33,557 research outputs found
From usability to secure computing and back again
Secure multi-party computation (MPC) allows multiple parties
to jointly compute the output of a function while preserving
the privacy of any individual partyâs inputs to that function.
As MPC protocols transition from research prototypes to realworld
applications, the usability of MPC-enabled applications
is increasingly critical to their successful deployment and
widespread adoption. Our Web-MPC platform, designed with
a focus on usability, has been deployed for privacy-preserving
data aggregation initiatives with the City of Boston and the
Greater Boston Chamber of Commerce. After building and
deploying an initial version of the platform, we conducted a
heuristic evaluation to identify usability improvements and
implemented corresponding application enhancements. However,
it is difficult to gauge the effectiveness of these changes
within the context of real-world deployments using traditional
web analytics tools without compromising the security guarantees
of the platform. This work consists of two contributions
that address this challenge: (1) the Web-MPC platform has
been extended with the capability to collect web analytics
using existing MPC protocols, and (2) as a test of this feature
and a way to inform future work, this capability has been
leveraged to conduct a usability study comparing the two versions
ofWeb-MPC. While many efforts have focused on ways
to enhance the usability of privacy-preserving technologies,
this study serves as a model for using a privacy-preserving
data-driven approach to evaluate and enhance the usability of
privacy-preserving websites and applications deployed in realworld
scenarios. Data collected in this study yields insights
into the relationship between usability and security; these can
help inform future implementations of MPC solutions.Published versio
Suggestion systems: a usability-based evaluation model
Usability has been used to design and assess products and
websites. This paper takes the concept of usability one step further and proposes a framework to assess suggestion systems. Thus taking the concept of usability one step further and applying it in the area of ideas management through suggestion system. The fundamental premise of the article is that a suggestion system designed, with
usability in mind, will improve innovation among employees, and hence increase participation. This framework was then used to assess four suggestion systems in an oil and gas company in the middle-east.
These systems were further assessed for employee perception of their usability and participation. After collecting data on these three different aspects conclusions are drawn. Out of the four systems analyzed, the most usable suggestion system had the highest participation rate and the least usable system attracted the fewest suggestions
Extending the institutional repository to include undergraduate research
While a primary strategy of scholarly communication initiatives has been to encourage faculty participation in institutional repositories (IRs), with some process and workflow customization, IR participation can be successfully extended to undergraduate students, with benefits to both the student and institution. Drawing observations from the University of New Hampshire Library\u27s work collecting undergraduate honors theses and other student research, this article discusses customization strategies for creating an effective workflow for student self-deposit using an iterative, feedback-based approach, and the benefits, challenges,and potential concerns of encouraging undergraduate participation in institutional repositories
Principles in Patterns (PiP) : Heuristic Evaluation of Course and Class Approval Online Pilot (C-CAP)
The PiP Evaluation Plan documents four distinct evaluative strands, the first of which entails an evaluation of the PiP system pilot (WP7:37). Phase 1 of this evaluative strand focuses on the heuristic evaluation of the PiP Course and Class Approval Online Pilot system (C-CAP). Heuristic evaluation is an established usability inspection and testing technique and is most commonly deployed in Human-Computer Interaction (HCI) research, e.g. to test user interface designs, technology systems testing, etc. The success of heuristic evaluation in detecting 'major' and 'minor' usability problems is well documented, but its principal limitation is its inability to capture data on all possible usability problems. For this reason heuristic evaluation is often used as a precursor to user testing, e.g. so that user testing focuses on deeper system issues rather than on those that can easily be debugged. Heuristic evaluation nevertheless remains an important usability inspection technique and research continues to demonstrate its success in detecting usability problems which would otherwise evade detection in user testing sessions. For this reason experts maintain that heuristic evaluation should be used to complement user testing. This is reflected in the PiP Evaluation Plan, which proposes protocol analysis, stimulated recall and pre- and post-test questionnaire instruments to comprise user testing (see WP7:37 phases 2, 3 and 4 of PiP Evaluation Plan). This brief report summarises the methodology deployed, presents the results of the heuristic evaluation and proposes solutions or recommendations to address the heuristic violations that were found to exist in the C-CAP system. It is anticipated that some solutions will be implemented within the lifetime of the project. This is consistent with the incremental systems design methodology that PiP has adopted
Denotation and connotation in the human-computer interface: The âSave as...â command
This paper presents a semiotic technique as a means
of exploring meaning and understanding in interface design
and use. This is examined through a study of the interaction
between the âfileâ metaphor and âsave asâ command metaphor.
The behaviour of these (from a functional or computational
basis) do not exactly match, or map onto, the meaning of the
metaphor. We examine both the denotation of a term to the
user, i.e. its literal meaning to that person, and the termâs
connotations, i.e. any other meanings associated with the term.
We suggest that the technique applied is useful in predicting
future problems with understanding the use of metaphor at the
interface and with designing appropriate signification for
human-computer interaction. Variation in connotation was
expected but a more fundamental difference in denotation was
also uncovered. Moreover, the results clearly demonstrate that
consistency in the denotation of a term is critical in achieving a
good user understanding of the command
Reflecting on E-Recruiting Research Using Grounded Theory
This paper presents a systematic review of the e-Recruiting literature through a grounded theory lens. The large number of publications and the increasing diversity of publications on e-Recruiting research, as the most studied area within e-HRM (Electronic Human Resource Management), calls for a synthesis of e-Recruiting research. We show interconnections between achievements, research gaps and future research directions in order to advance both e-Recruiting research and practice. Moreover, we provide a definition of e-Recruiting. The use of grounded theory enabled us to reach across sub-disciplines, methods used, perspectives studied, themes discussed and stakeholders involved. We demonstrate that the Grounded Theory Approach led to a better understanding of the interconnections that lay buried in the disparate e-Recruiting literature
BlogForever D5.2: Implementation of Case Studies
This document presents the internal and external testing results for the BlogForever case studies. The evaluation of the BlogForever implementation process is tabulated under the most relevant themes and aspects obtained within the testing processes. The case studies provide relevant feedback for the sustainability of the platform in terms of potential usersâ needs and relevant information on the possible long term impact
- âŠ