To see the other types of publications on this topic, follow the link: Personal uses of computer.

Dissertations / Theses on the topic 'Personal uses of computer'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Personal uses of computer.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gingery, David L. "Pastoral uses of the personal computer." Theological Research Exchange Network (TREN), 1986. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Song, Yanjie. "Educational uses of PDAs (personal digital assistants) undergraduate student experiences /." Click to view the E-thesis via HKUTO, 2009. http://sunzi.lib.hku.hk/hkuto/record/B42841410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Song, Yanjie, and 宋燕捷. "Educational uses of PDAs (personal digital assistants): undergraduate student experiences." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B42841410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Katule, Ntwa. "Utilization of personal health informatics through intermediary users." Doctoral thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29358.

Full text
Abstract:
Personal informatics are important tools in health self-management as they support individuals to quantify and self-reflect on their lifestyle. Human-computer interaction researchers have devoted resources on studying how to design such tools. Various motivational strategies have been explored for their capabilities in improving user engagement. However, such strategies are developed with an assumption that the targeted consumer of information is the one directly manipulating user interfaces of the system that has information. This may not always be the case for users in developing regions. As a result, such systems may not scale well in contexts where a targeted consumer (beneficiary) may use technology through the facilitation of another person (intermediary) whom is responsible for manipulating user interfaces, because such facilitators are not recognized as part of the system, hence motivational strategies don't cater for them. In order to uncover design implications for intermediated technology use in the context of personal health informatics (PHI), the researcher started with the theoretical framing of the work followed by a contextual enquiry which led to development of mobile applications' prototypes for tracking nutrition and physical activity. Evaluation of the prototypes revealed that a familial relationship is a prerequisite for such an intervention. The most promising combination involves family members, possibly a child and a parent working together. The study used self-determination theory to understand how a collaborative gamified system can increase engagement. The result revealed that gamification as the source of a significant increase in perceived competence in intermediary users whom also tended to consider themselves as co-owners of the interaction experience. Therefore, gamification was found to be a catalyst for increasing collaboration between an intermediary and beneficiary user of technology, provided that the two users that formed a pair had a prior social relationship. In the absence of gamification, intermediary users tended to be less engaged in the intervention. The study highlights both the positive and negative aspects of gamification in promoting collaboration in intermediated use and its general implications in health settings. Design considerations required in order to improve the overall user experience of both users involved are proposed. In general, this work contributes to both theory and empirical validation of factors for, supporting proximate-enabled intermediated use of personal health informatics.
APA, Harvard, Vancouver, ISO, and other styles
5

Murphy, Robert P., and Lorraine S. Davis. "Personal computer use at Navy Field Activities: a productivity study." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26161.

Full text
Abstract:
In the past, corporations justified investment in office automation (OA) by vague claims of increased productivity. Now, managers are reevaluating their productivity measurement systems in an effort to identify productivity gains resulting from OA. The purpose of this thesis is to present a methodology for determining the impact of OA on office productivity. This study examined the productivity of the Standard Automated Contracting System for Federal Agencies (SACONS), in a before/after quasi-experimental design that measured outputs (volume, quality of work), inputs (staff size, grade structure, overtime usage), and by-product social effects (morale, teamwork) using archival data. This framework, developed in a previous SACONS study, is used to analyze the strength of SACONS software. The results of this study were confounded by external events that adversely affected our results. Only the quality of work measure (Procurement Action Lead Time), which was reduced by 13 percent, showed a significant productivity gain. Further study of SACONS is necessary to determine its impact on office productivity
APA, Harvard, Vancouver, ISO, and other styles
6

Dill, Byron. "Human robot interaction using a personal digital assistant interface : a study of feedback modes /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p1418012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Paradesi, Sharon M. (Sharon Myrtle) 1986. "User-controlled privacy for personal mobile data." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/93839.

Full text
Abstract:
Thesis: Elec. E. in Computer Science, Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 81-82).
Smartphones collect a wide range of sensor data, ranging from the basic, such as location, accelerometer, and Bluetooth, to the more advanced, such as heart rate. Mobile apps on the Android and iOS platforms provide users with "all-or-nothing" controls during installation to get permission for data collection and use. Users have to either agree to have the app collect and use all the requested data or not use the app at all. This is slowly changing with the iOS framework, which now allows users to turn off location sharing with specific apps even after installation. MIT Living Lab platform is a mobile app development platform that uses openPDS to provide MIT users with personal data stores but currently lacks user controls for privacy. This thesis presents PrivacyMate, a suite of tools for MIT Living Labs that provide user-controllable privacy mechanisms for mobile apps. PrivacyMate aims to enable users to maintain better control over their mobile personal data. It extends the model of iOS and allows users to select or deselect various types of data (more than just location information) for collection and use by apps. Users can also provide temporal and spatial specifications to indicate a context in which they are comfortable sharing their data with certain apps. We incorporate the privacy mechanisms offered by PrivacyMate into two mobile apps built on the MIT Living Lab platform: ScheduleME and MIT-FIT. ScheduleME enables users to schedule meetings without disclosing either their locations or points of interest. MIT-FIT enables users to track personal and aggregate high-activity regions and times, as well as view personalized fitness-related event recommendations. The MIT Living Lab team is planning to eventually deploy PrivacyMate and MIT-FIT to the entire MIT community.
by Sharon Myrtle Paradesi.
Elec. E. in Computer Science
APA, Harvard, Vancouver, ISO, and other styles
8

Gwizdka, Jacek, and Mark Chignell. "Individual Differences in Personal Information Management." University of Washington Press, 2007. http://hdl.handle.net/10150/105751.

Full text
Abstract:
In an increasingly complex world where people routinely handle large amounts of information, individuals are constantly challenged to manage and effectively use the information that they are responsible for. While email is the canonical example of an information overloading application, other well known PIM applications and tasks cited in earlier chapters of this book include maintaining addresses and contacts, scheduling, and organizing the various documents and bookmarks that one is interested in. Not surprisingly, there are individual differences (ID) in how, and how well, people cope with the challenge of personal information management. This greatly complicates any scientific analysis of PIM behavior. Thus, in addition to the evaluation methods discussed in the previous chapter, researchers and designers need to consider when and how individual differences should be included within parsimonious interpretations and explanations of PIM behavior. In this chapter we propose an approach where differences between individuals are considered last, after the influences of the environment and the task context have first been considered, and after group difference (e.g., between job classifications) have been investigated. We believe that this is a logical way to proceed, since like observing an ant walking over sand-dunes (cf. Simon, 1996) we should not ascribe complexities to an individual if they can instead be explained as due to properties of the environment. The goal of this chapter will be to review and synthesize some of the key findings in how PIM behavior differs between individuals. Some of the reasons why these differences occur and what can be done about them will also be discussed.
APA, Harvard, Vancouver, ISO, and other styles
9

Wallace, John Glenn. "Speech synthesis using a digital modulation scheme on the IBM personal computer." Diss., Rolla, Mo. : School of Mines and Metallurgy of the University of Missouri, 1989. http://scholarsmine.mst.edu/thesis/pdf/Wallace_09007dcc805dc178.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 1989.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed January 9, 2009) Includes bibliographical references (p. 39-40).
APA, Harvard, Vancouver, ISO, and other styles
10

Bylund, Markus. "Personal service environments : Openness and user control in user-service interaction." Licentiate thesis, Uppsala universitet, Avdelningen för datalogi, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86015.

Full text
Abstract:
This thesis describes my work with making the whole experience of using electronic services more pleasant and practical. More and more people use electronic services in their daily life — be it services for communicating with colleagues or family members, web-based bookstores, or network-based games for entertainment. However, electronic services in general are more difficult to use than they would have to be. They are limited in how and when users can access them. Services do not collaborate despite obvious advantages to their users, and they put the integrity and privacy of their users at risk. In this thesis, I argue that there are structural reasons for these problems rather than problems with content or the technology per se. The focus when designing electronic services tends to be on the service providers or on the artifacts that are used for accessing the services. I present an approach that focus on the user instead, which is based on the concept of personal service environments. These provide a mobile locale for storing and running electronic services of individual users. This gives the user increased control over which services to use, from where they can be accessed, and what personal information that services gather. The concept allows, and encourages, service collaboration, but not without letting the user maintain the control over the process. Finally, personal service environments allow continuous usage of services while switching between interaction devices and moving between places. The sView system, which is also described, implements personal service environments and serves as an example of how the concept can be realized. The system consists of two parts. The first part is a specification of how both services for sView and infrastructure for handling services should be developed. The second part is a reference implementation of the specification, which includes sample services that adds to and demonstrates the functionality of sView.
APA, Harvard, Vancouver, ISO, and other styles
11

Weideman, Melius. "A critical evaluation of the destructive impact of computer viruses on files stored by personal computer users." Thesis, Cape Technikon, 1994. http://hdl.handle.net/20.500.11838/1363.

Full text
Abstract:
Thesis (Masters Diploma (Information Technology))--Cape Technikon, Cape Town, 1994
Computer virus programs are generally perceived to be a threat to the information stored by computer users. This research evaluated the impact computer viruses have on information stored by computer users. The emphasis was on the effects of computer viruses rather than on the detail of their operation. The main hypotheses involved the question of whether or not computer viruses do pose a threat to the information stored by computer users. The effect of computer viruses on the information of users in industry was measured by sending a questionnaire to 388 companies country-wide. &~ average of 2l,5% of the respondents claimed detrimental effects to information stored on disk due to computer viruses. This and other data was used to guide laboratory experiments on the actual damage done by computer viruses to stored information. A set of test disks was prepared to represent programs and data of a typical PC user in industry. Fifteen different virus programs were used individually to infect the test disks. After each infection, all the test disks were inspected to ascertain damage to data, system and program files as well as to separate disk sectors. The research established that: The damage done by computer viruses to stored information is generally limited to one file or disk area. Where damage to stored information did occur, it was often reversible. Irrational user responses to virus symptoms provide a large potential source for damage to stored information. The availability of master program disks (for program file restoration) and recent, validated data backup is essential to recovery from a computer virus infection. A user can solve most problems caused by virus infections if he has a basic understanding of disk structure, i.e. tracks, sectors, sides, the FAT, etc, and of the use of disk utility programs like Norton Utilities or PCTools. The fact that some of the findings of prominent virus researchers could not be verified, suggests that virus programs could be unstable. Claims regarding the damage inflicted by viruses must be considered to be valid only for a specific copy of the virus under discussion. The importance of using original application software (to minimize the transfer of viruses and to enable program file restoration) , regular back-ups (to enable data file restoration) and basic user awareness (infection prevention, symptoms, the use of anti-viral and utility programs, etc.) was emphasized. The average PC user should be able to clear up a virus infection without assistance by following the given disinfection procedure. Suggestions for further study include virus origins, generations, mutations, multiple infections, and the effect of viruses on computer networks.
APA, Harvard, Vancouver, ISO, and other styles
12

Foster, Kristina 1981. "Context based specific user interfaces for the personal router." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28387.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 59-60).
For this thesis, I am concerned with the User Interface (UI) design of the Personal Router (PR), a device that dynamically selects wireless services in an open market on behalf of a mobile user [3]. The Personal Router chooses from a set of locally available services based on their Quality of Service (QoS) attributes as well as the user's preferences for these attributes, which the PR learns by interacting with the user [10]. To ensure accurate learning it is necessary that the PR/user interaction is both intuitive and non-obtrusive to the user and informative to the PR, often two conflict goals. Meeting both goals simultaneously requires a Context Based Specific User Interface that adjusts how it interacts with the user based on his context, where context is loosely defined as interaction constraints imposed by the user's environment, activity or situation. The context specific UI allows the PR to acquire the most informative user information for accurate learning while being as intuitive and non-obtrusive as possible. In this thesis, I present the design of the Context Based Specific UI as well as three different implemented UIs that vary in the amount of detail they allow the user to express. Although the less detailed UIs require less interaction from the user, the resulting learned information is not as accurate of the user's feelings and is based on assumptions of the user's behavior. The more detailed UIs have the opposite advantage and disadvantage. Finally, I present a method of combining the three Uls such that the user can select the one that best matches his current context.
by Kristina Foster.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
13

Aldeco, Perez Rocio. "Secure provenance-based auditing of personal data use." Thesis, University of Southampton, 2012. https://eprints.soton.ac.uk/340065/.

Full text
Abstract:
In recent years, an increasing number of personalised services that require users to disclose personal information have appeared on the Web (e.g. social networks, governmental sites, on-line selling sites). By disclosing their personal information, users are given access to a wide range of new functionality and benefits. However, there exists a risk that their personal information is misused. To strike a balance between the advantages of personal information disclosure and protection of information, governments have created legal frameworks, such as the Data Protection Act, Health Insurance Portability & Accountability Act (HIPAA) or Safe Harbor, which place restrictions on how organisations can process personal information. By auditing the way in which organisations used personal data, it is possible to determine whether they process personal information in accordance with the appropriate frameworks. The traditional way of auditing collects evidence in a manual way. This evidence is later analysed to assess the degree of compliance to a predefined legal framework. These manual assessments are long, since large amounts of data need to be analysed, and they are unreliable, since there is no guarantee that all data is correctly analysed. As several cases of data leaks and exposures of private data have proven, traditional audits are also prone to intentional and unintentional errors derived from human intervention. Therefore, this thesis proposes a provenance-based approach to auditing the use of personal information by securely gathering and analysing electronic evidence related to the processing of personal information. This approach makes three contributions to the state of art. The first contribution is the Provenance-based Auditing Architecture that defies a set of communication protocols to make existing systems provenance-aware. These protocols specify which provenance information should be gathered to verify the compliance with the Data Protection Act. Moreover, we derive a set of Auditing Requirements by analysing a Data Protection Act case study and demonstrate that provenance can be used as electronic evidence of past processing. The second contribution is the Compliance Framework, which is a provenance-based auditing framework for automatically auditing the compliance with the Data Protection Act's principles. This framework consist of a provenance graph representation (Processing View), a novel graph-based rule representation expressing processing rules (Usage Rules Definition) and a novel set of algorithms that automatically verify whether information was processed according to the Auditing Requirements by comparing the Processing View against the Usage Rules Definition. The third contribution is the Secure Provenance-based Auditing Architecture that ensures any malicious alteration on provenance during the entire provenance life cycle of recording, storage, querying and analysis can be detected. This architecture, which relies on cryptographic techniques, guarantees the correctness of the audit results
APA, Harvard, Vancouver, ISO, and other styles
14

Claar, Chester L. "The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model." DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/878.

Full text
Abstract:
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research. The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling technique that recruited a total of 186 participants who completed the online survey. The research model contains a total of 26 hypothesized relationships that were tested using multiple regression analysis techniques. The research model contains six main predicting variables (perceived vulnerability, perceived severity, perceived benefits, perceived barriers, self-efficacy, and cues to action) and four moderating variables (age, gender, education, and prior experience of attack). The model explains 30.4% of the variance in computer security usage, the dependent variable in the research model. The results demonstrate that certain constructs found in the Health Belief Model are more effective than others in motivating individuals to utilize computer security software. Specifically, the results show that perceived vulnerability (H1), perceived barriers (H4), self-efficacy (H5), and the two-way interactions of age and barriers (H8d), education and benefits (H9c), prior experience and perceived severity (H10b), and prior experience and self-efficacy (H10e) had significant effects on computer security usage. Additionally, prior experience was found to have a significant main effect on the dependent variable. Information from this research provides evidence that the Health Belief Model can be used to study the computer security usage behavior of home computer users. Further, the relationship of perceived vulnerability and computer security usage provides a way for practitioners to increase computer security usage behavior through targeted media campaigns.
APA, Harvard, Vancouver, ISO, and other styles
15

Kant, Tanya. "Making it personal : web users and algorithmic personalisation." Thesis, University of Sussex, 2016. http://sro.sussex.ac.uk/id/eprint/65082/.

Full text
Abstract:
This thesis investigates how web users negotiate and engage with contemporary algorithmic personalisation practices; that is, practices which seek to infer (via data tracking mechanisms and other algorithmic means) a user's habits, preferences or identity categorisations in order to ‘make personal' some component of that user's web experience. Drawing on thirty-six semi-structured interviews, I employ a qualitative methodology that seeks to bridge the gap between critical theorisations of algorithmic personalisation and the negotiations of web users themselves who encounter algorithmic personalisation in everyday life. To do this I focus on three sites of investigation. I first examine privacy tool Ghostery and the ways in which Ghostery users' negotiate their positions as data-tracked subjects, especially in relation to privacy, knowledge and their sense of self. I then investigate Facebook's autoposting apps as examples of algorithmic personalisation that act on the user's behalf, and draw on the accounts of Facebook app users to explore themes such as identity performance, autonomous control and algorithmic governance. Finally I examine users' engagement with the ‘predictive powers' (Google Now, 2014) of the personalisation app Google Now, specifically in regards to notions of user trust, expectation and speculation. My critical enquiries produced a number of themes that tie this thesis together. Central were: the epistemic uncertainties that emerged as trust and anxiety in participant responses; the implications for a performative understanding of selfhood when algorithmic personalisation intervenes in user self-articulation; the (asymmetrical) data-for-services exchange which web users must negotiate with commercial data trackers; and the struggle for autonomy between user and system that algorithmic personalisation creates. The thesis also argues that algorithmic personalisation demands that web users' identities be constituted as both a stable and fixable ‘single identity', but also as recursively reworkable, dividualised and endlessly expressable entities.
APA, Harvard, Vancouver, ISO, and other styles
16

Varnadore, Michael Ray. "Examining the End-user Perspective of Personal Computer Security| A Qualitative Q Methodology Study." Thesis, University of Phoenix, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10808067.

Full text
Abstract:

The Personal Computer is one of the most versatile inventions of the modern world. From its introduction in the 1980s, businesses have used these devices to perform everything from routine administrative tasks to complex engineering activities. Without proper attention to the security, companies put their ongoing operations and data at risk of theft, alteration, or destruction. Employees using personal computing systems are the primary gatekeepers of intellectual property and at the same time are the source of most data breaches. The purpose of this study was to analyze attitudes and behavioral patterns of end-users who repeatedly fall victim to simulated phishing attacks. Using a Q-Methodology approach, participants rated their level of agreement or disagreement of statements collected from research about end-user attitude and training towards computer security. Analysis of participant responses yielded three factors that demonstrated a pattern of behavior and opinion and categorized participants into three groups; gatekeepers, oblivions, and conformists. Analysis of the three group’s alignment with the studies research questions reveals that although all groups are well trained in computer security procedure and policy, two of the groups demonstrate deficiency in recognizing cyber risk and understanding how to protect against the threat. For companies to be secure, the end-user must view themselves as the primary gatekeeper to protect intellectual property. Technology can be circumvented, passwords can be compromised, and systems can be penetrated. The most effective method therefore to combat cyber threat is to create a culture of vigilance that every end-user understands, accepts, and embraces as their primary responsibility.

APA, Harvard, Vancouver, ISO, and other styles
17

Balakrishnan, Dineshbalu. "Design and implementation of a personal assistant for mobile device users using agent technology." Thesis, University of Ottawa (Canada), 2004. http://hdl.handle.net/10393/26571.

Full text
Abstract:
Programs which semi-autonomously act on behalf of software applications or users and execute tasks are called agents. Agent technology is used to design the personal assistant, which falls under the category of software agents. The personal assistant is broken down into different agent components and forms a partially ad-hoc multi-agent system. Though the personal assistant is intended for mobile device users and executes in mobile devices, some of its components are executed in a workstation i.e., desktop PC. The personal assistant's components that are executed in a workstation act as a gateway of communication for the personal assistant. This approach resolves problems such as unstable execution environments, overloading, and insufficient resources in mobile devices. The personal assistant is executed on the PersonalJava runtime environment and the MicroFIPA-OS agent platform. The personal assistant's components in the workstation are executed on the Java Runtime Environment and the FIPA-OS agent platform. The personal assistant could assist a mobile device user while executing tasks such as file and media transfer, e-mail formatting, address book maintenance, and report retrieval. (Abstract shortened by UMI.)
APA, Harvard, Vancouver, ISO, and other styles
18

Shah, Tarun. "Generation of grey box use cases for personal communication systems using simple design machines." Thesis, University of Ottawa (Canada), 1995. http://hdl.handle.net/10393/10285.

Full text
Abstract:
The advantages in representing high level user service scenarios by means of a formal testable design notation are several. Formalized scenarios provide for a more extensive test coverage of designs both from the user perspective and the system perspective when compared to a non formal method such as one employing natural language. Verifying completeness of design by scenario checking is targeted towards catching design errors. We present guidelines for constructing test cases and scenarios which simplify the process and disambiguate the specification. This thesis defines a formal testable design notation called Simple Design Machines (SDM's) (simplification of Design Machines); which lends itself to the semi-automated generation of grey-box use cases. These grey box use cases, when combined with white and black box test cases, provide for a more comprehensive test suite. Thus, SDM's support design for Software Testability. Personal Communication Systems is the application used to validate SDM's. In this thesis, first the need for a testable design language is demonstrated, then different existing testing techniques are reviewed, followed by an overview of the proposed new language (SDM's) and the application used for validation (PCS). SDM's are effective in situations where the system responds to combinations of inputs. Examples illustrating how to construct SDM's for simple applications are then given. We subsequently define a mapping from PCS communication systems to SDM's, walk through the generation of grey box use cases, validate these use cases and measure coverage for the SDM designs. A variety of different tools are assessed into for feasibility with respect to automatic test case generation A prototype of the Symbolic Scenario Selector was implemented in C and tested on PCS. Traces are generated for the SDM's and coverage is measured. Inconsistencies in the specification can be detected as the PCS example demonstrated. Finally, we assess advantages and limitations of the approach based on the case study and other experiences.
APA, Harvard, Vancouver, ISO, and other styles
19

Harper, Jocelyn R. ""Please do not lean on the computer it has feelings too" the relationships transferred by humans to technology /." Access electronically, 2007. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20080904.120259/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Zerega, Bravo Rafael, and Borislav Lazarov. "To touch or not to touch : A comparison between traditional and touchscreen interface within personal computers." Thesis, Södertörns högskola, Institutionen för kommunikation, medier och it, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-15362.

Full text
Abstract:
Touchscreen technology is gradually becoming more popular and massive in our present society to the point where it is hard to find a person that has never used this interface system. Handheld devices such as mobile phones and tablets are predominantly based on touchscreens as the main way to interact with them. Nevertheless, that is not the case when it comes to personal computers either desktop machines or laptops which are still chiefly based on traditional keyboard and mouse as their main input system. In this study we explore the potential that touchscreen based interface can offer for personal computers carrying through an observational experiment with six participants that were asked to perform a list of tasks using both traditional keyboard-mouse interface and touchscreen interface. The measurements during the observation concerned time and error rate for every task. Each participant was interviewed right after the completion of the observational phase in order to get a qualitative insight on their views and perceptions regarding both interfaces. The data collected was analyzed based on some existing models within touchscreen interface and human-computer interaction that have been elaborated in previews research. The final results led to the conclusion, that touchscreen-based interface proved to be slower and have higher error rate than traditional interface in a big number of the tasks performed by the participants. Similarly, the general perception of the people towards having touchscreen on a personal computer still seems a bit doubtful, although they do see some concrete positive aspects about this interface. Nevertheless, touchscreen outperformed traditional interface in some particular tasks. This implies that touchscreen interface has a clear potential for personal computers that would let users utilize these machines in a much broader and more interactive way than people do it today with the traditional keyboard-mouse interface.
APA, Harvard, Vancouver, ISO, and other styles
21

Ophoff, Madri. "Distributing intelligence in the wireless control of a mobile robot using a personal digital assistant." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1355.

Full text
Abstract:
Personal Digital Assistants (PDAs) have recently become a popular component in mobile robots. This compact processing device with its touch screen, variety of built-in features, wireless technologies and affordability can perform various roles within a robotic system. Applications include low-cost prototype development, rapid prototyping, low-cost humanoid robots, robot control, robot vision systems, algorithm development, human-robot interaction, mobile user interfaces as well as wireless robot communication schemes. Limits on processing power, memory, battery life and screen size impact the usefulness of a PDA in some applications. In addition various implementation strategies exist, each with its own strengths and weaknesses. No comparison of the advantages and disadvantages of the different strategies and resulting architectures exist. This makes it difficult for designers to decide on the best use of a PDA within their mobile robot system. This dissertation examines and compares the available mobile robot architectures. A thorough literature study identifies robot projects using a PDA and examines how the designs incorporate a PDA and what purpose it fulfils within the system it forms part of. The dissertation categorises the architectures according to the role of the PDA within the robot system. The hypothesis is made that using a distributed control system architecture makes optimal use of the rich feature set gained from including a PDA in a robot system’s design and simultaneously overcomes the device’s inherent shortcomings. This architecture is developed into a novel distributed intelligence framework that is supported by a hybrid communications architecture, using two wireless connection schemes. A prototype implementation illustrates the framework and communications architecture in action. Various performance measurements are taken in a test scenario for an office robot. The results indicate that the proposed framework does deliver performance gains and is a viable alternative for future projects in this area.
APA, Harvard, Vancouver, ISO, and other styles
22

Pour, Shiva Abdi Farzaneh. "User Identification Roadmap towards 2020 : A study of personal identification challenges for ubiquitous computing world." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3485.

Full text
Abstract:
This thesis is about Personal Identification challenges towards Ubiquitous Computing world as targeted in 2020. The study starts by defining the problems that how diversity of tools for personal identification as an always-foreground activity is problematic in order to become a pervasive interaction. The thesis is divided into three parts. Part one is introduction, background and related works. Part two will describe the empirical study—Triangulation— that is supported by qualitative and quantitative methods. Observation and the analysis over collected data, also the result of informal interviews will cover the qualitative part. The informal interview consists of pre-determined questions that some answers have been analyzed by graphs and the last part of interview was the open discussion that ascertain what values the interviewees counts in today’s identification designs and what challenges or improvements they believe for future of personal identification. Last part is the future works and conclusion. The result of empirical study was applied on new technologies like RFID, Mobile identification and Biometrics, to investigate whether new identification tools and techniques cover the challenges on today’s identification and what future works they might need to focus on.
This thesis starts with thinking about the problems of the today’s identification; why we need to carry dozens of different magnetic cards, bunches of keys, or memorizing many digital pins and pass code? To do the study, I observed people at shopping and traveling to find out what and how people interact with tools, what are their behaviors, experiences, or reactions when they need to approve their identity. and what problems they encounter. Informal discussion with designers was the next step of empirical study. The analysis over collected data guided us into problems in today’s identifications: ‘Foreground activity’, ‘Diversity of tools and interactions’, ‘security’, ‘trust’ and ‘being economical’. Last section of the thesis is the investigating on current designs; RFID can be good solution for pervasive identification if the security and privacy of people respected. Mobile will be an inevitable part of every design in future. However, mobile phone designers should think about diversity of interface layouts that may be a barrier for unified identification interactions. Biometrics also seems the inevitable part of future of identification. Apart from technology, social engagement and supports, especially in terms of privacy is one of the most noticeable concerns. Information forensics, and level of awareness should be specified before the benefits of pervasive identifications threaten people’s privacies.
APA, Harvard, Vancouver, ISO, and other styles
23

Wu, Justin Chun. "Peering Through the Cloud—Investigating the Perceptions and Behaviors of Cloud Storage Users." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6175.

Full text
Abstract:
We present the results of a survey and interviews focused on user perceptions and behaviors with respect to cloud storage services. In particular, we study behaviors such as which services are used, what types of data are stored, and how collaboration and sharing are performed. We also investigate user attitudes toward cloud storage on topics such as payment, privacy, security, and robustness. We find that users are drawn to cloud storage because it enables robust, ubiquitous access to their files, as well as enabling sharing and collaborative efforts. However, users' preferred medium for file sharing continues to be email, due to its ubiquity and role as "lowest common denominator." Privacy and security are of great concern to users, and though users vocally describe feeling "safe" on the cloud, this is because they actively filter the content they store in cloud services. Payment is a sensitive issue, with users exhibiting a strong aversion to any form of direct payment, preferring even disliked alternative funding mechanisms such as targeted advertising. Finally, the cloud serves as an important backup location for users, although space limitations prevent them from using it as a full backup solution.
APA, Harvard, Vancouver, ISO, and other styles
24

Morley, Deborah G. "Design and adaptation of a general purpose, user friendly statistical software package for the IBM personal computer and IBM PC compatibles (PC VSTAT)." Ohio : Ohio University, 1986. http://www.ohiolink.edu/etd/view.cgi?ohiou1183141969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hanrahan, Benjamin Vincent. "Getting Lost in Email: How and Why Users Spend More Time in Email than Intended." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/51204.

Full text
Abstract:
Email has become deeply embedded in many users' daily lives. To investigate how email features in users lives, particularly how users attend to email and get lost within it, I ran five studies that probed how users determined relevancy of messages, logged interactions with email, gathered diary entries related to individual sessions, and investigated the gratifications sought from email use. For the first study, I performed an exploratory experiment in the laboratory to determine how participants assessed the importance of individual emails (N=10). The next investigation I undertook involved three different studies, which I detail individually: a survey on email usage (N=54); a two-week study of email usage (N=20); and finally, the application of Attentional Network Test (N=9). My final study was to validate my findings around the reasons for attending to email, this was done through deploying a survey that followed the Uses and Gratification Theory tradition (N=52) In my studies I found that the majority of attentional effort is around reading email and participating in conversations, as opposed to email management. I also found that participants attended to email primarily based on notifications, instead of the number of unread messages in their inbox. I present my results through answering several research questions, and leverage Conversation Analysis (CA), particularly conversation openings, to explicate several problematic aspects around email use. My findings point to inefficiencies in email as a communication medium, mainly, around how summons are (or are not) issued. This results in an increased burden on email users to maintain engagement and determine (or construct) the appropriate moment for interruption. My findings have several implications: email triage does not seem to be problematic for the participants in my studies, somewhat in contrast to previous research; much of the problem around email, particularly emph{getting lost in email} is in managing the tension between promptly responding to messages while limiting engagement with email; due to the social nature of the problems with email, modifications to the email client are limited in their potential effectiveness to prevent getting lost and reduce email related anxiety.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
26

Navarro, Sainz Adriana G. "An Exploratory Study: Personal Digital Technologies For Stress Care in Women." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543579225538012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Nicholas, Michael P. "(Re)defining Relationships in a Mediated Context: Graduate Student Use of Synchronous Computer-Mediated Communication." [Tampa, Fla] : University of South Florida, 2008. http://purl.fcla.edu/usf/dc/et/SFE0002400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Windingland, Kim, and John LaPlante. "Telemetry System User Interface for Windows™." International Foundation for Telemetering, 1993. http://hdl.handle.net/10150/611849.

Full text
Abstract:
International Telemetering Conference Proceedings / October 25-28, 1993 / Riviera Hotel and Convention Center, Las Vegas, Nevada
Due to the rapid advancement of technology in GUI design tools within Microsoft Windows™, a sophisticated human-machine interface can be developed for telemetry systems. A PC Windows™-based telemetry system would effectively provide a "bridge" between the telemetry world and the Windows™ world, bringing many low cost off-the-shelf software and hardware tools into the telemetry realm that has been unprecedented. This paper describes the results of such an approach in the development of Loral's Visual Telemetry System (VTS) software.
APA, Harvard, Vancouver, ISO, and other styles
29

Tunnell, Harry D. IV. "Promoting common ground in a clinical setting| The impact of designing for the secondary user experience." Thesis, Indiana University - Purdue University Indianapolis, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10181724.

Full text
Abstract:

Primary users can create a user experience (UX) for others—secondary users—when interacting with a system in public. Common ground occurs when people have certain knowledge in common and each knows that they have this shared understanding. This research investigates how designing for a secondary UX improves common ground during a patient-provider first encounter. During formative work, patients and providers participated in telephonic interviews and answered online questionnaires so that their respective information requirements for clinical encounters could be understood. The outcome of the formative work was a smartphone application prototype to be used as the treatment in an experimental study. In a mixed methods study, with a patient role-player using the prototype during a simulated clinical encounter with 12 providers, the impact of the prototype upon secondary user satisfaction and common ground was assessed. The main finding was that the prototype was capable of positively impacting secondary user satisfaction and facilitating common ground in certain instances. Combining the notions of human-computer interaction design, common ground, and smartphone technology improved the efficiency and effectiveness of providers during the simulated face-to-face first encounter with a patient. The investigation substantiated the notion that properly designed interactive systems have the potential to provide a satisfactory secondary UX and facilitate common ground.

APA, Harvard, Vancouver, ISO, and other styles
30

He, Wu. "The effects of conceptual description and search practice on users' mental models and information seeking in a case libray with a best match search mechanism." Diss., Columbia, Mo. : University of Missouri-Columbia, 2006. http://hdl.handle.net/10355/5863.

Full text
Abstract:
Thesis (Ph. D.)--University of Missouri-Columbia, 2006.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file (viewed on July 21, 2008) Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
31

Gustafsson, Viktor. "Interacting with Intelligent Personal Assistants : Blending Voice and Chat Interaction to Improve Learnability." Thesis, Umeå universitet, Institutionen för tillämpad fysik och elektronik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-181881.

Full text
Abstract:
The largest software companies in the world are racing to develop their Intelligent Personal Assistants. Each with more and more capabilities and ways for users to access them. The different assistants have different capabilities and one of the ways the companies are differentiating is in the interaction techniques their assistants that are controlled with, most uses voice, and some uses text. This thesis walks through these interaction techniques, give a brief overview of intelligent personal assistants today and explores how learnability differentiate when using these interaction techniques. The thesis also investigates when users have access to multiple interaction techniques to use in combination when interacting with such an assistant. To evaluate the field, a literature study was conducted covering Intelligent Personal Assistants, interaction techniques, conversational user interfaces, modalities, multimodal interaction, voice and chat interfaces. Interviews with early adopters of Intelligent Personal Assistants was performed to better understand the current state of the technology and how users were using it. To evaluate the learnability differences in different interaction techniques, a series of user tests in a wizard-of-oz setup was conducted. In the user tests the different groups was using different interaction techniques to interact with their assistants. The main findings of the user tests was that there are indications to that the type of language used differs depending on the interaction techniques. Users who interact through voice is more prone to use a more natural language, while users using a chat interface quickly started to treat the interactions with the Intelligent Personal Assistant as commands. The result observed was that users who interacted with the assistant using chat and then switched to interacting through voice used a shorter, more command-like language when they interacted through voice as well.
APA, Harvard, Vancouver, ISO, and other styles
32

LaTouche, Lerone W. "Usability Issues in the User Interfaces of Privacy-Enhancing Technologies." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/207.

Full text
Abstract:
Privacy on the Internet has become one of the leading concerns for Internet users. These users are not wrong in their concerns if personally identifiable information is not protected and under their control. To minimize the collection of Internet users' personal information and help solve the problem of online privacy, a number of privacy-enhancing technologies have been developed. These so-called privacy-enhancing technologies still have usability issues in the user interfaces because Internet users do not have the choices required to monitor and control their personal data when released in online repositories. Current research shows a need exists to improve the overall usability of privacy-enhancing technology user interfaces. A properly designed privacy-enhancing technology user interface will give the Internet users confidence they can monitor and control all aspects of their personal data. Specific methods and criteria for assessing the usability of privacy-enhancing technology user interfaces either have not been developed or have not been widely published leading to the complexity of the user interfaces, which negatively affects the privacy and security of Internet users' personal data. This study focused on the development of a conceptual framework, which will provide a sound foundation for use in assessing the user interfaces of Web-based privacy-enhancing technologies for user-controlled e-privacy features. The study investigated the extent to which user testing and heuristic evaluation help identify the lack of user-controlled e-privacy features and usability problems in selected privacy-enhancing technology user interfaces. The outcome of this research was the development of a domain-specific heuristics checklist with criteria for the future evaluation of privacy-enhancing technologies' applications user interfaces. The results of the study show the domain-specific heuristics checklist generated more usability problems and a higher number of severe problems than the general heuristics. This suggests domain-specific heuristics can be used as a discount usability technique, which enforces the concept of usability that the heuristics are easy to use and learn. The domain-specific heuristics checklist should be of interest to privacy and security practitioners involved in the development of privacy-enhancing technologies' user interfaces. This research should supplement the literature on human-computer interaction, personal data protection, and privacy management.
APA, Harvard, Vancouver, ISO, and other styles
33

Tanja, Rastad. "A Usability Evaluation of a Personal Video Recorder : Navigation and channel list management from a user perspective." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69546.

Full text
Abstract:
This thesis aimed to evaluate the user interaction with a Personal Video Recorder software in development by Zenterio. The evaluation focus was on learnability, satisfaction, identification of usability issues and proposing redesign to solve them. A user test with eleven participants was carried out, measuring task success, completion time, lostness, post-task satisfaction and post-session satisfaction across three trials. The seven user tasks concerned mainly channel lists and recording functionality; the former is examined closer in this paper. The results showed that the channel lists were somewhat difficult to manage initially but fairly quickly learned. The satisfaction was lower in the beginning and high after three trials. The results across all tasks followed similar learnability patterns and the overall satisfaction with the interface interaction pointed at the need of improvements. Nine usability issues were discovered concerning channel lists and navigation; they were rated by severity and redesign proposals were given. The issue with the strongest impact on the success of the interaction was the difficulty to find out how to open the submenus.
APA, Harvard, Vancouver, ISO, and other styles
34

Ball, Albert. "A Comparison of Users' Personal Information Sharing Awareness, Habits, and Practices in Social Networking Sites and E-Learning Systems." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/84.

Full text
Abstract:
Although reports of identity theft continue to be widely published, users continue to post an increasing amount of personal information online, especially within social networking sites (SNS) and e-learning systems (ELS). Research has suggested that many users lack awareness of the threats that risky online personal information sharing poses to their personal information. However, even among users who claim to be aware of security threats to their personal information, actual awareness of these security threats is often found to be lacking. Although attempts to raise users' awareness about the risks of sharing their personal information have become more common, it is unclear if users are unaware of the risks, or are simply unwilling or unable to protect themselves. Research has also shown that users' habits may also have an influence on their practices. However, user behavior is complex, and the relationship between habit and practices is not clear. Habit theory has been validated across many disciplines, including psychology, genetics, and economics, with very limited attention in IS. Thus, the main goal of this study was to assess the influence of users' personal information sharing awareness (PISA) on their personal information sharing habits (PISH) and personal information sharing practices (PISP), as well as to compare the three constructs between SNS and ELS. Although habit has been studied significantly in other disciplines, a limited number of research studies have been conducted regarding IS usage and habit. Therefore, this study also investigated the influence of users' PISH on their PISP within the contexts of SNS and ELS. An empirical survey instrument was developed based on prior literature to collect and analyze data relevant to these three constructs. Path analysis was conducted on the data to determine the influence of users' PISA on their PISH and PISP, as well as the influence of users' PISH on their PISP. This study also utilized ANCOVA to determine if, and to what extent, any differences may exist between users' PISA, PISH, and PISP within SNS and ELS. The survey was deployed to the student body and faculty members at a small private university in the Southeast United States; a total of 390 responses was received. Prior to final data analysis, pre-analysis data screening was performed to ensure the validity and accuracy of the collected data. Cronbach's Alpha was performed on PISA, PISH, and PISP, with all three constructs demonstrating high reliability. PISH was found to be the most significant factor evaluated in this study, as users' habits were determined to have the strongest influence on their PISP within the contexts of SNS and ELS. The main contribution of this study was to advance the understanding of users' awareness of information security threats, their personal information sharing habits, and their personal information sharing practices. Information gained from this study may help organizations in the development of better approaches to the securing of users' personal information.
APA, Harvard, Vancouver, ISO, and other styles
35

Parsons, John Scott. "Automated knowledge acquisition for knowledge-based systems, KE-RIT : the Use of Kelleys' personal construct theory in the automation of knowledge acquisitions (theory and prototype) /." Online version of thesis, 1992. http://hdl.handle.net/1850/11056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Claesson, Teresia. "The User Perspective on Recorder Functionality and Navigation Management : Result from a usability evaluation of a Personal Video Recorder." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-69594.

Full text
Abstract:
The purpose of this study is to evaluate and give suggestions for interaction improvements to a user interface in a Personal Video Recorder. The study will focus on user learnability, user satisfaction, usability problems from the user interaction with the product and to make a set of interaction improvements. The participants performed a set of predefined tasks involving the recorder functionality and channel lists. The study involved three trials with seven tasks in each trial.   The study showed that the time difference for Learnability – Time-on-Task between all trials were statistical significant for the user interface. The study also revealed a set of usability problems that were classified into different severity ratings. The study also showed that the participants were partly satisfied with the user interface.
Uppsatsen är egentligen på 18hp, var tvungen att fylla i 16hp då rätt alternativ inte fanns att tillgå.
APA, Harvard, Vancouver, ISO, and other styles
37

Tillemans, Stephen. "Development of an instrument for data collection in a multidimensional scaling study of personal Web usage in the South African workplace." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/21646.

Full text
Abstract:
Thesis (MBA)--Stellenbosch University, 2011.
In a relatively very short period the Internet has grown from being virtually unknown to becoming an essential business tool. Together with its many benefits, the Internet has unfortunately brought with it several new organisational challenges. One of these challenges is how to manage personal Web usage (PWU) in the workplace effectively. Although many managers see PWU as a form of workplace deviance, many researchers have pointed out its potential benefits such as learning, time-saving, employee well-being and a source of ideas. To help organisations manage PWU in the workplace more effectively, this research realised the need for a typology of PWU behaviours in the South African workplace. Multidimensional scaling (MDS) was identified as an objective method of creating such a typology. The objective of this research was therefore to develop an instrument to gather data for a multidimensional scaling study of PWU behaviours in the South African workplace. A questionnaire was designed that consists of three distinct sections. The first section contains seven pre-coded demographics questions that correspond with specific demographic variables, proven to have a relationship with PWU. The second section of the questionnaire is designed to gather dissimilarity data for input into an MDS algorithm. To begin with, 25 Web usage behaviours of South Africans were identified using Google Ad Planner. After weighing up various options of comparing the Web usage behaviours, the pairwise comparison method was selected. Ross sequencing was used to reduce positioning and timing effects. To reduce the number of judgements per participant, the 300 required judgments are split six ways, resulting in 50 judgements per participant. The last section of the questionnaire is designed to gather data to assist with interpreting the dimensions of the MDS configuration. Eight benefits and risks of PWU were identified. These are combined into a matrix together with the 25 Web usage behaviours. The data from this section will allow future research to use linear regression to discover the relationship between the Web usage behaviours (the objects), and the benefits and risks of PWU (the variables). It is believed that this design offers a fair compromise between the time and effort required of participants and the quality and integrity of the acquired data.
APA, Harvard, Vancouver, ISO, and other styles
38

Batie, Robert B. "Assessing the Effectiveness of a Fingerprint Biometric and a Biometric Personal Identification Number (BIO-PIN™) when used as a Multi-Factor Authentication Mechanism." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/992.

Full text
Abstract:
The issue of traditional user authentication methods, such as username/passwords, when accessing information systems, the Internet, and Web-based applications still pose significant vulnerabilities. The problem of user authentication including physical and logical access appears to have limited, if any, coverage in research from the perspective of biometric as ‘something the user knows.’ Previous methods of establishing ones’ identity by using a password, or presenting a token or identification (ID) card are vulnerable to circumvention by misplacement or unauthorized sharing. The need for reliable user authentication techniques has increased in the wake of heightened concerns about information security and rapid advancements in networking, communication, and mobility. The main goal of this research study was to examine the role of the authentication method (BIO-PIN™ or username/password) and time, on the effectiveness of authentication, as well as the users’ ability to remember the BIO-PIN™ versus username/password (UN/PW). Moreover, this study compared the BIO-PIN™ with a traditional multi-factor biometric authentication using multiple fingerprints (without sequence) and a numerical PIN sequence (noted as "BIO+PIN"). Additionally, this research study examined the authentication methods when controlled for age, gender, user’s computer experience, and number of accounts. This study used a quasi-experimental multiple baseline design method to evaluate the effectiveness of the BIO-PIN™ authentication method. The independent, dependent, and control variables were addressed using descriptive statistics and Multivariate Analysis of Variance (MANOVA) statistical analysis to compare the BIO-PIN™, the BIO+PIN, and UN/PW authentication methods for research questions (RQs) 1 and 2. Additionally, the Multivariate Analysis of Covariance (MANCOVA) was used to address RQ 3 and RQ4, which seeks to test any differences when controlled by age, gender, user experience, and number of accounts. This research study was conducted over a 10-week period with participant engagement occurring over time including a registration week and in intervals of 2 weeks, 3 weeks, and 5 weeks. This study advances the current research in multi-factor biometric authentication and increases the body of knowledge regarding users’ ability to remember industry standard UN/PWs, the BIO-PIN™ sequence, and traditional BIO+PIN.
APA, Harvard, Vancouver, ISO, and other styles
39

Pagno, Bruno Lorandi. "Everyday visualization: discovering more about individuals." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2018. http://hdl.handle.net/10183/179522.

Full text
Abstract:
As pessoas estão ficando cada vez mais interessadas no uso de monitores de atividade. A quantidade de dados de indivíduos disponível está ajudando na expansão e desenvolvimento de novas aplicações e projetos de visualizações para ser usados em casa, em ciência (e.g. para entender melhor o comportamento de populações) ou em governos interessados em desenvolver cidades inteligentes. Nesse trabalho é apresentada uma visualização simples e intuitiva que permite a exploração de dados pessoais por pessoas comuns. Com foco em ajudar as pessoas a compreenderem a si mesmas melhor e perceber coisas novas sobre seus dados. A visualização construída neste projeto é baseada em metáforas de calendários, relógios e mapas, além de utilizar gráficos de barra para explorar dados crus. A exploração desses dados se dá pela interação entre essas visualizações. Para avaliar o produto do trabalho são apresentados dois casos de uso onde alguns usuários tiveram a oportunidade de observar e discutir suas informações de dois pontos de vista diferente: exploração de dados pessoais para auto-aperfeiçoamento e o uso do Everyday Visualization por cientistas da saúde. Em nenhum dos casos houve treinamento. As visualizações resultantes agregam diversas fontes de dados, indo além de outros trabalhos de visualização casual e pessoal. Os resultados promissores demonstram a viabilidade de tais técnicas para visualização de dados pessoais.
People are becoming increasingly more interested in the use of activity monitors and selfimprovement. The availability of individuals’ data is also pushing the development of new applications and data visualization projects to be used at home, in science (e.g. to better understand the behavior of populations) or for governments interested in developing intelligent cities. In this work, we present an easy and intuitive set of visualizations to allow the exploration of personal data by common people. We focus on helping people to know themselves better and to make sense of their own data. Our visualizations are based on the metaphors of calendars, clocks, and maps, as well as on the use of bar charts to explore raw data. Data exploration is therefore guaranteed by the interaction between them. In order to evaluate our work we present two use cases, where few users observe and discuss the data from different points of view: the exploration of personal data for self-improvement purposes, and the use of Everyday Visualization by health scientists. Both use cases were ran without any training session. The resulting visualization aggregates several different data sources, going beyond many of the personal and casual visualization works. The promising results achieved demonstrated the viability of the use of such techniques for personal data visualizations and sense making.
APA, Harvard, Vancouver, ISO, and other styles
40

Ericsson, Tomas, and Monika Nilqvist. "A Personalized Car : A study on how to apply personalization to a driver environment." Thesis, Linköping University, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-7795.

Full text
Abstract:

An increasing amount of technology in cars makes new ideas and solutions necessary. This study will explore the idea of a personalized driver environment and investigate possible benefits and drawbacks with such a feature. The study consists of three parts: a pre-study exploring personalization, a survey investigating the attitudes towards personal settings, and finally an interview testing a specific solution. The survey was distributed in USA and Sweden while the interviews were conducted with Swedish subjects.

Overall, the concept of a personalized car has been well received. This study has shown that the most requested settings are associated with the driver position, hi-fi system and climate. The study also suggests that feeling in control of the personalization is more important than the benefits associated with automation. The user prefers visible solutions, such as a personal button on the key before hidden (e.g. using a button sequence or a menu system). Such a button promotes the feature while allowing the user to interact with the car in a familiar way. However, since little real user experience exists with such solutions it is important to continue research when further developing personalization of a car.

APA, Harvard, Vancouver, ISO, and other styles
41

Hermansson, Elias. "Själv-monitorering för ökad motivation till bättre munhälsa : Kan en mobilapplikation vara del av lösningen?" Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-15930.

Full text
Abstract:
Mobilapplikationer har potential till att hjälpa människor förändra vanor och beteenden av olika slag. I Sverige har vi rätt till avgiftsfri tandvård upp till 22 år och i vissa landsting erbjuds fri tandvård i ytterligare några år utöver det. Traditionellt har interventioner bestått av motiverande samtal med patienter för att motivera till bättre munhälsa, vilket gör att det kan skilja sig i hur mycket människor motiveras till att ta hand om sin orala hälsa. Den här studien syftar till att försöka besvara hur ungdomars uppfattning och attityd är om en prototyp till en mobilapplikation som är tänkt att hjälpa ungdomar att förbättra sin munhälsa genom själv-monitorering. Själv-monitorering genom mobilapplikationer kallas ofta för Personal Informatics. Dessa verktyg låter användaren observera och registrera ett eller flera beteende och därefter få informationen presenterat till sig för att förstå ens beteende bättre. En aspekt som är av stor vikt vid utvecklingen av mobilapplikationer är användarupplevelsen med dem. User Experience Design handlar om processen att försöka förbättra användarupplevelsen med produkter. Den här studien har genomförts med metoder som ofta används i en UX-designprocess, såsom skapande av prototyper och intervjuer med målgruppen. Resultatet visar inte bara åsikter från deltagare ur målgruppen, utan även vad som enligt dem ger mervärde i mobilapplikationen samt framtida utmaningar i fortsatta arbetet.
APA, Harvard, Vancouver, ISO, and other styles
42

Hultgren, Kim. "HUR MÅR JAG EGENTLIGEN? : Designriktlinjer för mobilapplikationer för self-monitoring vid bipolär sjukdom." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-13927.

Full text
Abstract:
Rapporten presenterar ett arbete som har haft som fokus att undersöka vilka designriktlinjer som bör vägleda formgivningen av en mobilapplikation för self-monitoring, om syftet är att stödja människor med bipolär sjukdom. Arbetets frågeställning har undersökts genom ett användarcentrerat designarbete vilket inneburit att människor med diagnosen bipolär sjukdom inkluderats och därigenom haft möjlighet att uttrycka sitt perspektiv. Processen har baserats på metoder inom området för User Experience Design där arbetsprocessen innefattat utveckling av en pappersprototyp, konceptutforskning med tillhörande intervju, storyboards samt designriktlinjer. Som en avslutande del har tre mobilapplikationer, vilka marknadsförts som verktyg för self-monitoring av humör, utvärderats utifrån de inom examensarbetet utvecklade designriktlinjerna. Utvärderingen visade på stora brister vilket indikerar att behoven hos de användare som lever med bipolär sjukdom inte tillfredsställs genom de mobilapplikationer som finns tillgängliga på marknaden. Arbetets främsta bidrag är de slutgiltiga designriktlinjerna: 1) Påminn om viktiga aktiviteter; 2) Den sociala och privata användaren; 3) Förstå och motiveras; 4) Det personliga verktyget samt 5) Lättare än en dagbok, som uppmärksammar vilket innehåll en mobilapplikation för self-monitoring bör tillhandahålla för att vara till nytta för användare med bipolär sjukdom.
APA, Harvard, Vancouver, ISO, and other styles
43

Windingland, Kim L. "A DISTRIBUTED NETWORK ARCHITECTURE FOR PC-BASED TELEMETRY SYSTEMS." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/608384.

Full text
Abstract:
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California
The ever-increasing power of PC hardware combined with the new operating systems available make the PC an excellent platform for a telemetry system. For applications that require multiple users or more processing power than a single PC, a network of PCs can be used to distribute data acquisition and processing tasks. The focus of this paper is on a distributed network approach to solving telemetry test applications. This approach maximizes the flexibility and expandability of the system while keeping the initial capital equipment expenditure low.
APA, Harvard, Vancouver, ISO, and other styles
44

Amdahl, Per, and Per Chaikiat. "Personas as Drivers : - an alternative approach for creating scenarios for ADAS evaluation." Thesis, Linköping University, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8621.

Full text
Abstract:

Research and development on vehicle safety has lately started to direct its focus towards how to actively support the driver and make it easier for her to drive safely through letting Advanced Driver Assistance Systems (ADAS) have effect on how the driver interacts with the vehicle and the surrounding traffic. This requires research on both how the driver and vehicle perform in different situations, in terms of psychology, cognition and individual differences. In addition, physical limitations and requirements of the driver and the vehicle must be taken into account. Therefore scenarios for evaluation of these systems are required. In the area of user-centered design a rather new method, Personas, is being adopted. This thesis tries to explore if the Persona method is a viable tool for creating scenarios for such evaluations. Experiences after completing this work imply that personas indeed is a viable way to include aspects and raise issues concerning individual variability and situational context in ADAS scenarios.

APA, Harvard, Vancouver, ISO, and other styles
45

Galindo, Michel. "L'environnement informatique du gestionnaire : un progiciel d'aide a la decision." Toulouse 3, 1987. http://www.theses.fr/1987TOU30028.

Full text
Abstract:
Analyse detaillee des besoins specifiques a la gestion et a la conduite des entreprises. Mise en pratique des principaux concepts developpes dans la realisation d'un systeme d'aide a la decision programme en langage apl sur micro-ordinateur
APA, Harvard, Vancouver, ISO, and other styles
46

Besada, Jorge L. "Personal computer security system." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1707.

Full text
Abstract:
This work consists on the design and implementation of a complete monitored security system. Two computers make up the basic system: one computer is the transmitter and the other is the receiver. Both computers interconnect by modems. Depending on the status of the input sensors (magnetic contacts, motion detectors and others) the transmitter detects an alarm condition and sends a detailed report of the event via modem to the receiver computer.
APA, Harvard, Vancouver, ISO, and other styles
47

Leijon, Jenny, and Anna Udén. "”Jag ser inte datorn som nått djävulens påfund, utan kan se vilka användningsmöjligheter som finns” : En kvalitativ studie om IKT-satsningar på förskolan." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-5229.

Full text
Abstract:
I dagens informationssamhälle ses kunskap om IKT som en viktig kompetens för att människor ska fungera i samhälle och näringsliv. Källor visar på flera motiv till varför barn i tidig ålder ska introduceras för datoranvändning (då datorn som verktyg kan generera ny kunskap och möjliggöra nya arbetssätt). Utifrån en kvalitativ metod har vi undersökt retoriken bakom barnens datoranvändning på förskolan. Semistrukturerade intervjuer har genomförts med två rektorer för att ta reda på deras pedagogiska idéer om och satsningar på IKT. Med utgångspunkt ur detta har även två fokusgruppintervjuer genomförts med pedagogerna i deras arbetslag med syfte att studera vad dessa uttrycker för tankar om att använda IKT i den pedagogiska verksamheten. Utifrån ett sociokulturellt perspektiv blir termer som samspel, meningsskapande och artefakter centrala. Resultatet visar bland annat på ambitioner hos både rektorer och pedagoger gällande utveckling av IKT-arbetet på förskolan, samtidigt som det praktiska arbetet förekommer i väldigt liten skala. Vidare påvisas att inga egentliga utvärderingar sker kring de satsningar som genomförs gällande IKT på förskolan. I diskussionen ställer vi oss kritiska till den bristande kommunikation som ses mellan rektorer och arbetslag gällande IKT-satsningarnas implementering i verksamheten. Studien behandlar även behovet av kompetensutveckling samt bakomliggande orsaker till hur arbetet med IKT organiseras. Avslutningsvis formuleras råd till rektorer och pedagoger för utveckling av IKT-arbetet inom förskolan.
In today's society ICT-knowledge is viewed as an important skill for humans to function in society and business. Sources indicate motives which underline the importance of the fact that children at an early age are introduced to computing, as the computer becomes a tool to generate new knowledge and enable new ways of working. Based on a qualitative approach, we have studied the reasoning behind children's computer use in preschool. Semi-structured interviews were conducted with two principals to determine their opinions on educational benefits of and investments in ICT. On this basis we have also, through focus groups, studied what kind of thoughts teachers express on ICT in educational practice. From a sociocultural perspective terms like interaction, meaning and artifacts became central. The results show that the principals and teachers both have ambitions regarding the development of ICT work at the preschool, while the practical work occurs on a very small scale. The study further demonstrated that no real evaluation takes place regarding the ICT-investments in preschool. In the discussion we are critical to the lack of communication that is seen between principals and their teacher-teams regarding the implementation of ICT-investments in the practice. We also discuss the teachers’ need for further education regarding ICT-development and the underlying causes of the use of ICT today. In the conclusion we present guidelines for the development of ICT work in preschool.
APA, Harvard, Vancouver, ISO, and other styles
48

Chong, Henry H. W. 1974. "Toward a personal quantum computer." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42797.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.
Includes bibliographical references (p. 115-118).
by Henry H.W. Chong.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Jun. "Computer simulations of personal robots." Thesis, University of Ottawa (Canada), 1993. http://hdl.handle.net/10393/6477.

Full text
Abstract:
It has been recognized for some time that persons with severe physical disabilities could benefit greatly if they had a personal robot under their control. Such kind of robots has been available for several years, but the acceptence by disabled persons has been very slow. One of the reasons is a concern for safety. If a robot arm is strong enough to bring food to a person's mouth, then it could do severe personal injury to the eyes or teeth in the event of an electronic or mechanical failure. In this thesis, a new approach of investigating a personal robot will be presented. A three-dimensional computer simulation of a personal robot will be described. It is completely under the control of the user. This simulation system has many advantages over testing an actual model, since it enables almost any type of personal robot and any type of control strategy to be investigated. This system can be used by researchers to investigate control algorithms for a personal robot. It can also be used by disabled persons so that they can get familiar with the robot as well as the control strategy before they use or purchase the actual model. Currently, this simulation is used to investigate a control strategy called "Modified Extended Physiological Proprioception".
APA, Harvard, Vancouver, ISO, and other styles
50

Xu, Zhilei. "Synthesizing framework uses from program behavior data." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/66482.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 42-43).
This thesis presents MATCHMAKER, a new synthesis tool that aims to help programmers use software frameworks by synthesizing source code needed to interact with the framework. Software engineers of today are constantly faced with the task of using or extending large software code bases. This proves to be a challenging endeavor, as object-oriented frameworks tend to grow exceedingly intricate. Functionality is spread out among numerous classes and tailoring it for a specific need requires knowledge of exact components to extend and combine. MATCHMAKER is presented to help programmers understand such complex behavior, especially, to help deal with one common task in using frameworks: connecting two classes so that they can interact with each other. Taking as input two classes that the programmer want to connect, MATCHMAKER observes many real runs of the framework, aggregates relevant execution traces in which similar connections are built by client-framework interactions, and synthesizes the necessary source code the user needs to write to make the connection possible. MATCHMAKER relies on the hypothesis that the logical connection between two objects is fulfilled by a chain of pointer references linking them together, and the earliest possible pointer reference chain (called Critical Chain) is critical to the logical connection. MATCHMAKER employs a new program behavior data engine (called DELIGHT) to find the critical chain, uses a special slicing algorithm to dig out the relevant instructions which form the client-framework protocol from the critical chain, and synthesize the client code from the slices. In this thesis we also demonstrate MATCHMAKER's capability on a range of programming tasks using complex software frameworks such as Eclipse, and evaluate MATCHMAKER's usability and its improvement to programming efficiency by comprehensive user study.
by Zhilei Xu.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography