Browse All Reviews
Information Systems (H)
Models And Principles (H.1)
User/Machine Systems (H.1.2)
> Human Factors (H.1.2...)
All Media Types
1-10 of 122 Reviews about "
Human Factors (H.1.2...)
A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys 52(6): 1-36, 2019. Type: Article
Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies ...
Jun 17 2022
Website visual design qualities: a threefold framework
Hartono E., Holsapple C. ACM Transactions on Management Information Systems 10(1): 1-21, 2019. Type: Article
This work contributes to the literature on information systems by studying a theoretical perspective “that integrates three [major] dimensions of artifact visual design quality”: the aesthetic, functional, and symbo...
May 19 2022
Widar2.0: passive human tracking with a single Wi-Fi link
Qian K., Wu C., Zhang Y., Zhang G., Yang Z., Liu Y. MobiSys 2018 (Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, Munich, Germany, Jun 10-15, 2018) 350-361, 2018. Type: Proceedings
This work demonstrates that it is possible to track the location of a person, with sub-meter accuracy, using only one single Wi-Fi link between a pair of commercial off-the-shelf (COTS) Wi-Fi devices (“one access point plus o...
Jun 22 2021
Rehumanized crowdsourcing: a labeling framework addressing bias and ethics in machine learning
Barbosa N., Chen M. CHI 2019 (Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, UK, May 4-9, 2019) 1-12, 2019. Type: Proceedings
Crowdsourcing is the practice of obtaining information or input into a task from a large number of people, either paid or unpaid, typically via the Internet. With its fast growth, crowdsourcing has produced large volumes of data manual...
Jun 1 2021
Networks and religion: ties that bind, loose, build-up, and tear down
Everton S., Cambridge University Press, New York, NY, 2018. 412 pp. Type: Book (978-1-108404-07-5)
Social network analysis (SNA) is an increasingly important tool for social science. By focusing on the links among people and organizations, it addresses the “social” aspect of social science much better than statis...
Sep 22 2020
Deviance in social media and social cyber forensics: uncovering hidden relations using open source information (OSINF)
Al-khateeb S., Agarwal N., Springer International Publishing, New York, NY, 2019. 124 pp. Type: Book (978-3-030136-89-5)
This short treatise is part of the “SpringerBriefs in Cybersecurity” series. The briefs in this series are either topic focused, like this book, or country focused. As the title suggests, the book focuses on deviant...
Aug 26 2020
Silence is also evidence: interpreting dwell time for recommendation from psychological perspective
Yin P., Luo P., Lee W., Wang M. KDD 2013 (Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, Aug 11-14, 2013) 989-997, 2013. Type: Proceedings
In many social media sites, people who are given an opportunity to vote rarely do so. Yin et al. note: “We call the phenomenon [of] a user silently viewing an item without expressing [his or her] opinions (i.e. giving a vote)...
Apr 7 2014
An analysis of human factors and label accuracy in crowdsourcing relevance judgments
Kazai G., Kamps J., Milic-Frayling N. Information Retrieval 16(2): 138-178, 2013. Type: Article
Labeling is a complex task. This interesting paper investigates the use of crowdsourcing to create labeled data, which involves relevance judgments that are known to be subjective. The authors use a series of experiments using Amazon&a...
Aug 20 2013
On operator effectiveness: the role of expertise and familiarity of environment on the detection of deviant behaviour
Wijn R., van den Berg H., Lousberg M. Personal and Ubiquitous Computing 17(1): 35-42, 2013. Type: Article
There are many areas in which familiarity with the environment has an influence on activities and system behavior. In this paper, Wijn, van den Berg, and Lousberg discuss the effectiveness of operators of a surveillance camera monitori...
Apr 16 2013
Voluntary facial activations regulate physiological arousal and subjective experiences during virtual social stimulation
Vanhala T., Surakka V., Courgeon M., Martin J. ACM Transactions on Applied Perception 9(1): 1-21, 2012. Type: Article
In recent years, computer simulations have been used to desensitize people suffering from a variety of phobias or generalized social anxiety. This paper describes experiments to assess the effectiveness of using voluntary facial gestur...
Oct 11 2012
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2023 ThinkLoud