Sciweavers

2648 search results - page 259 / 530
» Human Factors In Computer Security
Sort
View
CHI
2011
ACM
14 years 7 months ago
Post-deployment usability: a survey of current practices
Despite the growing research on usability in the predevelopment phase, we know little about post-deployment usability activities. To characterize these activities, we surveyed 333...
Parmit K. Chilana, Andrew J. Ko, Jacob O. Wobbrock...
CHI
2011
ACM
14 years 7 months ago
Social media ownership: using twitter as a window onto current attitudes and beliefs
Social media, by its very nature, introduces questions about ownership. Ownership comes into play most crucially when we investigate how social media is saved or archived; how it ...
Catherine C. Marshall, Frank M. Shipman III
CHI
2011
ACM
14 years 7 months ago
Hang on a sec!: effects of proactive mediation of phone conversations while driving
Conversing on cell phones while driving is a risky, yet commonplace activity. State legislatures in the U.S. have enacted rules that limit hand-held phone conversations while driv...
Shamsi T. Iqbal, Eric Horvitz, Yun-Cheng Ju, Ella ...
CHI
2011
ACM
14 years 7 months ago
Name that tune: musicons as reminders in the home
In this paper we argue that Musicons, short samples from pieces of music are a useful way to present private but memorable reminder messages. We investigated accuracy, memorabilit...
Marilyn Rose McGee-Lennon, Maria Wolters, Ross McL...
CHI
2011
ACM
14 years 7 months ago
Places in spaces: common ground in virtual worlds
Virtual worlds can allow conversational participants to achieve common ground in situations where the information volume and need for clarification is low. We argue in favor of th...
N. Sadat Shami, Thomas Erickson, Wendy A. Kellogg,...