PacT Lab

WORKING WITH BUSINESS

Members of PaCT Lab collaborate with practitioners to ensure transfer of knowledge into industry and to support the application of research findings into the business world.

OUR RESEARCH

PhD Studentships 2017

About the Studentships   Northumbria University (Newcastle upon Tyne, UK) has 8 PhD studentships available in the subjects of design, human-computer interaction, social computing and related areas. Each studentship includes a full stipend, paid for three years at RCUK rates for 2017/18 (this is yet to be set, in 2016/17 this is £14,296 pa) and [...]

NEWS AND EVENTS

More latest news and events available on twitter.

PUBLICATIONS

2016

Aylett, M. P., Thomas, L., Green, D. P., Shamma, D. A., Briggs, P., & Kerrigan, F. (2016, May). My Life On Film. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems(pp. 3379-3386). ACM.

Briggs, P., Churchill, E., Levine, M., Nicholson, J.,Pritchard, G. W., & Olivier, P. (2016, May). Everyday Surveillance. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems(pp. 3566-3573). ACM.

Boonlue, T., Briggs, P., Sillence, E. (2016, 11 July) Self-Compassion, Psychological Resilience and Social Media Use in Thai Students. Presented at the British HCI 2016 Conference, Bournemouth University, Bournemouth.

Coventry, L., & Briggs, P. (2016, July). Mobile Technology for Older Adults: Protector, Motivator or Threat?. In International Conference on Human Aspects of IT for the Aged Population (pp. 424-434). Springer International Publishing.

Coventry, L. M., Jeske, D., Blythe, J. M., Turland, J., & Briggs, P. (2016). Personality and Social Framing in Privacy Decision-Making: A Study on Cookie Acceptance. Frontiers in Psychology, 7.

Fitton, D., Bell, B. T., Little, L., Horton, M., Read, J. C., Rouse, M., & Toth, N. (2016). Working with Teenagers in HCI Research: A Reflection on Techniques Used in the Taking on the Teenagers Project. In Perspectives on HCI Research with Teenagers (pp. 237-267). Springer International Publishing.

Fitton, D., Little, L., & Bell, B. T. (2016). Introduction: HCI Reaches Adolescence. In Perspectives on HCI Research with Teenagers (pp. 1-9). Springer International Publishing.

Fielden, A. L., Sillence, E., Little, L., & Harris, P. R. (2016). Online Self‐Affirmation Increases Fruit and Vegetable Consumption in Groups at High Risk of Low Intake. Applied Psychology: Health and Well‐Being.

Hardy, C., & Sillence, E. (2016). What are women being exposed to? A review of the quality, content and ownership of websites on premenstrual dysphoric disorder. Women’s Health Issues, 26(2), 183-189.

Jamison-Powell, S., Briggs, P., Lawson, S., Lineham, C., Windle, K., & Gross, H. (2016). PS I love you: understanding the impact of posthumous digital messages. Transactions on Computer-Human Interaction (TOCHI).

Jeske, D., Briggs, P., & Coventry, L. (2016). Exploring the relationship between impulsivity and decision-making on mobile devices. Personal and Ubiquitous Computing.

Little, L., Fitton, D., Bell, B. T., & Toth, N. (2016). Perspectives on HCI Research with Teenagers. Human-computer interaction.

McNeill, A., Harris, P. R., & Briggs, P. (2016). Twitter influence on UK Vaccination and antiviral Uptake during the 2009 h1n1 Pandemic. Frontiers in public health, 4.

Sillence, E., Hardy, C., Medeiros, L. C., & LeJeune, J. T. (2016). Examining trust factors in online food risk information: The case of unpasteurized or ‘raw’milk. Appetite, 99, 200-210.

Thomas, L., & Briggs, P. (2016). Assessing the value of brief automated biographies. Personal and Ubiquitous Computing, 20(1), 37-49.

 

2015

Bell, B. T., Toth, N., Little, L., & Smith, M. A. (2015). Planning to Save the Planet Using an Online Intervention Based on Implementation Intentions to Change Adolescent Self-Reported Energy-Saving Behavior. Environment and Behavior.

Briggs, P., & Thomas, L. (2015). An inclusive, value sensitive design perspective on future identity technologies. ACM Transactions on Computer-Human Interaction (TOCHI), 22(5), 23.

Blythe, J. M., Coventry, L., & Little, L. (2015). Unpacking security policy compliance: The motivators and barriers of employees’ security behaviors. InEleventh Symposium On Usable Privacy and Security (SOUPS 2015) (pp. 103-122).

Cohrs, J. C., McNeill, A., & Vollhardt, J. R. (2015). The two-sided role of inclusive victimhood for intergroup reconciliation: Evidence from Northern Ireland. Peace and Conflict: Journal of Peace Psychology, 21(4), 634.

Dickinson, T., Fernandez, M., Thomas, L. A., Mulholland, P., Briggs, P., & Alani, H. (2015, October). Identifying Prominent Life Events on Twitter. InProceedings of the 8th International Conference on Knowledge Capture (p. 4). ACM.

Dickinson, T., Fernandez, M., Thomas, L. A., Mulholland, P., Briggs, P., & Alani, H. (2015, June). Automatic Identification of Personal Life Events in Twitter. In Proceedings of the ACM Web Science Conference (p. 37). ACM.

Dunphy, P., Schöning, J., Nicholson, J., & Olivier, P. (2015, April). Captchat: A Messaging Tool to Frustrate Ubiquitous Surveillance. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (pp. 639-646). ACM.

Dunphy, P., Vlachokyriakos, V., Thieme, A., Nicholson, J., McCarthy, J., & Olivier, P. (2015). Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of# Password Tweets. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (pp. 141-150).

Dunphy, P., Nicholson, J., Vlachokyriakos, V., Briggs, P., & Olivier, P. (2015).Crowdsourcing and CCTV: The Effect of Interface, Financial Bonus and Video Type.

Ferreira, A., Coventry, L., & Lenzini, G. (2015, August). Principles of persuasion in social engineering and their use in phishing. In International Conference on Human Aspects of Information Security, Privacy, and Trust(pp. 36-47). Springer International Publishing.

Kharrufa, A., Nicholson, J., Dunphy, P., Hodges, S., Briggs, P., & Olivier, P. (2015, September). Using IMUs to Identify Supervisors on Touch Devices. InHuman-Computer Interaction (pp. 565-583). Springer International Publishing.

McNeill, A., & Coventry, L. (2015). Can we design stigma out of assistive walking technology?.

McNeill, A., & Coventry, L. (2015, August). An Appraisal-Based Approach to the Stigma of Walker-Use. In International Conference on Human Aspects of IT for the Aged Population (pp. 250-261). Springer International Publishing.

Pritchard, G. W., Briggs, P., Vines, J., & Olivier, P. (2015, April). How to Drive a London Bus: Measuring Performance in a Mobile and Remote Workplace. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (pp. 1885-1894). ACM.

Sillence, E., Hardy, C., Briggs, P., & Harris, P. R. (2015). How do carers of people with multiple sclerosis engage with websites containing the personal experiences of other carers and patients?. Health Informatics Journal, 1460458215607938.

Sillence, E., Harris, P. R., & Briggs, P. (2015, May). Assessing Patient Experience and Patient Preference when Designing Web Support for Smoking Cessation. In Proceedings of the 5th International Conference on Digital Health 2015 (pp. 25-26). ACM.

Sillence, E., & Briggs, P. (2015). Trust and Engagement in Online Health A Timeline Approach. Handb PsycholCommun Technol, 33, 469-87.

Turland, J., Coventry, L., Jeske, D., Briggs, P., & van Moorsel, A. (2015, July). Nudging towards security: Developing an application for wireless network selection for android phones. In Proceedings of the 2015 British HCI conference (pp. 193-201). ACM.

Yevseyeva, I., Turland, J., Morisset, C., Coventry, L., Groß, T., Laing, C., & van Moorsel, A. (2015). Addressing consumerisation of IT risks with nudging.

2014

 

Briggs, P., Hardy, C., Harris, P. R., & Sillence, E. (2014, December). Patient-led perspectives on ehealth: How might hyperpersonal data inform design?. In Proceedings of HCI Korea (pp. 115-121). Hanbit Media, Inc.

Briggs, P., & Thomas, L. (2014). The Social Value of Digital Ghosts. Digital Death: Mortality and Beyond in the Online Age: Mortality and Beyond in the Online Age, 125.

Briggs, D. J. L. C. P., & van Moorsel, A. (2014). Nudging whom how: IT proficiency, impulse control and secure behaviour. Networks, 49, 18.

Briggs, P., Mavin, S., & Thomas, L. (2014). On Family and Fear: A Gendered Perspective on the Design of Identity Technologies.

Coventry, L., Jeske, D., & Briggs, P. (2014). Perceptions and actions: Combining privacy and risk perceptions to better understand user behaviour.

Coventry, L., Briggs, P., Jeske, D., & van Moorsel, A. (2014, June). Scene: A structured means for creating and evaluating behavioral nudges in a cyber security environment. In International Conference of Design, User Experience, and Usability (pp. 229-239). Springer International Publishing.

Coventry, L. (2014, July). Keynote: Tackling the Awareness-Behaviour Divide in Security (Step 1): Understand the User by Lynne Coventry. In 2014 Workshop on Socio-Technical Aspects in Security and Trust (pp. x-x). IEEE.

Davinson, N., & Sillence, E. (2014). Using the health belief model to explore users’ perceptions of ‘being safe and secure’in the world of technology mediated financial transactions. International Journal of Human-Computer Studies, 72(2), 154-168.

Fothergill, M., Wolfson, S., & Little, L. (2014). A qualitative analysis of perceptions of venue: Do professional soccer players and managers concur with the conceptual home advantage framework?. International Journal of Sport and Exercise Psychology, 12(4), 316-332.

Fitton, D., Bell, B., Read, J. C., Iversen, O., Little, L., & Horton, M. (2014, April). Understanding teen UX: building a bridge to the future. In CHI’14 Extended Abstracts on Human Factors in Computing Systems (pp. 79-82). ACM.

Jeske, D., Coventry, L., Briggs, P., & van Moorsel, A. (2014). Nudging whom how: Nudging whom how: IT proficiency, impulse control and secure behaviour.

Jeske, D., Coventry, L., & Briggs, P. (2014, July). Decision justifications for wireless network selection. In 2014 Workshop on Socio-Technical Aspects in Security and Trust (pp. 1-7). IEEE.

Khan, A., Nicholson, J., Mellor, S., Jackson, D., Ladha, K., Ladha, C., … & Plötz, T. (2014, November). Occupancy monitoring using environmental & context sensors and a hierarchical analysis framework. In BuildSys@ SenSys(pp. 90-99).

McNeill, A., & Briggs, P. (2014, April). Understanding Twitter influence in the health domain: a social-psychological contribution. In Proceedings of the 23rd International Conference on World Wide Web (pp. 673-678). ACM.

McNeill, A., Lyons, E., & Pehrson, S. (2014). Reconstructing apology: David Cameron’s Bloody Sunday apology in the press. British Journal of Social Psychology, 53(4), 656-674.

Pirhonen, A., Silvennoinen, M., & Sillence, E. (2014). Patient Education as an Information System, Healthcare Tool and Interaction. Journal of Information Systems Education, 25(4), 327.

Pritchard, G., Vines, J., Briggs, P., Thomas, L., & Olivier, P. (2014, April). Digitally driven: how location based services impact the work practices of London bus drivers. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems (pp. 3617-3626). ACM.

Thomas, L., & Briggs, P. (2014, October). An older adult perspective on digital legacy. In Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational (pp. 237-246). ACM.

Sillence, E., Hardy, C., Harris, P. R., & Briggs, P. (2014, April). Modeling patient engagement in peer-to-peer healthcare. In Proceedings of the 23rd International Conference on World Wide Web (pp. 481-486). ACM.

Sillence, E., & Mo, P. K. (2014). Communicating health decisions: an analysis of messages posted to online prostate cancer forums. Health Expectations,17(2), 244-253.

Sutherland, C., Coventry, L., & Sillence, E. (2014, December). Using animated scenarios to explore severity of cyberbullying and reporting readiness. In Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design (pp. 448-451). ACM.

Toth, N., Bell, B., Avramides, K., Rulton, K., & Little, L. (2014). Is the next generation prepared? Understanding barriers to teenage energy conservation.

Yevseyeva, I., Morisset, C., Turland, J., Coventry, L., Groß, T., Laing, C., & van Moorsel, A. (2014). Consumerisation of it: Mitigating risky user actions and improving productivity with nudging. Procedia Technology, 16, 508-517.

2013

Briggs, P. (2013). Online Peer-to-Peer Healthcare: Exploring Push-Pull Factors of Engagement. In Medicine 2.0 Conference. JMIR Publications Inc., Toronto, Canada.

Jackson, D., Nicholson, J., Stoeckigt, G., Wrobel, R., Thieme, A., & Olivier, P. (2013, October). Panopticon: a parallel video overview system. InProceedings of the 26th annual ACM symposium on User interface software and technology (pp. 123-130). ACM.

Nicholson, J., Coventry, L., & Briggs, P. (2013). Faces and Pictures: Understanding age differences in two types of graphical authentications.International Journal of Human-Computer Studies, 71(10), 958-966.

Nicholson, J., Coventry, L., & Briggs, P. (2013). Faces and Pictures: Understanding age differences in two types of graphical authentications.International Journal of Human-Computer Studies, 71(10), 958-966.

Nicholson, J., Coventry, L., & Briggs, P. (2013). Age-related performance issues for PIN and face-based authentication systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 323-332). ACM.

Thomas, L., Little, L., Briggs, P., McInnes, L., Jones, E., & Nicholson, J. (2013). Location tracking: views from the older adult population. Age and ageing, 42(6), 758-763.

2012

Nicholson, J., Dunphy, P., Coventry, L., Briggs, P., & Olivier, P. (2012, May). A security assessment of tiles: a new portfolio-based graphical authentication system. In CHI’12 Extended Abstracts on Human Factors in Computing Systems (pp. 1967-1972). ACM.

Briggs, P., Blythe, M., Vines, J., Lindsay, S., Dunphy, P., Nicholson, J., … & Olivier, P. (2012, June). Invisible design: Exploring insights and ideas through ambiguous film scenarios. In Proceedings of the Designing Interactive Systems Conference (pp. 534-543). ACM.

 

2011

Briggs, P.  (2011).  The evolution of trust.   In Wakeman et al. (Eds.)  Trust Management V.  IFIP Advances in Information and Communication Technology, Volume 358, 13-16.

Marsh, S.P.,  Briggs, P., El-Khatib, K, Esfandiari, B. and Stewart, J.A. (2011).  Defining and Investigating Device Comfort. Journal of Information Processing, 19, 231-252.

Coventry, L. (2011) Using Lifestyle Aspirations to drive assisted living technology development.  The IET Seminar on Assisted Living, 6 April 2011, IET: London.

Budi Arief, David Greathead, Lynne Coventry, and Aad van Moorsel, (2011) Towards the Implementation of an Internet-based Neighbourhood Watch Scheme: Impacts of Inclusive Technologies on Societies, 3rd International Conference on Computational Aspects of Social Networks (CASoN), Salamanca, Spain, 19-22 October 2011.

Budi Arief, David Greathead, Chris Smith, Lynne Coventry, Aad van Moorsel, and Phil Butler, Inclusive Technology’s Impact on Society through the Neighbourhood Watch Scheme, Presented at Connected Communities Symposium, Newcastle upon Tyne, 12-14 September 2011

Fielden, A., Sillence, E., & Little, L. (2011) Children’s understandings’ of obesity, a thematic analysis. Int J Qualitative Stud Health Well-being. 6(3) 7170.

Lord, S., Chastin, S.F., McInnes, L., Little, L., Briggs, P., & Rochester, L. (2011). Exploring patterns of daily physical and sedentary behaviour in community-dwelling older adults. Age and Ageing, 40,205-210

McInnes, L. (2011). Importance of maintaining mobility to elderly health. Aging Health, 7 (2), 165-167

Sillence, E. & Pirhonen, A. (2011). ICT for consumers or human beings – what’s the difference? In J Lumsden (Ed). Human computer interaction and innovation in handheld, mobile, and wearable technologies. IGI Global Publishing pp 260-267.

Harris, PR, Sillence, E., Briggs, P. (2011). Perceived Threat and Corroboration: Key Factors That Improve a Predictive Model of Trust in Internet-based Health Information and Advice. (J Med Internet Res 2011;13(3):e51) doi:10.2196/jmir.1821

Sillence, Mo, Briggs, Harris (2011). The changing face of trust in health websites. Presented at Oxford Internet Institute’s Symposium (21-24th September 2011).

Thomas, L., Briggs, P., and Little, L. (2011).Does Your Boss Know Where You Are? Predicting Adoption of LBS in the Workplace. British HCI.

2010

Coventry, L. (2010) Human Factors. In Handbook of Financial Cryptography and Security. B. Rosenberg (ed). Chapman and Hall. August 2010.

Coventry, L. Briggs, P., & Colmer, S. (2010) Using lifestyle aspirations to drive technology development. 39th Annual British Society of Gerontology Conference. Brunel University 6-8 July, 2010.

Day, P.N., C. Rohan, L. Coventry, G. Johnson, Riley, C..(2010) REACH modelling for DRIVE-UP self-service. Contemporary Ergonomics: Proceedings of the 2010 British Ergonomic Society Annual Conference. Taylor and Francis.

Pickard, A. J., Gannon-Leary, P. and Coventry, L. (2010) Trust in ‘E’: Users’ trust in information resources in the web environment.

2009

Briggs, P. and Little, L. (2009). Pervasive computing and disability: Designing for independence? In Proceedings of the 2nd International Conference of Persuasive Technologies Related to Assisted Environments, ACM Press.

Little, L., Sillence, E., & Briggs, P. (2009). Ubiquitous Systems and the Family: Thoughts about the Networked Home SOUPS, San Jose

Little, L., & Briggs, P. (2009). Pervasive healthcare: the elderly perspective. Second International Conference on Pervasive Technologies in Relation to Assisted Living (PETRA). Corfu, Greece

Little, L., & Briggs, P. (2009). Privacy factors for successful ubiquitous computing. International Journal of E-Business Research, 5 (2), 1-20

Little, L., & Briggs, P. (2009) Private whispers/public eyes: Assessing the psychological cost of receiving highly personal information in a public space Interacting with Computers (in press)

Little, L., & Briggs, P. (2009). Videotaped Activity Scenarios. In S. Love (Ed.). Handbook of Mobile Technology Research Methods. USA: Nova Science Publishers

2008

Briggs, P. and Olivier, P. (2008). Biometric Daemons: Authentication via Electronic Pets. Proceedings of CHI 2008, Florence Italy, April 5-10. ACM Press.

Joinson, Adam N., Hancock, Jeffrey and Briggs, Pamela (2008): Secrets and lies in computer-mediated interaction: theory, methods and design. In: Proceedings of ACM CHI 2008 Conference on Human Factors in Computing Systems April 5-10, 2008. pp. 3993-3996..

Little, L., & Briggs, P. (2008). Ubiquitous healthcare: do we need it? BHCI Conference, Liverpool

Little, L., Storer, T., Briggs, P. and Duncan, I. (2008). E-voting in an ubicomp world: Trust, privacy, and social implications. Social Science Computer Review, 26(1):44-59.

Marsh, S. and Briggs, P. (2008). Examining trust, forgiveness and regret as computational constructs. In J. Golbeck (Ed.) Computing with Social Trust and Reputation. Springer-Verlag.

2007

Briggs, P., Sillence, E. and Harris, P. (2007). How do online consumers determine their own health status? Technology and Health Care, 15 (5), 301-302.

Little, L. & Briggs, P. (2007). Ubiquitous Computing and Disability: exclusive or inclusive systems? Paper submitted to Information. Technology & People. May 2007

Little. L. and Briggs, P. (2007). Videotaped Activity Scenarios: A new way of evaluating Design. In L. Feijs, S. Kyffin and B. Young (Eds). Design and Semantics of Form and Movement (DeSForM 2007). Phillips.

Liu, Z, Coventry, L, Johnson, G, Zhang, H and Chen, J. (2007) The people’s machine: Automatic Teller Machines in China. User Experience, 6, 2, 18-22.

Sillence, E., Briggs, P. Harris, P. R, Fishwick, L. (2007). How do patients evaluate and make use of online health information? Social Science and Medicine, 64, 1853-1862

Sillence, E., Briggs, P. Harris, P, Fishwick, L. (2007). Health websites that people can trust – the case of Hypertension. Interacting with Computers, Special Issue on ‘Moving Face-to-Face Communication to Web-based Systems’, 19, 32-42.

Sillence, E. & Briggs, P. (2007). Examining the role of the Internet in health. In Joinson, A.N., McKenna, K.Y.A., Postmes, T., & Reips, U-D. (2007). The Oxford Handbook of Internet Psychology. Oxford, UK: Oxford University Press

Sillence, E. & Briggs, P. (2007). The evolution of trust in a design context. In L. Feijs, S. Kyffin and B. Young (Eds). Design and Semantics of Form and Movement (DeSForM 2007). Phillips.

Sillence, E. & Briggs, P. (2007). Please advise. Using the Internet for health and financial advice. Computers in Human Behavior

Sillence, E., Briggs, P. Harris, P, Fishwick, L. (2007). Developing trust practices for e-health. In R. Song, L. Korba & G. Yee (Eds.). Trust in E-services: Technologies, Practices and Challenges. The Idea Group.

Sillence, E., Briggs, P. Harris, P, Fishwick, L. (2007). Going online for health advice: Changes in usage and trust practices over the last five years. Interacting with Computers, 19 (3), 397-403.

Sillence, E., Briggs, P. Harris, P, Fishwick, L. (2007). Health websites that people can trust – the case of Hypertension. Interacting with Computers: Special Issues on ‘Moving Face-to-Face Communication to Web-based Systems’, 19 (1), 32-42.

2006

Little, L., & Briggs, P. (2006). Investigating privacy in an ambient world. CHI 2006 Workshop, Montreal, Canada

Little, L., Storer, T. Briggs, P., & Duncan, I. (2006). E-voting in an ambient world: Trust, privacy and social implications. Information, Communication and Society. Submitted October 2006.
Little, L., Marsh, S., & Briggs, P. (2006). Trust and privacy permissions for an ambient world. In R. Song, L. Korba, G. Yee (Eds.) Trust in e-services: technologies, practices and challenges. USA: Ideas Group, Chapter 11

Marsh, S., Patrick, A and Briggs, P. (2006). Trust in Digital Government – Social Issues. In A. Anttiroiko and M. Malkia, (Eds) The Encyclopedia of Digital Government. IDEA Group.

Sillence, E., Briggs, P. Harris, P, Fishwick, L. (2006). A framework for understanding trust factors in web based health advice. International Journal of Human Computer Studies, 64 (8), 697-713.

Storer, T., Little, L., & Duncan, I. (2006). An exploratory study of voter attitudes towards a pollsterless remote voting system. In IaVoSS Workshop on Trustworthy Elections (WOTE 06) Pre-Proceedings (D. Chaum, R. Rivest, and P. Ryan, eds.), pp. 77-86, June 2006.

Nicholson, J., Dunphy, P., Coventry, L., Briggs, P., & Olivier, P. (2012, May). A security assessment of tiles: a new portfolio-based graphical authentication system. In CHI’12 Extended Abstracts on Human Factors in Computing Systems (pp. 1967-1972). ACM.