1,696 research outputs found
A Framework for Computational Design and Adaptation of Extended Reality User Interfaces
To facilitate high quality interaction during the regular use of computing
systems, it is essential that the user interface (UI) deliver content and
components in an appropriate manner. Although extended reality (XR) is emerging
as a new computing platform, we still have a limited understanding of how best
to design and present interactive content to users in such immersive
environments. Adaptive UIs offer a promising approach for optimal presentation
in XR as the user's environment, tasks, capabilities, and preferences vary
under changing context. In this position paper, we present a design framework
for adapting various characteristics of content presented in XR. We frame these
as five considerations that need to be taken into account for adaptive XR UIs:
What?, How Much?, Where?, How?, and When?. With this framework, we review
literature on UI design and adaptation to reflect on approaches that have been
adopted or developed in the past towards identifying current gaps and
challenges, and opportunities for applying such approaches in XR. Using our
framework, future work could identify and develop novel computational
approaches for achieving successful adaptive user interfaces in such immersive
environments.Comment: 5 pages, CHI 2023 Workshop on The Future of Computational Approaches
for Understanding and Adapting User Interface
Pride and prejudice: Learning how chronically ill people think about food
In this paper, we describe a formative study to learn how one chronically ill population thinks about food, mentally organizes food, and interprets consumption-level icons. We found that many participants let their pride influence their choices, resulting in preferred interfaces that they could not accurately interpret. The results indicate that participants organized food in similar ways, had difficulty reading from their preferred consumption-level icons, and wanted to combine multiple interface designs when searching for food
A framework for reasoning about the human in the loop
Many secure systems rely on a \u27human in the loop\u27 to perform security-critical functions. However, humans often fail in their security roles. Whenever possible, secure system designers should find ways of keeping humans out of the loop. However, there are some tasks for which feasible or cost effective alternatives to humans are not available. In these cases secure system designers should engineer their systems to support the humans in the loop and maximize their chances of performing their security-critical functions successfully. This paper proposes a framework for reasoning about the human in the loop that provides a systematic approach to identifying potential causes for human failure. This framework can be used by system designers to identify problem areas before a system is built and proactively address deficiencies. System operators can also use this framework to analyze the root cause of security failures that have been attributed to \u27human error.\u27 Examples are provided to illustrate the applicability of this framework to a variety of secure systems design problems, including anti-phishing warnings and password policies
Olfoto: designing a smell-based interaction
We present a study into the use of smell for searching digi-tal photo collections. Many people now have large photo libraries on their computers and effective search tools are needed. Smell has a strong link to memory and emotion so may be a good way to cue recall when searching. Our study compared text and smell based tagging. For the first stage we generated a set of smell and tag names from user de-scriptions of photos, participants then used these to tag pho-tos, returning two weeks later to answer questions on their photos. Results showed that participants could tag effec-tively with text labels, as this is a common and familiar task. Performance with smells was lower but participants performed significantly above chance, with some partici-pants using smells well. This suggests that smell has poten-tial. Results also showed that some smells were consistently identified and useful, but some were not and highlighted issues with smell delivery devices. We also discuss some practical issues of using smell for interaction
Anti-Phishing Models: Main Challenges
Phishing is a form of online identity theft in which the attacker attempts to fraudulently retrieve a legitimate user\u27s account information, logon credentials or identity information in general. The compromised information is then used for withdrawing money online, taking out cash advances, or making purchases of goods and services on the accounts. Various solutions have been proposed and developed in response to phishing. As phishing is a business problem, the solutions target both non-technical and technical areas. This paper investigates the current anti-phishing solutions and critically reviews their usage, security weaknesses and their effectiveness. The analysis of these models points to a conclusion that technology alone will not completely stop phishing. What is necessary is a multi-tiered, organised approach: user awareness, technical and non-technical solutions should work together
Capturing TV user behaviour in fictional character descriptions
This work is part of the On-demand IPTV project, conducted by Acreo and SICS with financing from Vinnova and active support from an industrial consortium. The main goal of the project is to study the demands on cost-effective, scalable video-on-demand networks that can deliver video with high-quality with minor quality degradations in the transmission. An important issue in understanding this situation is to explore future user behaviour (and the resulting traffic patterns) when user can choose a mix of broadcast TV and a large number of on-demand channels and services. This paper reports on the first steps to develop an understanding of IPTV user behaviour by investigating the current situation using archetypical, fictional character descriptions often referred to as personas. This is an intermediate version; the final version will be the result of Task 4.1: User requirements analysis, part of WP 4: User needs and behaviour
- âŠ