
different abilities. By ensuring accessibility, it be-
comes possible to expand the reach of the software
to more diverse audiences. A clear example is the use
of screen readers, which help people with visual im-
pairments to interact efficiently (Santos, 2014).
Finally, communicability addresses how the sys-
tem’s design communicates its operating logic to
users. When the user understands the logic behind
an interface, they are more likely to use it creatively
and effectively. An example of this is the application
of visual analogies that refer to objects in the physical
world, facilitating familiarity with the system (Santos,
2014).
3.1.1 HCI in Ubiquitous Systems
Ubiquitous computing represents a natural evolution
of computing, where the interaction between users
and technological devices occurs in an integrated and
continuous manner. This approach seeks to create en-
vironments full of intelligent devices that focus on im-
proving the human experience, often without the need
for explicit user intervention (Stefanidi et al., 2023).
Interaction in ubiquitous systems goes beyond tra-
ditional interfaces and includes implicit interaction
methods. This means that systems can capture user
input data automatically and naturally, without requir-
ing direct attention. A classic example is that of au-
tomatic doors that detect the presence of a person and
open. Although implicit, this interaction is the re-
sult of a system that interprets data from the environ-
ment and responds to human behavior (Vallejo-Correa
et al., 2021).
To ensure an effective experience, ubiquitous sys-
tems must adopt more natural interfaces that simplify
interaction. Technologies such as voice commands,
gestures and touch screens are examples of solutions
that replace or complement traditional graphical inter-
action elements. These technologies also help to sub-
tly integrate computational elements with the physical
environment, creating a homogeneous and natural ex-
perience for the user (Santos, 2014).
However, the development of ubiquitous systems
brings significant challenges. Among them are:
• The complexity of implementing and evaluating
systems in real scenarios.
• The need to collect and store continuous interac-
tion data without compromising the user experi-
ence.
• The difficulty of dealing with tasks that can be
paused, resumed or shared between users.
• The challenge of accurately identifying the user’s
context, given its unpredictability and environ-
mental variables.
These challenges are even more evident in sys-
tems such as the one proposed in this work, which
seeks to detect moral harassment. The idea of main-
taining discreet audio sensors, handling multiple par-
ticipants, and interpreting conversations in real time
requires innovative solutions. Furthermore, determin-
ing the intent or context of a conversation represents
a significant technical and ethical hurdle.
Ubiquitous computing radically transforms the re-
lationship between humans and machines. By spread-
ing computational services across all aspects of daily
life, it expands the possibilities for interaction. How-
ever, the success of this transformation depends on
projects that prioritize HCI principles, ensuring that
applications are intuitive, accessible, and effective for
their users (Santos, 2014).
3.2 Moral Harassment
Moral harassment is characterized as any abusive,
repetitive and systematic behavior that affects a per-
son’s psychological, social or physical integrity, com-
promising their dignity, threatening their employment
relationship and disrupting the work environment.
This type of behavior is generally manifested by su-
periors in relation to their subordinates, using their
position of power to commit such abuse. Harassment
can be explicit or implicit.
In the implicit form, the harasser resorts to non-
verbal behavior, such as indifference or irony, which
are more difficult to prove. This approach allows the
aggressor to deny his intentions if confronted, mask-
ing the abusive behavior. In the explicit form, the ac-
tions become evident not only to the victim, but also
to third parties. Examples include excluding the vic-
tim from activities or groups without justification, ex-
posing them to embarrassing situations in front of col-
leagues, or publicly belittling their work. This type of
practice, which is more serious, highlights the perver-
sity of the harasser (DE SOUZA, 2018).
The harasser’s main objective is to subjugate the
victim, shaking their self-esteem and exerting con-
trol over them, often in a callous and destructive way.
Men, for example, may be attacked in relation to their
virility, while women often face intimidation that re-
inforces stereotypes of submission. This perverse
practice reflects the aggressor’s unlimited need to as-
sert his power, regardless of the consequences for the
victim (DE SOUZA, 2018).
The victim, in turn, often chooses to remain silent,
fearing reprisals or the loss of their job. This toler-
ant behavior, although understandable, contributes to
the perpetuation of the cycle of abuse. Continuous
humiliation can have serious impacts on the identity,
Development of a Solution for Identifying Moral Harassment in Ubiquitous Conversational Data
683