Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jinjuan Feng is active.

Publication


Featured researches published by Jinjuan Feng.


Behaviour & Information Technology | 2004

Empathy and online interpersonal trust: A fragile relationship

Jinjuan Feng; Jonathan Lazar; Jenny Preece

The rapid growth of personal email communication, instant messaging and online communities has brought attention to the important role of interpersonal trust in online communication. An empirical study was conducted focusing on the effect of empathy on online interpersonal trust in textual IM. To be more specific, the relationship between empathic accuracy, response type and online interpersonal trust was investigated. The result suggests both empathic accuracy and response type have significant influence on online interpersonal trust. The interaction between empathic accuracy and response type also significantly influences online trust. Interestingly, the results imply a relationship between daily trust attitude and online interpersonal trust. People who are more trusting in their daily life may experience more difficulty in developing trust online. There is also some evidence to suggest that different communication scenarios may have an influence on online trust.


symposium on usable privacy and security | 2005

Usable security and privacy: a case study of developing privacy management tools

Carolyn Brodie; Clare-Marie Karat; John Karat; Jinjuan Feng

Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980s and 1990s. Design to make information easily accessible, without particular attention to issues such as whether an individual had a desire or right to control access to and use of particular information was seen as the more pressing goal. We believe that there will be an increasing awareness of a fundamental need to address privacy concerns in information technology, and that doing so will require an understanding of policies that govern information use as well as the development of technologies that can implement such policies. The research reported here describes our efforts to design a privacy management workbench which facilitates privacy policy authoring, implementation, and compliance monitoring. This case study highlights the work of identifying organizational privacy requirements, analyzing existing technology, on-going research to identify approaches that address these requirements, and iteratively designing and validating a prototype with target users for flexible privacy technologies.


International Journal of Human-computer Studies \/ International Journal of Man-machine Studies | 2005

Privacy in information technology: designing to enable privacy policy management in organizations

John Karat; Clare-Marie Karat; Carolyn Brodie; Jinjuan Feng

As information technology continues to spread, we believe that there will be an increasing awareness of a fundamental need to address privacy concerns, and that doing so will require an understanding of policies that govern information use accompanied by development of technologies that can implement such policies. The research reported here describes our efforts to design a system which facilitates privacy policy authoring, implementation, and compliance monitoring. We employed a variety of user-centered design methods with 109 target users across the four steps of the research reported here. This case study highlights the work of identifying organizational privacy requirements, iteratively designing and validating a prototype with target users, and conducting laboratory tests to guide specific design decisions to meet the needs of providing flexible privacy enabling technologies. Each of the four steps in our work is identified and described, and directions for future work in privacy are suggested.


human factors in computing systems | 2006

Evaluating interfaces for privacy policy rule authoring

Clare-Marie Karat; John Karat; Carolyn Brodie; Jinjuan Feng

Privacy policy rules are often written in organizations by a team of people in different roles. Currently, people in these roles have no technological tools to guide the creation of clear and implementable high-quality privacy policy rules. High-quality privacy rules can be the basis for verifiable automated privacy access decisions. An empirical study was conducted with 36 users who were novices in privacy policy authoring to evaluate the quality of rules created and user satisfaction with two experimental privacy authoring tools and a control condition. Results show that users presented with scenarios were able to author significantly higher quality rules using either the natural language with a privacy rule guide tool or a structured list tool as compared to an unguided natural language control condition. The significant differences in quality were found in both user self-ratings of rule quality and objective quality scores. Users ranked the two experimental tools significantly higher than the control condition. Implications of the research and future research directions are discussed.


ACM Transactions on Accessible Computing | 2010

Computer Usage by Children with Down Syndrome: Challenges and Future Research

Jinjuan Feng; Jonathan Lazar; Libby Kumin; A. Ant Ozok

Children with Down syndrome, like neurotypical children, are growing up with extensive exposure to computer technology. Computers and computer-related devices have the potential to help these children in education, career development, and independent living. Our understanding of computer usage by this population is quite limited. Most of the software, games, and Web sites that children with Down syndrome interact with are designed without consideration of their special needs, making the applications less effective or completely inaccessible. We conducted a large-scale survey that collected computer usage information from the parents of approximately six hundred children with Down syndrome. This article reports the text responses collected in the survey and is intended as a step towards understanding the difficulties children with Down syndrome experience while using computers. The relationship between the age and the specific type of difficulties, as well as related design challenges are also reported. A number of potential research directions and hypotheses are identified for future studies. Due to limitations in survey methodology, the findings need to be further validated through hypothesis-driven, empirical studies.


Universal Access in The Information Society | 2001

Productivity, satisfaction, and interaction strategies of individuals with spinal cord injuries and traditional users interacting with speech recognition software

Andrew Sears; Clare-Marie Karat; Kwesi Oseitutu; Azfar S. Karimullah; Jinjuan Feng

Abstract.Speech recognition is an important technology that is becoming increasingly effective for dictation-oriented activities. While recognition accuracy has increased dramatically in recent years, recent studies confirm that traditional computer users are still faster using a keyboard and mouse and spend more time correcting errors than dictating. Further, as these users become more experienced they frequently adopt multimodal strategies that require the keyboard and mouse when correcting errors. While speech recognition can be a convenient alternative for traditional computer users, it can be a powerful tool for individuals with physical disabilities that limit their ability to use a keyboard and mouse. However, research into the performance, satisfaction, and usage patterns of individuals with physical disabilities has not been reported. In this article, we report on a study that provides initial insights into the efficacy of existing speech recognition systems with respect to individuals with physical disabilities. Our results confirm that productivity does not differ between traditional users and those with physical disabilities. In contrast, numerous differences were observed when users rated their satisfaction with the system and when usage patterns were analyzed.


conference on computers and accessibility | 2008

Computer usage by young individuals with down syndrome: an exploratory study

Jinjuan Feng; Jonathan Lazar; Libby Kumin; A. Ant Ozok

In this paper, we discuss the results of an online survey that investigates how children and young adults with Down syndrome use computers and computer-related devices. The survey responses cover 561 individuals with Down syndrome between the age of four to 21. The survey results suggest that the majority of the children and young adults with Down syndrome can use the mouse to interact with computers, which requires spatial, cognitive, and fine motor skills that were previously believed to be quite challenging for individuals with Down syndrome. The results show great difficulty in text entry using keyboards. Young individuals with Down syndrome are using a variety of computer applications and computer related devices, and computers and computer-related devices play important roles in the life of individuals with Down syndrome. There appears to be great potential in computer-related education and training to broaden existing career opportunities for individuals with Down syndrome, and there needs to be further research on this topic.


Foundations and Trends in Human-computer Interaction | 2007

Understanding Web Credibility: A Synthesis of the Research Literature

Jonathan Lazar; Gabriele Meiselwitz; Jinjuan Feng

As more of our communication, commerce, and personal data goes online, credibility becomes an increasingly important issue. How do we determine if our e-commerce sites, our healthcare sites, or our online communication partners are credible? This paper examines the research literature in the area of web credibility. This review starts by examining the cognitive foundations of credibility. Other sections of the paper examine not only the general credibility of web sites, but also online communication, such as e-mail, instant messaging, and online communities. Training and education, as well as future issues (such as CAPTCHAs and phishing), will be addressed. The implications for multiple populations (users, web developers, browser designers, and librarians) will be discussed.


Universal Access in The Information Society | 2010

Accessible privacy and security: a universally usable human-interaction proof tool

Graig Sauer; Jonathan Holman; Jonathan Lazar; Harry Hochheiser; Jinjuan Feng

Despite growing interest in designing usable systems for managing privacy and security, recent efforts have generally failed to address the needs of users with disabilities. As security and privacy tools often rely upon subtle visual cues or other potentially inaccessible indicators, users with perceptual limitations might find such tools particularly challenging. To understand the needs of an important group of users with disabilities, a focus group was conducted with blind users to determine their perceptions of security-related challenges. Human-interaction proof (HIP) tools, commonly known as CAPTCHAs, are used by web pages to defeat robots and were identified in the focus group as a major concern. Therefore, a usability test was conducted to see how well blind users were able to use audio equivalents of these graphical tools. Finally, an accessible HIP tool was developed which combines audio and matching images, supporting both visual and audio output. Encouraging results from a small usability evaluation of the prototype with five sighted users and five blind users show that this new form of HIP is preferred by both blind and visual users to previous forms of text-based HIPs. Future directions for research are also discussed.


international conference on human computer interaction | 2005

Designing natural language and structured entry methods for privacy policy authoring

John Karat; Clare-Marie Karat; Carolyn Brodie; Jinjuan Feng

As information technology continues to spread, we believe that there will be an increasing awareness of a fundamental need to seriously consider privacy concerns, and that doing so will require an understanding of policies that govern information use accompanied by development of technologies that can implement such policies. The research reported here describes our efforts to design a system which facilitates effective privacy policy authoring, implementation, and compliance monitoring. We employed a variety of user-centered design methods with 109 target users across the four steps of the research reported here. This case study highlights our work to iteratively design and validate a prototype with target users, and presents a laboratory evaluation aimed at providing early support for specific design decisions to meet the needs of providing flexible privacy enabling technologies. This paper highlights our work to include natural language and structured entry methods for policy authoring.

Collaboration


Dive into the Jinjuan Feng's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Libby Kumin

Loyola University Maryland

View shared research outputs
Top Co-Authors

Avatar

Min Lin

University of Maryland

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge