1,696 research outputs found

    Negotiating Presence in Absence:Contact, Context and Content

    Get PDF

    A Framework for Computational Design and Adaptation of Extended Reality User Interfaces

    Full text link
    To facilitate high quality interaction during the regular use of computing systems, it is essential that the user interface (UI) deliver content and components in an appropriate manner. Although extended reality (XR) is emerging as a new computing platform, we still have a limited understanding of how best to design and present interactive content to users in such immersive environments. Adaptive UIs offer a promising approach for optimal presentation in XR as the user's environment, tasks, capabilities, and preferences vary under changing context. In this position paper, we present a design framework for adapting various characteristics of content presented in XR. We frame these as five considerations that need to be taken into account for adaptive XR UIs: What?, How Much?, Where?, How?, and When?. With this framework, we review literature on UI design and adaptation to reflect on approaches that have been adopted or developed in the past towards identifying current gaps and challenges, and opportunities for applying such approaches in XR. Using our framework, future work could identify and develop novel computational approaches for achieving successful adaptive user interfaces in such immersive environments.Comment: 5 pages, CHI 2023 Workshop on The Future of Computational Approaches for Understanding and Adapting User Interface

    Converged Mobile Media: Evaluation of an Interactive User Experience

    Get PDF

    Pride and prejudice: Learning how chronically ill people think about food

    Get PDF
    In this paper, we describe a formative study to learn how one chronically ill population thinks about food, mentally organizes food, and interprets consumption-level icons. We found that many participants let their pride influence their choices, resulting in preferred interfaces that they could not accurately interpret. The results indicate that participants organized food in similar ways, had difficulty reading from their preferred consumption-level icons, and wanted to combine multiple interface designs when searching for food

    A framework for reasoning about the human in the loop

    Get PDF
    Many secure systems rely on a \u27human in the loop\u27 to perform security-critical functions. However, humans often fail in their security roles. Whenever possible, secure system designers should find ways of keeping humans out of the loop. However, there are some tasks for which feasible or cost effective alternatives to humans are not available. In these cases secure system designers should engineer their systems to support the humans in the loop and maximize their chances of performing their security-critical functions successfully. This paper proposes a framework for reasoning about the human in the loop that provides a systematic approach to identifying potential causes for human failure. This framework can be used by system designers to identify problem areas before a system is built and proactively address deficiencies. System operators can also use this framework to analyze the root cause of security failures that have been attributed to \u27human error.\u27 Examples are provided to illustrate the applicability of this framework to a variety of secure systems design problems, including anti-phishing warnings and password policies

    Olfoto: designing a smell-based interaction

    Get PDF
    We present a study into the use of smell for searching digi-tal photo collections. Many people now have large photo libraries on their computers and effective search tools are needed. Smell has a strong link to memory and emotion so may be a good way to cue recall when searching. Our study compared text and smell based tagging. For the first stage we generated a set of smell and tag names from user de-scriptions of photos, participants then used these to tag pho-tos, returning two weeks later to answer questions on their photos. Results showed that participants could tag effec-tively with text labels, as this is a common and familiar task. Performance with smells was lower but participants performed significantly above chance, with some partici-pants using smells well. This suggests that smell has poten-tial. Results also showed that some smells were consistently identified and useful, but some were not and highlighted issues with smell delivery devices. We also discuss some practical issues of using smell for interaction

    Anti-Phishing Models: Main Challenges

    Get PDF
    Phishing is a form of online identity theft in which the attacker attempts to fraudulently retrieve a legitimate user\u27s account information, logon credentials or identity information in general. The compromised information is then used for withdrawing money online, taking out cash advances, or making purchases of goods and services on the accounts. Various solutions have been proposed and developed in response to phishing. As phishing is a business problem, the solutions target both non-technical and technical areas. This paper investigates the current anti-phishing solutions and critically reviews their usage, security weaknesses and their effectiveness. The analysis of these models points to a conclusion that technology alone will not completely stop phishing. What is necessary is a multi-tiered, organised approach: user awareness, technical and non-technical solutions should work together

    Capturing TV user behaviour in fictional character descriptions

    Get PDF
    This work is part of the On-demand IPTV project, conducted by Acreo and SICS with financing from Vinnova and active support from an industrial consortium. The main goal of the project is to study the demands on cost-effective, scalable video-on-demand networks that can deliver video with high-quality with minor quality degradations in the transmission. An important issue in understanding this situation is to explore future user behaviour (and the resulting traffic patterns) when user can choose a mix of broadcast TV and a large number of on-demand channels and services. This paper reports on the first steps to develop an understanding of IPTV user behaviour by investigating the current situation using archetypical, fictional character descriptions often referred to as personas. This is an intermediate version; the final version will be the result of Task 4.1: User requirements analysis, part of WP 4: User needs and behaviour
    • 

    corecore