An eye-opening look at the invisible workers who protect us from seeing humanity's worst on today's commercial internetSocial media on the internet can be a nightmarish place. A primary shield ...against hateful language, violent videos, and online cruelty uploaded by users is not an algorithm. It is people. Mostly invisible by design, more than 100,000 commercial content moderators evaluate posts on mainstream social media platforms: enforcing internal policies, training artificial intelligence systems, and actively screening and removing offensive material-sometimes thousands of items per day. Sarah T. Roberts, an award-winning social media scholar, offers the first extensive ethnographic study of the commercial content moderation industry. Based on interviews with workers from Silicon Valley to the Philippines, at boutique firms and at major social media companies, she contextualizes this hidden industry and examines the emotional toll it takes on its workers. This revealing investigation of the people "behind the screen" offers insights into not only the reality of our commercial internet but the future of globalized labor in the digital age.
Research on recommender systems typically focuses on the accuracy of prediction algorithms. Because accuracy only partially constitutes the user experience of a recommender system, this paper ...proposes a framework that takes a user-centric approach to recommender system evaluation. The framework links objective system aspects to objective user behavior through a series of perceptual and evaluative constructs (called subjective system aspects and experience, respectively). Furthermore, it incorporates the influence of personal and situational characteristics on the user experience. This paper reviews how current literature maps to the framework and identifies several gaps in existing work. Consequently, the framework is validated with four field trials and two controlled experiments and analyzed using Structural Equation Modeling. The results of these studies show that subjective system aspects and experience variables are invaluable in
explaining why and how the user experience of recommender systems comes about
. In all studies we observe that perceptions of recommendation quality and/or variety are important mediators in predicting the effects of objective system aspects on the three components of user experience: process (e.g. perceived effort, difficulty), system (e.g. perceived system effectiveness) and outcome (e.g. choice satisfaction). Furthermore, we find that these subjective aspects have strong and sometimes interesting behavioral correlates (e.g. reduced browsing indicates higher system effectiveness). They also show several tradeoffs between system aspects and personal and situational characteristics (e.g. the amount of preference feedback users provide is a tradeoff between perceived system usefulness and privacy concerns). These results, as well as the validated framework itself, provide a platform for future research on the user-centric evaluation of recommender systems.
PurposeLibraries worldwide, including Hong Kong, increasingly use social media tools to introduce and promote their services and resources to users. Instagram, in particular, is used to target ...younger users. This study investigates the effectiveness of Instagram in promoting library services and university students' perceptions of the value of Instagram as a learning support tool.Design/methodology/approachA major academic library in Hong Kong was chosen for this study. Library users' habits, perceptions, preferences, and views on Instagram's effectiveness as a learning support tool were compared in two age groups. The data were collected using a survey based on the 5E Instructional Model.FindingsDespite the significantly higher frequency of Instagram use by younger students, the results showed that Instagram was probably an ineffective promotion platform for either age group because of low user engagement, relatively neutral perception of Instagram as a learning support tool, and notably low user acceptance of Instagram as a promotional tool.Originality/valueStudies of student perspectives on various social media tools have increased; however, few have explored the use of Instagram, especially in Hong Kong or Asia. This study provides researchers and librarians with practical insights into current Instagram users' engagement, perceptions, and preferences and their view of its effectiveness as a learning support tool. The study also provides suggestions for improving the current situation.
SwiftUI is a powerful interface toolkit that lets you design and build iOS, iPadOS and macOS apps using declarative syntax. This beginner's guide explores all the fundamentals components of the ...framework and presents them to you in an easy-to-follow manner to get you started with building apps using SwiftUI and Swift programming.
This book gathers contributions to the EU-funded Horizon 2020 project INDIMO (Inclusive Digital Mobility Solutions), its sister projects DIGNITY (Digital Transport in and for Society) and TRIPS ...(Transport Innovation for Persons with Disabilities Needs Satisfaction), which have been focusing on making transport systems inclusive and accessible for all. Digitalization has enabled the emergence and proliferation of novel, ‘disruptive’ transport and delivery services. These services are often exclusively only available through digital channels such as a smartphone app or website. Yet a substantial segment of the population is at risk of being excluded from these services for a variety of reasons. Therefore, it is strongly necessary to integrate inclusivity and accessibility into the design and operation of mobility services. This book aims at discussing cases of and reasons for digital exclusion in transport. It also investigates the role of participatory and user-centric planning and design methods in making digital mobility more inclusive and accessible. Further, it discusses tools and technologies that could help policy makers to develop digital mobility as a more inclusive and accessible service. This is an open access book.
Although designers aim at offering the best possible user experience, products are designed for a general audience with a common pool of characteristics. Since intrinsic psychological characteristics ...model the human interaction, ignoring that each individual has different experiences may lead to a failed product. From these constructs, personality has shown strong results by shaping how users process and act on the world, and how individuals perceive and accept technology. In this work, we focus on conscientiousness, a personality trait that models one’s organization, persistence, and motivation for goal-oriented behavior. In particular, we study (
N
=
40
) whether conscientiousness affects the design preferences for graphical elements in a user interface. Additionally, we assess (
N
=
60
) if designing graphical user interfaces based on the design preferences of individuals with different conscientiousness scores affects perceived usability and ease-of-use. Results show that designing interfaces for conscientiousness-based personality profiles influences user preference but has no significant effect on perceived usability and ease-of-use. Our findings support the incorporation of conscientiousness in the design process to develop graphic user interfaces that focus on goal-oriented behavior for the correct audience.
Do you spend a lot of time during the design process wondering what users really need? Do you hate those endless meetings where you argue how the interface should work? Have you ever developed ...something that later had to be completely redesigned? Paper Prototyping can help. Written by a usability engineer with a long and successful paper prototyping history, this book is a practical, how-to guide that will prepare you to create and test paper prototypes of all kinds of user interfaces. You'll see how to simulate various kinds of interface elements and interactions. You'll learn about the practical aspects of paper prototyping, such as deciding when the technique is appropriate, scheduling the activities, and handling the skepticism of others in your organization. Numerous case studies and images throughout the book show you real world examples of paper prototyping at work. Learn how to use this powerful technique to develop products that are more useful, intuitive, efficient, and pleasing: * Save time and money - solve key problems before implementation begins * Get user feedback early - use it to focus the development process * Communicate better - involve development team members from a variety of disciplines * Be more creative - experiment with many ideas before committing to one*Enables designers to solve design problems before implementation begins *Five case studies provide real world examples of paper prototyping at work *Delves into the specifics of what types of projects paper prototyping is and isn't good for.
Objective: The Medtronic Extended infusion set (EIS) is the first and only infusion set approved for up to 7-day use. Prior studies established clinical safety and efficacy of the EIS. The purpose of ...this retrospective analysis was to assess real-world data on the EIS performance and user behaviors associated with the EIS including wear duration and asynchronous reservoir changes. Methods: A limited launch of the EIS outside the US (OUS) included MiniMed™ 640G/670G/780G users. Due to regional legal requirements, aggregated pump data from EIS users were not separated from other user data. To identify EIS users, an algorithm was developed based on the expected behavior patterns associated with an infusion set change, e.g., tubing fills. From the same cohort, individuals using the EIS (n=108) versus regular 3-day sets (n=414) were identified by a mean or median time between substantial tubing fills. To assess synchronous and asynchronous set/reservoir changes, reservoir changes were determined based on pump rewind commands in the CareLink™ system. Results: Mean EIS use lifetime was 6.74 days, with >70% of sets used for more than 6 days. No user complaint was received during limited launch. The EIS set change rate at 7 days (168 hrs) was 48.2%, and was comparable to the 48.9% rate of 3-day sets at 3 days (72 hrs). In addition, CareLink™ data indicated that while users with a total daily dose (TDD) of insulin less than 40 U may not require an asynchronous reservoir fill, some users with higher TDD did asynchronously and successfully change their reservoirs while retaining the infusion set. Conclusion: In the OUS limited EIS launch, the EIS performed similarly to the pivotal trial results, with no user complaints. As expected, pump users with TDD less than 40 U changed the infusion set and reservoir at the same time on the seventh day. The product has launched in the US and may potentially reduce user burden by effectively halving the number of required infusion set changes compared to standard 3-day sets. Disclosure T.Kwa: Employee; Medtronic. G.Zhang: Employee; Medtronic. A.Roy: Employee; Medtronic. M.Liu: Employee; Medtronic. E.Anselmo: Employee; Medtronic. J.Shin: Employee; Medtronic. O.Cohen: Employee; Medtronic. S.Chattaraj: Employee; Medtronic.
Wireless sensor networks (WSNs) are applicable in versatile domains ranging from very common to those which demand crucial security concerns. The deployment of WSNs in unattended environments and the ...resource-constrained nature of the constituent sensor nodes give rise to an open challenge to ensure that only authorized access to the information is available through the sensor nodes. Many researchers have made considerable efforts to meet this challenge by designing secure and dependable user authentication mechanisms. Every proposed scheme, with its advantages and disadvantages is cryptanalyzed to measure its respective strength and shortcomings. In this study, we first present twenty two features that a reliable user authentication scheme for WSNs should possess. We then evaluate seven of the available schemes against these twenty two features. A common tendency among all the available schemes is their failure to resist gateway node bypass attack, node capture attack and user impersonation attack. There is hardly any scheme that provides user anonymity and reparability in case of smart card loss or theft. Further mutual establishment of a session key between the three participating entities namely user, gateway node and sensor node is achieved in only one scheme; it is an integral characteristic to achieve the confidentiality of messages transmitted over open channels. The mutual authentication between the participating entities is another important aspect which is somewhat fulfilled by only two schemes; only one scheme resists denial of service attack and provides security to gateway node secret parameter. It is time to take halt, ponder upon the acquired objectives and set new goals to equip the contemporary state of art in this field with more viable and promising approaches. We review the state of art in this area; our goal is to explore the course of action for future proposals resulting in protocols with greater potential of usage in industry, military and other purposes. We opine that researchers should develop authentication schemes which take into account the desirable features discussed in this paper. We also discuss future path with some key issues and challenges in the area.