Despite the vast opportunities offered by location-aware marketing (LAM), mobile customers' privacy concerns appear to be a major inhibiting factor in their acceptance of LAM. This study extends the ...privacy calculus model to explore the personalization–privacy paradox in LAM, with considerations of personal characteristics and two personalization approaches (covert and overt). Through an experimental study, we empirically validated the proposed model. Results suggest that the influences of personalization on the privacy risk/benefit beliefs vary upon the type of personalization systems (covert and overt), and that personal characteristics moderate the parameters and path structure of the privacy calculus model.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
Most programs today are written not by professional software developers, but by people with expertise in other domains working towards goals for which they need computational support. For example, a ...teacher might write a grading spreadsheet to save time grading, or an interaction designer might use an interface builder to test some user interface design ideas. Although these end-user programmers may not have the same goals as professional developers, they do face many of the same software engineering challenges, including understanding their requirements, as well as making decisions about design, reuse, integration, testing, and debugging. This article summarizes and classifies research on these activities, defining the area of End-User Software Engineering (EUSE) and related terminology. The article then discusses empirical research about end-user software engineering activities and the technologies designed to support them. The article also addresses several crosscutting issues in the design of EUSE tools, including the roles of risk, reward, and domain complexity, and self-efficacy in the design of EUSE tools and the potential of educating users about software engineering principles.
Full text
Available for:
IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK
People working collaboratively must establish and maintain awareness of one another's intentions, actions and results. Notification systems typically support awareness of the presence, tasks and ...actions of collaborators, but they do not adequately support awareness of persistent and complex activities. We analysed awareness breakdowns in use of our Virtual School system—stemming from problems related to the collaborative situation, group, task and tool support—to motivate the concept of
activity awareness. Activity awareness builds on prior conceptions of social and action awareness, but emphasizes the importance of activity context factors like planning and coordination. This work suggests design strategies for notification systems to better support collaborative activity.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
Understanding the impacts and consequences of information and communications technology in local communities through theoretical and practical approaches has long been studied. Among different types ...of technologies, mobile technology suggests new opportunities for community informatics because a growing number of people across different age groups have adopted smartphones, which have become an indispensable part of people's daily lives. Because mobile technology transcends the limitations of time and place, it expands the ways of accessing and interacting with local community information and lowers the barrier to participation. In this paper, we present our ongoing initiatives in community informatics including digital cultural heritage and local volunteer efforts mediated by mobile technology. We highlight how mobile technology, together with increased mobility, immediacy and social presence, shows a significant influence on local communities with respect to community identity, awareness and participation and also social support networks.
Remote sighted assistance provides prosthetic support to people with visual impairments (PVI) through internet-mediated conversational interactions. In these interactions, PVI broadcast live video to ...remotely-located, sighted people who engage in speech interactions with PVI to create prosthetic support. These interactions can be quite nuanced, creative, and effective. In this paper, we present a design investigation of remote sighted assistance (RSA) in which computer vision capabilities are integrated into the prosthetic interaction, supporting the human participants in various ways. Our study involved creating design scenarios to identify and concretize future possibilities in order to articulate and analyze design rationale for these scenarios, that is to say, strengths and challenges of RSA integrated with CV. We discuss implications for the design of the next generation of remote sighted assistance.
Response to large-scale emergencies is a cooperative process that requires the active and coordinated participation of a variety of functionally independent agencies operating in adjacent regions. In ...practice, this essential cooperation is sometimes not attained or is reduced due to poor information sharing, non-fluent communication flows, and lack of coordination. We report an empirical study of IT-mediated cooperation among Spanish response agencies and we describe the challenges of adoption, information sharing, communication flows, and coordination among agencies that do not share a unity of command. We analyze three strategies aimed at supporting acceptance and surmounting political, organizational and personal distrust or skepticism: participatory design, advanced collaborative tools inducing cognitive absorption, and end-user communities of practice.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK
Wild at Home Carroll, John M.; Rosson, Mary Beth
ACM transactions on computer-human interaction,
07/2013, Volume:
20, Issue:
3
Journal Article
Peer reviewed
HCI can “turn to the wild” but still stay home. Local community life presents a rich context for understanding challenges and possibilities of information technology. We summarize and reflect upon a ...program of participatory design research in which we facilitated activities and experiences of our neighbors through developing a series of community-oriented programs and information systems through the past two decades. We organize these reflections around five overlapping themes: visibility of community actors, creation of community information infrastructures, the role of place-based identity and activity in community, the effectiveness of participatory relationships, and the research designs and methods appropriate. We frame these reflections around a conceptual model of community, and the suggestion that the local community can be a living laboratory for HCI in the wild.
Options for students to learn and connect with each other have diversified in recent years, with online resources and campuses playing an increasing role. Flexibility and comfort are becoming a ...priority as students choose when, where and how to pursue learning goals. Nonetheless, students want to feel sense of community with their peers and instructors; institutional bonds are in turn associated with enhanced learning. In this paper, we explore the feelings of community among students studying at a geographically distributed university. We seek to understand how the students understand community, the levels of community they feel and how their campus location may affect these feelings. In this paper, we present findings from both a survey and an interview study and consider the implications for tools that might promote community.
Readers will find several papers that address high-level issues in the use of technology in education, for example architecture and design frameworks for building online education materials or tools. ...Several other chapters report novel approaches to intelligent tutors or adaptive systems in educational settings. A number of chapters consider many roles for social computing in education, from simple computer-mediated communication support to more extensive community-building frameworks and tools. Finally, several chapters report state-of-the-art results in tools that can be used to assist educators in critical tasks such as content presentation and grading.
When social media traumatizes teens McHugh, Bridget Christine; Wisniewski, Pamela; Rosson, Mary Beth ...
Internet research,
10/2018, Volume:
28, Issue:
5
Journal Article
Peer reviewed
Purpose
The purpose of this paper is to examine the extent to which negative online risk experiences (information breaches, explicit content exposure, cyberbullying and sexual solicitations) cause ...post-traumatic stress disorder (PTSD) symptoms in adolescents. The study also explores whether teens’ short-term coping responses serve to mitigate PTSD or, instead, act as a response to stress from online events.
Design/methodology/approach
The study utilized a web-based diary design over the course of two months. Data were analyzed using hierarchical linear modeling with repeated measures.
Findings
The study confirmed that explicit content exposure, cyberbullying and sexual solicitations (but not information breaches) evoke symptoms of PTSD. Analyses also indicated that teens engage in active and communicative coping after they experience post-traumatic stress, regardless of risk type or frequency.
Practical implications
The authors found that teens took active measures to cope with online risks soon after they felt threatened (within a week). Actively coping with stressful situations has been shown to enhance adolescent resilience and reduce long-term negative effects of risk exposure. If these early coping behaviors can be detected, social media platforms may be able to embed effective interventions to support healthy coping processes that can further protect teens against long-term harm from exposure to online risks.
Originality/value
This is the first study to examine situational PTSD symptoms related to four types of adolescent online risk exposure within the week exposure occurred. By applying two competing theoretical frameworks (the adolescent resilience framework and transactional theory of stress), the authors show empirical evidence that suggests short-term coping responses are likely a stress reaction to PTSD, not a protective factor against it.