14 results on '"Wiedenbeck, Susan"'
Search Results
2. The Internet Public Library (IPL): An Exploratory Case Study on User Perceptions.
- Author
-
Maceli, Monica, Wiedenbeck, Susan, and Abels, Eileen
- Subjects
- *
LIBRARIES & the Internet , *INTERNET in library reference services , *SURVEYS , *INTERVIEWING , *RESEARCH on Internet users , *LIBRARY evaluation , *PUBLIC libraries , *COLLEGE students , *CONSUMER attitudes , *INFORMATION services , *INTERNET , *LIBRARIANS , *LIBRARY reference services , *REFERENCE sources , *SEARCH engines , *ACCESS to information , *MEDICAL coding - Abstract
The Internet Public Library (IPL), now known as ipl2, was created in 1995 with the mission of serving the public by providing librarian-recommended Internet resources and reference help. We present an exploratory case study on public perceptions of an "Internet public library," based on qualitative analysis of interviews with ten college student participants: some current users and others unfamiliar with the IPL. The exploratory interviews revealed some confusion around the IPL's name and the types of resources and services that would be offered. Participants made many positive comments about the IPL's resource quality, credibility, and personal help. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
3. ENHANCING PERCEIVED CREDIBILITY OF CITIZEN JOURNALISM WEB SITES.
- Author
-
Johnson, Kirsten A. and Wiedenbeck, Susan
- Subjects
- *
HYPERLINKS , *CITIZEN journalism , *ONLINE journalism , *DIGITAL media research , *OBJECTIVITY in journalism , *JOURNALISM & society - Abstract
This study examined whether information about a writer and hyperlinks on a citizen journalism Web site affected the perceived credibility of stories. Participants read stories from a popular citizen journalism Web site and rated the stories in terms of perceived credibility. Results show that hyperlinks and information about the writer do enhance perceived story credibility. Credibility is enhanced most greatly when both hyperlink and writer information are included and, to a lesser extent, when just hyperlink or writer information is present. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
4. PassPoints: Design and longitudinal evaluation of a graphical password system
- Author
-
Wiedenbeck, Susan, Waters, Jim, Birget, Jean-Camille, Brodskiy, Alex, and Memon, Nasir
- Subjects
- *
COMPUTER passwords , *COMPUTER security , *DATA protection , *SECURITY systems - Abstract
Abstract: Computer security depends largely on passwords to authenticate human users. However, users have difficulty remembering passwords over time if they choose a secure password, i.e. a password that is long and random. Therefore, they tend to choose short and insecure passwords. Graphical passwords, which consist of clicking on images rather than typing alphanumeric strings, may help to overcome the problem of creating secure and memorable passwords. In this paper we describe PassPoints, a new and more secure graphical password system. We report an empirical study comparing the use of PassPoints to alphanumeric passwords. Participants created and practiced either an alphanumeric or graphical password. The participants subsequently carried out three longitudinal trials to input their password over the course of 6 weeks. The results show that the graphical password users created a valid password with fewer difficulties than the alphanumeric users. However, the graphical users took longer and made more invalid password inputs than the alphanumeric users while practicing their passwords. In the longitudinal trials the two groups performed similarly on memory of their password, but the graphical group took more time to input a password. [Copyright &y& Elsevier]
- Published
- 2005
- Full Text
- View/download PDF
5. The use of icons and labels in an end user application program: an empirical study of learning and retention.
- Author
-
Wiedenbeck, Susan
- Subjects
- *
COMPUTER interfaces , *APPLICATION program interfaces , *COMPUTER users - Abstract
This research compared the learning of an application program whose interface was implemented using buttons with text labels, icons, or a fully redundant combination of icons and text labels. The objective was to: 1) evaluate the success of novice computer users in initially learning to use the application and in later use in a delayed session and 2) measure users' attitudes toward the application. Each session was divided into four blocks, and performance in the blocks was measured in terms of correctness of the tasks performed, time to perform tasks, and number of times the help facility was accessed. In addition, at the end of each session the participants' perceptions of the ease of use and usefulness of the software were measured. The results showed that in the first session performance was best on the label-only and icon-label interfaces. Performance on the icon-only interface was much poorer in session 1, particularly in terms of time and help references, but improved in session 2 to the point where it approached the performance on the other interfaces. Retention of skill between the initial and the delayed session was worse for the icon-only interface, but the effect was short-lived. Perceptions of ease of use were consistently better for the icon-label interface than for the other two interfaces. Perceptions of usefulness were higher for the icon-only and icon-label interfaces than for the label-only interface in the first session. Perceptions of usefulness became more positive for the icon-only group in the delayed session, but did not change for the other groups. [ABSTRACT FROM AUTHOR]
- Published
- 1999
- Full Text
- View/download PDF
6. What Do Novices Learn During Program Comprehension?
- Author
-
Corritore, Cynthia L. and Wiedenbeck, Susan
- Subjects
- *
COMPUTER software , *COMPUTER programmers , *ABILITY - Abstract
Comprehension of computer programs involves identifying important program parts and inferring relationships between them. The ability to comprehend a computer program is a skill that begins its development in the novice programmer and roaches maturity in the expert programmer. This research examined the beginning of this process, that of comprehension of computer programs by novice programmers. The mental representations of the program text that novices form, which indicate the comprehension strategies being used, were examined. In the first study, 80 novice programmers were tested on their comprehension of short program segments. The results suggested that novices form detailed, concrete mental representations of the program text, supporting work that has previously been done with novice comprehension. Their mental representations were primarily procedural in nature, with little or no modeling using real-world referents. In a second study, the upper and lower quartile comprehenders from Study 1 were tested on their comprehension of a longer program. Results supported the conclusions from Study 1 in that the novices tended towards detailed representations of the program text with little real-world reference. However, the comprehension strategies used by high comprehenders differed substantially from those used by low comprehenders. Results indicated that the more advanced novices were using more abstract concepts in their representations, although their abstractions were detailed in nature. [ABSTRACT FROM AUTHOR]
- Published
- 1991
- Full Text
- View/download PDF
7. Learning Second and Subsequent Programming Languages: A Problem of Transfer.
- Author
-
Scholtz, Jean and Wiedenbeck, Susan
- Subjects
- *
PROGRAMMING languages , *LEARNING - Abstract
Focuses on the learning of second and subsequent programming languages. Concept and construct of the programs; Minor problems of programmers on the syntax and semantics of subsequent languages; Programming language plans develop by the programmers.
- Published
- 1990
- Full Text
- View/download PDF
8. Empirical studies of software engineering
- Author
-
Petre, Marian and Wiedenbeck, Susan
- Published
- 2004
- Full Text
- View/download PDF
9. Gender pluralism in problem-solving software
- Author
-
Burnett, Margaret M., Beckwith, Laura, Wiedenbeck, Susan, Fleming, Scott D., Cao, Jill, Park, Thomas H., Grigoreanu, Valentina, and Rector, Kyle
- Subjects
- *
PLURALISM , *PROBLEM solving , *COMPUTER software , *WORK environment , *PROTOTYPES ,SEX differences (Biology) - Abstract
Abstract: Although there has been significant research into gender regarding educational and workplace practices, there has been little awareness of gender differences as they pertain to software tools, such as spreadsheet applications, that try to support end users in problem-solving tasks. Although such software tools are intended to be gender agnostic, we believe that closer examination of this premise is warranted. Therefore, in this paper, we report an end-to-end investigation into gender differences with spreadsheet software. Our results showed gender differences in feature usage, feature-related confidence, and tinkering (playful exploration) with features. Then, drawing implications from these results, we designed and implemented features for our spreadsheet prototype that took the gender differences into account. The results of an evaluation on this prototype showed improvements for both males and females, and also decreased gender differences in some outcome measures, such as confidence. These results are encouraging, but also open new questions for investigation. We also discuss how our results compare to generalization studies performed with a variety of other software platforms and populations. [Copyright &y& Elsevier]
- Published
- 2011
- Full Text
- View/download PDF
10. On-line trust: concepts, evolving themes, a model
- Author
-
Corritore, Cynthia L., Kracher, Beverly, and Wiedenbeck, Susan
- Subjects
- *
TRUST , *ONLINE information services , *WEBSITES - Abstract
Trust is emerging as a key element of success in the on-line environment. Although considerable research on trust in the offline world has been performed, to date empirical study of on-line trust has been limited. This paper examines on-line trust, specifically trust between people and informational or transactional websites. It begins by analysing the definitions of trust in previous offline and on-line research. The relevant dimensions of trust for an on-line context are identified, and a definition of trust between people and informational or transactional websites is presented. We then turn to an examination of the causes of on-line trust. Relevant findings in the human–computer interaction literature are identified. A model of on-line trust between users and websites is presented. The model identifies three perceptual factors that impact on-line trust: perception of credibility, ease of use and risk. The model is discussed in detail and suggestions for future applications of the model are presented. [Copyright &y& Elsevier]
- Published
- 2003
- Full Text
- View/download PDF
11. Editorial
- Author
-
Corritore, Cynthia L., Kracher, Beverly, and Wiedenbeck, Susan
- Published
- 2003
- Full Text
- View/download PDF
12. A message from the new editorial team
- Author
-
Mackay, Wendy, Motta, Enrico, and Wiedenbeck, Susan
- Published
- 2004
- Full Text
- View/download PDF
13. The state of the art in end-user software engineering.
- Author
-
Ko, Andrew J., Abraham, Robin, Beckwith, Laura, Blackwell, Alan, Burnett, Margaret, Erwig, Martin, Scaffidi, Chris, Lawrance, Joseph, Lieberman, Henry, Myers, Brad, Rosson, Mary Beth, Rothermel, Gregg, Shaw, Mary, and Wiedenbeck, Susan
- Subjects
- *
SOFTWARE engineering , *COMPUTER software , *COMPUTER software development , *HUMAN-computer interaction , *COMPUTER systems , *WEB development - Abstract
Most programs today are written not by professional software developers, but by people with expertise in other domains working towards goals for which they need computational support. For example, a teacher might write a grading spreadsheet to save time grading, or an interaction designer might use an interface builder to test some user interface design ideas. Although these end-user programmers may not have the same goals as professional developers, they do face many of the same software engineering challenges, including understanding their requirements, as well as making decisions about design, reuse, integration, testing, and debugging. This article summarizes and classifies research on these activities, defining the area of End-User Software Engineering (EUSE) and related terminology. The article then discusses empirical research about end-user software engineering activities and the technologies designed to support them. The article also addresses several crosscutting issues in the design of EUSE tools, including the roles of risk, reward, and domain complexity, and self-efficacy in the design of EUSE tools and the potential of educating users about software engineering principles. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
14. Gender HCI: What About the Software?
- Author
-
Beckwith, Laura, Burnett, Margaret, Grigoreanu, Valentina, and Wiedenbeck, Susan
- Subjects
- *
GENDER differences (Psychology) , *COMPUTER software , *HUMAN-computer interaction , *USER interfaces , *GENDER differences in communication , *COMPUTER industry , *COMPUTER systems , *COMPUTERS , *ELECTRONIC data processing - Abstract
This article discusses on several studies building on theories and research from several domains investigating how gender differences interact with software. Gender differences suggest that females process information and solve problems in different ways than males do. It investigates whether software design should take gender differences into account. It discusses gender human-computer interaction which refers to how software relates to gender differences. It focuses on how gender-neutral software works, not on gender-oriented content.
- Published
- 2006
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.