Spatial reasoning skills contribute to performance in many STEM fields. For example, drawing sectional views of three-dimensional objects is an essential skill for engineering students. There is considerable variation in the spatial reasoning skills of prospective engineering students, putting some at risk for compromised performance in their classes. This study takes place in a first-year engineering Spatial Visualization course to integrate recent practices in engineering design education with cognitive psychology research on the nature of spatial learning. We employed three main pedagogical strategies in the course - 1) in class instruction on sketching; 2) spatial visualization training; and 3) manipulationmore »
Managing Intrusive Practices In The Browser: A User Centered Perspective
Browser users encounter a broad array of
potentially intrusive practices: from behavioral profiling, to crypto-mining, fingerprinting, and more. We
study people’s perception, awareness, understanding,
and preferences to opt out of those practices. We conducted a mixed-methods study that included qualitative (n=186) and quantitative (n=888) surveys covering 8 neutrally presented practices, equally highlighting both their benefits and risks. Consistent with prior
research focusing on specific practices and mitigation
techniques, we observe that most people are unaware of
how to effectively identify or control the practices we
surveyed. However, our user-centered approach reveals
diverse views about the perceived risks and benefits, and
that the majority of our participants wished to both
restrict and be explicitly notified about the surveyed
practices. Though prior research shows that meaningful
controls are rarely available, we found that many participants mistakenly assume opt-out settings are common
but just too difficult to find. However, even if they were
hypothetically available on every website, our findings
suggest that settings which allow practices by default
are more burdensome to users than alternatives which
are contextualized to website categories instead. Our
results argue for settings which can distinguish among
website categories where certain practices are seen as
permissible, proactively notify users about their presence, and otherwise deny intrusive practices by default.
Standardizing these settings in the browser rather than
being left to individual more »
- Award ID(s):
- 1801316
- Publication Date:
- NSF-PAR ID:
- 10289287
- Journal Name:
- PoPETS
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Website privacy policies sometimes provide users the option to opt-out of certain collections and uses of their personal data. Unfortunately, many privacy policies bury these instructions deep in their text, and few web users have the time or skill necessary to discover them. We describe a method for the automated detection of opt-out choices in privacy policy text and their presentation to users through a web browser extension. We describe the creation of two corpora of opt-out choices, which enable the training of classifiers to identify opt-outs in privacy policies. Our overall approach for extracting and classifying opt-out choices combinesmore »
-
Researchers, evaluators and designers from an array of academic disciplines and industry sectors are turning to participatory approaches as they seek to understand and address complex social problems. We refer to participatory approaches that collaboratively engage/ partner with stakeholders in knowledge creation/problem solving for action/social change outcomes as collaborative change research, evaluation and design (CCRED). We further frame CCRED practitioners by their desire to move beyond knowledge creation for its own sake to implementation of new knowledge as a tool for social change. In March and May of 2018, we conducted a literature search of multiple discipline-specific databases seeking collaborative,more »
-
Abstract Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controlled lab settings. While these studies have exposed usability obstacles for the average user and offer design improvements, there exist users with an immediate need for private communication, who must cope with existing software and its limitations. We seek to understand whether individuals motivated by concrete privacy threats, such as those vulnerable to state surveil-lance, can overcome usability issues to adopt complex E2EE tools for long-term use. We surveyed regional activists, as surveillance of social movements is well-documented. Our study group includes individuals from 9 social movementmore »
-
Abstract Expert testimony varies in scientific quality and jurors have a difficult time evaluating evidence quality (McAuliff et al., 2009). In the current study, we apply Fuzzy Trace Theory principles, examining whether visual and gist aids help jurors calibrate to the strength of scientific evidence. Additionally we were interested in the role of jurors’ individual differences in scientific reasoning skills in their understanding of case evidence. Contrary to our preregistered hypotheses, there was no effect of evidence condition or gist aid on evidence understanding. However, individual differences between jurors’ numeracy skills predicted evidence understanding. Summary Poor-quality expert evidence is sometimesmore »