Some corporations have adopted a Wiki on their Intranets for employees to collectively store, edit and access work-related material such as reports, best-practice features, and documents. As such collaborative software moves from the social to the corporate arena, it is bound to challenge management authority, engaging the knowledge worker in a more participatory knowledge capability and environment. This paper explores the implication that this revolution has for the interaction of corporate users with technology that will lead to a profound change in organisational culture.
{"title":"The Wiki: an environment to revolutionise employees' interaction with corporate knowledge","authors":"H. Hasan, Charmaine C. Pfaff","doi":"10.1145/1228175.1228250","DOIUrl":"https://doi.org/10.1145/1228175.1228250","url":null,"abstract":"Some corporations have adopted a Wiki on their Intranets for employees to collectively store, edit and access work-related material such as reports, best-practice features, and documents. As such collaborative software moves from the social to the corporate arena, it is bound to challenge management authority, engaging the knowledge worker in a more participatory knowledge capability and environment. This paper explores the implication that this revolution has for the interaction of corporate users with technology that will lead to a profound change in organisational culture.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130933611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study examines the perceptions and thoughts of the elderly community on current sensor network designs for health monitoring. The majority of research to date has focused on development of the wireless sensor network technology for health care applications; this study instead focuses on the perceptions of one group of users of such technology – the elderly. As user acceptance is a key issue in system deployment, issues and ideas arising from current sensor network designs are put to the elderly, aiming to involve them in the design process. By conducting focus group sessions with elderly participants and interviews with a health care professional, this study sought views on the nature of monitoring preferred by elderly people, and their preferred modes of interaction with such a system. Some interesting and surprising findings from these focus groups include a general preference for an embedded sensor implementation versus a wearable or ambient implementation, the expressed need of the elderly to have some ability to control / interact with the sensors and the general positive level of support for the idea of sensor-based health monitoring. Author
{"title":"Perceptions of the elderly on the use of wireless sensor networks for health monitoring","authors":"Chirstopher Secombe, R. Steele, Wayne Brookes","doi":"10.1145/1228175.1228188","DOIUrl":"https://doi.org/10.1145/1228175.1228188","url":null,"abstract":"This study examines the perceptions and thoughts of the elderly community on current sensor network designs for health monitoring. The majority of research to date has focused on development of the wireless sensor network technology for health care applications; this study instead focuses on the perceptions of one group of users of such technology – the elderly. As user acceptance is a key issue in system deployment, issues and ideas arising from current sensor network designs are put to the elderly, aiming to involve them in the design process. By conducting focus group sessions with elderly participants and interviews with a health care professional, this study sought views on the nature of monitoring preferred by elderly people, and their preferred modes of interaction with such a system. Some interesting and surprising findings from these focus groups include a general preference for an embedded sensor implementation versus a wearable or ambient implementation, the expressed need of the elderly to have some ability to control / interact with the sensors and the general positive level of support for the idea of sensor-based health monitoring. Author","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We reflect on two methods that explore personal experience of natural places within a human-centred framework for design. The methods attend to the meanings people make of their experiences in natural places and emotional and intellectual sense of being in a place. We use Egocentric Point-of-View video to explore transformations of immediate sensory transactions in natural places and Nature Probes to elicit affective qualities of experiences. We apply McCarthy and Wright's dialogical approach (2005) to uncover relationships between place and self and discuss insights emerging from our methods with respect to belonging to a community through its natural landscape.
{"title":"Making there: methods to uncover egocentric experience in a dialogic of natural places","authors":"N. Bidwell, D. Browning","doi":"10.1145/1228175.1228216","DOIUrl":"https://doi.org/10.1145/1228175.1228216","url":null,"abstract":"We reflect on two methods that explore personal experience of natural places within a human-centred framework for design. The methods attend to the meanings people make of their experiences in natural places and emotional and intellectual sense of being in a place. We use Egocentric Point-of-View video to explore transformations of immediate sensory transactions in natural places and Nature Probes to elicit affective qualities of experiences. We apply McCarthy and Wright's dialogical approach (2005) to uncover relationships between place and self and discuss insights emerging from our methods with respect to belonging to a community through its natural landscape.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115259537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The cultural probe approach is becoming a valuable observational method in social contexts. Based on cultural probe work on intergenerational play, this paper proposes a method for moving forward from these results towards a requirements analysis, while retaining valuable aspects of the cultural probe approach, like subjectivity and interpretation. Since requirements elicitation techniques are often determined by the modeling scheme used, we chose the most apparently appropriate modeling scheme for social contexts, the Agent Oriented Software Engineering (AOSE) methodology, ROADMAP. We believe to have contributed the ability to include AOSE in the cycle from cultural probe observation to production of informed technology, reflecting designer motivation and intention, for re-immersion into the situational context. The method facilitates the transition from data collection in social environments via cultural probes to socially oriented requirements analysis for informed technology production.
{"title":"Moving from cultural probes to agent-oriented requirements engineering","authors":"Anne Boettcher","doi":"10.1145/1228175.1228219","DOIUrl":"https://doi.org/10.1145/1228175.1228219","url":null,"abstract":"The cultural probe approach is becoming a valuable observational method in social contexts. Based on cultural probe work on intergenerational play, this paper proposes a method for moving forward from these results towards a requirements analysis, while retaining valuable aspects of the cultural probe approach, like subjectivity and interpretation. Since requirements elicitation techniques are often determined by the modeling scheme used, we chose the most apparently appropriate modeling scheme for social contexts, the Agent Oriented Software Engineering (AOSE) methodology, ROADMAP. We believe to have contributed the ability to include AOSE in the cycle from cultural probe observation to production of informed technology, reflecting designer motivation and intention, for re-immersion into the situational context. The method facilitates the transition from data collection in social environments via cultural probes to socially oriented requirements analysis for informed technology production.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122445612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Video games are currently not well understood from an HCI perspective. As opposed to the standard task-based view of interaction, video game interaction takes the form of play. In this paper we offer an analysis of a form of gameplay we call "playing the interface." By understanding play as a kind of interaction with software, we can move toward a video game-specific HCI.
{"title":"Playing the interface: a case study of Grand Theft Auto: San Andreas","authors":"Pippin Barr, Rilla Khaled, J. Noble, R. Biddle","doi":"10.1145/1228175.1228233","DOIUrl":"https://doi.org/10.1145/1228175.1228233","url":null,"abstract":"Video games are currently not well understood from an HCI perspective. As opposed to the standard task-based view of interaction, video game interaction takes the form of play. In this paper we offer an analysis of a form of gameplay we call \"playing the interface.\" By understanding play as a kind of interaction with software, we can move toward a video game-specific HCI.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122916463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes the design rationale of a wearable display that is able to convey the behavioral typology of its wearers by merging insights from wearable computing, aesthetic visualization, and electronic fashion. This display acts as an electronically enhanced and dynamically changing form of self-expression, which can be integrated with daily clothing. The data mapping approach is based on historical behavior data retrieved via built-in accelerometer, microphone and infrared sensors. By aesthetical encrypting this personal data, the actual meaning of the display can only be interpreted by people that are intrinsically motivated to learn it, and have had a long-term exposure to it. Conceptually, the display is based on the dynamic folding of consecutive layers of fabric, which creates emergent visual patterns that subtly change over time. A first prototype has been implemented which will ultimately lead to a deployment of several interconnected devices in a real social context, to evaluate its social acceptance and its effectiveness in augmenting human self-expression and promoting social networking.
{"title":"A wearable folding display for self-expression","authors":"A. V. Moere, Monika Hoinkis","doi":"10.1145/1228175.1228228","DOIUrl":"https://doi.org/10.1145/1228175.1228228","url":null,"abstract":"This paper proposes the design rationale of a wearable display that is able to convey the behavioral typology of its wearers by merging insights from wearable computing, aesthetic visualization, and electronic fashion. This display acts as an electronically enhanced and dynamically changing form of self-expression, which can be integrated with daily clothing. The data mapping approach is based on historical behavior data retrieved via built-in accelerometer, microphone and infrared sensors. By aesthetical encrypting this personal data, the actual meaning of the display can only be interpreted by people that are intrinsically motivated to learn it, and have had a long-term exposure to it. Conceptually, the display is based on the dynamic folding of consecutive layers of fabric, which creates emergent visual patterns that subtly change over time. A first prototype has been implemented which will ultimately lead to a deployment of several interconnected devices in a real social context, to evaluate its social acceptance and its effectiveness in augmenting human self-expression and promoting social networking.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single entity. However previous research (Satchell et al 2006) has revealed a new set of end user needs for the design of identity management systems. This paper explores these needs from an identity management provider perspective, finds both alignment and divergence in needs and identifies a generational shift as a major cause of the differing needs. Whilst X and Y generations do not react strongly to concerns about digital identity theft or misappropriation of information, they seek to create and control their digital representations to be streamlined, portable across domains and revealing elements of their real life identity. There is still a considerable challenge for providers who must look beyond 'security' and 'authentication' to include 'user control', 'synthesis', 'portability' and 'personalisation' in the design of their systems.
企业通常将联邦身份管理视为一种解决方案,通过将复杂和分散的用户信息合成到单个实体中来支持安全的在线商务。然而,之前的研究(Satchell et al . 2006)揭示了一组新的终端用户对身份管理系统设计的需求。本文从身份管理提供商的角度探讨了这些需求,发现了需求的一致性和差异性,并确定了代际变化是需求差异的主要原因。虽然X和Y世代对数字身份盗窃或信息盗用的担忧没有强烈反应,但他们寻求创造和控制他们的数字表示,使其流线型,跨域便携,并揭示他们现实生活中的身份元素。供应商仍然面临相当大的挑战,他们必须超越“安全性”和“身份验证”,在其系统设计中包括“用户控制”、“综合”、“可移植性”和“个性化”。
{"title":"Beyond security: implications for the future of federated digital identity management systems","authors":"C. Satchell, G. Shanks, S. Howard, John Murphy","doi":"10.1145/1228175.1228231","DOIUrl":"https://doi.org/10.1145/1228175.1228231","url":null,"abstract":"Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single entity. However previous research (Satchell et al 2006) has revealed a new set of end user needs for the design of identity management systems. This paper explores these needs from an identity management provider perspective, finds both alignment and divergence in needs and identifies a generational shift as a major cause of the differing needs. Whilst X and Y generations do not react strongly to concerns about digital identity theft or misappropriation of information, they seek to create and control their digital representations to be streamlined, portable across domains and revealing elements of their real life identity. There is still a considerable challenge for providers who must look beyond 'security' and 'authentication' to include 'user control', 'synthesis', 'portability' and 'personalisation' in the design of their systems.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132651422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper reports on the evaluation of a digitallyaugmented exhibition on the history of modern media. We discuss visitors' interaction with installations and corresponding interaction design issues, drawing on results from analysis of logfiles, interviews, and observation in the museum. We see this as an exploration into interaction design of interactive installations for public settings, using the evaluation as a case study on what makes an installation engaging and how it can provide an engaging experience for groups.
{"title":"Learning from interactive museum installations about interaction design for public settings","authors":"E. Hornecker, M. Stifter","doi":"10.1145/1228175.1228201","DOIUrl":"https://doi.org/10.1145/1228175.1228201","url":null,"abstract":"This paper reports on the evaluation of a digitallyaugmented exhibition on the history of modern media. We discuss visitors' interaction with installations and corresponding interaction design issues, drawing on results from analysis of logfiles, interviews, and observation in the museum. We see this as an exploration into interaction design of interactive installations for public settings, using the evaluation as a case study on what makes an installation engaging and how it can provide an engaging experience for groups.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132745221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper reports on the challenges faced during the design and deployment of educationally-focused cultural probes with children. The aim of the project was to use cultural probes to discover insights into children's interests and ideas within an educational context. The deployment of a cultural probe pack with children aged between 11 and 13 has demonstrated the method's effectiveness as a tool for design inspiration. Children's responses to the cultural probe have provided a valuable insight into the attributes of successful probe activities, the nature of contextual information which may be gathered and the limitations of the method.
{"title":"Designing cultural probes for children","authors":"Peta Wyeth, Carla Diercke","doi":"10.1145/1228175.1228252","DOIUrl":"https://doi.org/10.1145/1228175.1228252","url":null,"abstract":"This paper reports on the challenges faced during the design and deployment of educationally-focused cultural probes with children. The aim of the project was to use cultural probes to discover insights into children's interests and ideas within an educational context. The deployment of a cultural probe pack with children aged between 11 and 13 has demonstrated the method's effectiveness as a tool for design inspiration. Children's responses to the cultural probe have provided a valuable insight into the attributes of successful probe activities, the nature of contextual information which may be gathered and the limitations of the method.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
First order authentication of the privacy and security of Internet banking rests mainly on distinctive user names and passwords. Our qualitative study of banking, security and privacy shows it is common for married and de facto couples in Australia to access each other's individual Internet and phone banking accounts through shared user names and PINs. This sharing happens when the couple has joint accounts, and both persons also have individual accounts, but only one person manages the money. Individual accounts appear to remain important for their symbolic meanings in a marriage, even though online money management may negate access and privacy boundaries between individual and joint accounts. This study thus finds that first order authentication policies go against social practice in some important domestic contexts. Our work points to the importance of sociological empirical user centred security study in order that security design can be built on social practice.
{"title":"What is your husband's name?: sociological dimensions of internet banking authentication","authors":"Supriya Singh, A. Cabraal, G. Hermansson","doi":"10.1145/1228175.1228217","DOIUrl":"https://doi.org/10.1145/1228175.1228217","url":null,"abstract":"First order authentication of the privacy and security of Internet banking rests mainly on distinctive user names and passwords. Our qualitative study of banking, security and privacy shows it is common for married and de facto couples in Australia to access each other's individual Internet and phone banking accounts through shared user names and PINs. This sharing happens when the couple has joint accounts, and both persons also have individual accounts, but only one person manages the money. Individual accounts appear to remain important for their symbolic meanings in a marriage, even though online money management may negate access and privacy boundaries between individual and joint accounts. This study thus finds that first order authentication policies go against social practice in some important domestic contexts. Our work points to the importance of sociological empirical user centred security study in order that security design can be built on social practice.","PeriodicalId":164924,"journal":{"name":"Proceedings of the 18th Australia conference on Computer-Human Interaction: Design: Activities, Artefacts and Environments","volume":"679 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134127861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}