Entering the clubhouse: Case studies of young programmers joining the online Scratch communities

YB Kafai, D Fields, WQ Burke - End-User Computing, Development …, 2012 - igi-global.com
Previous efforts in end-user development have focused on facilitating the mechanics of
learning programming, leaving aside social and cultural factors equally important in getting …

A contract-extended push-pull-clone model for multi-synchronous collaboration

HTT Truong, CL Ignat, P Molli - International Journal of Cooperative …, 2012 - World Scientific
In multi-synchronous collaboration users replicate shared data, modify it and redistribute
modified versions of this data without the need of a central authority. However, in this model …

Broadening the Scope of Security Usability from the Individual to the Organizational: Participation and Interaction for Effective, Efficient, and Agile Authorization

S Bartsch - 2012 - media.suub.uni-bremen.de
Restrictions and permissions in information systems--Authorization--can cause problems for
those interacting with the systems. Often, the problems materialize as an interference with …

A Contract-based and Trust-aware Collaboration Model

HTT Truong - 2012 - theses.hal.science
Nowadays, information technologies provide users ability to work with anyone, at any time,
from everywhere and with several heterogeneous devices. This evolution fosters a new …

Mutual Development: The Software Engineering Context of End-User Development

AI Mørch, R Andersen - End-User Computing, Development, and …, 2012 - igi-global.com
The article presents and analyzes data from a case study in customer-initiated software
product development. We have observed and participated in system development activities …

[图书][B] Proximity Displays for Access Control

K Vaniea - 2012 - search.proquest.com
Managing access to shared digital information, such as photographs and documents. is
difficult for end users who are accumulating an increasingly large and diverse collection of …

[PDF][PDF] Using proximity information displays and audit log information to motivate users to view and maintain access-control policy

K Vaniea - 2012 - Citeseer
Managing access to shared digital information, such as photographs and documents, is
difficult for end users who are accumulating an increasingly large and diverse collection of …

Evaluating usage control deterrents

K Padayachee, JHP Eloff - South African Computer Journal, 2012 - journals.co.za
This paper explores the effectiveness of usage control deterrents. Usage control enables
finer-grained control over the usage of objects than do traditional access control models …