Publication statistics

Pub. period:2005-2011
Pub. count:27
Number of co-authors:40



Co-authors

Number of publications with 3 favourite co-authors:

Heinrich Hussmann:8
Max-Emanuel Maurer:5
Roman Weiss:4

 

 

Productive colleagues

Alexander De Luca's 3 most productive colleagues in number of publications:

Enrico Rukzio:49
Andreas Butz:48
Marcus Foth:31
 
 
 
Jul 22

... in an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention, and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.

-- Herbert Simon in "Computers, Communications and the Public Interest," 1971

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!

 
 

Alexander De Luca

Personal Homepage:
medien.ifi.lmu.de/team/alexander.de.luca/


Add description
Add publication

Publications by Alexander De Luca (bibliography)

 what's this?
2011
 
Edit | Del

Luca, Alexander De, Frauendienst, Bernhard, Maurer, Max-Emanuel, Seifert, Julian, Hausen, Doris, Kammerer, Niels and Hussmann, Heinrich (2011): Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 887-890.

Internet users are targets for ever-advancing phishing- and other attacks. The risks are, for example, to disclose credit card information or passwords to unauthorized instances. One approach to help users with insecure situations is provided by MoodyBoard, which uses ambient information to highlight potential risks. In this paper, we present findings from an evaluation of this system. Two user studies were conducted in order to find out whether an ambient security tool can protect users during sensitive tasks. We designed a pilot study to find out whether users understand the warnings and a security study to see if it helps to protect users from phishing attacks. Results show that MoodyBoard users behaved significantly more secure.

© All rights reserved Luca et al. and/or their publisher

 
Edit | Del

Maurer, Max-Emanuel, Luca, Alexander De and Hussmann, Heinrich (2011): Data type based security alert dialogs. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 2359-2364.

Making users aware of insecure situations and behavior while browsing the Internet is a highly discussed and still difficult task. Both, passive and active warnings have their own specific disadvantages. While active warnings interrupt the current task and annoy the user, passive approaches often fail since they go unnoticed. In this work, we present first results of a concept displaying data type based alert dialogs whenever a user enters critical information into an online form. Such contextual dialogs appear right in the users' field of view representing a hybrid approach between active and passive warnings. An initial user study was conducted that showed a significant improvement of security awareness by participants that used the tool.

© All rights reserved Maurer et al. and/or their publisher

 
Edit | Del

Maurer, Max-Emanuel, Luca, Alexander De and Kempe, Sylvia (2011): Using data type based security alert dialogs to raise online security awareness. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 2.

When browsing the Internet, users are likely to be exposed to security and privacy threats -- like fraudulent websites. Automatic browser mechanisms can protect them only to some extent. In other situations it is still important to raise the users' security awareness at the right moment. Passive indicators are mostly overlooked and blocking warnings are quickly dismissed by habituated users. In this work, we present a new concept of warnings that appear in-context, right next to data the user has just entered. Those dialogs are displayed whenever critical data types -- e.g. credit card data -- are entered by the users into online forms. Since they do not immediately interrupt the users' interaction but appear right in the users' focus, it is possible to place important security information in a way that it can be easily seen. We implemented the concept as a Firefox plugin and evaluated it in a row of studies including two lab studies, one focus group and one real world study. Results show that the concept is very well accepted by the users and that with the plugin, especially non-expert participants were more likely to identify fraudulent (or phishing) websites than using the standard browser warnings. Besides this, we were able to gather interesting findings on warning usage.

© All rights reserved Maurer et al. and/or ACM Press

2010
 
Edit | Del

Maurer, Max-Emanuel, Hausen, Doris, Luca, Alexander De and Hussmann, Heinrich (2010): Mobile or desktop websites?: website usage on multitouch devices. In: Proceedings of the Sixth Nordic Conference on Human-Computer Interaction 2010. pp. 739-742.

Mobile Internet is nearly a standard nowadays. Due to former bandwidth, input and screen limitations, website providers often created special versions of their websites for mobile devices. New hardware and interactions techniques like multitouch gestures enable a new way of browsing the original versions of websites. However, companies still spent effort and money in creating secondary versions of their original pages. With the rapid deployment of new mobile devices, the usefulness of mobile versions of websites becomes questionable. To investigate on users expectations, we conducted an online survey with 108 participants about their browsing habits and preferences on mobile devices. In a follow-up user study with 24 participants. The results of the survey show that more and more people prefer using original content instead of the mobile version, especially for users of new generation mobile devices like the iPhone or Android phones. Those results are supported by the user study, which shows no significant performance increase when comparing both versions -- the mobile and desktop one -- performing a visual search task.

© All rights reserved Maurer et al. and/or their publisher

 
Edit | Del

Luca, Alexander De, Frauendienst, Bernhard, Maurer, Max and Hausen, Doris (2010): On the design of a "moody" keyboard. In: Proceedings of DIS10 Designing Interactive Systems 2010. pp. 236-239.

To counter the increasing number of online threats for users' privacy and security, this paper explores the design of an ambient security indicator, in form of a standard keyboard illuminated in different colors, and equipped with additional buttons and vibration functionality. We present the results of a focus group study, which notably influenced the design, and discuss a prototypical implementation called Moody Board.

© All rights reserved Luca et al. and/or their publisher

 
Edit | Del

Luca, Alexander De, Langheinrich, Marc and Hussmann, Heinrich (2010): Towards understanding ATM security: a field study of real world ATM use. In: Proceedings of the 2010 Symposium on Usable Privacy and Security 2010. p. 16.

With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Those mechanisms are usually judged on speed, security, and memorability in comparison with traditional PIN entry systems. It remains unclear, however, what appropriate values for PIN-based ATM authentication actually are. We conducted a field study and two smaller follow-up studies on real-world ATM use, in order to provide both a better understanding of PIN-based ATM authentication, and on how alternative authentication methods can be compared and evaluated. Our results show that there is a big influence of contextual factors on security and performance in PIN-based ATM use. Such factors include distractions, physical hindrance, trust relationships, and memorability. From these findings, we draw several implications for the design of alternative ATM authentication systems, such as resilience to distraction and social compatibility.

© All rights reserved Luca et al. and/or their publisher

 
Edit | Del

Luca, Alexander De, Hertzschuch, Katja and Hussmann, Heinrich (2010): ColorPIN: securing PIN entry through indirect input. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 1103-1106.

Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that the main problem lies in the PIN based authentication which in itself does not provide any security features (besides the use of asterisks). That is, security is solely based on a user's behavior. Indirect input is one way to solve this problem. This mostly comes at the costs of adding overhead to the input process. We present ColorPIN, an authentication mechanism that uses indirect input to provide security enhanced PIN entry. At the same time, ColorPIN remains a one-to-one relationship between the length of the PIN and the required number of clicks. A user study showed that ColorPIN is significantly more secure than standard PIN entry while enabling good authentication speed in comparison with related systems.

© All rights reserved Luca et al. and/or their publisher

2009
 
Edit | Del

Luca, Alexander De, Zezschwitz, Emanuel von and Hußmann, Heinrich (2009): Vibrapass: secure authentication based on shared lies. In: Proceedings of ACM CHI 2009 Conference on Human Factors in Computing Systems 2009. pp. 913-916.

Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on recording the input done by the users. In this work, we present VibraPass, a system created to be resilient against observation attacks using tactile feedback provided by the users' own mobile devices. In this way, secret information is shared between the terminal and the users to add an over-head of 'lies' to the input which makes it hard for attackers to steal the real PIN or password. We present an evaluation, which shows that VibraPass has the potential to replace current authentication systems due to increased security combined with reasonable input speed and error rates.

© All rights reserved Luca et al. and/or ACM Press

 
Edit | Del

Luca, Alexander De, Denzel, Martin and Hussmann, Heinrich (2009): Look into my eyes!: can you guess my password?. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 7.

Authentication systems for public terminals and thus public spaces have to be fast, easy and secure. Security is of utmost importance since the public setting allows manifold attacks from simple shoulder surfing to advanced manipulations of the terminals. In this work, we present EyePassShapes, an eye tracking authentication method that has been designed to meet these requirements. Instead of using standard eye tracking input methods that require precise and expensive eye trackers, EyePassShapes uses eye gestures. This input method works well with data about the relative eye movement, which is much easier to detect than the precise position of the user's gaze and works with cheaper hardware. Different evaluations on technical aspects, usability, security and memorability show that EyePassShapes can significantly increase security while being easy to use and fast at the same time.

© All rights reserved Luca et al. and/or ACM Press

 
Edit | Del

Ecker, Ronald, Broy, Verena, Butz, Andreas and Luca, Alexander De (2009): pieTouch: a direct touch gesture interface for interacting with in-vehicle information systems. In: Proceedings of 11th Conference on Human-computer interaction with mobile devices and services 2009. p. 22.

Touch-sensitive displays seem like a natural and promising option for dealing with the increasing complexity of current in-vehicle information systems (IVIS), but since they can hardly be used without visual attention conventional point touch systems are rarely considered in cars. To ensure road safety, the drivers' visual attention needs to be focused almost entirely to the road. In order to integrate touch screens successfully into cars, new concepts are needed to reduce visual demand. The adaptation of pie menus serving as a visualisation of gestures reduces the user's cognitive load, and we were able to achieve an almost blind interaction with the IVIS. We compared our design to a generic touch system using a dual task evaluation method (Lane Change Task [18][20]), and the results regarding total task completion time, lane deviation and subjective preferences confirm a higher usability and efficiency, as well as an added hedonic quality of pieTouch.

© All rights reserved Ecker et al. and/or their publisher

 
Edit | Del

Seifert, Julian, Luca, Alexander De and Conradi, Bettina (2009): A context-sensitive security model for privacy protection on mobile phones. In: Proceedings of 11th Conference on Human-computer interaction with mobile devices and services 2009. p. 68.

In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The Privacy Protection is realized by spheres, which represent the user's context specific need for privacy. That is, users can create any number of spheres and define which services and data are accessible in each sphere. TreasurePhone integrates context information for supporting authentication and activation of spheres by locations and actions. A basic hierarchy is used for determining which location should be activated based on the associated sensor value.

© All rights reserved Seifert et al. and/or their publisher

 
Edit | Del

Blöckner, Magdalena, Danti, Svetlana, Forrai, Jennifer, Broll, Gregor and Luca, Alexander De (2009): Please touch the exhibits!: using NFC-based interaction for exploring a museum. In: Proceedings of 11th Conference on Human-computer interaction with mobile devices and services 2009. p. 71.

Museums often use mobile devices and applications to let visitors explore their exhibits and interact with them in order to make the user experience more immersive and enjoyable. This paper presents a mobile museum guide based on the physical interaction with a dynamic NFC-display, consisting of a grid of NFC-tags and a projected GUI. Visitors can browse tours on the public display, download them onto their mobile devices and use them for the exploration of the museum. The paper presents the design of the museum guide, a first prototype and a preliminary evaluation of its usability and the interaction with a dynamic NFC-display.

© All rights reserved Blöckner et al. and/or their publisher

 
Edit | Del

Maurer, Max-Emanuel and Luca, Alexander De (2009): SeCuUI: autocomplete your terminal input. In: Proceedings of 11th Conference on Human-computer interaction with mobile devices and services 2009. p. 83.

With SeCuUI we present a solution that aims to increase security of data entry on public terminals. The user can enter all data requested by the terminal using her mobile device. Sensitive data can be hidden from prying eyes by exclusively showing it on the user's mobile. To speed up the whole process, the SeCuUI-client stores previously entered data on the mobile device to provide auto form filling capabilities.

© All rights reserved Maurer and Luca and/or their publisher

 
Edit | Del

Luca, Alexander De, Frauendienst, Bernhard, Boring, Sebastian and Hussmann, Heinrich (2009): My phone is my keypad: privacy-enhanced PIN-entry on public terminals. In: Proceedings of OZCHI09, the CHISIG Annual Conference on Human-Computer Interaction 2009. pp. 401-404.

More and more services are available on public terminals. Due to their public location and permanent availability, they can easily fall victim to manipulation. These manipulations mostly aim at stealing the customers' authentication information (e.g. bank card PIN) to gain access to the victims' possessions. By relocating the input from the terminal to the users' mobile device, the system presented in this paper makes the authentication process resistant against such manipulations. In principle, this relocation makes PIN entry more complex, with a tendency to worse usability. In this paper, we present the concept as well as an evaluation that has been conducted to study the trade off between usability and security. The results show that users apparently are willing to accept a certain increase of interaction time in exchange for improved security.

© All rights reserved Luca et al. and/or their publisher

2008
 
Edit | Del

Bilandzic, Mark, Foth, Marcus and Luca, Alexander De (2008): CityFlocks: Designing Social Navigation for Urban Mobile Information Systems. In: Designing Interactive Systems February 25-27, 2008, Cape Town, South Africa. .

CityFlocks is a mobile system enabling visitors and new residents in a city to tap into the knowledge and experiences of local residents, so as to gather information about their new environment. Its design specifically aims to lower existing barriers of access and facilitate social navigation in urban places. This paper presents a design case study of a mobile system prototype that offers an easy way for information seeking new residents or visitors to access tacit knowledge from local people about their new community. In various user tests we evaluate two general user interaction alternatives - direct and indirect social navigation - and analyse under what conditions which interaction method works better for people using a mobile device to socially navigate urban environments. The outcomes are relevant for the user interaction design of future mobile information systems that leverage off of a social navigation approach.

© All rights reserved Bilandzic et al. and/or ACM Press

 
Edit | Del

Luca, Alexander De, Weiss, Roman, Hußmann, Heinrich and An, Xueli (2008): Eyepass -- eye-stroke authentication for public terminals. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008. pp. 3003-3008.

Authentication on public terminals e.g. on ATMs and ticket vending machines is a common practice. Due to the weaknesses of the traditional authentication approaches PIN and password, it is possible that other people gain access to the authentication information and thus to the users' personal data. This is mainly due to the physical interaction with the terminals, which enables various manipulations on these devices. In this paper, we present EyePass, an authentication mechanism based on PassShape and eye-gestures that has been created to overcome these problems by eliminating the physical connection to the terminals. EyePass additionally assists the users by providing easy-to-remember PassShapes instead of PINs or passwords. We present the concept, the prototype and the first evaluations performed. Additionally, the future work on the evaluation is outlined and expected results are discussed.

© All rights reserved Luca et al. and/or ACM Press

 
Edit | Del

Bilandzic, Mark, Foth, Marcus and Luca, Alexander De (2008): CityFlocks: designing social navigation for urban mobile information systems. In: Proceedings of DIS08 Designing Interactive Systems 2008. pp. 174-183.

CityFlocks is a mobile system enabling visitors and new residents in a city to tap into the knowledge and experiences of local residents, so as to gather information about their new environment. Its design specifically aims to lower existing barriers of access and facilitate social navigation in urban places. This paper presents a design case study of a mobile system prototype that offers an easy way for information seeking new residents or visitors to access tacit knowledge from local people about their new community. In various user tests we evaluate two general user interaction alternatives -- direct and indirect social navigation -- and analyse under what conditions which interaction method works better for people using a mobile device to socially navigate urban environments. The outcomes are relevant for the user interaction design of future mobile information systems that leverage off of a social navigation approach.

© All rights reserved Bilandzic et al. and/or ACM Press

 
Edit | Del

Kiemer, Johannes, Ballendat, Till, Langer, Tim, Zhang, Wenqi and Luca, Alexander De (2008): Spybuster - a community-based privacy tagging platform. In: Hofte, G. Henri ter, Mulder, Ingrid and Ruyter, Boris E. R. de (eds.) Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services - Mobile HCI 2008 September 2-5, 2008, Amsterdam, the Netherlands. pp. 491-492.

 
Edit | Del

Weiss, Roman and Luca, Alexander De (2008): PassShapes: utilizing stroke based authentication to increase password memorability. In: Proceedings of the Fifth Nordic Conference on Human-Computer Interaction 2008. pp. 383-392.

Authentication today mostly relies on passwords or personal identification numbers (PINs). Therefore the average user has to remember an increasing amount of PINs and passwords. Unfortunately, humans have limited capabilities for remembering abstract alphanumeric sequences. Thus, many people either forget them or use very simple ones, which implies several security risks. In this work, a novel authentication method called PassShapes is presented. In this system users authenticate themselves to a computing system by drawing simple geometric shapes constructed of an arbitrary combination of eight different strokes. We argue that using such shapes will allow more complex and thus more secure authentication tokens with a lower cognitive load and higher memorability. To prove these assumptions, two user studies have been conducted. The memorability evaluation showed that the PassShapes concept is able to increase the memorability when users can practice the PassShapes several times. This effect is even increasing over time. Additionally, a prototype was implemented to conduct a usability study. The results of both studies indicate that the PassShapes approach is able to provide a usable and memorable authentication method.

© All rights reserved Weiss and Luca and/or their publisher

 
Edit | Del

Bilandzic, Mark, Banholzer, Michael, Peev, Deyan, Georgiev, Vesko, Balagtas-Fernandez, Florence and Luca, Alexander De (2008): Laermometer: a mobile noise mapping application. In: Proceedings of the Fifth Nordic Conference on Human-Computer Interaction 2008. pp. 415-418.

Creating noise maps is a complex task. They can be created using modeling approaches that take into account different data such as traffic conditions and the like. Another approach is to use stationary recording stations which provide better results but are costly to maintain. Nevertheless, the benefits of noise maps are worth the effort. Laermometer has been developed to solve the problems of creating noise maps by utilizing mobile phones and their built-in microphones. The main functionality is to provide noise information for any place in the world. Users can add further information like a noise description or comments about the location and its sound level. Every user can view the noise maps and comments, anywhere using their mobile devices. In addition Laermometer brings along a small web interface. With this web interface users can view/edit their profiles, comments and noise descriptions.

© All rights reserved Bilandzic et al. and/or their publisher

 
Edit | Del

Luca, Alexander De and Frauendienst, Bernhard (2008): A privacy-respectful input method for public terminals. In: Proceedings of the Fifth Nordic Conference on Human-Computer Interaction 2008. pp. 455-458.

Nowadays, people often have to input information on public terminals. By doing so, they might disclose information to strangers looking over their shoulders. In this paper we introduce a new way of interacting with public terminals, which offers more privacy by using a personal mobile device to enter private data. It allows the users to choose which information is to be regarded personal, which can then be entered on their mobile device and is hidden from the screen accordingly. Furthermore we created a prototype and conducted a user study measuring users' input performance and to collect opinions about the system's usability and practical value. The paper concludes with some ideas to make the system even more useful.

© All rights reserved Luca and Frauendienst and/or their publisher

 
Edit | Del

Rukzio, Enrico, Noda, Chie, Luca, Alexander De, Hamard, John and Coskun, Fatih (2008): Automatic form filling on mobile devices. In Pervasive and Mobile Computing, 4 (2) pp. 161-181.

2007
 
Edit | Del

Luca, Alexander De, Weiss, Roman and Drewes, Heiko (2007): Evaluation of eye-gaze interaction methods for security enhanced PIN-entry. In: Proceedings of OZCHI07, the CHISIG Annual Conference on Human-Computer Interaction November 28-30, 2007, Adelaide, Australia. pp. 199-202.

Personal identification numbers (PINs) are one of the most common ways of electronic authentication these days and used in a wide variety of applications, especially in ATMs (cash machines). A non-marginal amount of tricks are used by criminals to spy on these numbers to gain access to the owners' valuables. Simply looking over the victims' shoulders to get in possession of their PINs is a common one. This effortless but effective trick is known as shoulder surfing. Thus, a less observable PIN entry method is desirable. In this work, we evaluate three different eye gaze interaction methods for PIN-entry, all resistant against these common attacks and thus providing enhanced security. Besides the classical eye input methods we also investigate a new approach of gaze gestures and compare it to the well known classical gaze-interactions. The evaluation considers both security and usability aspects. Finally we discuss possible enhancements for gaze gestures towards pattern based identification instead of number sequences.

© All rights reserved Luca et al. and/or ACM Press

 
Edit | Del

Luca, Alexander De, Weiss, Roman and Hussmann, Heinrich (2007): PassShape: stroke based shape passwords. In: Proceedings of OZCHI07, the CHISIG Annual Conference on Human-Computer Interaction November 28-30, 2007, Adelaide, Australia. pp. 239-240.

Authentication today mostly means using passwords or personal identification numbers (PINs). The average user has to remember an increasing amount of PINs and passwords. But unfortunately, humans have limited capabilities in remembering abstract alphanumeric sequences. Thus, many people either forget them or use very simple ones that imply several security risks. In our previous work on PIN entry on ATMs (cash machines), we found out that many persons support their memory recalling PINs by using an imaginary shape overlaid on the number pad. In this paper, we introduce PassShape, a shape based authentication mechanism. We argue that using shapes will allow more complex and more secure authentication with a lower cognitive load. That is, it enables people to use easy to remember but complex authentication patterns.

© All rights reserved Luca et al. and/or ACM Press

2006
 
Edit | Del

Rukzio, Enrico, Hamard, John, Noda, Chie and Luca, Alexander De (2006): Visualization of uncertainty in context aware mobile applications. In: Proceedings of 8th conference on Human-computer interaction with mobile devices and services 2006. pp. 247-250.

Context-aware mobile applications and systems have been extensively explored in the last decade and in the last few years we already saw promising products on the market. Most of these applications assume that context data is highly accurate. But in practice this information is often unreliable, especially when gathered from sensors or external sources. Previous research has argued that the system usability can be improved by displaying the uncertainty to the user. The research presented in this paper shows that it is not always an advantage to show the confidence of the context-aware application to the user. We developed a system for automatic form filling on mobile devices which fills in any web form with user data stored on the mobile device. The used algorithm generates rules which indicate with which probability which input field of a form should be filled in with which value. Based on this we developed two versions of our system. One shows the uncertainty of the system and one not. We then conducted a user study which shows that the user needs slightly more time and produces slightly more errors when the confidence of the system is visualized.

© All rights reserved Rukzio et al. and/or ACM Press

 
Edit | Del

Rukzio, Enrico, Hamard, John, Noda, Chie and Luca, Alexander De (2006): Visualization of uncertainty in context aware mobile applications. In: Nieminen, Marko and Röykkee, Mika (eds.) Proceedings of the 8th Conference on Human-Computer Interaction with Mobile Devices and Services - Mobile HCI 2006 September 12-15, 2006, Helsinki, Finland. pp. 247-250.

2005
 
Edit | Del

Leichtenstern, Karin, Luca, Alexander De and Rukzio, Enrico (2005): Analysis of Built-in Mobile Phone Sensors for Supporting Interactions with the Real World. In: Rukzio, Enrico, Häkkilä, Jonna, Spasojevic, Mirjana, Mäntyjärvi, Jani and Ravi, Nishkam (eds.) PERMID 2005 - Pervasive Mobile Interaction Devices - Mobile Devices as Pervasive User Interfaces and Interaction Devices - Workshop in conjunction with The 3rd International Conference on Pervasive Computing PERVASIVE 2005 May 11, 2005, Munich, Germany. pp. 31-34.

 
Add publication
Show list on your website
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
 
 
 

Changes to this page (author)

05 Apr 2012: Modified
05 Jul 2011: Modified
05 Jul 2011: Modified
03 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
02 Nov 2010: Modified
08 Sep 2009: Modified
24 Aug 2009: Modified
24 Aug 2009: Modified
02 Jun 2009: Modified
02 Jun 2009: Modified
02 Jun 2009: Modified
29 May 2009: Modified
29 May 2009: Modified
09 May 2009: Modified
07 Apr 2009: Modified
12 May 2008: Modified
12 May 2008: Modified
12 May 2008: Modified
12 May 2008: Modified
10 May 2008: Added
24 Jul 2007: Added

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/alexander_de_luca.html

Publication statistics

Pub. period:2005-2011
Pub. count:27
Number of co-authors:40



Co-authors

Number of publications with 3 favourite co-authors:

Heinrich Hussmann:8
Max-Emanuel Maurer:5
Roman Weiss:4

 

 

Productive colleagues

Alexander De Luca's 3 most productive colleagues in number of publications:

Enrico Rukzio:49
Andreas Butz:48
Marcus Foth:31
 
 
 
Jul 22

... in an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention, and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.

-- Herbert Simon in "Computers, Communications and the Public Interest," 1971

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!