85 research outputs found

    Distributing Participation in Design: Addressing Challenges of a Global Pandemic

    Get PDF
    Participatory Design (PD) – whose inclusive benefits are broadly recognised in design – can be very challenging, especially when involving children. The recent COVID-19 pandemic has given rise to further barriers to PD with such groups. One key barrier is the advent of social distancing and government-imposed social restrictions due to the additional risks posed for e.g. children and families vulnerable to COVID-19. This disrupts traditional in-person PD (which involves close socio-emotional and often physical collaboration between participants and researchers). However, alongside such barriers, we have identified opportunities for new and augmented approaches to PD across distributed geographies, backgrounds, ages and abilities. We examine Distributed Participatory Design (DPD) as a solution for overcoming these new barriers, during and after COVID-19. We offer new ways to think about DPD, and unpick some of its ambiguities. We do this through an examination of the results from an online Interaction Design and Children (IDC) 2020 workshop. The workshop included 24 researchers with experience in PD, in a range of forms, in the context of children. Initially designed to take place in-person and to include a design session with children in a school in London, the workshop was adjusted to an online format in response to the COVID-19 pandemic. Despite the adverse circumstances, we discovered that the unexpected change of the workshop style from in-person to online was an opportunity and an impetus for us to address the new PD challenges of the global pandemic. In this article we contribute seven themes which were revealed during our IDC workshop, providing guidance on important areas for consideration when planning and conducting PD in the context of a global pandemic. With a focus on the term ‘distributed’, we offer insights on how DPD can be applied and explored in these circumstances with child participants. We conclude with a number of lessons learned, highlighting the opportunities and challenges DPD offers to enable continued co-design during a global pandemic. In particular, DPD provides greater access for some populations to be involved in PD, but technical and social challenges must be addressed

    Child-Computer Interaction SIG: Designing for Refugee Children

    Get PDF
    The global refugee crisis is a significant current challenge affecting millions of children. The process of refugee migration comes with major immediate as well as long-term risks to children’s physical and mental health, education, and prospects. Despite the multiple dangers and challenges during migration, most refugee families have access to and make use of interactive technologies, prior to, during, and after migration. This SIG meeting is an opportunity to discuss novel potential roles for technologies to alleviate some of the challenges faced by child refugees

    Pushing the Boundaries of Participatory Design with Children with Special Needs

    Get PDF
    Despite its inherent challenges, participatory design (PD) has unique benefits when designing technology for children, especially children with special needs. Researchers have developed a multitude of PD approaches to accommodate specific populations. However, a lack of understanding of the appropriateness of existing approaches across contexts presents a challenge for PD researchers. This workshop will provide an opportunity for PD researchers to exchange and reflect on their experiences of designing with children with special needs. We aim to identify, synthesize and collate PD best practices across contexts and participant groups

    The NECST Program - Networking and Engaging in Computer Science and Information Technology Program

    Get PDF
    In this paper, we describe the NECST Program and its innovative mentorship structure for transitioning graduate students in computer science whose undergraduate experiences may be in other disciplines. NECST employs several activities that provide the additional scaffolding to support students as they make this transition. While we believe these activities may be suited for other situations, the program helps address the unique challenges northern New Jersey faces with relation to graduate studies in computing fields

    Child-Computer Interaction, Ubiquitous Technologies, and Big Data

    Get PDF
    The children\u27s technology landscape is changing quickly. The ubiquity of interactive technologies means children can access them just about anytime, anywhere. At the same time, these technologies constantly collect data from and about children, bringing them into the age of big data, voluntarily or not. These developments have the potential to significantly change children\u27s relationship to technology and the long-term impact of technology use. To discuss these changes, the child-computer-interaction community held a special interest group (SIG) meeting during the CHI 2018 conference

    Investigating the Social and Temporal Aspects of Children’s Physical Activity Games

    Get PDF
    There are a variety of fitness technologies such as activity trackers, exergames and mobile applications available to promote physical activity. Based on our previous research, we found that children prefer having social interaction, a narrative and flexibility while interacting with such technologies. Other research has shown that persuasive displays encouraged adults towards physical activity. In this research, we present the initial results from a user study conducted on 16 children (ages 6-11) who used the Kidfit suite, a collection of mobile applications that combine and utilize the elements found from previous research to promote activity in children

    Authentication Method for Kids

    Get PDF
    Online applications are responsible for storing people’s important and personal information. A common way to keep this safe is the use of an authentication mechanism like a username and password. Children upload their information and use authentication mechanisms but they have a harder time creating and remembering their passwords compared to adults, leading to weak passwords that are vulnerable to malicious attacks. Alphanumeric passwords are the most common security method but it has been shown that children are better at remembering graphical information (images) compared to texts and numbers. KidsPic is a way to facilitate the creation of passwords for children between the ages of 6 to 11 years for them to use on online applications, as well as improve on their creativity. In my poster, I will present an adaptation of KidsPic, along with an analysis of the strengths and weaknesses of this new approach

    Transitioning Between Audience and Performer: Co-Designing Interactive Music Performances with Children

    Full text link
    Live interactions have the potential to meaningfully engage audiences during musical performances, and modern technologies promise unique ways to facilitate these interactions. This work presents findings from three co-design sessions with children that investigated how audiences might want to interact with live music performances, including design considerations and opportunities. Findings from these sessions also formed a Spectrum of Audience Interactivity in live musical performances, outlining ways to encourage interactivity in music performances from the child perspective

    “My Name is My Password:” Understanding Children’s Authentication Practices

    Get PDF
    Children continue to use technology at an increasing rate, more and more of which require authentication via usernames and passwords.We seek to understand how children ages 5-11 years old create and use their credentials. We investigate children’s username and password understanding and practices from the perspective of both children and adults within the context of three security categories: credential composition (e.g. length of password), performance (e.g. time to enter), and credential mechanisms (e.g; a pattern or characters). We conducted a semi-structured interview with 22 children and an online survey with 33 adult participants (parents and teachers) to determine their practices and involvement in facilitating authentication for their children. Our study illustrates how children have a limited understanding of authentication, and that there are differences between children’s and adult’s understanding of good authentication and security practices, and what they actually do

    Investigating Query Formulation Assistance for Children

    Get PDF
    Popular tools used to search for online resources are tuned to satisfy a broad category of users—primarily adults. Because children have specific needs, these tools may not always be successful in offering the right level of support in their quest for information. While search tools often provide query assistance, children still face many difficulties expressing their information needs in the form of a query. In this paper, we share results from our ongoing research work focused on understanding children\u27s interactions with query suggestions and their preferences with respect to suggestions offered by a general-purpose strategy versus a counterpart designed exclusively for children. Our goal is to inform researchers and developers about when it is necessary to turn to technologies tailored exclusively for children and to further outline needs that should be addressed when it comes to designing query-formulation-related technology for children
    corecore