![]() ![]() Kracheel, Martin ![]() ![]() ![]() in Lumsden, Joanna (Ed.) Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices (2015) This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a ... [more ▼] This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a complex and comprehensive mobility logging approach and two focus groups. The daily commute is explained as part of a real life traffic game that changes user behaviour. The methodology allows for the identification of travel activity patterns and attitudes that in turn can be used to develop gamified mobility applications. The chapter provides concrete game elements and design considerations that can be used to improve the traffic experience in Luxembourg. [less ▲] Detailed reference viewed: 129 (7 UL)![]() ; Koenig, Vincent ![]() in Dagstuhl Reports (2015), 4(12), 28 Detailed reference viewed: 104 (3 UL)![]() ; ; Koenig, Vincent ![]() in Dagstuhl Reports (2015), 4(12), 28 This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the ... [more ▼] This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the design of nuclear plants. We can state, for example, that the dikes should be high enough to guarantee that a particular area will flood at most once every 1000 years. Even when considering the limitations of such numbers, they are useful in guiding policy. Metrics for the security of information systems have not reached the same maturity level. This is partly due to the nature of security risk, in which an adaptive attacker rather than nature causes the threat events. Moreover, whereas the human factor may complicate safety and security procedures alike, in security this "weakest link" may be actively exploited by an attacker, such as in phishing or social engineering. In order to measure security at the level of socio-technical systems, one therefore needs to compare online hacking against such social manipulations, since the attacker may simply take the easiest path. In this seminar, we searched for suitable metrics that allow us to estimate information security risk in a socio-technical context, as well as the costs and effectiveness of countermeasures. Working groups addressed different topics, including security as a science, testing and evaluation, social dynamics, models and economics. The working groups focused on three main questions: what are we interested in, how to measure it, and what to do with the metrics. [less ▲] Detailed reference viewed: 269 (11 UL)![]() Lallemand, Carine ![]() ![]() in Computers in Human Behavior (2015), (43), 35-48 For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this ... [more ▼] For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this concept. However, despite many attempts to understand, define and scope UX, one may still wonder whether a consensus has been reached on this concept. In a willingness to address the complexity of this research topic and bring the concept of UX to maturity, a replication of an international survey has been conducted. The main goal of the present study is to get a better understanding of practitioners’ view- points on the notion of UX and to analyze potential evolutions over time in the understanding and prac- tical use of the concept. As both practical and theoretical implications of UX are of the greatest importance for whoever designs interactive systems, the exploration of practitioners’ perspectives is a valuable step toward continual improvement of UX activities. The present survey has been conducted amongst 758 practitioners and researchers from 35 nationalities. It allows to better understand how this concept is understood and used throughout the world. Amongst interesting results, important differences were observed according to the geographical location and background of the respondents. [less ▲] Detailed reference viewed: 343 (34 UL)![]() ; Mccall, Roderick ![]() ![]() in Adjunct Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2015) In the future autonomous vehicles will drive on our roads. It is unlikely that we will immediately move from manual to fully autonomous vehicles, instead the mix will change over time and include a large ... [more ▼] In the future autonomous vehicles will drive on our roads. It is unlikely that we will immediately move from manual to fully autonomous vehicles, instead the mix will change over time and include a large number of semi-autonomous vehicles. As a result human drivers will need to take over in specific situations (e.g., when sensors fail) and there will be an interplay between autonomous systems and human agents. However, human drivers will not be able to practice driving so regularly. Our assumption is, that the reliance on semi-autonomous systems will lead to a deterioration in driving skills. In this paper, we present a three year project called MaDSAV (Maintaining Driving Skills in semi-Autonomous Vehicles), which tackles this problem. [less ▲] Detailed reference viewed: 101 (0 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Foresti, Sara (Ed.) Security and Trust Management (2015) Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause ... [more ▼] Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentially endanger a system’s security. [less ▲] Detailed reference viewed: 237 (16 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Lecture Notes in Computer Science (2015), 9190 We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼] We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study. [less ▲] Detailed reference viewed: 294 (93 UL)![]() Kracheel, Martin ![]() ![]() ![]() Presentation (2014, September 30) Detailed reference viewed: 252 (26 UL)![]() Kracheel, Martin ![]() ![]() ![]() Scientific Conference (2014, September 30) The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will ... [more ▼] The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will reduce traffic, emissions and, in the end, save money. The alternatives, for example, such as taking different modes of transport, are incentivised through gamification. In order to develop this pervasive system, we analysed existing mobility patterns of commuters in Luxembourg. The methodology that we developed consists of a questionnaire, a smartphone application and focus group interviews. This paper presents the findings of the questionnaire and how they influence the design of the gamified pervasive application. [less ▲] Detailed reference viewed: 240 (15 UL)![]() Keller, Ulrich ![]() ![]() ![]() Presentation (2014, January) Detailed reference viewed: 258 (78 UL)![]() Lallemand, Carine ![]() ![]() in Proceedings of the 8th Nordic Conference on Human-Computer Interaction (NordiCHI 2014) (2014) Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers have empirically studied the relevance and validity of several UX evaluation ... [more ▼] Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers have empirically studied the relevance and validity of several UX evaluation methods, few studies only have explored expert-based evaluation methods for the assessment of UX. If experts are able to assess something as complex and inherently subjective as UX, how they conduct such an evaluation and what criteria they rely on, thus remain open questions. In the present paper we report on 33 UX experts performing a UX evaluation on 4 interactive systems. We provided the experts with UX Cards, a tool based on a psychological-needs driven approach, developed to support UX Design and Evaluation. Results are encouraging and show that UX experts encountered no major issues to conduct a UX evaluation. However, significant differences exist between individual elements that experts have reported on and the overall assessment they made of the systems. [less ▲] Detailed reference viewed: 208 (16 UL)![]() Weinerth, Katja ![]() ![]() ![]() in Computers and Education (2014), 78 The concept map is now widely accepted as an instrument for the assessment of conceptual knowledge and is increasingly being embedded into technology-based environments. Usability addresses how ... [more ▼] The concept map is now widely accepted as an instrument for the assessment of conceptual knowledge and is increasingly being embedded into technology-based environments. Usability addresses how appropriate (for a particular use) or how user-friendly a computer-based assessment instrument is. As we know from human-computer interaction research, if the interface is not user-friendly, a computer-based assessment can result in decreased test performance and reduced validity. This means that the usability of the interface affects the assessment in such a way that if the test is not user-friendly, then the test taker will not be able to fully demonstrate his/her level of proficiency and will instead be scored according to his/her information and communication technology (ICT) literacy skills. The guidelines of the International Test Commission (2006) require usability testing for such instruments and suggest that design standards be implemented. However, we do not know whether computer-conducted concept map assessments fulfill these standards. The present paper addresses this aspect. We conducted a systematic research review to examine whether and how researchers have studied and considered usability when conducting computer-based concept map assessments. Only 24 out of 119 journal articles that assessed computer-based concept maps discussed the usability issue in some way. Nevertheless, our review brings to light the idea that the impact of usability on computer-based concept map assessments is an issue that has received insufficient attention. In addition, usability ensures a suitable interaction between test taker and test device; thus, the training effort required for test use can be reduced if a test's usability is straight forward. Our literature review, however, illustrates that the interplay between usability and test use training has mostly been neglected in current studies. [less ▲] Detailed reference viewed: 285 (30 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Lecture Notes in Computer Science (2014) We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a ... [more ▼] We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user’s security decisions, and propose experiments to answer them. [less ▲] Detailed reference viewed: 310 (28 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Lecture Notes in Computer Science (2014) We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and ... [more ▼] We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and proposes two methodologies to analyse technical and social vulnerabilities. We show how to apply the framework in a use case scenario. [less ▲] Detailed reference viewed: 319 (48 UL)![]() Weinerth, Katja ![]() ![]() ![]() in Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2014 (2014) This paper focuses on the user-centered design of a computer-based assessment (CBA) instrument for knowledge measurement. We describe relevant design steps in general and illustrate them via the design of ... [more ▼] This paper focuses on the user-centered design of a computer-based assessment (CBA) instrument for knowledge measurement. We describe relevant design steps in general and illustrate them via the design of our usability improved CBA concept map instrument (ISO 9241-11, 1998; ISO 9241-210, 2010). We discuss design versus evaluation methods from a human-computer interaction (HCI) perspective and emphasize important design steps relevant for constructing usability improved assessment instruments in educational assessment. As these HCI methods are still seldom applied to CBA, this paper helps alleviate the dearth of literature and guidelines in this domain. Our objective is thus to provide the reader with a series of design recommendations for CBA, as derived both from HCI research; and to summarize lessons learned from our specific CBA design use case. [less ▲] Detailed reference viewed: 162 (15 UL)![]() Martin, Romain ![]() ![]() ![]() Scientific Conference (2013, October 01) Detailed reference viewed: 118 (16 UL)![]() Kracheel, Martin ![]() ![]() ![]() in Proceedings of the 5th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2013, October) Detailed reference viewed: 205 (13 UL)![]() Louveton, Nicolas ![]() ![]() ![]() Scientific Conference (2013, July 11) Les systèmes d’infotainment embarqués dans les véhicules sont amenés à se multiplier davantage dans les années à venir. Bien que cette tendance mette en évidence la nécessité de comprendre et d’optimiser ... [more ▼] Les systèmes d’infotainment embarqués dans les véhicules sont amenés à se multiplier davantage dans les années à venir. Bien que cette tendance mette en évidence la nécessité de comprendre et d’optimiser la charge attentionnelle placée sur le conducteur, force est de constater qu’il existe peu de données et d’outils communs pour la conception et l’évaluation de tels systèmes. Nous présentons deux directions que la communauté doit poursuivre pour améliorer cette situation ainsi qu’une plate-‐forme de simulation automobile que nous développons et dont l’architecture favorise la ré-‐utilisation des composants logiciels et la reproductibilité des résultats. [less ▲] Detailed reference viewed: 219 (30 UL)![]() Weinerth, Katja ![]() ![]() Presentation (2013, July 03) Detailed reference viewed: 83 (7 UL)![]() McCall, Roderick ![]() ![]() ![]() Scientific Conference (2013, April 28) Gamification is often thought of as the end result or outcome of a project. In this paper we explore how it can also be adopted during the conceptual design stage using metaphorical games and as a method ... [more ▼] Gamification is often thought of as the end result or outcome of a project. In this paper we explore how it can also be adopted during the conceptual design stage using metaphorical games and as a method of testing concepts within a more advanced simulation environment. We explore this from the perspective of the I-GEAR project where it is used as one of many methods in the design of a commuter mobility game. [less ▲] Detailed reference viewed: 278 (87 UL) |
||