The paper proposes 18 design guidelines for human-AI interaction based on synthesizing over 20 years of research. The guidelines were validated through multiple rounds of evaluation including a user study with 49 design practitioners testing the guidelines against 20 popular AI products. The results verified the relevance of the guidelines across different interaction scenarios and revealed opportunities for further research. The authors believe the guidelines can serve as a resource for practitioners designing AI applications and researchers developing principles for human-AI interaction.
Wow! Nearly 3,000 views since I posted this document.
I wrote this to help five R&D project managers to document the results of their efforts. It appears many of you found it helpful, as well.
Presentation 2: Shared Web Services: The New Frontier in Government
Presenters:
Bill Chambers - Vice President, Government Consulting Services, Doculabs
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Wow! Nearly 3,000 views since I posted this document.
I wrote this to help five R&D project managers to document the results of their efforts. It appears many of you found it helpful, as well.
Presentation 2: Shared Web Services: The New Frontier in Government
Presenters:
Bill Chambers - Vice President, Government Consulting Services, Doculabs
From IT service management to IT service governance: An ontological approach ...IJECEIAES
Some companies have achieved better performance as a result of their IT investments, while others have not, as organizations are interested in calculating the value added by their IT. There is a wide range of literature that agrees that the best practices used by organizations promote continuous improvement in service delivery. Nevertheless, overuse of these practices can have undesirable effects and unquantified investments. This paper proposed a practical tool formally developed according to the DSR design science approach, it addresses a domain relevant to both practitioners and academics by providing IT service governance (ITSG) domain model ontology, concerned with maximizing the clarity and veracity of the concepts within it. The results revealed that the proposed ontology resolved key barriers to ITSG process adoption in organizations, and that combining COBIT and ITIL practices would help organizations better manage their IT services and achieve better business-IT alignment.
Modelling turn away intention of information technology professionals in Bang...IJECEIAES
Despite, Bangladesh produces many IT graduates each year but only one tenth of total graduates contribute in IT development sector. In order to keep the contribution to economy through IT development, it is crucial for IT industry to know the factors that influence turn away of IT graduates. In this paper, building upon role stress theory, we develop a research model to explore the influence of workplace exhaustion and threat of professional obsolescence (TPO). Data were gathered from 185 IT professionals from 15 different IT companies through survey questionnaire. The structural equation modelling technique was used to test the paths. The results suggests that strong influence of TPO on turn-away intentions. Result also suggests significant roles of work overload, family-career conflict and control over career and workplace exhaustion on turn away intention. This paper contributes to the body of work dedicated to helping us better understand the turn away behaviour from the workplace exhaustion and TPO perspectives. From the viewpoint of practice, this research sheds light on some of the challenges that the IT industry might face when making strategy and policy to control turn away from IT profession in Bangladesh.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
Why does your organization need IOA trained professionals? What are the AIIM IOA certificate courses like? These questions and more are answered in this one hour presentation.
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts
Deep Text Analytics - How to extract hidden information and aboutness from textSemantic Web Company
- Deep Text Analytics (DTA) is an application of Semantic AI
- DTA fuses methods and algorithms taken from language modeling, corpus linguistics, machine learning, knowledge representation and the semantic web result into Deep Text Analytics methods
- Main areas of use cases for DTA are Information retrieval, NLU, Question answering, and Recommender Systems
Seth Earley, Founder & CEO of Earley Information Science and author of the award winning book, "The AI Powered Enterprise" explains what an ontology is and why it is important when building any AI powered application, such as a chatbot.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
Limit your vulnerabilities: Assess. Develop. Protect.accenture
Cyber for higher ed doesn't have to be scary. Identifying vulnerabilities allows you to proactively secure your network and meet a range of challenges.
eCollaboration: Evaluation of a File Sharing Platform for SMEStefan Martens
The current state of file-transfer leads to problems in SME. Overview of existing file-sharing platforms for SME. evaluation of a file-transfer system for sme
Risk of Adopting Open Source ERP for Small Manufacturers: A Case StudyPlacide Poba Nzaou
Purpose - This study aims to explore the process of open source software (OSS) adoption in small and medium-sized enterprises (SMEs), and more specifically open source ERP as a “mission critical” OSS application in manufacturing. It also addresses the fundamental issue of ERP risk management that shapes this process.
Design/methodology/approach - The approach is done through an interpretive case study of a small Canadian manufacturer that has adopted an open source ERP system.
Findings - Interpreted in the light of diffusion of innovation theory and the IT risk management literature, results indicate that the small manufacturer successfully managed the adoption process in a rather intuitive manner, based on one guiding principle and nine practices.
Practical implications - This research confirms that open source is a credible alternative for SMEs that decide willingly or under external pressure to adopt an ERP system. Moreover, it suggests that a high level of formalization is not always necessary. For ERP vendors, this study shows that SMEs are more in search of flexibility in an ERP system than in the “best practices” embedded within these systems.
Originality/value - We argue that rich insights into the dynamics of the OSS-ERP adoption process can be obtained by framing this process within a risk management context.
KEYWORDS:
Open source software; ERP adoption; SME; Small business; IT risk management.
AI for RoI - How to choose the right AI solution?Abhinav Singhal
Companies looking to adopt AI today are bombarded
with technology companies and start-ups selling advanced
machine learning based solutions built on exciting use
cases. However, before kickstarting newer pilots and
investing in these advanced solutions it is useful to step
back and reflect on the overall intent of using AI for
the organization and the traditional suite of analytical
techniques and resources available.Oneway, CIOs can assess
the suitability of an AI solution is it to break it down into
simpler elements and ask five basic questions.
The concept of federated e-identity is gaining attention worldwide in light of evolving identity management challenges to streamlining access control and providing quality and convenient online services. In a federated system, participant institutions share identity attributes based on agreed-upon standards, facilitating authentication from other members of the federation and granting appropriate access to online resources. The article provides an insight into the ongoing federated e-Identity initiative in GCC countries. The aim of the initiative is to develop a trusted and secure cross-border infrastructure to authenticate and validate citizens' identities across GCC borders. Such an interoperability platform can then be used to facilitate citizens' mobility and stand as the basis for digital economy development. Current literature does not include any information about the work being conducted within GCC countries in relation to the GCC eID platform. This article thus contributes to developing a better understanding of such practices, triggers debate and discussion, opens the door to reflection, and guides international efforts in this eminent domain of practice.
Using Community Heuristics for Crowdsourcing Platforms Interface EvaluatioMathew_Ryan
Crowdsourcing is growing rapidly in both industry and academia, introducing new ways of conducting work and improving our understanding of how to utilize the potential of crowds. Related research has emphasized on how to improve crowdsourcing platforms and related practices to foster collaboration, motivation, trust, quality and creativity. However these challenges don’t seem to be as apparent in vibrant online communities. Research in how to make online communities work provides insights in how to address the challenges crowdsourcing is facing right now
Modelling turn away intention of information technology professionals in Bang...IJECEIAES
Despite, Bangladesh produces many IT graduates each year but only one tenth of total graduates contribute in IT development sector. In order to keep the contribution to economy through IT development, it is crucial for IT industry to know the factors that influence turn away of IT graduates. In this paper, building upon role stress theory, we develop a research model to explore the influence of workplace exhaustion and threat of professional obsolescence (TPO). Data were gathered from 185 IT professionals from 15 different IT companies through survey questionnaire. The structural equation modelling technique was used to test the paths. The results suggests that strong influence of TPO on turn-away intentions. Result also suggests significant roles of work overload, family-career conflict and control over career and workplace exhaustion on turn away intention. This paper contributes to the body of work dedicated to helping us better understand the turn away behaviour from the workplace exhaustion and TPO perspectives. From the viewpoint of practice, this research sheds light on some of the challenges that the IT industry might face when making strategy and policy to control turn away from IT profession in Bangladesh.
EMPLOYEES CHARACTERISTICS IN KNOWLEDGE TRANSFER AND PERFORMANCEcsandit
While most studies are concerned with the industry, but for non-profit organizations has not
received much attention. Various have highlighted knowledge transfer (KT) for creates value,
however an obstacle from the perspective among employees still exists. The main problem is
still difficult because employees will not share their knowledge. This study investigated factors
and develop that influence KT among employees of non-profit organizations in Indonesia. The
survey 364 respondents were used, 325 were returned, and 39 were not returned. Likert and
smart PLS to confirm construct. This paper conclude factors that helping others, trust, soft
reward, and personality of employees motivation are factors which influencing the KT
behaviour. Finally, the findings were discussed.
Why does your organization need IOA trained professionals? What are the AIIM IOA certificate courses like? These questions and more are answered in this one hour presentation.
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
The main objective of this research is to identify the factors influencing the intentions to adopt
the public computing by the private sector firms. In this research the researcher examined the
ten factors influencing the cloud computing adoption using a proposed integrated model which
incorporates aspects of the Technology, Organization and Environment factors such as
Complexity, Compatibility, Security Concerns, Trialability, Cost Saving, Top Management
Support, Prior IT Experience, Organizational Readiness, Competitive Pressure and External
Support. In order to test influencing factors a survey was conducted and one hundred and
twenty two valid responses were received from IT decision makers from forty firms in different
industries. The results revealed that the Compatibility, Cost Saving, Trialability and External
Support are the main influential factors in the adoption intentions of public cloud computing.
Future research could be built on this study by developing different model for each industry
because each industry has unique characteristics that can influence the adoption of the
technological innovations.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts
Deep Text Analytics - How to extract hidden information and aboutness from textSemantic Web Company
- Deep Text Analytics (DTA) is an application of Semantic AI
- DTA fuses methods and algorithms taken from language modeling, corpus linguistics, machine learning, knowledge representation and the semantic web result into Deep Text Analytics methods
- Main areas of use cases for DTA are Information retrieval, NLU, Question answering, and Recommender Systems
Seth Earley, Founder & CEO of Earley Information Science and author of the award winning book, "The AI Powered Enterprise" explains what an ontology is and why it is important when building any AI powered application, such as a chatbot.
For more classes visit
www.snaptutorial.com
CIS 336 Final Exam Guide
1)Joe works for a company where the IT department charges him for the number of CRM login accounts that are in his department. What type of IT funding model is his company deploying?
Limit your vulnerabilities: Assess. Develop. Protect.accenture
Cyber for higher ed doesn't have to be scary. Identifying vulnerabilities allows you to proactively secure your network and meet a range of challenges.
eCollaboration: Evaluation of a File Sharing Platform for SMEStefan Martens
The current state of file-transfer leads to problems in SME. Overview of existing file-sharing platforms for SME. evaluation of a file-transfer system for sme
Risk of Adopting Open Source ERP for Small Manufacturers: A Case StudyPlacide Poba Nzaou
Purpose - This study aims to explore the process of open source software (OSS) adoption in small and medium-sized enterprises (SMEs), and more specifically open source ERP as a “mission critical” OSS application in manufacturing. It also addresses the fundamental issue of ERP risk management that shapes this process.
Design/methodology/approach - The approach is done through an interpretive case study of a small Canadian manufacturer that has adopted an open source ERP system.
Findings - Interpreted in the light of diffusion of innovation theory and the IT risk management literature, results indicate that the small manufacturer successfully managed the adoption process in a rather intuitive manner, based on one guiding principle and nine practices.
Practical implications - This research confirms that open source is a credible alternative for SMEs that decide willingly or under external pressure to adopt an ERP system. Moreover, it suggests that a high level of formalization is not always necessary. For ERP vendors, this study shows that SMEs are more in search of flexibility in an ERP system than in the “best practices” embedded within these systems.
Originality/value - We argue that rich insights into the dynamics of the OSS-ERP adoption process can be obtained by framing this process within a risk management context.
KEYWORDS:
Open source software; ERP adoption; SME; Small business; IT risk management.
AI for RoI - How to choose the right AI solution?Abhinav Singhal
Companies looking to adopt AI today are bombarded
with technology companies and start-ups selling advanced
machine learning based solutions built on exciting use
cases. However, before kickstarting newer pilots and
investing in these advanced solutions it is useful to step
back and reflect on the overall intent of using AI for
the organization and the traditional suite of analytical
techniques and resources available.Oneway, CIOs can assess
the suitability of an AI solution is it to break it down into
simpler elements and ask five basic questions.
The concept of federated e-identity is gaining attention worldwide in light of evolving identity management challenges to streamlining access control and providing quality and convenient online services. In a federated system, participant institutions share identity attributes based on agreed-upon standards, facilitating authentication from other members of the federation and granting appropriate access to online resources. The article provides an insight into the ongoing federated e-Identity initiative in GCC countries. The aim of the initiative is to develop a trusted and secure cross-border infrastructure to authenticate and validate citizens' identities across GCC borders. Such an interoperability platform can then be used to facilitate citizens' mobility and stand as the basis for digital economy development. Current literature does not include any information about the work being conducted within GCC countries in relation to the GCC eID platform. This article thus contributes to developing a better understanding of such practices, triggers debate and discussion, opens the door to reflection, and guides international efforts in this eminent domain of practice.
Using Community Heuristics for Crowdsourcing Platforms Interface EvaluatioMathew_Ryan
Crowdsourcing is growing rapidly in both industry and academia, introducing new ways of conducting work and improving our understanding of how to utilize the potential of crowds. Related research has emphasized on how to improve crowdsourcing platforms and related practices to foster collaboration, motivation, trust, quality and creativity. However these challenges don’t seem to be as apparent in vibrant online communities. Research in how to make online communities work provides insights in how to address the challenges crowdsourcing is facing right now
SOCIO-DEMOGRAPHIC DIFFERENCES IN THE PERCEPTIONS OF LEARNING MANAGEMENT SYSTE...ijseajournal
Learner centred design (LCD) focuses on creating an e-learning system that can fulfil individual needs
through personalization, nevertheless there are still many technical challenges. Besides, losing balanced
focus on both of the learners and the instructors does not help to create a successful e-learning system.
User-centred design helps to improve the usability of a system as it integrates requirements and user
interface designs based on users’ needs. The findings of this research prove that even the users are
provided with the same LMS, not everyone has the same perceptions or tolerance levels of the seven design
factors that may cause frustrations to the users, and not everyone has the same satisfaction level of
navigation experience and interface design. It is important for the LMS developers to understand that the
variations between roles, genders, experiences and ages exist and should not be ignored when designing
the system.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
Fostering Value Creation with Digital Platforms A UnifiedTh.docxbudbarber38650
Fostering Value Creation with Digital Platforms: A Unified
Theory of the Application Programming Interface Design
Jochen Wulf and Ivo Blohm
Institute of Information Management, University of St.Gallen, St. Gallen, Switzerland
ABSTRACT
While many firms in recent years have started to offer public Application
Programming Interfaces (APIs), firms struggle with shaping digital plat-
form strategies that align API design with aspired business goals and the
demands of external developers. We address the lack of theory that
explains the performance impacts of three API archetypes (professional,
mediation, and open asset services). We couple survey data from 152
API product managers with manually coded API design classifications.
With this data, we conduct cluster and regression analyses that reveal
moderating effects of two value creation strategies (economies of scope
in production and innovation) on the relationships between API arche-
type similarity and two API performance outcomes: return on invest-
ment and diffusion. We contribute to IS literature by developing
a unifying theory that consolidates different theoretical perspectives
on API design, by extending current knowledge on the performance
effects of API design, and by empirically studying the distinct circum-
stances under which digital platforms facilitate economies of scope in
production or in innovation. Our results provide practical implications
on how API providers can align API archetype choice with the value
creation strategy and the API’s business objective.
KEYWORDS
Application programming
interface; boundary
resource; digital platform;
economies of scope; cluster
analysis; API design
Introduction
The growing number of publicly available Application Programming Interfaces (APIs)
suggests that offering APIs today has become a common instrument of digital strategy
[85]. The API directory ProgrammableWeb reported over 22,500 registered APIs in
October 2019 and a five-year consecutive growth rate of over 10 percent [85]. By now,
successfully designed and managed APIs outperform traditional modes of service distri-
bution (such as e-commerce websites) at well-known digital service providers such as
Expedia, eBay, and Salesforce [51, 73].
The majority of API providers, however, struggles with designing successful APIs,
because a solid technical solution does not suffice; rather, the API must align with the
overall business objectives and the demands of third-party developers and end customers
[11]. Considering that APIs transform entire industries by enabling agile service develop-
ment, specialization, scalability, and leveraging network effects [73], many firms overlook
the APIs’ significance for their strategic competitiveness [51]. The misalignment of an
API’s design and its provider’s business objectives may be the consequence. For example,
CONTACT Jochen Wulf [email protected] Institute of Information Management, University of St.Gallen
Mueller Friedberg Strasse 8, St. G.
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...mlaij
This study aims to introduce a discussion platform and curriculum designed to help people understand how
machines learn. Research shows how to train an agent through dialogue and understand how information
is represented using visualization. This paper starts by providing a comprehensive definition of AI literacy
based on existing research and integrates a wide range of different subject documents into a set of key AI
literacy skills to develop a user-centered AI. This functionality and structural considerations are organized
into a conceptual framework based on the literature. Contributions to this paper can be used to initiate
discussion and guide future research on AI learning within the computer science community.
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...cscpconf
Communicating an organisation's requirements in a semantically consistent and understandable manner and then reflecting the potential impact of those requirements on the IT infrastructure presents a major challenge among stakeholders. Initial research findings indicate a desire among business executives for a tool that allows them to communicate organisational changes using natural language and a simulation of the IT infrastructure that supports those changes. Building on a detailed analysis and evaluation of these findings, the innovative CRESUS tool was designed and implemented. The purpose of this research was to investigate to what extent CRESUS both aids communication in the development of a shared understanding and supports collaborative requirements elicitation to bring about organisational, and associated IT infrastructural, change. This paper presents promising results that show how such a tool can facilitate collaborative requirements elicitation through increased communication around organisational change and the IT infrastructure.
Tools and Techniques for Designing, Implementing, & Evaluating Ubiquitous Com...ijceronline
Interactive systems in the mobile, ubiquitous and virtual environments are at a stage of development where designers and developers are keen to find out more about design, use, and usability of these systems. Ubiquitous Computing is the design, implementation and usability that highlight the theories, techniques, tools and best practices in these environments. This paper shows that usable and useful systems that can be achieved in ways that will improve usability to enhance user experience. Research on the usability issues for young children, teenagers, adults and the elderly is presented with different techniques for the mobile, ubiquitous and virtual environments. Interactive frameworks in the portable, omnipresent, and virtual situations are at a phase of advancement where creators and engineers are quick to discover more about the outline, use, and ease of use of these frameworks. The objective of this research paper is to assess the tools and techniques for designing, implementing, and evaluating ubiquitous computing systems used by developers so as to formulate practical solutions that address the functionality of these systems. Ideal systems ensure that designers are able to develop and predict usability of systems at all the stages of virtual environments. This is particularly essential as it increases the experience of the users. This requires one to use the best tool and techniques backed by theories to practice the same. However this varies across different fields such as ubiquitous and mobile environments. In addition all the computing tools have to share visionary tools that allow them to network while at the same time they are processing and distinctively modeling the user interface. Some of the main methods that are used for smart devices include tools such as tabs, boards and pads. Various tools are usually used in the design of the works of the computer. The need to select appropriate techniques that will allow for the efficient use of the chosen techniques for the devices is thus a necessity. This implies that the selection of such tools should be based on set out effective techniques that have been tested so that the required output is achieved.
* "Responsible AI Leadership: A Global Summit on Generative AI"
*April 2023 guide for experts and policymakers
* Developing and governing generative AI systems
* + 100 thought leaders and practitioners participated
* Recommendations for responsible development, open innovation & social progress
* 30 action-oriented recommendations aim
* Navigate AI complexities
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...IJITE
Team work is an important training element of future software engineers. However, the evaluation of the
performance of collaboration among individuals is very subjective. Meanwhile, how to effectively
promote the collaboration in an academic setting is an even more challenging task. The lack of a common
standard or method for the assessment is a practical issue in software engineering projects. With the
rapid development of shared authoring environments, such as Wiki, more and more educational
institutions are studying the adaptability of such kind of collaborative platforms. In order to study the
applicability of adopting wiki-based shared authoring environments in software engineering education,
we have proposed three major research questions. By solving these problems, we try to answer some of
the most important questions in adopting shared authoring platforms in academic settings.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
No Interface? No Problem: Applying HCD Agile to Data Projects (Righi)Kath Straub
This paper will be published in the Nov 2020 Issue of Journal of Usability Studies. (https://uxpajournal.org/). Its being pre-printed here with permission from the author and the Journal Board.
In October 2019, a group of human-centered designers,
agilists, data scientists, and other technology enablement
practitioners joined to share their thoughts about a topic of
common interest: How should the principles and practices of
human-centered design, Agile development, and the
overarching process of HCDAgile be applied to products that
have no obvious user interface?
The group’s objective was to develop guidance based upon
shared knowledge across disciplines and industries for
leveraging HCDAgile in data projects. In this paper we share
our initial observations from the meeting.
Fair balance: I participated in the huddle that led to this paper, but not in writing up the paper. Thanks to Carol Righi for doing the needful.
Please respond to the followingAnalyze ONE of the Neo-Piageti.docxSONU61709
Please respond to the following:
Analyze ONE of the Neo-Piagetians’ theories of cognitive development
Examine the primary ways in which the chosen theory falls short in addressing adult learners from a different class, ethnicity, gender, and/or social context.
Suggest specific implications of applying the chosen conceptualization within a learning setting comprising adult learners. Justify your response.
.
Please respond to the followingBased on the discussion prepar.docxSONU61709
Please respond to the following:
Based on the discussion preparation for this week, suggest two biologically rooted approaches that instructors may use in order to facilitate learning of one particular task. Illustrate the process by which embodied learning would foster a deeper learning of the task in question.
.
Please respond to the following in an approx. 5-6 page paper, double.docxSONU61709
Please respond to the following in an approx. 5-6 page paper, double-spaced, 12 point font:
Considering everything we have learned to date about Palestine: the history of the region, the contemporary events leading to the establishment of Israel, and the different factions involved, was the failure to find a sustainable solution for all sides inevitable? Why or why not?
Your essay must have a clear thesis, and be supported by specific examples from the material we have covered (lecture, text, etc.). You must also draw on some of the primary sources (documents), in order to support your position.
I will be sending you my id and password for all the presentation lectures.
.
Please respond to the followingImagine you have recently .docxSONU61709
Please respond to the following:
Imagine you have recently been hired to be the Chief Learning Officer (CLO) for a corporation and have been tasked to establish a corporate university.
Discuss the various types of training media you would use to educate your corporate students and how these media would be put to use.
Make sure to include a rationale and at least one citation from your reading.
.
Please respond to one (1) the followingRead the article e.docxSONU61709
Please respond to
one (1)
the following:
Read the article entitled
“Leadership Excellence: Communicate Your Vision”
. Next, assess the consequences of leaders not being able to communicate their change vision. Discuss the outcomes of a change management plan with an under-communicated vision of change. Develop a strategy for avoiding under-communicating the change vision.
View the video titled “John Kotter – Communicating a Vision for Change” (4 min 16 s) below. You may also view the video at
https://www.youtube.com/watch?v=bGVe3wRKmH0
. Next, assess the means of communication that are available to us as leaders. Review Kotter’s comments regarding communication, and efficient and effective communications. As the leader of a large organization implementing a change, develop a strategy for communicating your vision of change. Discuss the tools that the organization would use as well as the frequency of communication.
.
Please respond to the followingResearch on the Internet a rec.docxSONU61709
Please respond to the following:
Research on the Internet a recent public relations campaign that was undertaken to address a corporate scandal or misbehavior by a government official or celebrity, and study what part ethics played in the campaign, whether positively or negatively. Communications professor John Marston proposed a four-step model of the process through which public relations can influence public opinion. These steps include research, action, communication, and evaluation. Explain in detail how Marston’s four-step approach can be used to shape public opinion on the story you researched.
Research on the Internet a celebrity who has generated negative publicity in recent years for his/her sponsoring company. Businesses choose celebrities to endorse their products for a variety of reasons. Unfortunately, some of these celebrities act in ways that generate a lot of negative publicity for themselves and, by extension, for the sponsors who pay them. In the case of the celebrity you researched, explain in detail what actions you would take in this situation and why you would take them.
.
Please respond to Question One (bolded) and one additional ess.docxSONU61709
Please respond to
Question One
(bolded) and
one additional essay
question under
Question Two
of your choice. Please provide a complete essay response for both questions. Each response should be at least two pages (double- spaced, 12 pitch, Times New Roman). One reference page should accompany your work in APA format. Please place your name on each page. No late work will be accepted.
Question One:
As a student researcher, please introduce one theorist from the list below and describe what major components he or she has offered to those attempting to understand the development of children and/or families? Please include a photo of the selected theorist and critique his or her theory. For example, please discuss the strengths
and limitations of the individual’s theory.
Albert Bandura
David Liu
Erik Erikson
Harriette Pipes McAdoo
Jean Piaget
Lawrence Kohlberg
Lev Vygotsky
Question Two: (Choose One Question To Answer Below)
•
Linda Espinosa
•
Maria Montessori
•
Robert Coles
•
Sigmund Freud
•
Terry Cross
•
Urie Bronfenbrenner
What happens to children who experience consistent and high levels of stress and Cortisol? https://www.medstargeorgetown.org/ourservices/psychiatry/treatments/child-and-adolescent- psychiatryprogram/
How can parents work to protect children from Contaminants at School? http://www.niehs.nih.gov/research/supported/translational/peph/podc asts/school/index.cfm
Many children love being in or around water, whether it’s a backyard pool or a local beach. But without proper safety measures, water can be dangerous for young children. Please identify one academic journal article related to water safety? How can parents make water safety a priority? Please review this site: https://www.redcross.org/gethelp/how-to-prepare-for-emergencies/types-of-emergencies/watersafety.html
How could the Special Supplemental Nutrition Program for Women, Infants, and Children, also known as the WIC program, assist a single parent with limited income? What foods are eligible under this program?
hat steps can parents take to keep their children healthy?
https://www.cdc.gov/coronavirus/2019-ncov/daily-life- coping/children.html?CDC_AA_refVal=https%3A%2F%2Fwww.cdc.gov%2Fcoronavirus%2F2019- ncov%2Fprepare%2Fchildren.html
According to the NIEHS and EPA how can parents help prevent lead poisoning in children and youth? What is your state or local area doing to help eradicate lead poisoning?
*Student should utilize the referenced links above as well as other scholarly documents to develop their responses.
*Students must include a reference page for each question in APA format.
Important: Work submitted without a reference page
will not
be graded.
.
Please respond to the following in a substantive post (3–4 paragraph.docxSONU61709
Please respond to the following in a substantive post (3–4 paragraphs):
Explain the primary reasons project management causes a cultural change.
Describe the impact of that cultural change on integrative information technology.
Provide at least one example of a cultural change that project management can cause.
Be sure to provide full citations and references
.
Please respond to the followingDebate if failing to reje.docxSONU61709
Please respond to the following:
Debate if “failing to reject the null” is the same as “accepting the null.” Support your position with examples of acceptance or rejection of the null.
Be sure to respond to at least one of your classmates’ posts.
Click here to watch the video
Reply Quote
.
Please respond to the followingCharts and graphs are used.docxSONU61709
Please respond to the following:
Charts and graphs are used quite often in newspapers, magazines, books, and various online articles. There are pros and cons to using these types of visual representations.
Describe one pro and one con for using a graph or chart. Share an example of a time when this type of visual changed your mind about something or gave you a deeper understanding of a topic or current event.
.
Please respond to the followingAppraise the different approac.docxSONU61709
Please respond to the following:
Appraise the different approaches (e.g., biological, psychological, sociocultural, etc.) that may influence the myriad of methods by which adults construct learning. Suggest key instructional strategies that you might use that favor an integrated approach to teaching within a diverse learning context. Provide examples of such strategies in use in order to support your response.
.
Please respond to the following discussion with a well thought out r.docxSONU61709
Please respond to the following discussion with a well thought out response with relating to at least one source (cite using APA). Post your main post within midnight Thursday.
How could you use milestones and/or Earned Value Management as a measure of success in a project?
What limitation does just offering milestones provide as a means of project reporting?
Define some best practices with monitoring project quality.
Choose at least one quality tool and explain how it may be used in a project.
.
Please respond to each classmate if there is a need for it and als.docxSONU61709
Please respond to each classmate if there is a need for it and also any suggestion and comment that u may think are need it in order to correct the rough draft for the final use it
1)Hey---------, I like your introduction, your thesis is clear and it is in the last sentence of the intro. I think that the big theme of this story is to hold on to our traditional ancestral values, or at least respect these values because they are important and we clearly see it in the story. I would suggest to watch out for spelling errors and to work a little more on your conclusion, I would recommend giving more summary and more details in explaining your thesis.
2) hello -----,
I like your explination and view of this short story. Other then giving a little more detail from the story I think you did great. What made you choose this story to write about?
After reading you paper what made you choice this story? I like how you talk about the story and how you break everything down. I know you wanted to keep everything original I believe you could have adding just a little more to your paper. I can completely understand how writing papers can be hard keep up the amazing work.
3)Hi, -----------
I also had chosen the same story to write about. I thought you had done a good job. I know its hard to think of so many words, about the the same thing. But my understanding is we werent allowed to use out side sources. We were only allowed to use our book. May be I misunderstood, which is very possible. Did you agree with the villagers for destroying the school, because their path was blocked off?
Running head: FICTION ANALYSIS: DEAD MEN’S PATH 1
FICTION ANALYSIS: DEAD MEN’S PATH 4
Fiction Analysis:Dead Men's Path
Estrella Gonzalez
South University
ENG1300 SU01 Composition III/Literature
Joseph Walker
Fiction Analysis:Dead Men's Path Comment by Joseph: Start actual paper at the top of a new page.
Dead Men's Path by China Achebe delves into the implications of making choices. Achebe uses symbolism to bring home his views on the repercussions that choices people make can have on their lives. Achebe presents a society that is torn apart in two divides: between the tradition on one hand and modernity on the other hand. The society is not willing to welcome the new progressive thoughts that have been brought by the missionaries(Achebe, 2009). Through the use of symbolism, Achebe makes a cataclysmic flowing story that has much deeper imnsights than the superficial representations in words. What are some of the dangers of disregarding the opinions that is supported by majority in the society? Achebe’s Dead Men's Path answers this question using symbolic presentations. Comment by Joseph: Set off titles. Comment by Joseph: Be careful of the spelling of names. Comment by Joseph: You don’t need a citation for simple plot summary. Comment by J.
please respond to both discussion in your own words in citation plea.docxSONU61709
please respond to both discussion in your own words in citation please need it in your own words
1.The Florida bog frog could be a small and uncommon land and water proficient. This species features a yellowish-brown upper body, a yellow stomach, brown eardrum, yellow throat, a contract ridge that runs along the side down the back, and littler webbed feet with bigger toes . There's restricted data accessible approximately the reproduction of the Florida bog frog. Florida bog frogs breed between the months of April and August. Amid the breeding season, marsh frogs will let out boisterous “chucks” to pull in a mate.Florida bog frogs occupy numerous regions including shallow, acidic spring leaks; boggy floods of streams; .The most risk to the Florida marsh frog is the degradation of its habitat. Bog frogs flourish best in early succession vegetation.
2.The Florida mouse is a species of rodent in the family Cricetidae. It is the only species in the genus Podomys, which is the single mammal genus endemic to Florida. I like this mouse because it reminds me of Mickey Mouse created by Walt Disney, and redirect me to its amusement parks in Orlando, Florida. This mouse also caught my attention because it looks so funny and different from the rest of the mice. The Florida mouse is found only in a limited area in central peninsular Florida and one small area in the Florida panhandle. The mouse inhabits some of Florida's hottest and driest regions in the high pinelands, sandhills, flatlands, and coastal scrub. They average between 5 to 8 inches long, and their tails are between 2 to 3.5 inches long, weighing between 1/2 ounce to 1 ounce. The Florida mouse has soft silky fur that is brown or brownish-orange in color. Its underparts are white. Their ears are large and furless. Their tails are long, and their back paws are large and have 5 pads. Their teeth are sharp, and they use them for gnawing.
The Florida mouse is nocturnal and is active throughout the year except on unusually cold nights. The mouse can climb but is primarily a terrestrial species. They communicate by emitting high pitched squeals, and when they are excited, they thump the ground with their front paws producing a drumming sound. The Florida mouse also has a distinctive odor, almost like a skunk. A baby of a Florida mouse is called a pinkie, kitten, or pup. The females are called doe and males buck. A Florida mouse group is called a nest, colony, harvest, horde, or mischief.
The Florida mouse is an omnivore, and its diet consists of acorns when available, insects, seeds, nuts, fungi, crickets, ticks, fruit, berries, and other plant material and vertebrates. A 1987 report indicates the mouse feeds on engorged ticks (
Ornithodorus turicata americanus
) that parasitize gopher frogs (
Rana areolata
) and gopher tortoises.
According to the official State of Florida's Endangered and Threatened Species List of wildlife, the Florida mouse is considered as State Species of Special Conce.
please respond In your own words not citations1. The Miami blu.docxSONU61709
please respond In your own words not citations
1. The Miami blue butterfly may be a little butterfly .The Miami blue butterfly can be found in tropical pine rock-lands, and beach side in Florida. The Miami blue was thought extinct until it was rediscovered in 1999 . In spite of many changes the Bahia Honda populace held on until 2010, when it vanished, maybe due to a combination of dry spell, cold temperatures, and being eaten by non-native green iguanas. They was rediscovered in Key West National Natural life Asylum in 2006. The are one of Florida most endangered species. I love butterflies because they're colorful with wings of distinctive patterns. I love how they change from caterpillars to cocoons to butterflies. Its so relate able to life , always changing and evolving . Its astonishing that the butterfly emerges from the unpleasant small caterpillar and shapes a cocoon and after that rises as a butterfly
2.Six families of dragonflies exist in Florida with most found near ponds and other freshwater sources. Dragonflies feature large eyes that make up most of their head and a muscular body that helps the insects use their large wings to fly. Sometimes you'll see dragonflies hovering near blacktop parking lots, but for the most part, the insects stay near water except when they look for a mate. They then return to the water to breed and deposit eggs.
Adult dragonflies will eat any insect as long as they can catch it. Dragonfly nymphs live in the water, and they usually wait on aquatic vegetation.
From the nymph stage to the adult stage, the dragonfly has a significant, positive ecological impact. Dragonfly eggs are laid and hatched in or near water, so their lives impact both water and land ecosystems. Once hatched, dragonfly nymphs can breathe underwater, and they use a motion similar to jet propulsion to move through their environment. This enables them to eat harmful aquatic organisms such as mosquito larvae. The nymph will continue contributing to this ecosystem for one to five years before becoming a mature adult. The adult dragonfly has enormous compound eyes that are useful in searching for flying insects. While flying, it uses its six legs to scoop food out of the air. Clasping the prey in its front legs, it then eats the insect in flight.
Dragonflies play ecological roles not only as predators but also as prey of birds, frogs, and other creatures. The presence of dragonflies indicates freshwater. One of the most useful dragonfly facts is that they reside low in the food chain, so a scientific study of their numbers and their health can reveal changes in water ecosystems more quickly than studying other animals or plants. Some national parks are beginning to use this species to survey and document the health of the park's water ecosystems. Since dragonflies eat mosquitoes and other insects, they help gardeners and outdoor enthusiasts. This also helps the environment because it allows humans to reduce the u.
Please respond in 300 words the followingWe see SWOT present.docxSONU61709
Please respond in 300 words the following
We see SWOT presented in a 4 block matrix:
Internal: S/W
External: O/Th
Choose a department in a hospital, such as labor and delivery, and provide an analysis that involves both internal and external matrices.
Use an outside resource for your initial post. Seek information through healthcare news articles and journals. Write in third person and do not use “I think or in my opinion”. Keep your information factual and follow APA standards on referencing
.
Please respond to the followingReflect on the usefulness .docxSONU61709
Please respond to the following:
Reflect on the usefulness of a portfolio to provide evidence of accomplishments to pursue career goals.
Determine if this approach may be more effective than others.
Make sure to include a rationale and at least one citation from your reading.
.
Please respond to the followingLeadership talent is an or.docxSONU61709
Please respond to the following:
Leadership talent is an organization-wide goal. Discuss how the responsibilities of the development of leadership talent should be partitioned among Human Resources staff and line managers. Be sure to address both the identification and development of future leadership.
.
Please respond to the followingHealth care faces critic.docxSONU61709
Please respond to the following:
Health care faces critical staffing shortages. Imagine you are part of the executive management team researching health care shortages.
Outline some of the staffing shortages in the market where you live. Are they consistent with national trends?
Design a strategy that describes how your organization would alleviate some staffing shortages, including whether you would hire licensed practical nurses instead of registered nurses. Include concepts from readings throughout your program or from peer-reviewed journal articles.
.
Please respond to the followingMNCs, IOs, NGOs, and the E.docxSONU61709
Please respond to the following:
MNCs, IOs, NGOs, and the European Union are nonstate actors in the role of pushing foreign policy to combat terrorism. Discuss 1 or 2 ways in which the national strategy influences any of these nonstate actors.
Analyze the benefits or disadvantages for the United States with regard to the agency's position on foreign aid. Provide 1 or 2 examples to support your response.
.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Chi 2019 paper chi 2019, may 4–9, 2019, glasgow, scotland, uk gu
1. CHI 2019 Paper CHI 2019, May 4–9, 2019, Glasgow, Scotland,
UK
Guidelines for Human-AI Interaction
Saleema Amershi, Dan Weld*†, Mihaela Vorvoreanu, Adam
Fourney, Besmira Nushi, Penny Collisson, Jina Suh, Shamsi
Iqbal, Paul N. Bennett, Kori Inkpen, Jaime Teevan, Ruth Kikin-
Gil, and Eric Horvitz
Microsoft
Redmond, WA, USA
{samershi, mivorvor, adamfo, benushi, pennycol, jinsuh,
shamsi, pauben, kori, teevan, ruthkg, horvitz} @microsoft.com
ABSTRACT
Advances in artifcial intelligence (AI) frame opportunities and
challenges for user interface design. Principles for human- AI
interaction have been discussed in the human-computer
interaction community for over two decades, but more study and
innovation are needed in light of advances in AI and the
growing uses of AI technologies in human-facing appli- cations.
We propose 18 generally applicable design guide- lines for
human-AI interaction. These guidelines are vali- dated through
multiple rounds of evaluation including a user study with 49
design practitioners who tested the guidelines against 20
popular AI-infused products. The results verify the relevance of
the guidelines over a spectrum of interaction scenarios and
reveal gaps in our knowledge, highlighting op- portunities for
further research. Based on the evaluations, we believe the set of
design guidelines can serve as a resource to practitioners
working on the design of applications and fea- tures that
harness AI technologies, and to researchers inter- ested in the
further development of guidelines for human-AI interaction
design.
CCS CONCEPTS
• Human-centered computing → Human computer in- teraction
(HCI); • Computing methodologies → Artif- cial intelligence.
3. inferences are typically performed under uncertainty, often
producing false positives and false negatives, AI-infused sys-
tems may demonstrate unpredictable behaviors that can be
disruptive, confusing, ofensive, and even dangerous. While
some AI technologies are deployed in explicit, interactive uses,
other advances are employed behind the scenes in proactive
services acting on behalf of users such as auto- matically
fltering content based on inferred relevance or importance.
While such attempts at personalization may be delightful when
aligned with users’ preferences, automated fltering and routing
can be the source of costly information hiding and actions at
odds with user goals and expectations.
AI-infused systems1 can violate established usability guide-
lines of traditional user interface design (e.g., [31, 32]). For
example, the principle of consistency advocates for minimiz-
ing unexpected changes with a consistent interface appear- ance
and predictable behaviors. However, many AI compo- nents are
inherently inconsistent due to poorly understood,
1In this paper we use AI-infused systems to refer to systems
that have features harnessing AI capabilities that are directly
exposed to the end user.
Paper 3
Page 1
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
probabilistic behaviors based on nuances of tasks and set- tings,
and because they change via learning over time. AI- infused
systems may react diferently depending on lighting or noise
conditions that are not recognized as distinct to end users.
Systems may respond diferently to the same text input over time
(e.g., autocompletion systems suggesting diferent words after
language model updates) or behave diferently from one user to
the next (e.g., search engines returning diferent results due to
personalization). Inconsis- tent and unpredictable behaviors can
confuse users, erode their confdence, and lead to abandonment
4. of AI technology [7, 22]. Errors are common in AI-infused
systems, rendering it difcult to reliably achieve the principle of
error preven- tion. This has contributed to the large and growing
body of work on AI explanations and interpretability to support
hu- man verifcation of proposed actions aimed at reducing the
likelihood of unwarranted or potentially dangerous actions and
costly outcomes (e.g., [14, 21, 23, 36, 38, 44]).
For over 20 years, the human-computer interaction (HCI)
community has proposed principles, guidelines, and strate- gies
for designing user interfaces and interaction for appli - cations
employing AI inferences (e.g., [16, 17, 33]). However, the
variability of AI designs (e.g., varying capabilities and
interaction styles of commercial conversational agents im-
pacting user engagement and usability [26]) and high-profle
reports of failures, ranging from humorous and embarrassing
(e.g., autocompletion errors [8]) to more serious harm when
users cannot efectively understand or control an AI system
(e.g., collaboration with semi-autonomous cars [41]), show that
designers and developers continue to struggle with cre- ating
intuitive and efective AI-infused systems. Ongoing advances in
AI technologies will generate a stream of chal- lenges and
opportunities for the HCI community. While such developments
will require ongoing studies and vigilance, we also see value in
developing reusable guidelines that can be shared, refned, and
debated by the HCI community. The de- velopment and use of
such shared guidelines can help with the design and evaluation
of AI-infused systems that people can understand, trust, and can
engage with efectively.
In this work, we synthesize over 20 years of learning in AI
design into a small set of generally applicable design guidelines
for human-AI interaction. Specifcally, our contri- butions are:
• A codifcation of over 150 AI-related design recommenda-
tions collected from academic and industry sources into a set of
18 generally applicable design guidelines for human- AI
interaction (see Table 1).
• A systematic validation of the 18 guidelines through mul - tiple
5. rounds of iteration and testing.
We hope these guidelines, along with our examination of their
applications in AI-infused systems, will serve as a
resource for designers working with AI and will facilitate future
research into the refnement and development of prin- ciples for
human-AI interaction.
2 RELATED WORK
For over 20 years, the academic community has proposed nu-
merous guidelines and recommendations for how to design for
efective human interaction with AI-infused systems. For
example, Norman [33] and Höök [16] both recommended
building in safeguards like verifcation steps or controlling
levels of autonomy to help prevent unwanted adaptations or
actions from intelligent systems. Others recommended
managing expectations so as not to mislead or frustrate users
during interaction with unpredictable adaptive agents [16, 20,
33]. Horvitz’s formative paper on mixed-initiative systems [17]
proposed principles for balancing autonomous actions with
direct manipulation constructs, such as support- ing user-driven
invocation of intelligent services, scoping actions based on
inferred goals and confdences, and infer- ring ideal action in
light of costs, benefts, and uncertainties. The latter guideline
was operationalized via the introduc- tion of a decision-
theoretic methodology to guide decisions about acting on AI
inferences versus waiting for user in- put, based on
consideration of expected costs and benefts of performing AI
automation under uncertainty.
In some cases, specifc AI design recommendations have
received considerable attention within the academic commu-
nity. For example, a large body of work exists and continues to
grow around how to increase transparency or explain the
behaviors of AI systems (e.g., [14, 21, 23, 36, 38, 44], to name
a few). Similarly, when and how to automatically adapt or
personalize interfaces has been studied extensively in a variety
of scenarios (e.g., [9, 11–13]).
Others in the community have studied how to design for specifc
6. human-AI interaction scenarios. For example, re- searchers have
been studying how to efectively interact with intelligent agents
for many years (e.g., [18, 33]). This scenario has also had a
recent resurgence of interest given ad- vances in natural
language processing and embedded devices driving the
proliferation of conversational agents [26, 29, 35]. Similarly,
researchers have for decades studied human in- teraction with
intelligent context-aware computing systems including how to
design for understandability and control of the underlying
sensing systems [3, 23] and how to sup- port ambiguity
resolution [10]. Recent advances in sensing technologies and
the widespread availability of commercial ftness and activity
trackers have continued to drive interac- tion research in these
domains [37, 45].
Despite all of this work, the ongoing stream of articles and
editorials in the public domain about how to design in the face
of AI (e.g., [2, 24, 25, 39, 42]) suggests designers need more
guidance. This may be partly due to design suggestions
Paper 3
Page 2
CHI 2019 Paper CHI 2019, May 4–9, 2019, Glasgow, Scotland,
UK
AI Design Guidelines
Example Applications of Guidelines
G1
Make clear what the system can do.
Help the user understand what the AI system is capable of
doing.
[Activity Trackers, Product #1] “Displays all the metrics that it
tracks and explains how. Metrics include movement metrics
such as steps, distance traveled, length of time exercised, and
all-day calorie burn, for a day.”
G2
7. Make clear how well the system can do what it can do. Help the
user understand how often the AI system may make mistakes.
[Music Recommenders, Product #1] “A little bit of hedging
language: ‘we think you’ll like’.”
G3
Time services based on context.
Time when to act or interrupt based on the user’s current task
and environment.
[Navigation, Product #1] “In my experience using the app, it
seems to provide timely route guidance. Because the map up-
dates regularly with your actual location, the guidance is
timely.”
G4
Show contextually relevant information.
Display information relevant to the user’s current task and
environment.
[Web Search, Product #2] “Searching a movie title returns show
times in near my location for today’s date”
G5
Match relevant social norms.
Ensure the experience is delivered in a way that users would
expect, given their social and cultural context.
[Voice Assistants, Product #1] “[The assistant] uses a semi-
formal voice to talk to you - spells out “okay” and asks further
questions.”
G6
Mitigate social biases.
Ensure the AI system’s language and behaviors do not rein-
force undesirable and unfair stereotypes and biases.
[Autocomplete, Product #2] “The autocomplete feature clearly
suggests both genders [him, her] without any bias while sug-
gesting the text to complete.”
8. G7
Support efcient invocation.
Make it easy to invoke or request the AI system’s services when
needed.
[Voice Assistants, Product #1] “I can say [wake command] to
initiate.”
G8
Support efcient dismissal.
Make it easy to dismiss or ignore undesired AI system ser -
vices.
[E-commerce, Product #2] “Feature is unobtrusive, below the
fold, and easy to scroll past...Easy to ignore.”
G9
Support efcient correction.
Make it easy to edit, refne, or recover when the AI system is
wrong.
[Voice Assistants, Product #2] “Once my request for a reminder
was processed I saw the ability to edit my reminder in the UI
that was displayed. Small text underneath stated ’Tap to Edit’
with a chevron indicating something would happen if I selected
this text.”
G10
Scope services when in doubt.
Engage in disambiguation or gracefully degrade the AI sys-
tem’s services when uncertain about a user’s goals.
[Autocomplete, Product #1] “It usually provides 3-4 suggestions
instead of directly auto completing it for you”
G11
Make clear why the system did what it did.
Enable the user to access an explanation of why the AI system
behaved as it did.
9. [Navigation, Product #2] “The route chosen by the app was
made based on the Fastest Route, which is shown in the
subtext.”
G12
Remember recent interactions.
Maintain short term memory and allow the user to make efcient
references to that memory.
[Web Search, Product #1] “[The search engine] remembers the
context of certain queries, with certain phrasing, so that it can
continue the thread of the search (e.g., ‘who is he married to’
after a search that surfaces Benjamin Bratt)”
G13
Learn from user behavior.
Personalize the user’s experience by learning from their actions
over time.
[Music Recommenders, Product #2] “I think this is applied be-
cause every action to add a song to the list triggers new recom-
mendations.”
G14
Update and adapt cautiously.
Limit disruptive changes when updating and adapting the AI
system’s behaviors.
[Music Recommenders, Product #2] “Once we select a song they
update the immediate song list below but keeps the above one
constant.”
G15
Encourage granular feedback.
Enable the user to provide feedback indicating their prefer -
ences during regular interaction with the AI system.
[Email, Product #1] “The user can directly mark something as
important, when the AI hadn’t marked it as that previously.”
10. G16
Convey the consequences of user actions.
Immediately update or convey how user actions will impact
future behaviors of the AI system.
[Social Networks, Product #2] “[The product] communicates
that hiding an Ad will adjust the relevance of future ads.”
G17
Provide global controls.
Allow the user to globally customize what the AI system
monitors and how it behaves.
[Photo Organizers, Product #1] “[The product] allows users to
turn on your location history so the AI can group photos by
where you have been.”
G18
Notify users about changes.
Inform the user when the AI system adds or updates its
capabilities.
[Navigation, Product #2] “[The product] does provide small in-
app teaching callouts for important new features. New features
that require my explicit attention are pop-ups.”
Table 1: Our 18 human-AI interaction design guidelines,
roughly categorized by when they likely are to be applied
during interaction with users, along with illustrative
applications (rated as “clearly applied” by participants) across
products tested by participants in our user study.
Paper 3 Page 3
Over time When wrong During interaction Initially
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
being scattered throughout diferent academic circles and
venues, making them difcult to fnd (e.g., there is relevant work
in a wide variety of venues including AAAI, UbiComp, RecSys,
SIGIR, HRI, KDD). Moreover, potential design sug- gestions
for AI are often not presented explicitly as such. In many cases,
11. researchers identify usability issues with AI systems and
suggest possible solutions in the discussion or future work
sections of their academic papers. For example, Lugar and
Sellen [26] identify variability in user expecta- tions of
conversational agents as causing usability issues and propose
setting realistic expectations as a possible solution in their
discussion. Similarly, Lee et al [22] studied automatic changes
to search result lists during user interaction and suggested
caution in updating those lists to balance stability with
presenting new content to users. While these proposed solutions
could be generalized into principles for designers, not
presenting them as such makes them difcult to discover.
It can also be difcult to understand if and how design guid- ance
stemming from one community or interaction scenario extends
to others. For example, Bunt et al. [4] showed that, while
explanations of AI behaviors have shown promise in complex
and high-risk scenarios such as sensor-based ubiq- uitous
computing systems or decision-support systems for medical or
fnancial domains, they may be less important for relatively low -
cost scenarios such as search and music or movie
recommenders.
In this work we 1) synthesize a unifed set of design guide- lines
from a variety of communities and sources and 2) systematically
examine those guidelines in a variety of AI- infused systems to
validate their applicability and relevance. The closest to our
work is Horvitz’s set of principles for mixed-initiative systems
[17], noting that 8 of our 18 guide- lines map to principles
outlined in that work. We celebrate its 20-year anniversary by
refecting on learnings from the community since its publication.
Moreover, recent work has warned that the lack of rigorous
validations of proposed design heuristics in specifc domains
makes it difcult to gauge the utility of those heuristics [15]. We
developed the guidelines shown in Table 1 using a four-phase
process. In Phase 1 we consolidated more than 150 design
recommen- dations from multiple sources into a set of 20
guidelines. In Phase 2 we conducted an internal modifed
12. heuristic evalu- ation of the guidelines, revising the set down to
18. Phase 3 consisted of a user study in which 49 participants
used heuristic evaluation to assess the guidelines’ rel evance and
clarity. Based on their feedback, we rephrased some of the
guidelines to improve clarity and, in Phase 4, conducted an
expert evaluation of the revisions to validate the fnal set.
3 PHASE 1: CONSOLIDATING GUIDELINES
We gathered AI design recommendations from three sources:
• A review of AI products and guidelines originating from
industry. We collected guidelines asserted internally in our
company and externally, and grouped them into themes; we
audited a sample of AI products within and outside our company
against the themes; and cross-referenced themes with internal
customer feedback (reviews and bugs reported about our
company’s AI products).
• Recent public articles and editorials about AI design (e.g., [2,
24, 25, 39]).
• Relevant scholarly papers about AI design (see Related Work
section).
While we drew AI design guidelines from the academic
literature, the list we captured may not be exhaustive because,
as discussed in Related Work, potential design guidelines are
often not presented explicitly as such, making them difcult to
search for via terms or combinations of terms such as
“AI”, “machine learning”, “design”, “principle” or “guideline”.
Further, as the feld is evolving rapidly, we found the most up to
date guidance about AI design in industry sources via articles
published in the public domain.
From these sources, we obtained 168 potential AI design
guidelines. Three members of our team conducted an asyn-
chronous afnity diagramming process, clustering the guide-
lines into related concepts. This resulted in 35 concepts which
we then fltered by removing concepts we deemed to be ei- ther
too vague to design for directly (e.g., “build trust”), too specifc
to a particular AI scenario (e.g., “establish that the bot is not
human”), or not AI specifc (e.g., “display output ef- fectively”).
13. Filtering reduced our set of concepts to 20, each of which we
then summarized in a sentence or phrase, forming our frst
iteration of the guidelines. We organized the guide- lines into
four top-level categories based on when during the user’s
interaction they applied: “Initially” (Guideline 1 & Guideline
2), “During interaction” (Guideline 3 - Guideline 6),
“When wrong” (Guideline 7 - Guideline 11), and “Over time”
(Guideline 12 - Guideline 18). Next, we tested the guidelines
via a modifed heuristic evaluation.
4 PHASE 2: MODIFIED HEURISTIC EVALUATION
We conducted an evaluation to test and iterate on the initial set
of 20 AI design guidelines. We modeled our study af- ter a
heuristic evaluation [31], a common discount usability testing
method where evaluators examine an interface for vi- olations
of a given set of usability guidelines. As the primary goal was
to evaluate our design guidelines rather than to evaluate an
interface, we modifed the heuristic evaluation by asking
evaluators to attempt to identify both applications and
violations of the proposed guidelines in an interface and to
refect on the guidelines themselves during the evaluation.
Eleven members of our team participated in this evalua- tion.
Team members selected AI-infused products or features
Paper 3
Page 4
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
of their choice and then looked for applications or viola- tions
of our initial set of design guidelines over a one-hour period. In
total, we inspected 13 AI-infused products or fea- tures
including: two diferent email products with a feature for fltering
unimportant emails, a navigation system, an e-commerce
website with product recommendations, two photo organization
products, a design assistance feature in a productivity software,
a research assistance feature in a productivity application, a
social network news feed feature, a web search service, and an
image search service. These products were diferent from the
14. products used in Phase 3.
After the modifed heuristic evaluation, we reviewed the fndings
and refections about each guideline and discussed issues and
revision strategies for conficting interpretations and
ambiguities. For example, our initial phrasing of Guide- line 9
(“allow efcient correction”) and Guideline 17 (“al- low coarse
controls”) caused several evaluators to confuse instance-level
corrections with global-level settings (sev- eral evaluators
identifed adjusting settings as applications of Guideline 9 rather
than Guideline 17). We subsequently rephrased Guideline 17 to
include the term “global”.
We also identifed opportunities for merging related or
redundant guidelines. For example, the initial set included
“informing the user when to take control” and “fallback to a
human where appropriate”. Our evaluations found few
applications of these guidelines, and we determined both of
them to be instances of Guideline 10 (initially phrased “scope
services when uncertain”) and therefore removed them as
distinct guidelines. Similarly, applications of “enable users to
change privacy permissions” and “allow private mode” were
deemed as instances of Guideline 17 (initially phrased “allow
coarse controls”) and were merged with that guideline.
We also decided to remove some guidelines that resulted in few
or no applications during our evaluations. For example,
neither the guideline to “explore vs. exploit in moderation” nor
to “be especially conservative in the beginning” resulted in any
identifable usage across the products or features we examined.
While these guidelines are important at the AI modeling level,
they appeared to be difcult to observe or design for in an
interface.
After these sessions we reformulated the remaining guide- lines
to follow a consistent format and to clarify issues identi- fed by
evaluators. Specifcally, we proposed that each guide- line
adhere to the following criteria:
· It should be written as a rule of action, containing about 3-10
words and starting with a verb.
15. · It should be accompanied by a one-sentence description that
qualifes or clarifes any potential ambiguities.
· It should not contain conjunctions so that designers can
clearly validate whether it is applied or violated in an interface.
Removing conjunctions meant splitting some guidelines. For
example, an initial guideline to “allow efcient invoca- tion,
correction, and dismissal” became three (to “support efcient
invocation,” “support efcient dismissal,” and “sup- port efcient
correction,” Guidelines 7-9).
Phase 2 produced a set of 18 guidelines that closely match the
guidelines in Table 1. In the following sections we de- scribe a
user study that tested these 18 guidelines and a sub- sequent
expert validation of the guidelines that we slightly rephrased
after the user study (resulting in the fnal proposed set shown in
Table 1).
5 PHASE 3: USER STUDY
We conducted a user study with 49 HCI practitioners to 1)
understand the guidelines’ applicability across a variety of
products; and 2) get feedback about the guidelines’ clarity.
Procedure
We modeled the user study after a heuristic evaluation. We
assigned each participant to an AI-driven feature of a product
they were familiar with and asked them to fnd examples
(applications and violations) of each guideline.
First, we helped participants become familiar with the
guidelines by providing a document that included at least one
application and one violation for each. The examples came from
a range of AI-infused products and were pre- sented with a 1-2
sentence description and a screenshot where appropriate.
Participants were then instructed to play around with their
assigned feature and fll out a form asking a series of ques-
tions. For each guideline, the form asked participants to frst
determine if the guideline “does not apply” to their assigned
feature (i.e., irrelevant or out of scope) and, if not, to explain
why. If a participant judged that a guideline should apply to
their assigned feature and they observed applications or
16. violations, the form requested participants to provide their own
examples, and, for each example, a rating of the ex- tent of the
application or violation on a 5-point semantic diferential scale
from “clearly violated” to “clearly applied”, along with an
explanation of the rating. Participants were incentivized with an
additional monetary gratuity to include screenshots to illustrate
the examples. After completing the evaluation, participants
submitted their examples and ratings and flled in a fnal
questionnaire which asked them to rate each guideline on a 5-
point semantic diferential scale from
“very confusing” to “very clear” and provide any additional
comments about the guidelines.
We estimated the study would take approximately one hour to
complete based on our modifed heuristic evaluation study from
Phase 2. Participants were given one week to complete the study
on their own time and were compensated with an Amazon Gift
Card worth a minimum of $50 and up
Paper 3
Page 5
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
Product Category
Feature
Participants
E-commerce (Web)
Recommendations
6
Navigation (Mobile)
Route planning
5
Music Recommenders (Mobile)
Recommendations
5
Activity Trackers (De- vice)
Walking detection and step count
5
17. Autocomplete (Mobile)
Autocomplete
5
Social Networks (Mo- bile)
Feed fltering
5
Email (Web)
Importance fltering
5
Voice Assistants (De- vice)
Creating a reminder with a due date
5
Photo Organizers (Mo- bile)
Album suggestions
4
Web Search (Web)
Search
4
to $70 based on the number of applications or violations for
which they provided screenshots.
Products
One objective of our study was to determine if and how each of
our design guidelines manifests in a variety of AI-infused
products. We used a maximum-variance sampling strategy [28]
to select popular AI-infused products that covered a wide range
of scenarios.
First, we searched online for rankings of top apps, soft- ware,
and websites in the U.S. for both mobile and desktop devices.
This search resulted in 13 lists from sources such as app stores
(Apple, Google Play, Windows), and Web trafc rankings [1, 6,
40]. From these lists, we selected the top 10 products in each
and then fltered out any that were ofensive, game related, or did
not currently use AI to drive any of their main end-user facing
services (determined by examination of the product or reading
supplemental help documentation and news media articles when
necessary).
18. Next, we grouped the remaining products by their primary use
case, resulting in 10 categories (e.g., email, e-commerce, social
networking). We then selected two products per cate- gory
based on market share as determined by recent online statistics
reports (e.g., [19]). Finally, we selected a promi- nent AI-driven
feature to evaluate per product. In total, we selected 20
products, two of which were from Microsoft.
Many of the products we selected were available on multi - ple
platforms and devices. We attempted to evaluate products on a
variety of platforms. Table 2 shows our fnal list of prod- uct
categories, features and platforms.
Participants
We recruited participants via HCI and design distribution lists
at a large software company. During recruitment we screened
for people with at least one year of experience work- ing in or
studying HCI (e.g., in roles such as user experience design and
user experience research) and familiarity with discount usability
testing methods (e.g., heuristic evaluation, cognitive
walkthrough). We listed all possible product and platform
combinations, and asked respondents to select the options they
were familiar with and comfortable evaluating.
We endeavored to assign 2-3 participants to each prod- uct
according to recommendations for heuristic evaluations. Nielsen
[30] recommends 2-3 evaluators when evaluators have both
usability experience and familiarity with the prod- uct being
tested. We also assigned participants so that each product was
evaluated by people with a range of experience in discount
usability techniques and no product was eval- uated by
participants with only limited experience. When participants
dropped out of the study, we replaced them by assigning new
participants from a wait list of eligible respondents, trying to
maintain 2-3 evaluators per product.
Table 2: Product categories and features tested in the user
study, and the number of participants assigned to each.
In the end, 49 people (29 female, 18 male, 2 preferred not to
answer) participated in our study. Participants spanned ages 18-
19. 55: 5 were in the age range of 18-24, 24 were in the age range
of 25-34, 13 were aged 35-44 and 7 were aged 45-54. Of these
participants, 19 were researchers, 12 were design- ers, 11 were
HCI or design interns from various universities worldwide, and
the remaining 7 were a mix of engineers, product managers or
vendors. The participants’ experience working in or studying
HCI/UX was as follows: 1-4 years (23 participants), 5-9 years
(14 participants), 10-14 years (9 participants), 15-19 years (1
participant), 20+ years (2 par- ticipants). Thirty-nine
participants self-reported as being highly or very highly
experienced at discount usability test- ing methods while 10
reported as having medium to low levels of experience (we
screened out participants with “very low” levels of experience).
Participants were from 4 diferent countries spanning 3
continents. While we recruited partici- pants using internal
mailing lists, we took steps to mitigate sampling bias to ensure
the results do not exclusively repre- sent one organization’s
mindset, in addition to including the 11 external participants.
Our questionnaires asked partici- pants to rate the extent to
which an example is illustrative of a guideline and the clarity of
each guideline’s wording on Likert scales. These questions are
unlikely to be infuenced by company values. Moreover, our
main sampling criterion was experience with discount usability
methods. It is un- likely that the entirety of participants’
professional training and experience were internal.
Adjustments and Misinterpretations
To obtain accurate counts of examples of the proposed guide-
lines across products, we reviewed participant responses for the
following cases:
Paper 3
Page 6
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
• Duplicate applications or violations of a guideline for any
given product (55 instances). For example, two diferent
participants identifed the same application of Guideline 1 for an
20. activity tracker: “This guideline is applied in the activity
summary view, where it shows a summary of my ‘move’,
‘exercise’ and ‘stand’ metrics.” and “Displays all the metrics
that it tracks and explains how. Metrics include movement
metrics such as steps, distance traveled...” The 55 duplications
were removed from the analysis.
• Instances where participants used “does not apply” to indi-
cate that they could not fnd examples of a guideline rather than
to indicate that the guideline is not relevant for the product they
were testing, as we intended by this desig- nation (73
instances). For example, “To be quite honest I believe that this
would apply, however I can’t think of a way to show it.” and
“Cannot fnd examples of application or violation.”. These 73
instances were also removed from the analysis.
• Instances where participants used “does not apply” to in-
dicate that a guideline was violated (20 instances). For example,
“Even in the setting page, there’s no option for changing or
customizing anything for the autocomplete function.” and
“[Voice Assistant, Product #1] did not pro- vide additional hints
or tips to educate me on what the system is capable of achieving
beyond the task I had al- ready asked it to run.” We reclassifed
these instances as violations.
• Instances where participants misinterpreted one guideline for
another, discussed further below (56 instances).
We identifed these cases using a two-pass process where
participant responses were frst reviewed by one member of our
team to identify each case and then those cases were verifed or
invalidated by another member of our team. We removed 14
additional instances from our analysis when the two reviewers
from our team disagreed on any of these cases.
Results
Our evaluation in this phase focused on two key questions, each
addressed in one of the subsections below: 1) Are the guidelines
relevant? That is, can we identify examples of each guideline
across a variety of products and features? 2) Are the guidelines
clear? That is, can participants understand and diferentiate
21. among them?
Relevance. Across the 20 products they evaluated, partici - pants
identifed 785 examples of the 18 guidelines, after the
adjustments described earlier: 313 applications, 277 viola-
tions, 89 neutrals (rated at the mid-point between “clearly
applied” and “clearly violated”), and 106 instances of “does not
apply”. Figures 1a-1c show the guideline counts per prod- uct
category for applications, violations, and “does not apply”,
respectively. Figure 1d shows an aggregate of all applicable
ratings, including neutral responses. Finally, Table 1 shows
example applications participants provided for each guide- line
(marked as “clearly applied” by the participant).
In this analysis, we use the following interpretation con- structs
to better understand results from Figure 1. First, we use the
total number of applications and violations as an in- dicator of
the overall evidence of a guideline being relevant (e.g.,
Guidelines 1, 12, 17). Second, relevant guidelines with a high
positive diference between the number of applications and
violations are guidelines which are not only relevant but also
widely implemented for the set of products in the study (e.g.,
Guidelines 1, 4, 12). Third, relevant guidelines with a high
negative diference between the number of applications and
violations are guidelines which, despite their importance, are
still not widely implemented (e.g., Guidelines 2, 11, 17).
Fourth, we discuss guidelines with the highest numbers of "does
not apply" (e.g., Guidelines 3, 5, 6).
Participants found at least one application or violation of each
of our guidelines in each product category we tested, suggesting
broad evidence of the guidelines’ relevance. While participants
were able to identify examples of each guideline in most of the
product categories we tested, voice assistants had the largest
number of “does not apply” instances re- ported, while photo
organizers, activity trackers and voice assistants had the fewest
numbers of total applications or violations. Interestingly, each
of these product categories in- volves a mode of operation or
input data type beyond simple graphical user interfaces and text
22. (specifcally, interaction over images or sensor data, or voice -
based interaction).
No instances of Guideline 10 “Scope services when in doubt”
were reported for the two social networks we tested and no
instances of Guideline 14 “Update and adapt cau- tiously” were
reported for the two activity trackers. Some participants
reported that these guidelines were hard to ob- serve in a single
session or without knowledge about the underlying AI
algorithms. For example, one participant noted that Guideline
10 was “More difcult to assess unless you have a lengthy period
of time with the product - and po- tential guidance for
understanding the behind-the-scenes mechanisms,” possibly
referring to understanding when the AI system was “in doubt”.
Similarly, for Guideline 14, one participant said, “It’s a bit
difcult to assess this in a sin- gle session.” These guidelines
were, however, observed in all other products that participants
tested in our study, so such difculty could be attributed to the
guidelines not be- ing applied or being difcult to observe in
these particular products.
Relevant guidelines that have signifcantly (at least 40%) more
applications than violations are evidence of being widely
implemented across products. This is also an indicator that there
exist current mechanisms in the intersection of AI
Paper 3
Page 7
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
(a) Counts of “clear application” or “application” responses.
(b) Counts of “clear violation” or “violation” responses.
(c) Counts of “does not apply” responses.
(d) Counts of all responses, excluding “does not apply” and
including neutral.
Figure 1: Counts of applications (top left), violations (top
right), and “does not apply” (bottom left) responses in our user
23. study. Rows show counts by guideline, while columns show
counts by product category tested.
Paper 3 Page 8
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
and design that facilitate the implementation of such guide-
lines. For example, frequent item sets and location detec- tion
were two common mechanisms used to support Guide- line 4 in
showing contextually relevant information (e.g., [E-commerce,
Product #2] “The feature assumes I’m about to buy a gaming
console and shows accessories and games that would go with
it...” or [Web Search, Product #2] “Searching a movie title
returns show times near my location for today’s date”). For
Guideline 12, multiple products leverage the his- tory of user
interactions to suggest a reduced cache of items that might be
more useful to the user (e.g., [Navigation, Prod- uct #1]
“Opening the app shows a list of recent destinations, as well as
allows you to access ’favorite’ locations.”).
Some guidelines emerged as relevant, but not widely im-
plemented, as indicated by the large number of violations. For
example, Guideline 11 “Make clear why the system did what it
did” had one of the highest number of violations, despite the
large volume of active research in the area of in- telligibility
and explanations. This guideline also had one of the fewest
reported instances of “does not apply”, suggesting that
participants could imagine opportunities for explana- tions, but
were often unable to obtain them. In some cases, participants
reported violations when they were unable to locate any
explanation at all (e.g., [E-commerce, Product #1]
“I have no idea why this is being shown to me. Is it trying to
sell me stuf I do not need?” and [Music Recommender, Product
#1] “Even when drilling down into a song there is no
explanation for why this particular song was recom- mended.”).
In other cases, participants reported violations when
explanations were provided but were seemingly in- adequate for
their purposes (e.g., [Email, Product #1] “This does list out
24. things which afect it, but they don’t explain it in a clear
manner. Do each of these afect it equally?” and [Navigation,
Product #1] “It always says the suggested route is the “best
route” but it doesn’t give you the criteria for why that route is
the best.”). These results suggest that partici- pants could
envision explanations being useful in most of the products we
tested, but more work is necessary to under- stand the level of
explanations people may desire and how designers can produce
them. In some cases, explanations might be undesirable, for
fnancial or business reasons (e.g. adversarial (gaming) behavior
by Web page authors would be exacerbated if search engines
explained their ranking.).
Guidelines 3, 5, and 6 had the highest number of "does not
apply" ratings. Several participants indicated that Guide- line 3
was not applicable because the products they were testing
presented services only when explicitly requested by the user.
For example, for one of the E-commerce prod- ucts, one
participant stated, “I feel this guideline does not apply for the
recommendations page. It [is] a very ‘pull’ kind of
interaction.”; i.e., the user views recommendations while
browsing and there are no ‘push’ notifcations. Similarly, for
one of the Web Search engines we tested, one participant stated,
“[the search engine] does not generally interrupt a user at any
point. The mobile app has notifcations, which might be relevant
here, but the desktop website does not. Generally speaking, AI
services pop up based on when the user searches and what he or
she searches for, not based on an ongoing session.” This
guideline is therefore likely more relevant for products that take
proactive actions without explicit user requests, such as sending
notifcations.
Guideline 5 “Match relevant social norms” and Guideline 6
“Mitigate social biases” had some of the most reported in-
stances of “does not apply”. Examination of these instances
revealed that in some cases participants frmly believed these
guidelines were not relevant for the products they were test- ing
while other participants reported either applications or
25. violations of these guidelines in those same product cate-
gories. For example, one participant reported about one of the
navigation products tested that “information is not sub- ject to
biases, unless users are biased against fastest route”. However,
a diferent participant was able to identify a viola- tion of this
guideline for the same product category “Regards the ‘Walking’
transport there’s no way to set an average walking speed. [The
product] assumes users to be healthy.” Similarly, one
participant reported about one of the voice assistants we tested
that “Nothing in this interaction had any social biases that it
could reinforce.”, while another stated about the same product
that “While it’s nice that a male voice is given as an option, the
default [voice assistant] voice is female, which reinforces
stereotypical gender roles that presume a secretary or
receptionist is female.” Some partici- pants, however, had no
trouble identifying bias: "I typed in ’black’ in the search bar
and it came back with images of me as well as my niece [...] it
saw a black face and used that as its frame of reference for all
pictures, then returned all pictures of me and my family without
images of other black spaces in an environment".
Guidelines 5 and 6 were noted as the least clear by our
participants in their (see Figure 2), with several participants
remarking about the difculty of imagining social norms beyond
their own or recognizing potential sources of bias (e.g., “Hard
for a designer to implement, because it requires them to think
outside of their own social context”, “Doesn’t apply to me but
to potential other people.”, and “This is hard to measure. Who
defnes what is undesirable and unfair?”). These assessments
suggest that a diverse set of evaluators may be necessary to
efectively recognize or apply these guidelines in practice.
Alternatively, designers may need specifc training or tools to
recognize social norms and biases. GenderMag[5], a method for
identifying gender biases in user interfaces, is one such tool,
but further work is needed in this area.
Paper 3
Page 9
26. CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
Figure 2: Subjective evaluations by study participants about the
clarity of the 18 AI design guidelines.
Clarity and Clarifications. Figure 2 presents clarity ratings for
all guidelines. To identify guidelines in need of further
clarifcation, we reviewed these ratings and the 56 misinter -
pretations explained in the section Adjustments and Misin-
terpretations. We noted guidelines as needing further clarif-
cation when errors were determined to be systematic, which we
defned as having four or more instances confused with another
guideline or having multiple participants making similar
comments about clarity. From this analysis, we iden- tifed and
addressed the following issues:
Guidelines 1, 2, and 11 (originally phrased as “Make ca-
pabilities clear”, “Set expectations of quality” and “Make
explanations of behavior available”) had 13 misinterpreted
instances (5 between Guidelines 1 and 2; 8 between Guide- lines
1 and 11) and several comments about these being hard to
diferentiate (e.g., one participant commented on Guideline 2
that “I don’t know what is diferent between this guideline and
the guideline #1”). To clarify, we revised these guidelines using
parallel language while emphasizing the in- tended diferences
(Guideline 1 is about what the system can do, Guideline 2 is
about how well the system can do it, and Guideline 11 is about
explaining why something happened, after the fact).
Guideline 4 (originally phrased as “Show contextually rel -
evant information. Display information about the user’s in-
ferred goals and attention during interaction.”) was confused
with Guideline 13 (originally phrased as “Learn from user
behavior. Personalize the experience based on the user’s past
actions”) six times. Examination revealed that most of these
errors were due to “preferences” and “personalization” being
considered as “relevant context”. To clarify, we rephrased these
guidelines as in Table 1, emphasizing the diference between a
27. user’s “current context” (e.g., “current task and environment”)
and personalization which we intended to mean learning about
preferences “over time”.
Guidelines 3 and 4 (originally phrased as “Time services based
on context” and “Show contextually relevant infor- mation”)
were confused with each other in four instances. Several
participants commented that this was because what is displayed
and when it is displayed are often related (e.g., “pro- vide the
right information at the right time” and “The time when I’m
specifcally looking for DP to HDMI cable should be the most
ideal time to recommend possible variations in DP to HDMI”).
However, we decided to keep these guidelines separate to avoid
conjunctions and updated Guideline 3 to use the same language
of “current task and environment” as Guideline 4.
Guideline 12 (originally phrased as “Maintain working
memory”) was confused with Guideline 13 (“Learn from user
behavior”) seven times, seemingly because the term
“memory” was being interpreted as something that happens over
time. To clarify, we revised these guidelines as in Table 1 to
emphasize the diference between maintaining short term
memory of recent interactions and learning behaviors over time.
Guidelines 15 and 17 (originally phrased as “Encourage
feedback” and “Provide global controls”, respectively) were
confused six times, seemingly because the diference between
local (or instance-level) feedback and global feedback (e.g.,
settings that impact behaviors on all instances) was still unclear
despite introducing the term “global” after our frst heuristic
evaluation in Phase 2. We therefore revised these Guidelines as
in Table 1 to further emphasize that Guideline 15 is about
granular feedback that happens during a specifc interaction,
while Guideline 17 is about global customization of behaviors.
These revisions resulted in the fnal set of guidelines pre- sented
in Table 1, which we further evaluated with experts as described
in the following section.
6 PHASE 4: EXPERT EVALUATION OF REVISIONS
To verify whether the revisions we proposed in the pre- vious
28. section improved our guidelines, we conducted an expert
review. Expert reviews have been shown to be efec- tive at
identifying problems related to wording and clarity [27, 34, 43].
For this purpose, we defned experts as people who have work
experience in UX/HCI and who are familiar with discount
usability methods such as heuristic evaluation.
Paper 3
Page 10
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
Phase 1: Consolidating guidelines
Set appropriate expectations.
Set accurate expectations to give people a clear idea of what the
experience is and isn’t capable of doing.
Phase 2: Internal evaluation
Set appropriate expectations.
Phase 3: User study
G1: Make capabilities clear. Help the user understand what the
AI system is capable of doing.
G2: Set expectations of quality. Help the user understand what
level of performance the AI system is capable of delivering.
Phase 4: Expert evaluation of revisions
G1: Make clear what the system can do. Help the user
understand what the AI system is capable of doing.
G2: Make clear how well the system can do what it can do. Help
the user understand how often the AI system may make
mistakes.
Figure 3: Number of experts out of 11 who preferred the re-
vised or the old version. One participant suggested their own
alternative for Guideline 3.
We reasoned that experts with experience in applying var- ious
guidelines to design solutions would be able to assess whether
our guidelines would be easy to understand and therefore to
work with.
We recruited 11 experts (6 female, 5 male) from the same large
29. company through snowball sampling. Of these experts, 6 were
UX designers, 3 were UX researchers, and two were in research
and product planning roles. Their length of ex- perience
working in UX or HCI was more than 20 years (1), 16-20 years
(4), 11-15 years (3), and 2-5 years (3). Partici- pants self-
reported their familiarity with discount usability methods as
very high (5), high (4), and medium (2).
First, we asked each expert to review the 9 revised guide- lines
independently. They chose, for each guideline, the ver- sion
they thought was easier to understand (the old version or the
version we revised after in Phase 3). Then the experts reviewed
the pairs of guidelines that emerged in Phase 3 as confusing or
overlapping. For each pair, we asked experts to rate whether the
two guidelines mean the same thing and the difculty of
distinguishing between them. We compen- sated participants
with a $30 gift card for an estimated time commitment of 45
minutes.
Figure 3 shows that experts preferred the revised versions for
all but Guideline 15. Revisions appear to have helped dis-
tinguish between the pairs of guidelines Phase 3 participants
had trouble with, but fve experts still found Guidelines 1 and 2
somewhat difcult to distinguish (Table 4). Since the revision of
Guideline 15 made it easy to distinguish it from 17, we decided
to keep it.
Table 3 illustrates the evolution of the frst two guidelines
through the four phases.
7 DISCUSSION & FUTURE WORK
We synthesized guidance proposed over the past 20 years about
the design of human-AI interaction into a set of 18 AI usability
guidelines. These guidelines were iteratively re- fned in four
phases by a team of 11 researchers, and were applied or
reviewed by an additional 60 designers and us- ability
practitioners. Over the various stages of development,
Table 3: Evolution of Guidelines 1 and 2.
the guidelines were applied to AI-infused products across 10
product categories. These eforts provide evidence for the
30. relevance of the guidelines across a wide range of common AI-
infused systems. In terms of utility, we anticipate the guidelines
will be useful to evaluate existing products and emerging design
ideas. Our evaluation methods show that the guidelines lend
themselves well to usability inspection methods such as
heuristic evaluation. Future work could examine the uses and
value of these guidelines at various stages of design.
We recognize that there is a tradeof between generality and
specialization, and that these guidelines might not ade- quately
address all types of AI-infused systems. For example, we
reported that some guidelines do not directly apply to AI
systems that lack graphical user interfaces (e.g., voice-based
virtual assistants and activity trackers). Additional guidelines
may be necessary to help designers and developers create
intuitive and efective products with these properties or in these
product categories. Likewise, specialized guidelines may be
required in certain high-risk or highly regulated areas such as
semi-autonomous vehicles, robot-assisted surgery, and fnancial
systems. We hope the 18 guidelines presented here and their
validation process stimulate and inform future research into the
development of domain-specifc guidance.
Our work also intentionally focused on AI design guide- lines
that we believed could be easily evaluated by inspection of a
system’s interface. For example, we excluded broad prin- ciples
such as "build trust", and focused instead on specifc and
observable guidelines that are likely to contribute to building
trust. Previous work, however, has proposed guide- lines that
impact the usability of AI-infused systems but must
Paper 3
Page 11
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
Guidelines
Meanings: Diferent
Distinguish: Easy
Distinguish: Hard
31. Distinguish: Neutral/ Medium
1&2
10
6
5
0
1 & 11
11
6
3
2
3&4
10
6
2
3
4 & 13
11
9
1
1
12 & 13
9
7
1
3
15 & 17
10
9
1
1
be considered when constructing the AI model. For exam- ple,
we excluded Horvitz’s [17] principle of “inferring ideal action
in light of costs, benefts, and uncertainties” and guid- ance
about being “especially conservative in the beginning” because
these require decisions to be made at the modeling layer of a
32. system. We foresee the value of future work to investigate how
designers and model developers can work together to efectively
apply these guidelines in AI-infused systems. For example,
given the expected performance of an AI model, designers may
recommend specifc designs that reduce costs while optimizing
benefts to users (e.g., display- ing multiple options to users
until the performance of the AI model is improved enough to
take proactive action on the user’s behalf).
Our decisions to optimize for generality, and to focus on
observable properties, serve as a reminder that interaction
designers routinely encounter these types of trade-ofs. We
anticipate situations where there will be interactions and trade -
ofs in attempts to employ several of the guidelines. As an
example, if a system uses a complex or deep model to achieve a
high level of performance, it may be challenging to both convey
the consequences of user actions (Guideline 16), while also
actively learning from user behavior (Guide- line 13). Further
research is necessary to understand the implications of these
potential interactions and trade-ofs for the design of AI systems
and to understand how designers employ these guidelines "in
the wild."
Finally, we recognize that our guidelines only begin to touch on
topics of fairness and broader ethical considera- tions. Ethical
concerns extend beyond the matching of social norms
(Guideline 5) and mitigating social biases (Guideline 6). As an
example, an AI system may adhere to each of these guidelines
and yet impact people’s lives or livelihoods in a consequential
manner. It is imperative that system designers carefully evaluate
the many infuences of AI technologies on people and society,
and that this remains a topic of ongo- ing research and intense
interest. Ethics-focused guidelines can be difcult to fully
evaluate in a heuristic evaluation, and successful detection of
problems may depend on who is performing the evaluation. Our
results related to Guide- lines 5 “Match relevant social norms”
and 6 “Mitigate social biases” suggest that diversity among
evaluators helps iden- tify a range of issues that might be
33. invisible to members of majority groups.
8 CONCLUSION
We proposed and evaluated 18 generally applicable design
guidelines for human-AI interaction. We distilled the guide-
lines from over 150 AI-related design recommendations and
validated them through three rounds of evaluation. We are
hopeful that application of these guidelines will result in better,
more human-centric AI-infused systems, and that our
Table 4: Number of experts out of 11 who rated each pair of
guidelines as diferent in meaning and distinguishable.
synthesis can facilitate further research. As the current tech-
nology landscape is shifting towards the increasing inclusion of
AI in computing applications, we see signifcant value in
working to further develop and refne design guidelines for
human-AI interaction.
9 ACKNOWLEDGMENTS
The authors would like to acknowledge the contributions of our
newest team member, Ever Zayn McDonald.
REFERENCES
[1] Alexa. 2018. Top sites in the United States. Retrieved July,
2018 from https://www.alexa.com/topsites/countries/US
[2] Kathy Baxter. 2017. How to Meet User Expectations for Ar -
tifcial Intelligence. Medium. Retrieved September, 2018 from
https://medium.com/salesforce-ux/how-to-meet-user-
expectations-for-artifcial-intelligence-a51d3c82af6
[3] Victoria Bellotti and Keith Edwards. 2001. Intelligibility
and Account- ability: Human Considerations in Context-Aware
Systems. Human– Computer Interaction 16, 2-4 (2001), 193–
212.
[4] Andrea Bunt, Matthew Lount, and Catherine Lauzon. 2012.
Are Expla- nations Always Important?: A Study of Deployed,
Low-cost Intelligent Interactive Systems. In Proc. IUI ’12.
ACM, New York, NY, USA, 169– 178.
[5] Margaret Burnett, Simone Stumpf, Jamie Macbeth, Stephann
Makri, Laura Beckwith, Irwin Kwan, Anicia Peters, and William
Jernigan. 2016. GenderMag: A method for evaluating software’s
34. gender inclusiveness. Interacting with Computers 28, 6 (2016),
760–787.
[6] comScore. 2018. Latest rankings. Retrieved July, 2018 from
https: //www.comscore.com/Insights/Rankings
[7] Maartje de Graaf, Somaya Ben Allouch, and Jan van Dijk.
2017. Why Do They Refuse to Use My Robot?: Reasons for
Non-Use Derived from a Long-Term Home Study. In Proc. HRI
’17. ACM, New York, NY, USA, 224–233.
[8] Defy Media. 2015. Damn You Auto Correct! Retrieved
September, 2018 from http://www.damnyouautocorrect.com/
[9] T. Deuschel and T. Scully. 2016. On the Importance of
Spatial Per- ception for the Design of Adaptive User Interfaces.
In 2016 IEEE 10th International Conference on Self-Adaptive
and Self-Organizing Systems (SASO). 70–79.
[10] Anind Dey, Jennifer Mankof, Gregory Abowd, and Scott
Carter. 2002. Distributed Mediation of Ambiguous Context in
Aware Environments. In Proc. UIST ’02. ACM, New York, NY,
USA, 121–130.
[11] Leah Findlater and Joanna McGrenere. 2004. A
Comparison of Static, Adaptive, and Adaptable Menus. In Proc.
CHI ’04. ACM, New York, NY, USA, 89–96.
[12] Krzysztof Z. Gajos, Mary Czerwinski, Desney S. Tan, and
Daniel S. Weld. 2006. Exploring the Design Space for Adaptive
Graphical User
Paper 3
Page 12
CHI 2019 Paper
CHI 2019, May 4–9, 2019, Glasgow, Scotland, UK
Interfaces. In Proc. AVI ’06. ACM, New York, NY, USA, 201–
208.
13. [13] Krzysztof Z Gajos, Katherine Everitt, Desney S Tan,
Mary Czerwinski, and Daniel S Weld. 2008. Predictability and
accuracy in adaptive user
interfaces. In CHI. ACM, 1271–1274.
14. [14] Jonathan L. Herlocker, Joseph A. Konstan, and John
Riedl. 2000. Ex-
35. plaining Collaborative Filtering Recommendations. In Proc.
CSCW ’00.
ACM, New York, NY, USA, 241–250.
15. [15] Setia Hermawati and Glyn Lawson. 2016. Establishing
usability heuris-
tics for heuristics evaluation in a specifc domain: Is there a
consensus?
Applied Ergonomics 56 (2016), 34 – 51.
16. [16] Kristina Höök. 2000. Steps to take before intelligent
user interfaces
become real. Interacting with Computers 12, 4 (2000), 409–426.
17. [17] Eric Horvitz. 1999. Principles of Mixed-Initiative User
Interfaces. In
Proc. CHI ’99. ACM, New York, NY, USA, 159–166.
18. [18] Eric Horvitz, Jack Breese, David Heckerman, David
Hovel, and Koos
Rommelse. 1998. The Lumière Project: Bayesian User Modeling
for Inferring the Goals and Needs of Software Users. In Proc.
UAI ’98. Morgan Kaufmann Publishers Inc., San Francisco, CA,
USA, 256–265.
19. [19]
IDCCorporateUSA.2018.IDC:Thepremierglobalmarketintelligen
ce
frm. Retrieved September, 2018 from https://www.idc.com/
20. [20]
AnthonyJameson.2008.Adaptiveinterfacesandagents.InThehuma
n-
computer interaction handbook: Fundamentals, evolving
technologies and emerging applications (2nd ed.), Andrew Sears
and Julie A. Jacko (Eds.). CRC Press, Boca Raton, FL, 433–
458.
21. [21] Todd Kulesza, Margaret Burnett, Weng-Keen Wong,
and Simone Stumpf. 2015. Principles of Explanatory Debugging
to Personalize Interactive Machine Learning. In Proc. IUI ’15.
ACM, New York, NY, USA, 126–137.
22. [22] Chia-Jung Lee, Jaime Teevan, and Sebastian de la
36. Chica. 2014. Charac- terizing Multi-click Search Behavior and
the Risks and Opportunities of Changing Results During Use. In
Proc. SIGIR ’14. ACM, New York, NY, USA, 515–524.
23. [23] Brian Y. Lim and Anind K. Dey. 2009. Assessing
Demand for Intelligi- bility in Context-aware Applications. In
Proc. UbiComp ’09. ACM, New York, NY, USA, 195–204.
24. [24] JoshLovejoy.2018.TheUXofAI.GoogleDesign.
RetrievedSeptember, 2018 from
https://design.google/library/ux-ai/
25. [25] Josh Lovejoy and Jess Holbrook. 2017. Human-
Centered Ma- chine Learning. 7 steps to stay focused on the
user when de- signing with ML. Medium. Retrieved September,
2018 from https://medium.com/google-design/human-centered-
machine- learning- a770d10562cd
26. [26] Ewa Luger and Abigail Sellen. 2016. "Like Having a
Really Bad PA": The Gulf Between User Expectation and
Experience of Conversational Agents. In Proc. CHI ’16. ACM,
New York, NY, USA, 5286–5297.
27. [27] Aaron Maitland and Stanley Presser. 2016. How
Accurately Do Difer- ent Evaluation Methods Predict the
Reliability of Survey Questions? Journal of Survey Statistics
and Methodology 4, 3 (2016), 362–381.
[28] Joseph A Maxwell. 2012. Qualitative research design: An
interactive approach. Vol. 41. Sage publications.
[29] Chelsea Myers, Anushay Furqan, Jessica Nebolsky, Karina
Caro, and Jichen Zhu. 2018. Patterns for How Users Overcome
Obstacles in Voice User Interfaces. In Proc. CHI ’18. ACM,
New York, NY, USA, Article 6, 7 pages.
[30] Jakob Nielsen. 1992. Finding Usability Problems Through
Heuristic Evaluation. In Proc. CHI ’92. ACM, New York, NY,
USA, 373–380. [31] Jakob Nielsen and Rolf Molich. 1990.
Heuristic Evaluation of User
Interfaces. In Proc. CHI ’90. ACM, New York, NY, USA, 249–
256.
[32] D.A. Norman. 1988. The psychology of everyday things.
Basic Books,
37. New York.
[33] Donald A. Norman. 1994. How Might People Interact with
Agents.
Commun. ACM 37, 7 (July 1994), 68–71.
[34] Kristen Olson. 2010. An examination of questionnaire
evaluation by
expert reviewers. Field Methods 22, 4 (2010), 295–318.
[35] Martin Porcheron, Joel E. Fischer, Stuart Reeves, and
Sarah Sharples. 2018. Voice Interfaces in Everyday Life. In
Proc. CHI ’18. ACM, New
York, NY, USA, Article 640, 12 pages.
[36] Emilee Rader, Kelley Cotter, and Janghee Cho. 2018.
Explanations As
Mechanisms for Supporting Algorithmic Transparency. In Proc.
CHI
’18. ACM, New York, NY, USA, Article 103, 13 pages.
[37] Ruth Ravichandran, Sang-Wha Sien, Shwetak N. Patel,
Julie A. Kientz, and Laura R. Pina. 2017. Making Sense of
Sleep Sensors: How Sleep Sensing Technologies Support and
Undermine Sleep Health. In Proc.
CHI ’17. ACM, New York, NY, USA, 6864–6875.
[38] Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin.
2016. "Why
Should I Trust You?": Explaining the Predictions of Any
Classifer. In
Proc. KDD ’16. ACM, New York, NY, USA, 1135–1144.
[39] Katharine Schwab. 2017. 10 Principles For Design In The
Age Of AI. Retrieved September, 2018 from
https://www.fastcompany.com/3067632/10-principles-for-
design-
in- the- age- of- ai
[40] SimilarWeb. 2018. Top websites ranking. Retrieved July,
2018 from
https://www.similarweb.com/top-websites/united-states
[41] Jack Stewart. 2018. Why Tesla’s Autopilot Can’t See a
Stopped Firetruck. Retrieved September, 2018 from https:
38. //www.wired.com/story/tesla-autopilot-why-crash-radar/
[42] Erica Virtue. 2017. Designing with AI.
[43]
JolitaVveinhardtandEvelinaGulbovaite ̇.2016.Expertevaluationo
fdi-
agnostic instrument for personal and organizational value
congruence.
Journal of business ethics 136, 3 (2016), 481–501.
[44] Daniel S Weld and Gagan Bansal. 2018. Intelligible
Artifcial Intelli-
gence. arXiv preprint arXiv:1803.04263 (2018).
[45]
RayoungYang,EuniceShin,MarkW.Newman,andMarkS.Ackerma
n.
2015. When Fitness Trackers Don’T ’Fit’: End-user Difculties
in the Assessment of Personal Tracking Device Accuracy. In
Proc. UbiComp ’15. ACM, New York, NY, USA, 623–634.
Paper 3
Page 13
Discussion week 6
The readings this week expand on investigation and of digital
forensic analysis and investigations. Organizations, especially
those in the public, health and educational areas are bound by
legal and statutory requirements to protect data and private
information, therefore digital forensics analysis will be very
beneficial when security breaches do occur. Using this weeks
readings and your own research, discuss digital forensics and
how it could be used in a risk management program.
APA format 300 words with intext citations and references