Sciweavers

2648 search results - page 438 / 530
» Human Factors In Computer Security
Sort
View
GROUP
2005
ACM
15 years 3 months ago
Seeking the source: software source code as a social and technical artifact
In distributed software development, two sorts of dependencies can arise. The structure of the software system itself can create dependencies between software elements, while the ...
Cleidson R. B. de Souza, Jon Froehlich, Paul Douri...
GROUP
2005
ACM
15 years 3 months ago
Negotiated rhythms of mobile work: time, place, and work schedules
This study investigates the role of rhythms in the collaborative coordination of mobile work as well as in the individual actors’ comprehension and command of their work. Drawin...
Magnus Nilsson, Morten Hertzum
HT
2005
ACM
15 years 3 months ago
Constraints in spatial structures
People have become used to paper as an information carrier over thousands of years. Paper is usually easy to handle and has been adopted as a metaphor for information structures i...
Claus Atzenbeck, Peter J. Nürnberg
HT
2005
ACM
15 years 3 months ago
Hypervideo expression: experiences with hyper-hitchcock
Hyper-Hitchcock is a hypervideo editor enabling the direct manipulation authoring of a particular form of hypervideo called “detail-on-demand video.” This form of hypervideo a...
Frank M. Shipman III, Andreas Girgensohn, Lynn Wil...
HT
2005
ACM
15 years 3 months ago
A tactile web browser for the visually disabled
The dissemination of information available through the World Wide Web makes universal access more and more important and supports visually disabled people in their everyday life. ...
Martin Rotard, Sven Knödler, Thomas Ertl