33,557 research outputs found

    From usability to secure computing and back again

    Full text link
    Secure multi-party computation (MPC) allows multiple parties to jointly compute the output of a function while preserving the privacy of any individual party’s inputs to that function. As MPC protocols transition from research prototypes to realworld applications, the usability of MPC-enabled applications is increasingly critical to their successful deployment and widespread adoption. Our Web-MPC platform, designed with a focus on usability, has been deployed for privacy-preserving data aggregation initiatives with the City of Boston and the Greater Boston Chamber of Commerce. After building and deploying an initial version of the platform, we conducted a heuristic evaluation to identify usability improvements and implemented corresponding application enhancements. However, it is difficult to gauge the effectiveness of these changes within the context of real-world deployments using traditional web analytics tools without compromising the security guarantees of the platform. This work consists of two contributions that address this challenge: (1) the Web-MPC platform has been extended with the capability to collect web analytics using existing MPC protocols, and (2) as a test of this feature and a way to inform future work, this capability has been leveraged to conduct a usability study comparing the two versions ofWeb-MPC. While many efforts have focused on ways to enhance the usability of privacy-preserving technologies, this study serves as a model for using a privacy-preserving data-driven approach to evaluate and enhance the usability of privacy-preserving websites and applications deployed in realworld scenarios. Data collected in this study yields insights into the relationship between usability and security; these can help inform future implementations of MPC solutions.Published versio

    Suggestion systems: a usability-based evaluation model

    Get PDF
    Usability has been used to design and assess products and websites. This paper takes the concept of usability one step further and proposes a framework to assess suggestion systems. Thus taking the concept of usability one step further and applying it in the area of ideas management through suggestion system. The fundamental premise of the article is that a suggestion system designed, with usability in mind, will improve innovation among employees, and hence increase participation. This framework was then used to assess four suggestion systems in an oil and gas company in the middle-east. These systems were further assessed for employee perception of their usability and participation. After collecting data on these three different aspects conclusions are drawn. Out of the four systems analyzed, the most usable suggestion system had the highest participation rate and the least usable system attracted the fewest suggestions

    Extending the institutional repository to include undergraduate research

    Get PDF
    While a primary strategy of scholarly communication initiatives has been to encourage faculty participation in institutional repositories (IRs), with some process and workflow customization, IR participation can be successfully extended to undergraduate students, with benefits to both the student and institution. Drawing observations from the University of New Hampshire Library\u27s work collecting undergraduate honors theses and other student research, this article discusses customization strategies for creating an effective workflow for student self-deposit using an iterative, feedback-based approach, and the benefits, challenges,and potential concerns of encouraging undergraduate participation in institutional repositories

    Principles in Patterns (PiP) : Heuristic Evaluation of Course and Class Approval Online Pilot (C-CAP)

    Get PDF
    The PiP Evaluation Plan documents four distinct evaluative strands, the first of which entails an evaluation of the PiP system pilot (WP7:37). Phase 1 of this evaluative strand focuses on the heuristic evaluation of the PiP Course and Class Approval Online Pilot system (C-CAP). Heuristic evaluation is an established usability inspection and testing technique and is most commonly deployed in Human-Computer Interaction (HCI) research, e.g. to test user interface designs, technology systems testing, etc. The success of heuristic evaluation in detecting 'major' and 'minor' usability problems is well documented, but its principal limitation is its inability to capture data on all possible usability problems. For this reason heuristic evaluation is often used as a precursor to user testing, e.g. so that user testing focuses on deeper system issues rather than on those that can easily be debugged. Heuristic evaluation nevertheless remains an important usability inspection technique and research continues to demonstrate its success in detecting usability problems which would otherwise evade detection in user testing sessions. For this reason experts maintain that heuristic evaluation should be used to complement user testing. This is reflected in the PiP Evaluation Plan, which proposes protocol analysis, stimulated recall and pre- and post-test questionnaire instruments to comprise user testing (see WP7:37 phases 2, 3 and 4 of PiP Evaluation Plan). This brief report summarises the methodology deployed, presents the results of the heuristic evaluation and proposes solutions or recommendations to address the heuristic violations that were found to exist in the C-CAP system. It is anticipated that some solutions will be implemented within the lifetime of the project. This is consistent with the incremental systems design methodology that PiP has adopted

    Denotation and connotation in the human-computer interface: The ‘Save as...’ command

    Get PDF
    This paper presents a semiotic technique as a means of exploring meaning and understanding in interface design and use. This is examined through a study of the interaction between the ‘file’ metaphor and ‘save as’ command metaphor. The behaviour of these (from a functional or computational basis) do not exactly match, or map onto, the meaning of the metaphor. We examine both the denotation of a term to the user, i.e. its literal meaning to that person, and the term’s connotations, i.e. any other meanings associated with the term. We suggest that the technique applied is useful in predicting future problems with understanding the use of metaphor at the interface and with designing appropriate signification for human-computer interaction. Variation in connotation was expected but a more fundamental difference in denotation was also uncovered. Moreover, the results clearly demonstrate that consistency in the denotation of a term is critical in achieving a good user understanding of the command

    Reflecting on E-Recruiting Research Using Grounded Theory

    Get PDF
    This paper presents a systematic review of the e-Recruiting literature through a grounded theory lens. The large number of publications and the increasing diversity of publications on e-Recruiting research, as the most studied area within e-HRM (Electronic Human Resource Management), calls for a synthesis of e-Recruiting research. We show interconnections between achievements, research gaps and future research directions in order to advance both e-Recruiting research and practice. Moreover, we provide a definition of e-Recruiting. The use of grounded theory enabled us to reach across sub-disciplines, methods used, perspectives studied, themes discussed and stakeholders involved. We demonstrate that the Grounded Theory Approach led to a better understanding of the interconnections that lay buried in the disparate e-Recruiting literature

    BlogForever D5.2: Implementation of Case Studies

    Get PDF
    This document presents the internal and external testing results for the BlogForever case studies. The evaluation of the BlogForever implementation process is tabulated under the most relevant themes and aspects obtained within the testing processes. The case studies provide relevant feedback for the sustainability of the platform in terms of potential users’ needs and relevant information on the possible long term impact
    • 

    corecore