Enhancing LACOME to Consider Privacy and Security Concerns

Chapter
Part of the Human–Computer Interaction Series book series (HCIS)

Abstract

In this chapter, we introduce LACOME, the Large Collaborative Meeting Environment, which is a collaboration system that allows multiple users to simultaneously publish their computer desktops (workspace) and/or windows on a large shared display via a network connection. We discuss the design challenges of such systems for distributed environments. We conducted a series of focus groups to obtain feedback on the initial design of LACOME. Based on our findings, we developed high level design requirements for future iterations and made recommendations to improve the design of collaborative systems; these include the need for addressing privacy and security concerns when moving from a co-located setting to a mixed presence environment.

Keywords

Argo 

References

  1. 1.
    MacKenzie, R. (2010). LACOME: Early evaluation and further development of a multi-user collaboration system for shared large displays. Master’s thesis. The University of British Columbia.Google Scholar
  2. 2.
    Liu, Z. (2007). Lacome: A cross-platform multi-user collaboration system for a shared large display. Master’s thesis. The University of British Columbia.Google Scholar
  3. 3.
    Koehne, B., & Redmiles, D. Gaze awareness for distributed work environments. Institute for Software Research University of California, Irvine.Google Scholar
  4. 4.
    Elmqvist, N. (2011). Distributed user interfaces: State of the art. Proceedings of CHI Workshop on Distributed User Interfaces (pp. 7–13).Google Scholar
  5. 5.
    Elrod, S., Bruce, R., et~al. (1992). Liveboard: A large interactive display supporting group meetings, presentations, and remote collaboration. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM Press, Monterey.Google Scholar
  6. 6.
    Gajewska, H., Kistler, J., Manasse, M., & Redell, D. (1994). Argo: A system for distributed collaboration. Proceedings of Multimedia’94, San Francisco.Google Scholar
  7. 7.
    Villanueva, P. G., Tesoriero, R., & Gallud, J. A. (2010). Multi-pointer and collaborative system for mobile devices. Proceedings of Mobile HCI’10 (pp. 435–438), ACM Press.Google Scholar
  8. 8.
    Izadi, S., Brignull, H., Rodden, T., Rogers, Y., & Underwood, M. (2003). Dynamo: A public interactive surface supporting the cooperative sharing and exchange of media. UIST’03 (pp. 159–168), ACM Press.Google Scholar
  9. 9.
    Gutwin, C., & Greenberg, S. (2000). The mechanics of collaboration: developing low cost usability evaluation methods for shared workspaces. Proceedings of IEEE Wetice (pp. 92–103).Google Scholar
  10. 10.
    Tang, J. (1991). Findings from observational studies of collaborative work. International Journal of Man–Machine Studies, 34(2), 143–160.CrossRefGoogle Scholar
  11. 11.
    Hayne, S., Pendergast, M., & Greenberg, S. (1993). Implementing gesturing with cursors in group support systems. Journal of Management Information Systems, 10(3), 43–61.Google Scholar
  12. 12.
    Hawkey, K., & Inkpen, K. M. (2007). PrivateBits: Managing visual privacy in web browsers. In Proceedings of graphics interface 2007 (GI ’07) (pp. 215–223). New York: ACM. doi:  10.1145/1268517.1268553. http://doi.acm.org/10.1145/1268517.1268553
  13. 13.
    Tan, D. S., & Czerwinski, M. (2003). Information voyeurism: social impact of physically large displays on information privacy. Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI’03) (pp. 748–749).Google Scholar
  14. 14.
    Grudin, J. (2001). Partitioning digital worlds: Focal and peripheral awareness in multiple monitor use. Proceedings of CHI ’01 (pp. 458–465), Seattle.Google Scholar
  15. 15.
    Giot, R., El-Abed, M., & Rosenberger, C. (2009). GREYC keystroke: A benchmark for keystroke dynamics biometric systems. IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems (BTAS ’09) (pp. 1–6).Google Scholar
  16. 16.
    Dhillon, S. (2013). Enhancing LACOME to consider privacy and security concerns. Master’s thesis, Dalhousie University.Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Computer ScienceDalhousie UniversityHalifaxCanada

Personalised recommendations