Number of co-authors:34
Number of publications with 3 favourite co-authors:Alfred Kobsa:3Lorrie Faith Cranor:2Pedro Giovanni Leon:2
Yang Wang's 3 most productive colleagues in number of publications:Bonnie A. Nardi:67Lorrie Faith Crano..:44Alfred Kobsa:35
go to course
Emotional Design: How to make products people will love
90% booked. Starts in 5 days
go to course
UI Design Patterns for Successful Software
82% booked. Starts in 13 days
Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess
User Experience and Experience Design !
Our Latest Books
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
Publications by Yang Wang (bibliography)
Ur, Blase and Wang, Yang (2012): Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook. In: Proceedings of the 2012 iConference 2012. pp. 398-406. Available online
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historical political events, as well as the migration from a local social networking site to Facebook, impact Hungarians' privacy attitudes on Facebook. We report the results of 19 semi-structured interviews of Hungarian Facebook users, focused on behaviors, motivations, and attitudes. Our results uncover a stark generation gap in Facebook privacy attitudes, with the youngest generation expressing little concern about personal information or intimate photos, whereas users older than 30 explain that they and their peers rarely share information on Facebook. Members of all age groups agree that political opinions should be kept off Facebook, but the motivating factors differ between generations. We also highlight how users' dissatisfaction with iWiW, the local social network, can be contrasted with the high degree of trust they have in Facebook.
© All rights reserved Ur and Wang and/or their publisher
Ur, Blase, Leon, Pedro Giovanni, Cranor, Lorrie Faith, Shay, Richard and Wang, Yang (2012): Smart, useful, scary, creepy: perceptions of online behavioral advertising. In: Proceedings of the 2012 Symposium on Usable Privacy and Security 2012. p. 4. Available online
We report results of 48 semi-structured interviews about online behavioral advertising (OBA). We investigated non-technical users' attitudes about and understanding of OBA, using participants' expectations and beliefs to explain their attitudes. Participants found OBA to be simultaneously useful and privacy invasive. They were surprised to learn that browsing history is currently used to tailor advertisements, yet they were aware of contextual targeting. Our results identify mismatches between participants' mental models and current approaches for providing users with notice and choice about OBA. Participants misinterpreted icons intended to notify them about behavioral targeting and expected that they could turn to their browser or antivirus software to control OBA. Participants had strong concerns about data collection, and the majority of participants believed that advertisers collect personally identifiable information. They also misunderstood the role of advertising networks, basing their opinions of an advertising network on that company's non-advertising activities. Participants' attitudes towards OBA were complex and context-dependent. While many participants felt tailored advertising could benefit them, existing notice and choice mechanisms are not effectively reaching users.
© All rights reserved Ur et al. and/or their publisher
Xu, Jie, Wang, Yang, Chen, Fang, Choi, Ho, Li, Guanzhong, Chen, Siyuan and Hussain, Sazzad (2011): Pupillary response based cognitive workload index under luminance and emotional changes. In: Proceedings of ACM CHI 2011 Conference on Human Factors in Computing Systems 2011. pp. 1627-1632. Available online
Pupillary response has been widely accepted as a physiological index of cognitive workload. It can be reliably measured with video-based eye trackers in a non-intrusive way. However, in practice commonly used measures such as pupil size or dilation might fail to evaluate cognitive workload due to various factors unrelated to workload, including luminance condition and emotional arousal. In this work, we investigate machine learning based feature extraction techniques that can both robustly index cognitive workload and adaptively handle changes of pupillary response caused by confounding factors unrelated to workload.
© All rights reserved Xu et al. and/or their publisher
Wang, Yang, Norcie, Gregory, Komanduri, Saranga, Acquisti, Alessandro, Leon, Pedro Giovanni and Cranor, Lorrie Faith (2011): "I regretted the minute I pressed share": a qualitative study of regrets on Facebook. In: Proceedings of the 2011 Symposium on Usable Privacy and Security 2011. p. 10. Available online
We investigate regrets associated with users' posts on a popular social networking site. Our findings are based on a series of interviews, user diaries, and online surveys involving 569 American Facebook users. Their regrets revolved around sensitive topics, content with strong sentiment, lies, and secrets. Our research reveals several possible causes of why users make posts that they later regret: (1) they want to be perceived in favorable ways, (2) they do not think about their reason for posting or the consequences of their posts, (3) they misjudge the culture and norms within their social circles, (4) they are in a "hot" state of high emotion when posting, or under the influence of drugs or alcohol, (5) their postings are seen by an unintended audience, (6) they do not foresee how their posts could be perceived by people within their intended audience, and (7) they misunderstand or misuse the Facebook platform. Some reported incidents had serious repercussions, such as breaking up relationships or job losses. We discuss methodological considerations in studying negative experiences associated with social networking posts, as well as ways of helping users of social networking sites avoid such regrets.
© All rights reserved Wang et al. and/or ACM Press
Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin and Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 10. Available online
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods have been proposed to mitigate these attacks, each requiring user assistance in authenticating information exchanged over the wireless channel via some human-perceptible auxiliary channels, e.g., visual, acoustic or tactile. In this paper, we present results of the first comprehensive and comparative study of eleven notable secure device pairing methods. Usability measures include: task performance times, ratings on System Usability Scale (SUS), task completion rates, and perceived security. Study subjects were controlled for age, gender and prior experience with device pairing. We present overall results and identify problematic methods for certain classes of users as well as methods best-suited for various device configurations.
© All rights reserved Kobsa et al. and/or ACM Press
Wang, Yang and Kobsa, Alfred (2009): Performance Evaluation of a Privacy-Enhancing Framework for Personalized Websites. In: Proceedings of the 2009 Conference on User Modeling, Adaptation and Personalization 2009. pp. 78-89. Available online
Reconciling personalization with privacy has been a continuing interest in the user modeling community. In prior work, we proposed a dynamic privacy-enhancing user modeling framework based on a software product line architecture (PLA). Our system dynamically selects personalization methods during runtime that respect users' current privacy preferences as well as the prevailing privacy laws and regulations. One major concern about our approach is its performance since dynamic architectural reconfiguration during runtime is usually resource-intensive. In this paper, we describe four implementations of our system that vary two factors, and an in-depth performance evaluation thereof under realistic workload conditions. Our study shows that a customized version performs better than the original PLA implementation, that a multi-level caching mechanism improves both versions, and that the customized version with caching performs best. The average handling time per user session is less than 0.2 seconds for all versions except the original PLA implementation. Overall, our results demonstrate that with a reasonable number of networked hosts in a cloud computing environment, an internationally operating website can use our dynamic PLA-based user modeling approach to personalize their user services, and at the same time respect the individual privacy desires of their users as well as the privacy norms that may apply.
© All rights reserved Wang and Kobsa and/or their publisher
Wang, Yang and Mainwaring, Scott D. (2008): Human-Currency Interaction: learning from virtual currency use in China. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008. pp. 25-28. Available online
What happens when the domains of HCI design and money intersect? This paper presents analyses from an ethnographic study of virtual currency use in China to discuss implications for game design, and HCI design more broadly. We found that how virtual currency is perceived, obtained, and spent can critically shape gamers' behavior and experience. Virtual and real currencies can interact in complex ways that promote, extend, and/or interfere with the value and character of game worlds. Bringing money into HCI design heightens existing issues of realness, trust, and fairness, and thus presents new challenges and opportunities for user experience innovation.
© All rights reserved Wang and Mainwaring and/or ACM Press
Lindtner, Silvia, Nardi, Bonnie A., Wang, Yang, Mainwaring, Scott, Jing, He and Liang, Wenjing (2008): A hybrid cultural ecology: world of warcraft in China. In: Proceedings of ACM CSCW08 Conference on Computer-Supported Cooperative Work 2008. pp. 371-382. Available online
We analyze online gaming as a site of collaboration in a digital-physical hybrid. We ground our analysis in findings from an ethnographic study of the online game World of Warcraft in China. We examine the interplay of collaborative practices across the physical environment of China's Internet cafes and the virtual game space of World of Warcraft. Our findings suggest that it may be fruitful to broaden existing notions of physical-digital hybridity by considering the nuanced interplay between the digital and physical as a multi-dimensional environment or "ecology". We illustrate how socio-economics, government regulations and cultural value systems shaped a hybrid cultural ecology of online gaming in China.
© All rights reserved Lindtner et al. and/or ACM Press
Wang, Yang and Kobsa, Alfred (2007): Respecting Users' Individual Privacy Constraints in Web Personalization. In: Conati, Cristina, McCoy, Kathleen F. and Paliouras, Georgios (eds.) User Modeling 2007 - 11th International Conference - UM 2007 June 25-29, 2007, Corfu, Greece. pp. 157-166. Available online
Wang, Yang and Hirakawa, Masahito (2006): Video editing based on object movement and camera motion. In: Celentano, Augusto (ed.) AVI 2006 - Proceedings of the working conference on Advanced visual interfaces May 23-26, 2006, Venezia, Italy. pp. 108-111. Available online
Wang, Yang and Viradharajan, Vijay (2006): DynamicTrust: The Trust Development in Peer-to-Peer Environments. In: SUTC 2006 - IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing 5-7 June, 2006, Taichung, Taiwan. pp. 302-305. Available online
Wang, Yang (2005): Constraint-Sensitive Privacy Management for Personalized Web-Based Systems. In: Ardissono, Liliana, Brna, Paul and Mitrovic, Antonija (eds.) User Modeling 2005 - 10th International Conference - UM 2005 July 24-29, 2005, Edinburgh, Scotland, UK. pp. 524-526. Available online
Wang, Yang, Huang, Xiaolei, Lee, Chan-Su, 0002, Song Zhang, Li, Zhiguo, Samaras, Dimitris, Metaxas, Dimitris N., Elgammal, Ahmed M. and Huang, Peisen (2004): High Resolution Acquisition, Learning and Transfer of Dynamic 3D Facial Expressions. In Comput. Graph. Forum, 23 (3) pp. 677-686. Available online
Wang, Yang and Kunz, Thomas (2003): A Dynamic Assignment Problem in a Mobile System with Limited Bandwidth. In: HICSS 2003 2003. p. 293. Available online
Join our community and advance:
Page maintainer: The Editorial Team