7 research outputs found

    The evaluation of interface aesthetics

    Get PDF
    There are many factors that contribute towards good user experience (Roto, Law, Vermeeren and Hoonhout, 2011). These factors include the content and its organization, the functionality and features, the information and interaction design, as well as the visual design (Garett, 2002; Morville’s, 2004; and Hassenzahl, 2005).This paper builds on the contribution of visual design into user experience as grounds to tackle the assessment of visual aesthetics evaluation methods. The intention of the study is to test objective and subjective evaluation methods with the same objects for comparison. Finding out the correlations between the objective and subjective evaluation results enables the usage of computerized image analysis for the purposes of evaluating aesthetics. The work reported in this paper thus contributes towards identifying a suitable objective method for a mathematical description of beautyinfo:eu-repo/semantics/publishedVersio

    Are First Impressions about Websites Only Related to Visual Appeal?

    No full text
    Part 2: Long and Short PapersInternational audienceThis paper investigates whether immediate impression about websites influences only perceptions of attractiveness. The evaluative constructs of perceived usability, credibility and novelty were investigated alongside visual appeal in an experimental setting in which users evaluated 20 website screenshots in two phases. The websites were rated by the participants after viewing time of 500 ms in the first phase and with no time limit in the second. Within-website and within-rater consistency were examined in order to determine whether extremely short time period are enough to quickly form stable opinions about high level evaluative constructs besides visual appeal. We confirmed that quick and stable visual appeal judgments were made without the need of elaborate investigations and found evidence that this is also true for novelty. Usability and credibility judgments were found less consistent but nonetheless noteworthy

    User's web page aesthetics opinion: a matter of low-level image descriptors based on MPEG-7

    Get PDF
    Analyzing a user's first impression of a Web site is essential for interface designers, as it is tightly related to their overall opinion of a site. In fact, this early evaluation affects user navigation behavior. Perceived usability and user interest (e.g., revisiting and recommending the site) are parameters influenced by first opinions. Thus, predicting the latter when creating a Web site is vital to ensure users’ acceptance. In this regard, Web aesthetics is one of the most influential factors in this early perception. We propose the use of low-level image parameters for modeling Web aesthetics in an objective manner, which is an innovative research field. Our model, obtained by applying a stepwise multiple regression algorithm, infers a user's first impression by analyzing three different visual characteristics of Web site screenshots—texture, luminance, and color—which are directly derived from MPEG-7 descriptors. The results obtained over three wide Web site datasets (composed by 415, 42, and 6 Web sites, respectively) reveal a high correlation between low-level parameters and the users’ evaluation, thus allowing a more precise and objective prediction of users’ opinion than previous models that are based on other image characteristics with fewer predictors. Therefore, our model is meant to support a rapid assessment of Web sites in early stages of the design process to maximize the likelihood of the users’ final approval

    Are first impressions about websites only related to visual appeal? HumanComputer Interaction-INTERACT

    No full text
    Abstract. This paper investigates whether immediate impression about websites influences only perceptions of attractiveness. The evaluative constructs of perceived usability, credibility and novelty were investigated alongside visual appeal in an experimental setting in which users evaluated 20 website screenshots in two phases. The websites were rated by the participants after viewing time of 500 ms in the first phase and with no time limit in the second. Within-website and within-rater consistency were examined in order to determine whether extremely short time period are enough to quickly form stable opinions about high level evaluative constructs besides visual appeal. We confirmed that quick and stable visual appeal judgments were made without the need of elaborate investigations and found evidence that this is also true for novelty. Usability and credibility judgments were found less consistent but nonetheless noteworthy

    Essays on the Influence of Website Emotional Design Features on Users' Emotional and Behavioral Responses

    Get PDF
    As the Internet technologies have become more advanced, as well as online users that have become more sophisticated, the competition in the e-commerce is increasingly aggressive for online vendors. Therefore, online user experience has emerged as a major issue in developing strategies for online vendors to gain advantage over such changing competitive landscape. Although past studies have widely explored the online user experience, they largely focus on the website design feature (designer) perspective and often ignore the user perspective. Considering both design feature and user perspectives, this research provides a better understanding how different website design features enhance user experience.Three essays are conducted in this dissertation to address the importance of website design features in influencing user experience. The first essay explores how website visual appeal and ease of use impact users' perceptions of usefulness, trust, and intention to use in the context of unfamiliar website. The study reveals that visual appeal produces a greater influence on the users' perceptions than ease of use. The findings also indicate that both visual appeal and ease of use are contributing factors in developing online trust among male users, with visual appeal dominating trust formation among female users.The second essay investigates how website visual order and complexity influence users' initial aesthetic impressions of a website, and how these impressions subsequently impact engagement and intention to use the website. An experiment is conducted to test the durability of the visual design features across two exposure times (1-second vs. no time limit). The results suggest that user can quickly evaluate websites (within 1 second), and these evaluations remain consistent even when time constraints are removed. In addition, the findings also reveal the importance of visual order on user attention span and attention on design elements presented on web pages.The third essay examines how individual differences in the centrality of visual aesthetics (CVA) influence users' perceptions of a website. A series of three experiments is conducted in this study to provide guidelines how to capture CVA, as well as how CVA subsequently influence users' response toward a websiteManagement Science & Information Systems (PhD

    Objective predictors of subjective aesthetic ratings of web pages

    Get PDF
    This research is concerned with the effect of visual stimulus on decision-­‐making and opinions, what visual aspects of a page affect very early impressions of web sites, and how this relates to computational methods of prediction and evaluation of web pages. The aim of this study was to discover whether there are identifiable visual attributes of web pages that can be used to predict subjective opinions. This was explored through three separate studies. These consisted of two correlational studies and a categorisation task. Participants were gained through convenience and snowball sampling, and the materials reviewed were two distinct sets of web pages. Cards sorts, laddering and an online data collection tool were used to gather the information. Both qualitative and quantitative analysis was used to explore the information. The visual attributes found to correlate with subjective opinions were inconsistent across the two correlational studies. Study One had a number of limitations that may have contributed to this inconsistency. Concrete findings were that levels of encouragement and discouragement influenced by web pages are on two distinct scales, as, although there is a negative correlation between them, a large number of pages were rated poorly on both scales. The similarity between the card sort and questionnaire results had consistent findings for predictors of low-­‐rated web pages. The findings from the cards sorts also show that users are able to make preference judgements of web pages without being able to understand the content. An application of the findings regarding prediction of low-­‐rated pages would be to create web design optimisation system, enabling web pages to be reviewed computationally. Although this should never replace user testing, it may provide an economical alternative during the early stages of design

    Counteracting phishing through HCI

    Get PDF
    Computer security is a very technical topic that is in many cases hard to grasp for the average user. Especially when using the Internet, the biggest network connecting computers globally together, security and safety are important. In many cases they can be achieved without the user's active participation: securely storing user and customer data on Internet servers is the task of the respective company or service provider, but there are also a lot of cases where the user is involved in the security process, especially when he or she is intentionally attacked. Socially engineered phishing attacks are such a security issue were users are directly attacked to reveal private data and credentials to an unauthorized attacker. These types of attacks are the main focus of the research presented within my thesis. I have a look at how these attacks can be counteracted by detecting them in the first place but also by mediating these detection results to the user. In prior research and development these two areas have most often been regarded separately, and new security measures were developed without taking the final step of interacting with the user into account. This interaction mainly means presenting the detection results and receiving final decisions from the user. As an overarching goal within this thesis I look at these two aspects united, stating the overall protection as the sum of detection and "user intervention". Within nine different research projects about phishing protection this thesis gives answers to ten different research questions in the areas of creating new phishing detectors (phishing detection) and providing usable user feedback for such systems (user intervention): The ten research questions cover five different topics in both areas from the definition of the respective topic over ways how to measure and enhance the areas to finally reasoning about what is making sense. The research questions have been chosen to cover the range of both areas and the interplay between them. They are mostly answered by developing and evaluating different prototypes built within the projects that cover a range of human-centered detection properties and evaluate how well these are suited for phishing detection. I also take a look at different possibilities for user intervention (e.g. how should a warning look like? should it be blocking or non-blocking or perhaps even something else?). As a major contribution I finally present a model that combines phishing detection and user intervention and propose development and evaluation recommendations for similar systems. The research results show that when developing security detectors that yield results being relevant for end users such a detector can only be successful in case the final user feedback already has been taken into account during the development process.Sicherheit rund um den Computer ist ein, fĂŒr den durchschnittlichen Benutzer schwer zu verstehendes Thema. Besonders, wenn sich die Benutzer im Internet - dem grĂ¶ĂŸten Netzwerk unserer Zeit - bewegen, ist die technische und persönliche Sicherheit der Benutzer extrem wichtig. In vielen FĂ€llen kann diese ohne das Zutun des Benutzers erreicht werden. Datensicherheit auf Servern zu garantieren obliegt den Dienstanbietern, ohne dass eine aktive Mithilfe des Benutzers notwendig ist. Es gibt allerdings auch viele FĂ€lle, bei denen der Benutzer Teil des Sicherheitsprozesses ist, besonders dann, wenn er selbst ein Opfer von Attacken wird. Phishing Attacken sind dabei ein besonders wichtiges Beispiel, bei dem Angreifer versuchen durch soziale Manipulation an private Daten des Nutzers zu gelangen. Diese Art der Angriffe stehen im Fokus meiner vorliegenden Arbeit. Dabei werfe ich einen Blick darauf, wie solchen Attacken entgegen gewirkt werden kann, indem man sie nicht nur aufspĂŒrt, sondern auch das Ergebnis des Erkennungsprozesses dem Benutzer vermittelt. Die bisherige Forschung und Entwicklung betrachtete diese beiden Bereiche meistens getrennt. Dabei wurden Sicherheitsmechanismen entwickelt, ohne den finalen Schritt der PrĂ€sentation zum Benutzer hin einzubeziehen. Dies bezieht sich hauptsĂ€chlich auf die PrĂ€sentation der Ergebnisse um dann den Benutzer eine ordnungsgemĂ€ĂŸe Entscheidung treffen zu lassen. Als ĂŒbergreifendes Ziel dieser Arbeit betrachte ich diese beiden Aspekte zusammen und postuliere, dass Benutzerschutz die Summe aus Problemdetektion und Benutzerintervention' ("user intervention") ist. Mit Hilfe von neun verschiedenen Forschungsprojekten ĂŒber Phishingschutz beantworte ich in dieser Arbeit zehn Forschungsfragen ĂŒber die Erstellung von Detektoren ("phishing detection") und das Bereitstellen benutzbaren Feedbacks fĂŒr solche Systeme ("user intervention"). Die zehn verschiedenen Forschungsfragen decken dabei jeweils fĂŒnf verschiedene Bereiche ab. Diese Bereiche erstrecken sich von der Definition des entsprechenden Themas ĂŒber Messmethoden und Verbesserungsmöglichkeiten bis hin zu Überlegungen ĂŒber das Kosten-Nutzen-VerhĂ€ltnis. Dabei wurden die Forschungsfragen so gewĂ€hlt, dass sie die beiden Bereiche breit abdecken und auf die AbhĂ€ngigkeiten zwischen beiden Bereichen eingegangen werden kann. Die Forschungsfragen werden hauptsĂ€chlich durch das Schaffen verschiedener Prototypen innerhalb der verschiedenen Projekte beantwortet um so einen großen Bereich benutzerzentrierter Erkennungsparameter abzudecken und auszuwerten wie gut diese fĂŒr die Phishingerkennung geeignet sind. Außerdem habe ich mich mit den verschiedenen Möglichkeiten der Benutzerintervention befasst (z.B. Wie sollte eine Warnung aussehen? Sollte sie Benutzerinteraktion blockieren oder nicht?). Ein weiterer Hauptbeitrag ist schlussendlich die PrĂ€sentation eines Modells, dass die Entwicklung von Phishingerkennung und Benutzerinteraktionsmaßnahmen zusammenfĂŒhrt und anhand dessen dann Entwicklungs- und Analyseempfehlungen fĂŒr Ă€hnliche Systeme gegeben werden. Die Forschungsergebnisse zeigen, dass Detektoren im Rahmen von Computersicherheitsproblemen die eine Rolle fĂŒr den Endnutzer spielen nur dann erfolgreich entwickelt werden können, wenn das endgĂŒltige Benutzerfeedback bereits in den Entwicklungsprozesses des Detektors einfließt
    corecore