Number of co-authors:17
Number of publications with 3 favourite co-authors:Linda Little:5Elizabeth Sillence:2James Nicholson:2
Pam Briggs's 3 most productive colleagues in number of publications:Andrew Monk:68Patrick Olivier:39Mark Blythe:33
Knowledge is commonly socially constructed, through collaborative efforts towards shared objectives or by dialogues and challenges brought about by different persons' perspectives.
-- G. Salomon (in "Distributed Cognitions: Psychological and Educational Considerations")
Read the fascinating history of Wearable Computing, told by its father, Steve Mann
Read Steve's chapter !
Personal Homepage: northumbria.ac.uk/sd/academic/lifesciences/ad/psych/psychstaff/pam_briggs/
Current place of employment: Northumbria University
Pam holds a Chair in Applied Psychology, delivering innovative research and consultancy around issues of identity, trust and security in new social media. Her research seeks answers to three main questions: Why and when do we feel secure in disclosing sensitive identity information about ourselves? What makes us trust an electronic message? How and when do we seek to protect our privacy?
In the last five years, Pam has published over forty articles on human perceptions of trust, privacy and security in computer-mediated communication and has recently developed, with colleagues, an innovative model of health advice-seeking online (ESRC funded). She has given a number of invited addresses on online trust and e-health, including an invited address on e-health to the World Health Summit 2009, the opening address at the Second International Conference on Privacy, Security and Trust (Canada) and the keynote to the 2010 IFIP Trust Management conference in Morioka, Japan. She has been a member of ESRC’s fellowship and CASE studentship committees and has recently made a contribution to the Govt. Office for Science’s Technology Foresight programme on the Future of Identity. She is currently a member of EPSRC’s new Identity Futures Network and also EPSRC’s Cybersecurity Network. She is one of the founder members of the UK’s new ‘Science of Cybersecurity’ Institute, funded by GCHQ in association with RCUK’s Global Uncertainty Programme.
Publications by Pam Briggs (bibliography)
Briggs, Pam, Blythe, Mark, Vines, John, Lindsay, Stephen, Dunphy, Paul, Nicholson, James, Green, David, Kitson, Jim, Monk, Andrew and Olivier, Patrick (2012): Invisible design: exploring insights and ideas through ambiguous film scenarios. In: Proceedings of DIS12 Designing Interactive Systems 2012. pp. 534-543.
Invisible Design is a technique for generating insights and ideas with workshop participants in the early stages of concept development. It involves the creation of ambiguous films in which characters discuss a technology that is not directly shown. The technique builds on previous work in HCI on scenarios, persona, theatre, film and ambiguity. The Invisible Design approach is illustrated with three examples from unrelated projects; Biometric Daemon, Panini and Smart Money. The paper presents a qualitative analysis of data from a series of workshops where these Invisible Designs were discussed. The analysis outlines responses to the films in terms of; existing problems, concerns with imagined technologies and design speculation. It is argued that Invisible Design can help to create a space for critical and creative dialogue during participatory concept development.
© All rights reserved Briggs et al. and/or ACM Press
Thomas, Lisa, Briggs, Pam and Little, Linda (2010): The impact of using location-based services with a behaviour-disordered child: a case study. In: Proceedings of the Sixth Nordic Conference on Human-Computer Interaction 2010. pp. 503-510.
In this paper we explore technologies that help parents locate their children. Parents regularly use mobile phones to stay in touch with their children, but recent developments in location-based tracking allow parents to assess the location of their child directly. Such location-based services offer new assurances, but also bring new privacy challenges. In order to explore these, we conducted a case study focussing on the way in which a family has used location-based technologies to keep track of a child with Asperger's Syndrome and Attention Deficit Hyperactivity Disorder. This novel research shows that Location-Based Services, although usually applied to lone-worker situations, can be effectively applied to other user groups. The parents of the child were interviewed at length, and the interview was analysed using qualitative methods. The findings are discussed and considered against a current predictive model of LBS use.
© All rights reserved Thomas et al. and/or their publisher
Kim, David, Dunphy, Paul, Briggs, Pam, Hook, Jonathan, Nicholson, John, Nicholson, James and Olivier, Patrick (2010): Multi-touch authentication on tabletops. In: Proceedings of ACM CHI 2010 Conference on Human Factors in Computing Systems 2010. pp. 1093-1102.
The introduction of tabletop interfaces has given rise to the need for the development of secure and usable authentication techniques that are appropriate for the co-located collaborative settings for which they have been designed. Most commonly, user authentication is based on something you know, but this is a particular problem for tabletop interfaces, as they are particularly vulnerable to shoulder surfing given their remit to foster co-located collaboration. In other words, tabletop users would typically authenticate in full view of a number of observers. In this paper, we introduce and evaluate a number of novel tabletop authentication schemes that exploit the features of multi-touch interaction in order to inhibit shoulder surfing. In our pilot work with users, and in our formal user-evaluation, one authentication scheme -- Pressure-Grid -- stood out, significantly enhancing shoulder surfing resistance when participants used it to enter both PINs and graphical passwords.
© All rights reserved Kim et al. and/or their publisher
Little, Linda, Sillence, Elizabeth and Briggs, Pam (2009): Ubiquitous systems and the family: thoughts about the networked home. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 6.
Developments in ubiquitous and pervasive computing herald a future in which computation is embedded into our daily lives. Such a vision raises important questions about how people, especially families, will be able to engage with and trust such systems whilst maintaining privacy and individual boundaries. To begin to address such issues, we have recently conducted a wide reaching study eliciting trust, privacy and identity concerns about pervasive computing. Over three hundred UK citizens participated in 38 focus groups. The groups were shown Videotaped Activity Scenarios  depicting pervasive or ubiquitous computing applications in a number of contexts including shopping. The data raises a number of important issues from a family perspective in terms of access, control, responsibility, benefit and complexity. Also findings highlight the conflict between increased functionality and the subtle social interactions that sustain family bonds. We present a Pre-Concept Evaluation Tool (PRECET) for use in design and implementation of ubicomp systems.
© All rights reserved Little et al. and/or ACM Press
Little, Linda and Briggs, Pam (2009): Private whispers/public eyes: Is receiving highly personal information in a public place stressful?. In Interacting with Computers, 21 (4) pp. 316-322.
The use of technology to access personal information in public places is increasingly common, but can these interactions induce stress? Sixty-eight participants were led to believe that extremely sensitive personal information would be displayed via either a public or personal handheld device in isolated or crowded (in the presence of strangers) conditions. Stress responses were taken in terms of heart rate, galvanic skin response and subjective ratings. As anticipated, participants showed stronger stress reactions in the crowded rather than the isolated conditions and also experienced greater stress when the information was presented on a public screen in comparison to a personal handheld device. Implications for the design of public/private information systems are discussed.
© All rights reserved Little and Briggs and/or Elsevier Science
Little, Linda and Briggs, Pam (2008): Ubiquitous Healthcare: Do we want it?. In: Proceedings of the HCI08 Conference on People and Computers XXII 2008. pp. 53-56.
In this paper we describe the development and test of a futuristic health scenario that allows the seamless exchange of sensitive personal data. The scenario was used to elicit user attitudes and concerns in thirty-eight focus groups drawn from a representative population sample. Emergent themes are described in terms of firstly, those hygiene factors that act as precursors to successful engagement with the technology, secondly, those motivators that would drive acceptance and thirdly, longer-term societal impact.
© All rights reserved Little and Briggs and/or their publisher
Light, Ann, Briggs, Pam and Martin, Karen (2008): Seeding Without Leading: Making Space for Participant Contribution in Design Elicitation Techniques. In: Proceedings of the HCI08 Conference on People and Computers XXII 2008. pp. 159-161.
As HCI embraces experience design, it will increasingly rely on new elicitation methods that are capable of drawing out the multi-faceted subjectivities of individuals without being overly prescriptive as to the final design or experience outcome. In this panel we wish to describe and discuss subtle elicitation techniques that allow the elicitation of participant ideas and interests with minimum prejudicing by the researcher. We argue that leaving space for meaning to be made by project informants is a valuable approach to understanding both design requirements and use issues. We show work that has come from taking this approach and discuss why we have been concerned to keep a creative space open in our research and how we invite people into it.
© All rights reserved Light et al. and/or their publisher
Sillence, Elizabeth, Little, Linda and Briggs, Pam (2008): E-health. In: Proceedings of the HCI08 Conference on People and Computers XXII 2008. pp. 179-180.
E-health refers to information and health services delivered via the Internet or related technologies. Whilst usage statistics suggests that the internet is an e-health success story issues surrounding quality of information, user interaction and personalization raise important questions for researchers and designers alike. The move towards ubiquitous computing accentuates these concerns and highlights the relevance of trust, privacy and disclosure to the debate. This one-day workshop will bring together an interdisciplinary group of researchers and practitioners to discuss how the fields of human computer interaction and applied psychology can address the issues raised by the growing domain of e-health.
© All rights reserved Sillence et al. and/or their publisher
Show this list on your homepage
Join the technology elite and advance:
Changes to this page (author)06 Dec 2012: Modified30 Nov 2012: Modified
09 Nov 2012: Added
18 Nov 2010: Added
02 Nov 2010: Added
02 Nov 2010: Added
17 Feb 2010: Modified
08 Sep 2009: Added
12 Jul 2009: Added
12 Jul 2009: Added
12 Jul 2009: Added
Page maintainer: The Editorial Team