2,271
views
0
recommends
+1 Recommend
1 collections
    12
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Shopping for Clothes: From Meeting Individual Needs to Socializing

      proceedings-article
      , , , ,
      Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017) (HCI)
      digital make-believe, with delegates considering our expansive
      3 - 6 July 2017
      Clothes, shopping, cognition, activity theory, Human-Computer Interaction
      Bookmark

            Abstract

            In this paper, we analyze how shopping for clothes continues to be a social phenomenon, despite technological advances. Using a grounded theory approach, we coded 16 semi-structured interviews to develop process models of online and in-store shopping and to identify the constraints of each method. We then analyzed apparel shopping from the lens of Engeström’s model of Activity Theory to compare online and in-store shopping at a conceptual level. We offer design recommendations for building systems and processes that bridge the gap between online and offline shopping.

            Content

            Author and article information

            Contributors
            Conference
            July 2017
            July 2017
            : 1-7
            Affiliations
            [0001]Clemson University School of Computing

            215 McAdams Hall, Clemson SC 29634
            Article
            10.14236/ewic/HCI2017.78
            c27d9644-609c-41a3-9f93-6d482c88766b
            © Sinha et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2017 – Digital Make-Believe. Sunderland, UK.

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 31st International BCS Human Computer Interaction Conference (HCI 2017)
            HCI
            31
            Sunderland, UK
            3 - 6 July 2017
            Electronic Workshops in Computing (eWiC)
            digital make-believe, with delegates considering our expansive
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2017.78
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Clothes,activity theory,shopping,Human-Computer Interaction,cognition

            reference

            1. 2015 Using Supervised Learning to Classify Authentic and Fake Online Reviews IMCOM 15

            2. 1997 Plans as Situated Action: An Activity Theory Approach to Workflow Systems ECSCW 97 17 32

            3. 2014 Constructing Grounded Theory SAGE

            4. 2000 Activity theory as a framework for analyzing and redesigning work Ergonomics 43 7 960 974

            5. 2012 Investigation of Potency-magnitude Relations of eWOM Messages with a Focus on the Distinction between Attitude Direction and Strength IAT 12 69 73

            6. 2011 The Role of Social Networks in Online Shopping: Information Passing, Price of Trust, and Consumer Choice EC 11 157 166

            7. 2013 Bricks or Clicks? Consumer Attitudes toward Traditional Stores and Online Stores Global Economics and Management Review 18 1 12 21

            8. 2004 What drives consumers to shop online? A literature review Intl. Journal of Service Industry Management 15 1 102 121

            9. 2014 Cyber Chamber: Multi-user Collaborative Assistance System for Online Shopping ITS 14 289 294

            10. 2007 What is hampering online shopping in China J. of Information Technology Management 18 1 16 32

            Comments

            Comment on this article