Sciweavers

20 search results - page 2 / 4
» Why Don't People Use Refactoring Tools
Sort
View
SOUPS
2006
ACM
14 years 7 days ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
CHI
2002
ACM
14 years 6 months ago
How knowledge workers use the web
We report on a diary study of how and why knowledge workers use the World Wide Web. By examining in detail a complete two-day set of Web activities from each of 24 people, we cons...
Abigail Sellen, Rachel Murphy, Kate L. Shaw
IJMMS
2006
90views more  IJMMS 2006»
13 years 6 months ago
A framework for asynchronous change awareness in collaborative documents and workspaces
Change awareness is the ability of individuals to track the asynchronous changes made to a collaborative document or graphical workspace by other participants over time. We develo...
James Tam, Saul Greenberg
CSCW
2012
ACM
12 years 1 months ago
See friendship, sort of: how conversation and digital traces might support reflection on friendships
Inspired by conversational visualization tools and the increasing enactment of relationships in social media, we examine how people reflect on friendships and how social data and ...
Victoria Schwanda Sosik, Xuan Zhao, Dan Cosley
HUC
2011
Springer
12 years 6 months ago
Understanding my data, myself: supporting self-reflection with ubicomp technologies
We live in a world where many kinds of data about us can be collected and more will be collected as Ubicomp technologies mature. People reflect on this data using different tools ...
Ian Li, Anind K. Dey, Jodi Forlizzi