Sciweavers

2648 search results - page 293 / 530
» Human Factors In Computer Security
Sort
View
123
Voted
CHI
2009
ACM
16 years 4 months ago
Supporting volunteer activities with mobile social software
Many community organizations rely extensively on volunteer work. However, people who wish to help often have difficulties finding the time to volunteer. We are developing mobile s...
Shaun K. Kane, Predrag V. Klasnja
106
Voted
CHI
2009
ACM
16 years 4 months ago
iBookmark: locative texts and place-based authoring
With the recent developments in ePaper technology, consumer eBook readers have display qualities and form factors that are approaching that of traditional books. These eBook reade...
Johannes Schöning, Tom Bartindale, Patrick Ol...
CHI
2008
ACM
16 years 4 months ago
Breaking the disposable technology paradigm: opportunities for sustainable interaction design for mobile phones
We present a qualitative study of mobile phone ownership, replacement and disposal practices geared towards identifying design opportunities towards sustainable mobile phone inter...
Elaine M. Huang, Khai N. Truong
111
Voted
CHI
2008
ACM
16 years 4 months ago
Searching for expertise
It is well established that there is a need to find experts to get answers or advice. A variety of expertise locator tools have emerged to help locate the right person. But there ...
Kate Ehrlich, N. Sadat Shami
125
Voted
CHI
2007
ACM
16 years 4 months ago
An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC
IBM Enhanced Audio Conferencing (IEAC) is a VoIPbased audio conferencing system that, like several other systems, provides a visualization showing who is present and their states ...
Xianghua Ding, Thomas Erickson, Wendy A. Kellogg, ...