Papers
She'll just grab any device that's closer
Many technologies assume a single user will use an account or device. But account and device shar... more Many technologies assume a single user will use an account or device. But account and device sharing situations (when 2+ people use a single device or account) may arise during everyday life. We present results from a multiple-methods study of device and account sharing practices among household members and their relations. Among our findings are that device and account sharing was common, and mobile phones were often shared despite being considered "personal" devices. Based on our study results, we organize sharing practices into a taxonomy of six sharing types-distinct patterns of what, why, and how people shared. We also present two themes that cut across sharing types: that (1) trust in sharees and (2) convenience highly influenced sharing practices. Based on these findings, we discuss implications for study and technology design.
Save to libraryDownloadCompare citation rank
Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors
In addition to storing a plethora of sensitive personal and work information, smartphones also st... more In addition to storing a plethora of sensitive personal and work information, smartphones also store sensor data about users and their daily activities. In order to understand users ’ behaviors and attitudes towards the security of their smartphone data, we con-ducted 28 qualitative interviews. We examined why users choose (or choose not) to employ locking mechanisms (e.g., PINs) and their perceptions and awareness about the sensitivity of the data stored on their devices. We performed two additional online exper-iments to quantify our interview results and the extent to which sen-sitive data could be found in a user’s smartphone-accessible email archive. We observed a strong correlation between use of secu-rity features and risk perceptions, which indicates rational behav-ior. However, we also observed that most users likely underesti-mate the extent to which data stored on their smartphones pervades their identities, online and offline.
Save to libraryDownloadCompare citation rank
Emerging TV Experiences: How VR, Voice, and Young Audiences Have Changed the Landscape of TV Experiences
Save to libraryCompare citation rank
Emerging TV Experiences: How VR, Voice, and Emerging Audiences Have Changed the TV Landscape
Proceedings of the 2017 ACM International Conference on Interactive Experiences for TV and Online Video, 2017
At TVX 2015, we led an interactive workshop to explore how people, contexts, and multi-device exp... more At TVX 2015, we led an interactive workshop to explore how people, contexts, and multi-device experiences contribute to a changed landscape of TV watching behaviors. Since then, the television and video industry has developed new technologies and attracted an ever-growing audience. This one-day, interactive workshop at TVX 2017 will bring together academics and professionals to update the framework, and to understand the challenges and opportunities associated with technological developments in VR/360 video and voice interactions, and a new focus on audiences such as kids, teens, and emerging markets.
Save to libraryCompare citation rank
She'll just grab any device that's closer
by Kerwell Liao and A. Turner
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16, 2016
Save to libraryCompare citation rank
Are You Ready to Lock?
by Kerwell Liao, Serge Egelman, and Rebecca Portnoff
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14, 2014
Save to libraryCompare citation rank
Online microsurveys for user experience research
Proceedings of the extended abstracts of the 32nd annual ACM conference on Human factors in computing systems - CHI EA '14, 2014
ABSTRACT This case study presents a critical analysis of microsurveys as a method for conducting ... more ABSTRACT This case study presents a critical analysis of microsurveys as a method for conducting user experience research. We focus specifically on Google Consumer Surveys (GCS) and analyze a combination of log data and GCSs run by the authors to investigate how they are used, who the respondents are, and the quality of the data. We find that such microsurveys can be a great way to quickly and cheaply gather large amounts of survey data, but that there are pitfalls that user experience researchers should be aware of when using the method.
Save to libraryCompare citation rank
One university, two campuses
by Laura Forlano and Kerwell Liao
Proceedings of the 2012 iConference on - iConference '12, 2012
Save to libraryDownloadCompare citation rank
She'll just grab any device that's closer
Many technologies assume a single user will use an account or device. But account and device shar... more Many technologies assume a single user will use an account or device. But account and device sharing situations (when 2+ people use a single device or account) may arise during everyday life. We present results from a multiple-methods study of device and account sharing practices among household members and their relations. Among our findings are that device and account sharing was common, and mobile phones were often shared despite being considered "personal" devices. Based on our study results, we organize sharing practices into a taxonomy of six sharing types-distinct patterns of what, why, and how people shared. We also present two themes that cut across sharing types: that (1) trust in sharees and (2) convenience highly influenced sharing practices. Based on these findings, we discuss implications for study and technology design.
Save to libraryDownloadCompare citation rank
Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors
In addition to storing a plethora of sensitive personal and work information, smartphones also st... more In addition to storing a plethora of sensitive personal and work information, smartphones also store sensor data about users and their daily activities. In order to understand users ’ behaviors and attitudes towards the security of their smartphone data, we con-ducted 28 qualitative interviews. We examined why users choose (or choose not) to employ locking mechanisms (e.g., PINs) and their perceptions and awareness about the sensitivity of the data stored on their devices. We performed two additional online exper-iments to quantify our interview results and the extent to which sen-sitive data could be found in a user’s smartphone-accessible email archive. We observed a strong correlation between use of secu-rity features and risk perceptions, which indicates rational behav-ior. However, we also observed that most users likely underesti-mate the extent to which data stored on their smartphones pervades their identities, online and offline.
Save to libraryDownloadCompare citation rank
Emerging TV Experiences: How VR, Voice, and Young Audiences Have Changed the Landscape of TV Experiences
Save to libraryCompare citation rank
Emerging TV Experiences: How VR, Voice, and Emerging Audiences Have Changed the TV Landscape
Proceedings of the 2017 ACM International Conference on Interactive Experiences for TV and Online Video, 2017
At TVX 2015, we led an interactive workshop to explore how people, contexts, and multi-device exp... more At TVX 2015, we led an interactive workshop to explore how people, contexts, and multi-device experiences contribute to a changed landscape of TV watching behaviors. Since then, the television and video industry has developed new technologies and attracted an ever-growing audience. This one-day, interactive workshop at TVX 2017 will bring together academics and professionals to update the framework, and to understand the challenges and opportunities associated with technological developments in VR/360 video and voice interactions, and a new focus on audiences such as kids, teens, and emerging markets.
Save to libraryCompare citation rank
She'll just grab any device that's closer
by Kerwell Liao and A. Turner
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI '16, 2016
Save to libraryCompare citation rank
Are You Ready to Lock?
by Kerwell Liao, Serge Egelman, and Rebecca Portnoff
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14, 2014
Save to libraryCompare citation rank
Online microsurveys for user experience research
Proceedings of the extended abstracts of the 32nd annual ACM conference on Human factors in computing systems - CHI EA '14, 2014
ABSTRACT This case study presents a critical analysis of microsurveys as a method for conducting ... more ABSTRACT This case study presents a critical analysis of microsurveys as a method for conducting user experience research. We focus specifically on Google Consumer Surveys (GCS) and analyze a combination of log data and GCSs run by the authors to investigate how they are used, who the respondents are, and the quality of the data. We find that such microsurveys can be a great way to quickly and cheaply gather large amounts of survey data, but that there are pitfalls that user experience researchers should be aware of when using the method.
Save to libraryCompare citation rank
One university, two campuses
by Laura Forlano and Kerwell Liao
Proceedings of the 2012 iConference on - iConference '12, 2012
Save to libraryDownloadCompare citation rank