scholarly journals Engaging end-user driven recommender systems: personalization through web augmentation

Author(s):  
Martin Wischenbart ◽  
Sergio Firmenich ◽  
Gustavo Rossi ◽  
Gabriela Bosetti ◽  
Elisabeth Kapsammer

Abstract In the past decades recommender systems have become a powerful tool to improve personalization on the Web. Yet, many popular websites lack such functionality, its implementation usually requires certain technical skills, and, above all, its introduction is beyond the scope and control of end-users. To alleviate these problems, this paper presents a novel tool to empower end-users without programming skills, without any involvement of website providers, to embed personalized recommendations of items into arbitrary websites on client-side. For this we have developed a generic meta-model to capture recommender system configuration parameters in general as well as in a web augmentation context. Thereupon, we have implemented a wizard in the form of an easy-to-use browser plug-in, allowing the generation of so-called user scripts, which are executed in the browser to engage collaborative filtering functionality from a provided external rest service. We discuss functionality and limitations of the approach, and in a study with end-users we assess the usability and show its suitability for combining recommender systems with web augmentation techniques, aiming to empower end-users to implement controllable recommender applications for a more personalized browsing experience.

Author(s):  
R. Ryan Nelson ◽  
Peter Todd

Beginning in the early 1980s, end-user computing (EUC) began to permeate organizations following the advent of the personal computer and a host of applications directed at the non-IS professional. Along with EUC came a whole new set of organizational opportunities and risks. Ten years later, the World Wide Web has opened the door to a yet more powerful set of EUC applications capable of reaching well beyond the boundaries of the organization. Indeed, Web technology permits end users to design applications that are immediately accessible by unlimited numbers of people from anywhere in the world. As a result, EUC using Web technology has introduced a whole new set of opportunities and risks for organizations. The purpose of this research is to examine what strategies organizations are using in their attempt to maximize the benefits of the Web for end users while mitigating the inherent risks. To this end, individuals from 12 major organizations were surveyed via the Web. The results indicate that while organizations seem to be doing an adequate job of establishing roles and standards, mechanisms for resource allocation, development management, and maintenance appear to be lacking. In fact, most firms seem to be relying on a monopolist control strategy at this point in time. While such a strategy may be the best approach given the relative infancy of Web technology, it could prove to be an unstable strategy in the long run given the reach, range and flexibility of access that Web technology provides. Organizations are encouraged to take a proactive, formal posture toward EUC development on the Web.


2017 ◽  
Vol 2017 ◽  
pp. 1-28 ◽  
Author(s):  
Gabriela Bosetti ◽  
Sergio Firmenich ◽  
Silvia E. Gordillo ◽  
Gustavo Rossi ◽  
Marco Winckler

The trend towards mobile devices usage has made it possible for the Web to be conceived not only as an information space but also as a ubiquitous platform where users perform all kinds of tasks. In some cases, users access the Web with native mobile applications developed for well-known sites, such as, LinkedIn, Facebook, and Twitter. These native applications might offer further (e.g., location-based) functionalities to their users in comparison with their corresponding Web sites because they were developed with mobile features in mind. However, many Web applications have no native counterpart and users access them using a mobile Web browser. Although the access to context information is not a complex issue nowadays, not all Web applications adapt themselves according to it or diversely improve the user experience by listening to a wide range of sensors. At some point, users might want to add mobile features to these Web sites, even if those features were not originally supported. In this paper, we present a novel approach to allow end users to augment their preferred Web sites with mobile features.We support our claims by presenting a framework for mobile Web augmentation, an authoring tool, and an evaluation with 21 end users.


10.28945/2489 ◽  
2002 ◽  
Author(s):  
Chittibabu Govindarajulu

End-user computing (EUC) has led to increased end-user productivity and satisfaction. In order to reduce the risks inherent to EUC, organizations should better manage EUC. As a first step different groups of end-users must be identified. Existing classification schemes have weaknesses and fail to capture the different roles contemporary end users play. Cotterman and Kumar (1989) proposed a user cube based on the three main dimensions of EUC -development, operation, and control. Even though this is rational approach to end user classification, it has been largely ignored by researchers. This may be due to the lack of an instrument to implement the cube. Hence, in this paper, a 10-item instrument is presented and data collected from 292 end users show that the instrument has strong construct validity. Practitioners can find this instrument very useful in determining the characteristics of EUC in their firms which in turn would be beneficial to devise strategies for EUC management.


Author(s):  
Kimihito Ito ◽  
Yuzuru Tanaka

Web applications, which are computer programs ported to the Web, allow end-users to use various remote services and tools through their Web browsers. There are an enormous number of Web applications on the Web, and they are becoming the basic infrastructure of everyday life. In spite of the remarkable development of Web-based infrastructure, it is still difficult for end-users to compose new integrated tools of both existing Web applications and legacy local applications, such as spreadsheets, chart tools, and database. In this chapter, the authors propose a new framework where end-users can wrap remote Web applications into visual components, called pads, and functionally combine them together through drag-and-drop operations. The authors use, as the basis, a meme media architecture IntelligentPad that was proposed by the second author. In the IntelligentPad architecture, each visual component, called a pad, has slots as data I/O ports. By pasting a pad onto another pad, users can integrate their functionalities. The framework presented in this chapter allows users to visually create a wrapper pad for any Web application by defining HTML nodes within the Web application to work as slots. Examples of such a node include input-forms and text strings on Web pages. Users can directly manipulate both wrapped Web applications and wrapped local legacy tools on their desktop screen to define application linkages among them. Since no programming expertise is required to wrap Web applications or to functionally combine them together, end-users can build new integrated tools of both wrapped Web applications and local legacy applications.


Author(s):  
Chittibabu Govindarajulu ◽  
Bay Arinze

Contemporary end users are more knowledgeable about computing technologies than the end users of the early ’80s. However, many researchers still use the end user classification scheme proposed by Rockart and Flannery (1983) more than two decades ago. This scheme is inadequate to classify contemporary end users since it is based mainly on their knowledge and ignores other crucial dimensions such as control. Cotterman and Kumar (1989) proposed a user cube to classify end users based on the development, operation, and control dimensions of end user computing (EUC). Using this cube, users can be classified into eight distinct groups. In this research, a 10-item instrument is proposed to operationalize the user cube. Such an instrument would help managers to identify the status of EUC in their firms and to take appropriate action. Based on the data collected from 292 end users, the instrument was tested for construct, convergent, and discriminant validities. Researchers can use this instrument to study the interaction between constructs such as development and control with end user computing satisfaction (EUCS).


2019 ◽  
Vol 2019 ◽  
Author(s):  
Marijn Martens ◽  
Ralf De Wolf ◽  
Bettina Berendt ◽  
Lieven De Marez

Increasingly, algorithms play an important role in everyday decision-making processes. Recommender systems, specifically, are algorithms that serve to influence end-users’ decision-making (e.g. what to read, who to befriend, who to rent to…). However, the companies that develop and produce these systems are not neutral, but have an economic goal and specific vision on how society should operate. These algorithms should thus never be trusted blindly. An algorithm consists of collective human practices and consequently warm human and institutional choices. Therefore, they should be perceived as culture. Despite the many academics that are joining the debate to denounce the bias, opaqueness and unfairness often found in these algorithms, little empirical research has invested in treating algorithms in its socio-technical assembly as culture. To better understand how end-users perceive these algorithmic systems, we strive to understand how they imagine and (dis)trust the different components of the socio-technical assembly. We are demystifying the imagined processes incorporated in these algorithmic systems in the minds of the end-user using a deconstructed version of Buchers’ (2017) algorithmic imaginary. Currently, companies put ever more effort into personalizing news, using news recommender systems (NRS). NRS organize, select and aggregate news to influence the decision-making of an end-user without a transparent explanation on the process. Therefore, we focus our study on the end-users of these NRS. In this qualitative study, we are interviewing 25 end-users of NRS to understand the assumptions and apprehend the (dis-)trust people have about the different elements of the socio-technical assembly of news recommender systems.


Author(s):  
Peter Hoonakker ◽  
Nis Bornoe ◽  
Pascale Carayon

Considering that many organizations today are extremely dependent on information technology, computer and information security (CIS) has become a critical concern from a business viewpoint. CIS is concerned with protecting the confidentiality, integrity, accessible information, when using computer systems. Much research has been conducted on CIS in the past years. However, the attention has been primarily focused on technical problems and solutions. Only recently, the role of human factors in CIS has been recognized. End-user behavior can increase the vulnerability of computer and information systems. In this study, using a large questionnaire survey among endusers, we examine password behavior of end-users.


2016 ◽  
Vol 2 ◽  
pp. e91 ◽  
Author(s):  
Tak Yeon Lee ◽  
Benjamin B. Bederson

End-user programming (EUP) is a common approach for helping ordinary people create small programs for their professional or daily tasks. Since end-users may not have programming skills or strong motivation for learning them, tools should provide what end-users want with minimal costs of learning –i.e., they must decrease the barriers to entry. However, it is often hard to address these needs, especially for fast-evolving domains such as the Web. To better understand these existing and ongoing challenges, we conducted two formative studies with Web users –a semi-structured interview study, and a Wizard-of-Oz study. The interview study identifies challenges that participants have with their daily experiences on the Web. The Wizard-of-Oz study investigates how participants would naturally explain three computational tasks to an interviewer acting as a hypothetical computer agent. These studies demonstrate a disconnect between what end-users want and what existing EUP systems support, and thus open the door for a path towards better support for end user needs. In particular, our findings include: (1) analysis of challenges that end-users experience on the Web with solutions; (2) seven core functionalities of EUP for addressing these challenges; (3) characteristics of non-programmers describing three common computation tasks; (4) design implications for future EUP systems.


Author(s):  
Oleg Davidyuk ◽  
Valérie Issarny ◽  
Jukka Riekki

Activity-oriented computing (AOC) is a paradigm promoting the run-time realization of applications by composing ubiquitous services in the user’s surroundings according to abstract specifications of user activities. The paradigm is particularly well-suited for enacting ubiquitous applications. However, there is still a need for end-users to create and control the ubiquitous applications because they are better aware of their own needs and activities than any existing context-aware system could ever be. In this chapter, we give an overview of state of the art ubiquitous application composition, present the architecture of the MEDUSA middleware and demonstrate its realization, which is based on existing open-source solutions. On the basis of our discussion on state of the art ubiquitous application composition, we argue that current implementations of the AOC paradigm are lacking in end-user support. Our solution, the MEDUSA middleware, allows end-users to explicitly compose applications from networked services, while building on an activity-oriented computing infrastructure to dynamically realize the composition.


Author(s):  
Amruth Nag ◽  
Sowmya M S

Deceptive download buttons are those on the internet which may look like it is meant to do an action but actually does something else which it is not intended by the user. Drive-by installations are those extra software which is installed in a user's device without him noticing it. This paper gives the information about the types of deceptive download buttons and the ways a common user can avoid clicking on such button while browsing the web. A few methods the advertiser may commonly use for making the end user a victim of the deceptive download buttons is discussed here. The methods by which someone can avoid these kinds of buttons are also given in this paper. An idea for the development of an extension to the user's browser, that runs in the background. This warns the user about those buttons prior to the button being clicked. This paper also includes information about drive-by installations of bloatware and the ways in which the end users are being affected by this, how the end user can avoid being a victim of drive-by installations and an idea to develop a tool which runs in the background as a small script in the operating system which will automatically warn the user about the drive-by installations.


Sign in / Sign up

Export Citation Format

Share Document