|Abbas Moallem, Ph.D||
Concrete or Abstract User Interface?
User interaction with computers is now a constant in our lives, an active part of our daily routines. We are not only using computers to perform tasks but also for common instances working through remote Internet access to control devices such as home securities devices, camera surveillance, and temperature light controls. All users, from young to old, count on user interface to work for them in helping them successfully complete their essential tasks. One of the issues that has been observed is how the interface should be designed so that it properly reflects how users want to view the devices they are remotely managing. The question comes up as to what kind of mental image should the design trigger when a user views the user interface? The knowledge as to how this mental image matches the real concept of user interface is key to creating a capable design.
ABOUT HOME NETWORKING DEVICES LOCATION & FEATURES
For this study, 95 participants were surveyed about the location of their home networking devices (routers) location then, 43 locations were evaluated from houses located in Silicon Valley, California. The results provide the data on the rooms where people keep their routers, their physical location, and certain idiosyncrasies of their usage. In light of this study we have extracted some results and hypothesized some guidelines for future designs of routers in the consumer market.
Paper published and presented at the HCI International Conference 2013, and 214
Research Home Networking Usability
Publication and presentation July 2012- the AHFEI 2012 conference
Research Just Completed: :About Authentication, Security, Password Re-set Features and Users Behaviors in using Web Application
Accessing web applications is now a part of every individual's daily life. To access the right location, users must point their browser to the right area (page) and then authenticate themselves with a user ID and password. Even though this process seems easy in theory, it is not as simple in reality. Many studies that investigate the authenticating and security features from different angles examine different problems: entering the wrong URL, phishing detection, and the user’s behavior and vulnerability in making sound judgments. Other studies focus on Online accounts and users' password management strategies, and investigate users' models of attacks and attackers, which help provide context for their security. The certificate validation method evaluates it all in regard to website authentication measures.
This study investigates user behavior from three perspectives:
First Publication July 2011- View Paper