log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
CHI Practice Talks
Kotaro Hara & Elissa Redmiles
2105 Hornbake, South Wing
Thursday, April 14, 2016, 12:30-1:30 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Abstract

Members of the HCIL will be giving practice talks for their accepted CHI papers to the community. Audience members will be asked for feedback and constructive criticism.

 

Kotaro Hara

Title: The Design of Assistive Location-based Technologies for People with Ambulatory Disabilities: A Formative Study

Abstract: In this paper, we investigate how people with mobility impairments assess and evaluate accessibility in the built environment and the role of current and emerging locationbased technologies therein. We conducted a three-part formative study with 20 mobility impaired participants: a semi-structured interview (Part 1), a participatory design activity (Part 2), and a design probe activity (Part 3). Part 2 and 3 actively engaged our participants in exploring and designing the future of what we call assistive locationbased technologies (ALTs)—location-based technologies that specifically incorporate accessibility features to support navigating, searching, and exploring the physical world. Our Part 1 findings highlight how existing mapping tools provide accessibility benefits—even though often not explicitly designed for such uses. Findings in Part 2 and 3 help identify and uncover useful features of future ALTs. In particular, we synthesize 10 key features and 6 key data qualities. We conclude with ALT design recommendations. 

 

Elissa Redmiles

Title: I Think They’re Trying to Tell Me Something: Advice Sources and Selection for Digital Security

Abstract: Users receive a multitude of digital- and physical-security advice every day. Indeed, if we implemented all the security advice we received, we would never leave our houses or use the Internet. Instead, users selectively choose some advice to accept and some (most) to reject; however, it is unclear whether they are effectively prioritizing what is most important or most useful. If we can understand from where and why users take security advice, we can develop more effective security interventions.

As a first step, we conducted 25 semi-structured interviews of a demographically broad pool of users. These interviews resulted in several interesting findings: (1) participants evaluated digital-security advice based on the trustworthiness of the advice source, but evaluated physical-security advice based on their intuitive assessment of the advice content; (2) negative-security events portrayed in well-crafted fictional narratives with relatable characters (such as those shown in TV or movies) may be effective teaching tools for both digital- and physical-security behaviors; and (3) participants rejected advice for many reasons, including finding that the advice contains too much marketing material or threatens their privacy.

This talk is organized by Leyla Norooz