Thursday 3 May 2007

Analysis of the usability and HCI problems

Before we can make technology useful, we must understand the ways in which it can be used. Wearable computing is a pervasive computing technology that will make interaction between humans and computers much easier. However we must acknowlegde that no sophisticated hardware will make up for a poor interface.

We need to address closely how people prefer/like to interact with the real world and each other. This could be in a verbal or gestured manner guess it depends on how the individual wants to communicate. If we understand how to combine interfaces and applications which support people and their way of life we will be beneifiting them much more not just becoming another problem in their way.

Here are some key issues that need to be addressed before this technology can become widely availiable:-

- User interfaces and wearability are still open problems, even 10 years research. Testing and prototyping need to be tigther and more thorough to achieve the expected results.

- The testing of wearable computing needs to be done under realistic conditions. Therefore by conducting tests in this way we are not only solving problems but doing so in a theoretical and practical manner.

- Wearable computing isn't just about exploring the capabilities of the devices we are able wear but also about breaking through new barriers of technology to make them useful to us in a way never imagined or done before.

A large majority of wearable computing availiable today has some sort of text input device such as wrist-worn keyboards that have adopted the minimization method of reducing keys. This reduction has caused many problems such as KSPC (Keystrokes per Character), decreases text entry performance, and requires additional effort to learn a new typing method. Due to the keyboard being much smaller users will struggle alot more to type messages in and also be prone to more errors.



We are faced with wearability and usability in designing a good wearable keyboard to accompany our wearable computing devises. A japanses company has taken this upon themselves to try to address this problem and they have come out with a new keyboard minimization method of reducing key pitch and have developed the "One-key Keyboard".

The traditional desktop keyboard has one key per character, but One-key Keyboard has only one key (70mmX35mm) on which a 10*5 QWERTY key array is printed. One-key Keyboard detects the position of the fingertip at the time of the keying event and figures out the character entered. Although there is a wide variety of wearable computing devices becoming availiable they will not all be successful as anticipated if they are not tested for useability and HCI principles but we can see that improvements are going to great lengths to make products work. This is the just the beginning for wearable computing this will be a future evolving technology that will make a difference to the way we see, hear and learn new things.

References

History of Wearable Computing

Wiki (26 April 2007) 'Wearable Computer' [online] [cited on 20 April 2007]
Available on URL:http://en.wikipedia.org/wiki/Wearable_computer

Advantages of Wearable Computing

DeVaul R (2007) 'Why use a Wearable' [online] [cited on 26 April 2007] Available on URL:http://www.media.mit.edu/wearables/mithril/intro/topic2.html

Vivometrics (2007) 'VivoMetrics' [online] [cited on 22 April] Available on URL: http://www.vivometrics.com/research/index.php

ags (2007) 'Wearable Computing' [online] [cited on 28 April 2007] Available on URL:http://www.ags.uci.edu/~clarka/wearable.html

Disadvantages of Wearable Computing

DeVaul R (2007) 'Why use a Wearable' [online] [cited on 26 April 2007] Available on URL:http://www.media.mit.edu/wearables/mithril/intro/topic2.html

How Wearable Computing is being used?

Cliff R (2007) 'The Shopping Jacket: Wearable Computing for Consumer' [online] [cited on 27 April 2007] Available on URL:http://www.cs.bris.ac.uk/Publications/Papers/1000518.pdf

What is Wearable Computing?

wearcam (2007) 'Definition of Wearable Computing'[online] [cited on 02 May 2007] Available on URL:http://wearcam.org/wearcompdef.html

Ssoendker (16 April 2007) 'ZyPAD Industrial Rugged Wearable Computer from Arcom'[online] [cited on 23 April 2007] Available on URL: http://www.youtube.com/watch?v=gqxJVsbrKIk

What is Pervasive Computing?

Wikipedia (2007) 'Ubiquitous computing' [online] [cited on 26 April 2007] available at URL:http://en.wikipedia.org/wiki/pervasive_computing

Analysis of the usability and HCI problems

'One Keyboard' [online] [cited on 3rd May 2007] availiable at
URL: http://portal.acm.org/citation.cfm?id=1228229&CFID=21326057&CFTOKEN=38652514&ret=1#Fulltext

'The MIThril Vision' [online] [cited on 3rd May 2007] availiable at
URL: http://www.media.mit.edu/wearables/mithril/vision.html

'On Site Maintenance Using a Wearable Computer System' [online] [cited on 3rd May 2007] availiable at
URL: http://acm.org/sigchi/chi95/proceedings/intpost/bs_bdy.htm

Civil Liberty

Daniel Sieberg, 2001 [Online, http://archives.cnn.com/2001/TECH/ptech/11/15/comdex.biometric/index.html]

Francisco Javier Arias Moreno, 2007 [Online, http://www.cs.helsinki.fi/u/riva/Courses/papers/WearableComputing_Arias_session3.pdf]

(Mann, Nolan and Wellman: Sousveillance, 2003) [Online, http://www.surveillance-and-society.org/articles1(3)/sousveillance.pdf]

Civil Liberty

A major challenge in wearable computing is preserving privacy, in particular against the distribution of personal information and potential abuses. Wearable computers can be used as a surveillance technology, a service and other social means that we have defined in this blog. We will be concentrating on security issues regarding wearable computers.

When technology is used as surveillance, there can be many advantages for example in Tokyo, Kasumigaseki Station a CCTV with computerized Facial Recognition System, scans the image of a person and then compares it to a database with facial images based on biometric cameras. Only if the user is recognized then they are allowed entry onto a train (Francisco Javier Arias Moreno, 2007), this helps with recognizing potential criminals and terrorists. Technology has grown tremendously over the years, wearable computers have been introduced and they consist of features such features as, a notepad, talking reminder and weather forecast. Additional features like a wearable that scans people and then compares it to a database (similar to the Tokyo CCTV system) are being developed for the army, SWAT etc. These wearable’s can withstand walking, running and can scan multiple faces instantly (Daniel Sieberg, 2001). Wearable computers are adapting to withstand, the rigor of the society and can be adapted for many new uses such as scanning a persons body posture, so even if he grown a mustache or beard he will still be recognized. Hence the potential for wearable computers to contain such features and more would mean a very powerful tool for combating crime… or spying on civilians.



If a person is being scanned without their knowledge or permission this can be very distressing and it’s an invasion of privacy, further so if that person is denied a service (the example of the train). A research paper by (Mann, Nolan and Wellman: Sousveillance, 2003) showed there are various methods in using technology for surveillance (where people can see the image and image capture device, image displayed but wearable device is hidden, complete objection to surveillance…) society usually accept or are even amused by the prospect of them appearing on a screen from a wonderful technology, that could be hidden or apparent. However some people are adamant that surveillance as a whole is too far, as there is so many cameras around anyway, we are being watched everywhere we go and psychological profiles are being created about us. People with wearable’s can be placed inside a crowd and could interact like normal people and capture images, personal information, habits, bank details etc. on their wearable which is uploaded to a computer instantly. If this data gets lost or stolen this could be very harmful to the society, as sensitive information can be used by criminals to commit fraud and further crimes.