4,673 research outputs found

    What can we get ā€œhelpā€ to observe when it comes to mobile use and mobile user experience?

    Get PDF
    Mobile devices and mobile services have been around long enough for the research community to start thinking about the next step in studying them: larger user groups and longer periods of time. Strictly quantitative methods are not very useful when it comes to studying user experience so we need to find scalable ways to support our qualitative methods to be able to take this next step. This paper reflects on automatic gathering of context data as one such way

    Cue Now, Reflect Later: A Study of Delayed Reflection of Diary Events

    Get PDF
    Diary studies require participants to record entries at the moment of events, but the process often distracts the participants and disrupts the flow of the events. In this work, we explore the notion of delayed reflection for diary studies. Users quickly denote cues of diary events and only reflect on the cues later when they are not busy. To minimize disruptions, we employed a squeeze gesture that is swift and discreet for denoting cues. We investigated the feasibility of delayed reflection and compared it against a conventional digital diary that requires users to reflect immediately at the time of entry. In a weeklong field study, we asked participants to record their daily experiences with both types of diaries. Our results show that usersā€™ preference is context-dependent. Delayed reflection is favored for use in contexts when interruptions are deemed inappropriate (e.g. in meetings or lectures) or when the users are mobile (e.g. walking). In contrast, the users prefer immediate reflection when they are alone, such as during leisure and downtime

    Towards task-based personal information management evaluations

    Get PDF
    Personal Information Management (PIM) is a rapidly growing area of research concerned with how people store, manage and re-find information. A feature of PIM research is that many systems have been designed to assist users manage and re-find information, but very few have been evaluated.This has been noted by several scholars and explained by the difficulties involved in performing PIM evaluations.The difficulties include that people re-find information from within unique personal collections; researchers know little about the tasks that cause people to re-find information; and numerous privacy issues concerning personal information. In this paper we aim to facilitate PIM evaluations by addressing each of these difficulties. In the first part, we present a diary study of information re-finding tasks. The study examines the kind of tasks that require users to re-find information and produces a taxonomy of re-finding tasks for email messages and web pages. In the second part, we propose a task-based evaluation methodology based on our findings and examine the feasibility of the approach using two different methods of task creation

    The true cost of unusable password policies: password use in the wild

    Get PDF
    HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We present a study which re-examined password policies and password practice in the workplace today. 32 staff members in two organisations kept a password diary for 1 week, which produced a sample of 196 passwords. The diary was followed by an interview which covered details of each password, in its context of use. We find that users are in general concerned to maintain security, but that existing security policies are too inflexible to match their capabilities, and the tasks and contexts in which they operate. As a result, these password policies can place demands on users which impact negatively on their productivity and, ultimately, that of the organisation. We conclude that, rather than focussing password policies on maximizing password strength and enforcing frequency alone, policies should be designed using HCI principles to help the user to set an appropriately strong password in a specific context of use

    An online activity diary method for studying credibility assessment on the Web

    Full text link
    No Abstract.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/78324/1/1450460388_ftp.pd

    Collecting Data from Children Ages 9-13

    Get PDF
    Provides a summary of literature on common methods used to collect data, such as diaries, interviews, observational methods, and surveys. Analyzes age group-specific considerations, advantages, and drawbacks, with tips for improving data quality

    Usability testing: a review of some methodological and technical aspects of the method

    Get PDF
    The aim of this paper is to review some work conducted in the field of user testing that aims at specifying or clarifying the test procedures and at defining and developing tools to help conduct user tests. The topics that have been selected were considered relevant for evaluating applications in the field of medical and health care informatics. These topics are: the number of participants that should take part in a user test, the test procedure, remote usability evaluation, usability testing tools, and evaluating mobile applications

    Exploratory Research Methods for the Extremely Mobile: Supporting Community Interaction Amongst Backpackers

    Get PDF
    Mobile communities of backpackers represent a challenging population to study because of frequent and long-duration of movement, distributed group structure, and adventuresome activities. Five types of mobile group studies are presented here, which address challenges posed by this context to existing methods. Methods used include: contextual interviews, site surveys, participatory activities, field trips, team ethnography, contextual questionnaires, and electronic diary methods. The structure of each method is described, reflected upon and recommendations are made for its effective use. Many existing mobile and CSCW methods have difficulties when applied to mobile groups, and many are not designed for exploratory research dealing with product conceptualization or requirements analysis. We propose that improvising with a diverse set of available methods is appropriate for many mobile research situations. It may also be advantageous to use multiple methods which explore different aspects of target user groups' behaviour from a variety of perspectives. Furthermore, piloting studies to test methods with new user groups or situations, and using in-situ methods is advisable

    Expanding the methodological repertoire of participatory research into homelessness: the utility of the mobile phone diary

    Get PDF
    Participatory research methodologies have expanded the opportunities for critical, emancipatory and democratic health and social work research. However, their practical application in research with vulnerable participants has historically been challenging due to ethical, practical and theoretical concerns. Individuals who are homeless are typically seen as ā€˜hard-to-reachā€™, transient, ā€˜hiddenā€™ and even chaotic participant populations. Unsurprisingly, examples of the use of innovative participatory research techniques with those groups have been relatively scarce. This paper aimed to address this gap by discussing the application of one such technique ā€“ the mobile phone diary in research with multiply disadvantaged homeless adults. Diary methods are situated within the qualitative research on health, illness and social marginality, and the enhanced capabilities of the mobile phone diary are highlighted. The author illustrates the application of the mobile phone diary in his participatory research on the everyday life narratives of adults with serious mental illness (SMI) who were homeless. The process of designing the mobile phone diary is detailed. Following this, participant testimonies of their use of the mobile phone diary are presented. They demonstrate the participatory and inclusive nature, as well as the cathartic and empowering potential, of this technique. The methodological contributions and challenges and the theoretical generativity of the mobile phone diary method are discussed. The mobile phone diary is a feasible approach for eliciting evocative, contextualised and nuanced accounts of the lived experience of homelessness, social isolation, coping and recovery
    • ā€¦
    corecore