Abstract. Controlled online experiments in which envisaged changes to a web site are first tested... more Abstract. Controlled online experiments in which envisaged changes to a web site are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort.
The aim of this proposed research is to analyze the reasons for the currently still unsatisfactor... more The aim of this proposed research is to analyze the reasons for the currently still unsatisfactory adoption of information visualization systems in corporations, and to disseminate the findings to researchers, software vendors and large corporate customers to initiate a search for remedies.
Abstract. Enterprises are increasingly deploying social computing platforms, such as blogs, share... more Abstract. Enterprises are increasingly deploying social computing platforms, such as blogs, shared bookmarks, and social networks, to support the interpersonal interactions and knowledge work practices of their employees. These technologies hold great promise for supporting distributed collaboration by enabling greater communication and fostering awareness among colleagues. Promotion of awareness and communication, however, faces an inherent tension with desires for privacy.
Abstract We compared privacy attitudes of knowledge workers from the US and India who were involv... more Abstract We compared privacy attitudes of knowledge workers from the US and India who were involved in a collaborative software development project distributed across five sites of a multinational corporation. Prior studies on consumer privacy suggest that privacy concerns in India are lower than those in the US While our work largely confirmed these findings, we found unexpectedly that knowledge workers in India expressed higher interpersonal privacy concerns compared with their US colleagues.
Providing the right information and services to the right person at the right time has been a hot... more Providing the right information and services to the right person at the right time has been a hot research topic for many years, and great progress has been made in search quality, targeted advertisement, and content recommendation. But with the mobile handheld device becoming a dominant platform for accessing the Web, and smart objects springing up in many places, mobility and pervasiveness have compounded the difficulties in personalization, and made situation awareness even more important.
This paper discusses plan presentation, the second phase in usertailored advice giving. Its main ... more This paper discusses plan presentation, the second phase in usertailored advice giving. Its main task is to determine what knowledge must be provided to ascertain that the user comprehends the plan and is able to perform it, even if he detects unexpected obstacles. Plan presentation is guided by a model of the user's knowledge and of his capabilities to perform actions in the domain. Finally we describe how to bias the plan generation process to prefer plans that contain as little information unfamiliar to the user as possible.
Abstract Researchers in the area of privacy management often suggest to provide users with a coll... more Abstract Researchers in the area of privacy management often suggest to provide users with a collection of privacy settings and good defaults for them. However, our research into people's attitudes towards location-sharing technology (considering both adopters and non-adopters) indicates that the right way to manage privacy and the right default can vary for different types of people; Key privacy concerns may differ by demographics and personality type, and personality may also influence privacy management preferences.
Abstract. Controlled online experiments in which envisaged changes to a website are first tested ... more Abstract. Controlled online experiments in which envisaged changes to a website are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort.
User modeling components should include suitable mechanisms for acquiring user models, in additio... more User modeling components should include suitable mechanisms for acquiring user models, in addition to representation and management mechanisms. The methods developed to date can be divided into two groups: Those that extract primary assumptions about the user from his/her system input; and those that extract secondary (orderivative) assumptions from primary and other secondary assumptions.
Abstract Prior research shows that a root cause of many privacy concerns in location-sharing soci... more Abstract Prior research shows that a root cause of many privacy concerns in location-sharing social media is people's desire to preserve offline relationship boundaries. Other literature recognizes lying as an everyday phenomenon that preserves such relationship boundaries by facilitating smooth social interactions. Combining these strands of research, one might hypothesize that people with a predisposition to lie would generally have lower privacy concerns since lying is a means to preserve relationship boundaries.
Abstract Representation systems for conceptual hierarchies have been used in the field of Artific... more Abstract Representation systems for conceptual hierarchies have been used in the field of Artificial Intelligence for nearly two decades. They are based on symbolic representation structures and sequential processes operating upon these structures. Recently, з number of network structures have been developed in the field of Connectbnism which are also claimed to be able to represent conceptual hierarchies. Processes in these networks operate in a parallel way and largely without a global control mechanism.
Web Personalization can be defined as any set of actions that can tailor the Web experience to a ... more Web Personalization can be defined as any set of actions that can tailor the Web experience to a particular user or set of users. The experience can be something as casual as browsing a Web site or as (economically) significant as trading stocks or purchasing a car. The actions can range from simply making the presentation more pleasing to anticipating the needs of a user and providing customized and relevant information.
Our proposal is focused on the topic of decentralized virtual activity systems (DVAS) employing a... more Our proposal is focused on the topic of decentralized virtual activity systems (DVAS) employing an empirical socio-technical research approach. We see growing, widespread interest in the development and use of decentralized systems and virtual world environments as possible new places for engaging in collaborative work activities. The Gartner Group recently declared that within five years 80% of Internet users and Fortune 500 companies will have an online presence in a virtual world of some kind.
In order to be capable of exhibiting a wide range of cooperative behavior, a computer-based dialo... more In order to be capable of exhibiting a wide range of cooperative behavior, a computer-based dialog system must have available assumptions about the current user's goals, plans, background knowledge and (false) beliefs, ie, maintain a so-called “user model”. Apart from cooperativity aspects, such a model is also necessary for intelligent coherent dialog behavior in general.
Tailoring advice to a user means finding a plan by which she can reach her goal, and supplying th... more Tailoring advice to a user means finding a plan by which she can reach her goal, and supplying the missing knowledge that she needs to successfully execute the plan. The paper presents a method to determine the kind and amount of this missing knowledge for an already generated domain plan. We show that both a user's knowledge and his capabilities to perform actions must be taken into account when deciding on a plan presentation that is suitable for him.
Abstract In virtually all current natural-language dialog systems, users can only refer to object... more Abstract In virtually all current natural-language dialog systems, users can only refer to objects by using linguistic descriptions. However, in human face-to-face conversation, participants fre= quently use various sorts of deictic gestures as well. In this paper, we will present the referent identification component of XTRA, a system for a natural-language access to expert systems. XTRA allows the user to combine NL input together with pointing gestures on the terminal screen in order Io refer to objects on the display.
The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and va... more The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and van Mensvoort, 2009, in this volume; Metaxas and Markopoulos, 2009, in this volume). A historical account (Rittenbruch and McEwan, 2009, in this volume) as well as descriptions of various implementations (see Part III) illustrate how various systems have attempted to foster greater awareness. A common challenge faced by all awareness systems is the tension with an individual's desire for privacy (Hudson and Smith, 1996).
Abstract. Respecting users' privacy is a key challenge for building personalized systems. We have... more Abstract. Respecting users' privacy is a key challenge for building personalized systems. We have designed a generic privacy-enhancing personalization infrastructure that allows system designers to express privacy constraints at design time and enables system enforcement of privacy constraints at runtime.
Zusammenfassung Ziel des Projekts AVANTI (AdaptiVe and Adaptable INteractions for Multimedia Tele... more Zusammenfassung Ziel des Projekts AVANTI (AdaptiVe and Adaptable INteractions for Multimedia Telecommunications ApplIcations) ist es, multimediale Informationen über eine Region einem Benutzerkreis mit verschiedenen Vorkenntnissen und Interessenlagen, zB Touristen, Einwohnern, Reisekaufleuten, aber auch bestimmten Behindertengruppen wie Blinden und Rollstuhlfahrern adäquat anzubieten.
Abstract The great promise of collaborative technologies that improve group awareness and communi... more Abstract The great promise of collaborative technologies that improve group awareness and communication is often overshadowed by accompanying privacy concerns. In such systems, the privacy concerns relate to the individuals one interacts with–colleagues, superiors, subordinates, friends and family. Using Instant Messaging as an example, we illustrate that addressing privacy issues in such systems can be quite challenging.
Abstract. Controlled online experiments in which envisaged changes to a web site are first tested... more Abstract. Controlled online experiments in which envisaged changes to a web site are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort.
The aim of this proposed research is to analyze the reasons for the currently still unsatisfactor... more The aim of this proposed research is to analyze the reasons for the currently still unsatisfactory adoption of information visualization systems in corporations, and to disseminate the findings to researchers, software vendors and large corporate customers to initiate a search for remedies.
Abstract. Enterprises are increasingly deploying social computing platforms, such as blogs, share... more Abstract. Enterprises are increasingly deploying social computing platforms, such as blogs, shared bookmarks, and social networks, to support the interpersonal interactions and knowledge work practices of their employees. These technologies hold great promise for supporting distributed collaboration by enabling greater communication and fostering awareness among colleagues. Promotion of awareness and communication, however, faces an inherent tension with desires for privacy.
Abstract We compared privacy attitudes of knowledge workers from the US and India who were involv... more Abstract We compared privacy attitudes of knowledge workers from the US and India who were involved in a collaborative software development project distributed across five sites of a multinational corporation. Prior studies on consumer privacy suggest that privacy concerns in India are lower than those in the US While our work largely confirmed these findings, we found unexpectedly that knowledge workers in India expressed higher interpersonal privacy concerns compared with their US colleagues.
Providing the right information and services to the right person at the right time has been a hot... more Providing the right information and services to the right person at the right time has been a hot research topic for many years, and great progress has been made in search quality, targeted advertisement, and content recommendation. But with the mobile handheld device becoming a dominant platform for accessing the Web, and smart objects springing up in many places, mobility and pervasiveness have compounded the difficulties in personalization, and made situation awareness even more important.
This paper discusses plan presentation, the second phase in usertailored advice giving. Its main ... more This paper discusses plan presentation, the second phase in usertailored advice giving. Its main task is to determine what knowledge must be provided to ascertain that the user comprehends the plan and is able to perform it, even if he detects unexpected obstacles. Plan presentation is guided by a model of the user's knowledge and of his capabilities to perform actions in the domain. Finally we describe how to bias the plan generation process to prefer plans that contain as little information unfamiliar to the user as possible.
Abstract Researchers in the area of privacy management often suggest to provide users with a coll... more Abstract Researchers in the area of privacy management often suggest to provide users with a collection of privacy settings and good defaults for them. However, our research into people's attitudes towards location-sharing technology (considering both adopters and non-adopters) indicates that the right way to manage privacy and the right default can vary for different types of people; Key privacy concerns may differ by demographics and personality type, and personality may also influence privacy management preferences.
Abstract. Controlled online experiments in which envisaged changes to a website are first tested ... more Abstract. Controlled online experiments in which envisaged changes to a website are first tested live with a small subset of site visitors have proven to predict the effects of these changes quite accurately. However, these experiments often require expensive infrastructure and are costly in terms of development effort.
User modeling components should include suitable mechanisms for acquiring user models, in additio... more User modeling components should include suitable mechanisms for acquiring user models, in addition to representation and management mechanisms. The methods developed to date can be divided into two groups: Those that extract primary assumptions about the user from his/her system input; and those that extract secondary (orderivative) assumptions from primary and other secondary assumptions.
Abstract Prior research shows that a root cause of many privacy concerns in location-sharing soci... more Abstract Prior research shows that a root cause of many privacy concerns in location-sharing social media is people's desire to preserve offline relationship boundaries. Other literature recognizes lying as an everyday phenomenon that preserves such relationship boundaries by facilitating smooth social interactions. Combining these strands of research, one might hypothesize that people with a predisposition to lie would generally have lower privacy concerns since lying is a means to preserve relationship boundaries.
Abstract Representation systems for conceptual hierarchies have been used in the field of Artific... more Abstract Representation systems for conceptual hierarchies have been used in the field of Artificial Intelligence for nearly two decades. They are based on symbolic representation structures and sequential processes operating upon these structures. Recently, з number of network structures have been developed in the field of Connectbnism which are also claimed to be able to represent conceptual hierarchies. Processes in these networks operate in a parallel way and largely without a global control mechanism.
Web Personalization can be defined as any set of actions that can tailor the Web experience to a ... more Web Personalization can be defined as any set of actions that can tailor the Web experience to a particular user or set of users. The experience can be something as casual as browsing a Web site or as (economically) significant as trading stocks or purchasing a car. The actions can range from simply making the presentation more pleasing to anticipating the needs of a user and providing customized and relevant information.
Our proposal is focused on the topic of decentralized virtual activity systems (DVAS) employing a... more Our proposal is focused on the topic of decentralized virtual activity systems (DVAS) employing an empirical socio-technical research approach. We see growing, widespread interest in the development and use of decentralized systems and virtual world environments as possible new places for engaging in collaborative work activities. The Gartner Group recently declared that within five years 80% of Internet users and Fortune 500 companies will have an online presence in a virtual world of some kind.
In order to be capable of exhibiting a wide range of cooperative behavior, a computer-based dialo... more In order to be capable of exhibiting a wide range of cooperative behavior, a computer-based dialog system must have available assumptions about the current user's goals, plans, background knowledge and (false) beliefs, ie, maintain a so-called “user model”. Apart from cooperativity aspects, such a model is also necessary for intelligent coherent dialog behavior in general.
Tailoring advice to a user means finding a plan by which she can reach her goal, and supplying th... more Tailoring advice to a user means finding a plan by which she can reach her goal, and supplying the missing knowledge that she needs to successfully execute the plan. The paper presents a method to determine the kind and amount of this missing knowledge for an already generated domain plan. We show that both a user's knowledge and his capabilities to perform actions must be taken into account when deciding on a plan presentation that is suitable for him.
Abstract In virtually all current natural-language dialog systems, users can only refer to object... more Abstract In virtually all current natural-language dialog systems, users can only refer to objects by using linguistic descriptions. However, in human face-to-face conversation, participants fre= quently use various sorts of deictic gestures as well. In this paper, we will present the referent identification component of XTRA, a system for a natural-language access to expert systems. XTRA allows the user to combine NL input together with pointing gestures on the terminal screen in order Io refer to objects on the display.
The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and va... more The earlier chapters of this book presented a conceptual understanding of awareness (Eggen and van Mensvoort, 2009, in this volume; Metaxas and Markopoulos, 2009, in this volume). A historical account (Rittenbruch and McEwan, 2009, in this volume) as well as descriptions of various implementations (see Part III) illustrate how various systems have attempted to foster greater awareness. A common challenge faced by all awareness systems is the tension with an individual's desire for privacy (Hudson and Smith, 1996).
Abstract. Respecting users' privacy is a key challenge for building personalized systems. We have... more Abstract. Respecting users' privacy is a key challenge for building personalized systems. We have designed a generic privacy-enhancing personalization infrastructure that allows system designers to express privacy constraints at design time and enables system enforcement of privacy constraints at runtime.
Zusammenfassung Ziel des Projekts AVANTI (AdaptiVe and Adaptable INteractions for Multimedia Tele... more Zusammenfassung Ziel des Projekts AVANTI (AdaptiVe and Adaptable INteractions for Multimedia Telecommunications ApplIcations) ist es, multimediale Informationen über eine Region einem Benutzerkreis mit verschiedenen Vorkenntnissen und Interessenlagen, zB Touristen, Einwohnern, Reisekaufleuten, aber auch bestimmten Behindertengruppen wie Blinden und Rollstuhlfahrern adäquat anzubieten.
Abstract The great promise of collaborative technologies that improve group awareness and communi... more Abstract The great promise of collaborative technologies that improve group awareness and communication is often overshadowed by accompanying privacy concerns. In such systems, the privacy concerns relate to the individuals one interacts with–colleagues, superiors, subordinates, friends and family. Using Instant Messaging as an example, we illustrate that addressing privacy issues in such systems can be quite challenging.
Uploads