57 research outputs found

    "Stuff goes into the computer and doesn't come out": a cross-tool study of personal information management

    Get PDF
    This paper reports a study of Personal Information Management (PIM), which advances research in two ways: (1) rather than focusing on one tool, we collected cross-tool data relating to file, email and web bookmark usage for each participant, and (2) we collected longitudinal data for a subset of the participants. We found that individuals employ a rich variety of strategies both within and across PIM tools, and we present new strategy classifications that reflect this behaviour. We discuss synergies and differences between tools that may be useful in guiding the design of tool integration. Our longitudinal data provides insight into how PIM behaviour evolves over time, and suggests how the supporting nature of PIM discourages reflection by users on their strategies. We discuss how the promotion of some reflection by tools and organizations may benefit users

    The mechanics of trust: a framework for research and design

    Get PDF
    With an increasing number of technologies supporting transactions over distance and replacing traditional forms of interaction, designing for trust in mediated interactions has become a key concern for researchers in human computer interaction (HCI). While much of this research focuses on increasing users’ trust, we present a framework that shifts the perspective towards factors that support trustworthy behavior. In a second step, we analyze how the presence of these factors can be signalled. We argue that it is essential to take a systemic perspective for enabling well-placed trust and trustworthy behavior in the long term. For our analysis we draw on relevant research from sociology, economics, and psychology, as well as HCI. We identify contextual properties (motivation based on temporal, social, and institutional embeddedness) and the actor's intrinsic properties (ability, and motivation based on internalized norms and benevolence) that form the basis of trustworthy behavior. Our analysis provides a frame of reference for the design of studies on trust in technology-mediated interactions, as well as a guide for identifying trust requirements in design processes. We demonstrate the application of the framework in three scenarios: call centre interactions, B2C e-commerce, and voice-enabled on-line gaming

    Calculated and measured Auger lineshapes in clean Si(100)2×1, SiOx and Si-NO

    Get PDF
    The measurements were performed on the clean 2*1 reconstructed Si(100) surface and this surface exposed to molecular oxygen (O2) or nitric oxide (NO) at room temperature. The data were corrected for electron loss and spectrometer distortions using the authors' newly developed deconvolution method. This method which uses global approximation and spline functions can overcome several difficulties with respect to deconvolution and allows them to derive high-quality auger lineshapes from the SiL2.3 VV Auger electron spectra. The authors experimentally obtained Auger lineshapes were compared with theoretical lineshapes utilising quantum chemical cluster calculations. They used this type of calculation for the interpretation of the Auger lineshape in the actual p-like and s-like partial local density of states for different types of silicon atom. The observed intensities of the major features are in reasonable agreement with the authors' calculations

    The influence of the (2 × 1) reconstruction of the Si(1 0 0) surface on the Si---L2,3 VV Auger lineshape

    Get PDF
    The extreme surface sensitiveness of the Si---L2,3 VV Auger process and its ability to probe the atomic electron distribution in the direct neighbourhood of the L2,3-core-hold makes this electron spectroscopic technique a candidate for investigations of the local changes in the electron distribution due to surface reconstruction. In this paper we show, explicitly, the influence of the (2 × 1) reconstruction of the Si(1 0 0) surface on the Si---L2,3 VV Auger lineshape. Furthermore, the calculated Auger lineshape will be compared with an experimentally obtained line profile

    Transition density of states (TDOS) of the Si(100)2 × 1 surface derived from the L2,3VV Auger lineshape compared with cluster calculations

    Get PDF
    The termination of a silicon crystal along the (100) orientation resulting in a 2 × 1 reconstructed surface induces relatively large variations in the local density of states (LDOS) of the different types of surface atoms, such as the up and down dimer atom and the backbond atom. Auger electron spectroscopy (AES) is able to probe the LDOS of the silicon atom in which the L2,3 core hole has been created and is therefore a candidate to analyze the LDOS of the surface atoms. A detailed analysis of the SiL2,3VV Auger electron spectrum allows us to determine a high quality transition density of state (TDOS) of the Si(100)2 × 1 reconstructed surface. The resolved peaks in the TDOS were compared with previous AES, UPS and EELS measurements reported by other investigators. Quantum chemical cluster calculations were used for the interpretation of the TDOS in the actual p-like and s-like partial local density of states for different types of silicon atoms. These quantum chemical cluster calculations of the partial LDOS localized at atoms of the Si(100)2 × 1 surface were found to be in agreement with other types of calculations. Comparing the experimental and the calculated DOS we were able to distinguish several new peaks in the TDOS obtained with AES and to discriminate features in the experimentally obtained TDOS into local electron distributions localized at different surface atoms

    Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

    Get PDF
    One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the selection of a perceivably secure pattern. We first define a suitable metric to measure pattern strength, taking into account the constraints imposed by the Pattern-Lock mechanism's design. We then implement an app via which we conduct a survey for Android users, retaining demographic information of responders and their perceptions on what constitutes a pattern complex enough to be secure. Subsequently, we display a pattern strength meter to the participant and investigate whether this additional prompt influences the user to change their pattern to a more effective and complex one. We also investigate potential correlations between our findings and results of a previous pilot study in order to detect any significant biases on setting a Pattern-Lock. © 2014 Springer International Publishing

    Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method

    Get PDF
    One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the selection of a perceivably secure pattern. We first define a suitable metric to measure pattern strength, taking into account the constraints imposed by the Pattern-Lock mechanism's design. We then implement an app via which we conduct a survey for Android users, retaining demographic information of responders and their perceptions on what constitutes a pattern complex enough to be secure. Subsequently, we display a pattern strength meter to the participant and investigate whether this additional prompt influences the user to change their pattern to a more effective and complex one. We also investigate potential correlations between our findings and results of a previous pilot study in order to detect any significant biases on setting a Pattern-Lock. © 2014 Springer International Publishing

    Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors

    Get PDF
    With the rapid growth and spread of Internet-based social support systems, the impact that these systems can make to society – be it good or bad – has become more significant and can make a real difference to people’s lives. As such, various aspects of these systems need to be carefully investigated and analysed, including their security/privacy issues. In this paper, we present our work in designing and implementing various technological features that can be used to assist domestic violence survivors in obtaining help without leaving traces which might lead to further violence from their abuser. This case study serves as the core of our paper, in which we outline our approach, various de- sign considerations – including difficulties in keeping browsing history private, our currently implemented solutions (single use URL, targeted history sanitita- tion agent, and secret graphical gateway), as well as novel ideas for future work (including location-based service advertising and deployment in the wild)
    • …
    corecore