Vincent KoenigUniversity of Luxembourg · human computer interaction
Vincent Koenig
PhD
About
93
Publications
30,518
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,310
Citations
Publications
Publications (93)
Organizations adopt a combination of measures to defend against phishing attacks that pass through technical filters. However, employees' engagement with these countermeasures often does not meet security experts' expectations. To explore what motivates and discourages employees from engaging with user-oriented phishing interventions, we conducted...
The rise of online experiences in the domain of cultural heritage offers new forms of interaction that are no longer limited by the physical presence of museums. However, sustaining online visitors’ engagement is challenging, and museum professionals seek to understand how to increase motivation. We conducted a user study (N = 32) of three museum w...
HCI researchers are increasingly concerned about the prevalence of manipulative design strategies in user interfaces, commonly referred to as "dark patterns". The line between manipulation and persuasion strategies is often blurred, leading to legal and ethical concerns. This paper examines the tension between persuasive UX practices and manipulati...
While existing approaches for assessing passenger experience are often limited to surveys of customer satisfaction, societal and technological challenges push the railway industry to adopt a user-centric approach to the design of their service. We used the love and breakup method in a study involving N = 53 passengers making a declaration to their...
A variety of methods and techniques are used in usable privacy and security (UPS) to study users’ experiences and behaviors. When applying empirical methods, researchers in UPS face specific challenges, for instance, to represent risk to research participants. This chapter provides an overview of the empirical research methods used in UPS and highl...
When flying robots are used in close-range interaction with humans, the noise they generate, also called consequential sound, is a critical parameter for user acceptance. We conjecture that there is a benefit in adding natural sounds to noisy domestic drones. To test our hypothesis experimentally, we carried out a mixed-methods research study (N=56...
App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this consent valid, users need to understand the underlying reasons and judge the relevance of disclosing data in line with their own use of an app. T...
App permission requests are a control mechanism meant to help users oversee and safeguard access to data and resources on their smartphones. To decide whether to accept or deny such requests and make this consent valid, users need to understand the underlying reasons and judge the relevance of disclosing data in line with their own use of an app. T...
Research in human–computer interaction (HCI) has identified meaning as an important, yet poorly understood concept in interaction design contexts. Central to this development is the increasing emphasis on designing products and technologies that promote leisure, personal fulfillment, and well-being. As spaces of profound historical significance and...
Research in HCI and design position empathy as a key factor of a successful user-centred approach, supported by the emergence of empathic design methods. However, there is a dearth of empathy measurement tools to investigate the actual ability of design methods to trigger empathy among designers and beyond within the organization. For service stake...
Designers incorporate values in the design process that raise risks for vulnerable groups. Persuasion in user interfaces can quickly turn into manipulation and become potentially harmful for those groups in the realm of intellectual disabilities, class, or health, requiring proactive responsibility approaches in design. Here we introduce the Capabi...
Designers incorporate values in the design process that raise risks for vulnerable groups. Persuasion in user interfaces can quickly turn into manipulation and become potentially harmful for those groups in the realm of intellectual disabilities, class, or health, requiring proactive responsibility approaches in design. Here we introduce the Capabi...
The novel coronavirus spurred a keen interest in digital technologies for museums as both cultural professionals and the public took notice of their uses and limitations throughout the confinement period. In this study, we investigated the use of digital technologies by museums during a period when in-person interaction was not possible. The aim of...
Learning and assessment are increasingly mediated by digital technologies. Thus, learners’ experiences with these digital technologies are growing in importance, as they might affect learning and assessment. The present paper explores the impact of user experience on digital concept mapping. It builds on user experience theory to explain variance i...
An ongoing discussion in the field of usable privacy and security debates whether security mechanisms should be visible to end-users during interactions with technology, or hidden away. This paper addresses this question using a mixed-methods approach, focusing on encryption as a mechanism for confidentiality during data transmission on a smartphon...
Usable privacy and security researchers have developed a variety of approaches to represent risk to research participants. To understand how these approaches are used and when each might be most appropriate, we conducted a systematic literature review of methods used in security and privacy studies with human participants. From a sample of 633 pape...
Child-Computer Interaction (CCI) is a steadily growing field that focuses on children as a prominent and emergent user group. For more than twenty years, the Interaction Design for Children (IDC) community has developed, extended, and advanced research and design methods for children’s involvement in designing and evaluating interactive technologie...
As digital cultural collections become increasingly sophisticated in their scope and functionality, there is a need to build an in-depth understanding concerning the information behaviors of users in this new domain. Research has demonstrated that many digital museum visitors are engaged in casual leisure during exploration of a collection, suggest...
Online services pervasively employ manipulative designs (i.e., dark patterns) to influence users to purchase goods and subscriptions, spend more time on-site, or mindlessly accept the harvesting of their personal data. To protect users from the lure of such designs, we asked: are users aware of the presence of dark patterns? If so, are they able to...
When communication about security to end users is ineffective, people frequently misinterpret the protection offered by a system. The discrepancy between the security users perceive a system to have and the actual system state can lead to potentially risky behaviors. It is thus crucial to understand how security perceptions are shaped by interface...
Privacy is a timely topic that is increasingly scrutinized in the public eye. In spite of privacy and security breaches, people still frequently compromise their privacy in exchange for certain benefits of a technology or a service. This study builds on both technology acceptance (TA) and User Experience (UX) research in order to explore and build...
With the growing importance of digital technologies in learning and assessment, it is important to consider user experience (UX) to ensure that tools provide useful functionalities for learning without overwhelming users, to motivate users and ensure that they have positive learning experiences, and to allow users to realize their potential with th...
This paper presents a mobile application for vote-casting and vote-verification based on the Selene e-voting protocol and explains how it was developed and implemented using the User Experience Design process. The resulting interface was tested with 38 participants, and user experience data was collected via questionnaires and semi-structured inter...
An unsolved debate in the field of usable security concerns whether security mechanisms should be visible, or black-boxed away from the user for the sake of usability. However, tying this question to pragmatic usability factors only might be simplistic. This study aims at researching the impact of displaying security mechanisms on User Experience (...
“I hope that this survey is a joke because it made me laugh so much”. This quote is just one example of many negative respondents’ reactions gathered during a large-scale user experience (UX) study. Unfortunately, the survey was no joke, rather a well-constructed and validated standardized UX scale. This paper critically reflects on the use and rel...
Higher education institutions are facing new educational challenges and are striving for an evolution in pedagogical practices. This evolution is accompanied by the need for innovative learning spaces to support students in the development of " 21 st century skills ". Designing these spaces requires a deep understanding of learners' needs and exper...
In the " third wave " of human-computer interaction (HCI), the advent of the conceptual approach of UX broadens and changes the HCI landscape. Methods approved before, mainly within the conceptual approach of usability, are still widely used, and yet their adequacy for UX evaluation remains uncertain in many applications. Laboratory testing is undo...
Innovative in-car applications provided on smartphones can deliver real-time alternative mobility choices and subsequently generate visual-manual demand. Prior studies have found that multi-touch gestures such as kinetic scrolling are problematic in this respect. In this study we evaluate three prototype tasks which can be found in common mobile in...
Inspired by the root cause analysis techniques that in the field of safety research and practice help investigators understand the reasons of an incident, this paper investigates the use of root cause analysis in security. We aim at providing a systematic method for the security analyst to identify the socio-technical attack modes that can potentia...
In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified mobile application Commutastic that offers users incentives to undertake after work activities. With Commutastic we try to persuade users to chan...
Introduction - Alors que l’évaluation de l’expérience utilisateur (UX) est au cœur des préoccupations dans le domaine des interactions homme–machine, aucun outil d’évaluation auto-administré valide de l’UX n’existe actuellement en langue française. Le questionnaire AttrakDiff 2 (Hassenzahl, Burmester, & Koller, 2003) est un outil d’évaluation de l’...
In the future autonomous vehicles will drive on our roads. It is unlikely that we will immediately move from manual to fully autonomous vehicles, instead the mix will change over time and include a large number of semi-autonomous vehicles. As a result human drivers will need to take over in specific situations (e.g., when sensors fail) and there wi...
We study whether the padlock and the signal strength bars, two visual cues shown in network managers, convey their intended messages. Since users often choose insecure networks when they should not, finding the answer is not obvious; in our study we clarify whether the problem lies in uninformative and ambiguous cues or in the user who, despite und...
This report documents the program and the outcomes of Dagstuhl Seminar 14491 "Socio-Technical Security Metrics". In the domain of safety, metrics inform many decisions, from the height of new dikes to the design of nuclear plants. We can state, for example, that the dikes should be high enough to guarantee that a particular area will flood at most...
This chapter explores a novel methodology used to develop gamified mobility applications for a heavily congested European city. The methodology consists of three elements: a metaphorical traffic game, a complex and comprehensive mobility logging approach and two focus groups. The daily commute is explained as part of a real life traffic game that c...
Many methods and tools have been proposed to assess the User Experience (UX) of interactive systems. However, while researchers have empirically studied the relevance and validity of several UX evaluation methods, few studies only have explored expert-based evaluation methods for the assessment of UX. If experts are able to assess something as comp...
This paper focuses on the user-centered design of a computer-based assessment (CBA) instrument for knowledge measurement. We describe relevant design steps in general and illustrate them via the design of our usability improved CBA concept map instrument (ISO 9241-11, 1998; ISO 9241-210, 2010). We discuss design versus evaluation methods from a hum...
We present a socio-technical analysis of security of Hotspot and Hotspot 2.0. The analysis focuses is user-centric, and aim at understanding which user action can compromise security in presence of a attacker. We identify research questions about possible factors that may affect user's security decisions, and propose experiments to answer them.
We propose an operational framework for a social, technical and contextual analysis of security. The framework provides guidelines about how to model a system as a layered set of interacting elements, and proposes two methodologies to analyse technical and social vulnerabilities. We show how to apply the framework in a use case scenario.
In this paper we present the DriveLab IVIS testing platform which allows for the same experiments to be conducted both under simulator and real car conditions. Other key aspects of DriveLab is that it is highly modular (therefore allowing the exchange or integration of different components) and that it supports more than one driver. For example we...
The Driver Diaries are a mobility behaviour logging methodology, consisting of an online survey, a mobile application and focus group interviews. They are used to collect data about mobility behaviour, routines and motivations of commuters in Luxembourg. The paper focuses on design and development of the Driver Diaries and it explores the use of th...
We study trust and context as factors influencing how people choose wireless network names. Our approach imagines the mindset of a hypothetical attacker whose goal is to ensnare unsuspecting victims into accessing dishonest WiFi access points. For this purpose, we conducted an online survey. We used two separate forms. The first form asked a random...
RÉSUMÉ Depuis une dizaine d'années, le concept d'expérience utilisateur (UX) se répand dans le domaine des Interactions Homme-Machine (IHM). Centré sur l'utilisateur et son expérience subjective vécue de l'interaction avec un système interactif, l'UX s'intéresse, entre autres, aux aspects émotionnels, hédoniques ou encore esthétiques composant l'in...
Authenticating web identities with TLS certificates is a typical problem whose security depends on both technical and human aspects, and that needs, to be fully grasped, a socio-technical analysis. We performed such an analysis, and in this paper we comment on the tools and methodology we found appropriate. We first analysed the interaction ceremon...
In order to study how the notion of User Experience (UX) evolved over the last few years, an international survey originally conducted in 2008 by Law et al. [1] has been replicated. Its main goal was to get some insights on the points of view from practitioners on the notion of UX. After having slightly adapted the initial (English) survey and havi...
In this paper the authors explain the use of gamification as a way to optimize mobility patterns within a heavily congested European City. They explore this from two perspectives, first by outlining a gaming concept and secondly by explaining how the use of a mobility game that took place in two locations can be used to explore incentives and desig...
The following paper presents a review of the ethical, privacy and trust aspects relating to pervasive gaming in particular within the domain of traffic congestion. The paper deals explicitly with the challenges involved that fall between the gaps standard ethical practice and scientific research when studies comprise of those in the lab (where coll...
In this paper we provide an overview of the I-GEAR
(incentives and gaming environments for automobile
routing) project that is intended to reduce traffic
congestion in Luxembourg through the use of
persuasive gaming. In order to illustrate some of the
issues involved we also present an outline concept of a
live game in which we propose to encourage...
In this paper we present a novel concept that deals specifically with changing driver behaviour in order to reduce traffic congestion. The project I-GEAR (incentives and gaming environments for automobile routing) aims to understand the motivations that drivers have while undertaking the daily commute and then to provide them with a range of incent...
This paper presents an architecture and partially built simulation platform which is designed to offer a flexible open ended approach for conducting laboratory experiments. The emphasis is on supporting multiple drivers and the ability to swap in and out different software components and devices.
This paper concerns the development of an action-research diary for teachers, responding to their need for a learning a methodology that gives them self-control. This leads to their empowerment as social actors, and consequently enables them to transform themselves as well as their environment. The software is pre-tested and afterwards these users...
La méthodologie du card-sorting a été utilisée dans le cadre d'un processus de restruc-turation de multiples sites Internet et Intranet d'une grande entreprise en vue d'élabo-rer un portail unique. Cette méthodologie offre la possibilité d'investiguer la structure des informations indépendamment des comportements de navigation. La complémenta-rité...