35,183 research outputs found

    Usability, Efficiency and Security of Personal Computing Technologies

    Get PDF
    New personal computing technologies such as smartphones and personal fitness trackers are widely integrated into user lifestyles. Users possess a wide range of skills, attributes and backgrounds. It is important to understand user technology practices to ensure that new designs are usable and productive. Conversely, it is important to leverage our understanding of user characteristics to optimize new technology efficiency and effectiveness. Our work initially focused on studying older users, and personal fitness tracker users. We applied the insights from these investigations to develop new techniques improving user security protections, computational efficiency, and also enhancing the user experience. We offer that by increasing the usability, efficiency and security of personal computing technology, users will enjoy greater privacy protections along with experiencing greater enjoyment of their personal computing devices. Our first project resulted in an improved authentication system for older users based on familiar facial images. Our investigation revealed that older users are often challenged by traditional text passwords, resulting in decreased technology use or less than optimal password practices. Our graphical password-based system relies on memorable images from the user\u27s personal past history. Our usability study demonstrated that this system was easy to use, enjoyable, and fast. We show that this technique is extendable to smartphones. Personal fitness trackers are very popular devices, often worn by users all day. Our personal fitness tracker investigation provides the first quantitative baseline of usage patterns with this device. By exploring public data, real-world user motivations, reliability concerns, activity levels, and fitness-related socialization patterns were discerned. This knowledge lends insight to active user practices. Personal user movement data is captured by sensors, then analyzed to provide benefits to the user. The dynamic time warping technique enables comparison of unequal data sequences, and sequences containing events at offset times. Existing techniques target short data sequences. Our Phase-aware Dynamic Time Warping algorithm focuses on a class of sinusoidal user movement patterns, resulting in improved efficiency over existing methods. Lastly, we address user data privacy concerns in an environment where user data is increasingly flowing to manufacturer remote cloud servers for analysis. Our secure computation technique protects the user\u27s privacy while data is in transit and while resident on cloud computing resources. Our technique also protects important data on cloud servers from exposure to individual users

    Bringing Global Sourcing into The Classroom: Experiential Learning Via a Global Software Development Project

    Get PDF
    The growing trend in offshore software development has imposed new skills requirements on collaborating global partners. In the U.S. this has translated into skill sets that include communications, project management, business analysis, and team management. In a virtual setting, these skills take on a complex proportion. This paper describes an educational initiative in offshore software development between undergraduate students enrolled in a project management course at Marquette University, USA and graduate business students enrolled in an Information Systems Analysis and Design course at Management Development Institute, India. The course replicated an offshore client/vendor relationship in a virtual setting. For faculty considering such initiatives, this paper describes the setting and factors critical to success of this initiative and cautions against others that can be detrimental to such an effort

    MoodBar: Increasing new user retention in Wikipedia through lightweight socialization

    Full text link
    Socialization in online communities allows existing members to welcome and recruit newcomers, introduce them to community norms and practices, and sustain their early participation. However, socializing newcomers does not come for free: in large communities, socialization can result in a significant workload for mentors and is hard to scale. In this study we present results from an experiment that measured the effect of a lightweight socialization tool on the activity and retention of newly registered users attempting to edit for the first time Wikipedia. Wikipedia is struggling with the retention of newcomers and our results indicate that a mechanism to elicit lightweight feedback and to provide early mentoring to newcomers improves their chances of becoming long-term contributors.Comment: 9 pages, 5 figures, accepted for presentation at CSCW'1

    Detection of visitors in elderly care using a low-resolution visual sensor network

    Get PDF
    Loneliness is a common condition associated with aging and comes with extreme health consequences including decline in physical and mental health, increased mortality and poor living conditions. Detecting and assisting lonely persons is therefore important-especially in the home environment. The current studies analyse the Activities of Daily Living (ADL) usually with the focus on persons living alone, e.g., to detect health deterioration. However, this type of data analysis relies on the assumption of a single person being analysed, and the ADL data analysis becomes less reliable without assessing socialization in seniors for health state assessment and intervention. In this paper, we propose a network of cheap low-resolution visual sensors for the detection of visitors. The visitor analysis starts by visual feature extraction based on foreground/background detection and morphological operations to track the motion patterns in each visual sensor. Then, we utilize the features of the visual sensors to build a Hidden Markov Model (HMM) for the actual detection. Finally, a rule-based classifier is used to compute the number and the duration of visits. We evaluate our framework on a real-life dataset of ten months. The results show a promising visit detection performance when compared to ground truth

    The use of narrative to provide a cohesive structure for a web based computing course

    Get PDF
    Narrative has long been used as an educational tool. This article explains how narrative, in the form of popular accounts, has been used to provide context, structure and broad appeal to a large-scale, entry-level university course on Information and Communication Technology (ICT). This course is delivered via the web with online tuition. Students' responses to the use of narrative and the scope of the material has been encouraging. It is argued that narrative performs an enculturation function that is often under-utilised in ICT education

    Development of pre-service mathematics teachers’ professional knowledge and identity in working with information and communication technology

    Get PDF
    This paper describes the work undertaken in a course in communication and information technology in a pre-service program for secondary school mathematics teachers. This course aimed to help pre-service teachers develop a positive attitude regarding ICT and use it confidently. It focused on the exploration of educational software and of the Internet’s potential as a means of research and production of web sites. We discuss how the pre-service mathematics teachers evaluate their work concerning their commitment, difficulties they found, learning they identified, and personal relationship. We also analyse the effects of the course on the development of their professional knowledge and identity
    • …
    corecore