516 research outputs found

    Enhancing users\u27 experiences with mobile app stores: What do users see? What should they see?

    Get PDF
    Using mobile applications is one of the daily habits for most smartphone users. In order to select applications, individuals need to explore the apps stores. Apps’ exploration is disturbed by the way of illustrating the applications’ information. This dissertation consists of three studies that aimed to: 1) Investigate the users’ experience with the apps’ stores; 2) Collect the users’ needs and requirements in order to have a better experience with the interface of apps’ stores; 3) Propose and evaluate a new interface design for the apps’ stores. Different types of data collection methods were administered while proceeding with the phases of this dissertation. The first study was an exploratory study, which administered an online survey, where we had102 respondents. The second study, aimed to collect the design requirements, and we interviewed 16 individuals. The third study was the interface evaluation, where we also had 35 participants. Our results showed multiple factors that affect users’ experience while discovering applications on the apps’ store. Our findings suggested that the current interface design of apps’ stores needs revisions to help users to be aware of apps’ emerging features and issues. Moreover, we found that visual cues that illustrate apps’ information would be more effective to help users perceive specific information about apps. Furthermore, visual indicators would enhance users’ knowledge regarding some of the apps’ concerns. At the end of this research, we evaluated a proposed interface design that integrates the previous design recommendations. The evaluation results illustrated positive outputs in terms of users’ satisfaction and task-completion rate. The findings indicated that participants were delighted to experience the new way of interaction with the interface of apps’ store. We anticipate that users’ experience and their awareness towards the apps issue would be improved if apps’ stores considered adopting the proposed design concept

    Spartan Daily October 31, 2011

    Get PDF
    Volume 137, Issue 34https://scholarworks.sjsu.edu/spartandaily/1088/thumbnail.jp

    Unilateral Invasions of Privacy

    Get PDF
    Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory of unilateral invasions of privacy rooted in the incentives of potential outside invaders. It first briefly describes the different kinds of information flows that can result in losses of privacy and the private costs and benefits to the participants in these information flows. It argues that in many cases the relevant costs and benefits are those of an outsider deciding whether certain information flows occur. These outside invaders are more likely to act when their own private costs and benefits make particular information flows worthwhile, regardless of the effects on information subjects or on social welfare. And potential privacy invaders are quite sensitive to changes in these costs and benefits, unlike information subjects, for whom transaction costs can overwhelm incentives to make information more or less private. The Article then turns to privacy regulation, arguing that this unilateral-invasion theory sheds light on how effective privacy regulations should be designed. Effective regulations are those that help match the costs and benefits faced by a potential privacy invader with the costs and benefits to society of a given information flow. Law can help do so by raising or lowering the costs or benefits of a privacy invasion, but only after taking account of other costs and benefits faced by the potential privacy invader

    “If You Build It, They Will Come”: Reverse Location Searches, Data Collection, and The Fourth Amendment

    Get PDF
    On January 6, 2021, the world looked on, stunned, as thousands of rioters stormed the U.S. Capitol on live television in support of then-President Donald Trump. In the days and weeks that followed, federal law enforcement scrambled to identify those involved in the attack, in what has become the largest criminal investigation in American history. Whereas even 20 years prior it would have been difficult to identify those involved, as of February 2023, more than 950 people have been identified and charged in relation to the January 6th Capitol attack. Many of these individuals were identified using a wide array of new technology, including automated license plate readers, complex facial recognition searches, and reverse location searches. The use of reverse location searches dates to at least 2016. Reverse location searches provide law enforcement the ability to reverse-engineer the location of people for the purposes of an investigation. This is accomplished with location data collected by third-party companies from their users’ electronic devices. Many electronic devices, such as cellphones, are equipped with GPS, which determines a device’s location using signals from satellites. Additional information can be used to pinpoint the location of a device through Wi-Fi, mobile networks, and certain device sensors. Google, for example, states that in order to collect the location data, it uses “GPS and other sensor data from your device,” your “IP address,” “[a]ctivity on Google services, such as your searches and places you label like home or work,” and “[i]nformation about things near your device, such as Wi-Fi access points, cell towers, and Bluetooth-enabled devices.” This Comment examines the two types of reverse location searches in detail, analyzing the constitutionality of each under these three questions: (1) is it a search under the Fourth Amendment? (2) can it meet the particularity and probable cause requirements? (3) does it fall into the category of general warrants prohibited by the Fourth Amendment? Ultimately, it argues that reverse location searches are constitutional, raising the question of whether existing Fourth Amendment doctrine is sufficient to guarantee the Amendment’s protections

    “If You Build It, They Will Come”: Reverse Location Searches, Data Collection, and The Fourth Amendment

    Get PDF
    On January 6, 2021, the world looked on, stunned, as thousands of rioters stormed the U.S. Capitol on live television in support of then-President Donald Trump. In the days and weeks that followed, federal law enforcement scrambled to identify those involved in the attack, in what has become the largest criminal investigation in American history. Whereas even 20 years prior it would have been difficult to identify those involved, as of February 2023, more than 950 people have been identified and charged in relation to the January 6th Capitol attack. Many of these individuals were identified using a wide array of new technology, including automated license plate readers, complex facial recognition searches, and reverse location searches. The use of reverse location searches dates to at least 2016. Reverse location searches provide law enforcement the ability to reverse-engineer the location of people for the purposes of an investigation. This is accomplished with location data collected by third-party companies from their users’ electronic devices. Many electronic devices, such as cellphones, are equipped with GPS, which determines a device’s location using signals from satellites. Additional information can be used to pinpoint the location of a device through Wi-Fi, mobile networks, and certain device sensors. Google, for example, states that in order to collect the location data, it uses “GPS and other sensor data from your device,” your “IP address,” “[a]ctivity on Google services, such as your searches and places you label like home or work,” and “[i]nformation about things near your device, such as Wi-Fi access points, cell towers, and Bluetooth-enabled devices.” This Comment examines the two types of reverse location searches in detail, analyzing the constitutionality of each under these three questions: (1) is it a search under the Fourth Amendment? (2) can it meet the particularity and probable cause requirements? (3) does it fall into the category of general warrants prohibited by the Fourth Amendment? Ultimately, it argues that reverse location searches are constitutional, raising the question of whether existing Fourth Amendment doctrine is sufficient to guarantee the Amendment’s protections

    Socio-Informatics

    Get PDF
    Contents Editorial Thematic Focus: Socio-Informatics Introduction to the Thematic Focus “Socio-Informatics” / Claudia Müller Digitalisation in Small German Metal-Working Companies. Appropriation of Technology in a “Traditional” Industrial Domain / Bernhard Nett, Jennifer Bönsch Travelling by Taxi Brousse in Madagascar: An Investigation into Practices of Overland Transportation / Volker Wulf, Kaoru Misaki, Dave Randall, and Markus Rohde Mobile and Interactive Media in the Store? Design Case Study on Bluetooth Beacon Concepts for Food Retail / Christian Reuter, Inken Leopold Facebook and the Mass Media in Tunisia / Konstantin Aal, Marén Schorch, Esma Ben Hadj Elkilani, Volker Wulf Book Review Symposium Charles Goodwin Charles Goodwin’s Co-Operative Action: The Idea and the Argument / Erhard Schüttpelz, Christian Meyer Multi-Modal Interaction and Tool-Making: Goodwin’s Intuition / Christian Meyer, Erhard Schüttpelz Co-Operation is a Feature of Sociality, not an Attribute of People : “We inhabit each other’s actions.” (Goodwin, cover) / Jutta Wiesemann, Klaus Amann The Making of the World in Co-Operative Action. From Sentence Construction to Cultural Evolution / Jürgen Streeck On Goodwin and his Co-Operative Action / Jörg R. Bergman

    Challenges Faced by Persons with Disabilities Using Self-Service Technologies

    Get PDF
    Foreseeable game changing solutions to SSTs will allow for better universal access by better implementing features that are easy and intuitive to use from the inception. Additional robotic advancements will allow for better and easier delivery of goods for consumers. Improvements to artificial intelligence will allow for better communication through natural language and alternative forms of communication. Furthermore, artificial intelligence will aid consumers at SSTs by remembering the consumers preferences and needs. With all foreseeable game changing solutions people with disabilities will be consulted when new and improved SSTs are being developed allowing for the SST to maximize its potential

    Seamless Authentication for Ubiquitous Devices

    Get PDF
    User authentication is an integral part of our lives; we authenticate ourselves to personal computers and a variety of other things several times a day. Authentication is burdensome. When we wish to access to a computer or a resource, it is an additional task that we need to perform~-- an interruption in our workflow. In this dissertation, we study people\u27s authentication behavior and attempt to make authentication to desktops and smartphones less burdensome for users. First, we present the findings of a user study we conducted to understand people\u27s authentication behavior: things they authenticate to, how and when they authenticate, authentication errors they encounter and why, and their opinions about authentication. In our study, participants performed about 39 authentications per day on average; the majority of these authentications were to personal computers (desktop, laptop, smartphone, tablet) and with passwords, but the number of authentications to other things (e.g., car, door) was not insignificant. We saw a high failure rate for desktop and laptop authentication among our participants, affirming the need for a more usable authentication method. Overall, we found that authentication was a noticeable part of all our participants\u27 lives and burdensome for many participants, but they accepted it as cost of security, devising their own ways to cope with it. Second, we propose a new approach to authentication, called bilateral authentication, that leverages wrist-wearable technology to enable seamless authentication for things that people use with their hands, while wearing a smart wristband. In bilateral authentication two entities (e.g., user\u27s wristband and the user\u27s phone) share their knowledge (e.g., about user\u27s interaction with the phone) to verify the user\u27s identity. Using this approach, we developed a seamless authentication method for desktops and smartphones. Our authentication method offers quick and effortless authentication, continuous user verification while the desktop (or smartphone) is in use, and automatic deauthentication after use. We evaluated our authentication method through four in-lab user studies, evaluating the method\u27s usability and security from the system and the user\u27s perspective. Based on the evaluation, our authentication method shows promise for reducing users\u27 authentication burden for desktops and smartphones

    Protecting Children Online?

    Get PDF
    This book investigates regulatory and social pressures that social media companies face in the aftermath of high profile cyberbullying incidents. The author’s research evaluates the policies companies develop to protect themselves and users. This includes interviews with NGO and social media company reps in the US and the EU. She triangulates these findings against news, policy reports, evaluations and interviews with e-safety experts. This book raises questions about the legitimacy of expecting companies to balance the tension between free speech and child protection without publicly revealing their decision-making processes. In an environment where e-safety is part of the corporate business model, this book unveils the process through which established social media companies receive less government scrutiny than start-ups. The importance of this research for law and policy argues for an OA edition to ensure the work is widely and globally accessible to scholars and decision makers

    Psychology, Learning, Technology

    Get PDF
    This open access book constitutes the refereed proceedings of 1st International Workshop on Psychology, Learning, Technology, PLT 2022, Foggia, Italy, during January 2022. The 8 full papers presented here were carefully reviewed and selected from 23 submissions. In addition, one invited paper is also included. Psychology, Learning, ad Technology Conference (PLT2022) aims to explore learning paths that incorporate digital technologies in innovative and transformative ways and the improvement of the psychological and relational life. The conference includes topics about the methodology of application of the ICT tools in psychology and education: from blended learning to the application of artificial intelligence in education; from the teaching, learning, and assessment strategies and practices to the new frontiers on Human-Computer Interaction
    • …
    corecore