References of "Koenig, Vincent 50002114"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailUser Experience Design for E-Voting: How mental models align with security mechanisms
Zollinger, Marie-Laure UL; Distler, Verena UL; Roenne, Peter UL et al

in Electronic Voting (2019, October)

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design ... [more ▼]

This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured interviews on user experience and perceived security. Results concerning the impact of displaying security mechanisms on UX were presented in a complementary paper. Here we expand on this analysis by studying the mental models revealed during the interviews and compare them with theoretical security notions. Finally, we propose a list of improvements for designs of future voting protocols. [less ▲]

Detailed reference viewed: 83 (5 UL)
Full Text
Peer Reviewed
See detailSecurity – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security
Distler, Verena UL; Zollinger, Marie-Laure UL; Lallemand, Carine UL et al

in Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019) (2019, April)

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to ... [more ▼]

An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or blackboxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. This study aims at researching the impact of displaying security mechanisms on user experience (UX) in the context of e-voting. Two versions of an e-voting application were designed and tested using a between-group experimental protocol (N=38). Version D displayed security mechanisms, while version ND did not reveal any security-related information. We collected data on UX using standardised evaluation scales and semi-structured interviews. Version D performed better overall in terms of UX and need fulfilment. Qualitative analysis of the interviews gives further insights into factors impacting perceived security. Our study adds to existing research suggesting a conceptual shift from usability to UX and discusses implications for designing and evaluating secure systems. [less ▲]

Detailed reference viewed: 348 (39 UL)
Full Text
Peer Reviewed
See detailArt in Rich-Prospect: Evaluating Next-Generation User Interfaces for Cultural Heritage
Morse, Christopher UL; Koenig, Vincent UL; Lallemand, Carine UL et al

in Morse, Christopher; Koenig, Vincent; Lallemand, Carine (Eds.) et al MW2019: Museums and the Web, Boston 2-6 April 2019 (2019, March)

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum ... [more ▼]

The present study reports on the user experience (UX) of rich-prospect browsing, an emerging interface design trend for digital cultural heritage. Building on research that suggests online museum collections are used only infrequently by the general public, this study investigates the role of next-generation user interfaces in the design of optimal browsing experiences. Moreover, it describes the results of user testing for three different arts and culture collections that make use of rich-prospect. The study recruited 30 participants of varying ages, nationalities, and museum visiting habits to discuss their museum experiences and test three different applications: Coins, Curator Table, and Museum of the World. The results of the study provide insights into the user experience of a new browsing medium and reveal the information-seeking habits and patterns that occurred within these information environments. Moreover, the study isolated the core features of rich-prospect in order to define opportunities and pain points during the browsing experience and indicated which features in particular are most important to people during the browsing experience. Finally, we suggest some best practices going forward in the design of rich-prospect. [less ▲]

Detailed reference viewed: 94 (16 UL)
Full Text
Peer Reviewed
See detailA UX Approach to Privacy and Security: the Impact of User, Contextual and System-Related Factors
Distler, Verena UL; Lallemand, Carine UL; Koenig, Vincent UL

in CHI Workshop Exploring Individual Diffferences in Privacy (2018, April)

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We ... [more ▼]

This position paper lays out current and future studies which we conduct on the UX aspects of security and privacy, our goal being to understand which factors influence privacy-related decision-making. We advocate using UX design methods in order to study interindividual differences, system-related and contextual factors involved in privacy and security attitudes and behaviors. These results will contribute to user-tailored and personalized privacy initiatives and guide the design of future technologies. [less ▲]

Detailed reference viewed: 193 (12 UL)
Full Text
Peer Reviewed
See detailÉvaluations numériques: quel rôle pour l’expérience utilisateur ?
Pere, Maxime UL; Lallemand, Carine UL; Koenig, Vincent UL

Scientific Conference (2018, January)

Detailed reference viewed: 138 (16 UL)
Full Text
Peer Reviewed
See detailHow Could an Intranet be Like a Friend to Me?: Why Standardized UX Scales Don't Always Fit
Lallemand, Carine UL; Koenig, Vincent UL

in Proceedings of the European Conference on Cognitive Ergonomics 2017 (2017, October)

"I hope that this survey is a joke because it made me laugh so much". This quote is just one example of many negative respondents' reactions gathered during a large-scale user experience (UX) study ... [more ▼]

"I hope that this survey is a joke because it made me laugh so much". This quote is just one example of many negative respondents' reactions gathered during a large-scale user experience (UX) study. Unfortunately, the survey was no joke, rather a well-constructed and validated standardized UX scale. This paper critically reflects on the use and relevance of standardized UX scales for the evaluation of UX in business contexts. We report on a real-world use case where the meCUE questionnaire has been used to assess employees' experience (N=263) with their organization's intranet. Strong users' reactions to the survey's items and statistical analyses both suggest that the scale is unsuitable for the evaluation of business-oriented systems. Drawing on the description of this inadequacy, we discuss the quality of academic UX tools, calling into question the relevance for practice of academic methods. [less ▲]

Detailed reference viewed: 118 (13 UL)
Full Text
Peer Reviewed
See detailThe vocabulary of Learner-Space Interactions - Understanding learning spaces experience through the repertory grid method
Lallemand, Carine UL; Koenig, Vincent UL

in Interaction Design & Architecture(s) (2017), 32

Higher education institutions are facing new educational challenges and are striving for an evolution in pedagogical practices. This evolution is accompanied by the need for innovative learning spaces to ... [more ▼]

Higher education institutions are facing new educational challenges and are striving for an evolution in pedagogical practices. This evolution is accompanied by the need for innovative learning spaces to support students in the development of “21st century skills”. Designing these spaces requires a deep understanding of learners’ needs and experiences. User-centered design therefore appears as an adequate process to understand learning experiences in relation to spatial design. In this paper, we describe how the repertory grid method has been used to explore students’ perceptions of learning environments (N = 26). We identified 381 personal constructs (contrasted word pairs) associated with learning spaces and grouped them into seven categories (22 subcategories), ranked by number of occurrences. This study provides a basis for the development of a vocabulary of learners-spaces interactions, in support of the design and assessment of learning space experiences. [less ▲]

Detailed reference viewed: 148 (12 UL)
Full Text
Peer Reviewed
See detailLab Testing Beyond Usability: Challenges and Recommendations for Assessing User Experiences
Lallemand, Carine UL; Koenig, Vincent UL

in Journal of Usability Studies (2017), 12(3), 133-154

In the “third wave” of human-computer interaction (HCI), the advent of the conceptual approach of UX broadens and changes the HCI landscape. Methods approved before, mainly within the conceptual approach ... [more ▼]

In the “third wave” of human-computer interaction (HCI), the advent of the conceptual approach of UX broadens and changes the HCI landscape. Methods approved before, mainly within the conceptual approach of usability, are still widely used, and yet their adequacy for UX evaluation remains uncertain in many applications. Laboratory testing is undoubtedly the most prominent example of such a method. Hence, in this study, we investigated how the more comprehensive and emotional scope of UX can be assessed by laboratory testing. In this paper, we report on a use case study involving 70 participants. They first took part in user/laboratory tests and then were asked to evaluate their experience with the two systems (perceived UX) by filling out an AttrakDiff scale and a UX needs fulfillment questionnaire. We conducted post-test interviews to better understand participants’ experiences. We analyzed how the participants’ perceived UX depends on quantitative (e.g., task completion time, task sequence, level of familiarity with the system) and qualitative aspects (think aloud, debriefing interviews) within the laboratory context. Results indicate that the laboratory setting has a strong impact on the participants’ perceived UX, and support a discussion of the quality and limitations of laboratory evaluations regarding UX assessment. In this paper, we have identified concrete challenges and have provided solutions and tips useful for both practitioners and researchers who seek to account for the subjective, situated, and temporal nature of the UX in their assessments. [less ▲]

Detailed reference viewed: 208 (6 UL)
Peer Reviewed
See detailTransition vers le numérique : Quelles implications pour l’évaluation des élèves et leurs apprentissages ?
Rocher, Thierry; Fischbach, Antoine UL; Klausing, Andreas et al

Scientific Conference (2016, January)

Detailed reference viewed: 165 (23 UL)
Full Text
Peer Reviewed
See detailDriving while using a smartphone-based mobility application: Evaluating the impact of three multi-choice user interfaces on visual-manual distraction
Louveton, Nicolas UL; Mccall, Roderick UL; Koenig, Vincent UL et al

in Applied Ergonomics (2016), 54

Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures ... [more ▼]

Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures such as kinetic scrolling are problematic in this respect. In this study we evaluate three prototype tasks which can be found in common mobile interaction use-cases. In a repeated-measures design, 29 participants interacted with the prototypes in a car-following task within a driving simulator environment. Task completion, driving performance and eye gaze have been analysed. We found that the slider widget used in the filtering task was too demanding and led to poor performance, while kinetic scrolling generated a comparable amount of visual distraction despite it requiring a lower degree of finger pointing accuracy. We discuss how to improve continuous list browsing in a dual-task context. [less ▲]

Detailed reference viewed: 197 (13 UL)
Full Text
Peer Reviewed
See detailChanging Mobility Behaviour through Recommendations
McCall, Rod; Koenig, Vincent UL; Martin, Romain UL et al

in Proceedings of the ACM Recsys CrowdRec Workshop 2015 (2015, September 19)

In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified ... [more ▼]

In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified mobile application Commutastic that offers users incentives to undertake after work activities. With Commutastic we try to persuade users to change their commuting time so as to avoid the evening peak. Furthermore we investigate the behaviour change with focus groups and questionnaires. The preliminary data indicates that behaviour change is possible and that traffic reduction can happen on a bigger scale. [less ▲]

Detailed reference viewed: 25 (1 UL)
Full Text
Peer Reviewed
See detailCréation et validation d’une version française du questionnaire AttrakDiff pour l’évaluation de l’expérience utilisateur des systèmes interactifs
Lallemand, Carine UL; Koenig, Vincent UL; Gronier, Guillaume et al

in European Review of Applied Psychology = Revue Européenne de Psychologie Appliquée (2015)

Introduction While user experience (UX) evaluation is a core concern within the field of human–computer interaction (HCI), there is currently no valid self-administered UX evaluation tool in French. The ... [more ▼]

Introduction While user experience (UX) evaluation is a core concern within the field of human–computer interaction (HCI), there is currently no valid self-administered UX evaluation tool in French. The AttrakDiff 2 scale (Hassenzahl, Burmester, & Koller, 2003) is a UX evaluation tool, which relies on a theoretical model distinguishing pragmatic and hedonic qualities of interactive systems. Objective This paper describes the translation and validation of the French version of the AttrakDiff 2 scale in order to ease UX assessment in French-speaking users. Method Following the cross-cultural methodology developed by Vallerand (1989), the questionnaire was translated by trilingual researchers before being back-translated and validated by a panel of experts. A pre-test was conducted on 26 participants. The characteristics of the French version of the AttrakDiff 2 scale were then evaluated through a quantitative online study involving a sample of 381 users. Results The results confirm the expected 3 factors structure and a good internal consistency of each subscale. The links between factors are consistent with Hassenzahl's theoretical model (2003) where pragmatic and hedonic perceived attributes combine to form a judgment of attractiveness. Conclusion The current French version of the AttrakDiff 2 scale is globally reliable with regards to the initial German version and presents satisfactory levels of validity and reliability. [less ▲]

Detailed reference viewed: 223 (9 UL)
Full Text
Peer Reviewed
See detailDo graphical cues effectively inform users? A Socio-Technical Security Study in Accessing Wifi Networks
Ferreira, Ana; Huynen, Jean-Louis; Koenig, Vincent UL et al

in Proc. of the International Conference on Human Aspects of Information Security, Privacy, and Trust (2015, July 21)

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼]

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study [less ▲]

Detailed reference viewed: 29 (0 UL)
Peer Reviewed
See detailPlaying with Traffic: An Emerging Methodology for Developing Gamified Mobility Applications
Kracheel, Martin UL; Mccall, Roderick UL; Koenig, Vincent UL

in Lumsden, Joanna (Ed.) Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices (2015)

This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a ... [more ▼]

This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a complex and comprehensive mobility logging approach and two focus groups. The daily commute is explained as part of a real life traffic game that changes user behaviour. The methodology allows for the identification of travel activity patterns and attitudes that in turn can be used to develop gamified mobility applications. The chapter provides concrete game elements and design considerations that can be used to improve the traffic experience in Luxembourg. [less ▲]

Detailed reference viewed: 82 (5 UL)
Full Text
See detailSocio-Technical Security Metrics (Dagstuhl Seminar 14491)
Gollmann, Dieter; Herley, Cormac; Koenig, Vincent UL et al

in Dagstuhl Reports (2015), 4(12), 28

This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the ... [more ▼]

This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the design of nuclear plants. We can state, for example, that the dikes should be high enough to guarantee that a particular area will flood at most once every 1000 years. Even when considering the limitations of such numbers, they are useful in guiding policy. Metrics for the security of information systems have not reached the same maturity level. This is partly due to the nature of security risk, in which an adaptive attacker rather than nature causes the threat events. Moreover, whereas the human factor may complicate safety and security procedures alike, in security this "weakest link" may be actively exploited by an attacker, such as in phishing or social engineering. In order to measure security at the level of socio-technical systems, one therefore needs to compare online hacking against such social manipulations, since the attacker may simply take the easiest path. In this seminar, we searched for suitable metrics that allow us to estimate information security risk in a socio-technical context, as well as the costs and effectiveness of countermeasures. Working groups addressed different topics, including security as a science, testing and evaluation, social dynamics, models and economics. The working groups focused on three main questions: what are we interested in, how to measure it, and what to do with the metrics. [less ▲]

Detailed reference viewed: 213 (10 UL)
Full Text
See detailSecurity as a Science
Kegel, Roeland; Koenig, Vincent UL; Pallas, Frank et al

in Dagstuhl Reports (2015), 4(12), 28

Detailed reference viewed: 76 (3 UL)
Full Text
Peer Reviewed
See detailUser Experience: a concept without consensus? Exploring practitioners' perspectives through an international survey.
Lallemand, Carine UL; Gronier, Guillaume; Koenig, Vincent UL

in Computers in Human Behavior (2015), (43), 35-48

For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this ... [more ▼]

For more than a decade, User Experience (UX) has grown into a core concept of Human–Computer Inter- action (HCI). Practitioners and researchers from a wide range of disciplines are daily working with this concept. However, despite many attempts to understand, define and scope UX, one may still wonder whether a consensus has been reached on this concept. In a willingness to address the complexity of this research topic and bring the concept of UX to maturity, a replication of an international survey has been conducted. The main goal of the present study is to get a better understanding of practitioners’ view- points on the notion of UX and to analyze potential evolutions over time in the understanding and prac- tical use of the concept. As both practical and theoretical implications of UX are of the greatest importance for whoever designs interactive systems, the exploration of practitioners’ perspectives is a valuable step toward continual improvement of UX activities. The present survey has been conducted amongst 758 practitioners and researchers from 35 nationalities. It allows to better understand how this concept is understood and used throughout the world. Amongst interesting results, important differences were observed according to the geographical location and background of the respondents. [less ▲]

Detailed reference viewed: 246 (30 UL)
Full Text
Peer Reviewed
See detailIn Cyber-Space No One Can Hear You S·CREAM, A Root Cause Analysis for Socio-Technical Security
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Foresti, Sara (Ed.) Security and Trust Management (2015)

Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause ... [more ▼]

Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentially endanger a system’s security. [less ▲]

Detailed reference viewed: 167 (12 UL)
Full Text
Peer Reviewed
See detailDo graphical cues effectively inform users? A socio-technical security study in accessing wifi networks.
Ferreira, Ana UL; Huynen, Jean-Louis UL; Koenig, Vincent UL et al

in Lecture Notes in Computer Science (2015), 9190

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not ... [more ▼]

We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite understanding the cues, chooses otherwise. This paper describes experiments and comments the results that bring evidence to our study. [less ▲]

Detailed reference viewed: 250 (92 UL)