View and Share

2010 ◽  
Vol 2 (3) ◽  
pp. 15-30 ◽  
Author(s):  
Andrew Greaves ◽  
Enrico Rukzio

Co-present viewing and sharing of images on mobile devices is a popular but very cumbersome activity. Firstly, it is difficult to show a picture to a group of friends due to the small mobile phone screen and secondly it is difficult to share media between multiple friends, e.g., when considering Bluetooth usage and technical limitations, limited input and repeated user interactions. This paper introduces the View & Share system which allows mobile phone users to spontaneously form a group and engage in the viewing and sharing of images. A member of the group has a personal projector (e.g., projector phone) which is used to view pictures collaboratively. View & Share supports sharing with a single user, multiple users or all users, allows members to borrow the projected display and provides a private viewing mode between co-located users. This paper reports on the View & Share system, its implementation and an explorative user study with 12 participants showing the advantages of our system and user feedback.

Author(s):  
Andrew Greaves ◽  
Enrico Rukzio

Co-present viewing and sharing of images on mobile devices is a popular but very cumbersome activity. Firstly, it is difficult to show a picture to a group of friends due to the small mobile phone screen and secondly it is difficult to share media between multiple friends, e.g., when considering Bluetooth usage and technical limitations, limited input and repeated user interactions. This paper introduces the View & Share system which allows mobile phone users to spontaneously form a group and engage in the viewing and sharing of images. A member of the group has a personal projector (e.g., projector phone) which is used to view pictures collaboratively. View & Share supports sharing with a single user, multiple users or all users, allows members to borrow the projected display and provides a private viewing mode between co-located users. This paper reports on the View & Share system, its implementation and an explorative user study with 12 participants showing the advantages of our system and user feedback.


Safety ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 17
Author(s):  
Miroslava Mikusova ◽  
Joanna Wachnicka ◽  
Joanna Zukowska

The topic of the use of mobile devices and headphones on pedestrian crossings is much less explored in comparison to the use of the mobile phone while driving. Recent years have seen many discussions on this issue, especially in foreign countries. The Slovak Republic, however, has not been giving it enough attention (and it is not mentioned in the National Road Safety Plan for the Slovak Republic from 2011 to 2020). This paper aims to draw attention to this issue. It presents basic outputs of a pilot study on pedestrian safety, with a focus on the use of mobile devices and headphones at selected non-signalized pedestrian crossings in three Slovak cities. Overall, 9% of pedestrians used headphones or mobile devices at observed pedestrian crossings (4% of them used headphones, 1% used headphones and at same time used their mobile phone, 2% made phone calls and 2% used their mobile phones). While these numbers can be considered relatively low, the study proved that during weekdays every 2 min someone was using the crossing without fully focusing on crossing the road safely. Another main finding was that although the safety risk at pedestrian crossings is increased by factors such as rush hour traffic or reduced visibility, pedestrian behavior related to the use of mobile phones and headphones does not change. A safety assessment was also carried out at the crossings. The results show that pedestrian behavior is not affected by the level of safety of the crossing (e.g., visibility of the crossing for drivers). The results of the presented analysis suggest that action is needed to change that. Due to the lack of information about accidents involving pedestrians using mobile phones and headsets when crossing the road, no relevant statistical data could be analyzed. The dataset collected can be used as a basis for further investigation or comparisons with other countries of the relevant indicators. In future work, we would like to include a pedestrian–driver interaction factor focusing on driver speed behavior in relation to pedestrians (who are on or are about to step onto a pedestrian crossing) and identify critical situations caused by improper behavior of drivers and/or pedestrians. This will help to understand speed adjustment problems related to pedestrian crossings.


2021 ◽  
Vol 16 (1) ◽  
pp. 21
Author(s):  
Chung-Yi Hou ◽  
Matthew S. Mayernik

For research data repositories, web interfaces are usually the primary, if not the only, method that data users have to interact with repository systems. Data users often search, discover, understand, access, and sometimes use data directly through repository web interfaces. Given that sub-par user interfaces can reduce the ability of users to locate, obtain, and use data, it is important to consider how repositories’ web interfaces can be evaluated and improved in order to ensure useful and successful user interactions. This paper discusses how usability assessment techniques are being applied to improve the functioning of data repository interfaces at the National Center for Atmospheric Research (NCAR). At NCAR, a new suite of data system tools is being developed and collectively called the NCAR Digital Asset Services Hub (DASH). Usability evaluation techniques have been used throughout the NCAR DASH design and implementation cycles in order to ensure that the systems work well together for the intended user base. By applying user study, paper prototype, competitive analysis, journey mapping, and heuristic evaluation, the NCAR DASH Search and Repository experiences provide examples for how data systems can benefit from usability principles and techniques. Integrating usability principles and techniques into repository system design and implementation workflows helps to optimize the systems’ overall user experience.


2012 ◽  
pp. 189-198
Author(s):  
Jeongyoon Lee ◽  
R. Karl Rethemeyer

The recent boom in the use of smartphones has led to an expansion of the concept of cyber behavior to include nearly perpetual virtual contact through mobile devices. This chapter addresses the issue of mobile cyber behavior by identifying key dimensions of virtual interactions through smartphones. While most prior studies focused on mobile technology from a technical perspective, this article takes a sociotechnical perspective, focusing on aspects of human behavior in the context of a new technical system (i.e., smartphones). The authors’ review of this literature suggests that mobile phone cyber behavior develops along three primary dimensions – the “3Cs” of: contextualization, customization, and convenience.


Author(s):  
Maulik Desai ◽  
Swati Jaiswal

Mobile devices have upgraded from normal java-based phones whose basic functionality was calling, messaging, and storing contact information to a more adaptive operating system like Symbian, iOS, and Android, which have smart features like e-mail, audio player, camera, etc. Gradually, everyone started relying more and more on these mobile devices. This led to an increase in the number of cell phone hackers. Common ways that a hacker gets access to your phone is via phishing, shoulder surfing, piggybacking, etc. There are countermeasures to this like bookmarking your most visited sites, using VPN, using encryption algorithms. Data theft and identity theft are a new concern for today's user; this chapter is to educate the end user of different ways in which their privacy can be invaded via a mobile phone. This chapter will help the researchers to know the mindset of a cell phone hacker and what are the potential damages that can be caused by them and strategies to prevent them.


Author(s):  
Youssef Gahi ◽  
Imane El Alaoui ◽  
Mouhcine Guennoun

Database-as-a-service (DBaaS) is a trend allowing organizations to outsource their databases and computations to external parties. However, despite the many advantages provided by this service in terms of cost reduction and efficiency, DBaaS raises many security issues regarding data privacy and access control. The protection of privacy has been addressed by several research contributions proposing efficient solutions such as encrypted databases and blind queries over encrypted data, called blind processing. In this latter context, almost all proposed schemes consider an architecture of a single user (the data owner) that requests the database server for encrypted records while he is the only one capable of decrypting. From a practical perspective, a database system is set up to support not only a single user but multiple users initiating multiple queries. However, managing various accesses to an encrypted database introduces several challenges by itself, like key sharing, key revocation, and data re-encryption. In this article, we propose a simple and efficient blind processing protocol that allows multiple users to query the same encrypted data and decrypt the retrieved results without getting access to the secret key.


Author(s):  
Adam Grzywaczewski ◽  
Rahat Iqbal ◽  
Anne James ◽  
John Halloran

Users interact with the Internet in dynamic environments that require the IR system to be context aware. Modern IR systems take advantage of user location, browsing history or previous interaction patterns, but a significant number of contextual factors that impact the user information retrieval process are not yet available. Parameters like the emotional state of the user and user domain expertise affect the user experience significantly but are not understood by IR systems. This article presents results of a user study that simplifies the way context in IR and its role in the systems’ efficiency is perceived. The study supports the hypothesis that the number of user interaction contexts and the problems that a particular user is trying to solve is related to lifestyle. Therefore, the IR system’s perception of the interaction context can be reduced to a finite set of frequent user interactions.


2011 ◽  
Vol 3 (2) ◽  
pp. 65-74 ◽  
Author(s):  
Christian Leichsenring ◽  
René Tünnermann ◽  
Thomas Hermann

Touch can create a feeling of intimacy and connectedness. This work proposes feelabuzz, a system to transmit movements of one mobile phone to the vibration actuator of another one. This is done in a direct, non-abstract way, without the use of pattern recognition techniques in order not to destroy the feel for the other. The tactile channel enables direct communication, i. e. what another person explicitly signals, as well as implicit context communication, the complex movements any activity consists of or even those that are produced by the environment. This paper explores the potential of this approach, presents the mapping use and discusses further possible development beyond the existing prototype to enable a large-scale user study.


Author(s):  
Daniel C. Doolan ◽  
Sabin Tabirca ◽  
Laurence T. Yang

Ever since the discovery of the Mandelbrot set, the use of computers to visualise fractal images have been an essential component. We are looking at the dawn of a new age, the age of ubiquitous computing. With many countries having near 100% mobile phone usage, there is clearly a potentially huge computation resource becoming available. In the past years there have been a few applications developed to generate fractal images on mobile phones. This chapter discusses three possible methodologies whereby such images can be visualised on mobile devices. These methods include: the generation of an image on a phone, the use of a server to generate the image and finally the use of a network of phones to distribute the processing task.


Author(s):  
Mark David Dunlop ◽  
Michelle Montgomery Masters

Text entry on mobile devices (e.g. phones and PDAs) has been a research challenge since devices shrank below laptop size: mobile devices are simply too small to have a traditional full-size keyboard. There has been a profusion of research into text entry techniques for smaller keyboards and touch screens: some of which have become mainstream, while others have not lived up to early expectations. As the mobile phone industry moves to mainstream touch screen interaction we will review the range of input techniques for mobiles, together with evaluations that have taken place to assess their validity: from theoretical modelling through to formal usability experiments. We also report initial results on iPhone text entry speed.


Sign in / Sign up

Export Citation Format

Share Document