In-Depth Analysis of College Students' Data Privacy Awareness

Total Page:16

File Type:pdf, Size:1020Kb

In-Depth Analysis of College Students' Data Privacy Awareness Columbus State University CSU ePress Theses and Dissertations Student Publications 12-2020 In-Depth Analysis of College Students’ Data Privacy Awareness Vernon D. Andrews Follow this and additional works at: https://csuepress.columbusstate.edu/theses_dissertations Part of the Computer Sciences Commons Recommended Citation Andrews, Vernon D., "In-Depth Analysis of College Students’ Data Privacy Awareness" (2020). Theses and Dissertations. 437. https://csuepress.columbusstate.edu/theses_dissertations/437 This Thesis is brought to you for free and open access by the Student Publications at CSU ePress. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of CSU ePress. COLUMBUS STATE UNIVERSITY IN-DEPTH ANALYSIS OF COLLEGE STUDENTS’ DATA PRIVACY AWARENESS A THESIS SUBMITTED TO THE TURNER COLLEGE OF BUSINESS IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF CYBERSECURITY MANAGEMENT TSYS SCHOOL OF COMPUTER SCIENCE BY VERNON D. ANDREWS COLUMBUS, GEORGIA 2020 Copyright © 2020 Vernon D. Andrews All Rights Reserved. IN-DEPTH ANALYSIS OF COLLEGE STUDENTS’ DATA PRIVACY AWARENESS By Vernon D. Andrews Committee Chair: Dr. Lydia Ray Committee Members Dr. Radhouane Chouchane Dr. Lixin Wang Columbus State University December 2020 ABSTRACT: While attending university, college students need to be aware of issues related to data privacy. Regardless of the age, gender, race, or education level of college students, every student can relate to the advancement of the internet within the last decades. The internet has completely transformed the way the world receives and stores messages. Positively, the internet allows messages to be sent across the globe within the fraction of a second and provides students with access to potentially unlimited information on a variety of subjects. On the downside, there are issues on the internet that can cause more harm than good. Most college students automatically think the internet is secure; however, the internet is full of loopholes that allow hackers to expose them on the internet and utilize them to exploit individuals for monetary gains. Within the last decade, there has been an enormous number of data breaches that have pinpointed the lack of awareness regarding data privacy. Do college students, who utilize the Internet for entertainment and education, know about the issue of data privacy on the Internet? In this thesis, I have proposed a modern method that carefully analyzes the data privacy level amongst college students. To ensure ultimate data privacy, we must initially create the awareness then analyze the awareness of data privacy. To adequately address the fundamental issues of data privacy, students will be respectfully asked to satisfactorily complete a structured questionnaire. The questionnaire will measure students' competence level regarding data privacy. The observational data will be utilized to uniquely determine if students are aware of the issues of data privacy or not. After further analysis, the data will be used to determine if there are unique characteristics that separates those who are aware from those who are not aware. The characteristics will be age, education, race, and exposure to computer related classes. INDEX WORDS: Data Privacy, Data Awareness, Data Privacy Competence, Encryption, Cryptography iv ACKNOWLEDGMENTS First and foremost, praise and humbly thanks to God, the Almighty for divine wisdom, divine guidance, and his showering of blessing throughout my research work to satisfactorily complete the academic research successfully. I would genuinely like to admirably express my deep and sincere gratitude to my research supervisor, Dr. Lydia Ray, for providing me the opportunity to do research and providing me with invaluable guidance throughout this research. Her heartfelt sincerity, unique vision, and academic motivation have deeply inspired me. It was genuinely a pleasure and an incredible honor to work and study under her guidance. Besides my research supervisor, I would like to sincerely thank the rest of my thesis committee: Dr. Radhouane Chouchane and Dr. Lixin Wang for their insightful and encouraging comments. Last but not least, I would like to graciously thank the Association for Computing Machinery (ACM) for selecting me to present at their scholarly conferences and for publishing my scholarly research. v TABLE OF CONTENTS 1. INTRODUCTION 1 1.1 Cyber Attacks 1 1.2 Data Privacy 3 1.3 Risks Associated with Data Privacy 4 1.4 Data Privacy Concerns for College Students 4 1.5 Social Engineering (Phishing Attack) 5 1.6 Cyber Attacks’ Weakest link 6 2. LITERATURE REVIEW 7 3. RESEARCH STUDY 10 3.1 Goals 11 3.2 Motivation 11 3.3 Methodology 12 3.4 Research Questionnaire 13 3.5 Questions Design 14 3.6 Students Tested 15 3.7 Steps to Recruitment 15 3.8 Questionnaire Summary 16 4 RESULTS 16 4.1 Results and Score Grid 16 4.2 T-Test Distribution 17 4.3 Hypothesis 18 4.4 Further Analysis based on Question #5 22 5 CONCLUSIONS 27 6 LIMITATIONS 28 REFRENCES 29 APPENDICES 31 APPENDIX A - Old Questionnaire 31 APPENDIX B - New Questionnaire 34 vi LIST OF TABLES Table 1 Notable Cyber Attacks 01-02 vii LIST OF FIGURES Figure 1. Hidden Message 22 Figure 2. Males and Females Percentages 23 Figure 3. Race Percentages 24 Figure 4. Computer Science and Non-Computer Science Percentages 25 Figure 5. Education Level Percentages 26 Figure 6. Age Percentages 27 viii IN-DEPTH ANALYSIS OF COLLEGE STUDENTS’ DATA PRIVACY AWARENESS A thesis submitted to Turner School of Business in partial fulfillment of the requirements for the degree of MASTER OF CYBERSECURITY MANAGEMENT TSYS OF COMPUTER SCIENCE By Vernon D. Andrews 2020 ___________________________________________ ______________________________2/16/2021 Dr. Lydia Ray, Chair Date ___________________________________________ _______________________________4/15/2021 Dr. Radhouane Chouchane, Member Date ___________________________________________ _______________________________4/15/2021 Dr. Lixin Wang, Member Date 1 1. INTRODUCTION 1.1 Cyber Attacks Within the last decade, the number of cyberattacks has increased dramatically. According to researchers from the Pew Research Center, cyberattacks will continue to increase at an exponential rate within the next few years (Rainie, Anderson, & Connolly, 2020). Some of the attacks that instantly became notable in the world are listed in the Table 1 (Notable Cyber Attacks) below: Table 1(Notable Cyber Attacks): Name of Company Company’s Hacking Date # of users account Information exposed Abode Computer software October 2013 153 million Adult Friend Finder Dating Service October 2016 412.2 million Canva Graphic design May 2019 137 million Dubsmash Video messaging December 162 million service 2018 eBay Online auction May 2014 145 million Equifax Credit bureau July 2017 147.9 million Heartland Payment Card transaction March 2008 134 million Systems LinkedIn Social network June 2012 & 165 million May 2016 Marriott Int. Hotel 2014-18 500 million 2 My Fitness Pal Fitness app February 2018 150 million Myspace Social Media June 2013 360 million NetEase Mailbox services October 2015 235 million Sina Weibo Social Media March 2020 538 million Yahoo Web services 2013-14 3 billion Zynga Gaming September 218 million 2019 Not only did the attacks become notable but they also exposed the hundreds of vulnerabilities in the cybersecurity infrastructure of these organizations (Swinhoe, 2020). One of the major known vulnerabilities that always becomes exploited is human error. Human error, in cybersecurity context, is defined as unintentional actions - or lack of action - by employees and users that cause, spread or allow a security breach to take place (Aloha, 2020). Among all attacks that exploit human error and human vulnerability, social engineering is the most common and most frequent. And among all social engineering attacks, phishing emails are the most popular because these are easy to launch, and chances of successful attack are high. Now that we are in the middle of the coronavirus pandemic, cyberattack experts have seen a 600 percent spike in malicious emails (Miller, 2020). One significant harm caused by cyberattacks and data breaches is that they can expose and collect people’s private information. Most individuals might not agree with promoting data privacy awareness but there are at least two reasons why promoting data privacy awareness is important. One is that data breaches can expose a lot of private data. In 2016, Adult Friend Finder was hacked and exposed to over 412 millions of their users’ private lives which resulted in some suicides. The other reason is that attackers can use private information for constructing sophisticated spear-phishing emails. Phishing emails can manipulate users onto a fake domain site 3 that can monitor their users’ logins and passwords. For example, a phishing email can be strategically designed for a particular person that seems legit but in reality, is an attempt made to lure that person into entering their user’s login information. Checking emails is a task that many college students perform daily. With checking emails, students have to become aware of the enticing tools that hackers use to get students to perform human errors when checking for soliciting emails such as coupon codes, honor committee, flash sales, etc. The importance of becoming aware of data privacy is extremely high. Most college students don’t seem to think checking and clicking emails can expose them to becoming a potential victim or comprising their computer network. The approach here is to analyze whether college students are or are not aware of the issues related to data privacy. After researching this topic, it is safe to say that there is no such article that analyzes data privacy amongst college students. 1.2 Data Privacy What is data privacy, and how do we measure data privacy? As technology evolves, we clearly realize more and more issues related to data privacy. Data privacy has officially become an essential tool that all or almost every college student needs to explore the internet. One of the main issues related to data privacy is the awareness of data privacy.
Recommended publications
  • Techsolutions July 2012 Techpoints
    July Newsletter 2012 In This Issue A Hair Raising, Money Raising Good Time in Hockessin Is the End of the Road Coming for These Gadgets and Services? Simple Hacks for Preserving Your Smartphone's Battery Life Get the Most out of Windows 7 The New Era of Distributed Denial-of-service Attacks Squeeze More Life Out of Your Aging Servers A Hair Raising, Money Raising Good Time in Hockessin Our friends at J Christian Studio are holding the Second Annual Incredible Back to School Wig Out to benefit the Ronald McDonald House of Delaware and the National Alopecia Areata Foundation. Details are below and if you need more information, give Marcy Wilkinson of J Christian Studio a call at 302.235.2306. Top ↑ Is the End of the Road Coming for These Gadgets and Services? We all love our gadgets. And when new ones come out, we can't imagine how we lived without them. However, there's an ugly truth to the world of technology: Much of what's hot today becomes obsolete tomorrow. Just look at the humble land-line telephone. Sure, many households still have them, but a growing number of people are relying solely on cell phones and ditching the expense of operating a land line. It's not difficult to imagine a future in which land-line telephones are no longer attached to our kitchen walls but are instead filling our landfills. Here's a look at some other key pieces of technology that, once essential, are on their way to becoming obsolete. In fact, many of these gizmos might become obsolete during the next 10 years.
    [Show full text]
  • Wearables: Their Time Has Come Norm Rose June 2015
    ANALYSIS Wearables: Their Time Has Come Norm Rose June 2015 This article explores the evolution of the wearables segment, with a focus on applications for the travel industry and barriers to adoption. This content is published by Phocuswright Inc., a wholly owned subsidiary of Northstar Travel Media, LLC.The information herein is derived from a variety of sources. While every effort has been made to verify the information, the publisher assumes neither responsibility for inconsistencies or inaccuracies in the data nor liability for any damages of any type arising from errors or omissions. All Phocuswright publications are protected by copyright. It is illegal under U.S. federal law (17USC101 et seq.) to copy, fax or electronically distribute copyrighted material beyond the parameters of the License or outside of your organization without explicit permission. © 2015 Phocuswright, Inc All Rights Reserved. Wearables: Their Time Has Come June 2015 About Phocuswright is the travel industry research authority on how travelers, suppliers and intermediaries connect. Independent, rigorous and unbiased, Phocuswright fosters smart strategic planning, tactical decision­making and organizational effectiveness. Phocuswright delivers qualitative and quantitative research on the evolving dynamics that influence travel, tourism and hospitality distribution. Our marketplace intelligence is the industry standard for segmentation, sizing, forecasting, trends, analysis and consumer travel planning behavior. Every day around the world, senior executives,marketers, strategists and research professionals from all segments of the industry value chain use Phocuswright research for competitive advantage. To complement its primary research in North and Latin America, Europe and Asia, Phocuswright produces several high­profile conferences in the United States and Europe, and partners with conferences in China and Singapore.
    [Show full text]
  • History of Wearables
    The First Wearable Eye Glasses – 1286 The history of wearable technology starts with the first eye glasses; made in Italy in 1286, for monks who were transcribing texts, according to a sermon delivered on 23rd of February 1306, by the Dominican friar Giordano da Pisa: “It is not yet twenty years since there was found the art of making eyeglasses, which make for good vision …” The first wearable watch - 1505 The Pomader (Bisamapfeluhr), a 1505 watch was made in Germany, is recognised as the first portable timekeeping device invented. A far cry from today’s discrete and extremely precise watches. The Pomader wearable watch was large and fairly inaccurate. However, rather than being simply utilitarian pieces, these wearable watches were status symbols for German Lords and Ladies, being incredibly expensive to make and purchase. The Oldest Recorded Smart Ring – Qing Dynasty - 1644 The Abacus ring was developed in China and is the oldest smart ring. Smart rings may seem like something from an impossible (or at least highly unlikely) vision of the future, but surprisingly enough, technology that can be wrapped around our fingers isn’t anything new. Before the calculator watch, there was a smart ring. The smartest ring at that time, called the abacus ring. Developed in the Qing Dynasty era (1644-1911), the ring features a 1.2cm long, 0.7cm wide abacus that sits, right on the finger. The first wearable camera - 1907 Pigeon photography was an aerial photography technique invented in 1907 by the German apothecary Julius Neubronner. A homing pigeon was fitted with an aluminium breast harness to which a lightweight time-delayed miniature camera could be attached, being used to capture aerial photographs behind the enemy lines.
    [Show full text]
  • The Investment Case for Wearables
    The Investment Case for Wearables Executive Summary Wearable technology devices are mobile electronics that can be worn on a user’s body or attached to clothing for applications such as: Sports and Fitness, Industrial/Military, Infotainment/Lifestyle, and/or Healthcare and Medical. Examples of wearable devices include: activity trackers, smart watches, smart glass, body cameras, health monitors, virtual reality headsets, hearables, and wearable industrial computers. There are many reasons that wearables may be attractive from an investment standpoint. Global analyst MarketsandMarkets1 estimates the global wearables sector will grow in size from $23 billion today, to $173 billion in 2020. Wearable devices seamlessly integrate computer and monitoring functionality, providing easy and reliable access to immediate information, acting as an “untethered” gateway to the Internet of Things. It is no wonder that according to Forrester Research2, 76% of global tech and business leaders have wearables on their agenda as a tool to harness data and enhance customer interaction. When it comes to the enterprise market, Forrester expects wearable adoption to go “mainstream” from 2017 to 2019 and to move to “business centrality” from 2020 to 2024.3 A Brief History of Wearables Wearable devices such as activity trackers, smart watches, body cameras, and virtual reality headsets have taken the consumer market by storm, with a multitude of devices available for purchase. But how did it all begin? Humans have always adorned their bodies with gadgets, for show, utility or both. The history of wearable technology is littered with many commercial failures, but also some groundbreaking commercial successes. While the air-conditioned hat, Pulsar calculator watch, and Levi’s ICD + Jacket never took off, the Sony Walkman portable music player was a huge commercial success in 1979, paving the way for other music players such as Apple’s iPod in 2001.
    [Show full text]
  • SOCIAL WORK and TECHNOLOGY COLUMN Watch
    SOCIAL WORK AND TECHNOLOGY COLUMN Watch Apps Are the Next Big Thing Recently, I had been thinking about what the next big change could be for Social Work and Technology. I’ll admit I’m not a super big visionary guy and it would be hard to come up with a technology that doesn’t exist yet - but I think the next big frontier will be related to our watches. We have already seen the rise of the smart watch, what more can it become? I remember in high school when calculator and TV remote watches came out. They were a big deal, especially when a classmate would randomly turn the TV on during class with a substitute teacher! I had a calculator watch and that wasn’t very disruptive. After that I wore a standard Timex Ironman watch for a long time (I still wear them sometimes). I got my first GPS watch when we moved to Minnesota 10 years ago and that was really helpful for my running and biking experiences in a new place. Last year a friend gave me an entry level smart watch. It only has basic features (primarily alerts) but I have really grown to like it. Many times my pocket and my wrist both buzz at the same time! It is handy to know who is calling or if a text is urgent or not without pulling out the phone. My wife has a new Apple Watch and I can definitely see many benefits from its more advanced features. She can control her phone from her wrist as long as its connected to the same Wi-Fi.
    [Show full text]
  • [Recent-E-Book PDF] Calculator Watch Casio Manual 5173
    Calculator Watch Casio Manual 5173 Download Calculator Watch Casio Manual 5173 If the module no. Of your watch is one of following modules, please correct the time according to the operation of the Quick Operation Guide. You can download. Vintage CASIO 197 CFX-200 SCIENTIFIC CALCULATOR WATCH Digital Japan w-Paperwork. C $294.48 + C $9.82 shipping. Pre-owned Manuals; Timepieces (Watches) Timepieces (Watches) Search Module No. 5173 (Size : 2944 KB) Terms and Conditions. A PDF reader is required to view PDF files..Operation Guide 5173 3. Press A twice to exit the setting mode. • Normally, your watch should show the correct time as soon as you select your Home City code. If it does not, it should adjust automatically after the next auto receive operation (in the middle of the night). Calculator Manuals; Digital Camera Manuals; Electronic Keyboard Manuals; Cash Register Manuals;. Related Manuals for Casio 5173. Watch Casio 5171 Operation Manual.Casio g shock wall clock, G-SHOCK men's digital watches are built to take anything. Tough, water resistant, shock resistant, and more, G-SHOCK's digital watches for men offer durability with classic style. Whether you're looking for something to wear to the office, something for your next adventure, or everyday wear, your new watch is waiting. Black resin band analog and digital watch with black face. Tough Solar Power; Multi-Band 6 Atomic Timekeeping; Tough Movement - Auto hand home position. Casio Men's 8- Digit Calculator Resin Band 35mm Watch CA53W-1 5 out of 5 stars (424) 424 product ratings - Casio Men's 8- Digit Calculator Resin Band 35mm Watch CA53W-1 This eight-digit calculator watch has a stopwatch that includes three measuring modes such as elapsed time, split time, first and second-place times.
    [Show full text]
  • Gesturecalc: an Eyes-Free Calculator for Touch Screens
    Paper Session 2: Inviscible Interactions ASSETS '19, October 28–30, 2019, Pittsburgh, PA, USA GestureCalc: An Eyes-Free Calculator for Touch Screens Bindita Chaudhuri1*, Leah Perlmutter1*, Justin Petelka2, Philip Garrison1 James Fogarty1, Jacob O. Wobbrock2, Richard E. Ladner1 1Paul G. Allen School of Computer Science & Engineering, 2The Information School DUB Group | University of Washington, Seattle, WA 98195, USA 1{bindita, lrperlmu, philipmg, jfogarty, ladner}@cs.washington.edu, 2{jpetelka, wobbrock}@uw.edu ABSTRACT A digital calculator is one of the most frequently used touch screen applications. However, keypad-based character input in existing calculator applications requires precise, targeted key presses that are time-consuming and error-prone for many screen readers users. We introduce GestureCalc, a digital calculator that uses target-free gestures for arithmetic tasks. It allows eyes-free target-less input of digits and operations through taps and directional swipes with one to three fngers, guided by minimal audio feedback. We conducted a mixed methods longitudinal study with eight screen reader users and found that they entered characters with GestureCalc 40.5% faster on average than with a typical touch screen calculator. Participants made more mistakes but also corrected more errors with GestureCalc, resulting in 52.2% fewer erroneous calculations than the baseline. Over the three sessions in the (a) GestureCalc (b) Baseline study, participants were able to learn the GestureCalc gestures Figure 1. (a) Performing a three-fnger tap on GestureCalc our novel and effciently perform short calculations. From our interviews eyes-free app with target-free rich gestures, versus (b) typing “5” on after the second session, participants recognized the effort in ClassicCalc (a typical touch screen calculator), the baseline.
    [Show full text]
  • How to Avoid Pests: Flies Are Some of the Most Annoying Pests in the Most Home Pests Can Be Avoided by Doing Simple, Home
    c OLLEGE P ARK Neighborhood Association JUNE 2015 It’s June That means it’s time to join/renew your College Park Membership Our annual dues of $35/year (a little less than $3/month) covers such items as: Publish & distribute a monthly CPNA Newsletter Maintain an active & informative website (www.CollegeParkRichardson.com) Free address number curb painting to ALL resident every two to three years Award monthly Yard of the Month recognitions Sponsor neighborhood yard/garage sale with ads in local paper & on web This IS NOT a fundraiser for the association; the proceeds are your own. Street sign toppers for the neighborhood Represent College Park in monthly meeting with the City of Richardson Work with College Park Crime Watch to sponsor National Night Out Party Send periodic informative/alert emails to all residents with email address Hold Annual Meeting with Mayor & members of City Council The Membership Form is on page 17 VISIT OUR WEBSITE AT www.CollegeParkRichardson.com Notes from the President Patti Glenn [email protected] 972-900-9188 or 972-699-1615 I am glad the rain has stopped & the lakes are full, but the 90° temperatures came on quickly & the rain has made it VERY humid. I want to thank all of the neighbors that serve on the board & patrol for the neighborhood Crime Watch. In addition, I want to thank Todd Gurganus for serving as V-P for the last 4 years. The position of Vice-President & Treasurer were up for election this year. John Pantzer was nominated, seconded, and elected as V-P & Lynn Patterson was elected to server another term as Treasurer at the Annual Meeting.
    [Show full text]
  • What Is a Calculator?
    What is a calculator? by Rata Ingram Hello, I’m Rata, and my dream is to one day start a calculator museum. I collect all sorts of calculators, so if you happen to have one you no longer need, let me know. My talk is called… What is a Calculator? When you think of a calculator, what do you think of? Calculators aren’t just your trusty Casio FX-82s and TI-84-plusses. That’s just one kind of calculator. Five Types of Calculator 1. Placeholder / Accounting 2. Tabular 3. Mechanical 4. Electronic 5. Simulated In the next five minutes I’m going to tell you about five distinct types of calculator: Placeholder calculators, tabular calculators, mechanical calculators, electronic calculators and simulated calculators. What is a calculator? An object you can use to perform a mathematical calculation. needs external operator can operate itself is a calculator is a computer Fixed Modifiable Purely Memory Purely Functional So, what is a calculator? It’s an object you can use to perform a mathematical calculation. But hold on, that includes things like “pencil” and “laptop,” things you wouldn’t usually refer to as calculators. So let’s get more specific. If we had a gradient between purely information (fixed) and purely functional (modifiable), calculators sit about here. That also teaches us the difference between computers and calculators. Computers are more functional because they can be programmed to operate themselves, whereas calculators must be operated externally. calculus accounting / reckoning “calc” + “ulus” chalk / limestone + tiny calculator a person who reckons Let’s start at the beginning.
    [Show full text]
  • Application Development for Smartwatches
    DEGREE PROJECT, IN COMPUTER SCIENCE , SECOND LEVEL STOCKHOLM, SWEDEN 2015 Application development for smartwatches AN INVESTIGATION IN SUITABLE SMARTWATCH APPLICATIONS DAN ISACSON KTH ROYAL INSTITUTE OF TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND COMMUNICATION (CSC) Application development for smartwatches An investigation in suitable smartwatch applications Dan Isacson [email protected] June 2015 Swedish title: Applikationsutveckling för smarta klockor En undersökning inom lämpliga applikationer för smarta klockor Master's Thesis KTH Royal Institute of Technology Masters Programme, Computer Science School of Computer Science and Communication (CSC) Supervisor at The Mobile Life: Kenneth Andersson Supervisor at KTH: Arvind Kumar Examiner: Olle Bälter Abstract The smartwatch has been predicted to be the next big thing in the ecosystem of wearable and mobile devices. The suc- cess of the smartphone has a lot to do with the support from third party developers and their applications. This support will most likely be of utmost importance if the smartwatch is going to be successful. But what are suitable applications for this type of device? What are people’s ex- pectations and opinions on smartwatches? This thesis work delved into these matters with focus on development for the Apple Watch. This was done through an online survey that reached more than 1400 people, through a field study for one person that used the smartwatch as an air-travel tool and finally through a usability test conducted on five peo- ple that tried out several applications, most of which were developed for this project. Four different applications were implemented: a timetable application, a museum audio- guide, a game and an airline application.
    [Show full text]
  • Quality of Experience in Relation to Wearables
    Quality of Experience in Relation to Wearables A thesis submitted for the degree of Doctor of Philosophy By Nadia Hussain Department of Information Systems and Computing, Brunel University January 2020 ABSTRACT The purpose of this study is to apply the concept of Quality of Experience (QoE) to wearables. QoE is inextricably linked to the user experience of multimedia computing and, although QoE has been explored in relation to other types of multimedia devices, thus far its applicability to wearables has remained largely ignored. Given the proliferation of wearable devices and their growing use to augment and complement the multimedia user experience, the need for a set of QoE guidelines becomes imperative. The study which forms the focus of this PhD meets that need and puts forward a set of guidelines tailored exclusively towards wearables’ QoE. Accordingly, an extensive experimental investigation has been undertaken to see how wearables impact users’ QoE in both multimedia and multiple sensorial media (mulsemedia) contexts. Based on two exploratory studies, the findings have shown that the haptic vest (KOR-FX) enhanced user QoE to a certain extent. In terms of adoption, participants reported they would generally incorporate the heart rate (HR) monitor wristband (Mio Go) into their daily lives as opposed to the haptic vest. Other findings revealed that human factors play a part in user’s attitudes towards wearables and predominantly age was the major influencing factor across both of the studies. Moreover, the participants’ HR varied throughout the experiments, suggesting an enhanced level of engagement whilst viewing the multimedia video clips. Furthermore, the results suggest that there is a potential future for wearables, if the QoE is a positive one and also if the design of such devices are appealing as well as unobtrusive.
    [Show full text]
  • Wearable Computing
    Wearable Computing Alexander Nelson March 28th, 2018 University of Arkansas - Department of Computer Science and Computer Engineering Wearable Computing Wearable Computing { Body-borne computers Computers worn under, with, or on top of clothing 1 History of Wearable Wristwatch { 1530 Ring Abacus { 1600s Claude Shannon Roulette { 1961 2 History of Wearable More notable events: • 1970 { Pocket calculators • 1977 { HP Calculator Watch • 1977 { CC Collins wearable camera-to-tactile vest for the blind • 1979 { Sony Walkman • 1990 { Olivetti Active Badge • 1993 { Thad Starner wearable computer { becomes the Lizzy • 1997 { Cr´eation/Pentland Smart Clothes Fashion Show More at https://www.media.mit.edu/wearables/lizzy/timeline.html 3 Form Factors Wearable computers are typically: • Wrist Mounted { e.g. Watches • Head Mounted { e.g. Helmet, Earphones, Glasses • Worn from Neck { e.g. Necklace • Strapped to arm/leg { e.g. Smartphone exercise band, pipboy • Part of clothing { e.g. Integrated into fabrics, Belt, Shoe, etc... 4 Applications of Wearables 5 Application Specific vs. General Purpose Application Specific { Wearable meant to perform a single task General Purpose { Wearable able to perform many different tasks Why have wearables been application specific until recently? 6 Function determines Form Some interaction patterns can only occur at specific body locations Examples: • Wrist-mounted accelerometer activity monitor is more accurate than pocket-borne • Heads-up-display must be head-mounted • Pulse meter must have skin contact 7 Form determines Function The form of a wearable can similarly determine the function What interactions are possible given a certain form? How do users expect to interact with a system based on its form? Perceptual expectation of wearable computing to conform to analogues based on location e.g.
    [Show full text]