Sciweavers

2250 search results - page 172 / 450
» Authorizing applications in singularity
Sort
View
CHI
2007
ACM
15 years 10 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
CHI
2005
ACM
15 years 10 months ago
Behaviour, realism and immersion in games
Immersion is recognised as an important element of good games. However, it is not always clear what is meant by immersion. Earlier work has identified possible barriers to immersi...
Kevin Cheng, Paul A. Cairns
CHI
2005
ACM
15 years 10 months ago
Privacy gradients: exploring ways to manage incidental information during co-located collaboration
This research introduces privacy issues related to the viewing of incidental information during co-located collaboration. Web browsers were the representative application used in ...
Kirstie Hawkey, Kori M. Inkpen
CHI
2005
ACM
15 years 10 months ago
Understanding research trends in conferences using paperLens
PaperLens is a novel visualization that reveals trends, connections, and activity throughout a conference community. It tightly couples views across papers, authors, and reference...
Bongshin Lee, Mary Czerwinski, George G. Robertson...
CHI
2004
ACM
15 years 10 months ago
Deception and design: the impact of communication technology on lying behavior
Social psychology has demonstrated that lying is an important, and frequent, part of everyday social interactions. As communication technologies become more ubiquitous in our dail...
Jeffrey T. Hancock, Jennifer Thom-Santelli, Thomps...