Sciweavers

2648 search results - page 151 / 530
» Human Factors In Computer Security
Sort
View
115
Voted
CHI
2010
ACM
15 years 8 months ago
A death in the family: opportunities for designing technologies for the bereaved
Following the death of a loved one, bereaved family members use technology in several ways to respond to their loss. However, very little is known about how technology intersects ...
Michael Massimi, Ronald M. Baecker
CHI
2010
ACM
15 years 5 months ago
TOPAOKO: interactive construction kit
If you have a laser cutter, you can build your own TOPAOKO. We describe work in progress on TOPAOKO, an interactive construction kit that encourages experimentation and play with ...
Kuan-Ju Wu, Mark D. Gross
151
Voted
CHI
2011
ACM
14 years 8 months ago
Tag clouds and keyword clouds: evaluating zero-interaction benefits
Tag clouds are typically presented so that users can actively utilize community-generated metadata to query a collection. This research investigates whether such keyword clouds, a...
Mathew J. Wilson, Max L. Wilson
CHI
2011
ACM
14 years 8 months ago
Transparency in mobile navigation
We investigated the usefulness transparency can play in increasing the display space of mobile devices in navigation scenarios. Two different systems that used transparency to dis...
David K. McGookin, Inti Herteleer, Stephen A. Brew...
WWW
2006
ACM
16 years 5 months ago
The impact of online music services on the demand for stars in the music industry
The music industry's business model is to produce stars. In order to do so, musicians producing music that fits into well defined clusters of factors explaining the demand of...
Ian Pascal Volz