{"title":"A review of groupware evaluations","authors":"David Pinelle, C. Gutwin","doi":"10.1109/ENABL.2000.883709","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883709","url":null,"abstract":"A better understanding of how groupware systems have been evaluated in the past can help to frame the discussion of what methods and techniques should be considered for future evaluations. We reviewed all papers from the ACM CSCW conference (1990-1998) that introduced or evaluated a groupware system. Forty-five papers were included in the review. The main findings are that almost one-third of the groupware systems were not evaluated in any formal way, that only about one-quarter of the articles included evaluations in a real-world setting, and that a wide variety of evaluation techniques are in use. Our main conclusions from the review are that more attention must be paid to evaluating groupware systems and that there is room for additional evaluation techniques that are simple and low in cost.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Walking the Web of trust","authors":"G. Caronni","doi":"10.1109/ENABL.2000.883720","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883720","url":null,"abstract":"Most currently deployed public key infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usage-scenarios, but there exists the viable alternative of the 'Web of Trust'. In a web of trust, each user of the system can choose for himself whom he elects to trust, and whom not. After contrasting the properties of web-of-trust based PKIs to those of hierarchical PKIs, an introduction to webs of trust and to quantitative trust calculations is given. The paper concludes with the presentation of an efficient, sub-exponential algorithm that allows heuristic computations of trust paths in a web of trust.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Should users inhabit visualisations?","authors":"C. Knight, M. Munro","doi":"10.1109/ENABL.2000.883703","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883703","url":null,"abstract":"The use of three-dimensions for visualisation is a lot newer than the technology required to achieve such visual representations. A further extension of this work is to add multiple users to one visualisation environment to create visualisations that go beyond individual intelligence amplification and become knowledge repositories, shared workspaces and integral parts of the management of the data which they represent. The issues surrounding such uses of visualisations are presented in this paper, with an extension of a three-dimensional visualisation to encompass these ideas.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UML-based representation of role-based access control","authors":"M. Shin, Gail-Joon Ahn","doi":"10.1109/ENABL.2000.883728","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883728","url":null,"abstract":"In role-based access control (RBAC) permissions are associated with roles, and users are made members of appropriate roles thereby acquiring the roles' permissions. The principal motivation behind RBAC is to simplify administration. Several framework for the development of role-based systems have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily understand and refer to develop role-based systems. The Unified Modeling Language (UML) is a general-purpose visual modeling language in which we can specify, visualize, and document the components of a software system. In this paper we represent the RBAC model with this well-known modeling language to reduce a gap between security models and system developments. We specify the RBAC model with three views: static view, functional view, and dynamic view. In addition, we briefly discuss about the future directions.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127993756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an evaluation methodology for the development of research-oriented virtual communities","authors":"Janet Ho, M. Schraefel, M. Chignell","doi":"10.1109/ENABL.2000.883714","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883714","url":null,"abstract":"This paper is part of a case study of collaborative environment use and part of a proposition for methodological approach for evaluating virtual environments based on the findings from that case study. We review the literature on evaluating collaborative environments and we also report on a usability study carried out on a research oriented virtual community. The report includes a cluster analysis of the questionnaire results and the use of those results in profiling user attitudes. We propose that this type of differential cluster analysis should be used in the future to identify people who are generally better able to make discriminating judgements, and also to identify people who are able to analyse the usability of different components of an environment rather than just the overall environment.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129951234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A coordination infrastructure for agent-based Internet applications","authors":"E. Denti, Andrea Omicini","doi":"10.1109/ENABL.2000.883735","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883735","url":null,"abstract":"Internet applications are often structured as collections of interactive, heterogeneous agents, which have to coordinate to pursue the application goals. These applications require design methodologies that are far from being well established and new standard technologies models, languages, technologies and tools specifically tailored to the agent metaphor and to agent-based systems. This article presents LuCe, a coordination infrastructure for the design and the development of agent-based distributed applications on the Internet, which integrates Java logic-based languages, and tuple-based coordination models. We discuss the impact of this approach on the design both of the single agents and of Internet applications, then suggest how it could be exploited in the design/development/test cycle.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128146530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation and comparison of the industrial and educational usage of CSCW within the design process","authors":"A. Thomson, S. MacGregor, W. Ion","doi":"10.1109/ENABL.2000.883713","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883713","url":null,"abstract":"This paper presents the findings of three recent research projects carried out at the University of Strathclyde. Two of the projects, ICON (Institutional Collaboration Over Networks) and ICON2 investigated the usage of CSCW tools by disparate engineering design students whilst, a Design Council funded research project investigated the introduction and usage of shared workspace technology within the design process of three companies and their supply chain. This is followed by a comparative reflection of the results allowing identification of generic findings together with opportunities for cross-sectoral lessons.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129796200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tapping alert protocol","authors":"G. Ahn, Kwangjo Kim, Hee Yong Youn","doi":"10.1109/ENABL.2000.883721","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883721","url":null,"abstract":"This paper proposes a new protocol called tapping alert protocol (TAP), which detects if any computer is eavesdropping on the network. When tapping is detected, it alerts the network users on the danger of tapping. In designing the protocol, a model for an attacker is developed who sniffs the network and breaks down the proposed protocol, and the requirements on the protocol in terms of efficiency and security are defined. We also describe how to detect if a network interface card on a remote computer is in the sniffing mode. The proposed protocol employs cryptographic schemes to guarantee authentication of the code monitoring tapping operation and integrity of the data being sent. Finally, the proposed protocol can protect authorized users from illegal eavesdropping on the network.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114386221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The mechanics of collaboration: developing low cost usability evaluation methods for shared workspaces","authors":"C. Gutwin, S. Greenberg","doi":"10.1109/ENABL.2000.883711","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883711","url":null,"abstract":"We introduce a conceptual framework that articulates the mechanics of collaboration for shared-workspace groupware: the low level actions and interactions that must be carried out to complete a task in a shared manner. These include communication, coordination, planning, monitoring, assistance, and protection. The framework also includes three general measures of these mechanics: effectiveness, efficiency, and satisfaction. The underlying idea of the framework is that some usability problems in groupware systems are not inherently tied to the social context in which the system is used but rather are a result of poor support for the basic activities of collaborative work in shared spaces. We believe that existing low-cost evaluation methods-heuristic evaluation, walkthroughs, user observations and questionnaires-can be modified to include this framework in a way that helps a groupware evaluator uncover these usability problems.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CVE technology development based an real world application and user needs","authors":"E. Daphne, M. William, P.R. Steve, W.J. Adrian","doi":"10.1109/ENABL.2000.883698","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883698","url":null,"abstract":"Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}