Browsing by Subject "Human-Computer Interaction"
Now showing 1 - 6 of 6
Results Per Page
Sort Options
Item A Collaborative Approach to Improving Adolescent eHealth Literacy(2017-12-01) McGowan, Bethany; Walsh, Gregory; Yale Gordon College of Arts and Sciences; Interaction Design and Information ArchitectureOpen Educational Resources (OERs) could provide relief for common issues related to the digital divide, particularly issues related to appropriate digital content for classroom use, teacher discomfort using digital content, and strategies for moving teachers to sustained digital content use. Librarians--already leaders in finding and sharing authoritative digital resources, familiar with copyright and Creative Commons licenses, and accustomed to using technology to deliver content--should lead in the creation, selection, and implementation of continuing education OERs, particularly literacy-related OERs. This research project will illustrate the potential for librarians in creating OER content that trains K-12 teachers to teach eHealth literacy competencies to adolescents. It will design a prototype for an open education resource that illustrates how librarian-teacher collaborations can lead to the creation of tools that alleviate three of the issues highlighted in the 2016 State of America’s Libraries Report: 1. difficulty locating appropriate digital content for classroom use, 2. teacher discomfort using digital content, and 3. unclear strategies for moving teachers to sustained digital content use in the classroom.Item A Comparative Pilot Study of Historical Artifacts in a CAVE Automatic Virtual Reality Environment Versus Paper- Based Artifacts(18th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct, 2016-09) Shrestha, Sujan; Chakraborty, Joyram; Mohamed, Mona A.The purpose of this research is to synthesize and transform real world physical environments (PE) into a CAVE automatic virtual reality system (CAVE) by using three-dimensional (3D) models of cultural and historical artifacts. 3D models are often used in many applications including visualizations and digital preservation. Virtual reality is used to improve perception and sensation and to better understand products and environments for studying human factors and behaviors. As a pilot study, we developed and prototyped a customizable 3D physical environment using historical data and archives into an interactive CAVE virtual reality (VR) system. We then conducted a study of user preferences using pretest and post-test questionnaires of the CAVE versus paper-based artifacts.Item Human catalysts: Behavior causing the spread of computer viruses(2017) Cannon, Kayla; Mathematics and Computer ScienceThis study focuses on highlighting the importance of personal protection from computer viruses. This issue is approached by way of releasing a survey, which is intended to investigate our main question of “How well does the public understand about their role in the control and spread of computer viruses?” We challenge the idea that all users are responsible enough to safely operate a computer system. Data collected at the end of the survey is analyzed, manipulated by data filters which output a selection of survey responses based upon given criteria. Statistics are calculated based on the output from the data filters. To ensure the anonymity of each respondent, the survey does not ask questions that reveal any personal information. A behavioral analysis is completed to investigate safe behaviors people should use while operating a computer. Overall, this investigation is meant to stimulate a spread of education about computer viruses.Item Infotecture: Gauging Where Physical Architecture and Information Architecture Merge and Divide(2018-07-18) Pollard, Sean; Walsh, Greg; Kohl, Deborah; Yale Gordon College of Arts and Sciences; Interaction Design Information Architecture (IDIA)This thesis examined the problem of a lack of universal information architecture (IA) design standard in the realm of information technology (IT), resulting in over-diversity, bad IA, best practices disarray, and substantialized user disconnect. Literature-based research observed for potential, metaphorical arcade overlaps within IA, and physical architectural periscopes extending beyond the mere use of the word architecture. This architectural potential was given the makeshift term Infotecture: Both the element of potential and its potentiality to merge the two fields through intentional overlap and application. It was proposed and examined that if arcade periscopes, or metaphorical columns and arch constructs, as well as their supporting architectural design principles, align with the context of the word architecture within IA and its design languages then such a correlation should be considered in future dialogue and integration into best practices. It was concluded that infotecture proved inconclusive without further empirical data, but documented user-research eye tracking video data revealing uniform user responses to proposed cognitive arcades within a simulation as considered within the literature review. This proved reflected in universal broadening and narrowing visual query patterns in all participants when operating the architecturally influential driving simulation used in the user-research eye tracking investigation. The eye tracking data was further supported by insightful feedback from test participants when interviewed and debriefed after participation. The contributions to a solution to the problem were observational recommendations for future designers geared toward the identifying, consideration, and possible integration of the mental models, founding principles and structural aesthetics of Roman architect Vitruvius and others by future information architects into future IA and simulative designs.Item Towards Developing Guidelines for Addressing Situationally Induced Impairments and Disabilities (SIID) and Severely Constraining Situational Impairments (SCSI)(2020-01-20) Saulynas, Sidas A; Kuber, Ravi; Information Systems; Human Centered ComputingThis research aims for a richer understanding of the variety and complexity of situational impairment events. Mobile users are often placed in less than ideal conditions where environmental variability can negatively affect the completion of an interaction. These interaction issues have been termed "Situationally Induced Impairments and Disabilities (SIID)". In addition, the omnipresent use of mobile devices seems to have produced a new complexity by-product termed "Severely Constraining Situational Impairments (SCSI)". Little research to date has attempted to examine SIIDs as events or from a generalizable classification perspective. Nor has much research attempted to explore the by-product of amplified complexity that the increase in usage and functionality offered by mobile technology is engendering. This research represents the culmination of three studies that have resulted in guidelines so that the design of mobile human-computer interaction can (1) better recognize the new complexity of the diverse facets that present during mobile interaction and (2) effectively account for the presence of SIID and SCSI events in the design of mobile device interaction.Item Towards Understanding Connections between Security/Privacy Attitudes and Unlock Authentication(USEC, 2018-02-01) Aviv, Adam J.; Kuber, RaviIn this study, we examine the ways in which user attitudes towards privacy and security relating to mobile devices and the data stored thereon may impact the strength of unlock authentication, focusing on Android's graphical unlock patterns. We conducted an online study with Amazon Mechanical Turk (N=750) using self-reported unlock authentication choices, as well as Likert scale agreement/disagreement responses to a set of seven privacy/security prompts. We then analyzed the responses in multiple dimensions, including a straight average of the Likert responses as well as using Principle Component Analysis to expose latent factors. We found that responses to two of the seven questions proved relevant and significant. These two questions considered attitudes towards general concern for data stored on mobile devices, and attitudes towards concerns for unauthorized access by known actors. Unfortunately, larger conclusions cannot be drawn on the efficacy of the broader set of questions for exposing connections between unlock authentication strength (Pearson Rank r=−0.08, p<0.1). However, both of our factor solutions exposed differences in responses for demographics groups, including age, gender, and residence type. The findings of this study suggests that there is likely a link between perceptions of privacy/security on mobile devices and the perceived threats therein, but more research is needed, particularly on developing better survey and measurement techniques of privacy/security attitudes that relate to mobile devices specifically.