1,121,652 research outputs found

    Human Computer Interaction and Emerging Technologies

    Get PDF
    The INTERACT Conferences are an important platform for researchers and practitioners in the field of human-computer interaction (HCI) to showcase their work. They are organised biennially by the International Federation for Information Processing (IFIP) Technical Committee on Human–Computer Interaction (IFIP TC13), an international committee of 30 member national societies and nine Working Groups. INTERACT is truly international in its spirit and has attracted researchers from several countries and cultures. With an emphasis on inclusiveness, it works to lower the barriers that prevent people in developing countries from participating in conferences. As a multidisciplinary field, HCI requires interaction and discussion among diverse people with different interests and backgrounds. The 17th IFIP TC13 International Conference on Human-Computer Interaction (INTERACT 2019) took place during 2-6 September 2019 in Paphos, Cyprus. The conference was held at the Coral Beach Hotel Resort, and was co-sponsored by the Cyprus University of Technology and Tallinn University, in cooperation with ACM and ACM SIGCHI. This volume contains the Adjunct Proceedings to the 17th INTERACT Conference, comprising a series of selected papers from workshops, the Student Design Consortium and the Doctoral Consortium. The volume follows the INTERACT conference tradition of submitting adjunct papers after the main publication deadline, to be published by a University Press with a connection to the conference itself. In this case, both the Adjunct Proceedings Chair of the conference, Dr Usashi Chatterjee, and the lead Editor of this volume, Dr Fernando Loizides, work at Cardiff University which is the home of Cardiff University Press

    Emerging technologies for learning report (volume 3)

    Get PDF

    Technology, autonomy, and manipulation

    Get PDF
    Since 2016, when the Facebook/Cambridge Analytica scandal began to emerge, public concern has grown around the threat of “online manipulation”. While these worries are familiar to privacy researchers, this paper aims to make them more salient to policymakers — first, by defining “online manipulation”, thus enabling identification of manipulative practices; and second, by drawing attention to the specific harms online manipulation threatens. We argue that online manipulation is the use of information technology to covertly influence another person’s decision-making, by targeting and exploiting their decision-making vulnerabilities. Engaging in such practices can harm individuals by diminishing their economic interests, but its deeper, more insidious harm is its challenge to individual autonomy. We explore this autonomy harm, emphasising its implications for both individuals and society, and we briefly outline some strategies for combating online manipulation and strengthening autonomy in an increasingly digital world

    KM Maturity Factors Affecting High Performance in Universities

    Get PDF
    This paper aims to measure Knowledge Management Maturity (KMM) in the universities to determine the impact of knowledge management on high performance. This study was applied on Al-Quds Open University in Gaza strip, Palestine. Asian productivity organization model was applied to measure KMM. Second dimension which assess high performance was developed by the authors. The controlled sample was (306). Several statistical tools were used for data analysis and hypotheses testing, including reliability Correlation using Cronbach’s alpha, “ANOVA”, Simple Linear Regression and Step Wise Regression.The overall findings of the current study suggest that KMM is suitable for measuring high performance. KMM assessment shows that maturity level is in level three. Findings also support the main hypothesis and it is sub- hypotheses. The most important factors effecting high performance are: Processes, KM leadership, People, KM Outcomes and Learning and Innovation. Furthermore the current study is unique by the virtue of its nature, scope and way of implied investigation, as it is the first comparative study in the universities of Palestine explores the status of KMM using the Asian productivity Model

    Perceptions of gender balance of IS journal editorial positions

    Get PDF
    An analysis of 18,854 editorial positions on IS journals was undertaken to examine the perceived gender balance of those positions as an indication of their contribution towards a positive role model for females considering an IS academic career. The nature and extent of perceived gender balance is examined in terms of overall composition of editorial positions, journal prestige and the specific area within IS covered by a journal. The results indicate that perceived gender balance of editorial positions reflects that of ICT academia generally, and that female representation appears to be concentrated in journals covering areas that are traditionally seen as female occupations, e.g., health, education, librarianship. As such, little or no encouragement is given to females considering an IS academic career.<br /

    Digital Media and Youth: Unparalleled Opportunity and Unprecedented Responsibility

    Get PDF
    Part of the Volume on Digital Media, Youth, and Credibility This chapter argues that understanding credibility is particularly complex -- and consequential -- in the digital media environment, especially for youth audiences, who have both advantages and disadvantages due to their relationship with contemporary technologies and their life experience. The chapter explains what is, and what is not, new about credibility in the context of digital media, and discusses the major thrusts of current credibility concerns for scholars, educators, and youth

    Factors Influencing People’s Intention to Adopt E-Banking: An Empirical Study of Consumers in Shandong Province, China

    Get PDF
    E-Banking is growing at an unprecedented rate and has become a truly worldwide phenomenon, offering convenience, flexibility and interactivity for those that can, and know how to access it. This is clearly evidence in China. However, despite such growth and popularity, some users still have reservations about using Information and communication technology (ICT) in their daily banking activities, perhaps due to deep routed cultural factors that cause consumers to question the efficacy of such changes. Through the application of a technology acceptance framework, and empirical evidence from 52 E-Banking user questionnaires and four key market segment interviews, the research explores the factors that influence consumers’ intention to adopt E-Banking in Shandong Province of China. The findings highlight that perceived usefulness and perceived credibility are significant factors which have a positive influence on consumers’ intention to utilise E-Banking, while perceived ease of use and perceived cost are less significant. Unpacking the reasons for resistance to the use of E-Banking highlighted that “difficult to operate”, “unnecessary to use it” and “worry about the security” are key drivers and therefore challenges for the service providers. Based on the results, recommendations are drawn for banks, involving focusing on the significant factors, avoiding weaknesses and optimising strengths of E-Banking and ultimately developing more accurate market positioning strategies to align and manage consumer expectations and maximise potential acceptance

    Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults

    Get PDF
    Retirement is a major life transition, which leads to substantial changes across almost all aspects of day-to-day life. Although this transition has previously been seen as the normative marker for entry into older adulthood, its influence on later life has remained relatively unstudied in terms of technology use and cybersecurity behaviours. This is problematic as older adults are at particular risk of becoming victims of cyber-crime. This study aimed to investigate which factors associated with the retirement transition were likely to increase vulnerability to cyber-attack in a sample of 12 United Kingdom based older adults, all of whom had retired within the past 5 years. Semi-structured, one to one interviews were conducted and subsequently analysed using thematic analysis. Six themes were identified referring to areas of loss in: social interaction, finances, day-to-day routine, feelings of competence, sense of purpose, and technology support structures. We discuss the implications of these losses for building cyber-resilience in retirees, with suggestions for future research
    • …
    corecore