Publication statistics

Pub. period:2002-2011
Pub. count:23
Number of co-authors:24



Co-authors

Number of publications with 3 favourite co-authors:

Kevin F. White:9
Anita Komlodi:6
David Gurzick:5

 

 

Productive colleagues

Wayne G. Lutters's 3 most productive colleagues in number of publications:

Mark S. Ackerman:67
Penny Rheingans:28
Eser Kandogan:15
 
 
 

Upcoming Courses

go to course
Emotional Design: How to make products people will love
Starts TODAY LAST CALL!
go to course
UI Design Patterns for Successful Software
87% booked. Starts in 8 days
 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

 
 
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
start reading
 
 
 
 
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
start reading
 
 
 
 
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
start reading
 
 

Wayne G. Lutters

 

Publications by Wayne G. Lutters (bibliography)

 what's this?
2011
 
Edit | Del

Gurzick, David, White, Kevin F., Lutters, Wayne G., Landry, Brian M., Dombrowski, Caroline and Kim, Jeffery Y. (2011): Designing the future of collaborative workplace systems: lessons learned from a comparison with alternate reality games. In: Proceedings of the 2011 iConference 2011. pp. 174-180. Available online

Alternate reality games (ARGs) represent a unique form of group collaboration. A careful comparison of ARGs to more traditional collaborative systems reveals areas for innovation in tools to support ad-hoc teaming. This comparison specifically focuses on processes of group formation, task management, information discovery and collective storytelling. Opportunities for innovation are highlighted, as are future research questions.

© All rights reserved Gurzick et al. and/or ACM Press

2009
 
Edit | Del

Gurzick, David, White, Kevin F., Lutters, Wayne G. and Boot, Lee (2009): A view from Mount Olympus: the impact of activity tracking tools on the character and practice of moderation. In: GROUP09 - International Conference on Supporting Group Work 2009. pp. 361-370. Available online

Moderation within online communities is critical. Though many guidelines are available that describe the goals of successful moderation, these often minimize the complex interplay that exists between tools and practices of moderators. This study investigates the role of moderation through the lens of the moderators in a nascent online community for adolescents. Based on an analysis of their activities, three classes of emergent behavior were uncovered when exploring how the available tools impacted the way moderator work was performed. The findings reveal a need for design considerations that take into account the appropriateness of match between the tools and work processes from a moderator perspective.

© All rights reserved Gurzick et al. and/or their publisher

 
Edit | Del

White, Kevin F., Gurzick, David and Lutters, Wayne G. (2009): Wiki anxiety: impediments to implementing wikis for IT support groups. In: Proceedings of the 2009 Symposium on Computer Human Interaction for the Management of Information Technology 2009. p. 10. Available online

As web technologies have flourished, the workplace has become inundated with new, often-overlapping applications meant to assist busy employees with information management and collaboration. IT departments seeking to implement these systems encounter difficulties in determining which to use. This paper reports on the impediments that arose as a result of the installation of a knowledge sharing wiki in tandem with other knowledge sharing tools within six school technology departments. Analysis of the use and perception of the wiki revealed two prevalent issues: concern over achieving a critical mass of content and anxiety over potential unintended/unexpected content changes.

© All rights reserved White et al. and/or ACM Press

2008
 
Edit | Del

Komlodi, Anita and Lutters, Wayne G. (2008): Collaborative use of individual search histories. In Interacting with Computers, 20 (1) pp. 184-198. Available online

Interaction history tools record interactions between users and systems, allowing users to annotate, edit, and replay their activities. Search history tools, a class of interaction history recorders, preserve search, browse, and other information-seeking steps. These tools include web browser histories and history lists in online full-text databases. Although search history tools were developed to support individuals in their information seeking, individuals often share their histories with one another collaboratively. This paper examines such sharing behaviors in two field studies of knowledge workers who routinely shared their individual search histories with their colleagues. While this practice is widespread, it is not supported by the design of contemporary interaction history tools. The results of the field research highlight core dimensions of this activity and inform considerations for the next generation of collaboration-sensitive interaction history tools.

© All rights reserved Komlodi and Lutters and/or Elsevier Science

 
Edit | Del

Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D. and Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA.

 
Edit | Del

Heckle, Rosa R., Lutters, Wayne G. and Gurzick, David (2008): Network authentication using single sign-on: the challenge of aligning mental models. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D. and Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. p. 6. Available online

 
Edit | Del

White, Kevin F., Lutters, Wayne G. and Komlodi, Anita (2008): Towards virtualizing the helpdesk: assessing the relevance of knowledge across distance. In: Frisch, AEleen, Kandogan, Eser, Lutters, Wayne G., Thornton, James D. and Mouloua, Mustapha (eds.) CHIMIT 2008 - Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology November 14-15, 2008, San Diego, California, USA. p. 3. Available online

 
Edit | Del

White, Kevin F., Lutters, Wayne G. and Komlodi, Anita H. (2008): Towards virtualizing the helpdesk: assessing the relevance of knowledge across distance. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology 2008. p. 3. Available online

Managers of information systems face a knowledge crisis as they operate in increasingly heterogeneous, hostile, expertise-poor environments. This problem is compounded for small organizations. This paper presents results from field research on the feasibility of fostering cross-organizational knowledge sharing in order to expand access to expertise for pernicious problems while minimizing the loss of context, such as situational and environmental factors, that impacts the usefulness of solutions. This essentially creates a virtual, cross-organizational helpdesk. In order to understand the utility of such a system we explore how employees' satisfaction with helpdesk articles changes as the source of the articles moves further away from local creation to generic solutions. Our findings suggest that procedurally-based information available within major Internet repositories tends to be the most highly relevant and valued within organizations. However, when no documentation is available from manufacturers, information contributed by partner sites is more effective than those solely developed in-house. This paper suggests strategies for reusing information to impact work within small organizations.

© All rights reserved White et al. and/or ACM Press

 
Edit | Del

Heckle, Rosa, Lutters, Wayne G. and Gurzick, David (2008): Network authentication using single sign-on: the challenge of aligning mental models. In: Proceedings of the 2008 Symposium on Computer Human Interaction for the Management of Information Technology 2008. p. 6. Available online

Healthcare organizations are struggling to meet industry best practices for information security as well as complying with regulatory requirements. Single sign-on technology is emerging as a leading technology for password authentication management and promises to improve security while curbing system maintenance costs. While the technology seems to be a simple viable solution for authentication, when placed in context, many socio-technical complexities emerge. One of these complexities is that of the mismatch between the users' mental models and the system model. This study was a 15-month ethnographic field study that followed the implementation of a single sign-on system in a hospital environment. It resulted in the finding that the misaligned mental models caused difficulties not only for the user but for the system administrators. The findings also indicate that not only was the user's mental model of the technology inaccurate, but the presentation of the technology by the information technology group contributed to this misaligned understanding. The end result was dissatisfaction with the new technology for both end users and the system administrators. In order to address the critical issue of mental model misalignment in the implementation of SSO technology, practitioners must first gain an understanding of the preexisting mental models had by the target users regarding authentication and then use this information to guide implementation of the new technology.

© All rights reserved Heckle et al. and/or ACM Press

2007
 
Edit | Del

White, Kevin F. and Lutters, Wayne G. (2007): Structuring cross-organizational knowledge sharing. In: GROUP07: International Conference on Supporting Group Work 2007. pp. 187-196. Available online

Ontology development is fundamental to most knowledge management efforts. When approached in a formal knowledge engineering manner the resulting ontology usually becomes brittle when spanning even a modest number of groups within a single organization. It breaks entirely when scaled to multiple, heterogeneous organizations. A promising alternative is the bottom-up approach such as can be found in social tagging systems (e.g., del.ico.us), but little research has examined the utility of these systems for knowledge reuse activities. In this paper we extend our field work with IT helpdesk staff to examine the drivers for natural ontology development. We found that a balance between some degree of external order while maintaining local flexibility was required. This information space is navigated via social relations, especially expert referral. We examine the user-centered design criteria for both mid-level ontology development and related expert profile management.

© All rights reserved White and Lutters and/or ACM Press

 
Edit | Del

Heckle, Rosa R. and Lutters, Wayne G. (2007): Privacy implications for single sign-on authentication in a hospital environment. In: Proceedings of the 2007 Symposium on Usable Privacy and Security 2007. pp. 173-174. Available online

Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. There is an inherent tension between an authentication mechanism's security strength and the privacy implications of using that authentication technology. This is particularly true with single sign-on authentication. While single sign-on does facilitate authentication, our on-going field work in a regional hospital reveals several unanticipated privacy implications.

© All rights reserved Heckle and Lutters and/or ACM Press

 
Edit | Del

White, Kevin F. and Lutters, Wayne G. (2007): Midweight collaborative remembering: wikis in the workplace. In: Kandogan, Eser and Jones, Patricia M. (eds.) CHIMIT 2007 - Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology March 30-31, 2007, Cambridge, Massachusetts, USA. p. 5. Available online

 
Edit | Del

Das, Sumita, Lutters, Wayne G. and Seaman, Carolyn B. (2007): Understanding documentation value in software maintenance. In: Kandogan, Eser and Jones, Patricia M. (eds.) CHIMIT 2007 - Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology March 30-31, 2007, Cambridge, Massachusetts, USA. p. 2. Available online

 
Edit | Del

Das, Sumita, Lutters, Wayne G. and Seaman, Carolyn B. (2007): Understanding documentation value in software maintenance. In: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology 2007. p. P2. Available online

This study examines effective documentation use in software maintenance. Interviews with software maintainers, with diverse levels of experience, revealed three themes: reliance on source code, characteristics of useful documents, and the interplay between people in the maintenance environment and documentation. All of these findings improve our understanding of the role of documentation in maintenance. This awareness has practical import - project managers can fund the most useful forms of documentation and maintainers can improve their ability to locate and reuse this information.

© All rights reserved Das et al. and/or ACM Press

 
Edit | Del

White, Kevin F. and Lutters, Wayne G. (2007): Midweight collaborative remembering: wikis in the workplace. In: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology 2007. p. P5. Available online

This paper presents preliminary findings from a series of semi-structured telephone interviews regarding the use of wikis in the workplace. At both technical and non-technical organizations issues included article creation, management support, critical mass, and trust.

© All rights reserved White and Lutters and/or ACM Press

2006
 
Edit | Del

Goodall, John R., Lutters, Wayne G., Rheingans, Penny and Komlodi, Anita (2006): Focusing on Context in Network Traffic Analysis. In IEEE Computer Graphics and Applications, 26 (2) pp. 72-80. Available online

2005
 
Edit | Del

White, Kevin F. and Lutters, Wayne G. (2005): Insightful illusions: requirements gathering for large-scale groupware systems. In: GROUP05: International Conference on Supporting Group Work November 6-9, 2005, Sanibel Island, Florida, USA. pp. 348-349. Available online

Large-scale, organization-wide groupware systems are high risk development efforts. Requirements gathering and early evaluation are constrained by the need to attain a critical mass of users and content. One approach to mitigate this risk is to employ Wizard of Oz style system simulations during the requirements gathering phase. While this method has historically been used to test quasi-functional system prototypes, we have found it to be a useful method for assessing organizational feasibility.

© All rights reserved White and Lutters and/or ACM Press

 
Edit | Del

Dai, Liwei, Lutters, Wayne G. and Bower, Carlie (2005): Why use memo for all?: restructuring mobile applications to support informal note taking. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems 2005. pp. 1320-1323. Available online

Informal note taking is an essential activity in Personal Information Management (PIM). Most mobile devices support this via a suite of applications, employing both highly structured (e.g., calendar, task list, contacts) and loosely structured (e.g., memos) data formats. Contextual interviews and artifact inspections with expert PIM-on-PDA (Personal Digital Assistant) users explored task-to-application mapping. Structured tools were routinely avoided for informal note taking in favor of unstructured ones, even though this made managing the information more difficult. Improved support lies somewhere in between, suggesting the design of an integrated architecture, which links data across all PIM tools and provides a persistent, universal organizational system.

© All rights reserved Dai et al. and/or ACM Press

 
Edit | Del

Goodall, John R., Ozok, A. Ant, Lutters, Wayne G., Rheingans, Penny and Komlodi, Anita (2005): A user-centered approach to visualizing network traffic for intrusion detection. In: Proceedings of ACM CHI 2005 Conference on Human Factors in Computing Systems 2005. pp. 1403-1406. Available online

Intrusion detection (ID) analysts are charged with ensuring the safety and integrity of today's high-speed computer networks. Their work includes the complex task of searching for indications of attacks and misuse in vast amounts of network data. Although there are several information visualization tools to support ID, few are grounded in a thorough understanding of the work ID analysts perform or include any empirical evaluation. We present a user-centered visualization based on our understanding of the work of ID and the needs of analysts derived from the first significant user study of ID. The tool presents analysts with both 'at a glance' understanding of network activity, and low-level network link details. Results from preliminary usability testing show that users performed better and found easier those tasks dealing with network state in comparison to network link tasks.

© All rights reserved Goodall et al. and/or ACM Press

 
Edit | Del

Goodall, John R., Lutters, Wayne G., Rheingans, Penny and Komlodi, Anita (2005): Preserving the Big Picture: Visual Network Traffic Analysis with TN. In: Ma, Kwan-Liu, North, Stephen C. and Yurcik, William (eds.) VizSEC 2005 - IEEE Workshop on Visualization for Computer Security 26 October, 2005, Minneapolis, MN, USA. p. 6. Available online

2004
 
Edit | Del

Lin, Min, Lutters, Wayne G. and Kim, Tina S. (2004): Understanding the micronote lifecycle: improving mobile support for informal note taking. In: Dykstra-Erickson, Elizabeth and Tscheligi, Manfred (eds.) Proceedings of ACM CHI 2004 Conference on Human Factors in Computing Systems April 24-29, 2004, Vienna, Austria. pp. 687-694. Available online

People frequently write messages to themselves. These informal, hurried personal jottings serve as temporary storage for notable information as well as reminders for future action. Many mobile technologies have been designed specifically to support this ubiquitous behavior; however, adoption has been universally problematic. Despite its clear utility, the process of taking micronotes stubbornly resists computing support. This field study examines the lifecycles of the canonical micronote forms (immediate use, temporary storage, and prospective memory aid), pinpointing the behaviors that are mismatched with current mobile support. Implications for improving the design of these systems are presented, culminating in a vision for integrated paper-digital micronote systems. This shifts the development focus away from trying to support the entire micronote lifecycle, emphasizing instead the different behaviors best supported by the different technologies.

© All rights reserved Lin et al. and/or ACM Press

 
Edit | Del

Goodall, John R., Lutters, Wayne G. and Komlodi, Anita (2004): I know my network: collaboration and expertise in intrusion detection. In: Proceedings of ACM CSCW04 Conference on Computer-Supported Cooperative Work 2004. pp. 342-345. Available online

The work of intrusion detection (ID) in accomplishing network security is complex, requiring highly sought-after expertise. While limited automation exists, the role of human ID analysts remains crucial. This paper presents the results of an exploratory field study examining the role of expertise and collaboration in ID work. Through an analysis of the common and situated expertise required in ID work, our results counter basic assumptions about its individualistic character, revealing significant distributed collaboration. Current ID support tools provide no support for this collaborative problem solving. The results of this research highlight ID as an engaging CSCW work domain, one rich with organizational insights, design challenges, and practical import.

© All rights reserved Goodall et al. and/or ACM Press

2002
 
Edit | Del

Lutters, Wayne G. and Ackerman, Mark S. (2002): Achieving safety: a field study of boundary objects in aircraft technical support. In: Churchill, Elizabeth F., McCarthy, Joe, Neuwirth, Christine and Rodden, Tom (eds.) Proceedings of the 2002 ACM conference on Computer supported cooperative work November 16 - 20, 2002, New Orleans, Louisiana, USA. pp. 266-275. Available online

Boundary objects are a critical, but understudied, theoretical construct in CSCW. Through a field study of aircraft technical support, we examined the role of boundary objects in the "achievement of safety" by service engineers. The resolution process of repair requests was captured in two compound boundary objects. These crystallizations did not manifest a static interpretation, but instead were continually re-interpreted in light of meta-negotiations. This suggests design implications for organizational memory systems which can more fluidly represent the meta-negotiations surrounding boundary objects.

© All rights reserved Lutters and Ackerman and/or ACM Press

 
Add publication
Show list on your website
 
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
Join our community!
 
 
 

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/wayne_g__lutters.html