Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
Peer Reviewed
See detailThe Experience of Cognitive Intrusion of Pain: scale development and validation.
Attridge, Nina; Crombez, Geert; Van Ryckeghem, Dimitri UL et al

in Pain (2015), 156(10), 1978-90

Patients with chronic pain often report their cognition to be impaired by pain, and this observation has been supported by numerous studies measuring the effects of pain on cognitive task performance ... [more ▼]

Patients with chronic pain often report their cognition to be impaired by pain, and this observation has been supported by numerous studies measuring the effects of pain on cognitive task performance. Furthermore, cognitive intrusion by pain has been identified as one of 3 components of pain anxiety, alongside general distress and fear of pain. Although cognitive intrusion is a critical characteristic of pain, no specific measure designed to capture its effects exists. In 3 studies, we describe the initial development and validation of a new measure of pain interruption: the Experience of Cognitive Intrusion of Pain (ECIP) scale. In study 1, the ECIP scale was administered to a general population sample to assess its structure and construct validity. In study 2, the factor structure of the ECIP scale was confirmed in a large general population sample experiencing no pain, acute pain, or chronic pain. In study 3, we examined the predictive value of the ECIP scale in pain-related disability in fibromyalgia patients. The ECIP scale scores followed a normal distribution with good variance in a general population sample. The scale had high internal reliability and a clear 1-component structure. It differentiated between chronic pain and control groups, and it was a significant predictor of pain-related disability over and above pain intensity. Repairing attentional interruption from pain may become a novel target for pain management interventions, both pharmacologic and nonpharmacologic. [less ▲]

Detailed reference viewed: 57 (1 UL)
Full Text
See detailThe Experience of Security in Human-Computer Interactions: Understanding Security Perceptions Through the Concept of User Experience
Distler, Verena UL

Doctoral thesis (2021)

In traditional interactions that do not rely on technology, most people are able to assess risks to their privacy and security and understand how to mitigate these risks. However, risk assessment and ... [more ▼]

In traditional interactions that do not rely on technology, most people are able to assess risks to their privacy and security and understand how to mitigate these risks. However, risk assessment and mitigation is more challenging when interacting with technology, and people’s perceptions of security and privacy risks are not always aligned with reality. It is important for those who design technologies to understand how people perceive the security of technologies in order to avoid having their designs contribute to erroneous perceptions. Instead, interactions with technology should be deliberately designed to ensure that people do not over- or underestimate the security provided by the system. This dissertation contributes to a better understanding of users’ perceptions of security in human-computer interactions. It investigates which factors induce a perception of security and privacy risks and how user-centered design can influence these factors to deliberately design for or against perceived security. I use a mixed-methods approach to address these objectives, including a systematic literature review, empirical data collection with focus groups, expert co-creation sessions, user tests in a controlled environment and a quantitative survey experiment. The first research objective is to analyze how security and privacy researchers induce a perception of security and privacy risks with research participants. We conducted a systematic literature review and focused our analysis on study methods; risk representation; the use of prototypes, scenarios, and educational interventions; the use of deception to simulate risk; and types of participants. We discuss benefits and shortcomings of the methods, and identify key methodological, ethical, and research challenges when representing and assessing security and privacy risk. We also provide guidelines for the reporting of user studies in security and privacy. The second research objective is to explore the factors that contribute to the acceptance of privacy and security risks in situations where people need to weigh the potential advantages of a technology against its associated privacy or security risks. We conducted a series of focus groups and highlighted the reasons why people accept compromises to their privacy and security, finding that perceived usefulness and the fulfilment of the psychological needs for autonomy and control were important factors. Our results suggest potential links between technology acceptance models and user experience models in the context of privacy-relevant interactions. The third research objective is to design and evaluate examples of visible representations of security mechanisms, with a focus on encryption. We studied the effects of these visual and textual representations empirically to understand the impact of these visible security mechanisms on user experience, perceptions of security and users’ understanding of encryption. We addressed this question in a series of studies, both lab studies and online experiments. In a vignette experiment, we find that more complex descriptions of encryption can lead to a better understanding and higher perceived security when designed carefully. However, we find no effect of novel visualizations of encryption on user experience (UX), perceived security or understanding of encryption. The fourth objective is to explore how we might make the link from subjective experience to more secure behaviors. We introduce a new framework of security-enhancing friction design. The framework suggests helping users behave more securely by designing for moments of negative UX in security-critical situations while also ensuring that overall UX remains at an acceptable level to avoid disuse of secure technologies. Overall, this doctoral dissertation contributes to research in the field of human-computer interaction, and more specifically, usable privacy and security. It improves our understanding of the methods used by researchers in the field of usable privacy and security use to create a perception of risk, and the factors that make people accept or reject certain privacy trade-offs. This dissertation also makes contributions to helping researchers and creators of technology understand how their designs influence perceptions of security, UX and understanding of encryption. This enables them to design for or against a perception of security, depending on the actual level of security provided by the technology. Finally, we conceptualize security-enhancing friction, a framework that suggests helping users to behave more securely by designing for moments of negative UX. [less ▲]

Detailed reference viewed: 269 (22 UL)
See detailExpérience religieuse et modernité
Sosoe, Lukas UL

Scientific Conference (2015, April)

Detailed reference viewed: 72 (0 UL)
Full Text
Peer Reviewed
See detailAn Experience Report On Applying Software Testing Academic Results In Industry: We Need Usable Automated Test Generation
Arcuri, Andrea UL

in Empirical Software Engineering (2018), 23(4),

What is the impact of software engineering research on current practices in industry? In this paper, I report on my direct experience as a PhD/post-doc working in software engineering research projects ... [more ▼]

What is the impact of software engineering research on current practices in industry? In this paper, I report on my direct experience as a PhD/post-doc working in software engineering research projects, and then spending the following five years as an engineer in two different companies (the first one being the same I worked in collaboration with during my post-doc). Given a background in software engineering research, what cutting-edge techniques and tools from academia did I use in my daily work when developing and testing the systems of these companies? Regarding validation and verification (my main area of research), the answer is rather short: as far as I can tell, only FindBugs. In this paper, I report on why this was the case, and discuss all the challenging, complex open problems we face in industry and which somehow are ``neglected'' in the academic circles. In particular, I will first discuss what actual tools I could use in my daily work, such as JaCoCo and Selenium. Then, I will discuss the main open problems I faced, particularly related to environment simulators, unit and web testing. After that, popular topics in academia are presented, such as UML, regression and mutation testing. Their lack of impact on the type of projects I worked on in industry is then discussed. Finally, from this industrial experience, I provide my opinions about how this situation can be improved, in particular related to how academics are evaluated, and advocate for a greater involvement into open-source projects. [less ▲]

Detailed reference viewed: 262 (20 UL)
Full Text
Peer Reviewed
See detailExperience report: How to extract security protocols’ specifications from C libraries
Vazquez Sandoval, Itzel UL; Lenzini, Gabriele UL

in 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Volume 2 (2018, June)

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code ... [more ▼]

Often, analysts have to face a challenging situation when formally verifying the implementation of a security protocol: they need to build a model of the protocol from only poorly or not documented code, and with little or no help from the developers to better understand it. Security protocols implementations frequently use services provided by libraries coded in the C programming language; automatic tools for codelevel reverse engineering offer good support to comprehend the behavior of code in object-oriented languages but are ineffective to deal with libraries in C. Here we propose a systematic, yet human-dependent approach, which combines the capabilities of state-of-the-art tools in order to help the analyst to retrieve, step by step, the security protocol specifications from a library in C. Those specifications can then be used to create the formal model needed to carry out the analysis. [less ▲]

Detailed reference viewed: 206 (31 UL)
Full Text
See detailL’expérience utilisateur : Relations entre utilisabilité et esthétique, affects et comportements dans une tâche de recherche d’information sur tablettes numériques
Pere, Maxime UL

Bachelor/master dissertation (2016)

While the study of human-machine interactions is fairly well established regarding usability dimensions, the approach of the user experience, more recent, incorporates new dimensions in order to bring to ... [more ▼]

While the study of human-machine interactions is fairly well established regarding usability dimensions, the approach of the user experience, more recent, incorporates new dimensions in order to bring to light on these interactions. This work takes part in this approach and aims to clarify the relationship between a non-functional quality and a functional quality of a system, the main effect of these qualities on the affects experienced during the interaction with the system and finally the effect of the system qualities on behaviours. A research information task on 4 Websites corresponding to both crossed variables, aesthetics (high vs low) and usability (high vs low), should allow us to explore these questions through self-reports measures and behavioural recording. In addition, we attempt to identify relevant indicators which have not been used much yet. This study is run on touch tablet computers on Windows systems. [less ▲]

Detailed reference viewed: 220 (15 UL)
Full Text
Peer Reviewed
See detailL’expérience utilisateur : un concept sans consensus? Enquête sur le point de vue des professionnels
Lallemand, Carine UL; Gronier, Guillaume; Koenig, Vincent UL

in van de Leemput, Cécile; Chauvin, Christine; Hellemans, Catherine (Eds.) Activités humaines, Technologies et Bien-être (2013)

Depuis une dizaine d’années, le concept d’expérience utilisateur (UX) se répand dans le domaine des Interactions Homme-Machine (IHM). Centré sur l’utilisateur et son expérience subjective vécue de ... [more ▼]

Depuis une dizaine d’années, le concept d’expérience utilisateur (UX) se répand dans le domaine des Interactions Homme-Machine (IHM). Centré sur l’utilisateur et son expérience subjective vécue de l’interaction avec un système interactif, l’UX s’intéresse, entre autres, aux aspects émotionnels, hédoniques ou encore esthétiques composant l’interaction. Cependant, bien que déjà très utilisé par les professionnels, ce concept souffre notamment d’un manque de recherche empirique. De plus, de nombreuses définitions et perspectives sur l’UX cohabitent sans donner lieu à un consensus scientifique clair. Or, pour progresser dans ce champ de recherche, l’enseigner, ou pour communiquer sur celui-ci, il est nécessaire de mieux le comprendre et le délimiter. Une enquête par questionnaire (adaptée de Law et al., 2009) réalisée sur 758 professionnels et chercheurs de plus de 35 nationalités permet de mieux comprendre comment ce concept est compris et utilisé à travers le monde. Les résultats montrent des divergences entre les profils des participants. [less ▲]

Detailed reference viewed: 212 (6 UL)
Peer Reviewed
See detailL’expérience utilisateur de l’évaluation numérique: un facteur des performances mesurées ?
Pere, Maxime UL

Scientific Conference (2018, January)

Detailed reference viewed: 128 (13 UL)
Full Text
Peer Reviewed
See detailExperience-based guidelines for effective and efficient data extraction in systematic reviews in software engineering
Garousi, Vahid UL; Felderer, Michael

in Proceedings of International Conference on Evaluation and Assessment in Software Engineering (EASE) (2017, June)

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction ... [more ▼]

To systematically collect evidence and to structure a given area in software engineering (SE), Systematic Literature Reviews (SLR) and Systematic Mapping (SM) studies have become common. Data extraction is one of the main phases (activities) when conducting an SM or an SLR, whose objective is to extract required data from the primary studies and to accurately record the information researchers need to answer the questions of the SM/SLR study. Based on experience in a large number of SM/SLR studies, we and many other researchers have found the data extraction in SLRs to be time consuming and error-prone, thus raising the real need for heuristics and guidelines for effective and efficient data extraction in these studies, especially to be learnt by junior and young researchers. As a ‘guideline’ paper, this paper contributes a synthesized list of challenges usually faced during SLRs’ data extraction phase and the corresponding solutions (guidelines). For our synthesis, we consider two data sources: (1) the pool of 16 SLR studies in which the authors have been involved in, as well as (2) a review of challenges and guidelines in the existing literature. Our experience in utilizing the presented guidelines in the near past have helped our junior colleagues to conduct data extractions more effectively and efficiently. [less ▲]

Detailed reference viewed: 161 (7 UL)
See detailExperiences and Perspectives of European Higher Education
Hoenig, Barbara UL

in Langer, Josef; Vlasic, Goran; Krce Miocic, Bozena (Eds.) EU Local Imprints: The Case of South Central Europe (2012)

Detailed reference viewed: 41 (4 UL)
Full Text
Peer Reviewed
See detailExpériences économiques de l’entre-deux-guerres et projets européistes
Clavert, Frédéric UL

in Guieu, Jean-Michel; Le Dréau, Christophe (Eds.) Autour du Congrès de l'Europe à La Haye (2009)

Expériences économiques de l’entre-deux-guerres et projets européistes. Publication du colloque « Autour du Congrès de l’Europe à La Haye », PIE – Peter Lang, 2009.

Detailed reference viewed: 58 (0 UL)
See detailExpériences migratoires et vieillissement au Luxembourg
Karl, Ute UL; Kühn, Boris; Ramos, Anne Carolina UL

in Aktiv am Liewen (2014), 49

Detailed reference viewed: 56 (1 UL)
Full Text
Peer Reviewed
See detailExperiences of applying UML/MARTE on three industrial projects
Iqbal, Muhammad Zohaib; Ali, Shaukat; Yue, Tao et al

in ACM/IEEE 15th International Conference on Model Driven Engineering Languages & Systems (2012)

Detailed reference viewed: 450 (4 UL)
Full Text
Peer Reviewed
See detailExperiences of caregiving, satisfaction of life and social repercussions among family caregivers, two years post-stroke.
Lurbe-Puerto, Katia UL; Baumann, Michèle UL

in Social Work in Health Care (2012), 51

Cerebrovascular diseases are a public health and social policy priority in Europe due to their high prevalence and the long-term disability they may result in (as the principal cause of handicap ... [more ▼]

Cerebrovascular diseases are a public health and social policy priority in Europe due to their high prevalence and the long-term disability they may result in (as the principal cause of handicap). Increasingly, family caregivers take over the care at home of these patients. Two years post-stroke, our study analyzed the feelings of family caregivers from Luxembourg and northeastern Portugal toward their experience of caregiving and its repercussions on social and couple relationships, life satisfaction, and socioeconomic characteristics. Participating hospitals identified survivors and consent was sought by letter. Patients (n = 62) and their main caregivers (n = 46 pairs) were interviewed at home. The mean life satisfaction of caregivers was similar, but the experience of providing care differed in terms of family support, and disruptions of the caregivers’ family responsibilities. More Portuguese respondents gave activities up, found little time for relaxation, and estimated that their health had deteriorated; more Luxembourgers felt strong enough to cope. More Portuguese spouses reported an impact on their sex lives. Family caregivers represent a “population at risk.” Social workers can help them by providing domestic assistance, undertaking coaching activities, fostering favorable attitudes, and offering reassurance. Home-based rehabilitation in Europe involving family care must take account of cultural lifestyle issues. [less ▲]

Detailed reference viewed: 137 (1 UL)
Full Text
Peer Reviewed
See detailExperiences of Evaluating Presence in Augmented Realities
McCall, Roderick UL; Braun, Anne-Kathrine

in PsychNology Journal (2008), 6(2), 157-163

This paper presents an overview of a study of 24 people who used an augmented reality game called TimeWarp. The paper initially discusses the game and evaluation methods chosen, it then explores emerging ... [more ▼]

This paper presents an overview of a study of 24 people who used an augmented reality game called TimeWarp. The paper initially discusses the game and evaluation methods chosen, it then explores emerging issues from the evaluation which are applicable to other augmented reality games and how existing user testing methods require further improvements in order to capture data relevant to the issues. [less ▲]

Detailed reference viewed: 66 (1 UL)
Full Text
Peer Reviewed
See detailExperiences of migration, parent–child interaction, and the life satisfaction of children in Ghana and China
Wu, Qiaobing; Cebotari, Victor UL

in Population Space and Place (2018), 24(7), 2160

Detailed reference viewed: 44 (0 UL)
Full Text
Peer Reviewed
See detailExperiences of Siblings of Children with Physical Disabilities: An Empirical Investigation
Pit-Ten Cate, Ineke UL; Loots, G. M. P.

in Disability and Rehabilitation (2000), 22(9), 399-408

PURPOSE: This study aimed to investigate the experiences of Dutch siblings of children with physical disabilities (n=43). METHOD: Interviews were conducted to investigate experiences of siblings in 3 ... [more ▼]

PURPOSE: This study aimed to investigate the experiences of Dutch siblings of children with physical disabilities (n=43). METHOD: Interviews were conducted to investigate experiences of siblings in 3 areas: the sibling relationship, the relationship with parents, and the relationship with others. The siblings also completed a coping response inventory. RESULTS: The siblings reported difficulties in undertaking activities and in communicating with their brother/sister with a disability. Most siblings worried about the future and the health of their brother/sister with a disability. The siblings reported open communication and trust as the main characteristics of the relationship with their parents. They acknowledged their parents' attempts to treat all children equally, although parents were not always successful in doing so. Having a sibling with a disability did not cause problems in the relationship with friends. The awkward reactions of strangers caused the siblings much annoyance and distress. Siblings in this sample used more approach coping strategies than avoidance strategies, t(34) = 2.37, p < 0.05. CONCLUSION: The brothers and sisters generally did not experience many significant problems, however, a minority of the children did experience problems for which they would like help. In addition, they reported joys as well as problems. [less ▲]

Detailed reference viewed: 86 (1 UL)
Peer Reviewed
See detailExpériences scolaires au Congo Belge. Etude exploratoire
Vinck, Honoré; Briffaerts, Jan; Herman, Frederik UL et al

in Annales Aequatoria (2006), 27

Sur base de huit interviews d'anciens élèves de l'enseignement colonial au Congo belge, cette étude explore les effets que les processus pédagogiques coloniaux ont eu sur les élèves. Mots-clés: Congo ... [more ▼]

Sur base de huit interviews d'anciens élèves de l'enseignement colonial au Congo belge, cette étude explore les effets que les processus pédagogiques coloniaux ont eu sur les élèves. Mots-clés: Congo belge; éducation coloniale; expériences scolaires; histoire. On the basis of eight interviews with Congolese citizens, each reflecting on their individual school careers, this study explores the effects of colonial educational processes in the former Belgian Congo. [less ▲]

Detailed reference viewed: 162 (3 UL)
See detailExperiencing Culture in Intimate Intercultural Relationships
Aleksic, Gabrijela UL

Book published by Information Age Publications (2023)

I introduce the book starting by my own personal experience of growing up in a mixed family and being myself in a mixed marriage. I describe the structure of the book by building up my own method: how I ... [more ▼]

I introduce the book starting by my own personal experience of growing up in a mixed family and being myself in a mixed marriage. I describe the structure of the book by building up my own method: how I chose this topic, who were the people I interviewed, how (interviews, stories, and objects) and why was the single-but-critical instances analysis important. I focus on the richness of the interaction I had with the interviewees. I underlie the phenomenological stories of struggles, trust and vulnerability. The chapters resolve around power relations, expressing affection, in-depth communication, child rearing, conflict resolution strategies, empathy, female identity, future planning, the role of humor, the biggest cultural and linguistic challenges and opportunities. The focus is on the phenomenon captured in single-but-critical instances in participants' stories. I conclude by describing what significance culture has in intimate intercultural relationships. [less ▲]

Detailed reference viewed: 268 (18 UL)