Sciweavers

2399 search results - page 227 / 480
» On Authentication between Human and Computer
Sort
View
CHI
2010
ACM
16 years 9 days ago
Visual vs. compact: a comparison of privacy policy interfaces
In this paper, we compare the impact of two different privacy policy representations – AudienceView and Expandable Grids – on users modifying privacy policies for a social net...
Heather Richter Lipford, Jason Watson, Michael Whi...
CHI
2010
ACM
16 years 9 days ago
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure
Current chasms between applications implemented with different user interface toolkits make it difficult to implement and explore potentially important interaction techniques in n...
Morgan Dixon, James Fogarty
154
Voted
CHI
2010
ACM
16 years 9 days ago
Detecting professional versus personal closeness using an enterprise social network site
In this work we analyze the behavior on a company-internal social network site to determine which interaction patterns signal closeness between colleagues. Regression analysis sug...
Anna Wu, Joan Morris DiMicco, David R. Millen
CHI
2010
ACM
16 years 9 days ago
Cars, calls, and cognition: investigating driving and divided attention
Conversing on cell phones while driving an automobile is a common practice. We examine the interference of the cognitive load of conversational dialog with driving tasks, with the...
Shamsi T. Iqbal, Yun-Cheng Ju, Eric Horvitz
CHI
2010
ACM
16 years 9 days ago
What do you know?: experts, novices and territoriality in collaborative systems
When experts participate in collaborative systems, tension may arise between them and novice contributors. In particular, when experts perceive novices as a bother or a threat, th...
Jennifer Thom-Santelli, Dan Cosley, Geri Gay