Skip to main content

Part of the book series: Human-Computer Interaction Series ((HCIS,volume 2))

  • 117 Accesses

Abstract

Human-computer interaction is characterized by a vast number of frequently occurring actions. This is partly due to an increase in the amount of information being presented. A certain segment of information being presented is usually needed by only a small number of users. A small segment is usually needed by almost all users and parts of the remaining segment are of use to some users but not to all1. The average user might face the following problems in using general-purpose software (i.e., software produced for many users):

  • unneeded information is presented (information overload)

  • desired information is missing (subjective information need)

  • needed information is missing (objective information need).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beside the adaptation of the amount and structure of information which is to be presented (see [Brusilovsky, 1998]) also the functionality of the software system used can be adapted. See [Linton et al., 1999] for discussion of the usage and adaptations of a general text processing software.

    Google Scholar 

  2. For instance, the use of several pseudonyms per patient which cannot be interlinked can be applied for different areas of treatment [Borking, 1998]. Further limitations for the processing of the data can be achieved through application of the least privilege and separation of duties principles (see p. 118).

    Google Scholar 

  3. To avoid the construction he/she (his/her) when concerning the user, the masculine or plural pronouns will be used.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Schreck, J. (2003). Introduction. In: Security and Privacy in User Modeling. Human-Computer Interaction Series, vol 2. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-0377-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-94-017-0377-2_1

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-6223-9

  • Online ISBN: 978-94-017-0377-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics