Evaluating Usability and Privacy in Collaboration Settings with DUIs: Problem Analysis and Case Studies

  • Fatih Karatas
  • Mohamed Bourimi
  • Dogan Kesdogan
  • Pedro G. Villanueva
  • Habib M. Fardoun
Part of the Human–Computer Interaction Series book series (HCIS)


The construction of mature products considering needs of end-users leads to several challenges. Especially if various experts are involved in the evaluation of prototypes being built towards a final product, an efficient support becomes crucial. In this contribution we address how such a process could be efficiently performed by means of DUI technology. We address this primarily for our case studies concerned with evaluating privacy and its usability in collaborative settings. The main idea thereby focuses on the involvement of end-users and respective usability and security experts in co-located or distributed settings. We analyze two case studies (i.e. end-user driven cloud deployment and SocialTV) and discuss our findings. The chosen case studies reflect the advantage of two-sided DUI’s for collaboration support, namely, how to collaboratively evaluate usability of security and privacy measures in prototypes, which in their turn could have a collaborative nature.


Security Property Food Supply Chain Version Conflict Emergency Team Collaborative Setting 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work has been partially supported by the joint project ReSCUeIT, funded by the German Federal Ministry of Education and Research (BMBF) and the French L’Agence nationale de la recherché (ANR) under grant no. 13N10964. Further support was provided by the EU FP7 project, funded by the EC (FP7/2007–2013) under grant no. 257787 as well as the Spanish CDTI research project CENIT-2008-1019, the CICYT TIN2011-27767-C02-01 project and the regional projects with reference PPII10-0300-4172 and PIIC09-0185-1030.


  1. 1.
    Shneiderman, B., Plaisant, C., Cohen, M., & Jacobs, S. (2009). Designing the user interface: Strategies for effective human-computer interaction, 5 edn. In Shneiderman (Ed.).Google Scholar
  2. 2.
    Cranor, L., & Garfinkel, S. (2005). Security and usability. Sebastopol: O’Reilly Media.Google Scholar
  3. 3.
    Boyle, M., Neustaedter, C., & Greenberg, S. (2008). Privacy factors in video-based media spaces. In S. Harrision (Ed.), Media space: 20+ years of mediated life (pp. 99–124), Springer: London.Google Scholar
  4. 4.
    Palen, L., & Dourish, P. (2003). Unpacking “privacy” for a networked world. CHI’03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 129–136). ACM Press, New York.Google Scholar
  5. 5.
    Bourimi, M., & Kesdogan, D. (2013). Experiences by using affine for building collaborative applications for online communities. Proceedings of the 15th International Conference on Human-Computer Interaction.Google Scholar
  6. 6.
    Bourimi, M., Barth, T., Kesdogan, D., Abou-Tair, D. D. I., Hermann, F., & Thiel, S. (2012). Using distributed user interfaces in collaborative, secure, and privacy-preserving software environments. International Journal of Human-Computer Interaction, 28(11), 748–753.CrossRefGoogle Scholar
  7. 7.
    Karatas, F., Barth, T., Kesdogan, D., Fardoun, H., & Villanueva, P. G. (2012). Using distributed user interfaces to evaluate decision making in cloud deployment. Proceedings of the Distributed User Interfaces 2012 CHI Workshop, Held in Conjunction with 2012 CHI Conference. ISBN-10:84-695-3318-5.Google Scholar
  8. 8.
    Bourimi, M., Villanueva, P., Daanoun, Y., & Miran, M. (2012). Towards better support for collaborative research by using DUIs with mobile devices: SocialTV navigation design case study. Proceedings of the Distributed User Interfaces 2012 CHI Workshop, Held in Conjunction with 2012 CHI Conference. ISBN-10:84-695-3318-5.Google Scholar
  9. 9.
    Karatas, F., Bourimi, M., Barth, T., Kesdogan, D., Gimenez, R., Schwittek, W., & Planaguma, M. (2012). Towards secure and at-runtime tailorable customer-driven public cloud deployment. IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), (pp. 124–130).Google Scholar
  10. 10.
    Villanueva, P. G., Gallud, J. A., & Tesoriero, R. (2010). WallShare: A multi-pointer system for portable devices. AVI’10: Proceedings of the International Conference on Advanced Visual Interfaces. ACM Request Permissions.Google Scholar
  11. 11.
    Terrenghi, L., Quigley, A., & Dix, A. (2009). A taxonomy for and analysis of multi-person-display ecosystems. Personal and Ubiquitous Computing, 13, 583–598.CrossRefGoogle Scholar
  12. 12.
    Zanella, A., & Greenberg, S. (2001). Reducing interference in single display groupware through transparency. Proceedings of the Seventh Conference on European Conference on Computer Supported Cooperative Work. ECSCW’01 (pp. 339–358). Kluwer Academic, Norwell.Google Scholar
  13. 13.
    DiMicco, J. M., Hollenbach, K. J., Pandolfo, A., & Bender, W. (2007). The impact of increased awareness while face-to-face. Special Issue on Awareness Systems Design. Human-Computer Interaction, 22, 1.Google Scholar
  14. 14.
    Tse, E., Histon, J., Scott, S. D., & Greenberg, S. (2004). Avoiding interference: How people use spatial separation and partitioning in SDG workspaces. Proceedings of CSCW 2004 (pp. 252–261), ACM Press.Google Scholar
  15. 15.
    Morris, M., Paepcke, A., Winograd, T., & Stamberger, J. (2006). TeamTag: Exploring centralized versus replicated controls for co-located tabletop groupware. Proceedings of CHI 2006 (pp. 1273–1282), ACM Press.Google Scholar
  16. 16.
    Tang, A., Tory, M., Po, B., Neumann, P., & Carpendale, M. S. (2006). Collaborative coupling over tabletop displays. Proceedings of CHI 2006 (pp. 1181–1190), ACM Press.Google Scholar
  17. 17.
    Stewart, J., Bederson, B., & Druin, A. (1999). Single display groupware: A model for co-present collaboration. Proceedings of CHI ’99 (pp. 286–293), ACM Press.Google Scholar
  18. 18.
    Ichino, J., Takeuchi, K., & Isahara, H. (2006). Face-to-face single display groupware encouraging positive participation. Adjunct Proceedings of UIST 2006 (pp. 91–92), ACM Press.Google Scholar
  19. 19.
    Morris, M., Huang, A., Paepcke, A., & Winograd, T. (2006). Cooperative gestures: Multi-user gestural interactions for co-located groupware. Proceedings of CHI 2006 (pp. 1201–1210), ACM Press.Google Scholar
  20. 20.
    Konstantinou, A. V., Eilam, T., Kalantar, M., Totok, A. A., Arnold, W., & Snible, E. (2009). An architecture for virtual solution composition and deployment in infrastructure clouds. Proceedings of the 3rd International Workshop on Virtualization Technologies in Distributed Computing (pp. 9–18), ACM Press.Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Fatih Karatas
    • 1
  • Mohamed Bourimi
    • 1
  • Dogan Kesdogan
    • 1
  • Pedro G. Villanueva
    • 2
  • Habib M. Fardoun
    • 3
  1. 1.Information Systems Institute – IT Security GroupUniversity of SiegenSiegenGermany
  2. 2.Research Institute of InformaticsUniversity of Castilla-La ManchaAlbaceteSpain
  3. 3.Information Systems DepartmentKing Abdulaziz University (KAU)JeddahSaudi Arabia

Personalised recommendations