scholarly journals Three Level Based Security for Improvised User Privacy in Human Computer Interaction

Privacy can be a key aspect of the user experience with computers, online systems, and new technologies. Knowing what to consider about users and their views of computer systems can only improve privacy mechanism. Human Computer Interaction (HCI) is the sub field of Computer Science that studies how people interact with and through computational technologies. In this paper, a three-level model-based approach is provided for the end user privacy in the human computer interaction as the end user’s privacy in the area of HCI is emerging as critical design element for interacting systems in areas as diverse as e-commerce, health care, office work, personal communications etc. The data privacy of end user as well as the resource access privacy is needed to be considered. As of now, no proper solution exists for all types of interface users which is a major privacy issue. Hence, to provide the end users, their personal data protection as well as the resource access security, this paper focuses on analyzing and developing the theory of technological acceptance related to user privacy

Author(s):  
Francisco António Barreto Fernandes ◽  
Bernabé Hernandis Ortuño

The increasing advance of the new technologies applied in the retail market, make it common to sell products without the personal contact between seller and buyer, being the registration and payment of the products made in electronic equipment of self-checkout. The large-scale use of these devices forces the consumer to participate in the service process, which was previously done through interaction with the company's employees. The user of the self-checkout system thus performs all the steps of the purchase, from weighing the products, registering them and making the payment. This is seen as a partial employee, whose participation or performance in providing services can be used by the company to improve the quality of its operations (KELLEY, et al 1993). However this participation does not always satisfy the user, and may cause negative experiences related to usability failures. This article presents the results of the evaluation by the users of the self-checkout system. The data were collected in Portugal through a questionnaire to 400 users. The study analyzes the degree of satisfaction regarding the quality and usability of the system, the degree of motivation for its adoption, as well as the profile of the users. Analysis of the sample data reveals that users have basic or higher education and use new technologies very often. They also have a high domain of the system and an easy learning of its use. The reason for using self-checkout instead of the traditional checkout is mainly due to "queues at checkout with operator" and "at the small volume of products". In general, the sample reveals a high degree of satisfaction with the service and with quality, however, in comparative terms, self-checkout is not considered better than operator checkout. The evaluation of the interaction with the self-checkout was classified according to twenty-six attributes of the system. The analysis identifies five groups with similar characteristics, of which two have low scores. "Cancellation of registered articles", "search for articles without a bar code", "manual registration", "bagging area", "error messages", "weight sensor" and “invoice request "are seven critical attributes of the system. The results indicate that the usability analysis oriented to the self-checkout service can be determinant for the user-system interaction. The implications of empirical findings are discussed together with guidelines for future research.Keywords: Interaction Design, Self service, Self-checkout, User evaluation, UsabilityReferencias ABRAHÃO, J., et al (2013). Ergonomia e Usabilidade. 1ª Edição. São Paulo: Blucher. ALEXANDRE, J. W. C., et al (2013). Análise do número de categorias da escala de Likert aplicada à gestão pela qualidade total através da teoria da resposta ao item. In: XXIII Encontro Nacional de Engenharia de Produção, Ouro Preto. BOOTH, P. (2014). An Introduction to Human-Computer Interaction (Psychology Revivals). London Taylor and Francis. CASTRO, D., ATKINSON, R., EZELL, J., (2010). Embracing the Self-Service Economy, Information Technology and Innovation Foundation. Available at SSRN: http://dx.doi.org/10.2139/ssrn.1590982 CHANG, L.A. (1994). A psychometric evaluation of 4-point and 6-point Likert-type scale in relation to reliability and validity. Applied Psychological Measurement. v. 18, n. 2, p. 05-15. DABHOLKAR, P. A. (1996). Consumer Evaluations of New Technology-based Self-service Options: An Investigation of Alternative Models of Service Quality. International Journal of Research in Marketing, Vol. 13, pp. 29-51. DABHOLKAR, P. A., BAGOZZI, R. P. (2002). An Attitudinal Model of Technology-based Selfservice: Moderating Effects of Consumer Traits and Situational Factors. Journal of the Academy of Marketing Science, Vol. 30 (3), pp. 184-201. DABHOLKAR, P. A., BOBBITT, L. M. & LEE, E. (2003). Understanding Consumer Motivation and Behavior related to Self-scanning in Retailing. International Journal of Service Industry Management, Vol. 14 (1), pp. 59-95. DIX, A. et al (2004). Human-Computer Interaction. Third edition. Pearson/Prentice-Hall. New York. FERNANDES, F. et al, (2015). Do Ensaio à Investigação – Textos Breves Sobre a Investigação, Bernabé Hernandis, Carmen Lloret e Francisco Sanmartín (Editores), Oficina de Acción Internacional - Universidade Politécnica de Valência Edições ESAD.cr/IPL, Leiria. HELANDER, M., LANDAUER, T., PRABHU, P. (1997). Handbook of Human – Computer Interaction. North–Holland: Elsevier. KALLWEIT, K., SPREER, P. & TOPOROWSKI, W. (2014). Why do Customers use Self-service Information Technologies in Retail? The Mediating Effect of Perceived Service Quality. Journal of Retailing and Consumer Services, Vol. 21, pp. 268-276. KELLEY SW, HOFFMAN KD, DAVIS MA. (1993). A typology of retail failures and recoveries. J Retailing. 69(4):429 – 52. 


Author(s):  
Maya Reslan ◽  
Emily M. Hastings ◽  
Michael P. Brundage ◽  
Thurston Sexton

Even as maintenance evolves with new technologies, it is still a heavily human-driven domain; multiple steps in the maintenance workflow still require human expertise and intervention. Various maintenance activities require multiple maintainers, all with different skill sets and expertise, and from various positions and levels within the organization. Responding to maintenance requests, training exercises, or executing larger maintenance projects all can require maintenance teams. Having the correct assortment of individuals both in terms of skills and management experience can help improve the efficiency of these maintenance tasks. This paper presents a workflow for creating teams of maintainers by adapting accepted practices from the human-computer interaction (HCI) community. These steps provide a low-cost solution to help account for the needs of maintainers and their management, while matching skills of the maintainers with the needs of the activity.


Author(s):  
Juan C. Olivares-Rojas ◽  
Enrique Reyes-Archundia ◽  
José A. Gutiérrez-Gnecchi ◽  
Ismael Molina-Moreno ◽  
J. Guadalupe Ramos-Díaz ◽  
...  

New technologies associated with the fourth industrial revolution are transforming the world in which we live, and the power grid is no exception since it has been provided with intelligence. One of its best-known applications is smart metering systems that allow real-time energy consumption/production to be known, as well as other benefits such as outages and reconnections automatically. The new generations of smart meters have more computing capacity allowing new applications. This work shows some considerations in the design of smart meters using human-computer interaction techniques. The results aim to improve the end-user’s experience and satisfaction and can help to mitigate the reluctance to use smart metering systems in Mexico.;


2019 ◽  
Vol 10 (2) ◽  
pp. 6-19
Author(s):  
Cinthia Obladen De Almendra Freitas ◽  
Giovanna Michelato Almada

The development of new technologies often arouses discussions concerning privacy rights. Consequently, when the Internet became popular and worldwide spread, user privacy concerns also began to arise. Therefore, with the emergence of the information society, the notion of user privacy became variable and has changed over time and according to the region. Consequently, its concept has been modified over the decades too. In 1890, privacy was defined as the right to be left alone. As time passed, the idea of privacy has changed and has become more and more multifaceted, as a reflection of intrinsic aspects of the society. Even with the volatility of this concept, privacy is a fundamental right, as well as essential for a citizen to use the Internet properly. Although it is a fundamental right, people tend to give up on their privacy because of functionalities on the Internet or exchange it for small rewards. However, users often do not have the knowledge about the exchanges or violations. In order to solve some of the Internet data privacy issues, Libertarian Paternalism may be used. Different researches were conducted by applying this theory in the data privacy sphere. By using nudges, it is possible to help people choose wisely how to protect privacy, or at least to give them the right amount of information and guide users to the best option.


Author(s):  
Rod Farmer ◽  
Paul Gruba

Designing usable web-based interfaces challenges practitioners to carefully consider end-user behaviour and requirements. Unfortunately, in meeting this challenge, human-computer interaction task analysis is often poorly understood and applied during web design activities. Rather than purely evaluating usability against prescriptive guidelines, we argue that designing for web-based interaction requires a more holistic and descriptive approach. This chapter provides an overview of cognitive and postcognitive human-computer interaction task analysis frameworks, and their respective abilities to capture a systemic view of stakeholder requirements. As such, this chapter provides a valuable resource for researchers and practitioners alike.


Sign in / Sign up

Export Citation Format

Share Document