Search results for "Human-computer interaction"
showing 10 items of 605 documents
“Facebocrastination”? Predictors of using Facebook for procrastination and its effects on students’ well-being
2016
Procrastinating with popular online media such as Facebook has been suggested to impair users well-being, particularly among students. Building on recent procrastination, self-control, and communication literature, we conducted two studies (total N=699) that examined the predictors of procrastination with Facebook as well as its effects on students academic and overall well-being. Results from both studies consistently indicate that low trait self-control, habitual Facebook checking, and high enjoyment of Facebook use predict almost 40 percent of the variance of using Facebook for procrastination. Moreover, results from Study 2 underline that using Facebook for the irrational delay of impor…
Too many passwords? How understanding our memory can increase password memorability
2018
Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …
Improving Password Memorability, While Not Inconveniencing the User
2019
Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…
Book Review: Taking ICT to Every Indian Village: Opportunities and Challenges
2006
Atanu Garai & B. Shadrach (2006). Taking ICT to every Indian village: Opportunities and challenges. New Delhi, India: One World South Asia; 133 pages. Information and communication technology (ICT) activities can easily be seen as a sort of technocracy, which is not surprising because the focus of attention is often dominated by issues such as the bandwidth, new devices, or the fierce competition between technological companies and their innovative products. In short, the discussion often is restricted to Habermasian technical interest of knowledge. At the end of the day, however, everything in ICT is about people and, more specifically, about the emancipatory application of knowledge for a…
The affine equivariant sign covariance matrix: asymptotic behavior and efficiencies
2003
We consider the affine equivariant sign covariance matrix (SCM) introduced by Visuri et al. (J. Statist. Plann. Inference 91 (2000) 557). The population SCM is shown to be proportional to the inverse of the regular covariance matrix. The eigenvectors and standardized eigenvalues of the covariance, matrix can thus be derived from the SCM. We also construct an estimate of the covariance and correlation matrix based on the SCM. The influence functions and limiting distributions of the SCM and its eigenvectors and eigenvalues are found. Limiting efficiencies are given in multivariate normal and t-distribution cases. The estimates are highly efficient in the multivariate normal case and perform …
Interactive Effects of Explicit Emergent Structure: A Major Challenge for Cognitive Computational Modeling
2015
International audience; David Marr's (1982) three-level analysis of computational cognition argues for three distinct levels of cognitive information processingnamely, the computational, representational, and implementational levels. But Marr's levels areand were meant to bedescriptive, rather than interactive and dynamic. For this reason, we suggest that, had Marr been writing today, he might well have gone even farther in his analysis, including the emergence of structurein particular, explicit structure at the conceptual levelfrom lower levels, and the effect of explicit emergent structures on the level (or levels) that gave rise to them. The message is that today's cognitive scientists …
Autonomic behaviors in an Ambient Intelligence system
2014
Ambient Intelligence (AmI) systems are constantly evolving and becoming ever more complex, so it is increasingly difficult to design and develop them successfully. Moreover, because of the complexity of an AmI system as a whole, it is not always easy for developers to predict its behavior in the event of unforeseen circumstances. A possible solution to this problem might lie in delegating certain decisions to the machines themselves, making them more autonomous and able to self-configure and self-manage, in line with the paradigm of Autonomic Computing. In this regard, many researchers have emphasized the importance of adaptability in building agents that are suitable to operate in real-wor…
Emotional Dimensions of User Experience ? A User Psychological Analysis
2014
User psychology is a human–technology interaction research approach that uses psychological concepts, theories, and findings to structure problems of human–technology interaction. As the notion of user experience has become central in human–technology interaction research and in product development, it is necessary to investigate the user psychology of user experience. This analysis of emotional human–technology interaction is based on the psychological theory of basic emotions. Three studies, two laboratory experiments, and one field study are used to investigate the basic emotions and the emotional mind involved in user experience. The first and second experiments study the measurement of…
Methods for defining user groups and user-adjusted information structures
1999
A common problem in the design of information systems is how to structure the information in a way that is most useful to different groups of users. This paper describes some statistical methods for revealing the structure inherent in empirical data elicited from users. It is illustrated by the application of these methods to the design of some web pages giving information about the Universitat de Valencia. Three potential user groups were identified, administrative staff, teaching staff and students. The first analysis demonstrated that users within these three groups assign relatively homogeneous structures, but that the structures assigned by the three groups are not the same, and also, …
An Analysis of the Internal Organization of Facebook Groups
2019
With the rapid development and growth of online social networks (OSNs), researchers have been pushed forward to improve the knowledge of these complex networks by analyzing several aspects, such as the types of social media, the structural properties of the network, or the interaction patterns among users. In particular, a relevant effort has been devoted to the study and identification of cohesive groups of users in OSNs (also referred as communities) because they are the basic building block of each OSN. While several research works on groups in OSNs have mainly focused on identifying the types of groups and the contents created by their members, the analysis of internal organizations of …