52 research outputs found

    Specification of Complex Logical Expressions for Task Automation: An EUD Approach

    Get PDF
    The growing availability of smart objects is stimulating researchers in investigating the IoT phenomenon from different perspectives. In the HCI area, and in particular from the EUD perspective, one prominent goal is to enable nontechnical users to be directly involved in configuring smart object behaviour. With this respect, this paper discusses three visual composition techniques to specify logical expressions in Event-Condition-Action rules used for synchronizing the behavior of smart objects

    A Human-centric AI-driven Framework for Exploring Large and Complex Datasets

    Get PDF
    Human-Centered Artificial Intelligence (HCAI) is a new frontier of research at the intersection between HCI and AI. It fosters an innovative vision of human-centred intelligent systems, which are systems that take advantage of computer features, such as powerful algorithms, big data management, advanced sensors and that are useful and usable for people, providing high levels of automation and enabling high levels of human control. This position paper presents our ongoing research aiming to extend the HCAI framework for better supporting designers in creating AI-based systems

    My IoT Puzzle: Debugging IF-THEN Rules Through the Jigsaw Metaphor

    Get PDF
    End users can nowadays define applications in the format of IF-THEN rules to personalize their IoT devices and online services. Along with the possibility to compose such applications, however, comes the need to debug them, e.g., to avoid unpredictable and dangerous behaviors. In this context, different questions are still unexplored: which visual languages are more appropriate for debugging IF-THEN rules? Which information do end users need to understand, identify, and correct errors? To answer these questions, we first conducted a literature analysis by reviewing previous works on end-user debugging, with the aim of extracting design guidelines. Then, we developed My IoT Puzzle, a tool to compose and debug IF-THEN rules based on the Jigsaw metaphor. My IoT Puzzle interactively assists users in the debugging process with different real-time feedback, and it allows the resolution of conflicts by providing textual and graphical explanations. An exploratory study with 6 participants preliminary confirms the effectiveness of our approach, showing that the usage of the Jigsaw metaphor, along with real-time feedback and explanations, helps users understand and fix conflicts among IF-THEN rules

    A tangible-programming technology supporting end-user development of smart-environments

    No full text
    In recent years, smart objects are increasingly pervading the environments we live in. For HCI researchers, an important challenge is how non-technical users can establish the behavior of such devices. This poster presents a new technology implementing a tangible-programming paradigm, which allows non-programmers to synchronize the behavior of ecologies of smart objects, thus determining the creation and customization of smart environments

    Privacy Design Strategies and the GDPR: A Systematic Literature Review

    No full text
    Article 25 of the GDPR states that data collection, processing and management measures should be implemented following tṇhe privacy by design and privacy by default paradigms. This paper presents a systematic literature review to identify useful guidelines to support the development of GDPR-compliant software. Selected papers are categorized under 8 different data-oriented and process-oriented strategies and their contributions are reported. Future activities will highlight the HCI community’s attitude towards these new technical and organizational approaches in order to bridge the identified gaps and shortcomings

    Metamorphic data sources: A user-centric paradigm to consume linked data in interactive workspaces

    Get PDF
    In the last years, the debate about the success or failure of Linked Data (LD) has been growing. Despite the ever-increasing number of available ontologies and LD datasets, there is still a limited number of applications to let people benefit from using this huge amount of data. Some evident problems relate to the limited opportunities offered to the end users, i.e., people without skills in computer programming, to access, navigate and visualize LD. Tools supporting such tasks typically do not consider the end users’ needs; even when they provide abstraction mechanisms to avoid programming, they do not properly hide the complexity of getting oriented into the plethora of available resources. Thus, they end up to be inadequate to real daily scenarios. In this paper, we propose an approach that enables end users to create visually entry points, which we call Metamorphic Data-Sources (MDSs), to query and visualize the LD without requiring any prior knowledge of semantic Web or visualization technologies. Through the MDS visual paradigm, end users can tailor ad-hoc data sources to retrieve information on topics they are interested in. The MDS creation process is also driven by a quality model that further helps users select LD elements potentially free of data quality problems. The paper also reports on the results of a user study that we conducted to assess the validity of the MDS paradigm with respect to the user needs

    Making Warning Messages Personal: A Big 5 Personality Trait Persuasion Approach

    No full text
    Several mitigation strategies in form of warning messages against phishing attacks have continued to fail largely due to user negligence. Thus, it is important for researchers to focus not only on the accuracy of the provided recommendations but also on other factors that influence the acceptance of recommendations and the extent to which these recommendations are convincing or persuasive. In this paper, we present our ongoing approach that leverages on the Big 5 Personality trait model and users digital traces harvested from their social networks, thereafter, transformed into a personalized warning message. We argue that stimulating users through personal recommendations evokes an understanding of the implications of their actions or inaction

    Scenes extraction from telementored surgery videos

    No full text
    The huge amount of videos, available for various purposes, makes video editing software very important and popular among people. One of the uses of video in medicine is to store surgical operations for educational or legal purposes. In particular, in telemedicine, the exchange of audio and video plays a very important role. In most cases, surgeons are inexpert in video editing; moreover, the user interface of such software tools is often very complex. This paper presents a tool to extract important scenes from surgery videos. The goal is to enable surgeons to easily and quickly extract scenes of interest
    • …
    corecore