Search results for "Human-computer interaction"

showing 10 items of 605 documents

“Facebocrastination”? Predictors of using Facebook for procrastination and its effects on students’ well-being

2016

Procrastinating with popular online media such as Facebook has been suggested to impair users well-being, particularly among students. Building on recent procrastination, self-control, and communication literature, we conducted two studies (total N=699) that examined the predictors of procrastination with Facebook as well as its effects on students academic and overall well-being. Results from both studies consistently indicate that low trait self-control, habitual Facebook checking, and high enjoyment of Facebook use predict almost 40 percent of the variance of using Facebook for procrastination. Moreover, results from Study 2 underline that using Facebook for the irrational delay of impor…

Software_OPERATINGSYSTEMSbusiness.industrymedia_common.quotation_subject05 social sciencesProcrastination050801 communication & media studies050109 social psychologyDysfunctional familySelf-controlDigital mediaHuman-Computer Interaction0508 media and communicationsArts and Humanities (miscellaneous)Media useWell-beingTrait0501 psychology and cognitive sciencesSocial mediaInformationSystems_MISCELLANEOUSbusinessPsychologySocial psychologyGeneral Psychologymedia_commonComputers in Human Behavior
researchProduct

Too many passwords? How understanding our memory can increase password memorability

2018

Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …

Software_OPERATINGSYSTEMSinformation securityComputer scienceInternet privacymetamemoryHuman Factors and ErgonomicsContext (language use)02 engineering and technologyEducationPassword strength020204 information systems0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencestietoturvaPassword psychology050107 human factorsmuisti (kognitio)human memoryta113PasswordAuthenticationmemorabilityCognitive passwordbusiness.industry05 social sciencesGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securitytodentaminenHardware and ArchitectureauthenticationbusinessSoftwareInternational Journal of Human-Computer Studies
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct

Book Review: Taking ICT to Every Indian Village: Opportunities and Challenges

2006

Atanu Garai & B. Shadrach (2006). Taking ICT to every Indian village: Opportunities and challenges. New Delhi, India: One World South Asia; 133 pages. Information and communication technology (ICT) activities can easily be seen as a sort of technocracy, which is not surprising because the focus of attention is often dominated by issues such as the bandwidth, new devices, or the fierce competition between technological companies and their innovative products. In short, the discussion often is restricted to Habermasian technical interest of knowledge. At the end of the day, however, everything in ICT is about people and, more specifically, about the emancipatory application of knowledge for a…

South asiaSocial Psychologylcsh:T58.5-58.64business.industrylcsh:Information technologyCommunicationMedia studiesTechnocracyPublic relationsHuman-Computer InteractionCompetition (economics)Information and Communications TechnologyPolitical scienceNew delhibusinessHuman Technology
researchProduct

The affine equivariant sign covariance matrix: asymptotic behavior and efficiencies

2003

We consider the affine equivariant sign covariance matrix (SCM) introduced by Visuri et al. (J. Statist. Plann. Inference 91 (2000) 557). The population SCM is shown to be proportional to the inverse of the regular covariance matrix. The eigenvectors and standardized eigenvalues of the covariance, matrix can thus be derived from the SCM. We also construct an estimate of the covariance and correlation matrix based on the SCM. The influence functions and limiting distributions of the SCM and its eigenvectors and eigenvalues are found. Limiting efficiencies are given in multivariate normal and t-distribution cases. The estimates are highly efficient in the multivariate normal case and perform …

Statistics and ProbabilityCovariance functionaffine equivarianceinfluence functionMultivariate normal distributionrobustnessComputer Science::Human-Computer InteractionEfficiencyestimatorsEstimation of covariance matricesScatter matrixStatisticsAffine equivarianceApplied mathematicsCMA-ESMultivariate signCovariance and correlation matricesRobustnessmultivariate medianMathematicsprincipal componentsInfluence functionNumerical AnalysisMultivariate medianCovariance matrixcovariance and correlation matricesdiscriminant-analysisCovarianceComputer Science::Otherdispersion matricesefficiencyLaw of total covariancemultivariate locationtestsStatistics Probability and Uncertaintyeigenvectors and eigenvaluesEigenvectors and eigenvaluesmultivariate signJournal of Multivariate Analysis
researchProduct

Interactive Effects of Explicit Emergent Structure: A Major Challenge for Cognitive Computational Modeling

2015

International audience; David Marr's (1982) three-level analysis of computational cognition argues for three distinct levels of cognitive information processingnamely, the computational, representational, and implementational levels. But Marr's levels areand were meant to bedescriptive, rather than interactive and dynamic. For this reason, we suggest that, had Marr been writing today, he might well have gone even farther in his analysis, including the emergence of structurein particular, explicit structure at the conceptual levelfrom lower levels, and the effect of explicit emergent structures on the level (or levels) that gave rise to them. The message is that today's cognitive scientists …

Structure (mathematical logic)Cognitive scienceFeed backLinguistics and LanguageInteractive emergenceComputer scienceActive symbolsConcept FormationCognitive NeuroscienceComputational cognitionExperimental and Cognitive PsychologyCognitionEmergenceConnectionist modelsHuman-Computer InteractionCognitionAnalogy-makingInteractive effectsArtificial Intelligence[ SDV.NEU ] Life Sciences [q-bio]/Neurons and Cognition [q-bio.NC]HumansLearning[SDV.NEU]Life Sciences [q-bio]/Neurons and Cognition [q-bio.NC]Neural Networks Computer
researchProduct

Autonomic behaviors in an Ambient Intelligence system

2014

Ambient Intelligence (AmI) systems are constantly evolving and becoming ever more complex, so it is increasingly difficult to design and develop them successfully. Moreover, because of the complexity of an AmI system as a whole, it is not always easy for developers to predict its behavior in the event of unforeseen circumstances. A possible solution to this problem might lie in delegating certain decisions to the machines themselves, making them more autonomous and able to self-configure and self-manage, in line with the paradigm of Autonomic Computing. In this regard, many researchers have emphasized the importance of adaptability in building agents that are suitable to operate in real-wor…

Structure (mathematical logic)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringAmbient intelligenceExploitbusiness.industryEvent (computing)media_common.quotation_subjectOntology (information science)AdaptabilityAutonomic computingHuman-Computer InteractionRisk analysis (engineering)Artificial IntelligenceArtificial intelligenceArchitecturebusinessmedia_common
researchProduct

Emotional Dimensions of User Experience ? A User Psychological Analysis

2014

User psychology is a human–technology interaction research approach that uses psychological concepts, theories, and findings to structure problems of human–technology interaction. As the notion of user experience has become central in human–technology interaction research and in product development, it is necessary to investigate the user psychology of user experience. This analysis of emotional human–technology interaction is based on the psychological theory of basic emotions. Three studies, two laboratory experiments, and one field study are used to investigate the basic emotions and the emotional mind involved in user experience. The first and second experiments study the measurement of…

Structure (mathematical logic)business.industryField (Bourdieu)Emotion classificationHuman Factors and ErgonomicsPsychological analysisComputer Science ApplicationsHuman-Computer InteractionUser experience designHuman–computer interactionPsychological TheoryNew product developmentPsychologybusinessta515Cognitive psychologyInternational Journal of Human-Computer Interaction
researchProduct

Methods for defining user groups and user-adjusted information structures

1999

A common problem in the design of information systems is how to structure the information in a way that is most useful to different groups of users. This paper describes some statistical methods for revealing the structure inherent in empirical data elicited from users. It is illustrated by the application of these methods to the design of some web pages giving information about the Universitat de Valencia. Three potential user groups were identified, administrative staff, teaching staff and students. The first analysis demonstrated that users within these three groups assign relatively homogeneous structures, but that the structures assigned by the three groups are not the same, and also, …

Structure (mathematical logic)education.field_of_studyIdeal (set theory)Information retrievalOperations researchComputer scienceGroup (mathematics)Information structurePopulationInformation accessGeneral Social SciencesHuman-Computer InteractionArts and Humanities (miscellaneous)Web pageDevelopmental and Educational PsychologyInformation systemeducationBehaviour & Information Technology
researchProduct

An Analysis of the Internal Organization of Facebook Groups

2019

With the rapid development and growth of online social networks (OSNs), researchers have been pushed forward to improve the knowledge of these complex networks by analyzing several aspects, such as the types of social media, the structural properties of the network, or the interaction patterns among users. In particular, a relevant effort has been devoted to the study and identification of cohesive groups of users in OSNs (also referred as communities) because they are the basic building block of each OSN. While several research works on groups in OSNs have mainly focused on identifying the types of groups and the contents created by their members, the analysis of internal organizations of …

Structure (mathematical logic)social networksExploitSettore INF/01 - InformaticaComputer science020206 networking & telecommunications02 engineering and technologyComplex networkData scienceGroup organization; network centrality; social networks; tie strengthHuman-Computer InteractionIdentification (information)tie strengthModeling and Simulation0202 electrical engineering electronic engineering information engineeringGroup organizationnetwork centrality020201 artificial intelligence & image processingSocial mediaUse casesocial networkSocial network analysisSocial Sciences (miscellaneous)Internal organization
researchProduct