Christena Nippert-Eng - Academia.edu (original) (raw)
Workshop, Posters, and Demos by Christena Nippert-Eng
ACM Conference on Human Factors in Computing Systems Workshop on HCI Goes to the Zoo, May 6, 2016
The Quantified Self movement has resulted in tracking and visualization technologies that allow p... more The Quantified Self movement has resulted in tracking and visualization technologies that allow people to become more aware of their own and their pets' activity levels as incentives for living healthier lifestyles. Zoos provide another opportunity within this movement to further promote public awareness of human and animal well-being. In this position paper, we extend the possibilities of the Quantified Self movement to those of the Quantified Other and the Smart Habitat. We explore the possibility of engaging virtual and in-person zoo visitors by allowing them to compare their activity data to that of their pets and zoo animals, and also to promote awareness of animal well-being by comparing the activity data of zoo animals in a variety of habitat configurations. We propose the notion of Interspecies Computer Interaction (ICI) to mutually benefit human and non-human animal well-being.
Papers by Christena Nippert-Eng
Privacy is a socially gifted commodity. It comes in many forms, granted to or withheld from us by... more Privacy is a socially gifted commodity. It comes in many forms, granted to or withheld from us by many types of people. These especially include the professionals who design objects, environments, services, and technological systems. In this paper, I present one way of thinking about privacy and argue for the importance of understanding not only how people conceive of it, but also how they actually achieve it. Comprehending the work of privacy – the ways it is normally achieved – can be of great importance if a designer’s work is to be successful. Privacy is an extremely cultured concept. My conclusions here are based only on insights drawn from the United States, during a 3-year study funded by Intel Corporation. This mixed method study included ethnographic observation of workplaces, homes, and public spaces; archival/historical research (based on academic and popular literature); content analysis of print media, including over 44,000 newspaper articles from 1985-2003; and 74 form...
ArXiv, 2019
Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It pose... more Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses legitimate risks to businesses, government agencies, and all users due to sensitive data breaches, subsequent financial and productivity losses, and social and personal inconvenience. Often, these attacks use social engineering techniques to deceive end-users, indicating the importance of user-focused studies to help prevent future attacks. We provide a detailed overview of phishing research that has focused on users by conducting a systematic literature review of peer-reviewed academic papers published in ACM Digital Library. Although published work on phishing appears in this data set as early as 2004, we found that of the total number of papers on phishing (N = 367) only 13.9% (n = 51) focus on users by employing user study methodologies such as interviews, surveys, and in-lab studies. Even within this small subset of papers, we note a striking lack of attention to reporting importa...
This text explores the intricacies and implications of how people draw the line between home and ... more This text explores the intricacies and implications of how people draw the line between home and work. Arguing that relationships between the two realms range from those that are highly "integrating" to those that are highly "segmenting," it examines the ways people sculpt the boundaries between home and work. With sensitivity to the symbolic value of objects and actions, the author explores the meaning of clothing, wallets, lunches and vacations, and the places and ways in which we engage our family, friends, and co-workers. Commuting habits are also revealing, showing how the transition between home and work "selves" is made though ritualized behaviour like greetings and farewells, the consumption of food, dress, choices of routes to and from work, and listening, working, and sleeping habits during these journeys.
ACM Conference on Human Factors in Computing Systems Workshop on HCI Goes to the Zoo, May 6, 2016
The Quantified Self movement has resulted in tracking and visualization technologies that allow p... more The Quantified Self movement has resulted in tracking and visualization technologies that allow people to become more aware of their own and their pets' activity levels as incentives for living healthier lifestyles. Zoos provide another opportunity within this movement to further promote public awareness of human and animal well-being. In this position paper, we extend the possibilities of the Quantified Self movement to those of the Quantified Other and the Smart Habitat. We explore the possibility of engaging virtual and in-person zoo visitors by allowing them to compare their activity data to that of their pets and zoo animals, and also to promote awareness of animal well-being by comparing the activity data of zoo animals in a variety of habitat configurations. We propose the notion of Interspecies Computer Interaction (ICI) to mutually benefit human and non-human animal well-being.
Privacy is a socially gifted commodity. It comes in many forms, granted to or withheld from us by... more Privacy is a socially gifted commodity. It comes in many forms, granted to or withheld from us by many types of people. These especially include the professionals who design objects, environments, services, and technological systems. In this paper, I present one way of thinking about privacy and argue for the importance of understanding not only how people conceive of it, but also how they actually achieve it. Comprehending the work of privacy – the ways it is normally achieved – can be of great importance if a designer’s work is to be successful. Privacy is an extremely cultured concept. My conclusions here are based only on insights drawn from the United States, during a 3-year study funded by Intel Corporation. This mixed method study included ethnographic observation of workplaces, homes, and public spaces; archival/historical research (based on academic and popular literature); content analysis of print media, including over 44,000 newspaper articles from 1985-2003; and 74 form...
ArXiv, 2019
Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It pose... more Phishing is a well-known cybersecurity attack that has rapidly increased in recent years. It poses legitimate risks to businesses, government agencies, and all users due to sensitive data breaches, subsequent financial and productivity losses, and social and personal inconvenience. Often, these attacks use social engineering techniques to deceive end-users, indicating the importance of user-focused studies to help prevent future attacks. We provide a detailed overview of phishing research that has focused on users by conducting a systematic literature review of peer-reviewed academic papers published in ACM Digital Library. Although published work on phishing appears in this data set as early as 2004, we found that of the total number of papers on phishing (N = 367) only 13.9% (n = 51) focus on users by employing user study methodologies such as interviews, surveys, and in-lab studies. Even within this small subset of papers, we note a striking lack of attention to reporting importa...
This text explores the intricacies and implications of how people draw the line between home and ... more This text explores the intricacies and implications of how people draw the line between home and work. Arguing that relationships between the two realms range from those that are highly "integrating" to those that are highly "segmenting," it examines the ways people sculpt the boundaries between home and work. With sensitivity to the symbolic value of objects and actions, the author explores the meaning of clothing, wallets, lunches and vacations, and the places and ways in which we engage our family, friends, and co-workers. Commuting habits are also revealing, showing how the transition between home and work "selves" is made though ritualized behaviour like greetings and farewells, the consumption of food, dress, choices of routes to and from work, and listening, working, and sleeping habits during these journeys.