Skip to main content
Welcome to CHINZ 2007, Hamilton, and the University of Waikato! It gives us great pleasure to host the 8th CHINZ annual conference here at Waikato. CHINZ is the premier forum on Human-Computer Interaction research in New Zealand. Once... more
Welcome to CHINZ 2007, Hamilton, and the University of Waikato! It gives us great pleasure to host the 8th CHINZ annual conference here at Waikato. CHINZ is the premier forum on Human-Computer Interaction research in New Zealand. Once again, as with previous CHINZ conferences, we are delighted to also have contributions from outside New Zealand, thus recognising the value of this series of annual conferences to the international HCI community. This year's program reflects the variety of work carried out in this diverse field of research, with a particular focus on design as an important aspect of HCI. This year we are also proud to have two distinguished keynote speakers, Professors Ian Witten and Hazel Gamec. Prof. Witten is internationally recognised for his research in many fields of computer science, including information retrieval, machine learning, text compression, and programming by demonstration. Prof. Gamec has over 35 years of research experience in visual design, computer graphics, and interactive technologies.
Of the major attributes of an interactive computer system — examples of which range from cash dispensers to engineering design workstations — the command dialogue is recognized as being particularly vital. A good command dialogue is not... more
Of the major attributes of an interactive computer system — examples of which range from cash dispensers to engineering design workstations — the command dialogue is recognized as being particularly vital. A good command dialogue is not only easily learned, but is then essentially instinctive to the user, so that conscious thought can be directed instead to the real problem at hand. In contrast, a poor command language is difficult to learn, intrudes — by reason of the need for conscious thought — upon the main task, and may well be unsympathetic in the sense that command errors will often have catastrophic consequences.
This paper describes the development and evaluation of an electronic sketch environment for interface design. The tool provides a pen-based interface on an electronic whiteboard for designing Visual Basic forms, it is tightly integrated... more
This paper describes the development and evaluation of an electronic sketch environment for interface design. The tool provides a pen-based interface on an electronic whiteboard for designing Visual Basic forms, it is tightly integrated into the Visual Basic IDE. Our evaluation showed that this type of environment is likely to be of benefit to novice programmers as it provides an enticing shared workspace for small groups and encourages checking and revision
A technique for presenting data on a graphics display, while avoiding the inherent windowing problem of conventional v.d.u's is proposed. This technique is centered on the concept of spatial information management. Design principles... more
A technique for presenting data on a graphics display, while avoiding the inherent windowing problem of conventional v.d.u's is proposed. This technique is centered on the concept of spatial information management. Design principles are presented, together with an example design modifying the display of a conventional microprocessor. The viability of the technique is demonstrated, and a more sophisticated implementation proposed.
ABSTRACT Direct manipulation interfaces cover a range of interactions involving a variety of styles. An important first step in developing techniques for describing and implementing asynchronous interactive dialogues of the type found in... more
ABSTRACT Direct manipulation interfaces cover a range of interactions involving a variety of styles. An important first step in developing techniques for describing and implementing asynchronous interactive dialogues of the type found in direct manipulation environments is an understanding of the underlying interaction tasks viewed from a user perspective. This paper reviews previous attempts to classify interaction tasks, examines them in the context of the Macintosh environment and proposes a taxonomy of tasks. Particular attention is devoted to tasks involving repeated actions. It is shown that all tasks reduce to selection sub-tasks, which has implications for the types of tools and techniques needed to describe and implement direct manipulation interfaces. In particular it is suggested that the meneme model of Lean Cuisine (Apperley and Spence, 1989) which was developed in the context of menu systems, and is based on selectable representations of objects, could be extended to handle the other interactions of a direct manipulation interface.
Page 1. Applying Bifocal Displays to Topological Maps Ying K. Leung Swinburne University of Technology, Australia Robert Spence Imperial College of Science, Technology, and Medicine, England Mark D. Apperley The University of Waikato, New... more
Page 1. Applying Bifocal Displays to Topological Maps Ying K. Leung Swinburne University of Technology, Australia Robert Spence Imperial College of Science, Technology, and Medicine, England Mark D. Apperley The University of Waikato, New Zealand ...
This chapter presents an overview of usability in Aotearoa/New Zealand, from the academic and industrial perspectives. It contains a brief description of the country and focuses on the development of HCI and its characteristics in New... more
This chapter presents an overview of usability in Aotearoa/New Zealand, from the academic and industrial perspectives. It contains a brief description of the country and focuses on the development of HCI and its characteristics in New Zealand.
... The control layer is implemented as a MERS interpreter, with an event response loop that first repeatedly marks and fires all firable e ... Conclusions Lean Cuisine offers considerable potential as a design notation around which a... more
... The control layer is implemented as a MERS interpreter, with an event response loop that first repeatedly marks and fires all firable e ... Conclusions Lean Cuisine offers considerable potential as a design notation around which a prototyping environment for DM interfaces might be ...
ABSTRACT We identify an important type of software design knowledge that we call community specific folklore and show problems with current approaches to managing it. We built a tool that serves as a living design memory for ...
Because human-computer interface design is traditionally included in computer science curricula as an advanced level topic, it is usually perceived as an add-on, and not well integrated into the software lifecycle. An holistic... more
Because human-computer interface design is traditionally included in computer science curricula as an advanced level topic, it is usually perceived as an add-on, and not well integrated into the software lifecycle. An holistic user-centred methodology for system design, one which ...
What makes a security visualization effective? How do we measure visualization effectiveness in the context of investigating, analyzing, understanding and reporting cyber security incidents? Identifying and understanding cyber-attacks are... more
What makes a security visualization effective? How do we measure visualization effectiveness in the context of investigating, analyzing, understanding and reporting cyber security incidents? Identifying and understanding cyber-attacks are critical for decision making – not just at the technical level, but also the management and policy-making levels. Our research studied both questions and extends our Security Visualization Effectiveness Measurement (SvEm) framework by providing a full-scale effectiveness approach for both theoretical and user-centric visualization techniques. Our framework facilitates effectiveness through interactive three-dimensional visualization to enhance both single and multi-user collaboration. We investigated effectiveness metrics including (1) visual clarity, (2) visibility, (3) distortion rates and (4) user response (viewing) times. The SvEm framework key components are: (1) mobile display dimension and resolution factor, (2) security incident entities, (3) user cognition activators and alerts, (4) threat scoring system, (5) working memory load and (6) color usage management. To evaluate our full-scale security visualization effectiveness framework, we developed VisualProgger - a real-time security visualization application (web and mobile) visualizing data provenance changes in SvEm use cases. Finally, the SvEm visualizations aims to gain the users' attention span by ensuring a consistency in the viewer's cognitive load, while increasing the viewer's working memory load. In return, users have high potential to gain security insights in security visualization. Our evaluation shows that viewers perform better with prior knowledge (working memory load) of security events and that circular visualization designs attract and maintain the viewer's attention span. These discoveries revealed research directions for future work relating to measurement of security visualization effectiveness.
Electric vehicles (EVs) are widely heralded as the silver bullet for greening personal transport. However their eventual impact in South Africa, a developing country with a low-capacity carbon-heavy grid, is questionable. This paper... more
Electric vehicles (EVs) are widely heralded as the silver bullet for greening personal transport. However their eventual impact in South Africa, a developing country with a low-capacity carbon-heavy grid, is questionable. This paper examines the potential impact of electrification of the vehicle fleet in South Africa, and explores the concept that large employers could take advantage of the country’s abundant sunshine and provide photovoltaic (PV) solar carports for employees to charge their vehicles while at work. We assess the extent to which this would reduce the potential burden on the national grid, and also consider the economic perspectives of the vehicle owners and the employers. Our assessment employs a mobility model and a battery model for the vehicles, and solar simulation with measured data for the PV generation. We show that without the provision of additional solar generation, charging four million vehicles from the grid would exceed the grid’s capacity. Further, the carbon footprint of an electric vehicle charged from the grid would be greater than that of a petrol-fuelled vehicle, negating any potential benefits of electrification. However, we demonstrate that photovoltaic charging at work renders electric vehicles more carbon-friendly than petrol equivalents, and has substantial financial benefits for the vehicle owner, the employer, and the grid.
ABSTRACT The specification, design, implementation and control of highly interactive direct manipulation dialogues is of increasing interest. However, existing techniques fall well short of the goal of isolating the design of the dialogue... more
ABSTRACT The specification, design, implementation and control of highly interactive direct manipulation dialogues is of increasing interest. However, existing techniques fall well short of the goal of isolating the design of the dialogue from the detail of its implementation. This paper closely analyses the structural characteristics of menu systems, a major component of such dialogues, and arising from this analysis proposes a new diagrammatic approach to their description. This approach is shown to be able to completely specify the details and behaviour of a system of menus from an external point of view. The parallels between this notation and the recently defined class of automata, Event-Response Systems, are discussed, demonstrating the potential for a direct implementation of an interface from this description. Further, it is suggested that the notation could be extended to cover all aspects of direct manipulation interaction.
Cloud services continue to attract organizations with advantages that enable subsidiary costs. While there are advantages, security in the cloud is an ongoing challenging process for cloud providers and users. Cyber-threats are... more
Cloud services continue to attract organizations with advantages that enable subsidiary costs. While there are advantages, security in the cloud is an ongoing challenging process for cloud providers and users. Cyber-threats are penetrating cloud technologies and exposing flaws in the cloud technologies. Data Provenance as a Security Visualization Service (DPaaSVS) and Security Visualization as a Cloud Service (SVaaCS) for cloud technologies are solutions to help track and monitor data in the cloud. Either data is at-rest or in in-transit, security visualization empowers cloud providers and users to track and monitor their data movements. Security visualization refers to the concept of using visualization to represent security events. In this chapter, we (1) provide our security visualization standardized model and (2) provide the security visualization intelligence framework model and finally discuss several security visualization use-cases.
Advances and growth in Internet usage have introduced a new range of manifestations of the ego. Personal home pages are a curious phenomenon; how many of us who happily maintain a home page with biographical information including personal... more
Advances and growth in Internet usage have introduced a new range of manifestations of the ego. Personal home pages are a curious phenomenon; how many of us who happily maintain a home page with biographical information including personal details, opinions and preferences, would consider publishing similar information as a newspaper advertisement? However, in this note I want to restrict my discussion to some issues relating to email, rather than broader Internet usage.

And 196 more

PAOHVis displays hypergraphs in a matrix where rows represent nodes (dots) and columns represent hyperedges (vertical lines). We propose extensions to PAOHVis for leveraging repeated hyperedges in non-simple hypergraphs, and displaying... more
PAOHVis displays hypergraphs in a matrix where rows represent nodes (dots) and columns represent hyperedges (vertical lines). We propose extensions to PAOHVis for leveraging repeated hyperedges in non-simple hypergraphs, and displaying multiple node attributes. This is accomplished through two aggregation functions: count-based, which targets low-level detail, and binary, for high-level overview. In doing so, we introduce a domain-agnostic framework for consolidating hypergraphs by one or more categorical node attributes.