866 research outputs found
Diverse Contributions to Implicit Human-Computer Interaction
Cuando las personas interactúan con los ordenadores, hay mucha
información que no se proporciona a propósito. Mediante el estudio de estas
interacciones implícitas es posible entender qué características de la interfaz
de usuario son beneficiosas (o no), derivando así en implicaciones para el
diseño de futuros sistemas interactivos.
La principal ventaja de aprovechar datos implícitos del usuario en
aplicaciones informáticas es que cualquier interacción con el sistema puede
contribuir a mejorar su utilidad. Además, dichos datos eliminan el coste de
tener que interrumpir al usuario para que envíe información explícitamente
sobre un tema que en principio no tiene por qué guardar relación con la
intención de utilizar el sistema. Por el contrario, en ocasiones las
interacciones implícitas no proporcionan datos claros y concretos. Por ello,
hay que prestar especial atención a la manera de gestionar esta fuente de
información.
El propósito de esta investigación es doble: 1) aplicar una nueva visión tanto
al diseño como al desarrollo de aplicaciones que puedan reaccionar
consecuentemente a las interacciones implícitas del usuario, y 2)
proporcionar una serie de metodologías para la evaluación de dichos
sistemas interactivos. Cinco escenarios sirven para ilustrar la viabilidad y la
adecuación del marco de trabajo de la tesis. Resultados empíricos con
usuarios reales demuestran que aprovechar la interacción implícita es un
medio tanto adecuado como conveniente para mejorar de múltiples maneras
los sistemas interactivos.Leiva Torres, LA. (2012). Diverse Contributions to Implicit Human-Computer Interaction [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/17803Palanci
Nation-State Attackers and their Effects on Computer Security
Nation-state intelligence agencies have long attempted to operate in secret, but recent revelations have drawn the attention of security researchers as well as the general public to their operations. The scale, aggressiveness, and untargeted nature of many of these now public operations were not only alarming, but also baffling as many were thought impossible or at best infeasible at scale. The security community has since made many efforts to protect end-users by identifying, analyzing, and mitigating these now known operations.
While much-needed, the security community's response has largely been reactionary to the oracled existence of vulnerabilities and the disclosure of specific operations. Nation-State Attackers, however, are dynamic, forward-thinking, and surprisingly agile adversaries who do not rest on their laurels and are continually advancing their efforts to obtain information. Without the ability to conceptualize their actions, understand their perspective, or account for their presence, the security community's advances will become antiquated and unable to defend against the progress of Nation-State Attackers.
In this work, we present and discuss a model of Nation-State Attackers that can be used to represent their attributes, behavior patterns, and world view. We use this representation of Nation-State Attackers to show that real-world threat models do not account for such highly privileged attackers, to identify and support technical explanations of known but ambiguous operations, and to identify and analyze vulnerabilities in current systems that are favorable to Nation-State Attackers.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/143907/1/aaspring_1.pd
STOPPING AND RESUMING: HOW AND WHY DO PEOPLE SEARCH ACROSS SESSIONS FOR COMPLEX TASKS?
Cross-session searches (XSS) occur when people look for information online for multiple sessions to complete complex task goals over time. Previous studies explored aspects of XSS, including the reasons that lead to it, like the Multiple Information Seeking Episode (MISE) model, which highlights eight causes. However, less is known about how these reasons manifest in real-life XSS and their relationship with task characteristics. I conducted a diary study with 25 participants engaging in XSS for real-life tasks. Participants reported on at least three search sessions spanning at least two days, and 15 participants attended an interview after they completed the diary study. We used qualitative methods to explore motivations for expected XSS, goal complexity, session resuming and stopping reasons, types of found information, cognitive activities, and the non-search task activities that happened during the XSS process. Our results validated and refined the MISE session resuming and stopping reasons and distinguished subcategories and reasons unique to real-life XSS tasks. We discerned task-oriented and cognition-oriented motivations for XSS. We identified seven types of non-search task activities and three popular modes describing how people intertwine search and non-search activities during XSS. We assessed relationships among factors, including session goal complexity, information types, cognitive activities, session resuming, and stopping reasons using quantitative methods. Our results show significant associations between information types, cognitive activities, session goal complexity, and session resuming and stopping reasons. Furthermore, task stages significantly correlate with perceived overall task difficulty and the difficulty to find enough information. We also identified five XSS-specific challenges. Our results have implications for tailoring future search engines to customize search results according to session resuming reasons and designing tools to assist task management and preparation for session stops. Methodologically, our results have insights into designing tasks and subtasks and controlling the reasons that can lead to successive searches for tasks with varying complexity.Doctor of Philosoph
Improving User Involvement Through Live Collaborative Creation
Creating an artifact - such as writing a book, developing software, or performing a piece of music - is often limited to those with domain-specific experience or training.
As a consequence, effectively involving non-expert end users in such creative processes is challenging.
This work explores how computational systems can facilitate collaboration, communication, and participation in the context of involving users in the process of creating artifacts while mitigating the challenges inherent to such processes.
In particular, the interactive systems presented in this work support live collaborative creation, in which artifact users collaboratively participate in the artifact creation process with creators in real time.
In the systems that I have created, I explored liveness, the extent to which the process of creating artifacts and the state of the artifacts are immediately and continuously perceptible, for applications such as programming, writing, music performance, and UI design.
Liveness helps preserve natural expressivity, supports real-time communication, and facilitates participation in the creative process.
Live collaboration is beneficial for users and creators alike: making the process of creation visible encourages users to engage in the process and better understand the final artifact.
Additionally, creators can receive immediate feedback in a continuous, closed loop with users.
Through these interactive systems, non-expert participants help create such artifacts as GUI prototypes, software, and musical performances.
This dissertation explores three topics: (1) the challenges inherent to collaborative creation in live settings, and computational tools that address them; (2) methods for reducing the barriers of entry to live collaboration; and (3) approaches to preserving liveness in the creative process, affording creators more expressivity in making artifacts and affording users access to information traditionally only available in real-time processes.
In this work, I showed that enabling collaborative, expressive, and live interactions in computational systems allow the broader population to take part in various creative practices.PHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/145810/1/snaglee_1.pd
- …