Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Steve Draper is active.

Publication


Featured researches published by Steve Draper.


Software - Practice and Experience | 2003

The pervasiveness of evolution in GRUMPS software

Huw Evans; Malcolm P. Atkinson; Margaret I. Brown; Julie Cargill; Murray Crease; Steve Draper; Philip D. Gray; Richard C. Thomas

This paper describes the evolution of the design and implementation of a distributed run‐time system that itself is designed to support the evolution of the topology and implementation of an executing, distributed system. The three different versions of the run‐time architecture that have been designed and implemented are presented, together with how each architecture addresses the problems of topological and functional evolution. In addition, the reasons for the rapid evolution of the design and implementation of the architecture are also described.


CADUI | 2005

A Distributed Usage Monitoring System

Philip D. Gray; Iain McLeod; Steve Draper; Murray Crease; Richard C. Thomas

We are developing a distributed computer system that supports usability and interaction studies, by handling the collection, storage and analysis of usage data, such as that generated by user-computer interaction and associated sensing devices (e.g., cameras). Data sources may be distributed as may be the data repositories and data consumers (other computer processes and human investigators). The system supports dynamic configuration of the entire process, including changes in the goals of the investigation itself. In this paper we describe the system’s key features, including a generic and evolvable data transport and processing network, a set of tools for capturing and cleaning usage data, a tool for instrumenting software for data capture, and a system for managing the entire process. We also report on several trials of the system, identifying successes, failures, lessons learned and areas for future development.


australasian computer-human interaction conference | 2017

Towards thriving: extending computerised cognitive behavioural therapy

Cara Wilson; Steve Draper; Margot Brereton; D. Johnson

Positive Psychology suggests that every one of us has the potential to increase our psychological wellbeing, while Positive Computing endeavours to develop technologies to support wellbeing and human potential. One such technology, Computerised Cognitive Behavioural Therapy (CCBT), has been found to be effective in increasing wellbeing for individuals with diagnosed mental health conditions. However, its ability to improve wellbeing in people without pre-existing mental health conditions is less well understood. To explore use in this population, an 8-week long user trial of a CCBT programme was conducted. Results provided insight into CCBTs ability to; increase subjective wellbeing; increase empathy for individuals who do experience mental health conditions; enhance self-reflection; increase positive behaviour change; and increase motivation to action. In lieu of perpetually creating new health technologies, we suggest a design approach which explores the extension and repurposing of existing evidence-based technologies to support and enhance the wellbeing of previously unintended populations. We found CCBT to be a tool which could contribute to the wellbeing of wider society from a preventative, proactive and positive perspective.


acm workshop internet safe things | 2017

Privacy of Personal Things in Active Learning Spaces Need Individually Evolved Requirements

Joseph Maguire; Steve Draper

Technology-enhanced active learning (TEAL) spaces could represent a significant benefit to learning and teaching at universities. TEAL spaces support students in projecting presentations (e.g. from smart-phones) and sharing notes (e.g. from smart-watches) with peers. Importantly, this sharing is partly amongst their co-present small group but sometimes to the whole class. However, plugging personal things into smart spaces whose first requirement is to accept as many devices as possible is not without consequence. A projected notification of a political conversation, for example, has the potential to harm the individual both within the space and beyond, opening them to unwanted judgment, criticism and assessment. The traditional argument from the usable security community is that of intervention prior to any use whatever: users need to be trained, taught and/or nudged to avoid such problems. We conducted an informal focus group with students in a pilot TEAL space, exploring issues around the privacy and security of using personal devices in such spaces. The reality is that it is hard to perceive the privacy and security challenges prior to using the space. We argue that such prior interventions are not only a significant barrier to student adoption of smart spaces, but ineffective in ensuring the safety of individuals in the long-term. We argue that in designing smart spaces, both on-campus and off, designers need to adopt an approach of individually evolved privacy requirements to ensure an on-going safe, creative space for students. Two important features are: (a) as a small group develops bonds, its privacy level needs to be reduced over time and (b) the best privacy level depends on the whether the screen is currently shared with the small group or the large class.


CATE | 2004

Maximising Dialogue in Lectures using Group Response Systems.

Quintin I. Cutts; Gregor Kennedy; Christopher Mitchell; Steve Draper


Computers in Education | 1996

Simulation software in a life sciences practical laboratory

Erica McAteer; Douglas M. Neil; Niall Barr; Margaret I. Brown; Steve Draper; Fiona Henderson


Interactive Learning Environments | 2008

Exploring "Magic Cottage": A Virtual Reality Environment for Stimulating Children's Imaginative Writing.

Marianne Patera; Steve Draper; Martin Naef


ASCILITE | 2003

GENERIC USAGE MONITORING OF PROGRAMMING STUDENTS

Richard C. Thomas; Gregor Kennedy; Steve Draper; Rebecca Mancy; Murray Crease; Huw Evans


The LASER Workshop: Learning from Authoritative Security Experiment Results | 2017

Lessons Learned from Evaluating Eight Password Nudges in the Wild

Karen Renaud; Verena Zimmermann; Joseph Maguire; Steve Draper


Practice and Evidence of the Scholarship of Teaching and Learning in Higher Education | 2006

Targeted remediation for a computer programming course using student facilitators

Steve Draper; Quintin I. Cutts

Collaboration


Dive into the Steve Draper's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard C. Thomas

University of Western Australia

View shared research outputs
Top Co-Authors

Avatar

Huw Evans

University of Glasgow

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge