Sciweavers

2399 search results - page 295 / 480
» On Authentication between Human and Computer
Sort
View
144
Voted
CHI
2010
ACM
15 years 12 months ago
Presenting diverse political opinions: how and how much
Is a polarized society inevitable, where people choose to be exposed to only political news and commentary that reinforces their existing viewpoints? We examine the relationship b...
Sean A. Munson, Paul Resnick
CHI
2010
ACM
15 years 12 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
131
Voted
CHI
2010
ACM
15 years 12 months ago
Homeless young people's experiences with information systems: life and work in a community technology center
This paper explores how homeless young people, aged 1325, make use of information systems in daily life. Observed in a community technology center, four different examples of uses...
Jill Palzkill Woelfer, David G. Hendry
CHI
2010
ACM
15 years 12 months ago
How to support designers in getting hold of the immaterial material of software
When designing novel GUI controls, interaction designers are challenged by the “immaterial” materiality of the digital domain; they lack tools that effectively support a refle...
Fatih Kursat Ozenc, Miso Kim, John Zimmerman, Step...
CHI
2010
ACM
15 years 12 months ago
Spyn: augmenting the creative and communicative potential of craft
We present data collected from a field study of 12 needlecrafters introduced to Spyn—mobile phone software that associates digital records (audio/visual media, text, and geograp...
Daniela Karin Rosner, Kimiko Ryokai