Sciweavers

CHI
2005
ACM
14 years 4 months ago
A study of preferences for sharing and privacy
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Judith S. Olson, Jonathan Grudin, Eric Horvitz
CHI
2005
ACM
14 years 4 months ago
The future of user interface design tools
This workshop aims to gather researchers in the field of user interface design tools to identify important themes for the next decade of research. These tools aid in the design an...
Dan R. Olsen, Scott R. Klemmer
CHI
2005
ACM
14 years 4 months ago
TxtBoard: from text-to-person to text-to-home
The design of existing mobile phone technology has emphasised the primacy of person-to-person communication for voice, SMS and image-based communication. It may be contrasted with...
Kenton O'Hara, Richard H. R. Harper, Axel Unger, J...
CHI
2005
ACM
14 years 4 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
CHI
2005
ACM
14 years 4 months ago
The virtuality continuum revisited
We survey the themes and the aims of a workshop devoted to the state-of-the-art virtuality continuum. In this continuum, ranging from fully virtual to real physical environments, ...
Anton Nijholt, David R. Traum
CHI
2005
ACM
14 years 4 months ago
Community source development: an emerging model with new opportunities
This paper focuses on an emerging model for software development in higher education: community source. Community source seeks to blend aspects of both open source and traditional...
Dawn Ressel Nidy, Fong Kwok
CHI
2005
ACM
14 years 4 months ago
PINS push in and POUTS pop out: creating a tangible pin-board that ejects physical documents
There is an asymmetry in many tangible interfaces: while phicons can be used to manipulate digital information, the reverse is often not possible ? the digital world cannot push b...
Kher Hui Ng, Steve Benford, Boriana Koleva
CHI
2005
ACM
14 years 4 months ago
Beyond "from" and "received": exploring the dynamics of email triage
Email triage is the process of going through unhandled email and deciding what to do with it. Email triage can quickly become a serious problem for users as the amount of unhandle...
Carman Neustaedter, A. J. Bernheim Brush, Marc A. ...
CHI
2005
ACM
14 years 4 months ago
Improving automotive safety by pairing driver emotion and car voice emotion
This study examines whether characteristics of a car voice can affect driver performance and affect. In a 2 (driver emotion: happy or upset) x 2 (car voice emotion: energetic vs. ...
Clifford Nass, Ing-Marie Jonsson, Helen Harris, Be...
CHI
2005
ACM
14 years 4 months ago
Beyond being in the lab: using multi-agent modeling to isolate competing hypotheses
In studies of virtual teams, it is difficult to determine pure effects of geographic isolation and uneven communication technology. We developed a multi-agent computer model in Ne...
Ning Nan, Erik W. Johnston, Judith S. Olson, Natha...