Sciweavers

2648 search results - page 255 / 530
» Human Factors In Computer Security
Sort
View
CHI
2011
ACM
14 years 7 months ago
LiquidText: a flexible, multitouch environment to support active reading
Active reading, involving acts such as highlighting, writing notes, etc., is an important part of knowledge workers’ activities. Most computer-based active reading support seeks...
Craig S. Tashman, W. Keith Edwards
CHI
2011
ACM
14 years 7 months ago
Placing a value on aesthetics in online casual games
Game designers frequently invest in aesthetic improvements such as music, sound effects, and animations. However, their exact value for attracting and retaining players remains un...
Erik Andersen, Yun-En Liu, Rich Snider, Roy Szeto,...
142
Voted
CHI
2011
ACM
14 years 7 months ago
Feedlack detects missing feedback in web applications
While usability methods such as user studies and inspections can reveal a wide range of problems, they do so for only a subset of an application’s features and states. We presen...
Andrew J. Ko, Xing Zhang
CHI
2011
ACM
14 years 7 months ago
The impact of network structure on breaking ties in online social networks: unfollowing on twitter
We investigate the breaking of ties between individuals in the online social network of Twitter, a hugely popular social media service. Building on sociology concepts such as stre...
Funda Kivran-Swaine, Priya Govindan, Mor Naaman
CHI
2011
ACM
14 years 7 months ago
Synchronous interaction among hundreds: an evaluation of a conference in an avatar-based virtual environment
This paper presents the first in-depth evaluation of a large multi-format virtual conference. The conference took place in an avatar-based 3D virtual world with spatialized audio,...
Thomas Erickson, N. Sadat Shami, Wendy A. Kellogg,...