References of "Koenig, Vincent 50002114"
     in
Bookmark and Share    
Peer Reviewed
See detailTransition vers le numérique : Quelles implications pour l’évaluation des élèves et leurs apprentissages ?
Rocher, Thierry; Fischbach, Antoine UL; Klausing, Andreas et al

Scientific Conference (2016, January)

Detailed reference viewed: 222 (23 UL)
Full Text
Peer Reviewed
See detailDriving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction
Louveton, Nicolas UL; Mccall, Roderick UL; Koenig, Vincent UL et al

in Applied Ergonomics (2016), 54

Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures ... [more ▼]

Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures such as kinetic scrolling are problematic in this respect. In this study we evaluate three prototype tasks which can be found in common mobile interaction use-cases. In a repeated-measures design, 29 participants interacted with the prototypes in a car-following task within a driving simulator environment. Task completion, driving performance and eye gaze have been analysed. We found that the slider widget used in the filtering task was too demanding and led to poor performance, while kinetic scrolling generated a comparable amount of visual distraction despite it requiring a lower degree of finger pointing accuracy. We discuss how to improve continuous list browsing in a dual-task context. [less ▲]

Detailed reference viewed: 283 (13 UL)
Full Text
Peer Reviewed
See detailChanging Mobility Behaviour through Recommendations
McCall, Rod; Koenig, Vincent UL; Martin, Romain UL et al

in Proceedings of the ACM Recsys CrowdRec Workshop 2015 (2015, September 19)

In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified ... [more ▼]

In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified mobile application Commutastic that offers users incentives to undertake after work activities. With Commutastic we try to persuade users to change their commuting time so as to avoid the evening peak. Furthermore we investigate the behaviour change with focus groups and questionnaires. The preliminary data indicates that behaviour change is possible and that traffic reduction can happen on a bigger scale. [less ▲]

Detailed reference viewed: 114 (1 UL)
Full Text
Peer Reviewed
See detailCréation et validation d’une version française du questionnaire AttrakDiff pour l’évaluation de l’expérience utilisateur des systèmes interactifs
Lallemand, Carine UL; Koenig, Vincent UL; Gronier, Guillaume et al

in European Review of Applied Psychology (2015)

Introduction While user experience (UX) evaluation is a core concern within the field of human–computer interaction (HCI), there is currently no valid self-administered UX evaluation tool in French. The ... [more ▼]

Introduction While user experience (UX) evaluation is a core concern within the field of human–computer interaction (HCI), there is currently no valid self-administered UX evaluation tool in French. The AttrakDiff 2 scale (Hassenzahl, Burmester, & Koller, 2003) is a UX evaluation tool, which relies on a theoretical model distinguishing pragmatic and hedonic qualities of interactive systems. Objective This paper describes the translation and validation of the French version of the AttrakDiff 2 scale in order to ease UX assessment in French-speaking users. Method Following the cross-cultural methodology developed by Vallerand (1989), the questionnaire was translated by trilingual researchers before being back-translated and validated by a panel of experts. A pre-test was conducted on 26 participants. The characteristics of the French version of the AttrakDiff 2 scale were then evaluated through a quantitative online study involving a sample of 381 users. Results The results confirm the expected 3 factors structure and a good internal consistency of each subscale. The links between factors are consistent with Hassenzahl's theoretical model (2003) where pragmatic and hedonic perceived attributes combine to form a judgment of attractiveness. Conclusion The current French version of the AttrakDiff 2 scale is globally reliable with regards to the initial German version and presents satisfactory levels of validity and reliability. [less ▲]

Detailed reference viewed: 330 (14 UL)
Full Text
Peer Reviewed
See detailDo graphical cues effectively inform users? A Socio-Technical Security Study in Accessing Wifi Networks
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent UL et al

in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21)

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼]

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study [less ▲]

Detailed reference viewed: 111 (1 UL)
Peer Reviewed
See detailPlaying with Traffic: An Emerging Methodology for Developing Gamified Mobility Applications
Kracheel, Martin UL; Mccall, Roderick UL; Koenig, Vincent UL

in Lumsden, Joanna (Ed.) Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices (2015)

This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a ... [more ▼]

This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a complex and comprehensive mobility logging approach and two focus groups. The daily commute is explained as part of a real life traffic game that changes user behaviour. The methodology allows for the identification of travel activity patterns and attitudes that in turn can be used to develop gamified mobility applications. The chapter provides concrete game elements and design considerations that can be used to improve the traffic experience in Luxembourg. [less ▲]

Detailed reference viewed: 141 (9 UL)
Full Text
See detailSecurity as a Science
Kegel, Roeland; Koenig, Vincent UL; Pallas, Frank et al

in Dagstuhl Reports (2015), 4(12), 28

Detailed reference viewed: 113 (3 UL)
Full Text
See detailSocio-Technical Security Metrics (Dagstuhl Seminar 14491)
Gollmann, Dieter; Herley, Cormac; Koenig, Vincent UL et al

in Dagstuhl Reports (2015), 4(12), 28

This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the ... [more ▼]

This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the design of nuclear plants. We can state, for example, that the dikes should be high enough to guarantee that a particular area will flood at most once every 1000 years. Even when considering the limitations of such numbers, they are useful in guiding policy. Metrics for the security of information systems have not reached the same maturity level. This is partly due to the nature of security risk, in which an adaptive attacker rather than nature causes the threat events. Moreover, whereas the human factor may complicate safety and security procedures alike, in security this "weakest link" may be actively exploited by an attacker, such as in phishing or social engineering. In order to measure security at the level of socio-technical systems, one therefore needs to compare online hacking against such social manipulations, since the attacker may simply take the easiest path. In this seminar, we searched for suitable metrics that allow us to estimate information security risk in a socio-technical context, as well as the costs and effectiveness of countermeasures. Working groups addressed different topics, including security as a science, testing and evaluation, social dynamics, models and economics. The working groups focused on three main questions: what are we interested in, how to measure it, and what to do with the metrics. [less ▲]

Detailed reference viewed: 291 (11 UL)
Full Text
Peer Reviewed
See detailUser Experience: a concept without consensus? Exploring practitioners' perspectives through an international survey.
Lallemand, Carine UL; Gronier, Guillaume; Koenig, Vincent UL

in Computers in Human Behavior (2015), (43), 35-48

For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this ... [more ▼]

For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this concept. However, despite many attempts to understand, define and scope UX, one may still wonder whether a consensus has been reached on this concept. In a willingness to address the complexity of this research topic and bring the concept of UX to maturity, a replication of an international survey has been conducted. The main goal of the present study is to get a better understanding of practitioners’ view- points on the notion of UX and to analyze potential evolutions over time in the understanding and prac- tical use of the concept. As both practical and theoretical implications of UX are of the greatest importance for whoever designs interactive systems, the exploration of practitioners’ perspectives is a valuable step toward continual improvement of UX activities. The present survey has been conducted amongst 758 practitioners and researchers from 35 nationalities. It allows to better understand how this concept is understood and used throughout the world. Amongst interesting results, important differences were observed according to the geographical location and background of the respondents. [less ▲]

Detailed reference viewed: 367 (34 UL)
Full Text
Peer Reviewed
See detailMaDSAV: maintaining driving skills in semi-autonomous vehicles
Meschtscherjakov, Alexander; Mccall, Roderick UL; Louveton, Nicolas UL et al

in Adjunct Proceedings of the 7th International Conference on Automotive User Interfaces and Interactive Vehicular Applications (2015)

In the future autonomous vehicles will drive on our roads. It is unlikely that we will immediately move from manual to fully autonomous vehicles, instead the mix will change over time and include a large ... [more ▼]

In the future autonomous vehicles will drive on our roads. It is unlikely that we will immediately move from manual to fully autonomous vehicles, instead the mix will change over time and include a large number of semi-autonomous vehicles. As a result human drivers will need to take over in specific situations (e.g., when sensors fail) and there will be an interplay between autonomous systems and human agents. However, human drivers will not be able to practice driving so regularly. Our assumption is, that the reliance on semi-autonomous systems will lead to a deterioration in driving skills. In this paper, we present a three year project called MaDSAV (Maintaining Driving Skills in semi-Autonomous Vehicles), which tackles this problem. [less ▲]

Detailed reference viewed: 104 (0 UL)
Full Text
Peer Reviewed
See detailDo graphical cues effectively inform users? A socio-technical security study in accessing wifi networks.
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2015), 9190

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼]

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study. [less ▲]

Detailed reference viewed: 308 (94 UL)
Full Text
Peer Reviewed
See detailIn Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Foresti, Sara (Ed.) Security and Trust Management (2015)

Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause ... [more ▼]

Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentially endanger a system’s security. [less ▲]

Detailed reference viewed: 253 (16 UL)
Full Text
See detailSTUDYING COMMUTER BEHAVIOUR FOR GAMIFYING MOBILITY
Kracheel, Martin UL; McCall, Roderick UL; Koenig, Vincent UL

Presentation (2014, September 30)

Detailed reference viewed: 262 (26 UL)
Full Text
Peer Reviewed
See detailIncentives and gaming environments for changing commuter behaviour
Kracheel, Martin UL; McCall, Roderick UL; Koenig, Vincent UL et al

Scientific Conference (2014, September 30)

The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will ... [more ▼]

The project aims to produce a pervasive, gamified system that tries to incentivize mobility behaviour change by offering alternative activities in contrast to usual journeys in such way that it will reduce traffic, emissions and, in the end, save money. The alternatives, for example, such as taking different modes of transport, are incentivised through gamification. In order to develop this pervasive system, we analysed existing mobility patterns of commuters in Luxembourg. The methodology that we developed consists of a questionnaire, a smartphone application and focus group interviews. This paper presents the findings of the questionnaire and how they influence the design of the gamified pervasive application. [less ▲]

Detailed reference viewed: 257 (15 UL)
See detailDie Online-Testplattform OASYS
Keller, Ulrich UL; François, Eric UL; Fischbach, Antoine UL et al

Presentation (2014, January)

Detailed reference viewed: 282 (78 UL)
Full Text
Peer Reviewed
See detailA Conceptual Framework to Study Socio-Technical Security
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2014)

We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and ... [more ▼]

We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and proposes two methodologies to analyse technical and social vulnerabilities. We show how to apply the framework in a use case scenario. [less ▲]

Detailed reference viewed: 342 (49 UL)
Full Text
Peer Reviewed
See detailConcept maps: A useful and usable tool for computer-based knowledge assessment? A literature review with a focus on usability
Weinerth, Katja UL; Koenig, Vincent UL; Brunner, Martin UL et al

in Computers and Education (2014), 78

The concept map is now widely accepted as an instrument for the assessment of conceptual knowledge and is increasingly being embedded into technology-based environments. Usability addresses how ... [more ▼]

The concept map is now widely accepted as an instrument for the assessment of conceptual knowledge and is increasingly being embedded into technology-based environments. Usability addresses how appropriate (for a particular use) or how user-friendly a computer-based assessment instrument is. As we know from human-computer interaction research, if the interface is not user-friendly, a computer-based assessment can result in decreased test performance and reduced validity. This means that the usability of the interface affects the assessment in such a way that if the test is not user-friendly, then the test taker will not be able to fully demonstrate his/her level of proficiency and will instead be scored according to his/her information and communication technology (ICT) literacy skills. The guidelines of the International Test Commission (2006) require usability testing for such instruments and suggest that design standards be implemented. However, we do not know whether computer-conducted concept map assessments fulfill these standards. The present paper addresses this aspect. We conducted a systematic research review to examine whether and how researchers have studied and considered usability when conducting computer-based concept map assessments. Only 24 out of 119 journal articles that assessed computer-based concept maps discussed the usability issue in some way. Nevertheless, our review brings to light the idea that the impact of usability on computer-based concept map assessments is an issue that has received insufficient attention. In addition, usability ensures a suitable interaction between test taker and test device; thus, the training effort required for test use can be reduced if a test's usability is straight forward. Our literature review, however, illustrates that the interplay between usability and test use training has mostly been neglected in current studies. [less ▲]

Detailed reference viewed: 297 (32 UL)
Full Text
Peer Reviewed
See detailHow Relevant is an Expert Evaluation of User Experience based on a Psychological Needs-Driven Approach?
Lallemand, Carine UL; Koenig, Vincent UL; Gronier, Guillaume

in Proceedings of the 8th Nordic Conference on Human-Computer Interaction (NordiCHI 2014) (2014)

Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers have empirically studied the relevance and validity of several UX evaluation ... [more ▼]

Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers have empirically studied the relevance and validity of several UX evaluation methods, few studies only have explored expert-based evaluation methods for the assessment of UX. If experts are able to assess something as complex and inherently subjective as UX, how they conduct such an evaluation and what criteria they rely on, thus remain open questions. In the present paper we report on 33 UX experts performing a UX evaluation on 4 interactive systems. We provided the experts with UX Cards, a tool based on a psychological-needs driven approach, developed to support UX Design and Evaluation. Results are encouraging and show that UX experts encountered no major issues to conduct a UX evaluation. However, significant differences exist between individual elements that experts have reported on and the overall assessment they made of the systems. [less ▲]

Detailed reference viewed: 217 (16 UL)
Full Text
Peer Reviewed
See detailSocio-technical Security Analysis of Wireless Hotspots
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2014)

We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a ... [more ▼]

We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user’s security decisions, and propose experiments to answer them. [less ▲]

Detailed reference viewed: 324 (28 UL)
Full Text
Peer Reviewed
See detailHCI Design Methods in CBA: Lessons Learned and Recommendations Based on a Concept Map Use Case
Weinerth, Katja UL; Koenig, Vincent UL; Rivas, Salvador UL et al

in Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2014 (2014)

This paper focuses on the user-centered design of a computer-based assessment (CBA) instrument for knowledge measurement. We describe relevant design steps in general and illustrate them via the design of ... [more ▼]

This paper focuses on the user-centered design of a computer-based assessment (CBA) instrument for knowledge measurement. We describe relevant design steps in general and illustrate them via the design of our usability improved CBA concept map instrument (ISO 9241-11, 1998; ISO 9241-210, 2010). We discuss design versus evaluation methods from a human-computer interaction (HCI) perspective and emphasize important design steps relevant for constructing usability improved assessment instruments in educational assessment. As these HCI methods are still seldom applied to CBA, this paper helps alleviate the dearth of literature and guidelines in this domain. Our objective is thus to provide the reader with a series of design recommendations for CBA, as derived both from HCI research; and to summarize lessons learned from our specific CBA design use case. [less ▲]

Detailed reference viewed: 168 (15 UL)