Person:
Potts, Colin

Associated Organization(s)
Organizational Unit
ORCID
ArchiveSpace Name Record

Publication Search Results

Now showing 1 - 10 of 15
No Thumbnail Available
Item

21st Century Liberal Arts

2016-12-02 , Bankoff, Joe , Goldbart, Paul , Husbands Fealing, Kaye , Laband, David , Potts, Colin , Royster, Jacqueline , Stenport, Anna , Usselman, Steven W. , Utz, Richard , Wepfer, William

The ICLAST interdisciplinary research discussion series is designed to encourage research collaborations and to disseminate research to faculty, post doctoral fellows, and masters and undergraduate students across the College and campus. Panelists from different Georgia Tech units present their research on a common topic linking the liberal arts, sciences, and technology.

Thumbnail Image
Item

Private Policies Examined: Fair Warning or Fair Game?

2003 , Jensen, Carlos , Potts, Colin

Posting privacy policies has become a popular practice with businesses as they seek to shield themselves from potential liability or regulation, as well as inform users about their privacy and rights. These policies are in many ways modeled after software license statements, and are often more legalistic than user friendly. This paper examines the current practice of privacy policies as fair warning hold up from a usability perspective, and what steps can be taken to ensure that the average user can protect their privacy online.

Thumbnail Image
Item

Observer Mercury Project

1998 , Potts, Colin

Thumbnail Image
Item

Developing Voice-only Applications in the Absence of Speech Recognition Technology

1997 , Dey, Anind K. , Catledge, Lara D. , Abowd, Gregory D. , Potts, Colin

In this paper, we describe an information access system with a voice-only interface. We outline a design process for generating guidelines for voice-only interaction in the absence of adequate speech recognition technology. Our usability studies make use of a "Wizard of Oz" scheme to replace the missing core technology.

Thumbnail Image
Item

Policy modularity: toward a science of socially-embedded system

2009-07-14 , Potts, Colin

Thumbnail Image
Item

Improving requirements completeness through inquiry-based goal refinement

1999 , Potts, Colin

Thumbnail Image
Item

Towards a Framework for Hypermedia Scenarios

1998 , Hobbs, Reginald L. (Reginald Lionel) , Potts, Colin

Scenarios have been used in many disciplines, such as software engineering, cognitive science, and HCI (Human-Computer Interaction) to aid in decision making, comprehension, design, and training. Scenarios are instances of behavior of the systems, or "stories" about how the system will or should look. These scenarios are used largely as points of discussion in each of these cases. Building new scenarios or analyzing existing scenarios orient the discussion in collaborative activities and increase understanding in single user tasks. How can a scenario structure be defined that will support the widest range of discussion/comprehension activities and remain content- and access-independent? Scenarios can be structured as a document. In some ways, it is similar to a screenplay document from the film industry. The use of a markup language will allow scenario documents to take advantage of hypermedia representations of the components. Building appropriate tools to interpret the Scenario Markup Language (SCML) will support the creation of different representations of scenarios (such as storyboards, audiovisual segments, narratives, etc.) from the same data. Interactions between SCML and tool functionality will also support scenario authoring, dependency analysis, and structured walkthroughs.

Thumbnail Image
Item

STRAP: A Structured Analysis Framework for Privacy

2005 , Jensen, Carlos , Tullio, Joseph , Potts, Colin , Mynatt, Elizabeth D.

Privacy is an important concern for users, and a difficult design challenge. Different user populations have different requirements and expectations when it comes to privacy; thus finding universally acceptable solutions is far from trivial. Design guidelines have been available for a number of years, but often fail to address the dynamic and impromptu nature of privacy management. These methods also fail to provide a robust and replicable procedure for identifying potential problems, leaving the design process more in the realm of art than science. We identify general requirements for privacy-aware design and review how existing methods and guidelines meet these requirements. We then introduce a light-weight method adapted from the requirements engineering literature for the structured analysis of privacy vulnerabilities in design and the iterative adaptation of preferences. We present a study of this method on a predictive group calendar system.

Thumbnail Image
Item

Coordination in Multi-Organization Creative Design Projects

1998 , Eastman, Charles M. , Hsi, Idris , Potts, Colin

We are interested in the coordination of design and planning decisions in large, multi-organizational projects and their implications for technology support. These projects are undertaken by goal-driven "virtual organizations", involving companies of different sizes, professional traditions, cultures, as well as geographic location. We have observed several months of planning and review meetings in a multi-national architectural project and have gathered volumes of design and planning documentation in the form of memoranda, faxes, project plans and design drawings. From our observations, we outline the requirements and possible features of useful coordination support.

Thumbnail Image
Item

Systematic design of Intranet services

1998 , Potts, Colin