[1]
Extending the field of view: a human-centred design perspective on 360°
TV
/
Bleumers, Lizzy
/
Van den Broeck, Wendy
/
Lievens, Bram
/
Pierson, Jo
Behaviour and Information Technology
2014-08-03
v.33
n.8
p.800-814
© Copyright 2014 Taylor and Francis
Summary: Omnidirectional video (ODV) is a type of video that presents viewers with a
new type of interactivity. It enables people to look around in a 360° view
of the recorded dynamic scene as if they are controlling the camera themselves.
ODV presents opportunities for new interactive television formats. The
development of such new formats, however, is accompanied by challenges in terms
of user experience and technical and creative development. In this article, we
discuss issues and opportunities tied to televising ODV from a user
perspective. These findings are the result of a human-centred design study. In
this study, we introduced 20 potential users to ODV, as this was new to them.
We gathered their feedback on the demonstration, and then encouraged them to
envision suitable ODV-based enhancements of television genres. This article
offers a discussion of both the methodology (including a form of laddering)
applied in the study and the user research findings. We found that people see
an added value in ODV under certain conditions (e.g. enabling exploration), but
that there are also a number of bottlenecks such as the concern to miss key
parts of a television programme while looking around.
[2]
Managing privacy boundaries together: Exploring individual and group privacy
management strategies in Facebook
/
De Wolf, Ralf
/
Willaert, Koen
/
Pierson, Jo
Computers in Human Behavior
2014-06
v.35
n.0
p.444-454
Keywords: Privacy
Keywords: Social network sites
Keywords: Communication Privacy Management theory (CPM)
Keywords: Facebook
Keywords: Disclosure
© Copyright 2014 Elsevier Ltd.
Summary: Most research on privacy management within the context of social network
sites (SNSs) treats users as individual owners of private information. Privacy,
however, is beyond individual control and is also managed on a group level.
This study applies the Communication Privacy Management theory (CPM) to explore
the individual and group privacy management strategies in Facebook. We present
a survey completed by 900 members of a youth organization regarding their
online behaviors and membership. We found that women are more likely to employ
individual privacy management strategies, while men are more likely to employ
group privacy management strategies. For group privacy management, we found
common bond and the role an individual is attributed within the youth
organization to be the strongest predictors. The results generated from this
study are a first but important step to illustrate the differences and
similarities between individual and group privacy management. We argue that it
is necessary to further study and understand group privacy to better approach
users' privacy needs.
[3]
Managing social adoption and technology adaption in longitudinal studies of
mobile media applications
/
Lievens, Bram
/
Milic-Frayling, Nataša
/
Lerouge, Valentine
/
Pierson, Jo
/
Oleksik, Gerard
/
Jones, Rachel
/
Costello, Jamie
Proceedings of the 2010 International Conference on Mobile and Ubiquitous
Multimedia
2010-12-01
p.26
© Copyright 2010 ACM
Summary: In this paper we present a case study of a longitudinal in-situ observation
that involves a new social application for mobile communication. Our study
demonstrates the need for an adaptive approach to planning, design, and
implementation that is responsive to emerging social and infrastructure
conditions. This represents a shift from traditional longitudinal studies that
observe prototype systems with fixed sets of affordances. In the case of mobile
and social applications there is a complex interaction between the social
dynamics, the new technology, and the mobile infrastructure. Exploratory
research thus requires approaches that can deal with such complex conditions.
That includes a high level of prototype plasticity to ensure adoption and
sustained use that is needed for longitudinal in-situ research. The social
aspects dictate specific forms of instrumentation to enable observation of
social interactions and mechanisms to inject the new technology into an
existing social and communication ecosystem. Our study demonstrates the
evolving use of complementary techniques and in-situ modifications of the
prototype to support longitudinal observations in a real setting.
[4]
EDITED BOOK
Mobile TV: Customizing Content and Experience: Mobile Storytelling, Creation
and Sharing
Human-Computer Interaction Series
/
Marcus, Aaron
/
Roibás, Anxo Cereijo
/
Sala, Riccardo
2010
n.24
p.372
Springer London
DOI: 10.1007/978-1-84882-701-1
Mobile TV: Customizing Content and Experience (1-2)
+ Marcus, Aaron
+ Cereijo-Roibas, Anxo
+ Sala, Riccardo
== What It All Means: Six Perspectives on Mobile TV ==
Mobile TV's Time to Shine Has Arrived (5-9)
+ Kitson, Fred
Saddlebags, Paperbacks and Mobile Media (11-13)
+ Zwick, Carola
The Path Tells a Story (15-19)
+ Nack, Frank
Introduction to Social TV (21-24)
+ Harboe, Gunnar
The Sociability of Mobile TV (25-28)
+ Geerts, David
Interactive TV Narrativity (29-33)
+ Ursu, Marian F.
== User Experience and Design of Mobile TV in Everyday Life ==
Culture, Interface Design, and Design Methods for Mobile Devices (37-66)
+ Lee, Kun-pyo
Mobile Video in Everyday Social Interactions (67-80)
+ Reponen, Erika
+ Lehikoinen, Jaakko
+ Impiö, Jussi
Does Mobile Television Enhance a New Television Experience? (81-96)
+ Lievens, Bram
+ Vanhengel, Eva
+ Pierson, Jo
+ Jacobs, An
== Innovation Through Conceptual and Participatory Design for Mobile Multimedia Systems ==
An Ambient Intelligence Framework for the Provision of Geographically Distributed Multimedia Content to Mobility Impaired Users (99-119)
+ Kehagias, Dionysios D
+ Giakoumis, Dimitris
+ Tzovaras, Dimitrios
+ Bekiaris, Evangelos
+ et al
Creativity in Interactive TV: Personalize, Share, and Invent Interfaces (121-139)
+ Vatavu, Radu-Daniel
== Understanding the Context: Data Gathering, Requirements and Evaluation Methodologies ==
Content for Mobile Television: Issues Regarding a New Mass Medium Within Today's ICT Environment (143-163)
+ Schuurman, Dimitri
+ De Marez, Lieven
+ Evens, Tom
Different Attitudes Concerning the Usage of Live Mobile TV and Mobile Video (165-193)
+ Miyauchi, Koji
+ Sugahara, Taro
+ Oda, Hiromi
User Experience Evaluation in the Mobile Context (195-204)
+ Obrist, Marianna
+ Meschtscherjakov, Alexander
+ Tscheligi, Manfred
== Context and Sociability in Mobile Interactive Multimedia Systems ==
Social Properties of Mobile Video (207-233)
+ Mitchell, April Slayden
+ O'Hara, Kenton
+ Vorbau, Alex
m-YouTube Mobile UI: Video Selection Based on Social Influence (235-241)
+ Marcus, Aaron
+ Perez, Angel
Scenarios of Use for Sociable Mobile TV (243-254)
+ Chorianopoulos, Konstantinos
"What Are You Viewing?" Exploring the Pervasive Social TV Experience (255-290)
+ Schatz, Raimund
+ Baillie, Lynne
+ Fröhlich, Peter
+ Egger, Sebastian
+ Grechenig, Thomas
== Advanced Interaction Modalities with Mobile Digital Content ==
m-LoCoS UI: A Universal Visible Language for Global Mobile Communication (293-304)
+ Marcus, Aaron
The Future of Mobile TV: When Mobile TV Meets the Internet and Social Networking (305-326)
+ Montpetit, Marie-José
+ Klym, Natalie
+ Blain, Emmanuel
From One to Many Boxes: Mobile Devices as Primary and Secondary Screens (327-348)
+ Cesar, Pablo
+ Knoche, Hendrik
+ Bulterman, Dick C. A.
Watch-and-Comment as an Approach to Collaboratively Annotate Points of Interest in Video and Interactive-TV Programs (349-368)
+ Pimentel, Maria da Graça C.
+ Cattelan, Renan G.
+ Melo, Erick L.
+ Freitas, Giliard B.
+ et al
Conclusion (The Mobile Future) (369-372)
+ Marcus, Aaron
+ Sala, Riccardo
+ Roibás, Anxo Cereijo
[5]
L'Elimination de la subjectivité dans la recommandation de confiance
Confiance et déploiement de composants
/
Hasan, Omar
/
Brunie, Lionel
/
Pierson, Jean-Marc
/
Bertino, Elisa
Proceedings of the 2009 French-speaking conference on Mobility and ubiquity
computing
2009-07-07
p.3-10
Keywords: social networks, subjectivity, trust, ubiquitous environments
© Copyright 2009 ACM
Summary: In ubiquitous environments, a party who wishes to make a transaction often
requires that it has a certain level of trust in the other party. It is
frequently the case that the parties are unknown to each other and thus share
no preexisting trust. Trust-based systems enable users to establish trust in
unknown users through trust recommendation from known users. For example, Bob
may choose to trust an unknown user Carol when he receives a recommendation
from his friend Alice that Carol's trustworthiness is 0.8 on the interval [0,
1].
In this paper we highlight the problem that when a trust value is
recommended by one user to another it may lose its real meaning due to
subjectivity. Bob may regard 0.8 as a very high value of trust but it is
possible that Alice perceived this same value as only average. We present a
solution for the elimination of subjectivity from trust recommendation. We run
experiments to compare our subjectivity-eliminated trust recommendation method
with the unmodified method. In a random graph based web of trust with high
subjectivity, it is observed that the novel method can give better results up
to 95% of the time.
[6]
Co-creation and user-generated content-elderly people's user requirements
/
Karahasanovic, Amela
/
Brandtzæg, Petter Bae
/
Heim, Jan
/
Lüders, Marika
/
Vermeir, Lotte
/
Pierson, Jo
/
Lievens, Bram
/
Vanattenhoven, Jeroen
/
Jans, Greet
Computers in Human Behavior
2009-05
v.25
n.3
p.655-678
Keywords: Elderly people
Keywords: User generated content
Keywords: Online communities
Keywords: User requirements
© Copyright 2009 Elsevier Ltd.
Summary: There is an increasing demand on citizens to participate in social network
websites and to create and share their own user-generated content (UGC), such
as photographs, videos, and blogs. So far, little is known about how elderly
people respond to these new trends and master the techniques required. This
paper reports on three studies that investigated elderly people's user
requirements related to consumption, sharing and co-creation of UGC in new
media. The first study, conducted in Norway, identifies patterns of Internet
usage, age differences, and participation in online communities and the
consumption, sharing and co-creation of UGC on a macro level. The second study,
conducted in Belgium, investigated the social requirements of elderly people on
a group level. The third study, also conducted in Belgium, investigated user
and context requirements on an individual level. The results of the first study
show that the elderly rarely participate in online communities and share
audio-visual UGC. However, they embrace some aspects of the new media and more
often express themselves politically. The results of the second study show that
the elderly are very motivated to contribute with UGC, given the right
circumstances. The results of the third study show that it is important for
elderly people that they be able to use the new technologies easily and
identifies their worries about using them.
[7]
Authentification par la méfiance dans les systèmes pervasifs
Séreté des données
/
Saadi, Rachid
/
Pierson, Jean Marc
/
Brunie, Lionel
Proceedings of the 2005 French-speaking conference on Mobility and ubiquity
computing
2005-05-31
p.93-96
Keywords: access control, authentication, pervasive environment, security, trust
© Copyright 2005 ACM
Summary: We present in this paper a solution to the difficult problem of
authentication in pervasive environments. The distrust model developed
hereafter allows a particular site to accept inbound connections from foreign
unknown users, and to bound their access to a certain level in its own
organization.
[8]
Replica placement in a pervasive environment
Infrastructure & composants II (Infrastructure and Components)
/
Gossa, Julien
/
Pierson, Jean-Marc
/
Brunie, Lionel
Proceedings of the 2004 French-speaking conference on Mobility and ubiquity
computing
2004-06-01
p.195-198
Keywords: k-server, pervasive computing, proxy, replication
© Copyright 2004 ACM
Summary: This short paper proposes a replica placement and selection method adapted
to pervasive environment. The described solution, based on Small Worlds and the
k-server algorithm, is dynamic and flexible according to the mobility and
unpredictability of users and networks.
[9]
EDITED BOOK
Home Informatics and Telematics Information, Technology and Society
International Federation for Information Processing: Volume 173
/
Sloane, Andy
/
van Rijn, Felix
2000
p.240
Kluwer Academic Publishers
contains selected proceedings from the
International Conference on Home Informatics and Telematics (HOIT 2000),
`IT at Home: Virtual Influences on Everyday Life',
which was sponsored by the International Federation for Information Processing (IFIP)
and held in Wolverhampton, United Kingdom, June 28-30, 2000
Citizen Science Implications of Public Access to 3-D Hypermedis Editing and Interactivity in the Home
+ Bjerg, K.
Enhanced Television and Interactive Services
+ Dormann, C.
Real and Virtual Conferences
+ Lawrence, D.
et al
Methodological Challenges in the Study of Technology at Home
+ Kjaer, A.
et al
Direct and Mediated Interaction in the Maintenance of Social Relationships
+ Ling, R.
Using E-Mail for Social and Domestic Purposes
+ Buckner, K.
+ Gillham, M.
The Paths of Work and ICT into the Home
+ Sturesson, L.
ICT Appropriation by Small Businesses
+ Pierson, J.
Familyware
+ Go, K.
et al
Web-Based Family Noticeboard
+ Huang, W.
et al
Home Information Systems
+ Sloane, A.
et al
Invisible Technologies, Invisible Boundaries?
+ Oksanen-Sarela, K.
School's Out
+ Carroll, J. M.
+ Rosson, M. B.
User-Centred Design
+ Monk, A.
Purchasing a Home Computer
+ Lahtinen, H.
A Longitudinal Analysis of Computing in the Home
+ Venkatesh, A.
et al
[10]
Une architecture pervasive sécurisée : PerSe
Session 4: Sécurité et réseaux = Security and Networks
/
Pierson, Jean-Marc
/
Scuturici, Marian
/
Pigeot, Charles-Éric
/
Gripay, Yann
Proceedings of the 2006 French-speaking Conference on Mobility and Ubiquity
Computing
p.25