References
[1]. Adams, A., Lunt, P., & Cairns, P. (2008). A qualititative
approach to HCI research. In: C. Paul, & C. Anna, eds.
Research Methods for Human-Computer Interaction.
Cambridge University Press, Cambridge, (pp. 138–157).
[2]. Agarwal, M., Barroso, J. J., Chakraborti, T., Dow, E. M.,
Fadnis, K., Godoy, B., & Talamadupula, K. (2020). Project
clai: Instrumenting the command line as a new
environment for ai agents. arXiv preprint arXiv:2002.00762. https://doi.org/10.48550/arXiv.2002.00762
[3]. Allen, J. F., Byron, D. K., Dzikovska, M., Ferguson, G.,
Galescu, L., & Stent, A. (2001). Toward conversational
human-computer interaction. AI Magazine, 22(4), 27-27.
https://doi.org/10.1609/aimag.v22i4.1590
[4]. Ardito, C., Lanzilotti, R., Mussio, P., Parasiliti Provenza,
L., & Piccinno, A. (2009). Redefining the roles of users and
designers in interactive system lifecycle. Proceedings of
CHItaly, 17-19.
[5]. Aronovitch, C. D. (1976). The voice of personality:
Stereotyped judgments and their relation to voice quality
and sex of speaker. The Journal of Social Psychology,
99(2), 207-220. https://doi.org/10.1080/00224545.1976.9924774
[6]. Baron, N. S., & af Segerstad, Y. H. (2010). Crosscultural
patterns in mobile-phone use: Public space and
reachability in Sweden, the USA and Japan. New Media &
Society, 12(1), 13-34. https://doi.org/10.1177/1461444809355111
[7]. Barrett, H. C., & Kurzban, R. (2006). Modularity in
cognition: framing the debate. Psychological Review,
113(3), 628. https://doi.org/10.1037/0033-295X.113.3.628
[8]. Bentley, F., Luvogt, C., Silverman, M., Wirasinghe, R.,
White, B., & Lottridge, D. (2018). Understanding the longterm
use of smart speaker assistants. Proceedings of the
ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2(3), 1-24. https://doi.org/10.1145/3264901
[9]. Biesta, G. (2007). Why “what works” won't work:
Evidence-based practice and the democratic deficit in
educational research. Educational Theory, 57(1), 1-22.
https://doi.org/10.1111/j.1741-5446.2006.00241.x
[10]. Bish, D. L., & Howard, S. A. (1988). Quantitative
phase analysis using the Rietveld method. Journal of
Applied Crystallography, 21(2), 86-91. https://doi.org/10.1107/S0021889887009415
[11]. Boulanger, A. (2005). Open-source versus
proprietary software: Is one more reliable and secure than
the other? IBM Systems Journal, 44(2), 239-248.
https://doi.org/10.1147/sj.442.0239
[12]. Brockner, J., & Wiesenfeld, B. M. (1996). An
integrative framework for explaining reactions to
decisions: interactive effects of outcomes and
procedures. Psychological Bulletin, 120(2), 189-208.
https://doi.org/10.1037/0033-2909.120.2.189
[13]. Brungart, D. S., Simpson, B. D., Ericson, M. A., & Scott,
K. R. (2001). Informational and energetic masking effects
in the perception of multiple simultaneous talkers. The
Journal of the Acoustical Society of America, 110(5),
2527-2538. https://doi.org/10.1121/1.1408946
[14]. Carolus, A., Muench, R., Schmidt, C., & Schneider, F.
(2019). Impertinent mobiles-Effects of politeness and
impoliteness in human-smartphone interaction.
Computers in Human Behavior, 93, 290-300.
https://doi.org/10.1016/j.chb.2018.12.030
[15]. Carpenter, A. L. (2012). Doing more with the SAS®
display manager: from editor to view table-options and
tools you should know. SAS Global Forum 2012, 1-17.
[16]. Carroll, J. M. (2001). Community computing as
human-computer interaction. Behaviour & Information
Technology, 20(5), 307-314. https://doi.org/10.1080/01449290110078941
[17]. Carroll, J. M., & Campbell, R. L. (1989). Artifacts as
psychological theories: The case of human-computer
interaction. Behaviour & Information Technology, 8(4),
247-256. https://doi.org/10.1080/01449298908914556
[18]. Caruso, J. B., & Salaway, G. (2007). The ECAR study
of undergraduate students and information technology.
Educause Center for Applied Research, 1-15.
[19]. Chan, S. W., Gunasekaran, T. S., Pai, Y. S., Zhang, H.,
& Nanayakkara, S. (2021). KinVoices: Using voices of
friends and family in voice interfaces. Proceedings of the
ACM on Human-Computer Interaction, 5(CSCW2), 1-25.
https://doi.org/10.1145/3479590
[20]. Chan, S., Wolfe, R., & Fang, X. (2002). Teaching HCI
in is/EC curriculum. Americas Conference on Information
Systems 2002 Proceedings, 1011-1020.
[21]. Chaudhuri, U. (1997). Staging Place: The Geography
of Modern Drama. University of Michigan Press.
[22]. Chen, N. S., Ko, H. C., Kinshuk, & Lin, T. (2005). A
model for synchronous learning using the Internet.
Innovations in Education and Teaching International,
42(2), 181-194. https://doi.org/10.1080/14703290500062599
[23]. Christakis, N. A., & Fowler, J. H. (2008). The collective
dynamics of smoking in a large social network. New
England Journal of Medicine, 358(21), 2249-2258.
https://doi.org/10.1056/NEJMsa0706154
[24]. Damodaran, L. (1996). User involvement in the
systems design process-a practical guide for users.
Behaviour & Information Technology, 15(6), 363-377.
https://doi.org/10.1080/014492996120049
[25]. Deutsch, M. (1975). Equity, equality, and need: What
determines which value will be used as the basis of
distributive justice? Journal of Social Issues, 31(3), 137-149. https://doi.org/10.1111/j.1540-4560.1975.tb01000.x
[26]. Ellaway, R., & Masters, K. (2008). AMEE Guide 32: e-
Learning in medical education Part 1: Learning, teaching
and assessment. Medical Teacher, 30(5), 455-473.
https://doi.org/10.1080/01421590802108331
[27]. Eppinger, S. D., Whitney, D. E., Smith, R. P., & Gebala,
D. A. (1994). A model-based method for organizing tasks
in product development. Research in Engineering
Design, 6(1), 1-13. https://doi.org/10.1007/BF01588087
[28]. Fischer, G. (2013). Beyond Human-Computer Interaction. Mensch-computer-kommunikation:
benutzergerechte systeme auf dem weg in die praxis,
(pp. 274).
[29]. Gittins, D. (1986). Icon-based human-computer
interaction. International Journal of Man-Machine
Studies, 24(6), 519-543. https://doi.org/10.1016/S0020-7373(86)80007-4
[30]. Gollwitzer, P. M. (1990). Action phases and mind-sets.
In E. T. Higgins & R. M. Sorrentino (Eds.), Handbook of
Motivation and Cognition: Foundations of Social
Behavior, 2, 53–92. The Guilford Press.
[31]. Harsimran, S., Santosh, K., & Rakesh, K. (2021).
Overview of corrosion and its control: A critical review.
Proceedings on Engineering Sciences, 3(1), 13-24.
https://doi.org/10.24874/PES03.01.002
[32]. Jenseth, A. (2011). The Quiet Circus: The Colorful,
Complicated, Slightly Schizophrenic History of Early
Computer Art at Bell Labs, Annandale-on-Hudson, New
York, 1-80.
[33]. Johnson, L. M., & Johnson, V. E. (1995). Help
wanted—accountant: What the classifieds say about
employers' expectations. Journal of Education for
Business, 70(3), 130-134. https://doi.org/10.1080/08832323.1995.10117738
[34]. Kahnweiler, J. B. (2015). The Genius of Opposites:
How Introverts and Extroverts Achieve Extraordinary
Results Together. Berrett-Koehler Publishers, Oakland,
California, (pp. 98).
[35]. Kieras, D., Meyer, D., & Ballas, J. (2001, March).
Towards demystification of direct manipulation:
Cognitive modeling charts the gulf of execution. In
Proceedings of the SIGCHI Conference on Human
Factors in Computing Systems, 128-135.
https://doi.org/10.1145/365024.365069
[36]. Klumpp, M., & Zijm, H. (2019). Logistics innovation
and social sustainability: How to prevent an artificial divide
in human–computer interaction. Journal of Business
Logistics, 40(3), 265-278. https://doi.org/10.1111/jbl.12198
[37]. Kohler, T., Fueller, J., Matzler, K., Stieger, D., & Füller, J.
(2011). Co-creation in virtual worlds: The design of the user experience. MIS Quarterly, 773-788. https://doi.org/10.2307/23042808
[38]. Kong, Y., Jia, Y., & Fu, Y. (2012, October). Learning
human interaction by interactive phrases. In European
Conference on Computer Vision (pp. 300-313). Springer,
Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33718-5_22
[39]. Kumar, S., & Kumar, M. (2022). Tribological and
mechanical performance of coatings on piston to avoid
failure—a review. Journal of Failure Analysis and
Prevention, 22, 1346–1369. https://doi.org/10.1007/s11668-022-01436-3
[40]. Kumar, S., Kumar, M., & Handa, A. (2018).
Combating hot corrosion of boiler tubes–A study.
Engineering Failure Analysis, 94, 379-395. https://doi.org/10.1016/j.engfailanal.2018.08.004
[41]. Lakshman, A., & Malik, P. (2010). Cassandra: a
decentralized structured storage system. ACM SIGOPS
Operating Systems Review, 44(2), 35-40. https://doi.org/10.1145/1773912.1773922
[42]. Lazar, J., Feng, J. H., & Hochheiser, H. (2017).
Research Methods in Human-Computer Interaction.
Morgan Kaufmann, United States, (pp. 97).
[43]. Lombard, M., & Xu, K. (2021). Social responses to
media technologies in the 21st century: The media are
social actors paradigm. Human-Machine Communication,
2, 29-55. https://doi.org/10.30658/hmc.2.2
[44]. Marcus, C. C., & Francis, C. (1997). People Places:
Design Guidlines for Urban Open Space. John Wiley &
Sons.
[45]. Menkel-Meadow, C. (1985). Portia in a different
voice: Speculations on a women's lawyering process.
Berkeley Women's LJ, 1, 39.
[46]. Mishra, U. (2021). Human-Computer Interaction
(HCI): Importance and Applications. Retrieved from
https://www.analyticssteps.com/blogs/human-computer-interactionhci-importance-and-applications
[47]. Monin, B., & Miller, D. T. (2001). Moral credentials and
the expression of prejudice. Journal of Personality and
Social Psychology, 81(1), 33. https://doi.org/10.1037/0022-3514.81.1.33
[48]. Mori, G., Paterno, F., & Santoro, C. (2004). Design
and development of multidevice user interfaces through
multiple logical descriptions. IEEE Transactions on
Software Engineering, 30(8), 507-520. https://doi.org/10.1109/TSE.2004.40
[49]. Murphy, E., Kuber, R., McAllister, G., Strain, P., & Yu, W.
(2008). An empirical investigation into the difficulties
experienced by visually impaired Internet users. Universal
Access in the Information Society, 7(1), 79-91. https://doi.org/10.1007/s10209-007-0098-4
[50]. Narayanan, N. H., & Hübscher, R. (1998). Visual
language theor y: Towards a human-computer
interaction perspective. In Visual Language Theory (pp.
87-128). Springer, New York, NY. https://doi.org/10.1007/978-1-4612-1676-6_3
[51]. Nicholson, S. (2015). A recipe for meaningful
gamification. In Gamification in Education and Business
(pp. 1-20). Springer, Cham. https://doi.org/10.1007/978-3-319-10208-5_1
[52]. Niculescu, A., van Dijk, B., Nijholt, A., Li, H., & See, S.
L. (2013). Making social robots more attractive: the
effects of voice pitch, humor and empathy. International
Journal of Social Robotics, 5(2), 171-191. https://doi.org/10.1007/s12369-012-0171-x
[53]. Norman, D. A. (1990). Why Interfaces Don't Work. The
art of human-computer interface design, 209-219.
[54]. Oulasvirta, A., & Hornbæk, K. (2016, May). HCI
research as problem-solving. In Proceedings of the 2016
CHI Conference on Human Factors in Computing
Systems (pp. 4956-4967). https://doi.org/10.1145/2858036.2858283
[55]. Pearl, C. (2016). Designing Voice User Interfaces:
Principles of Conversational Experiences. “O’Reilly
Media, Inc.".
[56]. Pei, L., & Zhang, Q. (2016, July). “Core” components
in HCI syllabi: Based on the practice of CS and LIS schools
in North America. In International Conference on HCI in
Business, Government, and Organizations (pp. 196-208).
Springer, Cham. https://doi.org/10.1007/978-3-319-39399-5_19
[57]. Porta, M. (2007). Human–computer input and
output techniques: an analysis of current research and
promising applications. Artificial Intelligence Review,
28(3), 197-226. https://doi.org/10.1007/s10462-009-9098-5
[58]. Riehm, T., Fugger, N., Gillen, P., Gretschko, V., &
Werner, P. (2022). Social norms, sanctions, and
conditional entry in markets with externalities: Evidence
from an artefactual field experiment. Journal of Public
Economics, 212, 104701. https://doi.org/10.1016/j.jpubeco.2022.104701
[59]. Rogers, Y. (2009, November). The changing face of
human-computer interaction in the age of ubiquitous
computing. In Symposium of the Austrian HCI and
Usability Engineering Group (pp. 1-19). Springer, Berlin,
Heidelberg. https://doi.org/10.1007/978-3-642-10308-7_1
[60]. Ryan, E. B. (1983). Social psychological
mechanisms underlying native speaker evaluations of
non-native speech. Studies in Second Language
Acquisition, 5(2), 148-159. https://doi.org/10.1017/S0272263100004824
[61]. Sannon, S., Stoll, B., DiFranzo, D., Jung, M. F., &
Bazarova, N. N. (2020). “I just shared your responses”
extending communication privacy management theory
to interactions with conversational agents. Proceedings
of the ACM on Human-Computer Interaction, 4(GROUP),
1-18. https://doi.org/10.1145/3375188
[62]. Sasse, M. A., Brostoff, S., & Weirich, D. (2001).
Transforming the 'weakest link'—a human/computer
interaction approach to usable and effective security. BT
Technology Journal, 19(3), 122-131. https://doi.org/10.1023/A:1011902718709
[63]. Schmidt, A. (2000). Implicit human computer
interaction through context. Personal Technologies, 4(2),
191-199. https://doi.org/10.1007/BF01324126
[64]. Scott, C. J., Setterfield, C. A., Caraty, A., & Norman,
S. T. (2010). 329. IS there variation in the level of input of
kisspeptin terminals onto GnRH neurons across the
equine oestrous cycle? Reproduction, Fertility and
Development, 22(9), 129-129. https://doi.org/10.1071/SRB10Abs329
[65]. Seaborn, K., Miyake, N. P., Pennefather, P., & Otake-
Matsuura, M. (2021). Voice in human–agent interaction:
a survey. ACM Computing Surveys (CSUR), 54(4), 1-43.
https://doi.org/10.1145/3386867
[66]. Shafiee, S., Fotuhi-Firuzabad, M., & Rastegar, M.
(2013). Investigating the impacts of plug-in hybrid electric
vehicles on power distribution systems. IEEE Transactions
on Smart Grid, 4(3), 1351-1360. https://doi.org/10.1109/TSG.2013.2251483
[67]. Singh, H., Kumar, S., & Kumar, R. (2021). A study on
novel CoronaVirus Disease (COVID-19). Asian Journal of
Engineering and Applied Technology, 10(1), 29-37.
https://doi.org/10.51983/ajeat-2021.10.1.2801
[68]. Singh, M., & Kumar, S. (2021). Impact of novel covid-
19 on various sectors: A study. Journal on Future
Engineering & Technology, 16(4), 34-41.
[69]. Speelman, C. P., & Kirsner, K. (1993). New goals for
HCI training: How to mix old and new skills in the trainee.
International Journal of Human-Computer Interaction,
5(1), 41-69. https://doi.org/10.1080/10447319309526055
[70]. Star, S. L., & Ruhleder, K. (2016). 20 steps toward an
ecology of infrastructure: Design and access for large
information spaces. Boundary Objects and Beyond:
Working with Leigh Star, 377.
[71]. Stock, I., & Weber, M. (2006, October). Authoring
technical documentation using a generic document
model. In Proceedings of the 24th Annual ACM
International Conference on Design of Communication
(pp. 172-179). https://doi.org/10.1145/1166324.1166364
[72]. Sutton, S. J., Foulkes, P., Kirk, D., & Lawson, S. (2019,
May). Voice as a design material: Sociophonetic inspired
design strategies in human-computer interaction. In
Proceedings of the 2019 CHI conference on human
factors in computing systems, 1-14. https://doi.org/10.1145/3290605.3300833
[73]. Visée, M., Teghem, J., Pirlot, M., & Ulungu, E. L.
(1998). Two-phases method and branch and bound
procedures to solve the bi–objective knapsack problem.
Journal of Global Optimization, 12(2), 139-155.
https://doi.org/10.1023/A:1008258310679
[74]. Wertsch, J. V. (1990). The voice of rationality in a
sociocultural approach to mind. Vygotsky and Education:
Instructional Implications and Applications of
Sociohistorical Psychology, 111-126.
[75]. Weyuker, E. J., & Vokolos, F. I. (2000). Experience with
performance testing of software systems: issues, an
approach, and case study. IEEE Transactions on Software
Engineering, 26(12), 1147-1156. https://doi.org/10.1109/32.888628
[76]. Xu, S., Zhu, K., & Gibbs, J. (2004). Global technology,
local adoption: a cross-country investigation of internet
adoption by companies in the United States and China.
Electronic Markets, 14(1), 13-24. https://doi.org/10.1080/1019678042000175261
[77]. Yildirim, S., Bulut, M., Lee, C. M., Kazemzadeh, A.,
Deng, Z., Lee, S., & Busso, C. (2004). An acoustic study of
emotions expressed in speech. Eighth International
Conference on Spoken Language Processing, (pp. 4).
[78]. Yu, H., Tan, Z. H., Ma, Z., Martin, R., & Guo, J. (2017).
Spoofing detection in automatic speaker verification
systems using DNN classifiers and dynamic acoustic
features. IEEE Transactions on Neural Networks and
Learning Systems, 29(10), 4633-4644. https://doi.org/10.1109/TNNLS.2017.2771947
[79]. Zhang, P., & Li, N. (2004). An assessment of
human–computer interaction research in management
information systems: topics and methods. Computers in
Human Behavior, 20(2), 125-147. https://doi.org/10.1016/j.chb.2003.10.011
[80]. Zhang, P., & Li, N. (2004). An assessment of
human–computer interaction research in management
information systems: topics and methods. Computers in
Human Behavior, 20(2), 125-147. https://doi.org/10.1016/j.chb.2003.10.011
[81]. Zhao, J., Kan, M. Y., & Theng, Y. L. (2008, June). Math
information retrieval: user requirements and prototype
implementation. In Proceedings of the 8th ACM/IEEE-CS
Joint Conference on Digital Libraries (pp. 187-196).
https://doi.org/10.1145/1378889.1378921
[82]. Zhou, Y., Leung, S. W., Mizutani, S., Takagi, T., & Tian,
Y. S. (2020). MEPHAS: an interactive graphical user interface for medical and pharmaceutical statistical analysis with R and Shiny. BMC Bioinformatics, 21(1), 1-11. https://doi.org/10.1186/s12859-020-3494-x