Sciweavers

2648 search results - page 240 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 11 months ago
Evaluating cues for resuming interrupted programming tasks
Developers, like all modern knowledge workers, are frequently interrupted and blocked in their tasks. In this paper we present a contextual inquiry into developers’ current stra...
Chris Parnin, Robert DeLine
CHI
2010
ACM
15 years 11 months ago
Using concept maps to evaluate the usability of APIs
Application programming interfaces (APIs) are the interfaces to existing code structures, such as widgets, frameworks, or toolkits. Therefore, they very much do have an impact on ...
Jens Gerken, Hans-Christian Jetter, Harald Reitere...
CHI
2010
ACM
15 years 11 months ago
Supporting effective user navigation in digital documents
Electronic documents such as PDFs are becoming increasingly popular as we move further towards the notion of the paperless office. The harsh truth however is that e-documents diff...
Jennifer Pearson
CHI
2009
ACM
15 years 11 months ago
Butler lies: awareness, deception and design
Instant messaging (IM) is a common and popular way for co-workers, friends, and family to stay in touch, but its “always-on” properties can sometimes lead people to feel overe...
Jeffrey T. Hancock, Jeremy P. Birnholtz, Natalya N...
CHI
2009
ACM
15 years 11 months ago
Time sequences
Visualisations of dynamic data change in appearance over time, reflecting changes in the underlying data, be that the development of a social network, or the addition or removal o...
Ross Shannon, Aaron J. Quigley, Paddy Nixon