32,569 research outputs found
Design Principals of Social Navigation
8th Delos Workshop on "User Interfaces for Digital Libraries" (on 21 October it will be held in conjuction with the 4th ERCIM Workshop on "User Interfaces for All"), SICS, Kista, Sweden, 21-23 October 1998PERSON
How to design browser security and privacy alerts
Browser security and privacy alerts must be designed to ensure they are of value to the end-user, and communicate risks efficiently. We performed a systematic literature review, producing a list of guidelines from the research. Papers were analysed quantitatively and qualitatively to formulate a comprehensive set of guidelines. Our findings seek to provide developers and designers with guidance as to how to construct security and privacy alerts. We conclude by providing an alert template, highlighting its adherence to the derived guidelines
Internet of Things-aided Smart Grid: Technologies, Architectures, Applications, Prototypes, and Future Research Directions
Traditional power grids are being transformed into Smart Grids (SGs) to
address the issues in existing power system due to uni-directional information
flow, energy wastage, growing energy demand, reliability and security. SGs
offer bi-directional energy flow between service providers and consumers,
involving power generation, transmission, distribution and utilization systems.
SGs employ various devices for the monitoring, analysis and control of the
grid, deployed at power plants, distribution centers and in consumers' premises
in a very large number. Hence, an SG requires connectivity, automation and the
tracking of such devices. This is achieved with the help of Internet of Things
(IoT). IoT helps SG systems to support various network functions throughout the
generation, transmission, distribution and consumption of energy by
incorporating IoT devices (such as sensors, actuators and smart meters), as
well as by providing the connectivity, automation and tracking for such
devices. In this paper, we provide a comprehensive survey on IoT-aided SG
systems, which includes the existing architectures, applications and prototypes
of IoT-aided SG systems. This survey also highlights the open issues,
challenges and future research directions for IoT-aided SG systems
Keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals
Pembinaan bahan bantu belajar untuk tujuan PdPC sememangnya digalakkan oleh Kementerian Pendidikan Malaysia bagi meningkatkan kualiti pendidikan. Kajian ini bertujuan untuk membangun dan mengenalpasti keberkesanan carta pembelajaran Omygram terhadap tahap pencapaian pelajar PVMA dalam mata pelajaran Bahasa Inggeris bagi topik plurals. Kajian ini adalah kuasi-eksperimen yang melibatkan dua buah sekolah menengah harian di daerah Batu Pahat. Instrumen kajian yang digunakan ialah soalan ujian pra dan pasca, soal selidik dan senarai semak. Dapatan kajian telah dianalisis menggunakan perisian Statistic Package For The Social Science Version 22.0 (SPSS). Analisis deskriptif dalam bentuk frekuensi, peratus, min dan sisihan piawai digunakan semasa penganalisaan data. Ujian-t pula digunakan untuk melihat perbezaan pencapaian antara ujian pra dengan ujian pasca bagi kumpulan rawatan dan kumpulan kawalan. Kumpulan rawatan diberi set soal selidik tentang motivasi pelajar selepas menggunakan carta pembelajaran Omygram dalam PdPC. Hasil dapatan kajian mendapati bahawa, terdapat perbezaan pencapaian yang signifikan antara skor ujian pra dengan skor ujian pasca bagi kumpulan rawatan. Motivasi pelajar selepas menggunakan carta pembelajaran Omygram juga berada pada tahap tinggi
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
It is well known that apps running on mobile devices extensively track and
leak users' personally identifiable information (PII); however, these users
have little visibility into PII leaked through the network traffic generated by
their devices, and have poor control over how, when and where that traffic is
sent and handled by third parties. In this paper, we present the design,
implementation, and evaluation of ReCon: a cross-platform system that reveals
PII leaks and gives users control over them without requiring any special
privileges or custom OSes. ReCon leverages machine learning to reveal potential
PII leaks by inspecting network traffic, and provides a visualization tool to
empower users with the ability to control these leaks via blocking or
substitution of PII. We evaluate ReCon's effectiveness with measurements from
controlled experiments using leaks from the 100 most popular iOS, Android, and
Windows Phone apps, and via an IRB-approved user study with 92 participants. We
show that ReCon is accurate, efficient, and identifies a wider range of PII
than previous approaches.Comment: Please use MobiSys version when referencing this work:
http://dl.acm.org/citation.cfm?id=2906392. 18 pages, recon.meddle.mob
Recommended from our members
mHealth Research Applied to Regulated and Unregulated Behavioral Health Sciences
Behavioral scientists are developing new methods and frameworks that leverage mobile health technologies to optimize individual level behavior change. Pervasive sensors and mobile apps allow researchers to passively observe human behaviors “in the wild” 24/7 which supports delivery of personalized interventions in the real-world environment. This is all possible because these technologies contain an incredible array of sensors that allow applications to constantly record user location and can contextualize current environmental conditions through barometers, thermometers, and ambient light sensors and can also capture audio and video of the user and their surroundings through multiple integrated high-definition cameras and microphones. These tools are a game changer in behavioral health research and, not surprisingly, introduce new ethical, regulatory/legal and social implications described in this article
Human Perceptions of Fairness in Algorithmic Decision Making: A Case Study of Criminal Risk Prediction
As algorithms are increasingly used to make important decisions that affect
human lives, ranging from social benefit assignment to predicting risk of
criminal recidivism, concerns have been raised about the fairness of
algorithmic decision making. Most prior works on algorithmic fairness
normatively prescribe how fair decisions ought to be made. In contrast, here,
we descriptively survey users for how they perceive and reason about fairness
in algorithmic decision making.
A key contribution of this work is the framework we propose to understand why
people perceive certain features as fair or unfair to be used in algorithms.
Our framework identifies eight properties of features, such as relevance,
volitionality and reliability, as latent considerations that inform people's
moral judgments about the fairness of feature use in decision-making
algorithms. We validate our framework through a series of scenario-based
surveys with 576 people. We find that, based on a person's assessment of the
eight latent properties of a feature in our exemplar scenario, we can
accurately (> 85%) predict if the person will judge the use of the feature as
fair.
Our findings have important implications. At a high-level, we show that
people's unfairness concerns are multi-dimensional and argue that future
studies need to address unfairness concerns beyond discrimination. At a
low-level, we find considerable disagreements in people's fairness judgments.
We identify root causes of the disagreements, and note possible pathways to
resolve them.Comment: To appear in the Proceedings of the Web Conference (WWW 2018). Code
available at https://fate-computing.mpi-sws.org/procedural_fairness
- …