Jump to navigation

  •  
  •  
  •  

  • Courses
  • Resources
  • Case study
  • Showcase
  • Tools
  • Gallery
  • Videos

Search form

Animation Design Communication Design Design Fundamentals Interaction Design Product Design Tools for Design Open Design
Home / Case study / Conceptualization of an Automotive Interface / Links

.

unblocked games
Design Case study

Conceptualization of an Automotive Interface

Self-controlled privacy in a connected car
by
Nupur Aggarwal and Prof. Sugandh Malhotra
IDC, IIT Bombay
Links
 
  • Printer-friendly version

Bibliography:

• Allabarton, R. (2016, December 31). The UX Design Process: An Actionable Guide To Your First Job In UX. Retrieved March 17, 2017, from
https://careerfoundry.com/en/blog/ux-design/the-ux-design-process-an-actionable-guide-to-your-first-job-in-ux

• Brooke, J. (1995). SUS-A quick and dirty usability scale. Usability Evaluation in Industry, 189.

• Coppola, R., & Morisio, M. (2016). Connected Car: Technologies, Issues, Future Trends. ACM Computing Surveys, 49.
https://doi.org/10.1145/2971482

• Duri, S., Gruteser, M., Liu, X., Moskowitz, P., Perez, R., Singh, M., & Tang, J.-M. (2002).
Framework for security and privacy in automotive telematics. In Proceedings of the
2nd international workshop on Mobile commerce - WMC ’02 (p. 25). ACM Press.
https://doi.org/10.1145/570709.570711

• Hua, Z., & Ng, W. L. (2010). Speech recognition interface design for in-vehicle system. In
Proceedings of the 2nd International Conference on Automotive User Interfaces and
Interactive Vehicular Applications - AutomotiveUI ’10 (p. 29). ACM Press.
https://doi.org/10.1145/1969773.1969780

• Jaisingh, K., El-Khatib, K., & Akalu, R. (2016). Paving the way for Intelligent Transport Systems
(ITS): Privacy Implications of Vehicle Infotainment and Telematics Systems.
In Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent
Vehicular Networks and Applications - DIVANet ’16 (pp. 25–31). ACM Press.
https://doi.org/10.1145/2989275.2989283
http://www.repairerdrivennews.com/wp-content/uploads/2016/07/sae-autonomy-standards.jpg

• Schoettle, B., & Sivak, M. (n.d.-a). A survey of public opinion about autonomous and self-driving vehicles in the
U.S., the U.K., and Australia. Retrieved from
https://deepblue.lib.umich.edu/handle/2027.42/108384

• Schoettle, B., & Sivak, M. (n.d.-b). A survey of public opinion about connected vehicles in the
U.S., the U.K., and Australia. In 2014 International Conference on Connected Vehicles and
Expo (ICCVE) (pp. 687–692). IEEE,IEEE.
https://doi.org/10.1109/ICCVE.2014.7297637

• Wang, W., Hou, F., Tan, H., & Bubb, H. (2010). A Framework for Function Allocations in
Intelligent Driver Interface Design for Comfort and Safety. International Journal of
Computational Intelligence Systems, 3, 531–541.
https://doi.org/10.1080/18756891.2010.9727720
(2016). mycarmydata.eu. Retrieved 24 November 2016, from
http://www.mycarmydata.eu/wpcontent/themes/shalashaska/assets/docs/FIA_survey_2016.pdf

• Stanton, N. (2013). Advances in human aspects of road and rail transportation (1st ed., p.
Chapter XX). Boca Raton, FL: CRC Press.

• U. (2015, December 22). Complete Beginner's Guide to Information Architecture | UX Booth.
Retrieved March 17, 2017, from
http://www.uxbooth.com/articles/complete-beginners-guide-to-information-architecture/

• Visual-Manual NHTSA Driver Distraction Guidelines for In-Vehicle Electronic Devices. (2016).
Retrieved 24 November 2016, from
https://www.distraction.gov/downloads/pdfs/visual-manual-nhtsa-driver-distraction-guidelines-for-in-vehicle-electronic-devices.pdf

• Bal, G., Rannenberg, K., & Hong, J. I. (2015). Styx: Privacy risk communication for the Android
smartphone platform based on apps' data-access behavior patterns. Computers & Security,
53, 187-202. doi:10.1016/j.cose.2015.04.004

• Doke, P., Lobo, S., Joshi, A., Aggarwal, N., Paul, V., Mevada, V., & Kr, A. (2017). A User
Study About Security Practices of Less-Literate Smartphone Users. Intelligent Human
Computer Interaction Lecture Notes in Computer Science, 209-216. oi:10.1007/978-3-319-52503-7_17

• Fisher, D., Dorner, L., & Wagner, D. (2012). Short paper. Proceedings of the second
ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12.
doi:10.1145/2381934.2381945

• Hang, A., Zezschwitz, E. V., Luca, A. D., & Hussmann, H. (2012). Too much information!
Proceedings of the 7th Nordic Conference on Human-Computer Interaction Making Sense
Through Design - NordiCHI '12. doi:10.1145/2399016.2399061

• Rosen, S., Qian, Z., & Mao, Z. M. (2013). AppProfiler. Proceedings of the third
ACM conference on Data and application security and privacy -CODASPY '13.
doi:10.1145/2435349.2435380

• Wang, Y., Norice, G., & Cranor, L. F. (2011). Who Is Concerned about What? A Study
of American, Chinese and Indian Users’ Privacy Concerns on Social Network Sites.
Trust and Trustworthy Computing Lecture Notes in Computer Science, 146-153.
doi:10.1007/978-3-642-21599-5_11

Other Links:
• Useful resource e-links related to 'Interaction Design'
• Interaction Design at IDC IIT Bombay

Case Study Download:
• Conceptualization of an Automotive Interface......
• Conceptualization of an Automotive Interface - Report......







 

 

 

 

 

 

 

  • Introduction
  • Case Study - Slide Show
  • Prototype
  • Links
  • Contact Details
  • Credits

Creating Digital-learning Environment for Design



  • Courses
  • Resources
  • Case study
  • Showcase
  • Tools
  • Gallery
  • Videos
  • Animation Design
  • Communication Design
  • Design Fundamentals
  • Interaction Design
  • Product Design
  • Tools for Design
  • Open Design
  • Contribute to our Dsource
  • About
  • People
  • Events
  • Job@D'source
  • Contact Us
  • Privacy Policy
  • Download App
  • YouTube
  • Facebook
  • Twitter

Indian Language
English Bangali Gujarati Hindi
Kannada Malayalam Marathi Punjabi
Sindhi Tamil Telugu Urdu