Sciweavers

2648 search results - page 98 / 530
» Human Factors In Computer Security
Sort
View
LOCWEB
2009
ACM
15 years 9 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
CHI
2004
ACM
16 years 3 months ago
Designing interfaces that influence group processes
The goal of this research is to build and evaluate collaborative tools that persuade behavior change over a group of individuals. Preliminary work in this area is presented and fu...
Joan Morris DiMicco
CHI
2010
ACM
15 years 9 months ago
Investigation of cultural dependency in mobile technology and older adults
Studies using different methods have been carried out of older adults’ use of mobile technology in Malaysia and the UK. Preliminary results suggest that there are significant di...
Sofianiza Abd Malik, Alistair D. N. Edwards
MHCI
2009
Springer
15 years 9 months ago
Contextual push-to-talk: a new technique for reducing voice dialog duration
We present a technique in which physical controls have both normal and voice-enabled activation styles. In the case of the latter, knowledge of which physical control was activate...
Garrett Weinberg
CHI
2010
ACM
15 years 9 months ago
Participatory design for sustainable campus living
Participatory design methods have the potential to produce ethical and useful persuasive technologies, particularly in support of environmental sustainability. I present the use a...
Janet Davis