![]() ![]() ; Fischbach, Antoine ![]() Scientific Conference (2016, January) Detailed reference viewed: 222 (23 UL)![]() Louveton, Nicolas ![]() ![]() ![]() in Applied Ergonomics (2016), 54 Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures ... [more ▼] Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures such as kinetic scrolling are problematic in this respect. In this study we evaluate three prototype tasks which can be found in common mobile interaction use-cases. In a repeated-measures design, 29 participants interacted with the prototypes in a car-following task within a driving simulator environment. Task completion, driving performance and eye gaze have been analysed. We found that the slider widget used in the filtering task was too demanding and led to poor performance, while kinetic scrolling generated a comparable amount of visual distraction despite it requiring a lower degree of finger pointing accuracy. We discuss how to improve continuous list browsing in a dual-task context. [less ▲] Detailed reference viewed: 283 (13 UL)![]() ; Koenig, Vincent ![]() ![]() in Proceedings of the ACM Recsys CrowdRec Workshop 2015 (2015, September 19) In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified ... [more ▼] In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified mobile application Commutastic that offers users incentives to undertake after work activities. With Commutastic we try to persuade users to change their commuting time so as to avoid the evening peak. Furthermore we investigate the behaviour change with focus groups and questionnaires. The preliminary data indicates that behaviour change is possible and that traffic reduction can happen on a bigger scale. [less ▲] Detailed reference viewed: 114 (1 UL)![]() Lallemand, Carine ![]() ![]() in European Review of Applied Psychology (2015) Introduction While user experience (UX) evaluation is a core concern within the field of human–computer interaction (HCI), there is currently no valid self-administered UX evaluation tool in French. The ... [more ▼] Introduction While user experience (UX) evaluation is a core concern within the field of human–computer interaction (HCI), there is currently no valid self-administered UX evaluation tool in French. The AttrakDiff 2 scale (Hassenzahl, Burmester, & Koller, 2003) is a UX evaluation tool, which relies on a theoretical model distinguishing pragmatic and hedonic qualities of interactive systems. Objective This paper describes the translation and validation of the French version of the AttrakDiff 2 scale in order to ease UX assessment in French-speaking users. Method Following the cross-cultural methodology developed by Vallerand (1989), the questionnaire was translated by trilingual researchers before being back-translated and validated by a panel of experts. A pre-test was conducted on 26 participants. The characteristics of the French version of the AttrakDiff 2 scale were then evaluated through a quantitative online study involving a sample of 381 users. Results The results confirm the expected 3 factors structure and a good internal consistency of each subscale. The links between factors are consistent with Hassenzahl's theoretical model (2003) where pragmatic and hedonic perceived attributes combine to form a judgment of attractiveness. Conclusion The current French version of the AttrakDiff 2 scale is globally reliable with regards to the initial German version and presents satisfactory levels of validity and reliability. [less ▲] Detailed reference viewed: 330 (14 UL)![]() ; ; Koenig, Vincent ![]() in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21) We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼] We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study [less ▲] Detailed reference viewed: 111 (1 UL)![]() ![]() Kracheel, Martin ![]() ![]() ![]() in Lumsden, Joanna (Ed.) Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices (2015) This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a ... [more ▼] This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a complex and comprehensive mobility logging approach and two focus groups. The daily commute is explained as part of a real life traffic game that changes user behaviour. The methodology allows for the identification of travel activity patterns and attitudes that in turn can be used to develop gamified mobility applications. The chapter provides concrete game elements and design considerations that can be used to improve the traffic experience in Luxembourg. [less ▲] Detailed reference viewed: 141 (9 UL)![]() ; Koenig, Vincent ![]() in Dagstuhl Reports (2015), 4(12), 28 Detailed reference viewed: 113 (3 UL)![]() ; ; Koenig, Vincent ![]() in Dagstuhl Reports (2015), 4(12), 28 This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the ... [more ▼] This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the design of nuclear plants. We can state, for example, that the dikes should be high enough to guarantee that a particular area will flood at most once every 1000 years. Even when considering the limitations of such numbers, they are useful in guiding policy. Metrics for the security of information systems have not reached the same maturity level. This is partly due to the nature of security risk, in which an adaptive attacker rather than nature causes the threat events. Moreover, whereas the human factor may complicate safety and security procedures alike, in security this "weakest link" may be actively exploited by an attacker, such as in phishing or social engineering. In order to measure security at the level of socio-technical systems, one therefore needs to compare online hacking against such social manipulations, since the attacker may simply take the easiest path. In this seminar, we searched for suitable metrics that allow us to estimate information security risk in a socio-technical context, as well as the costs and effectiveness of countermeasures. Working groups addressed different topics, including security as a science, testing and evaluation, social dynamics, models and economics. The working groups focused on three main questions: what are we interested in, how to measure it, and what to do with the metrics. [less ▲] Detailed reference viewed: 291 (11 UL)![]() Lallemand, Carine ![]() ![]() in Computers in Human Behavior (2015), (43), 35-48 For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this ... [more ▼] For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this concept. However, despite many attempts to understand, define and scope UX, one may still wonder whether a consensus has been reached on this concept. In a willingness to address the complexity of this research topic and bring the concept of UX to maturity, a replication of an international survey has been conducted. The main goal of the present study is to get a better understanding of practitioners’ view- points on the notion of UX and to analyze potential evolutions over time in the understanding and prac- tical use of the concept. As both practical and theoretical implications of UX are of the greatest importance for whoever designs interactive systems, the exploration of practitioners’ perspectives is a valuable step toward continual improvement of UX activities. The present survey has been conducted amongst 758 practitioners and researchers from 35 nationalities. It allows to better understand how this concept is understood and used throughout the world. Amongst interesting results, important differences were observed according to the geographical location and background of the respondents. [less ▲] Detailed reference viewed: 367 (34 UL)![]() ; Mccall, Roderick ![]() ![]() in Adjunct Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2015) In the future autonomous vehicles will drive on our roads. It is unlikely that we will immediately move from manual to fully autonomous vehicles, instead the mix will change over time and include a large ... [more ▼] In the future autonomous vehicles will drive on our roads. It is unlikely that we will immediately move from manual to fully autonomous vehicles, instead the mix will change over time and include a large number of semi-autonomous vehicles. As a result human drivers will need to take over in specific situations (e.g., when sensors fail) and there will be an interplay between autonomous systems and human agents. However, human drivers will not be able to practice driving so regularly. Our assumption is, that the reliance on semi-autonomous systems will lead to a deterioration in driving skills. In this paper, we present a three year project called MaDSAV (Maintaining Driving Skills in semi-Autonomous Vehicles), which tackles this problem. [less ▲] Detailed reference viewed: 104 (0 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Lecture Notes in Computer Science (2015), 9190 We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼] We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study. [less ▲] Detailed reference viewed: 308 (94 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Foresti, Sara (Ed.) Security and Trust Management (2015) Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause ... [more ▼] Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentially endanger a system’s security. [less ▲] Detailed reference viewed: 253 (16 UL)![]() Kracheel, Martin ![]() ![]() ![]() Presentation (2014, September 30) Detailed reference viewed: 262 (26 UL)![]() Kracheel, Martin ![]() ![]() ![]() Scientific Conference (2014, September 30) The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will ... [more ▼] The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will reduce traffic, emissions and, in the end, save money. The alternatives, for example, such as taking different modes of transport, are incentivised through gamification. In order to develop this pervasive system, we analysed existing mobility patterns of commuters in Luxembourg. The methodology that we developed consists of a questionnaire, a smartphone application and focus group interviews. This paper presents the findings of the questionnaire and how they influence the design of the gamified pervasive application. [less ▲] Detailed reference viewed: 257 (15 UL)![]() Keller, Ulrich ![]() ![]() ![]() Presentation (2014, January) Detailed reference viewed: 282 (78 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Lecture Notes in Computer Science (2014) We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and ... [more ▼] We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and proposes two methodologies to analyse technical and social vulnerabilities. We show how to apply the framework in a use case scenario. [less ▲] Detailed reference viewed: 342 (49 UL)![]() Weinerth, Katja ![]() ![]() ![]() in Computers and Education (2014), 78 The concept map is now widely accepted as an instrument for the assessment of conceptual knowledge and is increasingly being embedded into technology-based environments. Usability addresses how ... [more ▼] The concept map is now widely accepted as an instrument for the assessment of conceptual knowledge and is increasingly being embedded into technology-based environments. Usability addresses how appropriate (for a particular use) or how user-friendly a computer-based assessment instrument is. As we know from human-computer interaction research, if the interface is not user-friendly, a computer-based assessment can result in decreased test performance and reduced validity. This means that the usability of the interface affects the assessment in such a way that if the test is not user-friendly, then the test taker will not be able to fully demonstrate his/her level of proficiency and will instead be scored according to his/her information and communication technology (ICT) literacy skills. The guidelines of the International Test Commission (2006) require usability testing for such instruments and suggest that design standards be implemented. However, we do not know whether computer-conducted concept map assessments fulfill these standards. The present paper addresses this aspect. We conducted a systematic research review to examine whether and how researchers have studied and considered usability when conducting computer-based concept map assessments. Only 24 out of 119 journal articles that assessed computer-based concept maps discussed the usability issue in some way. Nevertheless, our review brings to light the idea that the impact of usability on computer-based concept map assessments is an issue that has received insufficient attention. In addition, usability ensures a suitable interaction between test taker and test device; thus, the training effort required for test use can be reduced if a test's usability is straight forward. Our literature review, however, illustrates that the interplay between usability and test use training has mostly been neglected in current studies. [less ▲] Detailed reference viewed: 297 (32 UL)![]() Lallemand, Carine ![]() ![]() in Proceedings of the 8th Nordic Conference on Human-Computer Interaction (NordiCHI 2014) (2014) Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers have empirically studied the relevance and validity of several UX evaluation ... [more ▼] Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers have empirically studied the relevance and validity of several UX evaluation methods, few studies only have explored expert-based evaluation methods for the assessment of UX. If experts are able to assess something as complex and inherently subjective as UX, how they conduct such an evaluation and what criteria they rely on, thus remain open questions. In the present paper we report on 33 UX experts performing a UX evaluation on 4 interactive systems. We provided the experts with UX Cards, a tool based on a psychological-needs driven approach, developed to support UX Design and Evaluation. Results are encouraging and show that UX experts encountered no major issues to conduct a UX evaluation. However, significant differences exist between individual elements that experts have reported on and the overall assessment they made of the systems. [less ▲] Detailed reference viewed: 217 (16 UL)![]() Ferreira, Ana ![]() ![]() ![]() in Lecture Notes in Computer Science (2014) We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a ... [more ▼] We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user’s security decisions, and propose experiments to answer them. [less ▲] Detailed reference viewed: 324 (28 UL)![]() Weinerth, Katja ![]() ![]() ![]() in Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2014 (2014) This paper focuses on the user-centered design of a computer-based assessment (CBA) instrument for knowledge measurement. We describe relevant design steps in general and illustrate them via the design of ... [more ▼] This paper focuses on the user-centered design of a computer-based assessment (CBA) instrument for knowledge measurement. We describe relevant design steps in general and illustrate them via the design of our usability improved CBA concept map instrument (ISO 9241-11, 1998; ISO 9241-210, 2010). We discuss design versus evaluation methods from a human-computer interaction (HCI) perspective and emphasize important design steps relevant for constructing usability improved assessment instruments in educational assessment. As these HCI methods are still seldom applied to CBA, this paper helps alleviate the dearth of literature and guidelines in this domain. Our objective is thus to provide the reader with a series of design recommendations for CBA, as derived both from HCI research; and to summarize lessons learned from our specific CBA design use case. [less ▲] Detailed reference viewed: 168 (15 UL) |
||