Computer Human Interaction for Management of Information Technology最新文献

筛选
英文 中文
Understanding and supporting personal activity management by IT service workers 理解并支持IT服务人员的个人活动管理
Computer Human Interaction for Management of Information Technology Pub Date : 2008-11-14 DOI: 10.1145/1477973.1477976
Víctor M. González, L. Galicia, J. Favela
{"title":"Understanding and supporting personal activity management by IT service workers","authors":"Víctor M. González, L. Galicia, J. Favela","doi":"10.1145/1477973.1477976","DOIUrl":"https://doi.org/10.1145/1477973.1477976","url":null,"abstract":"Many recent studies provide evidence of the challenges experienced by knowledge workers while multi-tasking among several projects and initiatives. Work is often interrupted, and this results in people leaving activities pending until they have the time, information, resources or energy to reassume them. Among the different types of knowledge workers, those working directly with Information Technology (IT) or offering IT services -- software developers, support engineers, systems administrators or database managers --, experience particularly challenging scenarios of multi-tasking given the varied, crisis-driven and reactive nature of their work. Previous recommendations and technological solutions to ameliorate these challenges give limited attention to individual's preferences and to understanding how and what tools and strategies could benefit IT service workers as individuals. Based on the analysis of characteristics of IT service work and a consolidation of findings regarding personal activity management processes, we present the design of a software tool to support those processes and discuss findings of its usage by four IT service workers over a period of eight weeks. We found that the tool is used as a central repository to orchestrate personal activity, complementing the use of e-mail clients and shared calendars as well as supporting essential aspects of IT-service work such as multi-tasking and detailed work articulation.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126600947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Transcending organizational boundaries: virtual team approach in UI guideline development 超越组织边界:UI指南开发中的虚拟团队方法
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234795
R. E. Cordes, T. Spine
{"title":"Transcending organizational boundaries: virtual team approach in UI guideline development","authors":"R. E. Cordes, T. Spine","doi":"10.1145/1234772.1234795","DOIUrl":"https://doi.org/10.1145/1234772.1234795","url":null,"abstract":"This paper covers the experience of creating the IBM Web Application User Interface Design guidelines. The guidelines represent the integration of five other guideline sets that were in use at IBM. This paper discusses how the guidelines were developed, problems encountered, and lessons learned in that process. Some of the problems included difficulty in finding realistic examples of guideline topics, too much time spent on low-level detail with not enough on developing design patterns, and the time constraints of the virtual team. Recommendations for overcoming these issues are given.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using a process graph to improve system-user knowledge sharing 使用流程图改善系统-用户知识共享
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234797
T. Babaian, W. Lucas, H. Topi
{"title":"Using a process graph to improve system-user knowledge sharing","authors":"T. Babaian, W. Lucas, H. Topi","doi":"10.1145/1234772.1234797","DOIUrl":"https://doi.org/10.1145/1234772.1234797","url":null,"abstract":"We present our approach to addressing a critical design issue affecting users of ERP systems: the lack of transparency of the underlying business process model. To enhance system-to-user communication involving complex process flows, we have implemented a dynamic process graph and a set of related task links that are displayed alongside the traditional ERP task interface. This solution can also benefit other applications involving prolonged processes that are unfamiliar to the user.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122542705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using SITDRM for privacy rights management 使用SITDRM进行隐私权管理
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234799
Farzad Salim, N. Sheppard, R. Safavi-Naini
{"title":"Using SITDRM for privacy rights management","authors":"Farzad Salim, N. Sheppard, R. Safavi-Naini","doi":"10.1145/1234772.1234799","DOIUrl":"https://doi.org/10.1145/1234772.1234799","url":null,"abstract":"SITDRM is a privacy protection system that protects private data through the enforcement of MPEG REL licenses provided by consumers. Direct issuing of licenses by consumers has several usability problems that will be mentioned in this paper. Further, we will describe how SITDRM incorporates P3P language to provide a consumer-centered privacy protection system.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131622439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding complex IT environments using information analytics and visualization 使用信息分析和可视化理解复杂的IT环境
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234796
Amit Behal, Ying Chen, C. Kieliszewski, A. Lelescu, Bin He, Jie Cui, J. Kreulen, E. M. Maximilien, James Rhodes, W. Spangler
{"title":"Understanding complex IT environments using information analytics and visualization","authors":"Amit Behal, Ying Chen, C. Kieliszewski, A. Lelescu, Bin He, Jie Cui, J. Kreulen, E. M. Maximilien, James Rhodes, W. Spangler","doi":"10.1145/1234772.1234796","DOIUrl":"https://doi.org/10.1145/1234772.1234796","url":null,"abstract":"Today's business environments are going through several major transformations. First, most business environments are increasingly dependent upon vast amount of information. However, in part because of sheer volume, effective use of information is becoming more and more difficult. Second, the IT environments that support businesses are evolving from a simple machine- and automation-centric operational model to a complex people- and interactive service-centric operational model. Where, it becomes critical to analyze and understand the relationships between people, their skills, technologies, and organizations and effectively leverage human and technological resources to drive service delivery excellence and innovation. Unfortunately, very few tools exist to leverage the available information and analyze such relationships. This paper describes a solution, called \"Business Insights Workbench\" (BIW), which couples a number of information analytics techniques with a unique set of visualizations to help uncover hidden relationships among the key factors of the business environment (e.g., people, their skills, technologies, and organizations). Such understanding can bring many benefits to IT organizations, e.g., effective staffing for projects, collaboration and knowledge sharing, and technology growth and innovation. We use an IT business consulting services (IT BCS) organization as an example to illustrate our approach.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133644492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network-centricity: hindered by hierarchical anchors 网络中心:受等级锚的阻碍
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234782
Steve Abrams, G. Mark
{"title":"Network-centricity: hindered by hierarchical anchors","authors":"Steve Abrams, G. Mark","doi":"10.1145/1234772.1234782","DOIUrl":"https://doi.org/10.1145/1234772.1234782","url":null,"abstract":"Network-centricity is a concept under consideration as a useful paradigm for complex organizational operations, combining the strengths of bureaucracy with the innovative possibilities afforded by the ongoing explosion of information and communication technologies. Network-centric work (NCW) is that in which the activities associated with work are conducted via informal selfdirected networks of people, occurring within an environment enabled by technological and organizational infrastructure. NCW cuts across boundaries within and between organizations and engages participants with more regard for their expertise and motivation than their formal roles. Network-centric organizations embrace NCW alongside bureaucracies oriented to providing the resources and articulating the vision to which the NCW is to be oriented. Network-centricity is motivated by a desire for rapid adaptation and flexibility to changing circumstances. However, in an ethnographic study of a distributed team deployed by a large corporation seeking to benefit from a network-centric approach, we found that the work of the distributed team was hindered by some team members \"anchoring\" to bureaucratic work practices instead of supporting network-centric practices. We identify several such anchor points and the ways in which they impeded network-centric work.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
IT ecosystems: evolved complexity and unintelligent design IT生态系统:进化的复杂性和不智能的设计
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234780
James L. Lentz, Terry Bleizeffer
{"title":"IT ecosystems: evolved complexity and unintelligent design","authors":"James L. Lentz, Terry Bleizeffer","doi":"10.1145/1234772.1234780","DOIUrl":"https://doi.org/10.1145/1234772.1234780","url":null,"abstract":"Modern enterprise IT systems consist of many specialized functional components, often designed by multiple vendors, interconnected in a plethora of permutations to accomplish different goals. An increasingly large number of technical specialists support these systems. Designers of system administration and management tools for these environments must address complexity issues arising from variations in system architectures and topologies, integration between new and legacy systems as well as internal processes and organizational culture. This paper describes aspects of variability within and between IT environments and discusses approaches for managing complexity.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"447 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123455541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Design guidelines for system administration tools developed through ethnographic field studies 通过人种学实地研究开发的系统管理工具设计指南
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234774
Eben M. Haber, John H. Bailey
{"title":"Design guidelines for system administration tools developed through ethnographic field studies","authors":"Eben M. Haber, John H. Bailey","doi":"10.1145/1234772.1234774","DOIUrl":"https://doi.org/10.1145/1234772.1234774","url":null,"abstract":"Information Technology system administrators (sysadmins) perform the crucial and never-ending work of maintaining the technical infrastructure on which our society depends. Computer systems grow more complex every year, however, and the cost of administration is an ever increasing fraction of total system cost - IT systems are growing harder to manage. To better understand this problem, we undertook a series of field studies of system administration work over the past four years, visiting a variety of enterprise and large university sites. One of our most compelling observations was how often the tools used by system administrators were not well aligned with their work practices. We believe that this misalignment was the result of administration tools designed without a complete understanding of the full context of administration work. To promote the design of better tools, this paper describes system administration work in more detail based on examples from our field studies, outlines the dimensions along which enterprise sysadmins differ significantly from other computer users, and provides a set of guidelines for tools to better support how administrators actually work.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"121 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122706386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Looking for trouble: understanding end-user security management 寻找麻烦:了解终端用户安全管理
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234786
Joshua B. Gross, M. Rosson
{"title":"Looking for trouble: understanding end-user security management","authors":"Joshua B. Gross, M. Rosson","doi":"10.1145/1234772.1234786","DOIUrl":"https://doi.org/10.1145/1234772.1234786","url":null,"abstract":"End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This paper challenges this view as derogatory and unconstructive, arguing that users, as agents of organizations, often have sophisticated strategies regarding sensitive data, and are quite cautious. Existing work on user security practice has failed to consider how users view security; this paper provides content on and analysis of end user perspectives on security management. We suggest that properly designed systems would bridge the knowledge gap (where necessary) and mask levels of detail (where possible), allowing users to manage their security needs in synchrony with the needs of the organization. The evidence for our arguments comes from a set of in-depth interviews with users with no special training on, knowledge of, or interest in computer security. We conclude with guidelines for security and privacy tools that better leverage existing users knowledge.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130529652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
User help techniques for usable security 可用安全性的用户帮助技术
Computer Human Interaction for Management of Information Technology Pub Date : 2007-03-30 DOI: 10.1145/1234772.1234787
Almut Herzog, N. Shahmehri
{"title":"User help techniques for usable security","authors":"Almut Herzog, N. Shahmehri","doi":"10.1145/1234772.1234787","DOIUrl":"https://doi.org/10.1145/1234772.1234787","url":null,"abstract":"There are a number of security-critical applications such as personal firewalls, web browsers and e-mail clients, whose users have little or no security knowledge and are easily confused, even frustrated by menus, messages or dialog boxes that deal with security issues.\u0000 While there are evaluations of existing applications and proposals for new approaches or design guidelines for usable security applications, little effort has been invested in determining how applications can help users in security decisions and security tasks. The purpose of this work is to analyse conventional and security-specific user help techniques with regard to their usefulness in supporting lay users in security applications.\u0000 We analyse the following help techniques: online documentation, context-sensitive help, wizards, assistants, safe staging and social navigation, and complement these with the tempting alternative of built-in, hidden security. Criteria for the analysis are derived from the type of user questions that can arise in applications and from definitions of when a security application can be called usable.\u0000 Designers of security applications can use our analysis as general recommendations for when and how to use and combine user help techniques in security applications, but they can also use the analysis as a template. They can instantiate the template for their specific application to arrive at a concrete analysis of which user help techniques are most suitable in their specific case.","PeriodicalId":157379,"journal":{"name":"Computer Human Interaction for Management of Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信