A systematic literature review of the Design Critique method

L Alabood, Z Aminolroaya, D Yim, O Addam… - Information and …, 2023 - Elsevier
Abstract Context: The Design Critique (DC) method is becoming more common in Human–
Computer Interaction (HCI) and User Experience (UX) studies as the need for new …

CrowdSurfer: Seamlessly Integrating Crowd-Feedback Tasks into Everyday Internet Surfing

S Haug, I Benke, D Fischer, A Maedche - … of the 2023 CHI Conference on …, 2023 - dl.acm.org
Crowd feedback overcomes scalability issues of feedback collection on interactive website
designs. However, collecting feedback on crowdsourcing platforms decouples the feedback …

Appmod: Helping older adults manage mobile security with online social help

Z Wan, L Bao, D Gao, E Toch, X Xia… - Proceedings of the ACM …, 2019 - dl.acm.org
The rapid adoption of Smartphone devices has caused increasing security and privacy risks
and breaches. Catching up with ever-evolving contemporary smartphone technology …

Evaluating {Users'} Perceptions about a {System's} Privacy: Differentiating Social and Institutional Aspects

O Ayalon, E Toch - Fifteenth Symposium on Usable Privacy and Security …, 2019 - usenix.org
System design has a crucial effect on users' privacy, but privacy-by-design processes in
organizations rarely involve end-users. To bridge this gap, we investigate how User …

A model for system developers to measure the privacy risk of data

A Senarath, M Grobler, NAG Arachchilage - arXiv preprint arXiv …, 2018 - arxiv.org
In this paper, we propose a model that could be used by system developers to measure the
privacy risk perceived by users when they disclose data into software systems. We first …

Preserving digital privacy in e-participation environments: Towards GDPR compliance

V Diamantopoulou, A Androutsopoulou, S Gritzalis… - Information, 2020 - mdpi.com
The application of the General Data Protection Regulation (GDPR) 2016/679/EC, the
Regulation for the protection of personal data, is a challenge and must be seen as an …

A/p (rivacy) testing: Assessing applications for social and institutional privacy

O Ayalon, E Toch - Extended Abstracts of the 2019 CHI Conference on …, 2019 - dl.acm.org
The way information systems are designed has a crucial effect on users' privacy, but users
are rarely involved in Privacy-by-Design processes. To bridge this gap, we investigate how …

[PDF][PDF] AppMoD: Helping older adults manage mobile security with online social help.(2019)

Z WAN, L BAO, D GAO, E TOCH, X XIA… - Proceedings of the … - baolingfeng.github.io
Smartphone ownership is rapidly growing worldwide [58], quickly becoming the primary way
people interact with each other, their banks, shops, and health providers. At the same time …

On the application of artificial intelligence and human computation to the automation of agile software task effort estimation

M Alhamed - 2022 - theses.gla.ac.uk
Software effort estimation (SEE), as part of the wider project planning and product road
mapping process, occurs throughout a software development life cycle. A variety of effort …

[PDF][PDF] Embedding Privacy into Software Systems: A Privacy Engineering Methodology for Data Minimisation

A Senarath - 2019 - unsworks.unsw.edu.au
Ubiquitous software systems (online shopping, social networking apps) today collect, store
and process user data, such as users name, age, credit card number and location. If these …