Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Information Systems (H) > Models And Principles (H.1) > User/Machine Systems (H.1.2) > Human Factors (H.1.2...)  
 
Options:
 
  1-10 of 122 Reviews about "Human Factors (H.1.2...)": Date Reviewed
   A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet
Ren J., Zhang D., He S., Zhang Y., Li T. ACM Computing Surveys 52(6): 1-36, 2019.  Type: Article

Recognizing the limits of (distant) cloud computing, modern Internet of things (IoT) architectures recognize the so-called edge continuum between cloud applications and IoT devices and machines. “Continuum” implies ...

Jun 17 2022
  Website Visual Design Qualities: A Threefold Framework
Hartono E., Holsapple C. ACM Transactions on Management Information Systems 10(1): 1-21, 2019.  Type: Article

This work contributes to the literature on information systems by studying a theoretical perspective “that integrates three [major] dimensions of artifact visual design quality”: the aesthetic, functional, and symbo...

May 19 2022
  Widar2.0: passive human tracking with a single Wi-Fi link
Qian K., Wu C., Zhang Y., Zhang G., Yang Z., Liu Y.  MobiSys 2018 (Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services, Munich, Germany, Jun 10-15, 2018) 350-361, 2018.  Type: Proceedings

This work demonstrates that it is possible to track the location of a person, with sub-meter accuracy, using only one single Wi-Fi link between a pair of commercial off-the-shelf (COTS) Wi-Fi devices (“one access point plus o...

Jun 22 2021
  Rehumanized crowdsourcing: a labeling framework addressing bias and ethics in machine learning
Barbosa N., Chen M.  CHI 2019 (Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, Glasgow, UK, May 4-9, 2019) 1-12, 2019.  Type: Proceedings

Crowdsourcing is the practice of obtaining information or input into a task from a large number of people, either paid or unpaid, typically via the Internet. With its fast growth, crowdsourcing has produced large volumes of data manual...

Jun 1 2021
  Networks and religion: ties that bind, loose, build-up, and tear down
Everton S., Cambridge University Press, New York, NY, 2018. 412 pp.  Type: Book (978-1-108404-07-5)

Social network analysis (SNA) is an increasingly important tool for social science. By focusing on the links among people and organizations, it addresses the “social” aspect of social science much better than statis...

Sep 22 2020
  Deviance in social media and social cyber forensics: uncovering hidden relations using open source information (OSINF)
Al-khateeb S., Agarwal N., Springer International Publishing, New York, NY, 2019. 124 pp.  Type: Book (978-3-030136-89-5)

This short treatise is part of the “SpringerBriefs in Cybersecurity” series. The briefs in this series are either topic focused, like this book, or country focused. As the title suggests, the book focuses on deviant...

Aug 26 2020
  Silence is also evidence: interpreting dwell time for recommendation from psychological perspective
Yin P., Luo P., Lee W., Wang M.  KDD 2013 (Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, Aug 11-14, 2013) 989-997, 2013.  Type: Proceedings

In many social media sites, people who are given an opportunity to vote rarely do so. Yin et al. note: “We call the phenomenon [of] a user silently viewing an item without expressing [his or her] opinions (i.e. giving a vote)...

Apr 7 2014
  An analysis of human factors and label accuracy in crowdsourcing relevance judgments
Kazai G., Kamps J., Milic-Frayling N. Information Retrieval 16(2): 138-178, 2013.  Type: Article

Labeling is a complex task. This interesting paper investigates the use of crowdsourcing to create labeled data, which involves relevance judgments that are known to be subjective. The authors use a series of experiments using Amazon&a...

Aug 20 2013
  On operator effectiveness: the role of expertise and familiarity of environment on the detection of deviant behaviour
Wijn R., van den Berg H., Lousberg M. Personal and Ubiquitous Computing 17(1): 35-42, 2013.  Type: Article

There are many areas in which familiarity with the environment has an influence on activities and system behavior. In this paper, Wijn, van den Berg, and Lousberg discuss the effectiveness of operators of a surveillance camera monitori...

Apr 16 2013
  Voluntary facial activations regulate physiological arousal and subjective experiences during virtual social stimulation
Vanhala T., Surakka V., Courgeon M., Martin J. ACM Transactions on Applied Perception 9(1): 1-21, 2012.  Type: Article

In recent years, computer simulations have been used to desensitize people suffering from a variety of phobias or generalized social anxiety. This paper describes experiments to assess the effectiveness of using voluntary facial gestur...

Oct 11 2012
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 2004 Reviews.com™
Terms of Use
| Privacy Policy