Jessica Colnago's research while affiliated with Carnegie Mellon University and other places

Publications (11)

Conference Paper
Despite the additional protection it affords, two-factor authentication (2FA) adoption reportedly remains low. To better understand 2FA adoption and its barriers, we observed the deployment of a 2FA system at Carnegie Mellon University (CMU). We explore user behaviors and opinions around adoption, surrounding a mandatory adoption deadline. Our resu...
Conference Paper
Full-text available
Despite their ubiquity, many password meters provide inaccurate strength estimates. Furthermore, they do not explain to users what is wrong with their password or how to improve it. We describe the development and evaluation of a data-driven password meter that provides accurate strength measurement and actionable, detailed feedback to users. This...
Conference Paper
This paper presents an organized set of variables that can aid intelligent privacy agents in predicting the best and necessary moments to interrupt users in order to give them control and awareness over their privacy, avoiding information overload or over choice.
Conference Paper
Full-text available
Third places are a mix of home and work places, like cafes and community centers. They provide the neutral ground for people to freely socialize, forging community's cultural values, what allows the community life to flourish. With modern lifestyle leading people's socialization to deteriorate, we believe ICT can support the creation of a third pla...
Conference Paper
RESUMO O uso de aplicações interativas em espaços públicos está se tornando popular, transformando os displays públicos em mais que meros pôsteres digitais. Porém, ao lidar com interações em espaços públicos surgem novos desafios: desde como melhor distribuir o conteúdo na tela até como lidar com os valores sociais e pessoais. Há uma falta de relat...
Article
New forms of interactions such as the gesture-based control of interfaces could enable interaction in situations where hardware controls are missing and support impaired people where other controls fails. The rich spectrum of combining hand postures with movements offers great interaction possibilities but requires extensive user testing to figure...
Conference Paper
The design and implementation of multimodal interfaces that support a variety of modes to enable natural interaction is still limited. We propose a multimodal interaction web framework that considers on the one hand the current W3C standardization activities, such as Start Chart XML and the Model-Based UI Working Group. But on the other hand it imp...

Citations

... They can start recording conversations either maliciously or by a misconfiguration [23]. In addition, IoT devices contain several design flaws and vulnerabilities that may have devastating consequences on the privacy of users [20,24]. These design flaws may cause sensitive information, such as conversation recordings, to leak onto the internet. ...
... Where this is based on the language of users to and about VAs, such as the use of gendered pronouns, Festerling and Siraj note the difficulty in determining the actual meaning of what people say, recommending that "future research could be more critical of the role of language in anthropomorphism" (Festerling & Siraj, 2021). A related tension surfaces in the literature around CASA and findings that more human-like devices are automatically read by users as more capable devices (i.e. they are expected to display human capabilities (Cambre, Colnago, Maddock, Tsai, & Kaye, 2020)). ...
... Like other studies of 2FA [11], [21], [22], [27] they found that users consider 2FA often burdensome and slow, that convenience trumps perceived security, and that users do not always understand the risks that 2FA tries to remedy. Several works have studied 2FA problems in organizational contexts [7], [15], [25], [64], [72], [74] where the use of MFA can be mandated. While those studies show that many of the problems overlap with non-organizational settings, they could also shed new light on the positive influence of features such as device remembrance [25], [64] or better help and instructions. ...
... For this reason we need to lower the knowledge requirements for using the control and to make this knowledge available at the time it is needed to trigger a successful application of the required security behaviour (Parkin et al., 2019;Fogg, 2009). For instance, when users are prompted to change their password for an application or service, this trigger is used to explain why this is necessary, how to make a strong password and keep it safe, and why one should never reuse passwords between applications (Habib et al., 2017; also figure 1). ...
... This approach can help both users who would tend to choose passwords that are easy to remember, and those who are unsure of the strength of a specific password. These password meters are based, e.g., on basic heuristics [9,30], or on artificial neural networks approaches [21,29]. ...
... Individuals' notification preferences are more complex and also more diverse, ultimately requiring a more sophisticated set of configurations that users could choose from and also modify over time, as their preferences evolve. Here again we see opportunities for the use of AI-based privacy assistant functionality [23,58] that would adapt to their user's preferences over time, possibly through a combination of nudges designed to motivate users to think about options available to them [5,9] and dialogues designed to capture people's evolving preferences. Our study also uncovers how individuals' allow/deny preferences are distinct from their notification preferences. ...
... Memarovic et al. (2014) associate this experience with the creation of discussion groups on Facebook, suggesting that this behavior is a clue to the similarity between the way people tend to deal with others in physical and virtual sites, blurring the distinction between physical and virtual world. Memarovic et al. (2014) and Ferreira et al. (2014b) argue that using ICT to promote thirdplaceness experience can give communities more opportunities to strength their identity and ties. Furthermore, thirdplaceness experience can transform the location in a third place for a moment or, sometimes, permanently. ...
... Duas formas promissoras de interação multimodal são o rastreamento de cabeça e comandos de voz, uma vez que a informação mais está cada vez gerando a pervasiva, oportunidade das pessoas interagirem com essas informações de forma mais colaborativa e em ambientes públicos [4], o uso do mouse e teclado dificulta a interação. Além disso, Valkanova et al. [5,6] mostra resultados que indicam que as formas não convencionais de interação em ambientes públicos despertam o interesse e a atenção do usuário em discutir e compartilhar pontos de vista. ...
... Researchers commonly refer to SCXML state charts in the context of multimodal interaction [3,4]. Its use extends to mobile devices, smart homes, robots and AAL contexts. ...
... • Colored markers: to track a specific body part a common approach is the use of a colored marker. For instance a colored glove to track a user hand and segmenting it by thesholding in a color space model [27], [28], [29], [30]. ...