42,457 research outputs found

    Privacy in crowdsourcing:a systematic review

    Get PDF
    The advent of crowdsourcing has brought with it multiple privacy challenges. For example, essential monitoring activities, while necessary and unavoidable, also potentially compromise contributor privacy. We conducted an extensive literature review of the research related to the privacy aspects of crowdsourcing. Our investigation revealed interesting gender differences and also differences in terms of individual perceptions. We conclude by suggesting a number of future research directions.</p

    Smartphones

    Get PDF
    Many of the research approaches to smartphones actually regard them as more or less transparent points of access to other kinds of communication experiences. That is, rather than considering the smartphone as something in itself, the researchers look at how individuals use the smartphone for their communicative purposes, whether these be talking, surfing the web, using on-line data access for off-site data sources, downloading or uploading materials, or any kind of interaction with social media. They focus not so much on the smartphone itself but on the activities that people engage in with their smartphones

    Why Do People Adopt, or Reject, Smartphone Password Managers?

    Get PDF
    People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers

    Living Innovation Laboratory Model Design and Implementation

    Full text link
    Living Innovation Laboratory (LIL) is an open and recyclable way for multidisciplinary researchers to remote control resources and co-develop user centered projects. In the past few years, there were several papers about LIL published and trying to discuss and define the model and architecture of LIL. People all acknowledge about the three characteristics of LIL: user centered, co-creation, and context aware, which make it distinguished from test platform and other innovation approaches. Its existing model consists of five phases: initialization, preparation, formation, development, and evaluation. Goal Net is a goal-oriented methodology to formularize a progress. In this thesis, Goal Net is adopted to subtract a detailed and systemic methodology for LIL. LIL Goal Net Model breaks the five phases of LIL into more detailed steps. Big data, crowd sourcing, crowd funding and crowd testing take place in suitable steps to realize UUI, MCC and PCA throughout the innovation process in LIL 2.0. It would become a guideline for any company or organization to develop a project in the form of an LIL 2.0 project. To prove the feasibility of LIL Goal Net Model, it was applied to two real cases. One project is a Kinect game and the other one is an Internet product. They were both transformed to LIL 2.0 successfully, based on LIL goal net based methodology. The two projects were evaluated by phenomenography, which was a qualitative research method to study human experiences and their relations in hope of finding the better way to improve human experiences. Through phenomenographic study, the positive evaluation results showed that the new generation of LIL had more advantages in terms of effectiveness and efficiency.Comment: This is a book draf

    Factors Influencing Perceptions Toward Social Networking Websites in China

    Get PDF
    Based on an online national survey of 503 respondents, this study empirically investigates factors influencing perceptions toward social networking websites (SNWs) in China. More specifically, user demographics and media\ud characteristics were examined. While income was found to be a significant predictor of users’ attitude toward SNWs, gender, age, educational level and marital status were insignificant, suggesting that demographic divides may be\ud diminishing when it comes to online social media in China. Both perceived risk and enjoyment were found to have significant positive effects. Managerial implications were discussed

    Investigating User Needs for Bio-sensing and Affective Wearables

    Get PDF
    Bio-sensing wearables are currently advancing to provide users with a lot of information about their physiological and affective states. However, relatively little is known about users' interest in acquiring, sharing and receiving this information and through which channels and modalities. To close this gap, we report on the results of an online survey (N=109) exploring principle aspects of the design space of wearables such as data types, contexts, feedback modalities and sharing behaviors. Results show that users are interested in obtaining physiological, emotional and cognitive data through modalities beyond traditional touchscreen output. Valence of the information, whether positive or negative affects the sharing behaviors

    Characterizing Location-based Mobile Tracking in Mobile Ad Networks

    Full text link
    Mobile apps nowadays are often packaged with third-party ad libraries to monetize user data
    • …
    corecore