
John Sören PetterssonKarlstads Universitet · Karlstads Business School
John Sören Pettersson
PhD
About
51
Publications
3,814
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
418
Citations
Introduction
Publications
Publications (51)
First-year engineering students show difficulties in connecting basic vector algebra with manipulations using the graphical representation. Experiencing vectors in real applications can improve the process of learning vectors. Thus, we introduce a unique approach for using digital technologies, namely augmented reality. We utilized a video see-thro...
This case study describes a usability testing course in which students learn by practicing several evaluation methods. The on-campus format makes it possible for teachers and students to meet to discuss recorded test sessions and students can observe other students' execution of pilot studies conducted on campus. The COVID-19 pandemic placed new de...
Several researchers and contingency agencies have suggested good practices for crisis management exercises. Resource-constrained practitioners in the field report difficulties finding cost-efficient ways to maintain exercise cycles. This paper draws on experiences from working with professional crisis response coordinators who adapted material for...
After the COVID19 pandemic breakout that shifted priorities and agendas, the Mobile for Development (M4D) conference series has the pleasure to settle in Kigali, Rwanda, for its seventh (7th) edition, and to be held hybrid for the convenience and safety of its participants. The College of Science and Technology is delighted to host the conference l...
The adage practice makes perfect is well-known by safety coordinators and national contingency agencies. However, it has been reported that managers outside the rescue forces have difficulties finding the time to participate in exercises to become able members of their own organisations' crisis management teams. Moreover, trainers would welcome unc...
This book discusses the role of human computer interaction (HCI) design in fostering digital literacy and promoting socio-cultural acceptance and usage of the latest ICT innovations in developing countries. The book presents techniques, theories, case studies, and methodologies in HCI design approaches that have been used to foster digital literacy...
By a longitudinal account of applications of one Wizard-of-Oz supporting tool, Ozlab, this paper highlights the utility of such tools beyond ordinary design evaluation. The Wizard-of-Oz method does not only allow for performing user test evaluation of interaction designs not yet programmed. Rather, the versatility of a digital but manually controll...
Privacy notices and consent forms are the means of conveying privacy policy information to users. In Europe, a valid consent needs to be confirmed by a clear affirmative action. Despite previous research, it is not yet clear whether user engagement with consent forms via different types of interactions for confirming consent may play a significant...
The graphical and interactive design of a consent form helps individuals to keep control and pay attention to the information that they are disclosing. In the context of mobile apps we propose and test alternative interaction design solutions for selecting personal information on permission dialogues, namely using checkboxes, a drag-and-drop select...
Purpose
The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a secure and privacy-friendly manner. Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing t...
In this paper, we identify, analyze and propose generic requirements for software aiming at supporting crisis management training in local governments. The study builds on a Swedish-Norwegian R&D project based on a quadruple helix model. A design science approach was applied and the artifact presented in this paper is a list of generic requirements...
The aftermath of the Ebola Virus Disease (EVD) crisis in West Africa in 2014 was horrific. The EVD epidemic claimed 11,315 lives and had almost a 40 per cent killing rate. The EVD had huge negative effects on social, economic and political fronts of the four most affected countries Guinea, Liberia, Sierra Leone and Nigeria. Liberia was the country...
Engrafting support staff into dialogues between users and customer
support systems can compensate for system design flaws. Further, such dialogues can give grounds for system development. This article surveys the levels of interactivity of user support systems, where overt or covert support agents take an active part in the communication between a...
Engrafting support staff into dialogues between users and customer
support systems can compensate for system design flaws. Further, such dialogues can give grounds for system development. This article surveys the levels of interactivity of user support systems, where overt or covert support agents take an active part in the communication between a...
Only a few studies have addressed the users' conception of how fingerprint recognition used for different purposes on mobile devices works. This study contributes by investigating how different groups of individuals think that the fingerprint recognition works, why they think so, and also by pointing out differences in pin code and fingerprint issu...
In this paper we analyze and present the generic requirements identified for a software aiming at supporting crisis management training in local governments. The generic requirements are divided into overall requirements, requirements connected to the trainer’s role and requirements connected to the trainee’s role. Moreover, the requirements are ma...
This chapter presents GUI-ii, Graphical User Interface interaction interview, a method used to remotely discuss, develop and test GUI prototypes with users and stakeholders. Examples of such sessions are presented to demonstrate that the main benefit of GUI-ii is that this way of co-designing allows for interaction-informed discussions around funct...
Within a project developing cloud technology for identity access management, usability tests of the mock-up of a mobile app identity provider were conducted to assess Internet users’ consciousness of data disclosures in consent forms and their comprehension of the flow of authentication data. Results show that using one’s fingerprint for giving co...
Enhancing trust among service providers and end-users with respect to data protection is an urgent matter in the growing information society. In response, CREDENTIAL proposes an innovative cloud-based service for storing, managing, and sharing of digital identity information and other highly critical personal data with a demonstrably higher level o...
During the last years e-governance is being implemented in many countries. Within the same country, the level of achieved results can vary significantly between sectors. The implementation of e-governance in Republic of Moldova has had a good start, but some stagnation in the implementation of the e-governance agenda is registered. In the education...
Purpose
To fully grasp the potential of using social media, one must know what governments and citizens are communicating in these media. Despite much statistics published, there is a dearth of research analyzing information content in detail. The purpose of this paper is to identify the kind of information exchange that occurs between a local gov...
The Wizard-of-Oz method has been around for decades, allowing researchers and practitioners to conduct prototyping without programming. The extensive literature review in the field reported here, however, revealed that the re-usable tools supporting the method do not seem to last more than a few years. Generic systems started to appear around the t...
The Wizard-of-Oz method has been around for decades, allowing researchers and practitioners to conduct prototyping without programming. An extensive literature review conducted by the authors revealed, however, that the re-usable tools supporting the method did not seem to last more than a few years. While generic systems start to appear around the...
We present the result of a small-scale test in which the participants failed to understand the graphic scheme as well as the pictographic parts of the icons appearing in the Annex to Article 13a of the European Parliament legislative resolution of 12 March 2014 on the Proposal for a regulation of the European Parliament and of the Council on the pr...
This paper elaborates HCI (Human-Computer Interaction) requirements for making cloud data protection tools comprehensible and trustworthy. The requirements and corresponding user interface design principles are derived from our research and review work conducted to address in particular the following HCI challenges: How can the users be guided to b...
It is a well-established fact that the usability of a software package increases if it has been tested with users and usability
flaws have been corrected. However, this presentation does not focus on usability issues but on the effects of early user-testing
on software code quality determined as the number of errors discovered in function tests. In...
An important critical success factor for PRIME technology will be userfriendly and intelligible user interfaces that convey and enhance trust. Such user interfaces have to meet challenges such as:
User-friendly representation of complex PET concepts: PRIME and other privacy-enhancing technologies (PETs) are based on technical concepts or construct...
A critical success factor for Privacy-Enhancing Technologies (PETs), and for Privacy-Enhancing Identity Management in particular, will be user-friendly and intelligible user interfaces that are legally compliant and convey trust. Such user interfaces have to meet challenges such as the user-friendly representation of complex PET concepts (such as "...
Actes interdisciplinaires du colloque terminal du programme ASPHALES
In today’s information society, users have lost effective control over their personal spheres. Emerging pervasive computing technologies, where individuals are usually unaware of a constant data collection and processing in their surroundings, will even heighten this problem. It is, however critical, to our society and to democracy to retain and ma...
We present a complex function that we argue enhances the usefulness of so-called Privacy-Enhancing Technologies (PETs [4]).
The background for this conceptual development is PRIME, Privacy and Identity Management for Europe – an integrated EU project
within the Information Society Technology track of the 6th Framework Program [12]. The project is d...
Transparency is an important precondition for the users' control over their privacy. It can increase the users' trust in accurate and secure processing of their personal data. This paper presents concepts and implementations of different transparency tools, which are employed in a user-controlled identity management system of the project PRIME – Pr...
By 'Obligation Management' we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organisations' web pages, especially when data is directly collected from the user/customer. The paper demonstrates how users can influence rather than merely accept a privacy polic...
The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy an...
Electronic devices get more and more involved in many of our communication processes for personal and professional activities.
Each communication process may implicitly affect our privacy. An example may be the location trace of mobile phones. Experts
present identity management systems to preserve the user’s1 privacy [2]. In digital correspondence...
Specifying Requirements; Requirements Work in Multimedia Systems Development; Introducing Ozlab—A Simple Tool for Prototyping Interactivity; Challenges for Multimedia Requirements Work; Writing Requirements vs Visualizing Requirements; Requirements Specification by Content Professionals
Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research work that has been done within the first year of the European Union project on "Privacy and Identity Management for Europe" (PRIME). It primarily discusses and compares t...
A system for testing interaction design without the need for programming is described. This technique has the advantage of paper prototying allowing for rapid prototyping. In the same time it makes a prototype look real why it is possible to test the prototype as if it were a functioning piece of software.
The Ozlab set-up used in this study is intended to facilitate performance tests at a conceptual stage in the development of interactive multimedia products. Ozlab facilitates manual simulations of the interactivity of proposed user interfaces, thereby simplifying testing and making the development of ideas during test runs possible. Even non-progra...
This paper concerns certain aspects of writing in the computer era, aspects that are relevant to linguists but should also be of interest to people working with computer graphics and the human‐computer interface.Technology changes patterns of communication by introducing new means of communication, but it also changes our notion of human communicat...
This work addresses the problem of how writing is related to speech and how our notions of language are related to writing principles such as ‘the alphabetic principle’. The target of the study is the concept of ‘phonography’ (sound-writing, sometimes called ‘glottography’). This has been used in several theoretical works on writing, often with the...