Number of co-authors:30
Number of publications with 3 favourite co-authors:Xiang Cao:Abigail Sellen:Andrew Zaldivar:
Xianghua Ding's 3 most productive colleagues in number of publications:Paul Dourish:95Abigail Sellen:81Thomas Erickson:53
go to course
Gestalt Psychology and Web Design: The Ultimate Guide
Starts the day after tomorrow !
go to course
Become a UX Designer from scratch
92% booked. Starts in 3 days
Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess
User Experience and Experience Design !
Our Latest Books
The Glossary of Human Computer Interaction
by Mads Soegaard and Rikke Friis Dam
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
Publications by Xianghua Ding (bibliography)
Wang, Qi, Ding, Xianghua, Lu, Tun, Xia, Huanhuan and Gu, Ning (2012): Infrastructural experiences: an empirical study of an online arcade game platform in China. In: Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work 2012. pp. 583-592. http://dx.doi.org/10.1145/2145204.2145294
This paper discusses issues of infrastructure and user experiences based on an empirical study of the online gaming platform ArcOnline in China. ArcOnline has allowed millions of users to play and watch arcade games over the Internet. What the study of ArcOnline helps bring to the fore are the infrastructural aspects of user experiences, mainly because the high demand for responsiveness and resources of arcade gaming has made infrastructures visible. In this paper, we present our findings of how the experience of playing arcade games changes with different socio-technical infrastructures, the arcade room and the online environment, highlighting how the form of the infrastructure shapes experience and collaboration, as well as how new social infrastructures are emerging through the interplay between the game, the platform, the community and the media ecology. We end by discussing the importance of considering infrastructure in understanding and designing new media experiences.
© All rights reserved Wang et al. and/or ACM Press
Xia, Huanhuan, Ding, Xianghua, Lu, Tun, Wang, Qi and Gu, Ning (2012): Mobility in online communities: a case study of mobile BBS in use in China. In: Companion Proceedings of ACM CSCW12 Conference on Computer-Supported Cooperative Work 2012. pp. 251-254. http://dx.doi.org/10.1145/2141512.2141590
Despite the extensive effort in creating mobile community services, little has been done to understand what increased mobility implies. In this paper, we focus on a Bulletin Board System (BBS) based online community of a Chinese university, and report a study of the use of its mobile client. We end by drawing implications and conclusions for extending online communities to the mobile environment.
© All rights reserved Xia et al. and/or ACM Press
Cao, Xiang, Sellen, Abigail, Brush, A. J. Bernheim, Kirk, David, Edge, Darren and Ding, Xianghua (2010): Understanding family communication across time zones. In: Proceedings of ACM CSCW10 Conference on Computer-Supported Cooperative Work 2010. pp. 155-158. http://doi.acm.org/10.1145/1718918.1718947
Nowadays it has become increasingly common for family members to be distributed in different time zones. These time differences pose specific challenges for communication within the family and result in different communication practices to cope with them. To gain an understanding of current challenges and practices, we interviewed people who regularly communicate with immediate family members living in other time zones. We report primary findings from the interviews, and identify design opportunities for improving the experience of cross time zone family communication.
© All rights reserved Cao et al. and/or their publisher
Edge, Darren and Ding, Xianghua (2009): Directed manipulation with respect to focal rings. In: Proceedings of the HCI09 Conference on People and Computers XXIII 2009. pp. 83-92. http://doi.acm.org/10.1145/1671011.1671021
In this paper we describe the notion of a focal ring interface: an interface comprising a centrally-located graphical ring that provides a visual focus for interaction with respect to itself and its associated representation (such as a map, media collection, or information hierarchy). Our focal rings provide an opportunity to assign independent effects to the two dimensions of a display surface, creating implicit gestural modes (e.g. navigation versus scaling) that can be dynamically switched between in the context of a single continuous stroke. A focal ring can define the origin of a Polar or Cartesian frame of reference, interpreting touch gestures directed either through and around, or horizontal and vertical to itself. We illustrate the potential for such directed manipulation with respect to focal rings through the design and evaluation of ring-centric interfaces based on a variety of physical metaphors.
© All rights reserved Edge and Ding and/or their publisher
Ding, Xianghua and Patterson, Donald J. (2009): Status on Display: a Field Trial of Nomatic*Viz. In: Proceedings of the 11th European Conference on Computer-Supported Cooperative Work 2009. pp. 303-322. http://www.ecscw.org/2009/21-Ding%20and%20Patterson.pdf
The use of personal status messages is becoming a part of popular culture through wide-spread instant messaging (IM) adoption, the growth of social networking websites and the increased connectivity provided by mobile phones. However, the implications of status broadcasting and people's behavior in the milieu of social life is still poorly understood. In this paper, we present the results of a field trial in which we examined how community members come to understand and appropriate a status broadcasting service into their daily use. We designed Nomatic*Viz, a situated large display showing people's location and status messages to complement an existing status message distribution tool called Nomatic*IM. Through a five month field study of its use we uncovered not only how it supports lightweight awareness of the community, but also how it participates in creating new spatial experiences and how people perform and negotiate self-representations through multiple simultaneous displays of personal status.
© All rights reserved Ding and Patterson and/or their publisher
Patterson, Donald J., Ding, Xianghua, Kaufman, Samuel J., Liu, Kah and Zaldivar, Andrew (2009): An Ecosystem for Learning and Using Sensor-Driven IM Status Messages. In IEEE Pervasive Computing, 8 (4) pp. 42-49. http://doi.ieeecomputersociety.org/10.1109/MPRV.2009.67
Ding, Xianghua and Patterson, Donald J. (2008): NomaticBubbles: visualizing communal whereabouts. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008. pp. 3765-3770. http://doi.acm.org/10.1145/1358628.1358927
We describe the design of the NomaticBubbles, a visualization that provides cues of communal whereabouts. Unlike most location displays showing whereabouts on a geographical map, the NomaticBubbles depicts historical and aggregate traces of participants' whereabouts in an abstract and ambiguous manner. We describe the design of the NomaticBubbles, and discuss some early experiences and feedback we got, as well as future work.
© All rights reserved Ding and Patterson and/or ACM Press
Patterson, Donald J., Baker, Christopher, Ding, Xianghua, Kaufman, Samuel J., Liu, Kah and Zaldivar, Andrew (2008): Online everywhere: evolving mobile instant messaging practices. In: Youn, Hee Yong and Cho, We-Duke (eds.) UbiComp 2008 Ubiquitous Computing - 10th International Conference September 21-24, 2008, Seoul, Korea. pp. 64-73. http://doi.acm.org/10.1145/1409635.1409645
Ding, Xianghua, Erickson, Thomas, Kellogg, Wendy A., Levy, Stephen, Christensen, James E., Sussman, Jeremy, Wolf, Tracee Vetting and Bennett, William (2007): An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC. In: Proceedings of ACM CHI 2007 Conference on Human Factors in Computing Systems 2007. pp. 1019-1028. http://doi.acm.org/10.1145/1240624.1240780
IBM Enhanced Audio Conferencing (IEAC) is a VoIP-based audio conferencing system that, like several other systems, provides a visualization showing who is present and their states (e.g., speaking, muted). This paper presents the first study of the use of such a system. Drawing on log files collected over six weeks of use by over 1300 corporate employees, and interviews with 10 of them, we look at how and why various features of the system are used and what sorts of practices are supported. Our findings shed light on the factors that drive the use of visual enhancements to audio conferencing, and suggest further research topics.
© All rights reserved Ding et al. and/or ACM Press
Patterson, Donald J., Ding, Xianghua and Noack, Nicholas (2006): Nomatic: Location By, For, and Of Crowds. In: Hazas, Mike, Krumm, John and Strang, Thomas (eds.) Location- and Context-Awareness - Second International Workshop - LoCA 2006 May 10-11, 2006, Dublin, Ireland. pp. 186-203. http://dx.doi.org/10.1007/11752967_13
Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann and Filho, Roberto Silva (2005): In the eye of the beholder: A visualization-based approach to information system security. In International Journal of Human-Computer Studies, 63 (1) pp. 5-24. http://dx.doi.org/10.1016/j.ijhcs.2005.04.021
Computer system security is traditionally regarded as a primarily technological concern; the fundamental questions to which security researchers address themselves are those of the mathematical guarantees that can be made for the performance of various communication and computational challenges. However, in our research, we focus on a different question. For us, the fundamental security question is one that end-users routinely encounter and resolve for themselves many times a day -- the question of whether a system is secure enough for their immediate needs. In this paper, we will describe our explorations of this issue. In particular, we will draw on three major elements of our research to date. The first is empirical investigation into everyday security practices, looking at how people manage security as a practical, day-to-day concern, and exploring the context in which security decisions are made. This empirical work provides a foundation for our reconsideration of the problems of security to a large degree as an interactional problem. The second is our systems approach, based on visualization and event-based architectures. This technical approach provides a broad platform for investigating security and interaction, based on a set of general principles. The third is our initial experiences in a prototype deployment of these mechanisms in an application for peer-to-peer file sharing in face-to-face collaborative settings. We have been using this application as the basis of an initial evaluation of our technology in support of everyday security practices in collaborative workgroups.
© All rights reserved Paula et al. and/or Academic Press
Paula, Rogerio de, Ding, Xianghua, Dourish, Paul, Nies, Kari, Pillet, Ben, Redmiles, David F., Ren, Jie, Rode, Jennifer Ann and Filho, Roberto Silva (2005): Two experiences designing for effective security. In: Proceedings of the 2005 Symposium on Usable Privacy and Security 2005. pp. 25-34. http://cups.cs.cmu.edu/soups/2005/2005proceedings/p25-depaula.pdf
In our research, we have been concerned with the question of how to make relevant features of security situations visible to users in order to allow them to make informed decisions regarding potential privacy and security problems, as well as regarding potential implications of their actions. To this end, we have designed technical infrastructures that make visible the configurations, activities, and implications of available security mechanisms. This thus allows users to make informed choices and take coordinated and appropriate actions when necessary. This work differs from the more traditional security usability work in that our focus is not only on the usability of security mechanism (e.g., the ease-of-use of an access control interface), but how security can manifest itself as part of people's interactions with and through information systems (i.e., how people experience and interpret privacy and security situations, and are enabled or constrained by existing technological mechanisms to act appropriately). In this paper, we report our experiences designing, developing, and testing two technical infrastructures for supporting this approach for usable security.
© All rights reserved Paula et al. and/or ACM Press
Join our community and advance:
Page maintainer: The Editorial Team