put it off.” o Global labelling: identification with one’s shortcomings. For example, instead of saying “I made a mistake”, the user says “I am a jerk”. o Low frustration tolerance: think one cannot (and shouldn’t have to) tolerate situations and conditions that are found frustrating. When a particular mental distortion is detected with the use of artificial intelligence algorithms, the user is asked to confirm the avatar’s classification. If the user confirms it, (s)he is further guided to the appropriate personalized dialogue for the detected distortion. If the user does not confirm the way of thinking that avatar proposes, avatar asks the user to describe in detail the mental problem and the loop repeats. - Personalized dialogue with adequate assignments: When the user’s problem description is classified into one of the Figure 1. OSVET architecture. above cognitive distortion and confirmed by the user, one of - Assessment: OSVET first makes a screening of distress level the prepared scenarios, i.e. flexible sequences of dialogs is based on the simple questionnaire. If the level is low, it executed. It includes: provides some encouraging statements, directs the user o Psychoeducation: to educate users about the towards simple relaxation techniques and reassures the user distorted way of thinking and representing the world that the mental state is normal. If the level of distress is is obviously of value. extremely high, the user is directed to get help with in o Emotional support is given, i.e. inceptions which person therapist and suggests an adequate counsellor encourage the users to deal with his/her problem and according to the detected problem. If there is medium gives him/her hope to find a solution. distress level, virtual assistant continues with personalized 40 o Guided self-help: OSVET guides users to think and decreasing stigma and promoting mental health hygiene in global analyze their way of thinking and mental society. representation. Several different therapeutic techniques are used such as paraphrasing, active listening, etc. 5. ACKNOWLEDGMENTS o Assignments: at the end of the conversation, The OSVET project was co-financed by the Ministry of assignments with instructions are presented to the Education, Science and Sport and the European Union through user. the European Social Fund. Our thanks to Talk Through, o Redirecting to adequate in person counsellor if information systems, d.o.o., mentors and students who cooperated necessary. in the OSVET project. We would also like to thank the research team: Aleš Tavčar, Miha Mlakar and Gregor Grasselli. Data gathered throughout conversation are anonymously saved in databases and regularly checked by the experts. If there are signs of misdiagnosis or inappropriate further dialogue, experts correct 6. REFERENCES it and thus OSVET is improving constantly. [1] Addis, M.E. and Mahalik, J.R. 2003. Men, masculinity, and the contexts of help-seeking. American Psychologist, 58, 5– 14. Angermeyer, M.C., Matschinger. 3. OSVETS BENEFITS AND [2] Andersson, G, Cuijpers P, Carlbring, P, Riper, H, and DISADVANTAGES Hedman, E. 2014. Guided Internet-based vs. face-to-face Main benefits of the OSVET online counselor are constant cognitive behavior therapy for psychiatric and somatic accessibility to all people in need, discreetness and safe, disorders: a systematic review and meta-analysis. World professional, personalized treatment, based on natural language Psychiatry, 13, 3, 288-295. DOI=10.1002/wps.20151. communication. As such, OSVET reduces stigma and encourages [3] Bestcounselingdegrees: people in distress to search for help, leading to better mental www.bestcounselingdegrees.net/online/ health in global society. [4] Betterhelp: www.betterhelp.com/counselor_application There are also some disadvantages of the OSVET solution: The rapport is limited since the therapist cannot see the user, and thus [5] Brakethrough: www.breakthrough.com cannot interpret facial cues, voice tone and body language. It is [6] Change, T., and Krumboltz, Y. 2001. Process and outcome questionable if emotional depth achieved through written words evaluation of an on-line support g, andoup for Asian can be as deep as in person therapy. There is a particular risk of American male college students. Journal of Counseling misdiagnosis. Even if safety is one of OSVETs main assumptions, Psychology, 48, 3, 319–329. DOI=10.1037/0022- there can still potentially be negative consequences when a system 0167.48.3.319. fails to understand emotions and incorrectly filter information [7] Cohen, G.E., and Kerr, B.A. 1998. Computer-mediated during sensitive, high-stakes conversations. As such one should counseling: An empirical study of a new mental health be aware of the fact that online counselling does not entirely treatment. Computers in Human Services, 15, 4, 13–26. substitute in person therapy. DOI=10.1300/J407v15n04_02. [8] Dongier, M., Templer, R., Lalinec-Michaud, M., and 4. CONCLUSION Meuneir, D.1986. Telepsychiatry: Psychiatric consultation OSVET is developed as an online psychosocial help solution for through two-way television: A controlled study. Canadian people in distress. The basic idea is derived from the fact that Journal of Psychiatry, 31, 32–34. many people experience stress in their everyday life, but because [9] Fitzpatrick, K.K., Darcy, A., and Vierhile, M. 2017. of stigma they don’t seek professional help. Besides, people are Delivering Cognitive Behavior Therapy to Young Adults becoming more attuned to, and more dependent on technology in With Symptoms of Depression and Anxiety Using a Fully everyday living. It seems inevitable that counseling will be Automated Conversational Agent (Woebot): A Randomized affected by the technology. Therefore, our goal was to develop a Controlled Trial. JMIR Ment Health, 4, 2 (Jun 6, 2017) first stage of psychosocial help, which is accessible, professional DOI= 10.2196/mental.7785 and personalized, and user friendly. This innovation in psychosocial counselling is based on combination of artificial [10] Glueckauf, R.L., Fritz, S.P., Ecklund-Johnson, E.P., Liss, intelligence and distance technology with elements of traditional H.J., Dages, P., Carney, P.2002. Videoconferencing-based psychotherapeutic techniques, e.g. expert knowledge stored in the family counseling for rural teenagers with epilepsy: phase 1 form of scenarios. The approach could be beneficial in several findings. Rehabilitation Psychology, 47, 1, 49–72. DOI= fields, for students and pupils under distress, career counselling, 10.1037/0090-5550.47.1.49. etc. If this kind of solution will gain on popularity, counselor [11] ISMHO: http://www.ismho.org education is likely to be affected significantly. Many challenges still lie ahead, including clinical, legal, technological, assessment [12] Kessler, D., Lewis, G., Kaur, S., Wiles, N., King, M., Wich, and ethical issues, but we believe counselling solutions such as S.,Sharp, D.J., Araya, R., Hollinghurst, S., and Peters, T.J. OSVET can be accepted as a useful clinical tool, if only 2009. Therapist-delivered internet psychotherapy for appropriate monitoring and connection is established with real depression in primary care: a randomised controlled trial. therapists. In time, such solutions will encourage more people to The Lancet, 374, 9690, 628–634. DOI=10.1016/S0140- start to resolve their mental health issues and consequently 6736(09)61257-5. PMID 19700005. 41 [13] Krivec, J. and Suklan, J. 2015. Vpliv stigme na odnos do psihološke pomoči. Raziskave in razprave, 8, 3, 4-62. [14] Love, B., Crook, B. Thompson, C.M., Zaitchik, S., Knapp, J., Lefebvre, L., Jones, B., Donovan-Kicken, E., Eargle, E., and Rechis, R 2012. Exploring psychosocial support online: a content analysis of messages in an adolescent and young adult cancer community. Cyberpsychol Behav Soc Netw, 12, 10 (October 2012), 555-559.DOI=10.1089/cyber.2012.0138. [15] Lucas, G. M., Gratch, J., King, A., Morency, L-P. 2014. It’s only a computer: Virtual humans increase willingness to disclose. Computers in Human Behavior, 37 (August 2014), 94-100. DOI=10.1016/j.chb.2014.04.043. [16] Mallen, M. J., Vogel, R., and Day, S.X. 2005. Online Counseling Reviewing the Literature From a Counseling Psychology Framework. The Counseling Psychologist, 33, 6, 819–871. DOI=10.1177/0011000005278624. [17] Metanoia: www.metanoia.org/imhs/alliance.htm [18] Parorobots: www.parorobots.com [19] Psychcentral: psychcentral.com/lib/computerized-therapy- will-your-next-therapist-be-a-computer [20] Rus-Calafell, M., Gutiérrez-Maldonado, J., Botella, C., and M. Baños, R.. 2013. Virtual Reality Exposure and Imaginal Exposure in the Treatment of Fear of Flying: A Pilot Study Behavior Modification, 37, 4 (July 2013), 568–590. [21] Samaritans: www.samaritans.org.uk [22] Somers, J., Matthew, Q. M. 2007. Cognitive behavioural therapy. Electronic resource. Vancouver, B.C. : Centre for Applied Research in Mental Health and Addictions (CARMHA) [23] Suler, J. 2000. Psychotherapy in cyberspace: A 5 dimensional model of online and computer-mediated psychotherapy. CyberPsychology & Behavior, 3, 2, 151–160. DOI=10.1089/109493100315996. [24] Talkspace: www.talkspace.com [25] Techcrunch: https://techcrunch.com/2016/01/06/virtual- reality-therapy-treating-the-global-mental-health-crisis/ [26] Thriveport: http://www.thriveport.com/ [27] Tinyurl: tinyurl.com/6ben7o [28] U.S. Department of Health and Human Services. Mental Health: A Report of the Surgeon General. Rockville, MD: U.S. Department of Health and Human Services, Substance Abuse and Mental Health Services Administration, Center for Mental Health Services, National Institutes of Health, National Institute of Mental Health, 1999. [29] Wagner, B., Horn, A.B., Maercker, A. 2013. Internet-based versus face-to-face cognitive-behavioral intervention for depression: A randomized controlled non-inferiority trial. Journal of Affective Disorders, 152-154, 113-121. DOI= 10.1016/j.jad.2013.06.032 [30] Woebot: http://woebot.io/ [31] 7 Cups of Tea: https://www.7cups.com/ 42 Cognitive Computing Within the Evaluation Process Dijana Liverić Juraj Vrzan Ljubinka Gjergjeska Polytechnic of Rijeka Polytechnic of Rijeka Faculty of Computer Science and Trpimirova 2/V Trpimirova 2/V Engineering 51000 Rijeka, Croatia 51000 Rijeka, Croatia University of Information Science and +385959124152 +385915285277 Technology dliveric@veleri.hr jvrzan1@veleri.hr "St. Paul The Apostle" Partizanska bb, 6000 Ohrid, Macedonia (FYRM) +389 46 511 585 ljubinka.gjergjeska@uist.edu.mk ABSTRACT to remain competitive, investment that increases the quality of business processes, products, services and employee’s efficiency The evaluation process is one of the key components of education as well as the one that increases the quality of knowledge and business in general, and therefore it is of utmost importance acquisition in educational institutions, becomes crucial for further to determine the optimal evaluations system as well as its development. In this context, the prevailing way of observing and methods. The main research objectives of this paper are to analyzing the progress and system features is evaluation. determine how performance evaluation rating systems increase Evaluation is a process that critically examines a program. It employee productivity and the quality of student knowledge (e.g., involves collecting and analyzing information about a program’s ECTS grading system in higher education). The research will also activities, characteristics, and outcomes. Its purpose is to make determine how process evaluations affect interpersonal judgments about a program, to improve its effectiveness, and/or to relationships and whether or not they motivate or dehumanize inform programming decisions [1]. employees and students. Finally we question the possible effects of using a machine, grading algorithm for the purpose of Regardless of the application of the evaluation - from the evaluation. As a conclusion we aim to determine how important evaluation of the pupils in the earliest school days up to the emotional intelligence is, immanent to the human being. evaluation of the employees in a company - it gains its importance as an essential tool for recognizing the subject's current state, but also improving it. General Terms Measurement, Performance, Algorithm Security, Human Factors, 3. VALORIZATION OF KNOWLEDGE Standardization, Legal Aspects, Verification. Valuing knowledge and skills has a significant impact on the individual. Apart from the fact that ratings often have a direct Keywords impact on the realization of some student rights like the right to Evaluation, Emotional intelligence, Assessment, Measurement student accommodation or scholarship, they also have a psychological impact. This is an inevitable element that is 1. INTRODUCTION essential to education in general. The psychological impact of The term evaluation has many definitions and synonyms which evaluation on students depends on its motivational profile, which provide a different point of view. In its simplest, general sense it consists of: refers to making a judgment about the amount, number, or value of something. The focus of the subject is the starting point at 3.1 Three components of motivation which the evaluation process is being created. If this starting point 3.1.1 Perception of one’s own ability refers to some program, policy or project, the purpose of the Student's assessment of their own abilities for successful learning evaluation is to explore the concept and direction, measure the and performing tasks. effect and estimate the success and the efficiency of the program, policy or project in the question. In that sense, the question arises 3.1.2 Learning objectives as to - what is leading the human civilization to the achievement Goals that a student wants to achieve within educational activities, of a certain goal. There are many answers but the final goal should usually they can be divided into three categories: be the advancement of humanity. 3.1.2.1 Mastery / Skills development The desire to understand and master the content and adopting new 2. THE IMPORTANCE OF EVALUATION knowledge and skills. Increasing the degree of globalization in the marketplace leads to increased competition and increased dynamics in companies and educational institutions. If these companies and institutions wish 43 3.1.2.2 Performance they belong to a group of Mastery / Skills Development Concern about getting the best ratings / results, the desire to be motivation profiles, learning outcomes could open up some new the best or one of the best in the group. issues related to the content of knowledge. The question remains whether the traditional form of teaching can respond to such 3.1.2.3 Avoidance challenges, especially in the field of Informatics, where one can Attempting to meet the minimum requirements for passing a observe incredibly fast changes. course with the least effort. Based on the level of knowledge of Bloom's taxonomy, regarding the cognitive domain of the educational process, it is obvious that 3.1.3 Other values the processes of acquiring knowledge and skills as well as their A combination of student interest in the courses, the perceived evaluation are very complex and challenging. The task of the importance of the course and their perceived usefulness [2]. education system is to create an environment and structure of learning mode that will enable its participants to acquire constant Depending on the motivational profile, the evaluation will have a and useful knowledge and skills that can be equated to a different impact on the student. Generally speaking, it can be numerical value. However , the question is whether or not the assumed that most students who believe that they are judged professor will be able to take into account all the required inferior to what they deserve or that their efforts, knowledge and standards, which the assessment itself requires, at any point in the skills are unfairly evaluated will lose the motivation for making an decision making process. Or rather, can a professor conduct the effort in their work and in acquiring new knowledge. evaluation process ethically while at the same time being mentally Besides the motivational factor, a very important psychological and emotionally independent of socially-conditioned standards? factor of student success is also self-confidence. Self-confidence Following the above-mentioned issues, research was conducted is not a motivational perspective by itself. It is a judgment about through questionnaires at the Polytechnic of Rijeka and the capabilities for accomplishment of some goal, and, therefore, must University of Juraj Dobrila in Pula, Croatia. be considered within a broader conceptualization of motivation that provides the goal context [3]. 5. RESULTS OF THE RESEARCH In order to reduce the differences in perception and The purpose of this research was to find out what students think misunderstanding, and raise the level of students’ self-confidence about professors’ objectivity and whether they believe that for achieving success in learning, new “student-centered” computer technology can achieve a higher level of objectivity? educational trends are becoming prominent. Thus, Bloom's And finally, what percentage of students is willing to replace taxonomy, presented to help students strive to achieve human beings with computer technology in some form of artificial sophisticated levels of understanding and abstraction, should be intelligence, in order to achieve a greater degree of objectivity. integrated into their overall educational experience. The survey was conducted by a questionnaire method that consisted of 10 statements related to the topic plus 2 questions 4. COGNITIVE DOMAIN OF MEASURING related to gender and age of respondents. The study included 154 KNOWLEDGE - FROM STUDENT students from the fields of Information Science and Technology, Telematics, Entrepreneurship, Road Transport, and Occupational PERSPECTIVES Safety. With concern to the gender of respondents, 56% students Recently there seems to be an international change in education are male, 44% female. Regarding age, 77% of respondents belong from a "teacher-oriented" to a "student-oriented" approach. One of to the age group of 18-25 years while the other 33% belong to the such alternative models is recognizable in the Bologna system. group older than 25 years. That model is focused on what the students are expected to be able to do at the end of the module. Such an approach, based on For the first pronouncement in the survey, as the fundamental Bloom's taxonomy in the area of cognitive domains of learning, statement of this research, "When assessing, professors are always tries to define the necessary knowledge, which allows the objective." 34% of students responded with the affirmative. In professor to write the learning outcomes. Learning outcomes are addition to that, 72% of respondents, believe that the professor's statements of what a learner is expected to know, understand ability to successfully manage his/her own emotions in different and/or be able to demonstrate after completion of a process of circumstances, i.e. emotional intelligence of a professor, is a key learning. The outcome-based approach has been increasingly factor that makes student assessment objective. adopted within credit frameworks and by national quality and qualifications authorities such as the QAA (Quality Assurance Agency for Higher Education) in the UK, the Australian, New Zealand and South African Qualification Authorities. The overall aim is to improve the efficiency and effectiveness of higher education in Europe [4]. Higher educational institutions provide online specification of the learning outcomes. In addition to describing what the students can show in terms of knowledge, skills and attitudes upon completion of a programme, the specification also gives examiners and students insight into the criteria that is applied to specific assessments. In that sense, students can know how much knowledge is needed for a certain number of ECTS credits, which in turn gives them an idea if they belong to the Avoidance or Performance type of motivational student profile. However, if 44 Figure 3. Knowledge measurement-challenges of digital technologies Furthermore, 38% of respondents believe that computer-based assessment is acceptable, what is not a negligible number if we Figure 1. Emotional intelligence factor find that 22% of respondents are indecisive in this regard. Thus, Besides the emotional intelligence of a professor, 66% students 40% of respondents pleaded against such a choice. also believe that objectivity can be influenced by some form of interaction between students and professors, in informal, out-of- class activities. Figure 4. Knowledge measurement-acceptability of digital technologies In order to determine if the students are ready for a different type of assessment and what it would look like if they are, the study introduced the following conditional statement: “To be able to change the grading system, the evaluation criteria would have to be determined:” –“According to a free/intuitive assessment” - Figure 2. Non-institutional factor what 3% of students choose. –“According to knowledge levels According to the survey results, it is evident that most students (knowledge, understanding, application, analysis, synthesis, believe that professors are not objective when evaluating. Such an evaluation).” - 37% of students choose the standard educational attitude is one of the factors of reduced motivation in students. framework, which uses Bloom’s taxonomy to evaluate the As an alternative to the human beings’ assessment, there are the cognitive levels. –“According to a precisely defined structure, opportunities offered by the development of digital technology. which defines exactly which point refers to the information/result, “A computer program or some form of artificial intelligence (AI) without exception.” – is the choice of 55% of students. And the would be judged more accurately than a professor.” - This is a other 5% of students that belong to the category of "Other statement on which the 36% of respondents show indecision. 26% proposals", mostly offer solutions that include human factors of students agree and 38% of students disagree. based of education system, for example: "I believe that the student's progress must be more appreciated than the ultimate amount of knowledge." Judging by the results of the last statement, standardization in the assessment is a fundamental factor that provides an insight into the results of educational success. However, regardless of the fact that the students participating in the research are participants of the Bologna system, and as such have a pretty measurable scoring system like the ECTS system, more than half of them (55%) believe it is necessary to try to achieve a higher degree of precision in the assessment in comparison to the existing one that uses Bloom's taxonomy to evaluate the cognitive levels. In that sense, it is 45 obvious that social consciousness goes hand in hand with the 7. CONCLUSION development of technology, which ensures its accomplishments Digital performance of measurement will certainly affect the with its performance. change in the structure of education, methodology, evaluation, verification, intellectual property issues, security as well as all 6. DATA VALUES - DIGITAL other legal aspects that are encompassed. The rapid development PERFORMANCE OF MEASUREMENT of digital technologies contributes to the perception of evaluation and the goals of education. Given that we still live in the time of Thanks to the development of digital technologies, it is possible to traditional education, but we are largely consummating update student evaluation data within the database of educational technological achievements that open up new opportunities, it institutions. Online learning is one of such examples where seems important to put a fundamental question in the context of measurement takes place in a digital online environment. evaluation: What is real value? Regardless of cognitive computing Expanding rapidly, with increasing numbers of providers offering and everything that comes with it, we need to create values by services and more students choosing to participate, online which we could achieve a social change. Both the professors in learning becomes an excellent environment to enable tracking educational institutions and business leaders could increase the performance of digital measurement in both learning processes as results by taking measures to enhance their standards of well as in knowledge assessment. With that in consideration, sustainability. standardization for evaluations in a digital online environment includes a wide range of data collection and analysis activities from formative evaluations that rely primarily on survey, interview, and observation data, to scientific experiments that 8. REFERENCES compare outcomes between online and traditional settings. [1] Patton, M.Q. 1987 . Qualitative Research Evaluation Institutions and professional bodies in many countries are Methods. Sage Publishers, Thousand Oaks, CA. addressing the challenge of how to make online learning a quality [2] © Gouvernement du Québec Ministère de l'Éducation, du experience for students. An example of such an approach is Loisir et du Sport 2007-07-00449. 2008. Motivation, development of Massive Open Online Courses (MOOCs) support and evaluation: keys to student success research projects. Various EU-funded MOOC projects together with program on student retention and academic success. Legal OpenupEd are working with the following definition: MOOCs are “online courses designed for deposit – Bibliothèque et Archives nationales du Québec. large numbers of participants, that can be accessed by anyone anywhere as long as they have an ISBN 978-2-550-50569-3 (Printed version). ISBN 978-2- internet connection, are open to everyone without entry 550-50570-9 (On-line) qualifications, and offer a full/complete course experience online http://www.education.gouv.qc.ca/fileadmin/site_web/docume for free”.[5] Thus, most top universities have started to offer some nts/PSG/recherche_evaluation/MotivationSoutienEvaluation sort of MOOC platform, which applies new kinds of educational _ClesReussteEleves_a.pdf. approaches that enable assessment of knowledge through written [3] Druckman, D., Bjork, R.A. 1994 . Learning, Remembering, assignments, participation in online discussions essays, online Believing: Enhancing Human Performance. The National quizzes, multiple choice questions to test understanding Academies Press, Washington, D.C. (formative) or as a test (summative), collaborative assignment DOI=https://doi.org/10.17226/2303 work or debates, experiential activities such as role play https://www.nap.edu/read/2303/chapter/13#189. simulation etc. The aforementioned approaches in online learning open a variety of new opportunities. MOOC generate massive [4] Kennedy, D. 2007. Writing and Using Learning Outcomes: amounts of data about learner behavior. This data can be used to A Practical Guide. University College Cork. understand cognitive growth and to improve instruction.[6] https://www.cmepius.si/wp-content/uploads/2015/06/A- Furthermore, the creation of educational platforms for online Learning-Outcomes-Book-D-Kennedy.pdf. learning opens up a wide range of possibilities in the field of [5] Jansen D., Schuwer, R. 2015. Institutional MOOC strategies cognitive computing. By generating data about learner behavior in Europe - Status report based on a mapping survey the system obtains data values that can be used for the conducted in October - December 2014. The European development of an algorithm for artificial intelligence that can be Association of Distance Teaching Universities (EADTU). used for educational purposes. Student engagement and ISBN 978-90-79730-15-5 effectiveness of incentives can be improved through software solutions that are implemented on such platforms. In addition, https://eadtu.eu/documents/Publications/OEenM/Institutional most technical universities collect data on MOOCs, while so far _MOOC_strategies_in_Europe.pdf. only few of the comprehensive universities, or the specialised or [6] Mesquita A., Peres P. 2015 . Furthering Higher Education applied sciences institutions do so.[7] Though, only at the very Possibilities through Massive Open Online Courses. IGI beginnings of its existence, collecting data in digital form, within Global. DOI=http://dx.doi.org/10.4018/978-1-4666-8279-5 educational frameworks, provides new opportunities which bring [7] Gaebel, M., Kupriyanova, V., Morais, R., Colucci E. 2014. adaptive learning to the next level. E-learning in European Higher Education Institutions. European University Association (EUA) http://www.eua.be/Libraries/publication/e- learning_survey.pdf. 46 Learning Processes for a Cognitive Democracy In Information Society Rita Micarelli Giorgio Pizziolo International Institute for Advanced Studies in International Institute for Advanced Studies in System Research and Cybernetics (IIAS) System Research and Cybernetics (IIAS) Firenze, Italy via Mattioli, 43, 50139 Firenze, Italy via Mattioli, 43, 50139 Telephone number, +39 335 8352647 Telephone number, +39 333 4743514 rita.mica@gmail.com pizziologiorgio@gmail.com ABSTRACT manifestations are strongly linked to very learning processes In this paper we deal with how the processes of the Learning that are spontaneously practiced by different contexts and interact with the variable aspects of the democracies within social groups, dedicated to political discussions, protests or the globalized world. Environmental catastrophes, cultural very action-researches referred to their local or general disasters, economic exasperations and social traumas became problems. Yet the democratic governments, completely continuous and pervasive menaces, further emphasized by the ignoring or underestimating these challenges, overpower political behaviors of the local /national governments. Such them by authoritarian decisions, macro financial programs or menaces distort even the very concept of Democracy, trivial public projects and works. It seems true that between influencing in particular the behaviors of the young the spontaneous manifestations and official powers do not generations. exist effective relationships and that, consequently, the Vice versa, another idea of Democracy based on Relational processes of the Learning cannot interact with the variable Communitarian Learning Processes can be developed and aspects of the democracies within the globalized world. In differently practiced by various human societies as a particular, the contemporary environmental catastrophes, Cognitive Democracy. cultural destructions, economic exasperations and social Such a Cognitive Democracy Idea is today urgent and traumas are further stressed by the political behaviors of extremely necessary, just to cope with the contradictions local/national governments to distort even the very concept of between techno-informational sciences and human societies, Democracy and influence the social behaviors and young that strongly influence-without distinction-the weakest generations towards the self-defense of their identity. societies and all the young generations of the globalized 1. world. To realize such ideas we need a wide range of Learning 2. A QUESTION REMAINS Processes, modeled on different contexts and necessities and If and how appropriate interactions can be realized despite practiced through environmental friendly learning this generalizable trend? The idea of democracy currently experiences. acknowledged is still referred to the traditional logic On this premise it is possible to evolve the original concept of reasoning (the third excluded) the Game's theory (winner or Democracy going beyond its binary (Individual/Society) losers) and the numeric representativeness of the voters socio-political field throughout ternary relationships during a pre-decided time when the Governmental projects (Individual/Society/Life Environment) experientially have to be realized, often in spite of unpredictable events produced as a complex system at the same time or changes of social mind. Within a so rigid framework aesthetic/ethic and concrete /informational, versus the (conceptual and practical) the cognitive processes cannot be trivialization and fragmentation of the Globalized World. harbored, the participative spontaneous processes in Some concrete practices of Learning Processes related to particular, and this is why : various socio-environmental political contexts can be taken into consideration and presented to discuss the proposals of  T this paper. he classic idea of democracy continues to be . related to classic logical reasoning, (the third Key words excluded), the Game's theory (winners or losers) Globalization, Democracy, binary /ternary systems, learning and to the numeric contraposition experience, informational/real world (majority/minority) of the voters during a pre- decided time when the Governmental projects are 1. INTRODUCTION mechanically realized, often despite unpredictable events or change of social ideas. .The idea of Cognitive Democracy was promoted by the French philosopher Edgard Morin at the end of the XX  W Century, as an adequate way to propagate the appropriate ithin a so rigid framework (conceptual and forms of effective participation by different contemporary practical) the cognitive processes cannot be societies in the scientific and political processes. This idea harbored, while the participative spontaneous involves another challenging idea, which has been suggested phenomena remain defenseless, often interrupted by the French Philosopher Felix Guattary as a Molecular and constantly attacked by the dominant powers. Revolution. Both these ideas, even if they have not been In this situation, it is reasonable to wonder whether and how officially celebrated, inspired a lot of social manifestations, appropriate interactions between institutions, strong powers behaviors and projects, continuously in progress. All of these and legitimate social expectations can be achieved. This 47 question cannot be answered but remains open to stimulate that are the most threatened. Today it is true that some the evolution of the very concept of democracy. The current aspects of Morin's proposal have been successfully well-established idea of democracy corresponds to a rigid implemented. In fact we have conquered informational social framework of relations where there is no place for communication and instant access to news e ideas, we have unforeseeable events or for the change of voters' willing, for developed forms of political struggle and creative proposals, participatory processes, initiatives, new ideas, and even less self-sustained by people, but once again all these forms of for the spontaneous learning processes emerging from propagation and communication use linear dynamics with different social contexts. On the contrary the simplifications, very limited results regarding the real advances in socio- the exasperate contrasts and the most trivial political and cultural activities of contemporary society. In this way the social behaviors. are welcome. democracy , though widened, is practiced only at a mechanical-reduction level, without any chance of circular- 3. THE COGNITIVE DEMOCRACY experiential verification by the subjects involved and therefore without the emergence of learning processes. Another idea of Democracy based on Relational Furthermore the influence of the digital world on such Communitarian Learning Processes can be developed and contemporary conditions produces new exasperations on differently practiced by various human societies as Cognitive individuals and social behaviors, by worsening the Democracy. Originally the idea of Cognitive Democracy was spontaneous communications and exchanges (ideas, suggested by Edgard Morin [8] at the end of the XX century: ”Cognitive democracy presupposes itself a reform of thought experiences, projects), which are all forced to follow linear dynamics far from any ecological circularity. as science, since the sciences are extremely esoteric for the citizens. They give up understanding, they are sure they At the same time, the need to maintain the intrinsic cannot understand, while the scientists say - you cannot prerogatives of creativity, common to all living systems, understand-. So a profound ditch has been created even more continuously stimulate the human societies to start new serious why the most important political issues have a learning processes, often temporary, consequently fragile and scientific and technical component that is reserved to easily controllable by the dominant powers. For all these experts”. Morin's proposal was then addressed to educators reasons we think that considering democracy as a standard and considered as a link between expert elites and people, phenomenon that can be imposed indifferently on every whose participation in scientific advances could and should society in the world is an epochal error with irreversible become more effective and democratic. This idea though consequences on the social mentality where the existing hierarchically structured (from scientists to people) turned out tensions are often exasperate or increased. useful for the dissemination and propagation of scientific Actually, to realize the multiple forms of Cognitive knowledge.. But it harbored many other potentialities not Democracy we need a wide range of Learning processes, only as a democratization of the knowledge but as a different tailored to different contexts and needs, and practiced through democracy, constructible only throughout participative friendly learning experiences, which must remain constantly Learning processes. In those same years within the traditional referable to well-identified and recognizable ecological democratic systems the contradictions and tensions among ternary systems. the political and governmental systems and their populations were growing. For these reasons, what we propose today is On these premises it is possible to evolve the current another evolutionary development of democracy, intended in Democracy to go beyond its binary habits and refer it to a broader sense, as a Democracy of Learning and Creativity, ternary systems of relationships (i.e. Individual/Society/Life practicable through spontaneous initiatives, autonomously Environment) and experiential action-researches, socially encouraged by participants and supported by experts, but not produced as complex systems, aesthetic/ethic and concrete hierarchically controllable. Starting from E. Morin's idea, we /informational at the same time, against the trivialization and could approach the concept of democracy by using shared fragmentation of the Globalized World. principles and diversified criteria, not standardized but 4. THE MOLECULAR REVOLUTION tailored for many contexts and contemporary conditions. Felix Guattari , the French psychotherapist and philosopher 3.1 Steps to a Cognitive Democracy who coined the word Molecular Revolution, inspired us a new approach to the complexity of nature and the idea of As we have just described, the E. Morin’s. proposal did not Learning, free from constraints and hierarchical change the management of scientific and technical systematizations of the thinking. The Molecular Revolution knowledge but made them simply more propagable and is a very impressive idea which suggests and involves many easily understandable by the users. Today, we do not think topics, problems and human realities since the bio-molecular that, given the exasperated separation between dominant nature , micro, autonomous, creative and interactive within powers and people, it is still possible to maintain the the living world leads us to a variety of realities and contexts. traditional style of current political practices, mainly based on In our opinion the Molecular Revolution can combine the binary relations .On the contrary, we believe that the dynamics of the living world with the dynamics of the Democracy can change only by reconstructing suitable evolutionary cognitive processes in a non-hierarchic way, ternary relationships among people, their contexts, and the homologous to the one used by individuals and groups to Institutions who govern them. In other words these changes evolve their ideas, mature their desires and practice their become possible only through different approaches based on creativity, according to the virtual-actual dynamics, the circularity of ternary relationships. For the contemporary quintessence of the all living world. The circular conditions such kind of a Cognitive Democracy is today combination of molecular dynamics and learning urgent and extremely necessary, just to cope with the political experiential processes can produce and develop that contradictions and the strong contrasts between human necessary adequate knowledge (autonomous and self- societies and driving forces (political, techno-informational, produced) to practice differentiated forms of democracy, all financial). These Forces strongly influence - without cognitive and equal, beyond the current democratic methods.. distinction- the weakest societies and all the young This combination can lead us towards new and various types generations of the globalized world, by attacking the ternary of democratic participation, each adapted to the relationships among individuals/society/life environment 48 characteristics of the context in which it is formed. These 6. FIRST STEPS TO COGNITIVE eco-epistemological research and action- strategies welcome DEMOCRACIES the philosophical thoughts of Gilles Deleuze and Felix Guattari, realizing the concrete translation of micro virtual Many action-research experiences are already in course in and real dynamics, into a tangible social dynamic so often different places, from the post-industrial metropolitan highlighted in their philosophical elaborations.1This realities (Cleveland, USA) to the contradictory megalopolis translation -from the micro level of the organisms to the of post colonialist realities (Kibera/Nairobi, Kenia). In political level of societies- constitutes a very evolutionary Europe many social experiences have taken shape just to shift for the contemporary realities since it can mark, for the answer the economical, urban and social crises in course and first time, the direct, capillary pervasion of the philosophy promote new levels of experiential processes. Some into the social contexts in a spontaneous and non- significant experiences in Italy can validate the strategic authoritarian-deterministic way. In such a way it becomes importance of this approach to urban, rural and territorial possible to escape from the mechanical (cause /effect/ contexts. They are very interesting examples of potential action/reaction) political, social, informational habits and Cognitive Democracies practicable at the urban, rural and reintroduce on the scenery of the world multiple and territorial scale that can take roots in different contexts propagable versions of molecular revolution As a lot of developing throughout the reconstitution of inter/eco- study cases testify, our contemporary age already shows systemic relationships, stimulated or encouraged by many micro- dynamics that, as new cyanobacteria in a global appropriated ecological inputs. primordial soup, actually practice contemporary molecular revolutions, in counter tendency to the massive global 7. EXPERIENCES IN ITALY attacks of the dominant forces on the planet. Hence we The daily struggles to contrast the degradation and could say that the new dynamic processes which environmental transformations provoked by natural continuously rise from the exasperated human/ environmental catastrophes or authoritarian political decisions are usually contexts actually constitute a translation of the philosophical impeded or ignored by the Public Authorities. For these concepts virtual-actual into political dynamics tension-fact, reasons they could develop in terms of action- researches and a base of further molecular revolutions. beyond the mere opposition or the alternative Projects or 5. MULTIPLICITY AND VARIETIES Planning. Most of these experiences brought to light new levels of adequate knowledge and concrete socio- OF COGNITIVE DEMOCRACY environmental perspectives. This phenomenon has been The theoretical and contextual reference points outlined continuously testified by numerous spontaneous micro above allow us to define the key elements to activate new activities and territorial experiences. Such experiences , forms of democracy based on ternary relationships autonomously promoted by participants or encouraged by Individual/ Society/Life environment (understood as a wider scientific-technical promoters, could further develop through ecological context, as a very landscape where culture, unexpected ecological configurations of the ternary systems economy, human solidarity, meet and interact throughout involved. Some significant examples in Italy can validate the processes of participative learning). Therefore, to achieve strategic importance of the experience practiced on different appropriate levels of participatory democracy and adequate life environments urban, rural and territorial. systems of Governance the following procedures become 7.1 The La Pica Garden and Kitchen necessary and basic for every context : gardens -Mirandola (Emilia Romagna  Re-discovering potential or latent ternary systems capable of Region, North Italy) harboring and supporting new learning dynamics  Encouraging people involved in learning processes  Inspiring new functional, aesthetic and attractive configurations that life environments can take  Implementing and promoting true relational structures at any level, rooted in the contexts A lot of potential Cognitive Democracies can come to light from different contexts andstimulate different forms of Governance where the participants become at the same time guarantors, promoters and administrators of the environment, guardians of its values and trustees of its Governance. In this small town of Mirandola a No- Profit Association founded and realized the La Pica Garden and developed a kitchen garden area organized around the ancient town, destroyed by the 2012 strong earthquake. These two experiences achieved interesting and integrated 1 outcomes towards people, life environment and political Virtual-actual have to be translated into tension-fact. government, playing a fundamental role towards the citizens What does it mean for us today practically, i.e. politically, to in search of new reference points (aesthetic, cultural, social, translate the relation virtual-actual in the one tension-fact? It means economic) especially after the 2012 earthquake. Today the to disclose the productive nature of the relation virtual-actual, or, as Garden is appreciated as a very stimulus to cultivate culture, Deleuze affirmed, to potentiate the nature of the virtual, which is the invention of the new. …I would say – that the “dynamics of agriculture and social consciousness, while the Kitchen becoming as differentiation and creation” comes to be (Anne Gardens became a fundamental encouragement for the Sauvagnargues in Le vocabulaire de Gilles Deleuze, p. 22) renaissance of the devasted town. All of these initiatives, successfully carried out by their promoters and citizens, got a 49 more intense and involving relationship towards the local environmental contexts that include and harbour both the public managers, just to transform these voluntary proposals City and the Landscape. If in such condition they could be into effective continuous popular participation in the public related each other and involved in reciprocal dynamics we management. A very micro revolution, towards a concrete could really think of a new entity able to harbour and foster management of the Public Common Goods is in course at an in becoming human /environmental context. any level (solidarity income taxes and services, mutual In Tuscany and in Italy in general, such realities (ranging interaction of social works and cultural initiatives). A very from small villages or towns , to little parts of urban or autonomous Governance is developing! metropolitan areas) are still alive and manifest throughout the habits, experiences and life styles of their citizens even if 7.2 The “Asilo Filangieri” , a new Urban they often are overwhelmed by the impelling globalization. Common- Within such realities more and more communities improve their knowledge, experiences and projects that could open the ways to different configurations of Landscape City. On this base we consider that multiple versions of Landscape City are possible and can be realized within such socio- environmental conditions, according to various procedures, that can continuously take shape on each territorial reality throughout evolutionary participative processes. 7.4 The Landscape Contracts in Italy Specific new agreements between social groups, environmental, economic managers, policy makers can be promoted and practiced on different life environmental The Asilo (Napoli, Campania Region, South Italy) is an contexts through shared landscape projects. The Landscape ancient building originally dedicated to poor people. In Contracts can be concretized through the choral coherence with the name of its founder Gaetano Filangieri construction of specific proposals, statutes, project (Naples 1752-1788) a noble enlightened jurist who dedicated activities which tailor specific modalities of Governance his entire life to the political and social justice, the Asilo suitable for each environmental context (territorial, social, became property of the Naples Municipality, who recently informational, cultural and so on). The very key actors of acknowledged it as Urban Common Good. Thanks to the the Contracts are the groups of citizens who participate in constitution of such an Urban Common Good the Building – the action-research as creative promoters and responsible located in the centre of the ancient City within an partners of the Contract’s Governance, who are organized impoverished but alive animated area – has been transformed as Landscape Contract's Presidia. into a complex socio-cultural structure, jointly promoted by spontaneous Groups and local Municipality. This structure The Panaro (Emilia Romagna Region) and Simeto is now self-managed by artists, artisans, actors, students and (Sicilia Region) River/Landscape Contracts have been producers who develop a very interesting cultural policy developed by interdisciplinary staffs along with local towards the entire City of Naples. This Asilo (a former groups, associations, Public Bodies (politicians and institute to welcome poor people) became a creative harbour technicians), Schools, local Museums, and local able to revitalize the urban area and implement the civic entrepreneurs (tourism, culture , agriculture) through the participation in the cultural activities. The Asilo became also following steps: a key factor for a wider ranging action-research towards a  Social perception of the Life Environment – micro urban ecology and self-governance. friendly learning approach among local groups, 7.3 The Landscape Cities in Tuscany experts and staff -Informal meetings, survey promenades, some thematic synthesis; We would consider the Landscape City as a nucleus and a  mover of the in-becoming Life Environments, the place Self-reflection on the local River landscape – where the multiple networks (natural, technological and shared evaluations, constitution of a common stock informational) of the town are closely entwined around the of information and aesthetic landscape evaluations; environmental texture to form a very holistic configuration.  Social potentialities and actions - ecological, Such configuration equally involves the territory, the living cultural, scientific, educational, economic- have spaces, the single persons and the social communities been recognized in their mutual relationship with reciprocally linked and ecologically balanced. In this sense the Landscape City can emerge as an aesthetic catalyser of specific territorial river areas and connected as a new projecting processes. dynamic interactive network (creative hive); This phenomenon develops at the real/local environmental  Location of the network on the river territory- dimension but it is strongly connected to the unbounded landscape valley; informational web environment in a continuous reciprocal  Constitution of River Landscape Presidium of citizens entanglement. who become promoters and guarantors of the In other words, the Landscape/ City is nothing but a very relationship between a consolidated social trim –the participative Governance of their territories and mover traditional town- and a new organization of its environmental of the ecological ternary process of the Contracts context to which the ancient town had been referred. The very nursery of such relationship are the both territory The proposal of the Contract is a new Pact between society and its natural aesthetic Configuration. We are speaking of a and river sites, an agreement between official Bodies complex and multiple system of relationships where the (Region, Province, Municipalities, local Groups, Technicians, Action-Research of Persons and Community play a fundamental role, just as reference point to their whole 50 public Managers) for a new way to manage the natural-social 9. REFERENCES common heritage in evolutionary terms.. [1 ] M. Pascucci. La potenza della povertà, Ombre corte, 2006 ;Causa sui. Saggio sul capitale e virtuale. 8. CONCLUSIONS Verona, Ombre corte, 2010. The examples described above show that every context can [2] G. Deleuze. 1991. Le Bergsonisme, Zone Books, achieve its own Cognitive Democracy while specific modes New York. of governance can actually be realized at different scales and [3] G. Deleuze, F. Guattari. 2004. A Thousand Plateaus. levels. Trans. Brian Massumi. London and New York: Continuum, All these dynamics constitute a multiplicity of articulated sets Vol. 2 of Capitalism and Schizophrenia. 2 vols. 1972-1980. of initiatives, experiences, changes in the lifestyle of people Trans. of Mille Plateaux. Paris: Les Editions de Minuit. ISBN and their reference societies, all involved in environmental 0-8264-7694-5. changes of great strategic importance even if of small size. As it happens in the case of all evolutionary processes, the [4] Guattari, F. 1984. Molecular Revolution: turning point of cognitive democracy does not proceed Psychiatry and Politics. Trans. Rosemary Sheed. linearly, but in a complex, circular and reticulated manner, Harmondsworth: Penguin. ISBN 0-14-055160-3. with many different episodes, with different initiatives and [5] G. Bateson. 1980. Mind and Nature. Italian cultural achievements, with successes and failures, with times edition, Milano. and rhythms each time different and, above all, with the [6] H. Bergson. 1907. Creative Evolution, p.4, alternation of virtual-actual/ tension-fact dynamics that Palgrave Macmillan. remains common to all experiences. [7] R. Micarelli, G. Pizziolo, L. Maiorfi, M. Pascucci. However, these processes are irreversible and can continue. 2013. The social learning in contemporary crises, The Cognitive Democracy is already alive and in becoming! between Web and natural loci. In M. Gams, R. Piltaver, D. Mladenic et al (Eds.), Proceedings of the 16th International. Multiconference Information 8. ACKNOWLEDGMENTS Society – IS 2013, Slovenia, Ljubljana, 7 – 11 October 2013. Vol. A. The Conference We want to express our gratitude and appreciation to Kognitonika/Cognitonics. Jozef Stefan Institute, Olga Fomichova and Vladimir Fomichov who have Ljubljana. opened Cognitonics Research through the [8] E. Morin. 2002. Educaregli educatori (Educate interdisciplinary and interactive dialogues at the the educators), International Conferences on Cognitonics, developing Roma. ISBN 88-8421-033-X these topics at an interdisciplinary, scientific, and creative high level. 51 Suicide attacks, mass media and data mining Eleni Minaidou MA Crime Scene Investigation and Intelligence, Portsmouth University 11 Verenikis Street, 2002, Nicosia, Cyprus Tel: +357 96553316 email: eleniminaidou@hotmail.com ABSTRACT practice, massages and codes that come in various forms and flow The aim of this study is to evaluate, examine and critically analyze through networks and media. These terrorist organizations and two contradictory approaches and perspectives concerning groups are structuring their war on religion and perceived terrorist suicide attacks. The first approach reflects the majority of oppression, stating that the fight is for the threatened and oppressed Muslims but also God’s will. Furthermore, Islamic theories, research and literature that are based on sociological explanations that portrait the suicide attacker as driven by his/her terrorist organizations are spreading and exploiting the ideology. The second approach is based on a new field of research dissatisfaction and alienation of Muslims in order to get more that studies the possibility of suicide attackers being mentally recruits. This ideology and principles serve well these terrorist unstable, driven by their suicidal tendencies. In addition, this organizations, as the individuals involved, fight for God’s (Allah’s) will and Islam. Thus, they are not afraid of death and research examines the role of the media and how terrorist organizations exploit the fact that terrorist suicide attackers are they are willing to die in their attacks for the greater purpose, presented by the media as rational individuals committing an making them an impossible enemy to intimidate or destroy [1]. altruistic suicide that is driven by their ideology. The conclusion of this study is that the factors that prompt an individual to There is a variety of motivations and factors linked to an individual’s decision to participate in a terrorist suicide attack. commit suicide are not necessarily limited to one on each individual. Many factors often co-exist. Moreover, the role of the One of them, is an individual with an authoritarian personality, media plays a role on the rates of suicide attacks. The study associated with religious fundamentalism who is not able to suggests that a more systematic cross-disciplinary research and express his/her authoritarian character in his/her social context. cross-national collaboration is needed in order to facilitate the Joining a terrorist organization and proceeding with a suicide design of a prevention program. attack is perceived as the only way to prove his/her power [2]. Moreover, emotional distress and moral outrage associated with experiences of humiliation, not only of its own but as well as in 1. INTRODUCTION the context of the individual’s close circle, that can be either religious or ethnic circle are often factors that prompt the There is a variety of reasons that explain the rationale behind a individual to act out of revenge for his/her people or for his/her terrorist organization and its actions, but different factors and own dignity [3]. An example of this case would be a TV interview reasons might play a role for an individual to join in a such in January 2005 of Saleh Jamil Kassar who was a captured Saudi organization and proceed to act through suicide attack. This Fighter that stated that seeing pictures of Muslim violations as study’s aim is to explore and examine different theories and well as Muslim women getting violated in TV and internet was explanations regarding an individual’s decision to commit a what motivated him to join the terrorist group and try to carry out suicide attack. As it is a phenomenon that rose the past years and a suicide attack. left thousands of people dead and the public in fear, it is worth examining in detail in order to try and explain such behavior. Are Nevertheless, in some cases there are possible the perpetrators acting on an ideological cause, or are they motivations in terms of instrumental rationality. An individual mentally unstable individuals with suicidal traits? that might be suffering by a status crisis, either a real loss of status or the fear of losing it, can chose to join a terrorist organization. Such individuals might believe that dying in a suicide attack is a 2. THE SOCIOLOGICAL EXPLANATIONS better choice than losing their social status and staying OF SUICIDE ATTACKS marginalised. It might be based on an egoistic interest, trying to find solidarity as well as becoming a glorified martyr who will act and die in a heroic manner [4]. Thus, the individual leaves the social norms in the context of which he/she fears of losing his 2.1 Social explanations of suicide attacks status and becomes a member in a group where he will gain prestige and glory, even if it comes to the price of his/her own There are two main factors that influence an individual’s decision life. The idea of having the image of loyalty, sacrifice and on suicide attacking; the impact terrorist organizations and groups autonomy overcomes the price of death [5]. have on the individual, and the individual’s social context. Most of the Islamic terrorist organizations and groups aim for a social Moreover, in Durkheim’s theory there are two change by firstly developing alternative principles of living, and explanations that could apply on this matter. One is the anomic secondly by introducing these alternative principles through suicide; anomie is the condition where social and also moral 52 norms are confused, unclear or simply not present. Individuals in 3. THE MYTH OF MARTYRDOM AND this concept, lack the sense of social regulation and have a feeling THE PSYCHOLOGICAL EXPLANATIONS of marginalization from the societal norms, resulting in a self- crisis and choosing suicide. In this case, individuals that feel like OF SUICIDE ATTACKS they have no place in their own society, turn up to a terrorist organization where the social norms no longer exist and this results in a suicide attack. Furthermore, the second explanation of 3.1 Religion and suicide attackers Durkheim’s theory that could apply, is altruistic suicide. In this case, individuals that give primary consideration to the interests Many scholars come in contrast with the belief that suicide and welfare of others but are not able to express it in their social attackers cannot have suicidal tendencies, as a result of suicide context, choose to join a terrorist organization and “sacrifice” being strictly forbidden in Islam. It is believed that Muslims have themselves through a suicide attack [6]. An example of a case lower suicide rates as they are not willing to get humiliated and would be the story of Teoria Hamori, a Palestinian woman who stigmatized in their community by disobeying Allah’s “orders” was captured right before she tried to commit a suicide attack. As [9]. The assumption that religion prevents suicide is not a solid she stated, she was very disappointed for her unsuccessful attack, argument. It might be true that religious affiliation is correlated her only purpose was to sacrifice herself for Palestine, her land with lower rates of suicide attempts in some clinical populations. and her people; her life would be the price for the Palestinian However, in Islam where suicide is strictly forbidden by the freedom. Qu’ran, few Muslims will admit to have suicidal tendencies if questioned directly, whereas more Muslims would admit it if the As mentioned above, the main resource for all questions are open-ended [10]. Findings show that taboos against organizations that use suicide attacks as their main form of action suicide can result in suicides being underreported, and growing is the availability of attackers. Their recruitment method involves evidence show that suicides are largely underreported in Muslim socialization with all the important circles of society, such as, countries [11]. An analysis that was conducted in 17 family, educational institutions, religious community, peer groups predominantly Islamic countries, reported that suicide rates as well as mass media. Individuals might get involved in such an including “hidden” suicides that are otherwise classified as “other organization as a result of the strong bond they form in this circle. violent death” (OVD) were as high as those in the United In this case, these individuals, in their search for companionship Kingdom and eight times higher than otherwise officially reported and solidarity, are joining terrorist organizations with no intention [12]. In addition, the idea of suicide attackers not being able to be of committing a suicide attack. However, as the social bond suicidal based on religion is problematic, on the grounds that becomes more intense they adopt the values, ideologies and goals there is no evidence of all suicide attackers being Muslims or of the group [7]. In the modern age, radicalization and the religious [13]. On the other hand, a result of suicide being strictly creation of these social bonds have become increasingly prohibited and a crime against God, Islamic individuals find constructed through the internet instead of face-to-face suicide attacks as the only honourable form of suicide that will communication. Thus, individuals that already have a strong lead them to heaven. Thus, the belief is that for that very reason fundamentalist view are able to find groups that share the same the majority of suicide attackers come from an Islamic ideologies with them easily, through private networks. In addition, background [14]. there are individuals that grew up in a social context where radical fundamentalism, extremism and suicides attacks are their social 3.2 Psychopathology and terrorism norms. These individuals are trained and recruited in an already Islamist radical environment and their life goal is to proceed with a suicide attack. There is a remarkable consensus in the research literature field that there is no such thing as a terrorist’s personality or Another factor is the political beliefs an individual has psychopathology and that mental illness is not an important and his/her oppositions to certain countries or Governments that consideration when trying to understand terrorist attackers. Many can prompt the decision to suicide attack in order to protect research findings suggest that terrorists are “normal” people but his/her political positions [8]. Nevertheless, the factors that who commit acts of terrorism. In addition, Ruby commented that prompt an individual to commit suicide are not necessarily limited terrorists are rational individuals that have unrealistic goals based to one; many of the above factors often co-exist in the act of one on their extremist ideologies [15]. There is a large number of suicide attacker. An example of that case would be the attack of individuals that have common extremist ideologies regarding Mohammad Sadique Khan who was the ringleader of the 2005 religion and nationalism. Terrorist groups might use this in their London attacks. As he stated, his motivation comes from his advantage by recruiting individuals that share these extremist religion, Islam, the duty to serve Allah, the need to destroy the ideologies, but that fails to explain why not all of them join. democratically elected governments of which Muslim people, or “brothers” as he calls them, suffer, and the need to sacrifice 3.3 Mental Illness and suicide attacking himself for the people he loves. As it can be seen in the above statement, there is a variety of factors that prompt the specific suicide attacker to act, radical religion beliefs, political A research conducted by using qualitative method and oppositions, solidarity as well as the need to express heroism. interviewing the family members and close associates of 26 Thus, for a better understanding of suicide attacks, all the above female Chechen suicide bombers found that nearly all had lost factors should be taken into consideration and every attack should close family members in bombings, landmines or air raids carried be studied individually, rather than being generalized in a theory out by Russian forces in battle. Many of them had witnessed of one-fits-all. themselves the death or torture of their family. As their family members and friends stated, none of them had any significant 53 personality disorder or symptoms of depression before the trauma, fewer victims in Afghanistan than in Iraq. This might be as a but all changed afterwards. More specifically, they all had result of cultural taboos on killing innocents in Pashtun culture dissociative symptoms which is a characteristic of posttraumatic [21]. stress disorder (PTSD). In addition, before they commit a suicide attack, 92% became socially isolated, 73% of them showed signs 3.7 Familiar network and genetic factors of depression and 23% became aggressive [16]. Furthermore, Ariel Merari conducted a controlled study of three As researches show, suicide bombers in particular are known to groups. The first group that was interviewed was 15 “would-be” act in familial pairs, such as, mother with son, father with suicide terrorists, as they were arrested moments before their daughter, as well as siblings. This raised the idea of suicide attack. The second interviewed group was 12 non-suicide bombings being a result of socio-environmental factors and terrorists and the last group was 14 terrorist organizers. None of upbringing. However, the growing evidence of genetic factors in the interviewed individuals had a diagnosis of psychosis or a suicide, come to challenge the idea that suicide terrorists could history of hospitalization for mental health disorders. However, not be suicidal, because suicide bombers most often act in familial 53% of the “would-be” suicide terrorists showed symptoms of pairs [22]. According to one study, in 15% of cases, identical depression, such as, low energy, emotional constriction, distracted twins share suicidal tendencies [23]. In addition, many other attention, melancholy, sadness, hopelessness and tearfulness. In adoption studies evidently showed that individuals that were addition, three of the “would-be” suicide terrorists displayed adopted were six times as likely to commit suicide as their evidence of PTSD. On the other hand, only 8% of the organizers biological relatives who committed suicide [24]. Thus, the fact showed depressive tendencies and none of them showed evidence that suicide bombers and attackers often act in familial pairs might of PTSD. Findings also showed that 25% of the control group and be as a result of transmitted genetic suicidal traits [25]. 7% of the organizers group exhibited psychopathic tendencies, whereas none of the “would-be” suicide terrorists had exhibited these traits [28]. 4. TERRORISM AND THE MEDIA: A DANGEROUS SYMBIOSIS 3.4 Recruitment 4.1 The media-related goals and means of There is an assumption in research literature that recruiters terrorists successfully reject individuals who are mentally ill. However, Berko who interviewed Israeli terrorist prisoners argues, that recruiters are often told to “look for sad guys” [17]. The question Terrorism has as “target” the wider audience at which the violence arising is how do these recruiters spot out the mentally ill is actually aimed. However, without the media’s coverage, the candidates? There is good evidence that soldiers are the ones that terrorist acts would be arguably wasted, narrowing the impact to can spot and predict signs such as withdrawal, poverty of thought the direct victim(s) of the attacks [26]. In addition, the terrorist and lack of help-seeking the best in combat situations, thus organisations are mainly interested in the wider audience, rather terrorist recruitments might also have the same “ability” [18]. the direct victims and it could be argued that the reaction from the audience has the same importance as the acts themselves [27]. 3.5 Impulsivity and suicide attacks Moreover, terrorist organizations are carefully selecting the places that they will attack, in order to get the best media coverage and win the attention of national and foreign publics as well as the The notion arguing that suicide terrorists could not be suicidal as decision-makers in a government. An example would be the 9/11 a result of the belief that suicide attack is a well-planned action, attacks in the US, where not only a large number of media whereas suicide is impulsive is simply wrong [19]. While on some covered the story immediately but also it was documented by populations impulsive traits have been shown to increase the risk hundreds of people through videos and pictures [28]. However, of suicide, especially in those who suffer from bipolar disorder the goals of terrorist organisations are not limited into gaining the and alcohol abuse, decades of research have shown that the attention of the masses. However, it is through the media that they majority of individuals who commit suicide do not act so aim to inform both foes and friends, regarding the motives behind impulsively and that in fact, have had suicidal thoughts and terrorist deeds, explain their rationale behind their acts of violence ideation for some time and made prior plans for these acts [20]. and publicize their political causes as well as to motivate future recruiters [29]. 3.6 Murderous intend argument 4.2 Media’s coverage of terrorism The proposition that suicide terrorists could not be suicidal based Terrorism and terrorist incidents involve blood, tragedy, heroes, on the belief that they have murderous intent represents a false shocking footages, drama and the feeling of danger. For that very dichotomy. Even if suicide terrorists have murderous intent, it reason, media’s coverage of terrorist-related stories provides a does not mean that suicide intent can’t be also part of the high pick of view ratings and profit which is very beneficial, as decision. They might be both homicidal and suicidal. Media rely on views and the audience [30]. Another factor that Furthermore, depending on the culture in which the act occurs, makes terrorism such an attractive topic is that, in the modern the degree of homicidal intent might be lower or higher. At least television culture, violence has been a major and defining quality in the initial phases, suicide attacks were less effective and took that public audience enjoy [31]. Moreover, what is problematic 54 regarding media’s coverage of terrorism is not the actual act of The researches and literature in the field of suicide terrorism has covering terrorism, but rather the way the media cover terrorism. been dominated by political and social theories. This might be a There is no doubt that terrorism should be reported, but the way result of the political and social aspects of suicide terror being the incidents are framed and the extent to which it is covered is thought as more important, or at least more pertinent to also important. Media’s coverage of terrorism is most often counterterrorism than individual aspects. In addition, it might be framed by enlarging stories, sensation-seeking, exaggerating the also a result of information on what motivates an individual to matter of who is to blame, repeating the same footage and images engage in this behaviour being so difficult to obtain. Suicide over and over again, separating physical and mental health attackers, after all, operate in secret, they are protected by consequences of disasters as well as creating new syndromes [32]. clandestine groups, and many do not live to tell their stories. However, for scholars there might be an additional concern, 4.3 What is problematic about this symbiosis which is that any inquire into the psychological or psychiatric aspects of suicide attacks will somehow marginalize or delegitimize the real political and social grievances that are The media may directly or indirectly serve the interests of thought to lie at the heart of the phenomenon. terrorists by over-simplifying stories for the audience to the point that it has little to do with the actual events. By repeating the Even though every case of an individual committing a suicide traumatising horrific scenes and stories it also serves the goals of attack can differ as well as the rationale behind it, previous the terrorists, which are to appear in the media as long and often attacks, attackers’ statements and evidence, suggest that the as possible. Moreover, the media’s obsession and bias of influence and impact terrorist organizations and groups have, as sensationalising certain aspects of terrorism related stories might well as the individual’s social context, can be the key to certain contribute to the fact that terrorist organisations are using media suicide attackers’ decision on attacking. However, this new as a tool for their own success. Creating an atmosphere and growing field of research comes to challenge the popular and politics of fear and creating the necessary conditions for traditional opinion, regarding the reasons behind suicide attacks, propaganda and recruitment following a terrorist attack is the stating that the psychology of an individual and genetic traits are ultimate contribution of media to terrorism. also important factors for one’s actions. Thus, psychological explanations of suicide attacks should also be considered. In addition, the way media frame suicide attackers, is by portraying them as rational individuals that committed an altruistic suicide on their beliefs and ideologies. This idea and 6. FUTURE DIRECTIONS view has been adopted and shared by the broad audience that mass media have. One could argue that the way suicide attackers This emerging evidence and research that argues regarding are framed and covered by the mass media contributes to the suicidal ideation and behaviour, playing a role in a number of recruitment of future suicide attackers by creating copy-cats. In cases of suicide terrorism, should not be dismissed, even if that other words, individuals that will choose to mimic this kind of number is found to be significantly low. Just because suicidal action and behaviour. As mentioned above, terrorist organizations ideation operates at some level in some cases does not mean that arguably plan out their attacks in a rational and strategically way political and social factors do not also operate at other levels or with having full awareness of the influence that media coverage that these levels are not equally important. What is needed, is a has on society as well as government officials in almost all levels. more systematic, cross-disciplinary research and cross-national Thus, recruiters and leaders have knowledge on the impact the media have on an individual’s decision to participate in such an collaboration regarding this phenomenon. Well organized and systematic databases have been beneficial for this field of act and use it on their own benefit. research, for example the Suicide attack database. These databases can be mined for factual information regarding suicide attacks and This can be seen and explained through the different incidents, such as, tactics and weapons used, the motivations of approach media gives to mass-shootings, school-shootings and the groups or organizations promoting the attacks and where and suicide attacks. All of the above-mentioned acts involve a when they occurred. However, they are not designed to provide perpetrator that kills a number of people and then proceeds to take insight information on the very personal motivation or the his/her own life. However, the media will portray the gun-shooter psychopathology and potential suicide tendencies of individuals as a mentally unstable individual that suffered depression and who turn to suicide attacking. Knowing whether suicide attackers suicidal thought, whereas the terrorist suicide attacker as a are suicidal is not simply an academic issue. The growing rational individual that acted on ideologies and beliefs. Thus, evidence that recruitment occurs among the bereaved, those with mentally unstable individuals with suicidal tendencies and intrigued by the media’s portrayal of suicide attackers, might disabilities and even mental illness has clinical implications. It also has implications for prevention. If suicidal ideation, intent or choose to act in the context of terrorism in order to get the planning plays any role in the decision for an individual to expected response by the media and be portrait in the same become a suicide attacker, even if such individuals might be the manner. Media’s representation of terrorism and suicide attacks minority of suicide attackers in general, that finding could be used influence the public in such a degree that it is a major contributing in order to possibly design a more proper prevention programme factor in the recruitment of future suicide attackers. for such vulnerable individuals and possibly future recruits. 5. CONCLUSION 7. REFERENCES 55 [1] Inglehart, R. 1990. Values, Ideology, and Cognitive [17] Merari A, Diamant I, Bibi A. 2009. Personality Mobilization. Pp. 43-66. Challenging the Political Order: New characteristics of suicide bombers and organizers of suicide Social and Political Movements in Western Democracies, R. J. attacks. Terror Polit Violence. 22(1):1061. Dalton and M. Kuechler, eds. Oxford: Basil Blackwell [18] Berko A. 2009. The Path to Paradise: The Inner World of [2] Lester, D. et al. 2004. Suicide Bombers: Are Psychological Suicide Bombers and their Dispatchers. Potomac Books; p. 1 Profiles Possible, Studies in Conflict and Terrorism 27(4): 283– 95. [19] Bodner E, Ben-Artzi E, Kaplan Z. 2006. Soldiers who kill themselves: the contribution of dispositional and situational [3] Weber, M. 1966. The Theory of Social and Economic factors. Arch Suicide Res. 10. pp. 29–43. Organization. New York: The Free Press. [20] Oquendo M, Galfalvy H, Russo S, et al. 2004. Prospective [4] Wintrobe, R. 2006. Rational Extremism. Cambridge: study of clinical predictors of suicidal acts after a major Cambridge University Press. depressive episode in patients with major depressive disorder or bipolar disorder. Am J Psychiatry. 161. pp. 1433–1441. [5] Sageman, M. 2008. Leaderless Jihad. Philadelphia: University of Pennsylvania Press. [21] Smith A, Witte TK, Teal N, et al. 2008. Revisiting impulsivity in suicide. Behav Sci Law. 26(6) pp. 779–797. [6] Durkheim, E. 2006. Suicide. New York: The Free Press. [22] Williams BG. 2008. Mullah Omar’s missiles: a field report [7] Sageman, M. 2004. Understanding Terror Networks. on suicide bombers in Afghanistan. Middle East Policy Council. Philadelphia: University of Pennsylvania Press. 15(4) [8] Khosrokhavar, F. 2005. Suicide Bombers. London: Pluto [23] Zai CC, de Luca V, Straus J. 2012. Genetic factors and Press suicidal behavior. In: Dwivedi, editor. The Neurobiological Basis of Suicide. CRC Press [9] Pritchard C. 1996. Suicide—The Ultimate Rejection? A Psychological Study. Buckingham, UK: Open University Press. [24] Roy A, Segal NL. 2001. Suicidal behavior in twins: a replication. J Affect Dis. 66(1) pp. 71–74. [10] Okasha A, Okasha T. 2009. Suicide and Islam. In: Wasserman D, Wasserman C, editors. Suicidology and Suicide [25] Brent D, Mann JJ. 2005. Family genetic studies, suicide, and Prevention: A Global Perspective. Oxford: Oxford University suicidal behavior. Am J Med Genet. 133(1) pp. 13–24. Press. pp. 50–55 [26] Hoffman, B. (2008) Inside Terrorism. New York: Columbia [11] Wasserman D, Cheng Q, Jiang GX. 2005. Global suicide University Press. rates among young people aged 15 –19. World Psychiatry. 4(2) pp. 114–120. [27] Baran, Jessica. 2008. Terrorism and the Mass Media after Al Qaeda: A Change of Course? The Peace and Conflict Review 3. [12] Pritchard C, Amanullah S. 2007. An analysis of suicide and Available at: undetermined deaths in 17 predominantly Islamic countries http://www.review.upeace.org/index.cfm?opcion=0&ejemplar=7 contrasted with the UK. Psychol Med. 37. pp. 421–430. &entrada=63 [13] Sheehan, I.S., 2014. Are suicide terrorists suicidal? A [28] Nacos, Brigitte L. 2002(a). Mass-Mediated Terrorism. USA: critical assessment of the evidence. Innovations in clinical Rowman and Littlefield. neuroscience, 11(9-10), p.81. [29] Nacos, Brigitte L. 2002(b). Terrorism, the Mass Media and [14] Lankford, A. 2015. What You Don't Understand about the Events of 9-11. Phi Kappa Phi Forum 82. Suicide Attacks. Scientific American [online]. [Accessed 15 December 2016]. [30] Terrorism and Media. 2008. Transnational Terrorism, Security, and the Rule of Law. [15] Ruby, C.L., 2002. The definition of terrorism. Analyses of social issues and public policy, 2(1), pp.9-14. [31] Lewis, Jeff. 2005. Language Wars: The Role of Media and Culture in Global Terror and Political Violence. London: Pluto [16] Speckhard A, Akhmedova K. 2006. Black widows: the Press. Chechen female suicide terrorists. In: Schweitzer Y, editor. Female Suicide Bombers: Dying for Equality? Tel Aviv: Jafee [32] Vasterman, P., Yzermans, C. Y., and Dirkzwager, A. J. E. Center for Strategic Studies; pp. 63–80. 2005. The Role of the Media and Media Hypes in the Aftermath of Disasters. Epidemiologic Reviews 27 56 Architectural Cognition Sociology Tarkko Oksala Susanna Toivanen Aino Oksala Aalto University Mälardalen University University of Stockholm Otakaari 1 Box 883 Krögarvägen 14 FIN-02150 Espoo 72123 Västerås 14552 Norrsborg +358 - 445444873 +46 - 736621445 +46 - 762653856 Tarkko.Oksala@gmail.com susanna.toivanen@mdh.se aino_oksala@live ABSTRACT 2. INTRODUCTION TO The aim of this paper is to promote Architectural Sociology keeping cognition in focus. Firstly architecture, cognition and ARCHITECTURAL COGNITION society are considered in their relationships. Secondly associations SOCIOLOGY promoting cognition, its study and extensions of architectural 2.1 Architectural Cognition cognitonics are discussed. This all is made in order to form a clear Architecture consists in its relation to cognition of ideas represented basis to understand architectural action in socio-psychological in its basic theory [37], like: reality. Ordination, disposition, harmony (and cognition) General Terms Symmetry, decor, distribution (and cognition) Design, Experimentation, Human Factors, Management, Performance, Theory Architecture is subordinated to the idea of order analogical with cosmic order [42]. We are directed toward world (Brentano) and its architecture. In ideal form this relation is harmonic, but fight for Keywords harmony and peace is one possible and important extreme in our Architecture, Certainty, Information Society, Cognition, attitudes. Cognitonics, Sociology Our relation toward world is dually “symmetric”, and a lot of 1. INTRODUCTION similarities exist in supposed reality and mental representations due to the cosmic order [35, 14]. We are interpreting our environments Architecture manifests human creative potentials in culture [Alvar and décor tells about the social content of targets. Finally Aalto, 1963 in discussion]. These potentials are evidently cognitive architecture is distributed and this correspond the most accurate and achieved by talent and education [37, 28]. In this sense descriptions of it in mind. Architectural Sociology [33, 5, 26, 27] is the most natural forum to discuss architectural cognition and its role in society. We have the Architecture has its cognitive modes discussed in literature [30, 40] following key questions: Environmental Psychology is a study area discusssing cognitive problems also in architecture [10]. More surprising is that cognition Architecture, cognition, society and cognition has its architecture [23, 24, 25]. Cognition society, study, cognition sociology extended Spatial architecture refers both to performances and products and Architecture and thinking have the same roots in ordination, which the same holds for cognitive architectures, which have also their according to Aristotle is central content of thinking [38, p. 25]. mental perfomances and products. Later Vitruv [37, p. 37] adopted the concept of ordination into the constituents of architecture. Cognition is a broader concept than 2.2 Cognition thinking. The common point mentioned gives, however, a good Cognition is studied not only in philosophy but in cognitive start to discuss the problem. In practical life designers do not think psychology as well [41]. How to define it is a problem, but we thinking but just think [31]. In theory the notification of this has define it in a relative unproblematic way to consist in relation to been emphasized [36]. It is also a commonplace to say that architecture of ideas: architecture is one of the so many targets of thinking and cognition, but how this happens is a new question. [22] Perception, memory, thinking (and architecture) Abstraction, knowledge, information (and architecture) Architectural perception does not differ from general one in principle, but in orientations [10]. The role of memory in architecture has been noted, but also problematized [29]. The word “reminescences” has been used in design speech [Aalto, 1968 in discussion] and art history to mean the use of loans from other 57 buildings. Thinking is the key element of cognition in rationalistic Microsoft, Apple). The ways how we manage cognition can be architecture [31]. called cognition culture, which may reach its civilized forms or not. Today there are a lot of mal-uses of cognitive devices, like in cyber- Abstraction [15] has its typical forms both in science but also in art [1, p. 71-]. Knowledge-based approach in architecture [9, 12] has war, cyber-crime, reckless confusions in digital education etc. brought architecture closer to KE (Knowledge-Engineering) and AI Smart societies are from our point of view communo-technological ecosystems utilizing ICT [3]. (Artificial Intelligence). Ideas like Information Society [18, 2] have catalyzed discussion in architecture and its communication [32, 40, 20]. 3.2 Study Cognition sociological problems can be studied first of all in Architects have discussed a lot how to guarantee multi-modal Cognitonics [6]. From methodological point of view we may convenience in architecture and prohibit strong reflections or noise separate forms [26, 27], like: [1, p. 37-]. Information on the other hand is the same as the elimination of uncertainty, which has central task in all cognitive Statistical, empirical, logical cognition-study faculties above. - Rational skills are the first tools to discuss Comparative, qualitative, quantitative cognition-study cognition, but rationality is only a sector in cognition. Covering discussion has to consider belief, knowledge, volition, desire, Statistics is a natural tool to run brain-study in the same way than emotion and skills. behavioral approach in sociology. Brain and mind are, however, not identical research targets. Empirical study of mind is a problem and 2.3 Societal Cognition should be re-connected with the idea of internal experience or experiment (Hutcheson). In this sense we need reflective The form and content of human societies separates us from other conception-logics and notification of modal and deontic logic. [16] animals. The secret behind this depends on cognitive potentials (Aristotle > rationem particeps). [28, p- 16-] Societal cognition has Cognition is naturally compared as related to variation of content its forms, like: (> Carnap, Hintikka > [17]). These problems can be studied in qualitative [19] or quantitative information theory [20] discussing Ecological, communal, technological (cognition) the elimination of uncertainty in environmentally related action. Economic, cultural, civilization/ -civilized (cognition) Logical study of cognition starts eg from the logic of perception. If Ecological cognition renders it possible to survive in a world in a some of the cognitive operations above (2.2) hold for target x, and sustainable manner. Human world has evolved to be an hold for target y, then they hold for target x and y. If cognitive Antropokosmos [7, p. 251-]. It consists of community societies [8] operations hold in the case of target x, then they hold for more challenging the human mind to react to social needs and desires in general targets like x or y. They either hold or not for x. Then if I renewing ways. This catalyzes technological evolution based on perceive a house and I perceive a sauna, (then) I perceive a house typical ways of cognition in the same way that architecture does as and a sauna. If I remember a red door, then I remember (a red or a arche-technology [1]. green door) it is I remember a door. Cognitive operations are thus Humans have developed fiscal ecology called economy, which has connected to Propositional (Boolean) Algebras to be represented in Set Theoretical tools in the so called Stone Space (created). [17] In its characteristic ways of thinking in good and bad. In normal societal discussion the concept of thinking is most connected to the case of perception we have the situation of standard scientific cultural phenomena (above). In culture we may differentiate experiment. It is however well known that in addition to perception civilized forms or not of cognition. Crucial question in this experiments we may have remembering, thought, abstraction/ determination, knowledge acquisition and information gathering evaluation is the dilemma between human or not human [1]. Today experiments as well. In fact for example perception experiment is it is important to note recent transition toward Information Society [12, p. 20-], Electromediative [21] or “Smart Society”[3]. also information gathering experiment per se in eliminating our uncertainty about the target. [20] 3. SOME SIGNIFICANT ASPECTS OF ARCHITECTURAL COGNITION 3.3 Cognition Sociology Extended Architectural Cognition Sociology has its key target in society. The SOCIOLOGY complex problem means that it is natural to enlarge the study to dimensions, like: 3.1 Cognition Societies Sociality, society, state (and cognition) The dispersions of our opinions concerning what is cognition force us to found cognition-associations or mini-societies to promote Function, work, politics (and cognition) right ways of thinking [39]. Key ideas to note include: The study of cognition starts from personality [24]. Personality is (Cognition) ecology, community-networks, technology built, however, on collective achievements. [1, p. 92-93] Society is the primary growth environment for us. State however gives still (Cognition) economy, culture, civilization mainly the rules for societies. In this sense it is natural to speak Cognition is under constant processes of change. [38] Some ideas about Finnish or Scandinavian design and so on. The situation is are born whereas other die or decade. The only way to fight for however changing and we have lost Regional ideas [1] on the altar cognition promotion is to network locally and globally for of not only International Style but also of Global often speculative professional assertion [39] (> CIAM, [4]). Cognition technology in forces. the form of mnemonics has its long roots and can be connected Architecture refers only seldom to global problems of Mankind in today to ICT (Information and Communication Technology) [13]. war and peace. The normal level of thinking in architecture is Cognition has its own economy, which can be traced to the ideas of functional. [39, 42, 4] In this sense we have to recognize sacral, Occam and Mach [11, p. 18-]. In practical level we also know that public, work, free-time, private and profane tasks and challenges to cognitive tools are targets of exploding business (> Nokia, be solved with our creative potentials (above). Work has its special 58 status. Design is work and design for work is decisive because [13] Majurinen, J., Oksala, T. 2009. Junaliikenteen success in it catalyzes success in general [34]. In this sense politics informaatiokeskuksen toiminta-tapa (The Action Way of the and work politics have decisive role in directing human potentials Information Centre of Train Traffic). Ratahallintokeskus. to right targets. According to Aristotle the best politics in Politeia [14] March, L., Steadman, P. 1972. The Geometry of picks people to realize their own talents and skills achieved by Environment. RIBA Publications Limited education. [15] Mikkola, E. 1964. Abstraktion Begriff und Struktur. Helsinki 4. CONCLUSIONS [16] Murphy, R. 1989. Modal logic for conceptual combination. We have shown what Architectural Cognition Sociology is in its In J. S. Gero, and T, Oksala, (eds), Knowledge-Based big picture. Society is the basic unit to consider interaction of Systems in Architecture. APS Ci 92 (Acta Polytechnica architecture and societal activities. This concern can be deepened Scandinavica, Civil Engineering and Building Construction to personal aspects of cognition and toward global problem Series) pp. 39-48 formulations. The main field of application of the theory lies on the [17] Niiniluoto, I. 1975. Todennäköisyyden lajeista (On the side of Information, Electromediative and Smart Societies. Species of Probability). In R. Tuomela (ed .), Yhteiskuntatieteiden eksakti metodologia. Gaudeamus, pp. 5. ACKNOWLEDGMENTS 22-154 This paper is based on discussions with Joel Majurinen and Jyrki [18] Niiniluoto, I. 1989. Informaatio, tieto ja yhteiskunta Tyrkkö. The inspiring atmosphere in the Symposia of “Sustainable (Information, Knowledge, Society). Valtion Painatuskeskus Development and Global Community “chaired by professors G. E. [19] Oksala, T. 1976. Asuinalueen visuaalinen laatu (Visual Lasker and K. Hiwaki (IIAS) (The International Institute for Quality of Housing Area). In J. Laapotti, I. Niukkanen and Advanced Studies in Systems Theory and Cybernetics) and “Architecture, Urbanity and Social Sustainability” chaired by T. Oksala, Asuinympäristön laadun muodostuminen. Otaniemi, pp. 118-148 professors G. Andonian and G. E. Lasker (IIAS) is also gratefully acknowledged. The same holds true in the side of cognitional [20] Oksala, T. 1981. Logical Aspects of Architectual Experience studies in the case of Cognitonics 2011, 2013, 2015 chaired by and Planning. Otaniemi professors Vladimir A. Fomichov and Olga S. Fomichova. [21] Oksala, T. 2011. Electromediative Society, Challenges for Sustainable Development. In G. E. Lasker and K. Hiwaki 6. REFERENCES (eds): Sustainable Development and Global Community. Vol [1] Aalto, A. 1972. Luonnoksia (Sketches), (ed) G. Schildt. XII. IIAS (The International Institute for Advanced Studies Otava in Systems Research and Cybernetics), pp. 73-7 [2] Bohanec, M. et al (eds) 2011. Proceedings of the 14th [22] Oksala, T., Lasker, G. 1996. Design: Evolution, Cognition. International Multiconference Information Society – IS APS, Ci 105 (Acta Polytechnica Scandinavica, Civil 2011. Ljubljana, Jozef Stefan Institute; Engineering and Building Construction Series) https://is.ijs.si/archive/proceedings/2011/ (open access). [23] Oksala, T., Oksala, A. 2011. Cognitonics Studying the Skills [3] Boznar, M. Z., Mlakar, P., Grasic 2011. Smart Villages vs. of Mind, in M. Bohanec et al (eds) 2011. Proceedings of the The Smart Cities Concept for E-Inclusion, in M. Bohanec, et 14th International Multiconference Information Society – IS al (eds), Proceedings of the 14th International 2011. Proceedings A, Kognitonika/Cognitonics. Ljubljana, Multiconference Information Society – IS 2011. Ljubljana, Jozef Stefan Institute; pp.349-350 Jozef Stefan Institute; pp.191-194 https://is.ijs.si/archive/proceedings/2011/ (open access). https://is.ijs.si/archive/proceedings/2011/ (open access) [24] Oksala, T., Oksala, A. 2013. The Architecture of Personality [4] Condrads, U. 1966. Programme und Manifeste zur and Personal Development. In M. Gams, R. Piltaver, D. Architektur des 20. Jahrhunderts. Ullstein Mladenic et al (eds), Proceedings of the 16th International Multiconference Information Society – IS 2011. Ljubljana, [5] Deliz, H. 2009. Architektursoziologie. Transcript Verlag 7-11 October 2013, Proceedings A, [6] Fomichov, V., Fomichova, O. 2012. A Contribution of Kognitonika/Cognitonics, Ljubljana, Jozef Stefan Institute; Cognitonics to Secure Living in Information Society; https://is.ijs.si/archive/proceedings/2013/ (open access). Informatica. An International Journal of Computing and Informatics (Slovenia). 36, 2, 121-130; www.informatica.si [25] Oksala, T., Oksala, A. 2015. The Conceptual Architecture of (open access). Modified Emotion. In Proceedings of the 18th International Multiconference Information Society – IS 2015, Volume F, [7] Friedmann, H. 1949. Wissenschaft und Symbol. Beck V. A. Fomichov and O. S. Fomichova (eds), [8] Friedmann, H. 1954. Epilegomena. Beck Kognitonika/Cognitonics. Ljubljana, Jozef Stefan Insitute, 2015, 62-65; https://is.ijs.si/archive/proceedings/2015/ (open [9] Gero, J. S., Oksala, T. 1989. Knowledge-Based Systems in access). Architecture. APS Ci 92 (Acta Polytechnica Scandinavica, Civil Engineering and Building Construction Series) [26] Oksala, T., Toivanen, S. 2016 a. Architectural Sociology, Art or Science. In G. E. Lasker et al (eds.), Art and Science [10] Hesselgren, S. 1969. The Language of Architecture. Lund 2016. IIAS (The International Institute for Advanced Studies [11] Kaila, E. 1939. Inhimillinen tieto (Human Knowledge). in Systems Research and Cybernetics) Otava [27] Oksala, T., Toivanen, S. 2016 b. Sociology Meets [12] Linn, B. 1998. Arkitekturen som kunskap (Architecture as Architecture. In G. E. Lasker and K. Hiwaki (eds.), Knowledge). Byggforsknigsrådet S ustainable Development and Global Community 2016. IIAS 59 (The International Institute for Advanced Studies in Systems [35] Weyl, H. 1952. Symmetry. Princeton Research and Cybernetics) [36] Wickberg, N.-E. 1946. Ajatuksia arkkitehtuurista (Thoughts [28] Oksala, T. K. 1986. Homeroksesta Alvar Aaltoon (From on Architecture). Otava Homer to Alvar Aalto). W+G (Weilin + Göös) [37] Vitruv 1991. Zehn Buecher ueber Architektur, uebers. C. [29] Radford, A., Oksala, T. 1996. Creative Memories and the Fensterbuch. Darmstadt Finnish Sauna, in T. Oksala, G. L. Farre and G. Lasker [38] Wojciechowski, J. A. 2001. Ecology of Knowledge, RVP editors, Design: Emergence, Content. APS Ci 106 (Acta (The Council for Reserch in Values and Philosophy) Polytechnica Scandinavica, Civil Engineering and Building Construction Series) [39] Wright, F. Ll. 1941. On Architecture, New York [30] Rasmunssen, S. T. 1959. Experiencing Architecture. [40] Ylinen, J. 1968. Arkkitehtoninen tila ja muoto (Architectural Cambridge Space and Form). Otaniemi [31] Rowe, P. G. 1987. Design Thinking. MIT [41] Zusne, L. 1970. Visual Perception of Form, AP [32] Saarinen, E. 1948. The Search for Form. Heineman [42] Ålander, K. 1954. Rakennustaide renessanssista funktionalismiin (Architecture from Renaissance to [33] Smith, R. W., Bugni, V. 2006. Symbolic interaction theory Functionalism). WSOY and architecture. Symbolic interaction, 29 (2), pp. 123-155 [34] Toivanen, S. 2015. Framtidens arbetplatser. Goethe 60 Goals of Cognitonics in Formal ICT Education Ida Panev Ivan Pogarčić Ljubinka Gjergjeska Polytechnic of Rijeka, Polytechnic of Rijeka, Faculty of Computer Science and Business Department, Business Department, Engineering, University of Information Vukovarska 58, Vukovarska 58, Science and Technology "St. Paul The 51000 Rijeka, Croatia 51000 Rijeka, Croatia Apostle", Partizanska bb, Tel: +385 51 353706 Tel: +385 51 353753 ipanev@veleri.hr 6000 Ohrid, Macedonia (FYRM) pogarcic@veleri.hr Tel: +389 46 511585 ljubinka.gjergjeska@uist.edu.mk ABSTRACT education and to point out the changes that should be made for quality and harmonious intellectual and spiritual development of Cognitonics is a scientific discipline of the newer date developed an individual. with the aim of studying the human being in the digital world. The aim of this study is to evaluate the realization of Cognitonics' 2. ICT in Education Systems goals within IT subjects in Croatian primary education. The work Today it is necessary to supply schools with multimedia will serve as a starting point for further research of the equipment, connect them to the Internet, and train teachers to implementation of Cognitonics' goals within IT subjects in work with this technology. It can be done by encouraging schools elementary education. to be more proactive, to accept new ideas and to adopt and implement the changing goals of society. By integrating ICT, the Categories and Subject Descriptors tools for work as well as educational contents are changed, i.e. the K. Computing Milieux: K.3 Computers and education: K.3.0 complete educational environment is changed. According to General, K.3.1 Computer Uses in Education, K.3.2 Computer and Bearden [1], the goal is to change traditional concept of classroom Information Science Education. teaching, to integrate technology into education, and to create a space open to demands of society, with the aim of building a General Terms sense of belonging to society in order to achieve a smart, Management, Measurement, Documentation, Performance, sustainable and inclusive growth of an individual. In the research Design, Reliability, Experimentation, Human Factors, conducted in Italy [1], the teacher's view is that the use of ICT Standardization, Theory. within the education system affects the development of group work ability and represents a cognitive learning resource that Keywords enables development of more complex and richer thoughts among Cognitonics, ICT, ICT education. individuals. 1. INTRODUCTION Today, there are a number of educational contents in digital form. Teacher is the one to choose the form in accordance with Cognitonics is a scientific discipline of the newer date developed educational needs of students and characteristics of educational with the aim of studying the human being in the digital world. It is content. Besides that, appropriately chosen technology and based on research results that point to the gap between intellectual content can be a motivating factor for encouraging and and spiritual development of individuals in a modern information maintaining interest in both teaching and learning. society under the influence of rapid technological progress, ICT (Information and Communications Technology) development and The use of ICT in education has a number of advantages over the globalization. traditional way of education: accessibility, mobility, interactivity, lower price, distance learning, etc. One of the goals of Cognitonics is to determine which are the optimal age and the cognitive preconditions that a person must Additionally, digital learning materials can be easily updated and / possess for getting acquainted with ICT in order to reduce the gap or altered with new ones, which is essential in today's rapidly that affects the integrity of human nature, i.e. the harmonious changing educational environment. development of a person. Furthermore, the goal of Cognitonics is Many studies point to the benefit of using ICT as a teaching and to create theoretical basis that will enable development of learning tool within teaching. Using it, students are able to change different systems within ICT. These systems must have a positive the way they access information, collect them, analyze them, impact on development of individual's creativity, its sense of present them, etc. It also enables them to develop the skills of harmony and beauty, awareness of belonging to a particular socialization, creativity and cooperation skills. In this way national culture, a positive impact on the development of students show interest and satisfaction, and learning is individual language skills, ethical behaviour, self-regulation and transformed from static to dynamic situation. other values that represent some of the principles of Cognitonics. The application of these principles should be encouraged for the 3. Cognitonics and Emotional-Imaginative purpose of harmonious and complete, correct development of Teaching System individuals. The traditional education system in Croatia was focused on The aim of this research is to evaluate the realization of content, not on an individual; on results, not on the process of Cognitonics' goals within IT subjects in Croatian primary acquiring knowledge and skills; on shaping an individual 61 according to existing social patterns, not on creating conditions useful to society, the ability of social co-operation and a deep for development of his/her creative potential. The main goal of the sense of social responsibility. education system should not be to absorb large amounts of Additionally, in order to develop intellectual and emotional different information, but to develop the logical and creative spheres of students harmoniously, emotions need to be taken into abilities of individuals as well as to develop their ability to change account. In order to equally develop student's intellectual and existing situations. emotional sphere in the classroom, it is necessary to take into According to Fomichova and Fomichov [3], the main social account what incentives are needed for their development. There function of education is reproduction of culture. Their approach to is, for example, thought about music or any other type of art that solving educational problems is in line with the constructivist promotes the development of emotions. For art it can be said that theory which states that knowledge is not only transmitted by a it is representation of emotional experience which is achieved by teacher to a student but it is built into the mind of students during experiencing a particular work of art. Besides emotions, there is a the process of active learning. That is why the educational process need to develop the ability of empathy, sympathy, and should be based, among other things, on the principles of emotionality in students. Cognitonics. The goals of cultural enrichment, the development of 4. Cognitive Psychology and Informatics cognitive mechanisms and intellectual and spiritual development of child must be jointly incorporated into contemporary Cognitive psychology was developed in Great Britain in the fifties educational processes in order to enhance the child's ability to and sixties of the 20th century under the influence of various properly process all information. disciplines (neuroscience, linguistics, anthropology, philosophy, etc.) including computer science. Technological development has In the 1990s, Olga Fomichova created the Emotional-Imaginative influenced the way that human psyche began to be perceived, so Teaching System (EIT - system), which became one of the the development of ICT has led to the use of IT terms in the principal preconditions of developing in the 2000s (together with sphere of psychology (for example, a sentence: the human brain Vladimir Fomichov) the foundations of Cognitonics. has limited capacity for processing information). Besides that, According to Fomichov and Fomichova [4], the aforementioned cognitive psychology studies how human mind works using system aims at developing in individual: ability to process computer tools and methods. Cognitive psychology, as well as symbolic information; ability to observe and appreciate beauty in Cognitonics, studies how computers can be best used to help an all its appearances, particularly in human activity; ability to individual in his/her work, with the aim of harmonious understand others; understanding of so-called social agreement development of his/her emotional and rational sphere. On the and social relationships; ability to have one's own point of view; other hand, psychological knowledge can be a very useful tool in sense of belonging to the generation as well as the understanding developing ICT, which enables communication of the individual of those generations that were before and those that will develop (user) with the mentioned technology. Psychological optimization later; and awareness of belonging to a particular national culture. will probably become one of the important factors in the In other words, this system aims to introduce a social, human development of user interfaces for computer systems that will component into education and can be perfectly integrated into stimulate the achievement of goals of Cognitonics as a newer goals of Cognitonics for the use of ICT. scientific discipline. Related to this, Micarelli and Pizziolo [5] mention the fact that 5. Cognitonics and eLearning today's younger generation under the influence of modern ICT is Today's use of the online education environment is increasingly increasingly deprived of perceptual experiences arising from the frequent.. In order to make the use of eLearning successful, it is social environment in which they live. They remain deprived of necessary to offer to individual high quality of educational direct and spontaneous social relationships, and these are replaced experience. In order to achieve this, it is necessary to have a well- by superficial, virtual interaction. Authors believe that traditional made training course adjustable to student needs and capabilities. education systems are not able to close this trend, which suggests This can be achieved with a well-developed system for evaluation that certain changes are certainly needed to create new ways of of student achievement. With this system, a student can be teaching and learning. They argue that it is necessary to teach the provided with a more personalized learning experience. children of a modern information communication age to discover and interact with their living environment and recognize Since it is, in today's information communication era, more and themselves as the integral and active part of that environment. In more common the use of eLearning, which is carried out within other words, it is necessary to encourage a sense of belonging and the various educational programs, it is necessary to, at all times, social awareness and sensitivity. In addition, it is necessary to respect the goals of Cognitonics in order to achieve desired results harmonize the impact of virtual and real-world environment, as in the development of individual (student). One of the items that well as to enable their merging to achieve an extended life must be taken into account when organizing and conducting environment. Micarelli, Pizziolo et al. [6] claim that the virtual eLearning is the culture and cultural heritage of the society within environment seeks to replace the real world by imitating it, which such a form of learning is implemented [7]. In addition, endangering the social component of individual life. One of the there are many items in each individual participant of such ways that authors [5] emphasize, as being successful in creating programs that must be taken into account in order to meet the an individual's connection to their environment, is the pursuit of goals that are being set up by eLearning. Some of them are: the activities that allow friendly engagement, spontaneous language in which the program is being conducted (level of conversations, social awareness, and real connectivity with their knowledge of the language, the competence of its use), the surroundings, all accompanied by a pleasant atmosphere. In this necessary foreknowledge of the participant, his/her material way, an individual can once again discover the possibility of status, religious orientation, cultural and social background, sense respecting and associating with his/her own living environment. of beauty, etc. All these are important parts that need to be carefully considered during design of an eLearning program, so The main driving force of each society of knowledge is a creative they could be indeed adapted to an individual enabling the class that encourages development of: creativity, the desire to be 62 harmonious development of his/her intellectual and emotional education in the Republic of Croatia. This will give a clear picture sphere. of the current situation regarding Cognitonics. This research has not yet been carried out in Croatia, and can be included under In accordance with this, Burdescu et al. [2] note that classification is one of the main algorithms that must be used when primary research with regard to the type of data being collected. implementing eLearning. It provides the possibility of detecting Given the type of data being studied and considering the goals, this will be a theoretical descriptive statistical study. potential groups of participants of similar characteristics and similar responses to the offered learning strategy. Furthermore, 6.1 Survey questions the authors believe that the use of classification: increases the 1. Gender? learning ability of students; allows the grouping of students who 2. Year of birth? are faced with a failure to help them improve their skills; 3. Do you have daily access to the computer and the Internet? identifies participants with low motivation, and similar. The aim 4. For what purpose do you use the computer and the Internet most of the use of classification is to increase the effectiveness of the frequently? online education process, which is one of the biggest challenges 5. How often do you use the computer and the Internet? of the information society. For this purpose, the authors created a 6. How old were you when you started using the computer? structure for the classification of the participants, based on their 7. How old were you when you started using the Internet? final grades. That has been achieved by using certain algorithms 8. Do you feel like a computer literate person? and procedures for classifying every student. 9. When did you start with formal (organized) education in the In order to improve the communication between professors and field of information technology? participants of eLearning program, new tools are developed, 10. Have you been encouraged to use ICT for educational purposes which contain intelligent data analysis techniques (for analysing during elementary school education? the text itself and the feedback that students send). In addition, it 11. Do you think that at the beginning of the organized (formal) is necessary to develop tools that will be able to analyze the attendance of IT education you have been introduced into its cognitive development areas of students with the aim of enabling spheres so that ICT: has become a tool that has expanded / teachers to develop precise mental models of each student's enriched your creative way of thinking; has became a tool that abilities. Within regular education systems, teachers achieve that guided you / determined your way of thinking? by a constant face-to-face interaction with students, which enables 12. During the use of ICT that was available to you in your classes, them to recognize both learning abilities and individual professors supported / encouraged the development of your: developmental abilities. It is much more difficult to achieve that personality; creativity; cognitive sphere; emotional sphere; online. The aim is to develop tools to monitor the activity of each awareness of national affiliation and national culture; language individual student so that teachers can understand and analyze skills; communication skills; ability to cooperate; ability of their behaviours and actions to improve their skills and experience independent thinking; ability to prepare for real situations; ability while attending online education programs [8]. to make your own decisions; analytical abilities; learning abilities; ability to learn from mistakes; Did not encourage any development; 6. Research about implementation of goals of I do not know. Cognitonics when introducing students into 13. At the beginning of your formal (organized) IT education was it accentuated to you what kind of behaviour is expected of you in the spheres of ICT the information environment, and what kind of behaviour is strictly The aim of the research is to determine the extent to which forbidden? informatics teaching in elementary schools in the Republic of 14. Do you believe that the Internet, at the beginning of your Croatia is conducted in accordance with the goals of Cognitonics. formal education, has influenced your cultural identity (an identity In other words, the aim is to analyze the existing situation by that speaks to which culture you belong)? investigating how far the Cognitonic goals are being pursued 15. Do you feel that during formal (organized) IT education you during the introduction of an individual into the sphere of ICT. have been encouraged to appreciate traditional values (family, Research will also help to understand when the children are first religion, awareness of national affiliation ...) regardless of the fact encountered with formal IT education. that Internet allows globalization? The research was conducted by an anonymous survey that was 16. Do you believe that the use of ICT generally encourages in you distributed online to the student (academic) population. It should the acceptance of traditional or commercial values? be emphasized that this was a non-probabilistic sample of 17. During your beginning of formal IT education, by using ICT volunteers. A sample of this age group was selected because it is you were encouraged to: develop awareness of the values of the considered that respondents can reasonably, accountable and national culture to which you belong; develop the need for comprehensively approach reflection during filling in the globalization instead of belonging to a single national culture; I do questionnaire. In addition, the respondents were able to see, with a not know. certain time lag, the situation in which they were in the first 18. When using ICT during the beginnings of your formal IT formal meetings with ICT. education it was stimulated your: spiritual development; intellectual development; equally intellectual and spiritual For the purpose of the research, it was used a survey questionnaire development; I do not know. with closed questions and with the obligation to answer each 19. When using information technology for communication, do question. Survey respondents were voluntary and anonymous. The you pay attention to the grammatical accuracy of your language survey was distributed through the web site www.inovacije.eu, expression? which aims to conduct online research. When analyzing the 20. Each of us has its own value system in life. The use of ICT in results of the survey, descriptive statistical data analysis was used. formal education encouraged you to follow which value system With this survey and analysis of its results we want to gather data subjects? and explore whether and to what extent are the goals of Cognitonics represented in formal elementary informatics 63 21. How do you react to any negative situation you face on the that the professors used to support / encourage the development of Internet? their: communication skills (52.83%), co-operation skills 22. How much are you affected by the information you are (50.94%), self-reflection skills (52.83%) and learning abilities encountering on the Internet? (50.94%) during the use of ICT in teaching. A little less than half 23. With other people you usually associate: virtual; live; equally of the respondents stated that the professors used to support / virtual and live; I do not know. encourage the development of their creativity (49.06%), 24. Where do you feel better: in virtual reality, in real life, or analytical skills (41.51%), and the ability to learn from mistakes equally? (45.28%). What indicates insufficient presence of goals of 25. Do you think there is a difference between "face to face" Cognitonics in teaching is the statement of less than one third of communication and communication by using ICT? respondents that during the use of ICT in teaching professors 26. Do you feel that you belong to the social community within supported development of their cognitive sphere (24.53%), which you live? language skills (22.64%), ability to prepare for real situations 27. Have you ever used ICT for any wrong purpose? (28.30 %) and the ability to make their own decisions (26.42%). It 28. Do you think that using ICT encourages tolerance, dialogue, is worrying that 20.75% of respondents stated that there was not and respect for others? encouragement of any development in them. Likewise, only 29. Does the use of ICT affect you positively or negatively? 16.98% of the respondents state that during the use of ICT in 30. Were you, during the formal education, warned on the teaching, it was stimulated the development of their personality. negative consequences of using ICT for the wrong purpose? The development of the emotional sphere (1.89%) and awareness 7. EXPLANATION OF RESULTS INSTEAD of national affiliation and national culture (7.55%) are completely neglected. OF CONCLUSION It is interesting to note that the same number of respondents The results of the survey analysis show that there was an equal (43.40%) stated that they were accentuated, and were not number of female (50.94%) and male (49.06%) respondents. The accentuated at the beginning of their formal (organized) IT sample with which the analysis was made consisted of 53 education what kind of behaviour is expected of them in the examinees. The oldest respondent was born in 1969, the youngest information environment, and what behaviour is strictly in 1998, and it was a student (academic) population. All forbidden, while 13.21% of them do not know the answer to this respondents (100.00%) have daily access to the computer and the question. As far as cultural identity is concerned, more than half Internet. As far as information literacy is concerned, most of respondents (64.15%) stated that the Internet, at the beginning respondents (92.45%) are considered themselves literate. Two of their formal education, had no impact on their identity which respondents (3.77%) did not know and two of them (3.77%) tells them to which culture they belong to. Among the responded nor yes nor no. When stating what is the most common respondents, 43.40% stated that during formal ICT education they purpose of using computer and Internet, the majority of were not encouraged to value traditional values such as family, respondents placed communication (28.30%) and entertainment / religion, previously mentioned nationality and similar, while gaming (20.75%) in the first place, which shows that it is a 39.62% stated that they were encouraged. On the other hand, younger population. In the second place, most of the respondents when they had to choose whether ICT use generally encouraged put informing (30.19%) and fulfilment of faculty obligations them to respect traditional or commercial values, 35.85% said it (20.75%). In the third place, it was again the fulfilment of the was commercial and only 1.89% said it was traditional values, faculty obligations (24.53%). On fourth place, the majority of while 30.19% of respondents considered that the representation of respondents put equally learning and informing (20.75%). In the values is the same. Almost half of the respondents (49.06%) stated fifth place, most of the respondents put again learning (24.53%). that during formal IT education they were encouraged to develop Considering the population of the respondents, it would be the need for globalization instead of belonging to a single expected that learning would be at a higher priority ranking place. national culture, 39.62% did not know, and only 11.32% stated At the second last place most of the respondents put the purchase that they were encouraged to develop awareness about the values (35.85%) and the work / fulfilment of the business obligations of the national culture they belong to. More than half of the (24.53%). The same is the last place: purchase (41.51%) and work respondents (67.92%) stated that at the beginning of their formal / fulfilment of the business obligations (30.19%). The last two IT education, it was stimulated their intellectual development, places are again an obvious indicator that respondents who have only one respondent (1.89%) stated spiritual development, and completed the survey belong to the student population. 22.64% stated the same amount of intellectual and spiritual When answering how frequently are using the computer and the development. In any case, it is too little to argue about how Internet most respondents (98.11%) responded several times a successful goals of Cognitonics are pursued during elementary day, and only one respondent (1.89%) responded several times a school education. Interestingly, more than half of respondents week. More than half of the respondents started using computers (52.83%) stated that when using ICT for communication they pay between 6 and 10 years of life (50.94%), and the Internet between attention to the grammatical accuracy of their language 11 and 14 (56.60%), which points to the need and importance of expression only when they consider it necessary, less than half of implementing Cognitonics' goals into ICT education already in the respondents (45.28%) stated that they pay attention always, elementary school. According to the answers to the previous and only one of the respondents (1.89%) stated that he does not question, most respondents (43.40%) started with formal IT pay attention. Respondents stated that, during the use of ICT in education in higher grades of elementary school. Nonetheless, formal education, they were stimulated to grow the feeling for the more than half of the respondents (54.72%) answered that during following elements of their value system in the following primary education they were not encouraged to use ICT for percentages: career 49.06%, friendship 41.51%, social educational purposes. Positive side points out that almost half of responsibility 39.62%, decency 35.85%, tolerance to differences the respondents (49.06%) said that at the beginning of their formal 35.85%, sincerity 30.19%, honesty 30.19%, family 20.75%, trust IT education, ICT became a tool that expanded / enriched their 18.87%, love 15.09%, religion 5.66%, and patriotism 3.77%. As creative way of thinking. More than half of the respondents stated 64 for the negative situations encountered over the Internet, most [2] Burdescu D. D; Negulețu O; Mihaescu M. C; Logofatu B. respondents (45.28%) stop and think before allowing the negative 2011. Improving The Effeciveness Of Educational Process situation to affect them, 24.53 % do not respond to negative By Clustering, in M. Bohanec et al (eds.). Proceedings of the situations, 20.75% respond to the first impression, 7.55% do not 14th International Multiconference Information Society – IS encounter situations that negatively affect them, and one 2011, The Conference Kognitonika/Cognitonics. Ljubljana, respondent (1.89%) does not know. When respondents were asked Jozef Stefan Institute, pp. 419 - 422; available online at to what extent they are affected with the information they https://is.ijs.si/archive/proceedings/2011/ encounter over the Internet, most of them (75.47%) stated that [3] Fomichova, O. S; Fomichov, V. A. 2009. Cognitonics as an they are affected to the extent to which they feel that this answer to the challenge of time, Proceedings of the 12th information is accurate. 20.75% responded that they are not International Multiconference Information society − IS 2009, affected, one respondent (1.89%) answered that he is fully Slovenia, Ljubljana, 12 - 16 October 2009. The Conference affected, and one respondent (1.89%) did not know. Less than half Kognitonika/Cognitonics, Ljubljana, Jožef Stefan Institut, of the respondents (41.51%) believe that ICT use encourages 2009, pp. 431 - 434; available online at them to tolerance, dialogue and respect for the other, 30.19% https://is.ijs.si/archive/proceedings/2009. argued that this is not the case, and even 28.30% do not know. [4] Fomichov, V. A; Fomichova, O. S. 2011. A map of cognitive Half of the respondents (50.94%) stated that they usually associate transformations realized for early socialization of children in with other people in person, 45.28% of them communicate the internet age, in M. Bohanec et al (eds.). Proceedings of the equally virtual and live, and only 3.77% communicate only 14th International Multiconference Information Society – IS virtually. Accordingly, 62.26% of respondents stated that they feel 2011, The Conference Kognitonika/Cognitonics. Ljubljana, better in real life, 26.42% stated that they feel equally good in Jozef Stefan Institute, pp. 353 - 357; available online at virtual reality and in real life, and 9.43% respondents responded https://is.ijs.si/archive/proceedings/2011/ that they feel better in virtual reality. Regardless, all respondents (100.00%) are aware that there is a difference between "face to [5] Micarelli, R; Pizziolo, G. 2011. The social perception of face" communication and communication using ICT. More than landscape as a means of natural, evolutionary and educational half of the respondents (62.26%) stated that they feel they belong communication, , in M. Bohanec et al (eds.). Proceedings of to the social community they live in, 24.53% feel they do not the 14th International Multiconference Information Society – belong and 13.21% do not know. IS 2011, The Conference Kognitonika/Cognitonics. Ljubljana, Jožef Stefan Institute, pp. 372 - 375; available online at It is worrying that almost half of the respondents (49.06%) stated https://is.ijs.si/archive/proceedings/2011/ that they used ICT for some wrong purposes. 39.62% responded that they were not, and 11.32% did not know. Probably this is the [6] Micarelli, R; Pizziolo, G; Pascucci, M; Maiorfi, L. 2013. The reason why 41.51% of the respondents believe that ICT affects social learning in contemporary crises, between web sites and them both positively or negatively, one third (32.08%) considers natural loci, in M. Gams et al (eds.) Proceedings of the 16th that it affects them positive ly, 20.75% stated neither positive nor International Multiconference Information society − IS 2013, negative, 3.77% stated it affects them negatively, while one The Conference Kognitonika/Cognitonics, Ljubljana: Jožef respondent (1.89%) does not know. In the end, the respondents Stefan Institut, pp. 447 - 451; available online at were asked if they were warned during formal education on the https://is.ijs.si/archive/proceedings/2013/ negative consequences of using ICT for the wrong purposes. [7] Pogarčić, I; Panev, I; Pogarčić, M. 2011. Cultural inheritance 60.38% of the respondents stated yes, 2.53% stated no, and as prerequisite to eLearning, in M. Bohanec et al (eds.). 15.09% did not remember. Proceedings of the 14th International Multiconference Information Society – IS 2011, The Conference In the next paper, we will deal with a more detailed analysis of the Kognitonika/Cognitonics. Ljubljana, Jozef Stefan Institute, collected data and with making more conclusions related to them. pp. 415 - 418; https://is.ijs.si/archive/proceedings/2011/ 8. REFERENCES [8] Tacu, M. G; Mihaescu, M. C; Burdescu, D. D. 2013. Building [1] Bearden, D. L. 2015. Digital Italy: teacher training as a professor’s mental model of student’s activity in on-line prerequisite for economic progress, in Fomichov V. A; educational systems, in M. Gams et al (eds.) Proceedings of Fomichova O. S. (eds.) Proceedings of the 18th International the 16th International Multiconference Information society − Multiconference Information society − IS 2015, The IS 2013, The Conference Kognitonika/Cognitonics, Ljubljana: Conference Kognitonika/Cognitonics, Ljubljana: Jožef Stefan Jožef Stefan Institut, pp. 472 - 475; available online at Institut, pp. 7 - 10; available online at https://is.ijs.si/archive/proceedings/2013/ https://is.ijs.si/archive/proceedings/2015/ 65 Serendipity as a Design Principle for Social Media Urbano Reviglio LAST-JD, Joint Doctorate in Law, Science and Technology Università di Bologna +39 3480725864 urbanoreviglio@hotmail.com ABSTRACT Information filtering and design choices can indeed fuel filter Personalization of content in social media fundamental to restrain bubbles and echo chambers, two sides of the same token. information overload and satisfy Internet users. Yet, over- Generally, the first refers to the situation in which a user continue personalization creates filter bubbles and strengthens echo to see, listen and read what reinforces their opinions and interests. chambers. Thus, it also restrains exposure to diversity of The latter refers to a group situation where information, ideas, and information. This represents a fundamental issue for media law beliefs are uncritically spread and amplified, whereas dissenting and ethics which attempts to maintain pluralism in democratic views are ignored. The risks of this phenomenon have been well societies. As a result, individuals reduce their informational discussed [6, 7, 8]. In theory, it raises serious concerns both on empowerment and societies become more politically polarized. the individual and collective levels. Individual, because these This short paper discusses the potentials of serendipity as an filters might reduce opportunities for users to self-determine, by alternative design principle. Serendipity is indeed a complex reducing the exposure to alternative points of view and phenomenon that can be considered as a capability of seeking and serendipitous discovery. The consequences may be various: from processing unexpected and valuable information. As a the limitation of personal creativity to a reduction in the ability to precondition, it requires novel and diverse information. As build productive social capital. Collective, because by fuelling outcome, it causes cognitive diversity. Therefore, serendipity is political polarization, media pluralism may be weakened and able to encompass relevant phases of production and consumption make people more vulnerable to censorship and propaganda, or, of information, representing a positive freedom valuable from an better, to self-censorship and self-propaganda. Furthermore, epistemological, educational and even political perspective. The another prominent risk is growing inequality. Indeed, a certain research exposes an emerging theoretical trade-off in information privileged group of users that have enough (digital) literacy would filtering between relevance and serendipity (or unexpected be able to reach a good balance between relevance and relevance) that might be tackled with serendipity-driven serendipity, and a larger group of users would risk to be exposed recommender systems and specific design choices. only to a minimum, qualitatively inferior range of information. In practice, the risks of over-personalization are very hard to prove. General Terms In fact, most research is often inconsistent and inconclusive because they are generally survey-based, and thus dependent on Algorithms, Design, Theory, Experimentation self-reporting, or based on a small or unsatisfactory sample. Also, Keywords in the light of the rapidly changing media landscape, many studies become quickly out-dated [8]. The question, then, is not whether Filter bubbles, Personalization, Ethics, Serendipity filter bubbles and echo chambers exist because there is plenty of evidence of their existence. Instead, four key issues persist: to what extent filter bubbles and echo chambers are actually 1. INTRODUCTION detrimental, to what extent are social media complicit in their Internet is very serendipitous. Every day Internet users can growth, whether they should be the target of a policy focus and, discover plenty of unexpected and valuable informationthat can eventually, what kind of intervention might be pursued. change their current task, their own beliefs, or even their life. Hyperlinked digital environments are a fertile ground for This short paper presents the idea that the phenomenon of serendipity [1]. Even social media, where users increasingly spend serendipity is able to encompass fundamental phases of most of their online time, isa powerful source of coming across production and consumption of information, and to re-balance the information serendipitously [2]. Of course, serendipity is often an emerging trade-off between relevance and unknown relevance. implicit design goal. Yet, the Internet can be ever more Indeed, serendipity needs information diversity as a precondition serendipitous.In the past, in fact, any procedure to select to occur, and it also sustains “cognitive diversity” [9]. These, in information recognized and sought to solve in a beneficial manner fact, are fundamental media policy goals. the ideal tension between relevance – what a reader wants – and Before advocating serendipity as an alternative design principle serendipity – what a reader may want (or “unknown relevance”). for social media, the information filtering landscape it will be In the digital environment, this balance inevitably shifted from firstly analyzed to argue that over-personalization can become serendipity to relevance [3]. Actually, already back in 1997 it was very detrimental and that social media are complicit and warned “the end of serendipity” [4]. Theoretical basis for the responsible for its risks. Secondly, the concept of information necessity to defend randomness from processes for search and diversity from a media law and ethics perspective it will be briefly discovery have also been proposed [5]. In fact, aside from natural introduced to present the current debate. Finally, what is intended human proclivities such as selective exposure, confirmation bias with serendipity, and why it is so valuable, will be defined. and homophily, information discovery is actually limited by over- personalization of online content, especially in social media. 66 Besides, potential design choices for supporting serendipity in Is it possible, then, to find a good balance between human and social media will be proposed. computer agency, and between individuals’ and corporate rights? Is it also possible to ground a methodological framework based on 2. INFORMATION FILTERING an encompassing principle that is able to provide users with the necessary agency to autonomously and effectively deal with the By bridging the gap between demand and supply in an ocean of first trade-off by balancing the latter? information, personalization performs a fundamental role of knowledge management by limiting information overload. Generally, it can be explicit and implicit; the first makes use of 3. INFORMATION DIVERSITY user requests, while the latter is mainly based on monitored user Media pluralism is considered a fundamental goal of national and activity. Both forms of personalization have increased European media policies. Media policy, especially in Europe, has dramatically in the last years, though many websites have acted to aimed mainly at organizing the supply-side of pluralism through make passive forms of personalization the fastest growing various sources that focus on content diversity [13]. Internet, forms[3].Of course, its invisibility makes it dangerous because however, constituted a significant challenge to established media nobody decided consciously to enter into such an “informational policies and the role of public service media. With large media bubble”, whereas many others simply ignore that they are already providers no longer serving a gate keeping function, the diversity living in it. In fact, users embrace and enjoy automatically of individual exposure turned on the choices of users and generated personalized recommendations. For most of them, algorithms. As a reaction to such new media environment, the algorithms are not doing anything wrong cause they recommend notion of “diversity exposure ” increasingly received attention as impartially [10]. However, there is no objectivity in the realm of both a media policy objective and a challenge to the legitimacy of filtering and personalization. Indeed, algorithms are using public service media [14]. Mere exposure of consumers to various supplied criteria to determine what is “relevant”, though these sources and content, however, is not sufficient to ensure actual biases are not generally recognized. Rather, users do not have experience of media diversity. Therefore, a thorough analysis of much influence on the recommendation process, apart from media diversity in the digital age must also consider the cognitive providing implicit or explicit ratings for items, usually in the long- and affective factors that drive Internet users, and ultimately term use of the system. Many argue to design recommender actual “diversity experience” . Of course, its normative evaluation systems from a user-centric perspective. A lack of transparency, is a lot more complex than the traditional policies. Yet, media law interactivity and control, in fact, prevents users from debates could employ a user-centric perspective and thereby comprehending why certain items are suggested and, as a result, extend beyond the assumption that supply diversity equals creates a reduced trust in the system. Nevertheless, most of the diversity experience[15]. From a theoretical perspective, in fact, users have no awareness, skills and motivations to opt-out – in all the models of democracy consider the consequences of filter particular due to the network effect – so they are “locked-in” in bubbles problematic for particularly different reasons [16]. such over-personalized social media. The main rationale of any policy proposal is that development of Even though social media becoming our being-in-the-world, accurate beliefs requires diversity experience. It has been already interests of social media companies conflict with the opportunities argued, indeed, that in an age of user-driven pluralism, public that social networks entail. Their policies and profit-driven service media could find new legitimacy in facilitating user models negatively affect the externalities of personalization. experiences of diversity and creating encounters with challenging Facebook, in particular, offers many ways for personalizing, and, eventually, serendipitous content [13],so as to tackle filter whereas it does not provide any clear tools or afford ancestor bubbles [16].Arguments in support of serendipity as a design “depersonalize”. Newsfeed algorithm attempts to nudge users’ principle for media ethics will be now briefly introduced. comfort zone by satisfying their interests, homophilic attitudes and hedonism , without taking into serious consideration the 4. DESIGNING FOR SERENDIPITY importance of diversity, of the dynamicity of users’ identities, and Serendipity plays a relevant and often undervalued role in our of personal discovery. Instead, information intermediaries might everyday life. Itis the art of discovering new things by observing, actually increase users’ engagement, and thus the profit, by and learning from unexpected situations. It can be defined as “an triggering unconscious addictive rituals. Techniques like unexpected experience prompted by an individual’s valuable gamification and “captology” (computers as persuasive interaction with ideas, information, objects, or phenomena” [17]. technologies), a study at the intersection of computer science and The ability to extract knowledge from an unexpected event covers psychology, are more and more widespread and exploited [11]. all areas of human activity, including business, law, politics and, Furthermore, future advances in artificial intelligence, machine particularly, science. According to Robert K. Merton [1] learning, and the semantic web have the potential to enable serendipity is the “happy accident” inherent in scientific research, algorithms to make ever more sophisticated recommendations, one of the main forces that has steered the progress of science. while virtual reality, augmented reality and the Internet of things Indeed, its role in epistemology of science is well established will definitely blur the distinction between online and offline. As [19]. Such discoveries can be perceived as accidentals but not Pedro Domingos [12] argues, tomorrow’s cyberspace will be a necessarily unplanned or the result of fortuity. Contrary to vulgar vast parallel world that selects only the most promising interpretations, more often serendipity is the result of information to try out in the real one and it will be like “a new, groundwork, observation, and knowledge. As Louis Pasteur once global subconscious, the collective id of the human race”. These famously said [1]: “in the field of observation, chance favours main trends are increasingly evident. Thus, it is becoming only the prepared mind.” Thus, serendipity is a capability [18]. imperative to employ an ethical mediator in influencing media Serendipity helps us to innovate and to be creative, leading us to users and information intermediaries appropriately. the emergence of a theory, a law or perhaps simply revise an 67 opinion. In fact, serendipity has been considered as a fundamental Currently, there is no consensus on the definition of serendipity in experience to maintain creativity in the computer era [20]. Also, it RSs [24]. The two core characteristics of serendipity embedded in usually manifests among interdisciplinary scholars [19]. Being RSs, however, are usually unexpectedness and usefulness[27]. strictly related to abductive reasoning and the innovative learning Thus, serendipity also implicitly builds upon the concepts of theory of “connectivism” [21], it represents a powerful mode of diversity and unfamiliarity. This is certainly relevant in the tackling the challenges of the information era [22]. Hence, context of media policy attempts to cultivate information diversity serendipity is a valuable experience also from an educational experience. Serendipity, in fact, can encompass all these metrics: perspective [23]. Such pursuit can also be intended as a positive a user is surprised by a novel, unexpected (thus mostly diverse) freedom against algorithmic power. In fact, designing for and useful information. Of course, optimizing current RSs for serendipity would imply a change in the asymmetric power to more serendipitous recommendations is not a trivial favour the agency of final users. Hence, it could also represent a task.Programming for serendipity, however, is indeed possible. fundamental political struggle. It has, indeed, the potential also to Notably, Campos and Figueiredo patented the “serendipity stimulate the algorithmic imaginary of users. equations”[30] and codedan information retrieval software that reached the level of 52.7% of (pseudo)serendipitous suggestions 4.1 SERENDIPITY BY DESIGN [31]. Interestingly, they also offered a granular approach to the Programming for serendipity might sound like an oxymoron. It is, question of assessing serendipitous findings and encountering: by in fact, a subjective and unexpected phenomenon. Indeed, dividing user results into distinct categories, according to their serendipity cannot be created on demand. Though, it can be possible outcomes. By opening space for similar granularity it is cultivated by creating opportunities for it through the design of possible to expand and encompass a wide range of results that can physical, digital, and learning environments [24]. Similarly to be considered serendipitously valuable. In fact, under the general other analogous proposals to expose users to different media, such commitment to serendipity there are other concepts related to as “diversity by design” [14], “serendipity by design” is the idea information seeking and encountering; for instance, opportunistic that it is possible to mitigate the influence and improper bias of acquisition of information; pseudo-serendipity; micro-serendipity; personalization by creating an architecture that gives people accidental discovery of information, etc.. Designing for powerful incentives to seek and encounter alternative information serendipity would indeed mean to aim to cultivate all of these and, ultimately, experience more serendipitous insights [25]. indirectly, and directly serendipity par excellence. From a user-perspective, there are two main information behaviours for seeking, encounter and experience serendipity: 4.3 SERENDIPITOUS ENVIRONMENT non-purposive or passive and purposive or active [26]. These will Aside from non-purposive information behavior, it is possible to be briefly analysed in the following sub-chapters. cultivate a serendipitous environment for active seeking [24, 32]. Firstly, it is possible to design several features that empower 4.2 SERENDIPITOUS FILTERING users, extract value meaningfully from their profiles, to illustrate The primary goal of recommender systems (RSs) is to provide connections, and to stimulate creative and serendipitous personalized recommendations so as to improve the satisfaction of associations. For instance, the visualization design developed by users. Many studies showed that RSs are moving beyond accuracy Nagulendra and Vassileva [32] displays to users their filter and embracing serendipity [27]. Indeed, when serendipitous bubbles, showing them which categories and friends are in their encounters are successfully implemented by intersecting users’ bubble and which ones are not, allowing them to control the interests, it is possible to avoid predictable recommendations in algorithm by manipulating the visualization to escape the bubble, collaborative filtering systems, and solve the over-specification by adding or removing friends on a certain topic to the filters. The problems in content-based systems while also helping users reveal results are promising: 72 % of participants said that it was easy to their unexpected interests. Yet, most of the current recommender find an interest which was not inside their filter bubble, so that systems have been criticized for not sufficiently account for they were able to “discover new interests that they didn’t display serendipity [28]. Studies also show that users are willing to otherwise in their behaviour.”Also, other visualization tools have sacrifice some amount of accuracy for improved serendipity in the been developed to make users aware of their information diet, algorithms filter performance [29]. Though, increasing serendipity their potential narrowness of choice, in order to seek serendipity, might negatively impact accuracy. In some cases, RSs metrics including Bobble, Balancer, Scoopinion or EscapeYourBubble. such as novelty, diversity and serendipity can also be improved Some of these plug-ins could be implemented by default in social simultaneously, without any apparent trade-off. A question, media. therefore, arises: does accuracy as a major metric naturally leads to more profits for social media companies rather than Secondly, another fundamental possibility to cultivate a serendipity-driven RSs? In other words, it seems that very serendipitous environment would occur with multiple filtering. In accurate personalization increases the engagement of users in the fact, in mainstream media there is no possibility to have more than short-run more than might occur with serendipity-driven RSs. one filtering per profile. As Facebook chief Mark Zuckerberg Arguably, this is a theoretical trade-off that can emerge in remarks: “having two identities for yourself is an example of a knowledge management (see table 1). lack of integrity”. However, identity is dynamic, and one may Table 1. A Theoretical Trade-off in Recommender Systems. want (and need) to seek different information at a different time with multiple filtering. Indeed, many factors, such as weather, mood or location, can influence user preferences for recommended items. Changing such design choice could increase user resiliency in seeking more serendipitous information by subtracting from the determined path offered by personalization. 68 Certainly, there is plenty of potential design choices to improve [6] Pariser, E. 2011. The filter bubble: How the new serendipity [25]. Also, the assessment of perceived serendipity is personalized web is changing what we read and how we one the most problematic issue to focus on. Foremost, it is needed think. Penguin. an objective theoretical and methodological framework to assess [7] Sunstein, C. R. 2009. Republic.com 2.0. Princeton serendipity. Some measures have already been experimented [24, University Press. 26], and alternative ones can be framed [25]. Yet, many technical challenges persist, considering how it is hard to prospect a one- [8] Zuiderveen Borgesius, F. J., Trilling, D., Moeller, J., Bodó, size-fits-all framework for all mainstream social media. This, B., De Vreese, C. H., and Helberger, N. 2016. Should We however, represents the ideal purpose that the paper advocates. Worry About Filter Bubbles?. Internet Policy Review. Journal on Internet Regulation, 5, 1. 5. CONCLUSIONS [9] Page, S. E. 2008. The difference: How the power of diversity Serendipity is a fundamental and profoundly valuable experience creates better groups, firms, schools, and societies. Princeton for individuals and information societies. On the one hand, University Press. designing for serendipity increases the diversity of information. On the other hand, educating for serendipity increases “cognitive [10] Gillespie, T. 2014. "The Relevance of Algorithms." In Media diversity”. Technologies: Essays on Communication, Materiality, and Of course, more often, serendipity is an implicit goal Society, edited by Pablo Boczkowski and Kirsten Foot, 167- for designers, though it can be explicated for its inherently 193. Cambridge, MA:MIT Press. positive value. In the case of social media, design for serendipity would meanto find a right balance between personalization and [11] Fogg, B. J., Cuellar, G., and Danielson, D. 2009. Motivating, “serendipitous generalization”, between determinism and chance. influencing, and persuading users: An introduction to It is their dynamic relation that can actually sustain a healthier captology. Human Computer Interaction Fundamentals, infosphere. Such design approach can indeed increase user 109-122. resiliency and restrain information redundancy. [12] Domingos, P. 2015. The Master Algorithm: How the Quest The pursuit of serendipity can also be interpreted as a technical for the Ultimate Learning Machine Will Remake Our World. attempt to maintain a sense of freedom and mystery that is Basic Books, New York. available in less networked information environments. It might [13] Helberger, N., Klein-von Königslöw, K., and van der Noll, indeed become fundamental in the future to maintain the pleasing R. 2014. Convergence, information intermediaries and media feelings that elevate accidental discoveries to sensations of pluralism - Mapping the legal, social, and economic issues at serendipity. When a user is educated and treatedas an active- hand. A quick scan. Institute for Information Law, Research seeker of information, indeed, he/she will perceive his/her Report. findings as triumphs of personal agency, intuition, and inspiration, [14] Helberger, N. 2011. Diversity by design. Journal of and as a self-reinforcing expectation, it will increase his/her Information Policy, 1, 441-469. (perception of) freedom from algorithms. Such empowerment could also prevent users from the actual risks of persuasion. [15] Hoffmann, C. P., Lutz, C., Meckel, M., and Ranzini, G. 2015. Diversity by choice: Applying a social cognitive Overall, serendipity can represent a design principle able to perspective to the role of public service media in the digital reinforce the protection of media pluralism in the new emerging age. International Journal of Communication, 9, 1, 1360- social media landscape. To some extent, filter bubbles would 1381. probably persist but, eventually, users could burst them and autonomously seek and experience information diversity through [16] Bozdag, E., and van den Hoven, J. 2015. Breaking the filter the access to more potentially-serendipitous encounters. bubble: democracy and design. Ethics and Information Technology, 17, 4, 249-265. 6. REFERENCES [17] McCay-Peet, L., Toms, E. G., and Kelloway, E. K. 2014. Development and assessment of the content validity of a [1] Merton, R. K. and Barber, E. 2006. The travels and scale to measure how well a digital environment facilitates adventures of serendipity: A study in sociological semantics serendipity. Information Research, 19, 3, 19-3. and the sociology of science. Princeton University Press. [18] de Rond, M. 2014. The structure of serendipity. Culture and [2] Dantonio, L., Makri, S., and Blandford, A. 2012. Coming Organization, 20, 5, 342-358. across academic social media content serendipitously. Proceedings of the American Society for Information Science [19] Edward Foster, A., and Ellis, D. 2014. Serendipity and its and Technology, 49, 1, 1-10. study. Journal of Documentation, 70, 6, 1015-1038. [3] Thurman, N. 2011. Making ‘The Daily Me’: Technology, [20] Sawaizumi, S., Katai, O., Kawakami, H., and Shiose, T. 2007 economics and habit in the mainstream assimilation of Using the concept of serendipity in education. personalized news. Journalism, 12, 4, 395-415 [21] Siemens, G. 2014. Connectivism: A learning theory for the [4] Gup, T. 1997. Technology and the end of serendipity. The digital age. Chronicle of Higher Education, 44, 21, A52. [22] Cunningham, D. J. 2001. Fear and loathing in the [5] Abbott, A. 2008. The traditional future: A computational information age. Cybernetics & Human Knowing, 8, 4, 64-74. theory of library research. College & Research Libraries, 69, 6, 524-545. [23] Fomichov V. A. and Fomichova, O. S. 2015. Early Development of the Human Being Ideal Constituent and Art Cognitonics as the Answer to the Challenge of Knowledge 69 Society. In: Informacijska druzba - IS 2015. Proceedings of the [28] Matt, C., Benlian, A., Hess, T., and Weiß, C. 2014. Escaping 18th International Multiconference - IS 2015, Edited by V. A. from the Filter Bubble? The Effects of Novelty and Serendipity on Fomichov, O. S. Fomichova. Vol. F: Kognitonika/Cognitonics. Users’ Evaluations of Online Recommendations. October 12th-13th, 2015, Ljubljana, Slovenia . Ljubljana : Jozef [29] Ziegler, C. N., McNee, S. M., Konstan, J. A., and Lausen, G. Stefan Institute, 27-32. 2005. Improving recommendation lists through topic diversification. In Proceedings of the 14th international [24] Race, T. and Makri, S. 2016. Information Discovery: conference on World Wide Web, 22-32. Cultivating serendipity in the Digital Age. Chandos Publishing. [30] Campos, J., and Figueiredo, A. C. D. 2008. U.S. Patent No. [25] Reviglio, U. 2017. Serendipity by Design? How to Turn from 7,319,998. Washington, DC: U.S. Patent and Trademark Office. Diversity Exposure to Diversity Experience to Face Filter Bubbles [31] Campos, J., and Figueiredo, A. D. 2001. Searching the in Social Media. In International Conference on Internet Science. unsearchable: Inducing serendipitous insights. In Proceedings of Springer International Publishing (forthcoming). the workshop program at the fourth international conference on [26] Kotkov, D., Wang, S., and Veijalainen, J. 2016. A survey of case-based reasoning, ICCBR. serendipity in recommender systems. Knowledge-Based Systems, [32] Nagulendra, S., and Vassileva, J. 2014. Understanding and 111, 180-192. controlling the filter bubble through interactive visualization: a [27] Ge, M., Delgado-Battenfeld, C., and Jannach, D. 2010. user study. In Proceedings of the 25th ACM conference on Beyond accuracy: evaluating recommender systems by coverage Hypertext and social media, 107-115. and serendipity. In Proceedings of the fourth conference on Recommender systems, 257-260. 70 Evaluating a Reading Companion Service Néna Roa Seïler, Natasha Rao, Varun Korgaonkar and Sujin Dhason School of Human-Centered Design, Innovation and Art, Florida Institute of Technology nroaseiler@fit.edu, {nrao2014, vkorgaonkar2015, salfredretna2014}@my.fit.edu ABSTRACT This paper presents a pilot case study using an empathy- isolate the sounds, manipulate the sounds, and blend and mimicking companion robotic platform to support reading– segmented the sounds into spoken and written words. learning for children in Brevard County, Florida. Literacy skills are vital for all; they are critical to communicate with others and Having identified the importance of the children’s future role in to understand the world. Furthermore, they represent the the nation’s economy, schools in USA are exposing children at an strongest predictors of students’ success in primary school. early age to the fun of learning science, technology, engineering, Motivation is an important factor influencing acquisition of and mathematics (STEM) [9].Before the arrival of computer reading ability. To remediate children with reading difficulties, we technology into family homes, the most important pillars of engaged pupils to learn reading by teaching a robot in a face-to- education were reading, writing, and mathematics. The face setting. Our innovative platform uses alphabet recognition pervasiveness of computer systems has also modified learning and phonetic awareness skills, a method used by teachers in all activities in modern education. Students have witnessed the elementary schools of the county. The children that were arrival of Intelligent Tutoring Systems (ITS), computer programs evaluated were in kindergarten grade, and came from that are able to model learner’s states in order to provide economically disadvantaged families registered at elementary individual instruction. ITS consider the learner’s knowledge level school.The research presented considers how such issues might be and progresses to personalize and adapt presentation of learning addressed by using robot-supported learning, and specifically activities [10]. Several examples have proven the benefits of this empathy-mimicking robotic platforms. kind of personalized education [11-13]. All these experiences are based on embodied conversational agents (ECA) trained with General Terms teachers’ pedagogical practices. Design, Human Factors, Measurement, Experimentation Recently, more attention has been given to robots in education, for Keywords example to teach children a second language [14], to train them in storytelling [15], or to teach them about healthy food choices [16]. Reading skills, Cognitonics approaches to learning, Robotic In such settings, the robot is used as an adult teacher, and the Companions. ensuing robot–child interactions are based on interactions between 1. INTRODUCTION children and their teachers. However, in long-term interactions, Research in the past two decades has greatly increased the children may treat the robot as a peer, not as a teacher. Moreover, knowledge concerning the beginnings of successful academic peer interactions have been shown to have a positive effect on trajectories for children. Such work has established that young language development [17]. In addition, research conducted by children's emerging understandings of numbers, letters, and [18] has found that “sociable robots, used as robot learning sounds are important predictors of later academic achievement [1- companions can provide the necessary social setting for language 4]. learning” [19-21]. The ability to name the letters of the alphabet during preschool STEM education programs are targeted for pre-K to 12th grade and kindergarten is a well-established predictor of children's later students; they are also oriented to make these fields more racially, literacy skills [2], [5-6]. More specifically, reading abilities are socially, and gender diverse. From kindergarten to 2nd grade, predictors of long-term school attendance, and are required to children gain skills to learn to read; 3rd grade is expected to break the cycle of intergenerational poverty [7-8]. consolidate reading abilities; and the important shift of reading to learn occurs by 4th grade. Reading to learn is crucial in STEM Spoken words are made up of different individual sounds called careers as they require critical reading skills. In USA, of the total phonemes which permit the distinguishing of one word from pupils in fourth grade hailing from low income families, 82% are another. Literacy in elementary school is based on a phonemic not proficient in reading skills. Furthermore, 34% of children awareness (PA) curriculum. From kindergarten to 2nd grade, entering in kindergarten lack the basis language skills needed to children are trained to be phonemically aware, that is being able to learn how to read, 65% of children in 4th grade are reading below grade level, and 37% students graduate at or above reading 71 proficiency [22].Struggling children readerscome from African- The idea of a robot reading Companion is based in several American, Hispanic, and Native American populations[8]. assumptions explained previously, and we developed a research plan which included the following hypothesis: 1.1 Tutor Companion or Tutee Companion H01: Children’s reading–learning experience is modified after the The process of teaching is as follows: preparation, explanation, introduction a class with a robot and feedback [23]. Teaching to learn is a well-known pedagogical mechanism which provides opportunity to learn by teaching. It HA1: Children’s reading–learning experience is not modified after involves a different beneficial cognitive process: the teacher-tutor the introduction a class with a robot needs to revise the information, establish material, and identify H02: Certain reading skills are more influenced than others after the basic structure. Moreover, research suggests that interaction children’s exposure to the robot with the tutee is key factor in tutor’s learning [24]. Previous research suggests that children aim to interact with companions. HA2: Certain reading skills are not more influenced than others In a learning game-based setting, 80% of children from ages 9 to after children’s exposure to the robot 10 perceived Companions as friends [25]. This suggests that children are not looking for a hierarchical relationship with a H03: Children progress through a “learning by teaching” method Companion even in a learning setting. An empathetic relationship using a companion robot between children and companions is to be constructed [26]. We H would like to propose and encourage an active role for children A3: Children do not progress through a “learning by teaching” method using a companion robot with respect to the robot to promote their spontaneous learning by teaching the robot as a peer. 4. METHODOLOGY The purpose of this study is to examine the interaction between We involved a kindergarten teacher in participatory design of our children and robots to help improve reading abilities in children. The study, therefore, intends to use robots as a tutee in order to case study [37]. The following parameters were used to test the help improve children’s reading skills. Empathy and social children: letter recognition, beginning sounds, and blending interaction are proposed as a support and mode of interaction, words. The teacher was also in charge of the evaluations of the respectively, in improving learning amongst young children. children.The experiment was conducted during the summer break Additionally, the study hypothesizes that interacting with a social of an elementary school. Of the children attending this school, robot would also motivate the child to learn. 91% are economically disadvantaged with a diverse population: 48.2% white, 34.8% African-American and 10.1% of 2. RELATED WORK Hispanic/Latino descent. The experiment was conducted in three Cognitonics aims to help people adapt to and use technology by sessions over a period of two weeks. The first two sessions were improving cognitive mechanisms of human processing conducted with a gap of 2 days. The third session was conducted information and developing the emotional sphere of the one week after the second session.The participants for the personality [27-28]. This approach is particularly relevant in experiment were 6 students (5 boys, 1 girl) in the age bracket of 4- educational setting, see par example work of [29-30]. Robots have 5 years, who were all attending the same elementary school. recently arrived in the camp of educational technology and they are quickly becoming the prominent agents in this field [31]. 4.1 Experimental set up These are very promising technologies particularly for kids [32],[15]. They provide and maintain children’s interests by The children were told that the robot was fully autonomous and allowing new modes of interaction and new opportunities of that it would respond to their inputs as a peer would. However, the socialization. Empathetic robot tutors are transforming the Wizardof Oz technique was employed [38], in which the robot classroom atmosphere and the ways that children are learning [33- was remotely controlled from a laptop in a neighboring (control) 34],[15].A good example is a robot that helps children with room outside the line of sight of the children. The robot, named visuoconstructive deficits; kids that struggle with writing. The Ellie, was voiced by a young girl, aged 9. We had a control room robot provides support even to children with poor handwriting and with the Wizard and a child assistant and an experiment room poor self-confidence [35]. Another example of social robots with participants, the teacher and the robot when it intervenes.The booming in educational setting is the Junior Robotics category in apparatus for the experiment included a JD Humanoid robot, the World Robot Summit 2020 hosted by the Japan Ministry of which is manufactured by EZ-Robot1, a laptop, two mobile Economy, Trade, and Industry andthe New Energy and Industrial phones, and a microphone. Technology DevelopmentOrganization. The Junior Robotics Figure 1 shows a view of the robot control interface. category will be a student competition in 2018. It aims to promote STEM learning and computing, preparing the kids to understand the human–robot interaction and how these artifacts will assist humans in their everyday life [36]. 3. OVERALL RESEARCH PLAN 1http://www.ez-robot.com 72 participants’ interactive meetings with Ellie, they were tested once more on the same skills to evaluate any possible change in the skill levels. The second session of the experiment was conducted exactly in the same manner as the first, with only one difference being that the first phase of the test, which was the initial testing of the children’s skills. The two other phases were conducted in the same manner with the same content in the testing, teaching, and robot interaction. The third session of the experiment was conducted a week from the first session and consisted solely of the teacher testing the participants with the same testing methodology as in the first and second sessions. This interaction was independent of the researchers or the robot. Figure 1. Robot control interface view 5. RESULTS The setup was such that the controller with the laptop and the Qualitative results in Figure 3 and Table 1 display the children’s young girl—located in a control room—could view the performance during the 2 days exposed to Ellie. We could observe participants via the robot’s camera and could hear the participants a positive modification of their results after teaching Ellie (H1), via an active mobile phone call from another phone in the (H3). It is also observed that some variables improved such as BS participants’ room. The young girl then responded to the and particularly BW progress more than letter recognition (H2). participants’ questions and inputs so as to simulate the robot This could be based on the fact that half of the children mastered autonomously responding to them. LR with a maximum score before the test, and two of the children’s scores regressed between the first and the second session.However,another child progressed, maintained his score and progressed further during the third session. The progression looks particularly significant in BW where all the children started with a low score. 4 3,5 3 2,5 Post Teacher 2 1,5 Post Ellie 1 0,5 0 Figure 2. The JD Humanoid robot used in the experiment LR BS BW 4.2 Experimental Procedure Figure 3. Children’s combined performance (weighted The first session of the experiment was conducted in three phases. average) on both days The two first phases took place between the teacher and the group Table 1. Combined results (weighted average) of children’s of children the last phase was an individual meeting between each performance child and the robot. The teacher was present in the room with the participants when they interacted with Ellie to regulate the Testing All Students: Both Days teaching process. The first phase consisted of the teacher testing the children’s reading and speaking skills on the basis of three LR BS BW tests; letter recognition (LR), beginning sound (BG), and blending words (BW). The second phase consisted of the teacher teaching Post Teacher 2.91 2.16 0.66 the children a predefined lesson that taught the abovementioned Post Ellie 3.08 2.66 1.23 three skills. The children were then tested again on the same skills to evaluate the skill levels. The third phase consisted of the children interacting with the robot on a one-on-one basis. At the beginning, they have a minor social exchange: the robot engages Concerning the global learning experience (H1), we observe a net the child in a personal conversation, asking them their name, etc. progression in the results including over the time. This Once they had familiarized themselves with Ellie, the children progression is not noteworthy for LR which is also the variable then taught Ellie the same skills they had learnt in the class with with higher score before the experiment. This progression is the teacher in the second phase of the session. After the observable in Figure 4 and table 2 73 4 7. CONCLUSION 3,5 Our study was limited to only three variables of the skills considered in kindergarten teaching: letter recognition, blending 3 words, and beginning sounds. The children displayed significant 2,5 change in their progress in one of these variables. Results are Pre Experiment 2 influenced by the fact that our sample is small. The age of the Post Experiment children also limited the time they could spend in the sessions, as 1,5 their concentration span does not last for a long duration of time. 1 For the same reason, we did not conduct any surveys. 0,5 The children do not consider Ellie to be a teacher but as their 0 peer.However, they perform better in all the evaluated skills LR, LR BS BW BS, and BW; particularly in the last one. Furthermore, results suggest all are skills retained over the time, however more Figure 4. Children’s performance on day 2 research is needed to confirm this retention. As per the data collected, children learned better with Ellie than they did with the teacher, but more studies are required to confirm this result. Table 2. Results test performance pre post experiment Having said that, the global results suggest that the progress in performance of children was due to the use of the robot by the Testing All Students: Day 1 vs. 3 teacher, as a complementary learning tool. LR BS BW 8. FUTURE WORK Pre Experiment 3.2 1.6 0.4 We expect to conduct the same experiment with a bigger sample of children composed with an equal number of boys and girls for Post Experiment 3 3.2 2.4 further observation and to measure improvements. 9. ACKNOWLEDGEMENTS 6. DISCUSSION We would like to thank the following persons without whom we could not have been able to conduct the experiments that have In this qualitative study, all participants had a very positive been described in this paper: the children and their parents of perception and reaction towards the empathetic robot named Ellie University Park Elementary School, particularly the teacher Ms. during and after our intervention. For example, the teacher Lori Clarke, and the Vice-Principal Mr. Svendsen, and all other informed us that in the classes following our visit, children staff who helped us with the experiments. requested to again meet and interact with Ellie. The children, too, Furthermore, we would also like to thank the Space coast Fab Lab provided a lot of inputs concerning the robot’s appearance, such for providing us with the robot used in this experiment. as the fact that they liked its small size. They also confirmed that We would also like to express our gratitude to Catalina Pelli, who it had the right look as a robot, and also mentioned that they assisted us in the experiment and lent her voice to the robot, and probably preferred it to have human-like hands with fingers, also her mother Laura Primucci, who helped us with the rather than the pincers our robot had. They also suggested organization of the experiments. dressing it up in different clothing (see in Figure 2, Ellie’s appearance without clothes). 10. REFERENCES Concerning the interaction with the robot, the children were amazed by Ellie calling them by their names and giving smart and [1] Badian, N. A.1995. Predicting reading ability over the long empathetic responses, such as “yes, I would like you to teach me term: The changing roles of letter naming, phonological that”, “hello! How are you? Did you enjoy your pizza?”,“Yes I awareness and orthographic processing. Annals of would love it if you read me a story.” Dyslexia, 45, 1, 79-96. The teacher considered the robot to be a very good and effective tool for small children, and also did not expect such good results [2] Hammill, D. D. 2004. What we know about correlates of in such a short time. In addition, she confirmed that children were reading. Exceptional Children, 70(4), 453-469. not distracted by the robot, and they were totally focusedon teach it. The children considered Ellie to be their peer, and look forward to seeing it again in their classes. [3] Jordan, N. C., Kaplan, D., Locuniak, M. N., and Ramineni, C. 2007. Predicting first grade math achievement from developmental number sense trajectories. Learning Disabilities Research and Practice, 22(1), 36-46. 74 [4] Reynolds, A. J., and Bezruczko, N. 1993. School adjustment [15] Park, H. W., Gelsomini, M., Lee, J. J., and Breazeal, C. of children at risk through fourth grade. Merrill-Palmer 2017. Telling Stories to Robots: The Effect of Quarterly (1982-), 457-480. Backchanneling on a Child's Storytelling. In Proceedings of the 2017 ACM/IEEE International Conference on Human- Robot Interaction (pp. 100-108). ACM. [5] Schatschneider, C., Fletcher, J. M., Francis, D. J., Carlson, C. D., andFoorman, B. R. 2004. Kindergarten prediction of reading skills: A longitudinal comparative analysis. Journal [16] Short, E., Swift-Spong, K., Greczek, J., Ramachandran, A., of Educational Psychology, 96(2), 265. Litoiu, A., Grigore, E. C., ... and Levonisova, S. 2014. How to train your dragonbot: Socially assistive robots for teaching children about nutrition through play. In Robot and Human [6] Piasta, S. B., Petscher, Y., and Justice, L. M. 2012. How Interactive Communication, 2014 RO-MAN: The 23rd IEEE many letters should preschoolers in public programs know? International Symposium on (pp. 924-929). IEEE The diagnostic efficiency of various preschool letter-naming benchmarks for predicting first-grade literacy achievement. Journal of Educational Psychology, 104 (4), [17] Mashburn, A.J., Justice, L. M., Downer, J. T., and Pianta, 945-958. R.C. 2009. Peer effects on children’s language achievement during pre-kindergarten. Child Dev, 80,3, 686–702. [7] Fiester, L. 2010. Early Warning! Why Reading by the End of Third Grade Matters. KIDS COUNT Special Report. Annie [18] Kory, J. M., Jeong, S., and Breazeal, C. L. 2013. Robotic E. Casey Foundation. learning companions for early language development. In Proceedings of the 15th ACM on International conference on multimodal interaction (pp. 71-72). ACM. [8] Hernandez, D. J. 2011. Double Jeopardy: How Third-Grade Reading Skills and Poverty Influence High School Graduation. Annie E. Casey Foundation. [19] Freed, N. A. 2012. "This is the fluffy robot that only speaks French": language use between preschoolers, their families, and a social robot while sharing virtual toys. Master's [9] Bybee, R. W. 2010. Advancing STEM education: A 2020 Thesis. Massachusetts Institute ofTechnology. vision. Technology and Engineering Teacher, 70(1), 30-35. [20] Movellan, J., Eckhardt, M., Virnes, M. and Rodriguez, A. [10] Ma, W., Adesope, O. O., Nesbit, J. C., and Liu, Q. 2014. 2009. Sociable robot improves toddler vocabulary skills. In Intelligent tutoring systems and learning outcomes: A meta- Proceedings of the 4th ACM/IEEE International Conference analysis . Journal of Educational Psychology. Vol. 106, No. on Human Robot Interaction. ACM, New York,NY, 307-308. 4, 901–918. [21] Tanaka, F. and Matsuzoe, S. 2012. Children teach a care- [11] Wise, B., Cole, R., Van Vuuren, S., Schwartz, S., Snyder, L., receiving robot to promote their learning: Field experiments Ngampatipatpong, N., ... and Pellom, B. 2005. Learning to in a classroom for vocabulary learning. Journal of Human- read with a virtual tutor: Foundations to literacy. Interactive Robot Interaction, 1, 1. literacy education: Facilitating literacy environments through technology, 31-75. [22] Reading is fundamental extracted on June1st, 17 from http://www.rif.org/ [12] Ward, W., Cole, R., Bolaños, D., Buchenroth-Martin, C., Svirsky, E., Vuuren, S. V., ... and Becker, L. 2011. My science tutor: A conversational multimedia virtual tutor for [23] Duran, D. 2016. Learning-by-teaching. Evidence and elementary school science. ACM Transactions on Speech and implications as a pedagogical mechanism. Innovations in Language Processing (TSLP), 7(4), 1 Education and Teaching International, pp. 1-9. [13] Cole, R., Wise, B., and Van Vuuren, S. 2007. How Marni [24] Annis, L. F. 1983. The processes and effects of peer tutoring. teaches children to read. Educational technology-saddle Human Learning: Journal of Practical Research and brook then englewood cliffs nj-, 47(1), 14 Applications. [14] Belpaeme, T., Kennedy, J., Baxter, P., Vogt, P., Krahmer, [25] Roa-Seïler, N. 2016. Designing Interaction Strategies for E.E.J., Kopp, S., Bergmann, K., Leseman, P., Küntay, A.C., Companions interacting with children. In Tettegah S. and Göksun, T., Pandey, A.K., Gelin, R., Koudelkova, P., and Noble S. (Eds.), Emotions, Technology and Design. New Deblieck, T. 2015. L2TOR - Second Language Tutoring York, NY: Elsevier. ISBN 978-0-12-801857-6. using Social Robots. In Proceedings of the 1st Int. Workshopon Educ. Robots. Springer 75 [26] Roa-Seïler, N. 2016. Towards an Emotionally Intelligent International Conference on Human-Robot Interaction (pp. Interaction Strategy for Multimodal ECAs acting as 111-112). ACM. Companions, doctoral dissertation. Edinburgh Napier University. [37] Sanders, E. B. N. 2002. From user-centered to participatory design approaches. Design and the social sciences: Making [27] Fomichov, V. A. and Fomichova, O. S. 2006. Cognitonics as connections, 1(8). a new science and its significance for informatics and information society. Informatica. An International Journal of Computing and Informatics (Slovenia), 30, 4, 387-398. [38] Bradley, J., Mival, O., and Benyon, D. 2009. Wizard of oz experiments for companions Presented at the Proceedings of the 23rd British HCI Group Annual Conference on People [28] Fomichov, V. A., andFomichova, O. S. 2008. A Working and Computers: Celebrating People and Technology. (pp. Model of Educational Process Underpinned by the Ideas of 313–317). Cambridge, United Kingdom: British Computer Cognitonics in George E. Lasker (Ed.), Advances in Society. Education. Vol. VIII, International Institute for Advanced Studies in Systems Research and Cybernetics, p. 1-8. [29] Craig, P., Roa-Seïler, N., Díaz, M. M., and Rosano, F. L. 2014. A cognitonics approach to computer supported learning in the Mexican State of Oaxaca. Informatica. An International Journal of Computing and Informatics (Slovenia), 38, 3, 241-248. [30] Kane, T. B. 2013. David and Leviathan: Forming Cognitive Tunnels between Classrooms and Artificial People in the Real World. In M. Gams, R. Piltaver, D. Mladenic et al (Eds.), Proceedings of the 16th International Multiconference Information Society – IS 2013, Slovenia, Ljubljana, 7 – 11 October 2013. Vol. A. The Conference Kognitonika/Cognitonics. Jozef Stefan Institute, 455-459. [31] Lemaignan, S., Jacq, A., Hood, D., Garcia, F., Paiva, A., and Dillenbourg, P. 2016. Learning by teaching a robot: The case of handwriting. IEEE Robotics and Automation Magazine, 23(2), 56-66. [32] Druin, A., andHendler, J. A. 2000. Robots for kids: exploring new technologies for learning. Morgan Kaufmann. [33] Roa-Seïler, N., Craig, P. 2016. EmpatheticTechnology. In Tettegah S. and Noble S. (Eds.), Emotions, Technology and Design. New York, NY: Elsevier. ISBN 978-0-12-801857-6 [34] Deshmukh, A., Jones, A., Janarthanam, S., Hastie, H., Ribeiro, T., Aylett, R., ... and Papadopoulos, F. 2015. An empathic robotic tutor in a map application. In Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems (pp. 1923-1924). International Foundation for Autonomous Agents and Multiagent System. [35] Hood, D., Lemaignan, S., and Dillenbourg, P. 2015. When children teach a robot to write: an autonomous teachable humanoid which uses simulated handwriting,” InProceedings of the Int. Conf. Human-Robot Interact. HRI. [36] Eguchi, A., and Okada, H. 2017. Social Robots: How Becoming an Active User Impacts Students' Perceptions. In Proceedings of the Companion of the 2017 ACM/IEEE 76 Recovery in Children in the Digital Age Shradhdha Shah Alumnus: University College London Clinic: Shradha Cures, Mumbai 400004 Mob.+91 9167939929 drshradhdha@gmail.com ABSTRACT wants the flash of insight arrive from within the child – this makes Stress-induced disorders have become more the norm than the it more real, more permanent for him or her. It gives the child the exception in the last ten years, especially in children (ages 0 to 14) flexibility to utilize it in a context-specific way through his/her stages of development, rather than as a ‘black and young adults (ages 14 to 19). Lifestyle and economic factors -or-white’-like have begun to provide a favourable environment for even the compulsion. smallest genetic component to flower into a completely symptomatic disease. Even infants show higher rates of eczema which has a high mental health component. Are they absorbing 2. DIGITAL COMMUNICATION AND stress from their care - givers, from their life in-utero or their own RECOVERY IN CHILDREN personality at its (current) state of development? Is it a In the case of pre-verbal stages in a child, one relies on video - combination of all of these? How does the digital way of thinking conference facilities and history shared by the family or guardian. help these children and their families? How does one incorporate In post-verbal stages, one can utilize the understanding of psycho- thorough examination and laboratory investigations, regular social development via digital communication. follow-ups and quality in-depth interviews into the quest for recover? How can we optimize health-interviews when working 2.1. Ages 2.5 to 6 years or equivalent across continents through digital communication, as could be the case for specialized treatments? These questions are more This stage of growth can vary slightly or drastically, depending on powerful than their answers because in the digital age, answers the state of health of the child and medical history. change and evolve. The questions shift between “same-ness” and The best way to maximize therapeutic accuracy is to work with “new-ness” for improved results. The paper deals with these the imagination of the child through a series drawings regarding questions in case specific contexts. Archival data are taken from his/her illness, fears, perceived relationships, dreams and self- image. This gives one access to the child’s world of physical study of recovery in chronic diseases as part of a thesis in Medical Anthropology (University College London, 2011-12). sensations even when connected through a two-dimensional computer screen. The child, as early as in this stage, has the agency and insight to General Terms form new conclusions with respect to his/her suffering. New conclusions set the stage for fewer fears, improved compliance Documentation, Human factors and regular follow-ups. Other happy side-effects can include deeper bonding with parents, guardians, teachers, siblings and peers. Keywords 2.2. Ages 6 to 12 or equivalent Recovery, Stages, Children, Digital Interviews, Health-care These are the years of naturally developing moral agency in the 1. child. If the natural moral convictions are at odds with strong INTRODUCTION moral values in the surroundings, there forms the beginning of Children experience the world in mainly in terms of sensations, conflicts with authority. This is emotionally painful for the child, colours, feelings and sounds up to the age of 6. Following a time even if he/she is not fully aware of this pain. The child has a in transition, they begin to experience more analysis and morality biological urge to be loyal to the parents and the proverbial from ages 7 up to 12 (or puberty). The post-puberty stage until the ‘village’ or community, but the inner pangs of morality are not in age of 18 (approx.) is the phase of communication, testing ones sync with his/her established trust. Most children ask unending limits as a ‘pre-adult’ and shedding the now unnecessary “Why?” based questions at this stage – they are only beginning to dependence of child-dom. These stages are general guidelines process the nuances of decision-making. They are beginning to based on the work of Freud, Carl Jung, Erik Erikson and Rudolf grow past the pain versus pleasure pendulum and are willing to Steiner – these are subject to individual and clinical context. undergo pain for ethical benefits; for example, reporting a bully to When working with children in recovery from long-standing non- the teacher or surrendering a favourite toy to another child. communicable disorders, one observes that child perceives illness At this stage, recovering children respond beautifully to letter and recovery within these contexts. To facilitate an individualized writing combined with drawing. They may be more exposed to and effective turning point, one is needed to step into the psycho- television and media now, and it is best to ask them to conjure social-developmental stage of the child, evaluate his/her self- their own scripted2 cartoon series. The entire inner picture of dialogue and then apply the appropriate medical guidelines. One 77 disease, conflict and resolution becomes evident – the child’s mind reaches a peak of conflict in this storytelling process 5. REFERENCES followed by stages of resolution as his/her consciousness resolves the various components of the plot. This can be sequential or un- [1] Adler, H. M. 2002. The Sociophysiology of Caring in the sequential – the objective is to reach a point of peace through the digital screen. In this way, the ‘missing’ empathetic physical Doctor-patient Relationship; Gen Intern Med. November; 17(11): presence of the doctor is slowly replaced by the child’s own self 883–890. - empathy. At the same time, the relationship with the illness is re- [2] Boyce, C., Neale, P. 2006. Conducting In-Depth Interviews: A framed. Guide for Designing and Conducting In-Depth Interviews for Evaluation Input. 2.3. Ages 12 to 19 or equivalent [3] Calabrese, J. 2008. ETHOS, Vol. 36, Issue 3, pp. 334–353. [4] Cook, J., Laidlaw, J., Mair. J. 2009. What is there is no elephant?; Multi-sited ethnography: Theory, Praxis and Locality; Listen, listen, listen, listen, listen – this is the phase of Whatsapp, Ashgate Publishing Ltd. Messenger, Snap Chat, Instagram, Facebook, Skype, cell-phones [5] Deren, M. 1998. Divine Horsemen: Living Gods of Haiti; and video-games. The child is already plugged into technology; he McPherson & Co Publishers. or she is living in the parallel world of the internet (often within [6] Desjarlais, R. 2011. Body and Emotion: The Aesthetics of parental content settings!). In this stage, the young adult (also Illness and Healing in the Nepal Himalayas, University of referred to as teen or tween in some circles) wants to emote, Pennsylvania Press. communicate, shut off, withdraw, shine, compete and experiment [7] Romanucci-Ross, L., De Vos, G. A., and Tsuda, T. (Eds.). all at the same time. It is the natural urge of growth. At the same 2006. Ethnic Identity: Problems and Prospects for the Twenty- time, he or she demands unconditional approval from perceived first Century, 4th Edition. Rowman Altamira. authority, often the parent or guardian. It’s an adventurous time for the family – the family is growing up too. [8] Foucalt, M. 1988. Technologies of the Self: A Seminar with The digital screen turns into an even more dependable tool during Michael Foucault; Martin, L.H. et al; London: Tavistock. pp.16- these years. This is the time when the parents, siblings and 49. sometimes even grand-parents need specialized counseling with [9] Freud, S. 1910. The Origin and Development of Psycho- respect to the recovery of the child. Technology becomes a way of analysis. The American Journal of Psychology. Vol. XXI, April, reaching out even when extended family, cousins, parents or the 1910, No. 2. pp. 181–218. doctor are in different cities. The modern grand-parent is more [10] Gardner, H. 1993. The Theory of Multiple Intelligences. aware than the modern parent. This grandparent is in his/her own Basic Books. quest to keep up with technology, and to keep pace with the times. [11] Morgan, King, Weisz, Schopler’s Introduction to Counseling Therefore, they are more open to learning new strategies in Psychology/ Developmental Stages; 5th edition. helping – their stakes are higher. [12] Oxford Textbook of Psychiatry; 2nd Edition. Ingraining confidence in more nuanced use of technology for the senior citizens involved has deep and long-term benefits. It improves communication, confidence, trust and ownership of each family member towards the problems at hand. Grandparents often recognize, though they may not always openly acknowledge their part in the harmful conclusions in the parent. They can see these mechanisms working against the synchronicity of the situation, but don’t always know how to rectify the same. The main coping mechanism then turns up in the form of guilt and difficult though well-intentioned advice. The magic of technology is to work with the family as a unit, in addition to one-on-one interviews with the primary patient. 3. CONCLUSION Solutions are everywhere. It is important to turn to qualitative data and in-depth interviews to effect deeper recovery with the help of the virtual and not-so-virtual world of technology. While one part of digital efficacy does lie in the virtual realm, the effects can be very very tangible. 4. ACKNOWLEDGMENTS 1. Faculty: Seminars in Awakened Parenting; Dr. Jayesh Shah MD (Hom.); 2008 to 2014. 2. Administrative staff : Shradhdha Cures (Centre for Chronic Diseases), Mumbai, for collation of archival data. 78 Mobile Mental Health Support for Chinese University Students Ke Wan Paul Craig Xi-an Jiaotong-Liverpool University Xi-an Jiaotong-Liverpool University Suzhou Suzhou China China ke.wan16@student.xjtlu.edu.cn p.craig@xjtlu.edu.cn ABSTRACT 2. STATE OF THE ART World Health Organization statistics shows that 29 percent There have been a number of applications developed for mental of people worldwide suffer from mental health or health support in the past two decades. As early as 2001 Helen psychological problems at some point in their life. The Christensen, at the Australian National University, developed problem can be particularly acute for Chinese university mobile app called MoodGYM which was specifically designed to students due to high expectations from family and the help adolescents cope with depression [4]. This development was pressures of the academic environment. This paper initially a cause of considerable controversy among mental health analyses the need for different mental health support app specialists and attracted a great deal of criticism from detractors functionality to facilitate self-help or encourage students to who felt that the automation of mental care support might be make use of traditional mental health support services. detrimental to users from a vulnerable group who could benefit from a more human-touch. These doubts were eventually Results allow us to characterize student preferences in the overcome as initial results proved positive and the app has since design of our own prototype app and should support the been adopted by the Australian National Health Service. Now design of more effective mental health support apps in the MoodGym has more than a hundred-thousand active users in future. Australia and is also used in over two-hundred other countries around the globe. General Terms Human Factors In another significant development, in 2007, the British National Health Service developed FearFighter, an online environment to support patients dealing with fear and anxiety. This included an Keywords APP called ‘Beating The Blues for Depression’ which dealt Mental health support; university students; application prototype specifically with mental health support [5]. evaluation Other mental-health care apps of note include Biteback, Mycompass [6], Optimism and BellyBio [7]. The functionality of 1. INTRODUCTION these apps can be roughly classified into categories such as; Around 29 percent of us will suffer from mental or psychological guidance, mental health tests, treatment follow-up, psychological problems at some stage in our lives [1]. However, many victims of consultation, and social assistance. And while a significant mental health problems are often unwilling or incapable of finding number of practitioners still express doubt over the overall the support and guidance they need to most effectively overcome effectiveness mental-health apps, it is increasingly more widely their difficulties. For many individuals, there is still a stigma accepted that these apps will form an integral part of any larger attached to mental-health issues and private mental-health mental health care solution that also includes more traditional treatment can be expensive. This can be particularly problematic methods such as one-on-one counselling and support groups. for university students who tend to have limited financial Indeed, a number of developed countries with progressive social resources and pressure to obtain high levels of academic care programs, such as Australia, Holland and the United achievement [2]. While most universities have psychological Kingdom, have already incorporated online mental-health support consultation centers, resources tend to be limited and there is a into their national systems of health-care provision. need to make the best use of resources to support students and encourage them to utilize the services available. 3. METHODOLOGY The leverage of new technology is one way in which universities In this paper, we present the results of a requirements analysis can make better use of available resources for psychological exercise aimed at determining what functionality is needing in an counseling and intervention. Research in this area is focused on app for mental-health support. The app is designed for Chinese online remote treatment, the use of virtual reality technology, university students and our study focuses on the needs of this intelligent hardware, wearable devices and different types of particular group of users as well as different types of user within application to support traditional counselling services [3]. This this group as determined by gender, age, area of study, and type of paper looks at developing a methodology for designing mobile degree. Results of a survey of our users allow us to develop a mental-health support apps for Chinese university students. prototype mobile application that is further tested to gauge the users’ overall impression of this type of app. 79 4. INITIAL SURVEY encouraging first time users who may otherwise be inhibited by The 60 subjects of our initial survey are Chinese university using the app. This type of discovery encourages us to consider students from Xian Jiaotong-Liverpool University. 65 percent of the complete user experience in our design and think more about the responders are male and 35 percent female. The subjects are the process of a user progressing through different functions of aged between 18 to 26 and divided into two groups; age range 18- the app as their requirements evolve. 21 (70 percent) and age range 22-26 (30 percent). The art and business major students form 55 percent of our sample while science and technology major students form 45 percent. There are Figure 1. Mental-Health Support App, online 47 undergraduate students (78.33 percent) and 13 postgraduate consultation. students (17.17 percent). The main part of the questionnaire asks subjects to gauge the importance of the six mental-health care app functions we found to be the most common features of existing software. These are: 1) Mental health self-evaluation tests. Users can use this function to test aspects of their mental health. This can give users an indication of their mental health status and tell them which forms of additional support might be most appropriate. 2) On-line consultation. This allows users to talk to consultants online before having a face-to-face consultation or in lieu of an online consultation if another course of treatment is thought more appropriate. Figure 2. Mental-Health Support App, self-evaluation This form of consultation can be more convenient and quizes. cost-effective than a traditional one-to-one consultation performed in person. 3) Communication and discussion. This can include chat- rooms, forums and other media for facilitating communication between app users. Social interaction can help users benefit from shared knowledge, reduce feelings of isolation and help build a sense of community among users. 4) Entertainment. This aims to stimulate the user and elevate their mood with music, positive videos, humor and puzzles. 5) Events and activity postings. This highlights real- world events and activities such as workshops or lectures on mental health. 6) Professional tips. Links to mental-health advice and resources. Figure 3. Mental-Health Support App, mental-health tips. 5. RESULTS The results of our survey indicated that the three most important functions for mental-health support apps are on-line consultation, professional tips and self-evaluation tests. Communication and event posting are also thought to be important but these where thought of as secondary features that shouldn’t detract from the principle functions of the app. User preferences didn’t change in any significant way for different types of user which suggests that the same general design can be used for different groups in different universities. Figure 1 shows the online consultation page of our prototype app. Figure 2 shows self-evaluation, figure 3 shows the mental health tips and figure 4 shows events and activities. Evaluation of the prototype app gave us further insight into how the tool might be used. For example, while features like event postings and communication where not considered as core functions of the app, the students thought they might be useful in 80 online consultation would, in many cases, lead to an actual meeting with a counselor or psychologist. The main benefit of our app would be to support the user up until this point. Another important conclusion from our investigation is that mental health support apps require people to continue using the apps in order to record enough data for them to help with any diagnosis or help prescribe any sort of treatment. A study showed that 60 percent users stopped using the MoodGYM after they finished the first module [8]. If mental-health support apps are to be effective they need to encourage people keep using them. So apps need not only to include core functionality, but they also need to be usable, entertaining and reward progress in order to keep users interested. 7. ACKNOWLEDGMENTS The authors of this paper would like to thank the kind students at XJTLU who took time out of their busy exam time schedule to participate in our study. 8. REFERENCES [1] K. Demyttenaere, R. Bruffaerts, J. Posada-Villa, I. Gasquet, V. Kovess, J. Lepine, et al. 2004. Prevalence, severity, and unmet need for treatment of mental disorders in the World Health Organization World Mental Health Surveys. Jama, vol. 291, 2581-2590. [2] X.-Y. Xing, F.-B. Tao, Y.-H. Wan, C. Xing, X.-Y. Qi, J.-H. Hao, et al. 2010. Family factors associated with suicide attempts among Chinese adolescent students: a national cross-sectional survey. Journal of Adolescent Health, 46, 592-599. Figure 4. Mental-Health Support App, events and activities. [3] K. Mertz and D. Folkemer. 2008. High-tech medical records: can electronic records transform health care? State Legislatures, 34, p. 24. [4] H. Christensen, K. M. Griffiths, and C. Groves. 2004. MoodGYM training program: clinicians manual. Centre for Mental Health Research, ANU. [5] M. Fenger, J. Lindschou, C. Gluud, P. Winkel, L. Jørgensen, S. Kruse-Blinkenberg, et al. 2016. Internet-based self-help therapy with FearFighter™ versus no intervention for anxiety disorders in adults: study protocol for a randomised controlled trial. Trials, 17, p. 525. [6] D. Solomon, J. Proudfoot, J. Clarke, and H. Christensen. 2015. e-CBT (myCompass), antidepressant medication, and face-to-face psychological treatment for depression in Australia: A cost-effectiveness comparison. Journal of Medical Internet Research, vol. 17. [7] M. T. Mahmoudi, K. Badie, and S. H. A. Varnousfaderani. A Comparative Study on The Existing Graphical User 6. RESULTS Interfaces for Occupational Therapy. Looking at student preferences for mental-health support apps has allowed us to make informed decisions in the design of our own [8] A. L. Calear, H. Christensen, A. Mackinnon, and K. M. app by prioritizing on-line consultation, professional tips, and Griffiths. 2013. Adherence to the MoodGYM program: self-evaluation tests. Reaction the prototype was largely positive. outcomes and predictors for an adolescent school-based population. Journal of Affective Disorders, 147, 338-344. Another more general conclusion from this project is that automated support should complement rather than replace human- interaction. Online consultation was a priority for our users and 81 82 Indeks avtorjev / Author index Ahmad Imran ............................................................................................................................................................................... 22 Ali A. ............................................................................................................................................................................................ 22 Christofidou Angela ....................................................................................................................................................................... 7 Dhason Sujin ................................................................................................................................................................................ 71 Fomichov Vladimir ...................................................................................................................................................................... 11 Fomichov Vladimir A. ................................................................................................................................................................. 17 Fomichova Olga ..................................................................................................................................................................... 11, 17 Gams Matjaz ................................................................................................................................................................................ 38 Gjergjeska Ljubinka ............................................................................................................................................................... 43, 61 Haraty Ramzi ............................................................................................................................................................................... 22 Jadzinska Monika ......................................................................................................................................................................... 26 Kane Thomas B. ........................................................................................................................................................................... 30 Khan Muhammad ......................................................................................................................................................................... 22 Kim Joonho .................................................................................................................................................................................. 34 Korgaonkar Varun ........................................................................................................................................................................ 71 Krivec Jana ................................................................................................................................................................................... 38 Liverić Dijana ............................................................................................................................................................................... 43 Micarelli Rita ............................................................................................................................................................................... 47 Minaidou Eleni ............................................................................................................................................................................. 52 Oksala Aino .................................................................................................................................................................................. 57 Oksala Tarkko .............................................................................................................................................................................. 57 Panev Ida ...................................................................................................................................................................................... 61 Panev Ivan .................................................................................................................................................................................... 61 Pirzada Umar ................................................................................................................................................................................ 22 Pizziolo Giorgio ........................................................................................................................................................................... 47 Rao Natasha ................................................................................................................................................................................. 71 Reviglio Urbano ........................................................................................................................................................................... 66 Roa Seiler Nena ............................................................................................................................................................................ 71 Saddique M. ................................................................................................................................................................................. 22 Shah Shradhdha ............................................................................................................................................................................ 77 Toivanen Susanna ........................................................................................................................................................................ 57 Vrzan Juraj ................................................................................................................................................................................... 43 Wadud B....................................................................................................................................................................................... 22 Wan Ke......................................................................................................................................................................................... 79 Zohaib M. ..................................................................................................................................................................................... 22 83 84 Konferenca / Conference Uredila / Edited by Kognitonika / Cognitonics Vladimir A. Fomichov, Olga S. Fomichova Document Outline A - Naslovnica-SPREDNJA - D B - Naslovnica - notranja - D C- Kolofon - D D-E - IS2017 - skupni zacetni del Blank Page F - Kazalo - D G - Naslovnica podkonference - D H - Predgovor - D I - Programski odbor - D J - PDF - D 01 - ChristofidouCognit2017fin1 02 - FomichovsVladOlgaCognit2017fin2 03 - FomichovsOlgaVladCognit2017fin1 04 - HaratyAhmadCognit2017fin1 05 - JadzinskaCognit2017fin1 06 - KaneCognitonics2017fin1 07 - KimCognit2017fin1 08 - KrivecGamsCognit2017fin1 09 - LivericVrzanCognit2017fin1 10 - MicarelliPizzioloCognitonics2017fin1 11 - MinaidouCognit2017fin1 12 - Arc CS TO-ST-AO Lay-out Rewised 2017-8-15 13 - PanevPogarcicCognit2017fin1 14 - ReviglioCognit2017fin2 15 - RoaSeilerCognit2017fin1 16 - ShahCognit2017fin1 17 - WanCraigCognit2017fin1 K - Index - D L - Naslovnica-ZADNJA - D Blank Page Blank Page Blank Page Blank Page Blank Page Blank Page Blank Page