People and Computers XII

People and Computers XII
Author: Harold Thimbleby
Publisher: Springer Science & Business Media
Total Pages: 419
Release: 2013-03-14
Genre: Computers
ISBN: 1447136012

Most organisations try to protect their systems from unauthorised access, usually through passwords. Considerable resources are spent designing secure authentication mechanisms, but the number of security breaches and problems is still increasing (DeAlvare, 1990; Gordon, 1995; Hitchings, 1995). Unauthorised access to systems, and resulting theft of information or misuse of the system, is usually due to hackers "cracking" user passwords, or obtaining them through social engineering. System security, unlike other fields of system development, has to date been regarded as an entirely technical issue - little research has been done on usability or human factors related to use of security mechanisms. Hitchings (1995) concludes that this narrow perspective has produced security mechanisms which are much less effective than they are generally thought to be. Davis & Price (1987) point out that, since security is designed, implemented, used and breached by people, human factors should be considered in the design of security mechanism. It seems that currently hackers pay more attention to human factors than security designers do. The technique of social engineering, for instanc- obtaining passwords by deception and persuasion- exploits users' lack of security awareness. Hitchings (1995) also suggests that organisational factors ought to be considered when assessing security systems. The aim of the study described in this paper was to identify usability and organisational factors which affect the use of passwords. The following section provides a brief overview of authentication systems along with usability and organisational issues which have been identified to date. 1.

People and Computers XIV — Usability or Else!

People and Computers XIV — Usability or Else!
Author: Sharon McDonald
Publisher: Springer Science & Business Media
Total Pages: 447
Release: 2012-12-06
Genre: Computers
ISBN: 144710515X

Currently we are at the beginnings of widespread wireless connectivity and ubiquitous computing. The Web is merging with a variety of technologies: cell phones, laptop computers, hand held organisers, information appliances, and GPS and other sensors. The capability for access anytime and anywhere is here. The increasing frequency of cell phone calls at inappropriate times testifies that people no longer can easily control access. Devices can determine where they are located and can make a range of information available to users as well as make users available to others or their devices. We have proposed a general technique that promises to assist in mediating access. It capitalises on advantages afforded by computation(Hollan & Stometta, 1992). We first described the negotiation technique in the context of problems involved in scheduling meetings and then showed that similar issues, which at first may seem unrelated but in fact have much in common, arise in other contexts. One such activity, gaining immediate access, is currently of growing importance because of expanding connectivity via wireless technology. Cell phones and related technologies make it possible to be constantly available for synchronous interaction. At times, this can be advantageous but the associated costs and benefits result in a complex tradeoff space for designers as well as users.

People and Computers XVI - Memorable Yet Invisible

People and Computers XVI - Memorable Yet Invisible
Author: Xristine Faulkner
Publisher: Springer Science & Business Media
Total Pages: 410
Release: 2012-12-06
Genre: Computers
ISBN: 1447101057

For the last 20 years the dominant form of user interface has been the Graphical User Interface (GUl) with direct manipulation. As software gets more complicated and more and more inexperienced users come into contact with computers, enticed by the World Wide Web and smaller mobile devices, new interface metaphors are required. The increasing complexity of software has introduced more options to the user. This seemingly increased control actually decreases control as the number of options and features available to them overwhelms the users and 'information overload' can occur (Lachman, 1997). Conversational anthropomorphic interfaces provide a possible alternative to the direct manipulation metaphor. The aim of this paper is to investigate users reactions and assumptions when interacting with anthropomorphic agents. Here we consider how the level of anthropomorphism exhibited by the character and the level of interaction affects these assumptions. We compared characters of different levels of anthropomorphic abstraction, from a very abstract character to a realistic yet not human character. As more software is released for general use with anthropomorphic interfaces there seems to be no consensus of what the characters should look like and what look is more suited for different applications. Some software and research opts for realistic looking characters (for example, Haptek Inc., see http://www.haptek.com). others opt for cartoon characters (Microsoft, 1999) others opt for floating heads (Dohi & Ishizuka, 1997; Takama & Ishizuka, 1998; Koda, 1996; Koda & Maes, 1996a; Koda & Maes, 1996b).

People and Computers XIII

People and Computers XIII
Author: Hilary Johnson
Publisher: Springer Science & Business Media
Total Pages: 341
Release: 2013-03-14
Genre: Computers
ISBN: 1447136055

The need for ensuring that usability measurement results can contribute to the ongoing development of a software product in a formative way is the main theme of this paper. It is recognized that acquiring, structuring, and analysing data about the actual progression of a product's development is a challenging task. Even more difficult, is the problem of making the results of any analysis of that data readily accessible to all the participants at regular intervals in the process. The paper presents an approach to supporting that process exemplified in SEDRES (Systems Engineering Data Representation and Exchange Standardization), a European Aerospace collaborative project on developing a data exchange capability for design tools. The main subject is the role of a software tool called NUD*IST (Non-numerical Unstructured Data Indexing Searching and Theorizing) (QSR, 1997), in providing support for structuring and analysing longitudinal data and for regular feedback to the project partners about the product under development. The paper begins with an overview of the context of use, a systems engineering project involving five major companies in the European Aerospace industry. SEDRES is a three year project which started in January 1996, co-funded by an ESPRIT grant from the European Commission. The project partners comprise Aerospatiale, Alenia, British Aerospace, Daimler-Benz Aerospace, Saab and Linkoping University (Sweden), the Australian Centre for Test & Evaluation (ACTE), and Loughborough University Telecommunications and Computer-Human Interaction (LUTCHI) Research Centre.

Human-computer Interaction

Human-computer Interaction
Author: Michitaka Hirose
Publisher: IOS Press
Total Pages: 1312
Release: 2001
Genre: Computers
ISBN: 9781586031886

This book covers the proceedings of INTERACT 2001 held in Tokyo, Japan, July 2001. The conference covers human-computer interaction and topics presented include: interaction design, usability, novel interface devices, computer supported co-operative works, visualization, and virtual reality. The papers presented in this book should appeal to students and professionals who wish to understand multimedia technologies and human-computer interaction.

Human-Computer Interaction

Human-Computer Interaction
Author: Andrew Sears
Publisher: CRC Press
Total Pages: 384
Release: 2009-03-02
Genre: Computers
ISBN: 1420088866

Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking resource, Human-Computer Interaction: Design Issues, Solutions, and Applications focuses on HCI from a pri

Comp-Computer Science-TB-12

Comp-Computer Science-TB-12
Author: Reeta Sahoo, Gagan Sahoo
Publisher: New Saraswati House India Pvt Ltd
Total Pages: 660
Release:
Genre: Computers
ISBN: 9353620279

Comp-Computer Science-TB-12

Task Analysis

Task Analysis
Author: John Annett
Publisher: CRC Press
Total Pages: 249
Release: 2000-03-01
Genre: Technology & Engineering
ISBN: 1420022989

Methods of collecting, classifying and interpreting data on human performance lie at the very root of ergonomics, and these methods are collectively know as "task analysis". They mirror both our current understanding of human performance and the design of systems which best serve the needs of their users. The concepts and techniques of task analysis have changed dramatically in recent years, and this collection serves to provide a summary of current research and advanced practice. It consists of eleven chapters written by distinguished practitioners in the field, ranging in scope from classical ergonomics to cognitive psychology, software engineering and systems design. This book is a production of a 1998 special issue of the journal Ergonomics , with a new introduction from the editors.

Internet and Wireless Security

Internet and Wireless Security
Author: Robert Temple
Publisher: IET
Total Pages: 303
Release: 2002-04-15
Genre: Computers
ISBN: 0852961979

As computer security experts with BTexact Technologies, UK, Temple and Renault broach not only technical aspects of the Internet's future covered by these 16 contributed chapters but also the pivotal issue of user trust. In the preface, a colleague of theirs contends that concerns about computer security are impeding wider adoption of electronic commerce by businesses and consumers. Given that people remain the weakest link in human-computer interactions, contributors expand upon the theme of trust via an "iTrust" integrated architecture program, public key cryptology infrastructures (for wired and wireless environments), biometrics, and other approaches to information assurance. The last chapter overviews the latest security management standard and its policy, technical, and commercial implications. Annotation copyrighted by Book News, Inc., Portland, OR

Engineering for Human-Computer Interaction

Engineering for Human-Computer Interaction
Author: Stéphane Chatty
Publisher: Springer
Total Pages: 378
Release: 2013-06-05
Genre: Computers
ISBN: 0387353496

The aim of IFIP Working Group 2.7 (13.4) for User Interface Engineering is to investigate the nature, concepts and construction of user interfaces for software systems. The group's scope is: • developing user interfaces based on knowledge of system and user behaviour; • developing frameworks for reasoning about interactive systems; and • developing engineering models for user interfaces. Every three years, the group holds a "working conference" on these issues. The conference mixes elements of a regular conference and a workshop. As in a regular conference, the papers describe relatively mature work and are thoroughly reviewed. As in a workshop, the audience is kept small, to enable in-depth discussions. The conference is held over 5-days (instead of the usual 3-days) to allow such discussions. Each paper is discussed after it is presented. A transcript of the discussion is found at the end of each paper in these proceedings, giving important insights about the paper. Each session was assigned a "notes taker", whose responsibility was to collect/transcribe the questions and answers during the session. After the conference, the original transcripts were distributed (via the Web) to the attendees and modifications that clarified the discussions were accepted.