22 results on '"Ardito, Carmelo"'
Search Results
2. Human-Centered Software Engineering - 9th IFIP WG 13.2 International Working Conference, HCSE 2022, Eindhoven, The Netherlands, August 24-26, 2022, Proceedings
- Author
-
Bernhaupt, Regina, Ardito, Carmelo, Sauer, Stefan, and Systemic Change
- Published
- 2022
3. Multisensory Augmented Reality
- Author
-
Karunanayaka, Kasun, Nijholt, Anton, Halloluwa, Thilina, Ranasinghe, Nimesha, Wickramasinghe, Manjusri, Vyas, Dhaval, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, Inkpen, Kori, and Human Media Interaction
- Subjects
Multimodal interfaces ,HCI ,Computer science ,Human–computer interaction ,Field (Bourdieu) ,Multisensory augmented reality ,Augmented reality ,Multisensory internet ,Multisensory user experiences - Abstract
Multisensory augmented reality enables content developers to generate more realistic, sensory rich user experiences. Applications and research related to multisensory augmented reality expands through several areas such as education, medicine, human-machine interactions, human-food interactions, marketing, and neuroscience. Aim of this workshop is to gather researchers and industry representatives who are involved in multisensory augmented reality research to discuss the current state-of-the-art in the field, define future research directions, form new collaborations, and come up with future publication plans. We believe that this workshop would enhance the participants’ experience of the Interact 2021 and encourage more participants to attend the main conference.
- Published
- 2021
4. 'WhatsApp in Politics?!': Collaborative Tools Shifting Boundaries
- Author
-
Verma, H., Mlynár, Jakub, Pellaton, Camille, Theler, Matteo, Widmer, Antoine, Evéquoz, Florian, and Ardito, Carmelo
- Subjects
Participatory politics ,Collaborative and communicative tools ,Political boundaries ,Constitution writing ,CSCW - Abstract
We examine the technological aspects of political collaborative practices in one of the first studies of participatory constitution writing in the course of its progression. In particular, we examine how digital collaborative and communicative tools can facilitate (or inhibit) the permeation of boundaries, which manifest through the differences in political ideologies and partisan beliefs. Our study is grounded in interviews with 15 members of the Constituent Assembly in the canton of Valais, Switzerland, and its primary contribution is in constructing a fine-grained contextualized understanding of political collaborations, their evolution, and their relationship with collaborative tools. Our findings demonstrate the centrality of versatile and widely available digital tools (such as WhatsApp and Google Docs) in political work. In addition, elected lawmakers prefer tools that allow them to organize their collaborative and communicative actions based on dynamic social boundaries, and their need for asynchronous work practices. We observed a tendency of simultaneously using multiple digital tools to accomplish specific political objectives, and leveraging them in plenary sessions for strategic advantages. On the one hand, collaborative tools enabled strategic advantages by selective permeation of boundaries across political ideologies. On the other hand, lack of awareness about boundaries between ‘private’ and ‘public’ on social networks were considered as privacy blind spots. By focusing on boundaries of different kinds, our paper elucidates how the introduction of digital technologies into political process transforms the long-established categories, distinctions and divisions that are often taken for granted.
- Published
- 2021
5. Handling security, usability, user experience and reliability in user-centered development processes: IFIP WG 13.2 and WG 13.5 Workshop at INTERACT 2019
- Author
-
Ardito, Carmelo, Bernhaupt, Regina, Palanque, Philippe, Sauer, Stefan, Lamas, David, Loizides, Fernando, Nacke, Lennart, Petrie, Helen, Winckler, Marco, Zaphiris, Panayiotis, and Systemic Change
- Subjects
Resilience ,business.industry ,Computer science ,Human error ,Usability ,Context (language use) ,UX ,Reliability ,User interfaces properties ,World Wide Web ,User experience design ,Privacy ,Security ,User-centered design process ,Systems design ,Design process ,The Internet ,business ,Resilience (network) ,User-centered design - Abstract
Human-Computer Interaction (HCI) research has been focusing on properties such as usability, accessibility, inclusive design, user experience. As new security risks are emerging with the continuous increase of Internet interconnections and the development of the Internet of Things, more recently security, trust and resilience have also become important for the development of interactive systems. Since users have been identified as one of the major security weaknesses in today’s technologies, HCI becomes a fundamental pillar for designing more secure (but still usable) systems. However, interactive system properties might overlap and sometimes create conflicts in user-centered development processes. For example, security could reduce system usability by placing a burden on users when they have to deal with passwords. The HCI research has provided several tools and techniques that can support designers in making decisions, but there are no “cookbooks”. This workshop promotes sharing of experiences in managing and resolving conflicts of multiple interactive system properties within the context of a user-centered design process. We are concerned by theories, methods and approaches for dealing with interactive system properties, managing potential conflicts and trade-offs. This workshop is organized by the IFIP WG 13.2 on Methodology for User-Centered System Design and the IFIP WG 13.5 on Human Error, Resilience, Reliability and Safety in System Development.
- Published
- 2019
6. EMA IDEs
- Author
-
Batalas, Nikolaos, Boden, Alexander, Díaz, Paloma, Aedo, Ignacio, Ardito, Carmelo, Pipek, Volkmar, Jensen, Carlos, and Future Everyday
- Subjects
End-user development ,education.field_of_study ,Experience sampling method ,Product design ,Computer science ,Component (UML) ,Population ,Wearable computer ,education ,Data science ,Mobile device ,mHealth - Abstract
With the proliferation of smartphones and wearables, Ecological Momentary Assessment (EMA) methods[1] are evolving into an indispensable component of practices that seek to collect data from a population of participants, through the use of their devices. In fields ranging from clinical psychology, to product design, to marketing and mHealth, the mobile devices owned by a population of participants can be made use of, and gather insights into how their daily lives unfold, by collecting data as reported from the participants themselves, or sensed by the devices. End-user programmable systems can aid these professionals and researchers manage the challenges that may arise in employing EMA methods with such devices.
- Published
- 2015
7. Models-Based Analysis of Both User and Attacker Tasks: Application to EEVEHAC
- Author
-
Nikula, Sara, Martinie, Célia, Palanque, Philippe, Hekkala, Julius, Latvala, Outi-Marja, Halunen, Kimmo, Bernhaupt, Regina, Ardito, Carmelo, and Sauer, Stefan
- Subjects
Visual channel ,Usable security ,Task modeling ,Human understandable cryptography - Abstract
The design and development of security mechanisms, such as authentication, requires analysis techniques that take into account usability along with security. Although techniques that are grounded in the security domain target the identification and mitigation of possible threats, user centered design approaches have been proposed in order to also take into account the user’s perspective and needs. Approaches dealing with both usability and security focus on the extent to which the user can perform the authentication tasks, as well as on the possible types of attacks that may occur and the potential threats on user tasks. However, to some extent, attacker can be considered as user of the system (even if undesirable), and the analysis of attacker tasks provides useful information for the design and development of an authentication mechanism. We propose a models-based approach to analyse both user and attacker tasks. The modeling of attacker tasks enables to go deeper when analysing the threats on an authentication mechanism and the trade-offs between usability and security. We present the results of the application of this models-based approach to the EEVEHAC security mechanism, which enables the setup of a secure communication channel for users of shared public computers.
- Published
- 2022
8. Solid web monetization
- Author
-
Merlijn Sebrechts, Tom Goethals, Thomas Dupont, Wannes Kerckhove, Ruben Taelman, Filip De Turck, Bruno Volckaert, Di Noia, Tommaso, Ko, In-Young, Schedl, Markus, and Ardito, Carmelo
- Subjects
Solid ,Technology and Engineering ,Web Monetization ,Micropayments ,Interledger ,Open payments ,Payment processing - Abstract
The Solid decentralization effort decouples data from services, so that users are in full control over their personal data. In this light, Web Monetization has been proposed as an alternative business model for web services that does not depend on data collection anymore. Integrating Web Monetization with Solid, however, remains difficult because of the heterogeneity of Interledger wallet implementations, lack of mechanisms for securely paying on behalf of a user, and an inherent issue of trusting content providers to handle payments. We propose the Web Monetization Provider as a solution to these challenges. The WMP acts as a third party, hiding the underlying complexity of transactions and acting as a source of trust in Web Monetization interactions. This demo shows a working end-to-end example including a website providing monetized content, a WMP, and a dashboard for configuring WMP into a Solid identity.
- Published
- 2022
9. Bridging Static Site Generation with the Dynamic Web
- Author
-
Vepsäläinen, Juho, Vuorimaa, Petri, Di Noia, Tommaso, Ko, In-Young, Schedl, Markus, Ardito, Carmelo, Department of Computer Science, Computer Science Professors, Aalto-yliopisto, and Aalto University
- Subjects
JSON ,Software architecture ,Static site generation - Abstract
Funding Information: Supported by Aalto University. Publisher Copyright: © 2022, Springer Nature Switzerland AG. Historically web sites have been developed using HTML for their markup either by authoring it directly or through abstraction to generate it. The currently available tools exist in a continuum of static, developer-oriented tools and dynamic services that cater to non-technical users. In this paper, we propose an approach that sits in the middle by using JSON for site definitions. The definition is leveraged on the client-side for editing, bridging the continuum’s ends.
- Published
- 2022
10. Remote User Testing:- Experiences and Trends
- Author
-
Larsen, Lars Bo, Øvad, Tina, Nielsen, Lene, Larusdottir, Marta, Ardito, C., Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Remote user testing ,Usability ,Remote user studies - Abstract
This paper describes a one-day INTERACT 2021 workshop on remote testing with users as participants. Remote user testing has been around since the mid-nineties, but the Covid-19 pandemic has boosted the interest in remote working in general and thus also remote testing. The workshop aim is to present and discuss the current state-of-the-art of remote testing methods and identify emerging trends. Subjects that will be discussed include, but are not restricted to: Remote testing methods and platforms; capturing of quantitative as well as qualitative data; moderated, unmoderated and remotely moderated tests; testing of physical products; and remote testing of participants with special needs.
- Published
- 2021
11. Understanding Users Through Three Types of Personas
- Author
-
Nielsen, Lene, Larusdottir, Marta, Larsen, Lars Bo, Ardito, C, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
IT professionals ,InformationSystems_MODELSANDPRINCIPLES ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,User stories ,Personas ,Case study ,ComputingMilieux_COMPUTERSANDSOCIETY ,Workshops ,Persona user stories - Abstract
To integrate UX practices in agile development is not straight forward. IT professionals struggle with integrating UX practices mainly due to lack of resources or knowledge. Additionally, it is hard to find the right timing for the UX activities and often the focus is on delivering functionality and not on understanding the users. Integrating the personas method in agile development has been suggested to extend the understanding of the real users by the IT professionals. However, studies show that the integration of personas can fail. Through interviews with IT professionals we investigate how to better the odds of a successful implementation of the persona method in agile development. The result shows that several factors have an impact on the implementation of the method. Personas is a suggested method to extend IT professionals' understanding of users and users’ needs. A common advantage expressed is that personas extend the IT professionals’ empathy for the users, but a disadvantage is that personas are typically defined at the start of a software project and gradually are forgotten, since there is little reference to the personas through the software development project. In this paper we report experiences of coaching IT professionals in defining agile user stories based on personas, called: Persona User Stories (PUS). The aim of these workshops, was to extend the usage of personas and thereby extend the IT professionals’ understanding of their users. In a research project with three companies, we coached teams of IT professionals in three-hour workshops with 76 participants in total. The workshops were conducted at each company using personas already defined by the IT professionals. The persona descriptions were based on three types of information: (a) assumptions, (b) secondary research, and (c) data specific to a project. Our findings show that personas based on assumptions result in the participants questioning the description of the personas and having difficulties in understanding the personas. For making the persona user stories (PUS), the participants used themselves more often as a reference when working with the assumption based personas, than the participants using the other two types of personas.
- Published
- 2021
12. Digital Producers with Cognitive Disabilities:Participatory Video Tutorials as a Strategy for Supporting Digital Abilities and Aspirations
- Author
-
Anne Marie Kanstrup, Jacob Davidsen, Petko Atanasov Karadechev, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Content production ,Cognitive disability ,Youth ,Digital content ,media_common.quotation_subject ,Foregrounding ,Applied psychology ,Citizen journalism ,Cognitive disabilities ,Participatory design ,Participatory video ,Psychology ,Empowerment ,Video tutorials ,Digital inclusion ,media_common - Abstract
This paper presents ‘participatory video tutorials’—a strategy developed to support the digital empowerment of young people living with cognitive disabilities. The support strategy complements and expands dominant perspectives on the target group, which is often seen as disabled and in need of assistive technology, by foregrounding the young participants’ digital abilities and facilitating them as active producers of digital content, which already plays a major role in their everyday social interactions. We present the background and framework for participatory video tutorials and the results from staging digital production with sixteen young participants. Empirically, the results contribute perspectives on this target group as producers (vs. users) with abilities (vs. disabilities). Methodologically, the results outline four principles (socio-technical belonging, technical accessibility, elasticity, and material reusability) that can assist HCI researchers, professionals, and caretakers in their efforts to support the target group in digital production. These principles are guidelines for a participatory staging, driven by the young people’s motivation for self-expression. The study and the results contribute an example and a strategy for how to work toward digital inclusion by engaging a marginalized target group in digital production.
- Published
- 2021
13. Exploring the Acceptability of Graphical Passwords for People with Dyslexia
- Author
-
James Nicholson, Polina Evtimova, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Password ,education.field_of_study ,Focus (computing) ,Alphanumeric ,business.industry ,Computer science ,Workaround ,G400 ,Population ,Internet privacy ,Dyslexia ,Usability ,G600 ,medicine.disease ,Authentication (law) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,medicine ,education ,business - Abstract
Alphanumeric passwords are still the most common form of user authentication despite well-known usability issues. These issues, including weak composition and poor memorability, have been well-established across different user groups, yet users with dyslexia have not been studied despite making up approximately 10% of the population. In this paper, we focus on understanding the user authentication experiences of people with dyslexia (PwD) in order to better understanding their attitudes towards a graphical password system that may provide a more inclusive experience. Through interactive interviews, participants were encouraged to try three different knowledge-based authentication systems (PIN, password, and graphical password) and then discuss their strategies behind code composition. We found that PwD employed potentially dangerous workarounds when composing passwords, in particular an over-reliance on pattern-based composition. We report on how PwD do not immediately see the benefits of graphical passwords, but upon experiencing the mechanism we see opportunities for more inclusive authentication.
- Published
- 2021
14. Understanding Users Through Three Types of Personas
- Author
-
Nielsen, Lene, Larusdottir, Marta, Larsen, Lars Bo, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
IT professionals ,User stories ,Personas ,Case study ,Workshops ,Persona user stories - Abstract
To integrate UX practices in agile development is not straight forward. IT professionals struggle with integrating UX practices mainly due to lack of resources or knowledge. Additionally, it is hard to find the right timing for the UX activities and often the focus is on delivering functionality and not on understanding the users. Integrating the personas method in agile development has been suggested to extend the understanding of the real users by the IT professionals. However, studies show that the integration of personas can fail. Through interviews with IT professionals we investigate how to better the odds of a successful implementation of the persona method in agile development. The result shows that several factors have an impact on the implementation of the method. Personas is a suggested method to extend IT professionals' understanding of users and users’ needs. A common advantage expressed is that personas extend the IT professionals’ empathy for the users, but a disadvantage is that personas are typically defined at the start of a software project and gradually are forgotten, since there is little reference to the personas through the software development project. In this paper we report experiences of coaching IT professionals in defining agile user stories based on personas, called: Persona User Stories (PUS). The aim of these workshops, was to extend the usage of personas and thereby extend the IT professionals’ understanding of their users. In a research project with three companies, we coached teams of IT professionals in three-hour workshops with 76 participants in total. The workshops were conducted at each company using personas already defined by the IT professionals. The persona descriptions were based on three types of information: (a) assumptions, (b) secondary research, and (c) data specific to a project. Our findings show that personas based on assumptions result in the participants questioning the description of the personas and having difficulties in understanding the personas. For making the persona user stories (PUS), the participants used themselves more often as a reference when working with the assumption based personas, than the participants using the other two types of personas.
- Published
- 2021
15. E-Scooter Sustainability - A Clash of Needs, Perspectives, and Experiences
- Author
-
Kjærup, Maria, Skov, Mikael B., van Berkel, Niels, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Mobility ,Sustainability ,E-scooters ,Transportation - Abstract
Electric stand-up scooters (e-scooters) are introduced in several cities worldwide, providing new means for people to travel around the city. While praised for their flexibility, e-scooters are also met with negative sentiments due to fatal accidents and chaotic parking. In this paper, we seek to understand the mobility of shared e-scooters and point to gaps in the user interaction between the digital and physical world. We carried out three data collections, including interviews, in situ observation, analysis of news media coverage. Our findings illustrate integration with alternate modes of transportation in urban context, and how technologies facilitate or hinder (micro-) mobility. We found that users of e-scooters primarily view these devices as an alternative to walking rather than other transportation forms. Additionally, we found that users’ and non-users’ needs, perspectives and experiences of e-scooters clash, in particular with regard to perceptions of sustainability. Based on these findings, we present three relevant perspectives of sustainability, extending the ongoing debate of sustainable HCI research. We contribute with an empirically supported understanding of the perception of mobility and sustainability for e-scooters in a Scandinavian urban context.
- Published
- 2021
16. Focus, Structure, Reflection! Integrating User-Centred Design and Design Sprint
- Author
-
Roto, Virpi, Larusdottir, Marta, Lucero, Andrés, Stage, Jan, Šmorgun, Ilja, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Interaction design ,User-Centred Design ,Higher education ,Course development ,Design sprint - Abstract
Google Design Sprint (GDS) is becoming a valued tool for interaction design practitioners today. Although GDS has some similarities to User-Centred Design (UCD), it does not study user needs before generating solutions. On the other hand, UCD provides little guidance on producing design solutions. We saw the two processes would nicely complement each other. This paper reports development of an intensive two-week interaction design course where UCD was combined with GDS. The feedback from 22 higher education students indicates how UCD helped them to keep the focus on the important things, and how the detailed structure of GDS process guided them fast forward. In the fast-paced Design Sprint, students need dedicated time for reflection. The contributions of this work include the course structure for teaching a User-Centred Design Sprint process, student feedback on the new process, and recommendations for teaching such a course.
- Published
- 2021
17. Exploring User Requirements for an Exoskeleton Arm Insights from a User-Centered Study with People Living with Severe Paralysis
- Author
-
Kobbelgaard, Frederik Victor, Kanstrup, Anne Marie, Struijk, Lotte N. S. Andreasen, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Exoskeleton ,Tetraplegia ,Paralysis ,User-centered ,Assistive technologies ,Participatory design - Abstract
It is recognised that assistive technology plays an active role in empowering individuals who live with severe paralysis. Exoskeleton (exo) technology is a promising emerging assistive technology—a wearable robot designed to support the functions of the human body. However, an exoskeleton is a complex technology, and the successful design of exoskeletons depends heavily on the ability to integrate this type of robot in the environments of future users. In this paper, we present insights into user requirements produced through a qualitative study involving adults living with one of the most severe forms of paralysis: tetraplegia, or paralysis from the neck down. The study is based on two iterations of interviews conducted in the homes of future users. The study identifies key user requirements and contextual factors that are important for user acceptance of future exo design. We discuss how to integrate these findings in the design of an exo prototype of an exoskeleton arm targeted at people living with tetraplegia.
- Published
- 2021
18. Introducing Asynchronous Remote Usability Testing in Practice:An Action Research Project
- Author
-
Pedersen, Jonna Helene Holm, Sørensen, Malene, Stage, Jan, Høegh, Rune Thaarup, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Methods for HCI ,Remote asynchronous usability evaluation ,Usability evaluation ,Action research - Abstract
Asynchronous remote usability testing is a usability evaluation method where users and evaluators are separated both in time and space, and users are directly involved in producing the evaluation results. This paper reports from an action research project on introduction of asynchronous remote usability testing in the IT organization of a bank. The IT organization had extensive experience with traditional usability evaluation but was interested in introducing asynchronous remote usability testing into their repertoire of evaluation methods. The project was initiated with an intensive two-month collaboration followed by a six-month maturation phase. The process of introducing the method and the motivations of the IT organization for introducing the method are described in detail. The findings indicate that the conceptual understanding of usability evaluation and the engagement of the users are crucial for the outcome of the evaluation, and the tool and materials used for the evaluation was an obstacle for high-quality results.
- Published
- 2021
19. Interaction Initiation with a Museum Guide Robot: From the Lab into the Field
- Author
-
Daczo, Laura-Dora, Kalova, Lucie, Bonita, Kresta Louise Febro, Domenech Lopez, Marc, Rehm, Matthias, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Cross-Cultural Comparison ,Human Robot Interaction ,Field study - Abstract
The use of social robots is making its way into public spacessuch as schools and museums. In this paper we investigate initiation ofinteraction between a museum guide robot and visitors. First, we conducteda lab experiment, based on a previous Japanese study, whichconfirmed that participants prefer the robot with appropriate greetingbehavior to the robot without. Thus, we concluded that the results obtainedin the original study can be applied in the Danish cultural context.Based on these findings, we conducted a field study in a Danish museumto evaluate whether the same principles apply in the wild and to investigatespatial behavior between robot and visitors in real world settings.
- Published
- 2021
20. The Controversy of Responsibility and Accountability When Maintaining Automatic External Defibrillators:Infrastructuring Lifesaving Technology with an IoT Solution
- Author
-
Christensen, Oliver Rønn, Sørensen, Signe Helbo Gregers, Persson, Anne Stouby, Kanstrup, Anne Marie, Mannov, Adrienne, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Infrastructure ,IoT ,Health ,Ethnography ,Public automated external defibrillators - Abstract
This paper contributes to HCI with a foundation for exploring ways in which an Internet of Things (IoT) solution can support the maintenance of public automated defibrillators (AEDs) sustainably. AED is a critical lifesaving technology installed in non-medical environments. The technology places enormous demands on public engagement for its use and maintenance. Insights into how medical technology is maintained in non-medical environments can complement current innovations in lifesaving technology. This ethnographic study investigates the complexity around an IoT solution to remedy breakdowns in the maintenance of AEDs in a Danish context. We conceptualize maintenance as infrastructuring and identify how the diverse field of actors around an AED entails technical but primarily social dimensions revealing a controversy of responsibility and accountability. This article recommends that when developing an IoT solution for maintaining AEDs, technical, social, political, and ethical dimensions should be considered to address responsibility and accountability issues.
- Published
- 2021
21. Intention Recognition in Human Robot Interaction Based on Eye Tracking
- Author
-
Cubero, Carlos Gomez, Rehm, Matthias, Ardito, Carmelo, Lanzilotti, Rosa, Malizia, Alessio, Petrie, Helen, Piccinno, Antonio, Desolda, Giuseppe, and Inkpen, Kori
- Subjects
Human Robot Interaction ,Eye Tracking ,intention prediction - Abstract
In human robot interaction any input that might help the robot to understand the human behaviour is valuable, and the eyes and their movement undoubtedly hold valuable information. In this paper we propose a novel algorithm for intention recognition using eye tracking in human robot collaboration. We first explore how the Cascade Effect hypothesis and a LSTM-based machine learning model perform to classifyintent from gaze. Second, an algorithm is proposed, which can be usedin a real time interaction to infer intention from the human user with a small uncertainty. A data collection with 30 participants was conducted in virtual reality to train and test the algorithm. The algorithm allowsto detect the user intention up to 2 seconds before any user action with a success rat of up to 75%. These results open the possibility to study human robot interaction, where the robot can take the initiative based on the intention recognition.
- Published
- 2021
22. A Generic Multimodels-Based Approach for the Analysis of Usability and Security of Authentication Mechanisms
- Author
-
Kimmo Halunen, Célia Martinie, Marco Winckler, Nicolas Broders, Philippe Palanque, Interactive Critical Systems (IRIT-ICS), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Toulouse Mind & Brain Institut (TMBI), Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT), Scalable and Pervasive softwARe and Knowledge Systems (Laboratoire I3S - SPARKS), Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (1965 - 2019) (UNS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA), Web-Instrumented Man-Machine Interactions, Communities and Semantics (WIMMICS), Inria Sophia Antipolis - Méditerranée (CRISAM), Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Scalable and Pervasive softwARe and Knowledge Systems (Laboratoire I3S - SPARKS), COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Laboratoire d'Informatique, Signaux, et Systèmes de Sophia Antipolis (I3S), VTT Technical Research Centre of Finland (VTT), IFIP : international federation for information processing, Bernhaupt, Regina, Ardito, Carmelo, Sauer, Stefan, Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Nice Sophia Antipolis (... - 2019) (UNS), and COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-COMUE Université Côte d'Azur (2015-2019) (COMUE UCA)-Centre National de la Recherche Scientifique (CNRS)-Université Côte d'Azur (UCA)-Université Nice Sophia Antipolis (... - 2019) (UNS)
- Subjects
Authentication ,Security function ,Computer science ,Mechanism (biology) ,business.industry ,Usability ,020206 networking & telecommunications ,020207 software engineering ,02 engineering and technology ,Computer security ,computer.software_genre ,Task (project management) ,Order (exchange) ,0202 electrical engineering, electronic engineering, information engineering ,Security ,[INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC] ,Dimension (data warehouse) ,Representation (mathematics) ,business ,computer ,Tasks descriptions - Abstract
International audience; Authentication is a security function, added on top of an interactive system, whose role is to reduce organizations and users’ risks to grant access to sensitive data or critical resources to unauthorized users. Such a security function interfere with users’ goals and tasks by adding articulatory activities, which affect each dimension of usability. In order to mitigate their negative effect on usability, security functions must be designed following a User Centered Approach. In order to ensure their efficiency in terms of security, security processes have to be followed. With this respect, this paper focuses on the representation of user tasks (using task modelling techniques) to be performed during authentication. For security aspects, we propose the use of an approach called “attack trees” which represents threats and their effect. To integrate both aspects in a single framework, we propose an extended task modelling technique that is able to represent explicitly security threats and their potential effect together with users’ tasks performed during authentication. We show how such models can be used to compare the usability and the security of different authentication mechanisms and to make explicit conflicts between these properties. We exemplify the use of the approach on two sophisticated authentication mechanisms demonstrating its applicability and its usefulness for representing and assessing in a single framework, usability and security of these security mechanism.
- Published
- 2020
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.