HCI Bibliography : Search Results skip to search form | skip to results |
Database updated: 2016-05-10 Searches since 2006-12-01: 32,237,533
director@hcibib.org
Hosted by ACM SIGCHI
The HCI Bibliogaphy was moved to a new server 2015-05-12 and again 2016-01-05, substantially degrading the environment for making updates.
There are no plans to add to the database.
Please send questions or comments to director@hcibib.org.
Query: blythe_j* Results: 11 Sorted by: Date  Comments?
Help Dates
Limit:   
[1] Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors Design and Compliance / Blythe, John M. / Coventry, Lynne / Little, Linda Proceedings of the 2015 Symposium on Usable Privacy and Security 2015-07-22 p.103-122
www.usenix.org/conference/soups2015/proceedings/presentation/blythe
www.usenix.org/system/files/conference/soups2015/soups15-paper-blythe.pdf
Summary: The body of research that focuses on employees' Information Security Policy compliance is problematic as it treats compliance as a single behavior. This study explored the underlying behavioral context of information security in the workplace, exploring how individual and organizational factors influence the interplay of the motivations and barriers of security behaviors. Investigating factors that had previously been explored in security research, 20 employees from two organizations were interviewed and the data was analyzed using framework analysis. The analysis indicated that there were seven themes pertinent to information security: Response Evaluation, Threat Evaluation, Knowledge, Experience, Security Responsibility, Personal and Work Boundaries, and Security Behavior. The findings suggest that these differ by security behavior and by the nature of the behavior (e.g. on- and offline). Conclusions are discussed highlighting barriers to security actions and implications for future research and workplace practice.

[2] EDITED BOOK Handbook of Human Centric Visualization / Huang, Weidong 2014 n.29 p.743 Springer New York
DOI: 10.1007/978-1-4614-7485-2
ISBN: 978-1-4614-7484-5 (print), 978-1-4614-7485-2 (online)
Online Access
== Part I: Visual Communication ==
Visualizing Thought (3-40)
	+ Tversky, Barbara
Gryphon: A 'Little' Domain-Specific Programming Language for Diffusion MRI Visualizations (41-61)
	+ Chen, Jian
	+ Cai, Haipeng
	+ Auchus, Alexander P.
	+ Laidlaw, David H.
Viewing Abstract Data as Maps (63-89)
	+ Gansner, Emden R.
	+ Hu, Yifan
	+ Kobourov, Stephen G.
== Part II: Theory and Science ==
Individual Differences and Translational Science in the Design of Human-Centered Visualizations (93-113)
	+ Green, Tera Marie
	+ Arias-Hernandez, Richard
	+ Fisher, Brian
Evaluating Visualization Environments: Cognitive, Social, and Cultural Perspectives (115-145)
	+ Hundhausen, Christopher D.
On the Prospects for a Science of Visualization (147-175)
	+ Rensink, Ronald A.
== Part III: Principles, Guidelines and Recommendations ==
Toward a Better Understanding and Application of the Principles of Visual Communication (179-201)
	+ Bae, Juhee
	+ Watson, Benjamin
Pep Up Your Time Machine: Recommendations for the Design of Information Visualizations of Time-Dependent Data (203-225)
	+ Kriglstein, Simone
	+ Pohl, Margit
	+ Smuc, Michael
Using Textbook Illustrations to Extract Design Principles for Algorithm Visualizations (227-249)
	+ Velázquez-Iturbide, J. Ángel
== Part IV: Methods ==
Conceptual Design for Sensemaking (253-283)
	+ Blandford, Ann
	+ Faisal, Sarah
	+ Attfield, Simon
An Introduction and Guide to Evaluation of Visualization Techniques Through User Studies (285-313)
	+ Forsell, Camilla
	+ Cooper, Matthew
User-Centered Evaluation of Information Visualization Techniques: Making the HCI-InfoVis Connection Explicit (315-336)
	+ Freitas, Carla M. D. S.
	+ Pimenta, Marcelo S.
	+ Scapin, Dominique L.
Eye Tracking on Visualizations: Progressive Extraction of Scanning Strategies (337-372)
	+ Goldberg, Joseph H.
	+ Helfman, Jonathan I.
Evaluating Overall Quality of Graph Visualizations Indirectly and Directly (373-390)
	+ Huang, Weidong
Visual Analysis of Eye Tracking Data (391-409)
	+ Raschke, Michael
	+ Blascheck, Tanja
	+ Burch, Michael
User Studies in Visualization: A Reflection on Methods (411-426)
	+ Tory, Melanie
== Part V: Perception and Cognition ==
On the Benefits and Drawbacks of Radial Diagrams (429-451)
	+ Burch, Michael
	+ Weiskopf, Daniel
Measuring Memories for Objects and Their Locations in Immersive Virtual Environments: The Subjective Component of Memorial Experience (453-471)
	+ Coxon, Matthew
	+ Mania, Katerina
Human-Centric Chronographics: Making Historical Time Memorable (473-511)
	+ Korallo, Liliya
	+ Davis, Stephen Boyd
	+ Foreman, Nigel
	+ Moar, Magnus
Visualizing Multiple Levels and Dimensions of Social Network Properties (513-525)
	+ McGrath, Cathleen
	+ Blythe, Jim
	+ Krackhardt, David
== Part VI: Dynamic Visualization ==
Adaptive Diagrams: A Research Agenda to Explore How Learners Can Manipulate Online Diagrams to Self-Manage Cognitive Load (529-550)
	+ Agostinho, Shirley
	+ Tindall-Ford, Sharon
	+ Bokosmaty, Sahar
Dynamic Visualisations and Motor Skills (551-580)
	+ Castro-Alonso, Juan Cristobal
	+ Ayres, Paul
	+ Paas, Fred
Dynamic Visualizations: A Two-Edged Sword?  (581-604)
	+ Lowe, Richard K.
Simultaneous and Sequential Presentation of Realistic and Schematic Instructional Dynamic Visualizations (605-622)
	+ Nugteren, Michelle L.
	+ Tabbers, Huib K.
	+ Scheiter, Katharina
	+ Paas, Fred
How Do You Connect Moving Dots? Insights from User Studies on Dynamic Network Visualizations (623-650)
	+ Smuc, Michael
	+ Federico, Paolo
	+ Windhager, Florian
	+ Aigner, Wolfgang
	+ Zenk, Lukas
	+ Miksch, Silvia
== Part VII: Interaction ==
Interaction Taxonomy for Tracking of User Actions in Visual Analytics Applications (653-670)
	+ von Landesberger, Tatiana
	+ Fiebig, Sebastian
	+ Bremm, Sebastian
	+ Kuijper, Arjan
	+ Fellner, Dieter W.
Common Visualizations: Their Cognitive Utility (671-691)
	+ Parsons, Paul
	+ Sedig, Kamran
Distribution of Information Processing While Performing Complex Cognitive Activities with Visualization Tools (693-715)
	+ Parsons, Paul
	+ Sedig, Kamran
Human-Centered Interactivity of Visualization Tools: Micro- and Macro-level Considerations (717-743)
	+ Sedig, Kamran
	+ Parsons, Paul
	+ Dittmer, Mark
	+ Haworth, Robert

[3] Cyber Security Games: A New Line of Risk Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming / Blythe, John M. / Coventry, Lynne Proceedings of the 2012 International Conference on Entertainment Computing 2012-09-26 p.600-603
Keywords: Information security; Behaviour change; Security games
Link to Digital Content at Springer
Summary: Behaviour change is difficult to achieve and there are many models identifying the factors to affect such change but few have been applied in the security domain. This paper discusses the use of serious games to improve the security behaviour of end-users. A new framework, based upon literature findings, is proposed for future game design. The trust and privacy issues related to using serious games for improving security awareness and behaviour are highlighted.

[4] Targeted risk communication for computer security Posters / Blythe, Jim / Camp, Jean / Garg, Vaibhav Proceedings of the 2011 International Conference on Intelligent User Interfaces 2011-02-13 p.295-298
ACM Digital Library Link
Summary: Attacks on computer systems are rapidly becoming more numerous and more sophisticated, and current preventive techniques do not seem able to keep pace. Many successful attacks can be attributed to user errors: for example, while focused on other tasks, users may succumb to 'social engineering' attacks such as phishing or trojan horses. Warnings about the danger of these attacks are often vaguely worded and given long before the dangers are realized, and are therefore too easy to ignore. However, we hypothesize that users are more likely to be persuaded by messages that (1) leverage mental models to describe the dangers, (2) describe particular vulnerabilities that the user may be exposed to and (3) are delivered close in time before the danger may actually be realized. We discuss the design and initial implementation of a system to achieve this. It first shows a video about a potential danger, then creates warnings tailored to the user's environment and given at the time they may be most useful, displaying a still frame or snippet from the video to remind the user of the potential danger. The system uses templates of user activities as input to a markov logic network to recognize potentially risky behaviors. This approach can identify likely next steps that can be used to predict immediate danger and customize warnings.

[5] From geek to sleek: integrating task learning tools to support end users in real-world applications Short papers / Spaulding, Aaron / Blythe, Jim / Haines, Will / Gervasio, Melinda Proceedings of the 2009 International Conference on Intelligent User Interfaces 2009-02-08 p.389-394
Keywords: end user programming, interaction design, programming by demonstration, reasoning about actions, task learning
ACM Digital Library Link
Summary: Numerous techniques exist to help users automate repetitive tasks; however, none of these methods fully support end-user creation, use, and modification of the learned tasks. We present an integrated task learning system (ITL) that learns executable procedures based on user demonstration and instruction, constituting a first step toward a broader solution for procedure management. We discuss our deployment of ITL into a collaborative command-and-control system. In this complex domain, ITL's performance with end users doing real tasks indicates that providing multiple, integrated learning techniques both extends functionality and improves user experience. Our experience in integrating this system also provides key insights for future designs of domain-independent task learning systems, specifically in supporting users' ability to understand and edit lengthy procedures.

[6] Case-based reasoning for procedure learning by instruction Short papers / Blythe, Jim / Russ, Thomas Proceedings of the 2008 International Conference on Intelligent User Interfaces 2008-01-13 p.301-304
ACM Digital Library Link
Summary: To control intelligent tools that perform a variety of complex procedures, users need to be able to both modify existing procedure descriptions and communicate new procedures. In one approach, the user describes fragments of a procedure with text, and the tool searches the space of potential procedures for a match. This approach sometimes provides too little guidance for users, yet providing templates for guidance can require an expensive knowledge engineering effort in each new domain. We investigate the use of case-based reasoning to help guide the user, treating previously-defined procedures in the domain as cases. We describe domain-independent methods to find similar procedures while the user creates or modifies a procedure, to suggest potential steps to copy and to manage mapping the variables from the existing procedure into the procedure being edited. In some cases, the mapping tool suggests auxiliary steps to copy along with the desired steps, following an approach similar to derivational analogy. We evaluate the potential of this approach with an implemented tool, CB-Tailor, in a travel domain containing a number of procedures that may be added by the user. Our experiences suggest that the tool can provide useful guidance in a realistic set of situations.

[7] Task learning by instruction in tailor Long papers: knowledge acquisition and knowledge-based design / Blythe, Jim Proceedings of the 2005 International Conference on Intelligent User Interfaces 2005-01-10 p.191-198
ACM Digital Library Link
Summary: In order for intelligent systems to be applicable in a wide range of situations, end users must be able to modify their task descriptions. We introduce Tailor, a system that allows users to modify task information through instruction. In this approach, the user enters a short sentence to describe the desired change. The system maps the sentence into valid, plausible modifications and checks for unexpected side-effects they may have, working interactively with the user throughout the process. We conducted preliminary tests in which subjects used Tailor to make modifications to domains drawn from the eHow website, applying modifications posted by readers as 'tips'. In this way the subjects acted as interpreters between Tailor and the human-generated descriptions of modifications. Almost all the subjects were able to make all modifications to the process descriptions with Tailor, indicating that the interpreter role is quite natural for users.

[8] Incremental formalization of document annotations through ontology-based paraphrasing Semantic annotation and integration / Blythe, Jim / Gil, Yolanda Proceedings of the 2004 International Conference on the World Wide Web 2004-05-17 v.1 p.455-461
Keywords: document annotation, knowledge acquisition, semantic markup
ACM Digital Library Link
Summary: For the manual semantic markup of documents to become wide-spread, users must be able to express annotations that conform to ontologies (or schemas) that have shared meaning. However, a typical user is unlikely to be familiar with the details of the terms as defined by the ontology authors. In addition, the idea to be expressed may not fit perfectly within a pre-defined ontology. The ideal tool should help users find a partial formalization that closely follows the ontology where possible but deviates from the formal representation where needed. We describe an implemented approach to help users create semi-structured semantic annotations for a document according to an extensible OWL ontology. In our approach, users enter a short sentence in free text to describe all or part of a document, and the system presents a set of potential paraphrases of the sentence that are generated from valid expressions in the ontology, from which the user chooses the closest match. We use a combination of off-the-shelf parsing tools and breadth-first search of expressions in the ontology to help users create valid annotations starting from free text. The user can also define new terms to augment the ontology, so the potential matches can improve over time.

[9] Supporting plan authoring and analysis Full Technical Papers / Kim, Jihie / Blythe, Jim Proceedings of the 2003 International Conference on Intelligent User Interfaces 2003-01-12 p.109-116
ACM Digital Library Link
Summary: Interactive tools to help users author plans or processes are essential in a variety of domains. KANAL helps users author sound plans by simulating them, checking for a variety of errors and presenting the results in an accessible format that allows the user to see an overview of the plan steps or timelines of objects in the plan. From our experience in two domains, users tend to interleave plan authoring and plan checking while extending background knowledge of actions. This has led us to refine KANAL to provide a high-level overview of plans and integrate a tool for refining the background knowledge about actions used to check plans. We report on these lessons learned and new directions in KANAL.

[10] An Integrated Environment for Knowledge Acquisition / Blythe, Jim / Kim, Jihie / Ramachandran, Surya / Gil, Yolanda Proceedings of the 2001 International Conference on Intelligent User Interfaces 2001-01-14 p.13-20
Keywords: Computing Methodologies -Artificial Intelligence - Learning (I.2.6): Knowledge acquisition; Information Systems -Information Interfaces and Presentation - User Interfaces (H.5.2); Design, Human Factors, Management, Performance, Theory
Broken Link to ACM Digital Library
Summary: This paper describes an integrated acquisition interface that includes several techniques previously developed to support users in various ways as they add new knowledge to an intelligent system. As a result of this integration, the individual techniques can take better advantage of the context in which they are invoked and provide stronger guidance to users. We describe the current implementation using examples from a travel planning domain, and demonstrate how users can add complex knowledge to the system.

[11] Generalization and Noise / Kodratoff, Yves / Manago, Michel / Blythe, Jim International Journal of Man-Machine Studies 1987 v.27 n.2 p.181-204
Summary: This paper describes a research project which aims at applying Machine Learning (ML) techniques to ease Knowledge Acquisition (KA) for Knowledge Based systems. Since noise in real life data has a drastic effect on ML, we examine in detail problems connected with noise. The learning system integrates two apparently distinct approaches: the numeric approach and the symbolic approach. It uses a filtering mechanism that is driven by statistical information and by comparison between several sources of knowledge (multi-expertise and expert-users "cross-examination" of input). The system also attempts to generate concepts which are resilient to noise and to improve the language of description. While it is usually thought that noise prevents using ML techniques in real applications, we attempt to show that on the contrary existing techniques can be stretched to cope with noise and to obtain better results than traditional KA techniques.