Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Although usability methods are widely used for evaluating conventional graphical user interfaces and websites, there is a growing concern that current approaches are inadequate fo...
Parmit K. Chilana, Jacob O. Wobbrock, Andrew J. Ko
How can we best explore the range of users' reactions when developing future technologies that maybe controversial, such as personal healthcare systems? Our approach – Cont...
Clara Mancini, Yvonne Rogers, Arosha K. Bandara, T...
Abstract. This paper describes a preliminary work devoted to the design of a control architecture for a defective haptic interface, i.e. an underactuated haptic interface not able ...
Designers of commercial aviation flight decks have recently begun to consider ways to reduce or eliminate the use of paper documents in flight operations. Using ethnographic metho...