HCI Bibliography : Search Results skip to search form | skip to results |
Database updated: 2016-05-10 Searches since 2006-12-01: 32,256,599
director@hcibib.org
Hosted by ACM SIGCHI
The HCI Bibliogaphy was moved to a new server 2015-05-12 and again 2016-01-05, substantially degrading the environment for making updates.
There are no plans to add to the database.
Please send questions or comments to director@hcibib.org.
Query: pierson_j* Results: 10 Sorted by: Date  Comments?
Help Dates
Limit:   
[1] Extending the field of view: a human-centred design perspective on 360° TV / Bleumers, Lizzy / Van den Broeck, Wendy / Lievens, Bram / Pierson, Jo Behaviour and Information Technology 2014-08-03 v.33 n.8 p.800-814
Link to Article at Taylor & Francis
Summary: Omnidirectional video (ODV) is a type of video that presents viewers with a new type of interactivity. It enables people to look around in a 360° view of the recorded dynamic scene as if they are controlling the camera themselves. ODV presents opportunities for new interactive television formats. The development of such new formats, however, is accompanied by challenges in terms of user experience and technical and creative development. In this article, we discuss issues and opportunities tied to televising ODV from a user perspective. These findings are the result of a human-centred design study. In this study, we introduced 20 potential users to ODV, as this was new to them. We gathered their feedback on the demonstration, and then encouraged them to envision suitable ODV-based enhancements of television genres. This article offers a discussion of both the methodology (including a form of laddering) applied in the study and the user research findings. We found that people see an added value in ODV under certain conditions (e.g. enabling exploration), but that there are also a number of bottlenecks such as the concern to miss key parts of a television programme while looking around.

[2] Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook / De Wolf, Ralf / Willaert, Koen / Pierson, Jo Computers in Human Behavior 2014-06 v.35 n.0 p.444-454
Keywords: Privacy
Keywords: Social network sites
Keywords: Communication Privacy Management theory (CPM)
Keywords: Facebook
Keywords: Disclosure
Link to Article at sciencedirect
Summary: Most research on privacy management within the context of social network sites (SNSs) treats users as individual owners of private information. Privacy, however, is beyond individual control and is also managed on a group level. This study applies the Communication Privacy Management theory (CPM) to explore the individual and group privacy management strategies in Facebook. We present a survey completed by 900 members of a youth organization regarding their online behaviors and membership. We found that women are more likely to employ individual privacy management strategies, while men are more likely to employ group privacy management strategies. For group privacy management, we found common bond and the role an individual is attributed within the youth organization to be the strongest predictors. The results generated from this study are a first but important step to illustrate the differences and similarities between individual and group privacy management. We argue that it is necessary to further study and understand group privacy to better approach users' privacy needs.

[3] Managing social adoption and technology adaption in longitudinal studies of mobile media applications / Lievens, Bram / Milic-Frayling, Nataša / Lerouge, Valentine / Pierson, Jo / Oleksik, Gerard / Jones, Rachel / Costello, Jamie Proceedings of the 2010 International Conference on Mobile and Ubiquitous Multimedia 2010-12-01 p.26
ACM Digital Library Link
Summary: In this paper we present a case study of a longitudinal in-situ observation that involves a new social application for mobile communication. Our study demonstrates the need for an adaptive approach to planning, design, and implementation that is responsive to emerging social and infrastructure conditions. This represents a shift from traditional longitudinal studies that observe prototype systems with fixed sets of affordances. In the case of mobile and social applications there is a complex interaction between the social dynamics, the new technology, and the mobile infrastructure. Exploratory research thus requires approaches that can deal with such complex conditions. That includes a high level of prototype plasticity to ensure adoption and sustained use that is needed for longitudinal in-situ research. The social aspects dictate specific forms of instrumentation to enable observation of social interactions and mechanisms to inject the new technology into an existing social and communication ecosystem. Our study demonstrates the evolving use of complementary techniques and in-situ modifications of the prototype to support longitudinal observations in a real setting.

[4] EDITED BOOK Mobile TV: Customizing Content and Experience: Mobile Storytelling, Creation and Sharing Human-Computer Interaction Series / Marcus, Aaron / Roibás, Anxo Cereijo / Sala, Riccardo 2010 n.24 p.372 Springer London
DOI: 10.1007/978-1-84882-701-1
ISBN: 978-1-84882-700-4 (print), 978-1-84882-701-1 (online)
Link to Digital Content at Springer
Mobile TV: Customizing Content and Experience (1-2)
	+ Marcus, Aaron
	+ Cereijo-Roibas, Anxo
	+ Sala, Riccardo
== What It All Means: Six Perspectives on Mobile TV ==
Mobile TV's Time to Shine Has Arrived (5-9)
	+ Kitson, Fred
Saddlebags, Paperbacks and Mobile Media (11-13)
	+ Zwick, Carola
The Path Tells a Story (15-19)
	+ Nack, Frank
Introduction to Social TV (21-24)
	+ Harboe, Gunnar
The Sociability of Mobile TV (25-28)
	+ Geerts, David
Interactive TV Narrativity (29-33)
	+ Ursu, Marian F.
== User Experience and Design of Mobile TV in Everyday Life ==
Culture, Interface Design, and Design Methods for Mobile Devices (37-66)
	+ Lee, Kun-pyo
Mobile Video in Everyday Social Interactions (67-80)
	+ Reponen, Erika
	+ Lehikoinen, Jaakko
	+ Impiö, Jussi
Does Mobile Television Enhance a New Television Experience? (81-96)
	+ Lievens, Bram
	+ Vanhengel, Eva
	+ Pierson, Jo
	+ Jacobs, An
== Innovation Through Conceptual and Participatory Design for Mobile Multimedia Systems ==
An Ambient Intelligence Framework for the Provision of Geographically Distributed Multimedia Content to Mobility Impaired Users (99-119)
	+ Kehagias, Dionysios D
	+ Giakoumis, Dimitris
	+ Tzovaras, Dimitrios
	+ Bekiaris, Evangelos
	+ et al
Creativity in Interactive TV: Personalize, Share, and Invent Interfaces (121-139)
	+ Vatavu, Radu-Daniel
== Understanding the Context: Data Gathering, Requirements and Evaluation Methodologies ==
Content for Mobile Television: Issues Regarding a New Mass Medium Within Today's ICT Environment (143-163)
	+ Schuurman, Dimitri
	+ De Marez, Lieven
	+ Evens, Tom
Different Attitudes Concerning the Usage of Live Mobile TV and Mobile Video (165-193)
	+ Miyauchi, Koji
	+ Sugahara, Taro
	+ Oda, Hiromi
User Experience Evaluation in the Mobile Context (195-204)
	+ Obrist, Marianna
	+ Meschtscherjakov, Alexander
	+ Tscheligi, Manfred
== Context and Sociability in Mobile Interactive Multimedia Systems ==
Social Properties of Mobile Video (207-233)
	+ Mitchell, April Slayden
	+ O'Hara, Kenton
	+ Vorbau, Alex
m-YouTube Mobile UI: Video Selection Based on Social Influence (235-241)
	+ Marcus, Aaron
	+ Perez, Angel
Scenarios of Use for Sociable Mobile TV (243-254)
	+ Chorianopoulos, Konstantinos
"What Are You Viewing?" Exploring the Pervasive Social TV Experience (255-290)
	+ Schatz, Raimund
	+ Baillie, Lynne
	+ Fröhlich, Peter
	+ Egger, Sebastian
	+ Grechenig, Thomas
== Advanced Interaction Modalities with Mobile Digital Content ==
m-LoCoS UI: A Universal Visible Language for Global Mobile Communication (293-304)
	+ Marcus, Aaron
The Future of Mobile TV: When Mobile TV Meets the Internet and Social Networking (305-326)
	+ Montpetit, Marie-José
	+ Klym, Natalie
	+ Blain, Emmanuel
From One to Many Boxes: Mobile Devices as Primary and Secondary Screens (327-348)
	+ Cesar, Pablo
	+ Knoche, Hendrik
	+ Bulterman, Dick C. A.
Watch-and-Comment as an Approach to Collaboratively Annotate Points of Interest in Video and Interactive-TV Programs (349-368)
	+ Pimentel, Maria da Graça C.
	+ Cattelan, Renan G.
	+ Melo, Erick L.
	+ Freitas, Giliard B.
	+ et al
Conclusion (The Mobile Future) (369-372)
	+ Marcus, Aaron
	+ Sala, Riccardo
	+ Roibás, Anxo Cereijo

[5] L'Elimination de la subjectivité dans la recommandation de confiance Confiance et déploiement de composants / Hasan, Omar / Brunie, Lionel / Pierson, Jean-Marc / Bertino, Elisa Proceedings of the 2009 French-speaking conference on Mobility and ubiquity computing 2009-07-07 p.3-10
Keywords: social networks, subjectivity, trust, ubiquitous environments
ACM Digital Library Link
Summary: In ubiquitous environments, a party who wishes to make a transaction often requires that it has a certain level of trust in the other party. It is frequently the case that the parties are unknown to each other and thus share no preexisting trust. Trust-based systems enable users to establish trust in unknown users through trust recommendation from known users. For example, Bob may choose to trust an unknown user Carol when he receives a recommendation from his friend Alice that Carol's trustworthiness is 0.8 on the interval [0, 1].
    In this paper we highlight the problem that when a trust value is recommended by one user to another it may lose its real meaning due to subjectivity. Bob may regard 0.8 as a very high value of trust but it is possible that Alice perceived this same value as only average. We present a solution for the elimination of subjectivity from trust recommendation. We run experiments to compare our subjectivity-eliminated trust recommendation method with the unmodified method. In a random graph based web of trust with high subjectivity, it is observed that the novel method can give better results up to 95% of the time.

[6] Co-creation and user-generated content-elderly people's user requirements / Karahasanovic, Amela / Brandtzæg, Petter Bae / Heim, Jan / Lüders, Marika / Vermeir, Lotte / Pierson, Jo / Lievens, Bram / Vanattenhoven, Jeroen / Jans, Greet Computers in Human Behavior 2009-05 v.25 n.3 p.655-678
Keywords: Elderly people
Keywords: User generated content
Keywords: Online communities
Keywords: User requirements
Link to Article at sciencedirect
Summary: There is an increasing demand on citizens to participate in social network websites and to create and share their own user-generated content (UGC), such as photographs, videos, and blogs. So far, little is known about how elderly people respond to these new trends and master the techniques required. This paper reports on three studies that investigated elderly people's user requirements related to consumption, sharing and co-creation of UGC in new media. The first study, conducted in Norway, identifies patterns of Internet usage, age differences, and participation in online communities and the consumption, sharing and co-creation of UGC on a macro level. The second study, conducted in Belgium, investigated the social requirements of elderly people on a group level. The third study, also conducted in Belgium, investigated user and context requirements on an individual level. The results of the first study show that the elderly rarely participate in online communities and share audio-visual UGC. However, they embrace some aspects of the new media and more often express themselves politically. The results of the second study show that the elderly are very motivated to contribute with UGC, given the right circumstances. The results of the third study show that it is important for elderly people that they be able to use the new technologies easily and identifies their worries about using them.

[7] Authentification par la méfiance dans les systèmes pervasifs Séreté des données / Saadi, Rachid / Pierson, Jean Marc / Brunie, Lionel Proceedings of the 2005 French-speaking conference on Mobility and ubiquity computing 2005-05-31 p.93-96
Keywords: access control, authentication, pervasive environment, security, trust
ACM Digital Library Link
Summary: We present in this paper a solution to the difficult problem of authentication in pervasive environments. The distrust model developed hereafter allows a particular site to accept inbound connections from foreign unknown users, and to bound their access to a certain level in its own organization.

[8] Replica placement in a pervasive environment Infrastructure & composants II (Infrastructure and Components) / Gossa, Julien / Pierson, Jean-Marc / Brunie, Lionel Proceedings of the 2004 French-speaking conference on Mobility and ubiquity computing 2004-06-01 p.195-198
Keywords: k-server, pervasive computing, proxy, replication
ACM Digital Library Link
Summary: This short paper proposes a replica placement and selection method adapted to pervasive environment. The described solution, based on Small Worlds and the k-server algorithm, is dynamic and flexible according to the mobility and unpredictability of users and networks.

[9] EDITED BOOK Home Informatics and Telematics Information, Technology and Society International Federation for Information Processing: Volume 173 / Sloane, Andy / van Rijn, Felix 2000 p.240 Kluwer Academic Publishers
ISBN: 0-7923-7867-9
contains selected proceedings from the International Conference on Home Informatics and Telematics (HOIT 2000), `IT at Home: Virtual Influences on Everyday Life', which was sponsored by the International Federation for Information Processing (IFIP) and held in Wolverhampton, United Kingdom, June 28-30, 2000
www.wkap.nl/prod/b/0-7923-7867-9
Citizen Science Implications of Public Access to 3-D Hypermedis Editing and Interactivity in the Home
	+ Bjerg, K.
Enhanced Television and Interactive Services
	+ Dormann, C.
Real and Virtual Conferences
	+ Lawrence, D.
	et al
Methodological Challenges in the Study of Technology at Home
	+ Kjaer, A.
	et al
Direct and Mediated Interaction in the Maintenance of Social Relationships
	+ Ling, R.
Using E-Mail for Social and Domestic Purposes
	+ Buckner, K.
	+ Gillham, M.
The Paths of Work and ICT into the Home
	+ Sturesson, L.
ICT Appropriation by Small Businesses
	+ Pierson, J.
Familyware
	+ Go, K.
	et al
Web-Based Family Noticeboard
	+ Huang, W.
	et al
Home Information Systems
	+ Sloane, A.
	et al
Invisible Technologies, Invisible Boundaries?
	+ Oksanen-Sarela, K.
School's Out
	+ Carroll, J. M.
	+ Rosson, M. B.
User-Centred Design
	+ Monk, A.
Purchasing a Home Computer
	+ Lahtinen, H.
A Longitudinal Analysis of Computing in the Home
	+ Venkatesh, A.
	et al

[10] Une architecture pervasive sécurisée : PerSe Session 4: Sécurité et réseaux = Security and Networks / Pierson, Jean-Marc / Scuturici, Marian / Pigeot, Charles-Éric / Gripay, Yann Proceedings of the 2006 French-speaking Conference on Mobility and Ubiquity Computing p.25