Sciweavers

2648 search results - page 425 / 530
» Human Factors In Computer Security
Sort
View
IUI
2009
ACM
15 years 6 months ago
Learning to recognize valuable tags
Many websites use tags as a mechanism for improving item metadata through collective user effort. Users of tagging systems often apply far more tags to an item than a system can ...
Shilad Sen, Jesse Vig, John Riedl
IUI
2009
ACM
15 years 6 months ago
Tagsplanations: explaining recommendations using tags
While recommender systems tell users what items they might like, explanations of recommendations reveal why they might like them. Explanations provide many benefits, from improvi...
Jesse Vig, Shilad Sen, John Riedl
CSCW
2010
ACM
15 years 6 months ago
Social use of computer-mediated communication by adults on the autism spectrum
The defining characteristics of autism, including difficulty with nonverbal cues and need for structure, and the defining characteristics of computer-mediated communication (CMC),...
Moira Burke, Robert Kraut, Diane Williams
CSCW
2010
ACM
15 years 6 months ago
"on my way": deceptive texting and interpersonal awareness narratives
Managing one’s availability for interaction with others is an increasingly complex act, involving multiple media and the sharing of many types of information. In this paper we d...
Jeremy P. Birnholtz, Jamie Guillory, Jeffrey T. Ha...
CSCW
2010
ACM
15 years 6 months ago
The individual and the group in console gaming
In this paper, we present results from a study of collocated group console gaming. We focus, in particular, on observed gaming practices that emphasized the individual gamer withi...
Amy Voida, M. Sheelagh T. Carpendale, Saul Greenbe...