119 research outputs found

    Tailoring persuasive health games to gamer type

    Get PDF
    Persuasive games are an effective approach for motivating health behavior, and recent years have seen an increase in games designed for changing human behaviors or attitudes. However, these games are limited in two major ways: first, they are not based on theories of what motivates healthy behavior change. This makes it difficult to evaluate why a persuasive approach works. Second, most persuasive games treat players as a monolithic group. As an attempt to resolve these weaknesses, we conducted a large-scale survey of 642 gamers' eating habits and their associated determinants of healthy behavior to understand how health behavior relates to gamer type. We developed seven different models of healthy eating behavior for the gamer types identified by BrainHex. We then explored the differences between the models and created two approaches for effective persuasive game design based on our results. The first is a one-size-fits-all approach that will motivate the majority of the population, while not demotivating any players. The second is a personalized approach that will best motivate a particular type of gamer. Finally, to make our approaches actionable in persuasive game design, we map common game mechanics to the determinants of healthy behavior

    A coalition formation mechanism based on inter-agent trust relationships

    Get PDF

    Mapping Wiki User Contribution Types to Motivations for Participation: A Case Study

    Get PDF
    Different classifications of Wiki editor have been proposed. However, so far there has been no mapping between user classes based on their contributions and their motivations, which can be useful to design persuasive functions in wiki systems to increase participation. In this study, we attempt to bridge this gap by developing a customized MediaWiki system, used by 10 senior undergraduate students for their coursework. The participants were classified into three editors' classes and mapped to their motivation factors, using the system data and the results from the exit questionnaire

    Factors Influencing User’s Attitude to Secondary Information Sharing and Usage

    Get PDF
    The increasing availability of enormous data about users online, along with availability of sophisticated tools and technology to store, aggregate, and analyze data for secondary use has raised concerns about how to balance the opportunity for secondary use of data with the need to protect the user privacy that may result from harmful use. To develop a privacy protection mechanism that is useful and meets the expectations and needs of the user, it is important to understand user’s attitude to privacy and secondary information sharing and usage of his/her data. While several studies have investigated factors influencing user’s attitude to privacy in primary data collection context, none of the existing studies have provided an understanding of user perception and attitude to privacy in secondary context. To fill this gap, this work has identified five factors that are important in a secondary usage context and carried out a study on their influence on user’s perception with respect to how their data is shared for secondary use. The main contribution of this paper is an understanding of factors influencing user decisions about privacy in secondary context, which can assist both technology designers and policy makers in the development of appropriate privacy protection that meets the needs and expectations of the user.</p

    Gender Difference in the Credibility Perception of Mobile Websites: A Mixed Method Approach

    Get PDF
    SIGCHI ACM Special Interest Group on Computer-Human Interaction SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and WebTo persuade people to buy a product or service online, they must be visually convinced and attracted to use the sales website. Thus, there is need to understand how different user groups perceive various designs of websites for better adaptation. A lot of research has shown that users' judgment of the credibility of a website is critical to its success. However, in the mobile domain, little has been done empirically to 1) investigate users' credibility perception of a website; and 2) how it changes as the user interface (UI) design is systematically altered. This paper bridges this gap by carrying out sentiment and statistical analyses of users' perceptions of four systematically modified mobile websites among 285 subjects from North America, Africa and Asia. The results show that mobile website design affects the perception of its credibility, with 1) females being more critical and sensitive to UI changes than males; and 2) the grid-layout website design preferred to the list-layout website design by both genders. The study contributes to knowledge in three ways. First, it provides a concise model for understanding users' UI perceptions, expectations and gender differences. Second, it presents important findings that will enable a gender-based mobile website adaptation. Third, it provides a set of empirically backed guidelines for mobile web design

    Student Certificate Sharing System Using Blockchain and NFTs

    Full text link
    In this paper, we propose a certificate sharing system based on blockchain that gives students authority and control over their academic certificates. Our strategy involves developing blockchain-based NFT certifications that can be shared with institutions or employers using blockchain addresses. Students may access the data created by each individual institute in a single platform, filter the view of the relevant courses according to their requirements, and mint their certificate metadata as NFTs. This method provides accountability of access, comprehensive records that are permanently maintained in IPFS, and verifiable provenance for creating, distributing, and accessing certificates. It also makes it possible to share certificates more safely and efficiently. By incorporating trust factors through data provenance, our system provides a countermeasure against issues such as fake and duplicate certificates. It addresses the challenge of the traditional certificate verification processes, which are lengthy manual process. With this system, students can manage and validate their academic credentials from multiple institutions in one location while ensuring authenticity and confidentiality using digital signatures and hashing for data protection against unauthorized access. Overall, our suggested system ensures data safety, accountability, and confidentiality while offering a novel approach to certificate distribution
    corecore