HCI Bibliography Home | HCI Conferences | CHIMIT Archive | Detailed Records | RefWorks | EndNote | Hide Abstracts
CHIMIT Tables of Contents: 0708091011

Proceedings of the 2010 Symposium on Computer Human Interaction for the Management of Information Technology

Fullname:Proceedings of the 2010 Symposium on Computer Human Interaction for the Management of Information Technology
Editors:Adam Moskowitz; Nicole Forsgren; Tamara Babaian; Konstantin Beznosov
Location:San Jose, California
Dates:2010-Nov-12 to 2010-Nov-13
Standard No:ISBN: 1-4503-0447-8, 978-1-4503-0447-4; ACM DL: Table of Contents hcibib: CHIMIT10
Links:Conference Home Page
People frames: the social construction of information systems BIBAFull-Text 1
  D. B. le Roux; G. P. le Roux
The management of IT involves the thoughtful consideration of the management of stakeholders' knowledge as information system success depends upon synergy between human and technical systems. In this paper particular attention is paid to the notion of frames, or frames of reference, held by the stakeholders of information systems and their effects on system adoption and use. A qualitative study is performed in the context of an engineering firm's adoption of a commercial ERP package. Findings suggest that besides frames of technology, the beliefs and perceptions that stakeholders have of each other influence their utilization of technological artifacts and influence the operation of information systems.
Principles for applying social navigation to collaborative systems BIBAFull-Text 2
  Min Wu; C. Travis Bowles
This paper proposes that social navigation can solve many of the challenges facing user experience in collaborative systems. Three key values and three phases of design for social navigation support are identified. The values of social navigation support in collaboration are: discovery of new features; predicting the consequence of certain actions and decisions based on what other people have done previously; and conveying cultural context to meet the expectations of other members of the collaborative space. The phases are: collection of what other people have done; evaluation of consequences about the actions and decisions users can make; and presentation of the appropriate information to help the user with the best decision. The paper outlines how each value can be maximized through design at each phase. Examples are provided to illustrate that social navigation is ready to be integrated into collaboration tools to improve overall usability.
Filter-based access control model: exploring a more usable database management BIBAFull-Text 3
  Nachi Ueno; Ryota Hashimoto; Hisaharu Ishii; Hiroyuki Makino; Yuzuru Kitayama
In this study, we tested the usability of database management software for end-users. To improve the usability, novel concept Filter based Access Control model (FBAC) and FBAC UI have been developed. We conducted a user test and analyzed the results. In the test, 40 users tried to solve two tasks: 20 used Role based Access Control Model (RBAC) UI, and the rest FBAC UI. In the results, almost no RBAC UI users could complete the tasks, but users who used FBAC completed 40%.
Johnny can drag and drop: determining user intent through traditional interactions to improve desktop security BIBAFull-Text 4
  Patrick F. Wilbur; Todd Deshane
In this paper, we identify the primary difficulties encountered when security systems include users in the decision-making process. We propose security system inquiry mechanisms, designed around file open dialogs and drag-and-drop interfaces, to increase the accuracy of information obtained from users while also maintaining a high level of user inclusiveness in security decisions. We note that, although it has been previously shown that many users are inherently bad at making final security decisions, useful information regarding user intent can be accurately obtained by using our inquiry mechanisms. In particular, inquiry mechanisms that parallel the actions within applications the user actually intends to perform prompt the user in ways that are understandable and likely to receive accurate responses. We discuss how our system eliminates the traditional problems faced in security systems due to false positives and false negatives.
A collaborative ontology development tool for information security managers BIBAFull-Text 5
  John C. Mace; Simon Parkin; Aad van Moorsel
This paper explores the need for a collaborative development tool to allow information security experts to capture their interrelated knowledge in an ontology. Such a tool would enable organisations to make more informed security policy decisions around shared security issues. However, population of ontologies can be time-consuming and error-prone, and current collaborative ontology editing tools require a familiarity with ontology concepts. We present a Web-oriented tool which simplifies ontology population for information security experts, allowing them to develop ontology content without the need to understand ontology concepts. To understand how organisations manage information security knowledge within policies, we consulted two information security managers in large organisations. The Web-Protégé collaborative ontology editor was then modified to create a tool with an appropriate knowledge ontology structure that meets their requirements. The same information security managers then evaluated the tool, judging it to be accessible and potentially useful in policy decision-making.
Towards a task oriented method for accessing network based services BIBAFull-Text 6
  Nils Pedersen; Paul Clark; Martine Freiberger
Today's networked users are required to configure a number of different network settings on their computer in order to access specific network based services. For example, these users need to know whether to enable a Virtual Private Network (VPN) tunnel and, in some cases, also select the appropriate wireless network. As more sophisticated security models are incorporated into networks, the user's task in managing these settings will become more complex.
   This paper describes a design which simplifies the task of accessing network based services using a more user oriented, less technology centric task flow.
Transparent collaboration: letting users simulate another user's world BIBAFull-Text 7
  C. Travis Bowles; Min Wu
While trying to learn how to use current collaboration systems, users face many challenges, including difficulty trying out new features and experimenting without their actions affecting other users. This paper proposes an innovative approach to solve these problems by simulating the collaboration system. In this simulated environment, a user can: confirm the effect of certain actions on other people before performing the actions; check what information can be accessed by other users; and interact as another user to see if the user can perform tasks as expected. By simulating the collaboration with more than one person simultaneously, a user can test synchronous communication features using a single account. Integrating this solution into the current collaboration environment will improve the usability of collaboration software, and reduce users' reliance on administrators to support their collaboration interactions.