Auflistung nach Schlagwort "Data Transfer"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragI've Got the Data in My Pocket! - Exploring Interaction Techniques with Everyday Objects for Cross-Device Data Transfer(Proceedings of Mensch und Computer 2024, 2024) Emmert, Martina; Schönwerth, Nicole; Schmid, Andreas; Wolff, Christian; Wimmer, RaphaelPeople interact with a multitude of personal digital devices every day. However, transferring data between devices is still surprisingly cumbersome due to technical barriers, such as authentication or device pairing. Due to their clear affordances, physical devices offer a promising design space as mediators for natural interaction techniques. In a workshop and an elicitation study (n = 30), we investigated different interaction techniques for cross-device data transfer using everyday objects. Our results suggest that depending on the use case, extending always-available physical objects might be more beneficial than developing new artifacts. Designing effective interaction techniques requires consideration of an artifact’s physical characteristics, affordances, and situational surroundings. Participants preferred multi-functional objects which are always at hand, such as their smartphone. However, they opted for more impersonal objects in unfamiliar situations. Interaction techniques associated with objects also influenced users’ actions. We provide an overview of factors influencing intuitive interactions and we derived guidelines for user-centered development of interaction techniques with physical objects as mediators for data transfer.
- TextdokumentA kernel driver modification to visualize and reconstruct data transfer between computer and USB mass storage devices(INFORMATIK 2021, 2021) Zöllner, Joshua; Petschke, Dmitry; Schinner, Alexander; Weber, Kristin; Mayer, ManuelThe aim of this work is to create a completely new method for analysing the physical access to USB mass storage devices and to reconstruct the file access from the logged data. This is achieved by replacing a real USB stick with a full software simulation based on a Raspberry PI Zero using USB gadget mode. To achieve full information, we extended the logging capabilities of the Linux kernel driver. This allows to log position and size of each reading operation at the lowest possible level. For write operation, the written data is logged, too. This enables logging completely independent of the operating system or file system and allows a forensic image to be calculated that has time as an additional dimension. Further advantages of this method are that it is completely undetectable from the host computer and random accesses bypassing a file system can also be logged. A reconstruction of the original file access is shown and the possibilities for new attack vectors are discussed.