ABSTRACT
While trying to learn how to use current collaboration systems, users face many challenges, including difficulty trying out new features and experimenting without their actions affecting other users. This paper proposes an innovative approach to solve these problems by simulating the collaboration system. In this simulated environment, a user can: confirm the effect of certain actions on other people before performing the actions; check what information can be accessed by other users; and interact as another user to see if the user can perform tasks as expected. By simulating the collaboration with more than one person simultaneously, a user can test synchronous communication features using a single account. Integrating this solution into the current collaboration environment will improve the usability of collaboration software, and reduce users' reliance on administrators to support their collaboration interactions.
- Heitzmann, A., Palazzi, B., Papamanthou, C. an d Tamassia, R. 2008. Effective Visualization of File System Access-Control. In Proceedings of the 5th international workshop on Visualization for Computer Security. (Cambridge, MA, United States, 2008). Lecture Notes In Computer Science; Vol. 5210. Springer-Verlag Berlin, Heidelberg. 18--25. DOI=http://dx.doi.org/10.1007/978-3-540-85933-8_2. Google ScholarDigital Library
- Reeder, R. W., Bauer, L., Cranor, L. F., Reiter, M. K., Bacon, K., How, K. and Strong, H. 2008. Expandable grids for visualizing and authoring computer security policies. In Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. (Florence, Italy, 2008). ACM New York, NY, USA, 1473--1482. DOI=http://doi.acm.org.oca.ucsc.edu/10.1145/1357054.1357285 Google ScholarDigital Library
- Velasquez, N. F. and Weisband, S. P. 2009. System Administrator as Broker Technicians. In Proceedings of the Symposium on CHIMIT. (Baltimore, Maryland, USA, November 7--8, 2009). ACM, New York, NY. DOI= http://doi.acm.org/10.1145/1641587.1641588. Google ScholarDigital Library
- Watson, J., Whitney, M. and Lipford, H. R. 2009. Configuring audience-oriented privacy policies. In Proceedings of the 2nd ACM workshop on Assurable and usable security configuration (Chicago, Illinois, USA, 2009). ACM New York, NY, USA, 71--78. DOI=http://doi.acm.org.oca.ucsc.edu/10.1145/1655062.1655076 Google ScholarDigital Library
Index Terms
- Transparent collaboration: letting users simulate another user's world
Recommendations
Forms of collaboration in high performance computing: exploring implications for learning
CSCW '06: Proceedings of the 2006 20th anniversary conference on Computer supported cooperative workSuccessful collaboration is not only an occasion for the accomplishment of shared goals, but also provides opportunities for individual collaborators to learn from each other. Extended interaction allows for participants to resolve personal and ...
Role-based collaboration and its kernel mechanisms
Computer-supported cooperative work (CSCW) systems are computer-based tools that support the collaborative activities of human users. They should not only support virtual face-to-face collaborative environments but also improve face-to-face ...
The collaboratory: a virtual, collaborative learning environment
CHI EA '97: CHI '97 Extended Abstracts on Human Factors in Computing SystemsThe Collaboratory is the result of a future-oriented project in learning, in which the process of human-centered design was applied to the observed problems and opportunities in learning in high schools [1]. It is a shared virtual space which teaches ...
Comments