Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30
|
|
- Maryann Rodgers
- 6 years ago
- Views:
Transcription
1 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE IEEE WORLD FORUM ON INTERNET OF THINGS / 30
2 Agenda Introduction Related Work Privacy Preferences in IoT Privacy Preference Collection Privacy Preference Analysis Interpretation of Privacy in IoT Limitations and Future Work Conclusion IEEE WORLD FORUM ON INTERNET OF THINGS / 30
3 Introduction (1/4) Internet of Things (IoT) Networked computing environment consisting of diverse physical objects Collection of personal information with minimum user intervention Privacy in IoT IoT gives benefits, but can compromise user privacy Privacy is important issue for more widespread use of IoT Lack of efforts to fully understand users privacy concerns in IoT Home Automation in IoT Privacy Concerns in IoT IEEE WORLD FORUM ON INTERNET OF THINGS / 30
4 Introduction (2/4) Privacy Preference Collection We collected users privacy preferences about IoT scenarios via online survey IoT scenarios Privacy Preferences IEEE WORLD FORUM ON INTERNET OF THINGS / 30
5 Introduction (3/4) Privacy Preference Analysis We performed a cluster analysis on the collected privacy preferences We identified 4 distinct clusters of scenarios wrt. potential privacy risks IoT scenarios Privacy Preferences Clustered Preferences (K=4) K-modes clustering algorithm IEEE WORLD FORUM ON INTERNET OF THINGS / 30
6 Introduction (4/4) Interpretation of Privacy in IoT We found some relationships btw. IoT contexts and users privacy preferences IoT scenarios People have privacy concerns in case Privacy Preferences Clustered Preferences (K=4) Privacy-invasive Contexts in IoT K-modes clustering algorithm IEEE WORLD FORUM ON INTERNET OF THINGS / 30
7 Related Work Privacy Preference Analysis in UbiComp Privacy preference determinants in ubiquitous computing (ACM CHI 03) A survey of private moments in the home (ACM UbiComp 11) Capturing location-privacy preferences (Personal and Ubiquitous Computing 11) A personal location system with protected privacy in IoT (IEEE BNMT 11) Insights Identity of information requester is important No tracking personal behavior at home Full control of location sharing Active location sharing in emergency situations How people make privacy decisions in IoT environments? More diverse contextual factors need to be considered IEEE WORLD FORUM ON INTERNET OF THINGS / 30
8 Privacy Preferences in IoT 1. DATA COLLECTION 2. DATA ANALYSIS 3. INTERPRETATION IEEE WORLD FORUM ON INTERNET OF THINGS / 30
9 Data Collection (1/5) Previous Works 1 We defined contextual parameters that construct IoT scenarios where what who reason persistence We defined reaction parameters that indicate users privacy preferences _notification _permission _comfort _risk _appropriateness 1: HCI in Business: A collaboration with academia in IoT privacy (HCIB 2015) IEEE WORLD FORUM ON INTERNET OF THINGS / 30
10 Data Collection (2/5) Contextual Parameters A device of a friend (C 3 =3) records your voice to check your presence (C 2 =9). This happens once (C 5 =0), while you are at semi-public place (C 1 =2), for your safety (C 4 =1). Sample IoT Scenario IEEE WORLD FORUM ON INTERNET OF THINGS / 30
11 Data Collection (3/5) Reaction Parameters Would you want to allow this monitoring? Sample Question allow, always (R 2 =1) allow, just this time (R 2 =2) reject, just this time (R 2 =3) reject, always (R 2 =4) Sample Answer Options IEEE WORLD FORUM ON INTERNET OF THINGS / 30
12 Data Collection (4/5) Online Survey Study We recruited 200 participants on Amazon Mechanical Turk (MTurk) US resident, English speaker, high reputation at Amazon MTurk 100 females/99 males (1 unknown), majority (57.5%) are aged We educated them about IoT (e.g., definition, application scenario, etc) Online Survey System (Amazon MTurk) IoT IEEE WORLD FORUM ON INTERNET OF THINGS / 30
13 Data Collection (5/5) Online Survey Study (Cont d) We created scenarios via random permutation of contextual parameter values We individually asked for their reactions and opinions on the given scenarios We collected privacy preferences for 2,800 IoT scenarios IoT Scenario A device of a friend records your voice to check your presence. This happens once, while you are at semi-public place, for your safety. Online Survey System (Amazon MTurk) Question Would you want to allow this monitoring? Privacy Preference I m willing to allow it just this time. Participants IEEE WORLD FORUM ON INTERNET OF THINGS / 30
14 Data Analysis (1/5) K-means Clustering Algorithm Most popular data mining technique to partition observations into K clusters Restricted to continuous numeric values (e.g., , , ) K-modes Clustering Algorithm Variant of K-means to directly cluster categorical data Replacing cluster means with modes Using the simple matching dissimilarity function instead of the Euclidean distance function Updating modes with the most frequent categorical attributes in each clustering step Contextual Parameters Reaction Parameters K-means K-modes C 1 C 2 C 3 C 4 C 5 R 1 R 2 R 3 R 4 R Our Dataset IEEE WORLD FORUM ON INTERNET OF THINGS / 30
15 SE Data Analysis (2/5) Selecting the Number of Clusters We heuristically searched for the optimal K We computed the sum of errors (SE) of the clustering while increasing K from 2 to 10 SE is the sum of the distance btw. each member of the cluster and the cluster s centroid where x is a data point belonging to the ith cluster and c i is the mode of the ith cluster We found the largest decrease in errors (SE K-1 - SE K ) occurs when we increase K from 3 to 4 Sum of Errors Largest Error Decrease (K=4) K IEEE WORLD FORUM ON INTERNET OF THINGS / 30
16 Data Analysis (3/5) Clustering Results 4 clusters differ from each other primarily in contextual parameters: what (C 2 ) and who (C 3 ) Each mode has unique and identical values for reaction parameters: _comfort (R 3 ), _risk (R 4 ), _appropriateness (R 5 ) Modes of Clusters IEEE WORLD FORUM ON INTERNET OF THINGS / 30
17 Data Analysis (4/5) Labeling of Clusters We labeled each cluster using reaction parameters R 3, R 4, R 5 E.g., cluster 1 as Acceptable because its mode has the second highest value for R 3, R 4, R 5 We assigned colors to clusters green (CL 1 ), yellow (CL 2 ), red (CL 3 ), black (CL 4 ) Cluster distribution Acceptable (12.6%) vs. Very Unacceptable (40.8%) 1 Very inappropriate 2 Inappropriate 3 Somewhat inappropriate 4 Neutral 5 Somewhat appropriate 6 Appropriate 7 Very appropriate _appropriateness (R 5 ) Modes of Clusters IEEE WORLD FORUM ON INTERNET OF THINGS / 30
18 "_APPROPRIATENESS" 1: very inappripriate, 4: neutral, 7: very appropriate) Data Analysis (5/5) Verification of Clustering Results Welch s t-tests on reaction parameters in {CL 1, CL 2 }, {CL 2, CL 3 }, {CL 3, CL 4 } Reaction parameter values between each pair of clusters are statistically distinct (p < 0.016) Clusters are distinct from each other in terms of user reactions to the scenarios Information visualization We projected all data entries onto a 2-d space using R 5 values as their coordinates Scenarios that respondents deemed appropriate (R 5 =6, 7) mostly became clustered into CL 1 (green) Visualization of Clustering Results "_APPROPRIATENESS" (1: very inappripriate, 2: inappropriate, 3: somewhat inappropriate, 4: neutral, 5: somewhat appropriate, 6: appropriate, 7: very appropriate) Scenarios that respondents deemed very inappropriate (R 5 =1) mostly became clustered into CL 4 (black) HOSUB LEE ADVANCEMENT TO CANDIDACY 18 / 30
19 "WHERE" PARAMETER Interpretation where Findings Monitoring at personal places is very unacceptable Monitoring at public spaces is unacceptable Monitoring at semi-public spaces is somewhat unacceptable p: chi-square test of association d: effect size (large if d > 0.6) [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 3: public space p <.0001, d = : semi-public space p <.0001, d = : someone else's place 0: your place p <.0001, d = % 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30
20 RELATIVE FREQUENCY Interpretation what (1/2) Findings Gaze monitoring is very unacceptable Photo-taking or video monitoring is unacceptable 100% [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 90% 80% 70% 60% 50% 40% 30% 20% p <.0001, d = p = , d = % 0% "WHAT" PARAMETER IEEE WORLD FORUM ON INTERNET OF THINGS / 30
21 RELATIVE FREQUENCY Interpretation what (2/2) Findings Voice monitoring for gender and location awareness is tolerable Personally identifiable information (e.g., phone ID) is okay to share p <.0001, d = % 90% 80% [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable p = , d = % 60% 50% 40% 30% 20% 10% 0% "WHAT" PARAMETER IEEE WORLD FORUM ON INTERNET OF THINGS / 30
22 "WHO" PARAMETER Interpretation who (1/2) Findings Monitoring by unknown entity is very unacceptable Monitoring by government or nearby business is unacceptable [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 7. government p <.0001, d = employer/school 5. business p <.0001, d = own device 3. friend 2. colleague 1. unknown p <.0001, d = % 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30
23 "WHO" PARAMETER Interpretation who (2/2) Findings Monitoring by friends is fine Monitoring by own devices is acceptable [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 7. government 6. employer/school 5. business 4. own device p <.0001, d = friend p <.0001, d = colleague 1. unknown 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30
24 "REASON" PARAMETER Interpretation reason (1/2) Findings Purposeless IoT services are unacceptable Some purposeless scenarios are still considered acceptable [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 6. not specified p <.0001, d = health 4. convenience 3. social 2. commercial 1. safety 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30
25 "REASON" PARAMETER Interpretation reason (2/2) Findings Convenience is the most significant reason to allow monitoring Safety is also a reasonable justification to allow monitoring [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 6. not specified 5. health 4. convenience 3. social 2. commercial 1. safety 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30
26 "PERSISTENCE" PARAMETER Interpretation persistence Findings No clear tendency was observed Participants have privacy concerns about continuous monitoring in general [CL4] Very unacceptable [CL3] Unacceptable [CL2] Somewhat unacceptable [CL1] Acceptable 1. continuously 0. once 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% RELATIVE FREQUENCY IEEE WORLD FORUM ON INTERNET OF THINGS / 30
27 Limitations and Future Work (1/2) Out-of-Context Attitudinal Study Some contextual parameters were coarsely defined E.g., someone else s place might be interpreted differently by participants Participants responded at a location that has no association w/ the scenarios Decreased sense of realism to the scenarios IoT at School? A device of a friend (C 3 =3) records your voice to check your presence (C 2 =9). This happens once (C 5 =0), while you are at someone else s place (C 1 =1), Where is this? for your safety (C 4 =1). IoT Scenario Survey at Home IEEE WORLD FORUM ON INTERNET OF THINGS / 30
28 Limitations and Future Work (2/2) Location-based Survey Simulation of user experience in virtual IoT environments Creating realistic IoT scenarios mapped to real locations through crowdsourcing Building wearable system presents the IoT scenarios related to users current locations Asking users to answer questions on the scenarios while walking around a specific area Wearable Computer Location Awareness Survey IEEE WORLD FORUM ON INTERNET OF THINGS / 30
29 Conclusion In This Paper We aimed to understand user privacy in IoT environments We collected people s privacy preferences toward IoT via online survey We analyzed the collected survey responses via data mining technique IoT scenarios can be grouped into 4 clusters wrt. their potential privacy risks Clustering results are statistically and visually sound We uncovered contextual factors impact people s privacy perceptions who and what are the most important factors We plan to conduct location-based survey study (field experiments) More suitable for collecting sincere responses from users than a traditional survey IEEE WORLD FORUM ON INTERNET OF THINGS / 30
30 Thank You! ANY QUESTIONS? IEEE WORLD FORUM ON INTERNET OF THINGS / 30
The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space
, pp.62-67 http://dx.doi.org/10.14257/astl.2015.86.13 The User Activity Reasoning Model Based on Context-Awareness in a Virtual Living Space Bokyoung Park, HyeonGyu Min, Green Bang and Ilju Ko Department
More information2007 Census of Agriculture Non-Response Methodology
2007 Census of Agriculture Non-Response Methodology Will Cecere National Agricultural Statistics Service Research and Development Division, U.S. Department of Agriculture, 3251 Old Lee Highway, Fairfax,
More informationMeasuring User Experience through Future Use and Emotion
Measuring User Experience through and Celeste Lyn Paul University of Maryland Baltimore County 1000 Hilltop Circle Baltimore, MD 21250 USA cpaul2@umbc.edu Anita Komlodi University of Maryland Baltimore
More informationUnderstanding Requirements. Slides copyright 1996, 2001, 2005, 2009, 2014 by Roger S. Pressman. For non-profit educational use only
Chapter 8 Understanding Requirements Slide Set to accompany Software Engineering: A Practitioner s Approach, 8/e by Roger S. Pressman and Bruce R. Maxim Slides copyright 1996, 2001, 2005, 2009, 2014 by
More informationAutonomic gaze control of avatars using voice information in virtual space voice chat system
Autonomic gaze control of avatars using voice information in virtual space voice chat system Kinya Fujita, Toshimitsu Miyajima and Takashi Shimoji Tokyo University of Agriculture and Technology 2-24-16
More informationCrowdsourcing and Its Applications on Scientific Research. Sheng Wei (Kuan Ta) Chen Institute of Information Science, Academia Sinica
Crowdsourcing and Its Applications on Scientific Research Sheng Wei (Kuan Ta) Chen Institute of Information Science, Academia Sinica PNC 2009 Crowdsourcing = Crowd + Outsourcing soliciting solutions via
More informationSocial Interaction Design (SIxD) and Social Media
Social Interaction Design (SIxD) and Social Media September 14, 2012 Michail Tsikerdekis tsikerdekis@gmail.com http://tsikerdekis.wuwcorp.com This work is licensed under a Creative Commons Attribution-ShareAlike
More informationSample Surveys. Chapter 11
Sample Surveys Chapter 11 Objectives Population Sample Sample survey Bias Randomization Sample size Census Parameter Statistic Simple random sample Sampling frame Stratified random sample Cluster sample
More informationABORIGINAL CANADIANS AND THEIR SUPPORT FOR THE MINING INDUSTRY: THE REALITY, CHALLENGES AND SOLUTIONS
November 17, 2014 ABORIGINAL CANADIANS AND THEIR SUPPORT FOR THE MINING INDUSTRY: THE REALITY, CHALLENGES AND SOLUTIONS 1 PREPARE TO BE NOTICED ABORIGINAL CANADIANS AND THEIR SUPPORT FOR THE MINING INDUSTRY:
More informationUsing smartphones for crowdsourcing research
Using smartphones for crowdsourcing research Prof. Vassilis Kostakos School of Computing and Information Systems University of Melbourne 13 July 2017 Talk given at the ACM Summer School on Crowdsourcing
More informationMMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games. and Female Gamers.
MMORPGs And Women 1 MMORPGs And Women: An Investigative Study of the Appeal of Massively Multiplayer Online Roleplaying Games and Female Gamers. Julia Jones May 3 rd, 2013 MMORPGs And Women 2 Abstract:
More informationSampling Designs and Sampling Procedures
Business Research Methods 9e Zikmund Babin Carr Griffin 16 Sampling Designs and Sampling Procedures Chapter 16 Sampling Designs and Sampling Procedures 2013 Cengage Learning. All Rights Reserved. May not
More informationThis list supersedes the one published in the November 2002 issue of CR.
PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.
More informationContextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media
Contextual Integrity and Preserving Relationship Boundaries in Location- Sharing Social Media Xinru Page School of Information and Computer Sciences University of California, Irvine Irvine, CA 92697 USA
More informationRubber Hand. Joyce Ma. July 2006
Rubber Hand Joyce Ma July 2006 Keywords: 1 Mind - Formative Rubber Hand Joyce Ma July 2006 PURPOSE Rubber Hand is an exhibit prototype that
More informationSecure and Intelligent Mobile Crowd Sensing
Secure and Intelligent Mobile Crowd Sensing Chi (Harold) Liu Professor and Vice Dean School of Computer Science Beijing Institute of Technology, China June 19, 2018 Marist College Agenda Introduction QoI
More informationMaking Privacy Personal: Profiling Users Privacy Management Strategies on Social Networking Sites
SESSION ID: SEM-M01 Making Privacy Personal: Profiling Users Privacy Management Strategies on Social Networking Sites Pamela Wisniewski, Ph.D. Assistant Professor University of Central Florida @pamwis
More informationNCSS Statistical Software
Chapter 147 Introduction A mosaic plot is a graphical display of the cell frequencies of a contingency table in which the area of boxes of the plot are proportional to the cell frequencies of the contingency
More informationComparative Study of Electoral Systems (CSES) Module 4: Design Report (Sample Design and Data Collection Report) September 10, 2012
Comparative Study of Electoral Systems 1 Comparative Study of Electoral Systems (CSES) (Sample Design and Data Collection Report) September 10, 2012 Country: Poland Date of Election: 09.10.2011 Prepared
More informationChapter 3 Monday, May 17th
Chapter 3 Monday, May 17 th Surveys The reason we are doing surveys is because we are curious of what other people believe, or what customs other people p have etc But when we collect the data what are
More informationWorkshop on anonymization Berlin, March 19, Basic Knowledge Terms, Definitions and general techniques. Murat Sariyar TMF
Workshop on anonymization Berlin, March 19, 2015 Basic Knowledge Terms, Definitions and general techniques Murat Sariyar TMF Workshop Anonymisation, March 19, 2015 Outline Background Aims of Anonymization
More informationGood Vibrations: Can a Digital Nudge Reduce Digital Overload?
Fabian Okeke, Michael Sobolev Φ, Nicola Dell Ψ, Deborah Estrin Cornell Tech, Φ Technion, Ψ The Jacobs Institute [fno2;ms3377;nixdell;de226]@cornell.edu ABSTRACT Digital overuse on mobile devices is a growing
More informationSampling, Part 2. AP Statistics Chapter 12
Sampling, Part 2 AP Statistics Chapter 12 bias error Sampling error is just sampling variation! Bias vs Error BIAS is something that causes your measurements to systematically miss in the same direction,
More informationInvesting in Knowledge: Insights on the Funding Environment for Research on Inequality Among Young People in the United States
Investing in Knowledge: Insights on the Funding Environment for Research on Inequality Among Young People in the United States KEY FINDINGS Sarah K. Bruch Department of Sociology University of Iowa A William
More informationICOS: Interactive Clothing System
ICOS: Interactive Clothing System Figure 1. ICOS Hans Brombacher Eindhoven University of Technology Eindhoven, the Netherlands j.g.brombacher@student.tue.nl Selim Haase Eindhoven University of Technology
More informationIntroduction. Data Source
Introduction The emergence of digital technologies including the Internet, smartphones, tablets and other digital devices has increased both the complexity of the core definition of this construct, the
More informationHuman Computation and Crowdsourcing Systems
Human Computation and Crowdsourcing Systems Walter S. Lasecki EECS 598, Fall 2015 Who am I? http://wslasecki.com New to UMich! Prof in CSE, SI BS, Virginia Tech, CS/Math PhD, University of Rochester, CS
More informationA Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines
A Review of Related Work on Machine Learning in Semiconductor Manufacturing and Assembly Lines DI Darko Stanisavljevic VIRTUAL VEHICLE DI Michael Spitzer VIRTUAL VEHICLE i-know 16 18.-19.10.2016, Graz
More informationAIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara
AIEDAM Special Issue: Sketching, and Pen-based Design Interaction Edited by: Maria C. Yang and Levent Burak Kara Sketching has long been an essential medium of design cognition, recognized for its ability
More informationSampling Terminology. all possible entities (known or unknown) of a group being studied. MKT 450. MARKETING TOOLS Buyer Behavior and Market Analysis
Sampling Terminology MARKETING TOOLS Buyer Behavior and Market Analysis Population all possible entities (known or unknown) of a group being studied. Sampling Procedures Census study containing data from
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationWho Invents IT? March 2007 Executive Summary. An Analysis of Women s Participation in Information Technology Patenting
March 2007 Executive Summary prepared by Catherine Ashcraft, Ph.D. National Center for Women Anthony Breitzman, Ph.D. 1790 Analytics, LLC For purposes of this study, an information technology (IT) patent
More informationGE 113 REMOTE SENSING
GE 113 REMOTE SENSING Topic 8. Image Classification and Accuracy Assessment Lecturer: Engr. Jojene R. Santillan jrsantillan@carsu.edu.ph Division of Geodetic Engineering College of Engineering and Information
More informationSPECIAL REPORT. The Smart Home Gender Gap. What it is and how to bridge it
SPECIAL REPORT The Smart Home Gender Gap What it is and how to bridge it 2 The smart home technology market is a sleeping giant and no one s sure exactly when it will awaken. Early adopters, attracted
More informationThe Connected Home: Are You Ready?
Virtual Round Table Series The Connected Home: Are You Ready? 2017 Rich Binsacca Director + Chief Communicator Housing Innovation Alliance YOUR HOST Rich Binsacca Director + Chief Communicator rich@housinginnovation.org
More informationencompass - an Integrative Approach to Behavioural Change for Energy Saving
European Union s Horizon 2020 research and innovation programme encompass - an Integrative Approach to Behavioural Change for Energy Saving Piero Fraternali 1, Sergio Herrera 1, Jasminko Novak 2, Mark
More informationYears 9 and 10 standard elaborations Australian Curriculum: Digital Technologies
Purpose The standard elaborations (SEs) provide additional clarity when using the Australian Curriculum achievement standard to make judgments on a five-point scale. They can be used as a tool for: making
More informationSection 2: Preparing the Sample Overview
Overview Introduction This section covers the principles, methods, and tasks needed to prepare, design, and select the sample for your STEPS survey. Intended audience This section is primarily designed
More informationLatest trends in sentiment analysis - A survey
Latest trends in sentiment analysis - A survey Anju Rose G Punneliparambil PG Scholar Department of Computer Science & Engineering Govt. Engineering College, Thrissur, India anjurose.ar@gmail.com Abstract
More informationSocial Virtual Reality Best Practices. Renee Gittins July 30th, 2018 Version 1.2
Social Virtual Reality Best Practices Renee Gittins July 30th, 2018 Version 1.2 1 Contents Contents 2 Introduction 3 Moderation Layers 3 Personal Moderation 3 Personal Moderation Tools 3 Personal Moderation
More information15-388/688 - Practical Data Science: Visualization and Data Exploration. J. Zico Kolter Carnegie Mellon University Spring 2018
15-388/688 - Practical Data Science: Visualization and Data Exploration J. Zico Kolter Carnegie Mellon University Spring 2018 1 Outline Basics of visualization Data types and visualization types Software
More informationSocial Network Analysis in HCI
Social Network Analysis in HCI Derek L. Hansen and Marc A. Smith Marigold Bays-Muchmore (baysmuc2) Hang Cui (hangcui2) Contents Introduction ---------------- What is Social Network Analysis? How does it
More informationHow to encourage the crowd?
How to encourage the crowd? A Study about User Typologies and Motivations on Crowdsourcing Platforms Full paper available here: http://dx.doi.org/10.1109/ucc.2013.98 Daniel Schultheiss, Anja Blieske, Anja
More informationWho are your users? Comparing media professionals preconception of users to data-driven personas
Who are your users? Comparing media professionals preconception of users to data-driven personas Lene Nielsen IT University Copenhagen Rued Langgaardsvej 7, 2300 Cph, Denmark Lene@itu.dk Soon-Gyo Jung
More informationIntroduction. Descriptive Statistics. Problem Solving. Inferential Statistics. Chapter1 Slides. Maurice Geraghty
Inferential Statistics and Probability a Holistic Approach Chapter 1 Displaying and Analyzing Data with Graphs This Course Material by Maurice Geraghty is licensed under a Creative Commons Attribution-ShareAlike
More informationTEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS
TEMPORAL DIFFERENCE LEARNING IN CHINESE CHESS Thong B. Trinh, Anwer S. Bashi, Nikhil Deshpande Department of Electrical Engineering University of New Orleans New Orleans, LA 70148 Tel: (504) 280-7383 Fax:
More informationA Spatiotemporal Approach for Social Situation Recognition
A Spatiotemporal Approach for Social Situation Recognition Christian Meurisch, Tahir Hussain, Artur Gogel, Benedikt Schmidt, Immanuel Schweizer, Max Mühlhäuser Telecooperation Lab, TU Darmstadt MOTIVATION
More informationIt s good to share... Understanding the quality of the 2011 Census in England and Wales
It s good to share... Understanding the quality of the 2011 Census in England and Wales SRA Conference, London, December 2012 Adriana Castaldo Andrew Charlesworth AGENDA Context: 2011 Census quality assurance
More informationCOMET: Collaboration in Applications for Mobile Environments by Twisting
COMET: Collaboration in Applications for Mobile Environments by Twisting Nitesh Goyal RWTH Aachen University Aachen 52056, Germany Nitesh.goyal@rwth-aachen.de Abstract In this paper, we describe a novel
More informationJerry Reiter Department of Statistical Science Information Initiative at Duke Duke University
Jerry Reiter Department of Statistical Science Information Initiative at Duke Duke University jreiter@duke.edu 1 Acknowledgements Research supported by National Science Foundation ACI 14-43014, SES-11-31897,
More informationLabels - Quantified Self App for Human Activity Sensing. Christian Meurisch, Benedikt Schmidt, Michael Scholz, Immanuel Schweizer, Max Mühlhäuser
Labels - Quantified Self App for Human Activity Sensing Christian Meurisch, Benedikt Schmidt, Michael Scholz, Immanuel Schweizer, Max Mühlhäuser MOTIVATION Personal Assistance Systems (e.g., Google Now)
More informationThe comparison of online game experiences by players in games of Lineage & EverQuest: Role play vs. Consumption
The comparison of online game experiences by players in games of Lineage & EverQuest: Role play vs. Consumption Leo Sang-Min Whang Dept. of Psychology, Yonsei University WidagHall Rm. 43, Yonsei University
More informationCSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards
CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic
More informationENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS
BY SERAFIN BENTO MASTER OF SCIENCE in INFORMATION SYSTEMS Edmonton, Alberta September, 2015 ABSTRACT The popularity of software agents demands for more comprehensive HAI design processes. The outcome of
More informationMAT points Impact on Course Grade: approximately 10%
MAT 409 Test #3 60 points Impact on Course Grade: approximately 10% Name Score Solve each problem based on the information provided. It is not necessary to complete every calculation. That is, your responses
More informationUsing Online Communities as a Research Platform
CS 498 KA Experimental Methods for HCI Using Online Communities as a Research Platform Loren Terveen, John Riedl, Joseph A. Konstan, Cliff Lampe Presented by: Aabhas Chauhan Objective What are Online Communities?
More informationResume. Specialty: Clustering analysis, Image and Speech Processing, Data Mining
Cover Letter Experience for living and studying abroad with strong communication and writing skill in English Solid research background: NOKIA grant and CIMO grant were awarded, participated several international
More informationWi-Fi Fingerprinting through Active Learning using Smartphones
Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,
More informationThe Design and Application of Public Opinion Monitoring System. Hongfei Long
6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) The Design and Application of Public Opinion Monitoring System Hongfei Long College of Marxism,
More informationDefinitions of Ambient Intelligence
Definitions of Ambient Intelligence 01QZP Ambient intelligence Fulvio Corno Politecnico di Torino, 2017/2018 http://praxis.cs.usyd.edu.au/~peterris Summary Technology trends Definition(s) Requested features
More information1 Dr. Norbert Steigenberger Reward-based crowdfunding. On the Motivation of Backers in the Video Gaming Industry. Research report
1 Dr. Norbert Steigenberger Reward-based crowdfunding On the Motivation of Backers in the Video Gaming Industry Research report Dr. Norbert Steigenberger Seminar for Business Administration, Corporate
More informationMaking EFFECTIVE use of LinkedIn for Professional Networking. What is Social Media & Why is it Important? Through your network you can:
Making EFFECTIVE use of LinkedIn for Professional Networking Presented by Bryan C Webb, P. Eng. bwebb50@cogeco.ca www.linkedin.com/in/bryanwebb http://twitter.com/bryancwebb Copyright Nov 2009 What is
More informationGame Stages Govern Interactions in Arcade Settings. Marleigh Norton Dave McColgin Dr. Grinter CS
1 Game Stages Govern Interactions in Arcade Settings Marleigh Norton 901368552 Dave McColgin 901218300 Dr. Grinter CS 6455 4-21-05 2 The Story Groups of adults in arcade settings interact with game machines
More informationWEB-BASED VR EXPERIMENTS POWERED BY THE CROWD
WEB-BASED VR EXPERIMENTS POWERED BY THE CROWD Xiao Ma [1,2] Megan Cackett [2] Leslie Park [2] Eric Chien [1,2] Mor Naaman [1,2] The Web Conference 2018 [1] Social Technologies Lab, Cornell Tech [2] Cornell
More informationStats: Modeling the World. Chapter 11: Sample Surveys
Stats: Modeling the World Chapter 11: Sample Surveys Sampling Methods: Sample Surveys Sample Surveys: A study that asks questions of a small group of people in the hope of learning something about the
More informationIntroductory Lesson 2 Internet of Things
Introductory Lesson 2 Internet of Things 1 What you will need CloudProfessor (CPF) LED 101 light Overview In this lesson, students will design their own Smart home which utilises the Internet of Things
More informationAn Integrated Expert User with End User in Technology Acceptance Model for Actual Evaluation
Computer and Information Science; Vol. 9, No. 1; 2016 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Science and Education An Integrated Expert User with End User in Technology Acceptance
More informationApplication of AI Technology to Industrial Revolution
Application of AI Technology to Industrial Revolution By Dr. Suchai Thanawastien 1. What is AI? Artificial Intelligence or AI is a branch of computer science that tries to emulate the capabilities of learning,
More informationDesigning for End-User Programming through Voice: Developing Study Methodology
Designing for End-User Programming through Voice: Developing Study Methodology Kate Howland Department of Informatics University of Sussex Brighton, BN1 9QJ, UK James Jackson Department of Informatics
More informationComputer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062
Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics
More informationRegional Workshop on the Use of Electronic Data Collection Technologies in Population and Housing Censuses Bangkok, Jan.
Regional Workshop on the Use of Electronic Data Collection Technologies in Population and Housing Censuses Bangkok, 23-26 Jan. 2018 1. Overview of MIS in 2015 Census 2. Functions of MIS IT Operation
More informationConfidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT)
WHITE PAPER Linking Liens and Civil Judgments Data Confidently Assess Risk Using Public Records Data with Scalable Automated Linking Technology (SALT) Table of Contents Executive Summary... 3 Collecting
More informationTHE EFFECTS OF PC-BASED TRAINING ON NOVICE DRIVERS RISK AWARENESS IN A DRIVING SIMULATOR
THE EFFECTS OF PC-BASED TRAINING ON NOVICE DRIVERS RISK AWARENESS IN A DRIVING SIMULATOR Anuj K. Pradhan 1, Donald L. Fisher 1, Alexander Pollatsek 2 1 Department of Mechanical and Industrial Engineering
More informationDigitisation A Quantitative and Qualitative Market Research Elicitation
www.pwc.de Digitisation A Quantitative and Qualitative Market Research Elicitation Examining German digitisation needs, fears and expectations 1. Introduction Digitisation a topic that has been prominent
More informationHow Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory
Prev Sci (2007) 8:206 213 DOI 10.1007/s11121-007-0070-9 How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory John W. Graham & Allison E. Olchowski & Tamika
More informationThe Socio-Cultural Construction of Ubiquitous Computing. What is UbiComp?
The Socio-Cultural Construction of Ubiquitous Computing Jose Rojas University of Glasgow What is UbiComp? The most profound technologies are those that disappear. They weave themselves into the fabric
More informationJournal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS
List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE
More informationA Day in the Life of the Jos Curriculum Connections. Prince Edward Island
A Day in the Life of the Jos Curriculum Connections Prince Edward Island Communication and Information Technology Grade 6 Computer Systems B1.13 identify computer viruses, how they are transmitted and
More informationBeacons Collect Information from Users : Unpacking People s Misunderstandings of Bluetooth Beacon Technology
Yaxing Yao SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA yyao08@syr.edu Yun Huang SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA
More informationAn Effort to Develop a Web-Based Approach to Assess the Need for Robots Among the Elderly
An Effort to Develop a Web-Based Approach to Assess the Need for Robots Among the Elderly K I M M O J. VÄ N N I, A N N I N A K. KO R P E L A T A M P E R E U N I V E R S I T Y O F A P P L I E D S C I E
More informationDota2 is a very popular video game currently.
Dota2 Outcome Prediction Zhengyao Li 1, Dingyue Cui 2 and Chen Li 3 1 ID: A53210709, Email: zhl380@eng.ucsd.edu 2 ID: A53211051, Email: dicui@eng.ucsd.edu 3 ID: A53218665, Email: lic055@eng.ucsd.edu March
More informationLESSONS LEARNED IN AGILE TRANSFORMATION
LESSONS LEARNED IN AGILE TRANSFORMATION www.construx.com Construx COPYRIGHT NOTICE These presentation materials are 2016 Construx Software Builders, Inc. All Rights Reserved. No part of the contents of
More informationThe entry-level job seeker's guide to salary negotiation
The entry-level job seeker's guide to salary negotiation This guide At College Recruiter we believe that every student and grad deserves a great career. Every year we help thousands of entry-level candidates
More informationMoonzoo Kim. KAIST CS350 Intro. to SE Spring
Chapter 7 Requirements Engineering Moonzoo Kim CS Division of EECS Dept. KAIST moonzoo@cs.kaist.ac.kr http://pswlab.kaist.ac.kr/courses/cs350-07 ac kr/courses/cs350 07 Spring 2008 1 Requirements Engineering-I
More informationIt s an illusion to think that everyone is interested in tracking their health.
Edition September 2017 Smart Health, Wearables It s an illusion to think that everyone is interested in tracking their health. Which lessons were learned from the large-scale survey that imec* carried
More informationIowa Research Online. University of Iowa. Robert E. Llaneras Virginia Tech Transportation Institute, Blacksburg. Jul 11th, 12:00 AM
University of Iowa Iowa Research Online Driving Assessment Conference 2007 Driving Assessment Conference Jul 11th, 12:00 AM Safety Related Misconceptions and Self-Reported BehavioralAdaptations Associated
More informationSOFT 423: Software Requirements
SOFT 423: Software Requirements Week 5 Class 1 Personas and Interactive Systems SOFT 423 Winter 2015 1 Feedback Survey Don t forget to please fill out the survey! I would appreciate if you could fill it
More informationThe Gender Factor in Virtual Reality Navigation and Wayfinding
The Gender Factor in Virtual Reality Navigation and Wayfinding Joaquin Vila, Ph.D. Applied Computer Science Illinois State University javila@.ilstu.edu Barbara Beccue, Ph.D. Applied Computer Science Illinois
More informationAIMICT.ORG AIMICT Newsletter
SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program
More informationA Service Oriented Definition of Context for Pervasive Computing
A Service Oriented Definition of Context for Pervasive Computing Moeiz Miraoui, Chakib Tadj LATIS Laboratory, Université du Québec, École de technologie supérieure 1100, rue Notre-Dame Ouest, Montréal,
More informationInside the black-box. children rights in the digital age. Conceição Costa José Rogado Carla Sousa Sara Henriques
Inside the black-box children rights in the digital age Conceição Costa José Rogado Carla Sousa Sara Henriques Children Rights in the Digital Age The United Nations Convention on the Rights of the Child
More informationAN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL
AN EMPIRICAL ANALYSIS OF THE TECHNOLOGY CAMEL Wallace A. Wood, Bryant University, wwood@bryant.edu Suhong Li, Bryant University, sli@bryant.edu ABSTRACT The new technology product adoption lifecycle (TALC)
More informationDevices and Data and Agents, Oh My: How Smart Home Abstractions Prime End-User Mental Models
Devices and Data and Agents, Oh My: How Smart Home Abstractions Prime End-User Mental Models MEGHAN CLARK, University of Michigan, USA MARK W. NEWMAN, University of Michigan, USA PRABAL DUTTA, University
More informationThe Tool Box of the System Architect
- number of details 10 9 10 6 10 3 10 0 10 3 10 6 10 9 enterprise context enterprise stakeholders systems multi-disciplinary design parts, connections, lines of code human overview tools to manage large
More informationCode Hunt Contest Analytics. Judith Bishop, Microsoft Research, Redmond USA and team
Code Hunt Contest Analytics Judith Bishop, Microsoft Research, Redmond USA and team Working for fun Enjoyment adds to long term retention on a task Discovery is a powerful driver, contrasting with direct
More informationPrivacy as Impression Management
Institute for Software Research Privacy as Impression Management Sameer Patil patil@uci.edu Alfred Kobsa kobsa@ics.uci.edu ISR Technical Report # UCI-ISR-03-13 Institute for Software Research ICS2 210
More informationChapter- 5. Performance Evaluation of Conventional Handoff
Chapter- 5 Performance Evaluation of Conventional Handoff Chapter Overview This chapter immensely compares the different mobile phone technologies (GSM, UMTS and CDMA). It also presents the related results
More informationS.4 Cab & Controls Information Report:
Issued: May 2009 S.4 Cab & Controls Information Report: 2009-1 Assessing Distraction Risks of Driver Interfaces Developed by the Technology & Maintenance Council s (TMC) Driver Distraction Assessment Task
More informationARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit)
Exhibit R-2 0602308A Advanced Concepts and Simulation ARMY RDT&E BUDGET ITEM JUSTIFICATION (R2 Exhibit) FY 2005 FY 2006 FY 2007 FY 2008 FY 2009 FY 2010 FY 2011 Total Program Element (PE) Cost 22710 27416
More informationGeneral Secretariat (SG)
General Secretariat (SG) Geneva, 20 February 2018 Ref: CL-18/08 TSB/AM Contact: Alessia Magliarditi Telephone: +41 22 730 5882 Telefax: E-mail: +41 22 730 5853 kaleidoscope@itu.int To: ITU Member States
More information