1,678 research outputs found

    Human-powered smartphone assistance for blind people

    Get PDF
    Mobile devices are fundamental tools for inclusion and independence. Yet, there are still many open research issues in smartphone accessibility for blind people (Grussenmeyer and Folmer 2017). Currently, learning how to use a smartphone is non-trivial, especially when we consider that the need to learn new apps and accommodate to updates never ceases. When first transitioning from a basic feature-phone, people have to adapt to new paradigms of interaction. Where feature phones had a finite set of applications and functions, users can extend the possible functions and uses of a smartphone by installing new 3rd party applications. Moreover, the interconnectivity of these applications means that users can explore a seemingly endless set of workflows across applications. To that end, the fragmented nature of development on these devices results in users needing to create different mental models for each application. These characteristics make smartphone adoption a demanding task, as we found from our eight-week longitudinal study on smartphone adoption by blind people. We conducted multiple studies to characterize the smartphone challenges that blind people face, and found people often require synchronous, co-located assistance from family, peers, friends, and even strangers to overcome the different barriers they face. However, help is not always available, especially when we consider the disparity in each barrier, individual support network and current location. In this dissertation we investigated if and how in-context human-powered solutions can be leveraged to improve current smartphone accessibility and ease of use. Building on a comprehensive knowledge of the smartphone challenges faced and coping mechanisms employed by blind people, we explored how human-powered assistive technologies can facilitate use. The thesis of this dissertation is: Human-powered smartphone assistance by non-experts is effective and impacts perceptions of self-efficacy

    Future bathroom: A study of user-centred design principles affecting usability, safety and satisfaction in bathrooms for people living with disabilities

    Get PDF
    Research and development work relating to assistive technology 2010-11 (Department of Health) Presented to Parliament pursuant to Section 22 of the Chronically Sick and Disabled Persons Act 197

    Concurrent speech feedback for blind people on touchscreens

    Get PDF
    Tese de Mestrado, Engenharia Informática, 2023, Universidade de Lisboa, Faculdade de CiênciasSmartphone interactions are demanding. Most smartphones come with limited physical buttons, so users can not rely on touch to guide them. Smartphones come with built-in accessibility mechanisms, for example, screen readers, that make the interaction accessible for blind users. However, some tasks are still inefficient or cumbersome. Namely, when scanning through a document, users are limited by the single sequential audio channel provided by screen readers. Or when tasks are interrupted in the presence of other actions. In this work, we explored alternatives to optimize smartphone interaction by blind people by leveraging simultaneous audio feedback with different configurations, such as different voices and spatialization. We researched 5 scenarios: Task interruption, where we use concurrent speech to reproduce a notification without interrupting the current task; Faster information consumption, where we leverage concurrent speech to announce up to 4 different contents simultaneously; Text properties, where the textual formatting is announced; The map scenario, where spatialization provides feedback on how close or distant a user is from a particular location; And smartphone interactions scenario, where there is a corresponding sound for each gesture, and instead of reading the screen elements (e.g., button), a corresponding sound is played. We conducted a study with 10 blind participants whose smartphone usage experience ranges from novice to expert. During the study, we asked participants’ perceptions and preferences for each scenario, what could be improved, and in what situations these extra capabilities are valuable to them. Our results suggest that these extra capabilities we presented are helpful for users, especially if these can be turned on and off according to the user’s needs and situation. Moreover, we find that using concurrent speech works best when announcing short messages to the user while listening to longer content and not so much to have lengthy content announced simultaneously

    Principles for Designing Context-Aware Applications for Physical Activity Promotion

    Full text link
    Mobile devices with embedded sensors have become commonplace, carried by billions of people worldwide. Their potential to influence positive health behaviors such as physical activity in people is just starting to be realized. Two critical ingredients, an accurate understanding of human behavior and use of that knowledge for building computational models, underpin all emerging behavior change applications. Early research prototypes suggest that such applications would facilitate people to make difficult decisions to manage their complex behaviors. However, the progress towards building real-world systems that support behavior change has been much slower than expected. The extreme diversity in real-world contextual conditions and user characteristics has prevented the conception of systems that scale and support end-users’ goals. We believe that solutions to the many challenges of designing context-aware systems for behavior change exist in three areas: building behavior models amenable to computational reasoning, designing better tools to improve our understanding of human behavior, and developing new applications that scale existing ways of achieving behavior change. With physical activity as its focus, this thesis addresses some crucial challenges that can move the field forward. Specifically, this thesis provides the notion of sweet spots, a phenomenological account of how people make and execute their physical activity plans. The key contribution of this concept is in its potential to improve the predictability of computational models supporting physical activity planning. To further improve our understanding of the dynamic nature of human behavior, we designed and built Heed, a low-cost, distributed and situated self-reporting device. Heed’s single-purpose and situated nature proved its use as the preferred device for self-reporting in many contexts. We finally present a crowdsourcing system that leverages expert knowledge to write personalized behavior change messages for large-scale context-aware applications.PHDInformationUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/144089/1/gparuthi_1.pd

    スマートフォンを用いた視覚障碍者向け移動支援システムアーキテクチャに関する研究

    Get PDF
    学位の種別: 課程博士審査委員会委員 : (主査)東京大学教授 坂村 健, 東京大学教授 越塚 登, 東京大学教授 暦本 純一, 東京大学教授 中尾 彰宏, 東京大学教授 石川 徹University of Tokyo(東京大学

    Building and evaluating an inconspicuous smartphone authentication method

    Get PDF
    Tese de mestrado em Engenharia Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2013Os smartphones que trazemos connosco estão cada vez mais entranhados nas nossas vidas intimas. Estes dispositivos possibilitam novas formas de trabalhar, de socializar, e ate de nos divertirmos. No entanto, também criaram novos riscos a nossa privacidade. Uma forma comum de mitigar estes riscos e configurar o dispositivo para bloquear apos um período de inatividade. Para voltar a utiliza-lo, e então necessário superar uma barreira de autenticação. Desta forma, se o aparelho cair das mãos de outra pessoa, esta não poderá utiliza-lo de forma a que tal constitua uma ameaça. O desbloqueio com autenticação e, assim, o mecanismo que comummente guarda a privacidade dos utilizadores de smartphones. Porem, os métodos de autenticação atualmente utilizados são maioritariamente um legado dos computadores de mesa. As palavras-passe e códigos de identificação pessoal são tornados menos seguros pelo facto de as pessoas criarem mecanismos para os memorizarem mais facilmente. Alem disso, introduzir estes códigos e inconveniente, especialmente no contexto móvel, em que as interações tendem a ser curtas e a necessidade de autenticação atrapalha a prossecução de outras tarefas. Recentemente, os smartphones Android passaram a oferecer outro método de autenticação, que ganhou um grau de adoção assinalável. Neste método, o código secreto do utilizador e uma sucessão de traços desenhados sobre uma grelha de 3 por 3 pontos apresentada no ecrã táctil. Contudo, quer os códigos textuais/numéricos, quer os padrões Android, são suscetíveis a ataques rudimentares. Em ambos os casos, o canal de entrada e o toque no ecrã táctil; e o canal de saída e o visual. Tal permite que outras pessoas possam observar diretamente a introdução da chave; ou que mais tarde consigam distinguir as marcas deixadas pelos dedos na superfície de toque. Alem disso, estes métodos não são acessíveis a algumas classes de utilizadores, nomeadamente os cegos. Nesta dissertação propõe-se que os métodos de autenticação em smartphones podem ser melhor adaptados ao contexto móvel. Nomeadamente, que a possibilidade de interagir com o dispositivo de forma inconspícua poderá oferecer aos utilizadores um maior grau de controlo e a capacidade de se auto-protegerem contra a observação do seu código secreto. Nesse sentido, foi identificada uma modalidade de entrada que não requer o canal visual: sucessões de toques independentes de localização no ecrã táctil. Estes padrões podem assemelhar-se (mas não estão limitados) a ritmos ou código Morse. A primeira contribuição deste trabalho e uma técnica algorítmica para a deteção destas sucessões de toques, ou frases de toque, como chaves de autenticação. Este reconhecedor requer apenas uma demonstração para configuração, o que o distingue de outras abordagens que necessitam de vários exemplos para treinar o algoritmo. O reconhecedor foi avaliado e demonstrou ser preciso e computacionalmente eficiente. Esta contribuição foi enriquecida com o desenvolvimento de uma aplicação Android que demonstra o conceito. A segunda contribuição e uma exploração de fatores humanos envolvidos no uso de frases de toque para autenticação. E consubstanciada em três estudos com utilizadores, em que o método de autenticação proposto e comparado com as alternativas mais comuns: PIN e o padrão Android. O primeiro estudo (N=30) compara os três métodos no que que diz respeito a resistência a observação e à usabilidade, entendida num sentido lato, que inclui a experiencia de utilização (UX). Os resultados sugerem que a usabilidade das três abordagens e comparável, e que em condições de observação perfeitas, nos três casos existe grande viabilidade de sucesso para um atacante. O segundo estudo (N=19) compara novamente os três métodos mas, desta feita, num cenário de autenticação inconspícua. Com efeito, os participantes tentaram introduzir os códigos com o dispositivo situado por baixo de uma mesa, fora do alcance visual. Neste caso, demonstra-se que a autenticação com frases de toque continua a ser usável. Já com as restantes alternativas existe uma diminuição substancial das medidas de usabilidade. Tal sugere que a autenticação por frases de toque suporta a capacidade de interação inconspícua, criando assim a possibilidade de os utilizadores se protegerem contra possíveis atacantes. O terceiro estudo (N=16) e uma avaliação de usabilidade e aceitação do método de autenticação com utilizadores cegos. Neste estudo, são também elicitadas estratégias de ocultação suportadas pela autenticação por frases de toque. Os resultados sugerem que a técnica e também adequada a estes utilizadores.As our intimate lives become more tangled with the smartphones we carry, privacy has become an increasing concern. A widely available option to mitigate security risks is to set a device so that it locks after a period of inactivity, requiring users to authenticate for subsequent use. Current methods for establishing one's identity are known to be susceptible to even rudimentary observation attacks. The mobile context in which interactions with smartphones are prone to occur further facilitates shoulder-surfing. We submit that smartphone authentication methods can be better adapted to the mobile context. Namely, the ability to interact with the device in an inconspicuous manner could offer users more control and the ability to self-protect against observation. Tapping is a communication modality between a user and a device that can be appropriated for that purpose. This work presents a technique for employing sequences of taps, or tap phrases, as authentication codes. An efficient and accurate tap phrase recognizer, that does not require training, is presented. Three user studies were conducted to compare this approach to the current leading methods. Results indicate that the tapping method remains usable even under inconspicuous authentications scenarios. Furthermore, we found that it is appropriate for blind users, to whom usability barriers and security risks are of special concern

    A Phenomenological Study of the High-Tech, High-Touch Pastor: Maximizing Personal Ministry in a Digital Age

    Get PDF
    This qualitative phenomenological study aimed to explore how high-tech, high-touch senior pastors who practice servant leadership establish and maintain personal contact with their church members and lead them using digital technology. This research was particularly relevant in an era of social distancing required by the COVID-19 pandemic. The theoretical framework for this study was Greenleaf\u27s servant leadership theory. Ten experienced pastors were interviewed to determine how they balanced the impersonal nature of streaming worship services while maintaining personal contact with their congregations. These interviews were transcribed, and important themes were identified to determine best practices for using technology while maintaining high levels of personal contact and individual attention. The objective was to gain more insight into the senior pastor taxonomy of rapidly expanding churches and to understand how to use technology to communicate with their congregation in the digital era through high-tech, high-touch ministry. Social scientists assert that the best setting for human growth and development is one that encourages social connection with other developing individuals (Lowe & Lowe, 2018). The study\u27s results may be helpful to pastors who want to use technology to minister to their flock and keep in touch with them personally. Pastors perceive that technology has allowed them to maintain relational connections with their congregation despite physical distance. They acknowledged technology limitations and the importance of in-person interactions and community development. Advantages include greater accessibility and efficiency. Disadvantages include the potential for shallow relationships. Pastors perceive in-person, face-to-face connections as crucial for spiritual connection and understanding

    BlueEyes: assistive technology for visually impaired and blind people - a bluetooth

    Get PDF
    This report is presented to draw one solution “people to people” (P2P) through the mobile technology that promotes the change in the field of sustainability in relation to the Application system. The HCI interaction field, as the basis for the study of this project, is defined as a multidisciplinary field of knowledge, focusing on the design of computer technology and, in particular, on the interaction between humans and computers. For the development of this project it was necessary enough research information on the technologies that will be needed to create an application mobile. All this research and design belongs to just one of the various stages of this project that has the base of operations at ESEC

    BlueEyes: assistive technology for visually impaired and blind people - a bluetooth

    Get PDF
    This report is presented to draw one solution “people to people” (P2P) through the mobile technology that promotes the change in the field of sustainability in relation to the Application system. The HCI interaction field, as the basis for the study of this project, is defined as a multidisciplinary field of knowledge, focusing on the design of computer technology and, in particular, on the interaction between humans and computers. For the development of this project it was necessary enough research information on the technologies that will be needed to create an application mobile. All this research and design belongs to just one of the various stages of this project that has the base of operations at ESEC
    corecore