Sciweavers

2648 search results - page 248 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 7 months ago
Across boundaries of influence and accountability: the multiple scales of public sector information systems
The use of ICTs in the public sector has long been touted for its potential to transform the institutions that govern and provide social services. The focus, however, has largely ...
Christopher A. Le Dantec, W. Keith Edwards
97
Voted
CHI
2010
ACM
15 years 7 months ago
Artificial subtle expressions: intuitive notification methodology of artifacts
We describe artificial subtle expressions (ASEs) as intuitive notification methodology for artifacts' internal states for users. We prepared two types of audio ASEs; one was ...
Takanori Komatsu, Seiji Yamada, Kazuki Kobayashi, ...
141
Voted
ACMACE
2008
ACM
15 years 6 months ago
Evaluation of a pervasive game for domestic energy engagement among teenagers
In this paper, we present Power Agent - a pervasive game designed to encourage teenagers and their families to reduce energy consumption in the home. The idea behind this mobile p...
Anton Gustafsson, Magnus Bång
124
Voted
ACMACE
2008
ACM
15 years 6 months ago
Extracting camera-control requirements and camera movement generation in a 3D virtual environment
This paper proposes a new method to generate smooth camera movement that is collision-free in a three-dimensional virtual environment. It generates a set of cells based on cell de...
Hirofumi Hamazaki, Shinya Kitaoka, Maya Ozaki, Yos...
117
Voted
ACMDIS
2008
ACM
15 years 6 months ago
Photo displays in the home
This paper examines an under explored area of digital photography, namely photo display. Using examples from a study undertaken with six families, we examine photo displays on man...
Laurel Swan, Alex S. Taylor