- Innovative Human-Technology Interaction
- Privacy, Security, and Data Protection
- User Authentication and Security Systems
- Sexuality, Behavior, and Technology
- Information Technology and Learning
- Technology Adoption and User Behaviour
- Advanced Malware Detection Techniques
- Transportation and Mobility Innovations
- Usability and User Interface Design
- Impact of Technology on Adolescents
- Educational Games and Gamification
- Innovative Approaches in Technology and Social Development
- Spam and Phishing Detection
- Information and Cyber Security
- Human Mobility and Location-Based Analysis
- Diverse multidisciplinary academic research
- Museums and Cultural Heritage
- Persona Design and Applications
- Data Visualization and Analytics
- Cybercrime and Law Enforcement Studies
- Creativity in Education and Neuroscience
- Open Source Software Innovations
- Mobile Crowdsensing and Crowdsourcing
- Safety Warnings and Signage
- Virtual Reality Applications and Impacts
University of Luxembourg
2014-2023
Online services pervasively employ manipulative designs (i.e., dark patterns) to influence users purchase goods and subscriptions, spend more time on-site, or mindlessly accept the harvesting of their personal data. To protect from lure such designs, we asked: are aware presence patterns? If so, they able resist them? By surveying 406 individuals, found that generally can exert on online behaviour. However, being does not equip with ability oppose influence. We further find respondents,...
HCI researchers are increasingly concerned about the prevalence of manipulative design strategies in user interfaces, commonly referred to as "dark patterns". The line between manipulation and persuasion is often blurred, leading legal ethical concerns. This paper examines tension persuasive UX practices designs. UX/UI professionals (n=22), split into eight focus groups, conducted activities on two fictitious scenarios. We qualitatively analysed their discussions regarding for influencing...
Privacy is a timely topic that increasingly scrutinized in the public eye. In spite of privacy and security breaches, people still frequently compromise their exchange for certain benefits technology or service. This study builds on both acceptance (TA) User Experience (UX) research order to explore build hypotheses regarding additional dimensions might play role acceptability tradeoffs are not currently accounted TA models. Using four scenarios describing situations with potential...
Usable privacy and security researchers have developed a variety of approaches to represent risk research participants. To understand how these are used when each might be most appropriate, we conducted systematic literature review methods in studies with human From sample 633 papers published at five top conferences between 2014 2018 that included keywords related both security/privacy usability, systematically selected analyzed 284 full-length subjects studies. Our analysis focused on...
Learning and assessment are increasingly mediated by digital technologies. Thus, learners' experiences with these technologies growing in importance, as they might affect learning assessment. The present paper explores the impact of user experience on concept mapping. It builds theory to explain variance intention use mapping tools map-based scores. Furthermore, it identifies fulfillment psychological needs an important driver positive experiences. In a field study three schools university...
"I hope that this survey is a joke because it made me laugh so much". This quote just one example of many negative respondents' reactions gathered during large-scale user experience (UX) study. Unfortunately, the was no joke, rather well-constructed and validated standardized UX scale. paper critically reflects on use relevance scales for evaluation in business contexts. We report real-world case where meCUE questionnaire has been used to assess employees' (N=263) with their organization's...
An unsolved debate in the field of usable security concerns whether mechanisms should be visible, or blackboxed away from user for sake usability. However, tying this question to pragmatic usability factors only might simplistic. This study aims at researching impact displaying on User Experience (UX) context e-voting. Two versions an e-voting application were designed and tested using a between-group experimental protocol (N=38). Version D displayed mechanisms, while version ND did not...
The novel coronavirus spurred a keen interest in digital technologies for museums as both cultural professionals and the public took notice of their uses limitations throughout confinement period. In this study, we investigated use by during period when in-person interaction was not possible. aim study to better understand impact on museum order identify implications future experience design. We compared across four countries – France, Japan, Luxembourg, United States conducting an...
In this paper we present a novel concept that deals specifically with changing driver behaviour in order to reduce traffic congestion. The project I-GEAR (incentives and gaming environments for automobile routing) aims understand the motivations drivers have while undertaking daily commute then provide them range of incentives change their behaviour. A key focus within is on ways which problem could potentially be solved without recourse an expensive infrastructure project. Our solution was...
The context of use has been highlighted for a long time as being key factor impacting User Experience (UX). Yet current UX evaluation tools, especially questionnaires, rarely encompass an explicit investigation the context. With ever-growing trend mobile products and ubiquitous computing, absence dedicated measurement tool becomes critical. Based on review relevant literature fine-grained categorization contextual factors, we developed Context Scale (UXCS), 30-items instrument allowing...
Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers empirically studied relevance validity several UX evaluation methods, few studies only explored expert-based for assessment UX. If experts are able something as complex inherently subjective UX, how they conduct such an what criteria rely on, thus remain open questions. In present paper we report on 33 performing a 4 We provided with Cards, tool based...
Empathy towards users is crucial to the design of user-centered technologies and services. Previous research focused on defining empathy its role in process for triggering end-users. However, there a lack measurement instruments design. Most previous work designers, overlooking need other stakeholders develop break organizational silos deliver high-quality services products. In this contribution, we share preliminary stages development an scale service We build literature from psychology...
Persuasive tactics intend to encourage users open advertising emails. However, these can overwhelm users, which makes them frustrated and leads lower rates. This paper intends understand persuasive are used how they perceived by users. We first developed a categorization of inbox-level in permission-based then asked participants interact with an email inbox prototype, combined interviews (N=32), investigate their opinions towards emails underlying tactics. Our qualitative findings reveal...
A growing body of research in the usable privacy and security community addresses question how to best influence user behavior reduce risk-taking. We propose address this challenge by integrating concept experience (UX) into empirical studies that attempt change risk-taking behavior. UX enables us study complex interplay between user-related, system-related contextual factors provides insights experiential aspects underlying change, including negative experiences.
Persuasive designs become prevalent on smartphones, and an increasing number of users report having problematic smartphone use behaviours. in smartphones might be accountable for the development reinforcement such use. This paper uses a mixed-methods approach to study relationship between persuasive use: (1) questionnaires (N=183) investigate proportion participants multiple behaviours applications (apps) that they perceived affecting their attitudes behaviours, (2) interviews (N=10) deepen...
When flying robots are used in close-range interaction with humans, the noise they generate, also called consequential sound, is a critical parameter for user acceptance. We conjecture that there benefit adding natural sounds to noisy domestic drones. To test our hypothesis experimentally, we carried out mixed-methods research study (N = 56) on reported perception of sonified robot three sound conditions at distances. The studied were, respectively, added robot’s inherent noises during...
In this paper the authors explain use of gamification as a way to optimize mobility patterns within heavily congested European City. They explore from two perspectives, first by outlining gaming concept and secondly explaining how game that took place in locations can be used incentives design issues.