Information and communications technology (ICT) pervades most aspects of our lives and changes everyday's practices in work and leisure time. When designing innovative ICTs, we …
JS Olson, J Grudin, E Horvitz - CHI'05 extended abstracts on Human …, 2005 - dl.acm.org
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with privacy and at understanding how people might abstract the …
The introduction of IT has changed the way we live in many ways. Historically, it can even be argued that socially embedded applications of information technology challenge and …
AD Brucker, H Petritsch - Proceedings of the 14th ACM symposium on …, 2009 - dl.acm.org
Access control models are usually static, ie, permissions are granted based on a policy that only changes seldom. Especially for scenarios in health care and disaster management, a …
RE Grinter, L Palen, M Eldridge - ACM Transactions on Computer …, 2006 - dl.acm.org
In the last few years, teenagers have been on the forefront of adopting short message service (SMS), a mobile phone-based text messaging system, and instant messaging (IM), a …
V Wulf, V Pipek, M Won - International Journal of Human-Computer Studies, 2008 - Elsevier
Component technologies are perceived as an important means to keep software architectures flexible. Flexibility offered by component technologies typically addresses …
This thesis contributes to the field of collaborative information systems and Computer- Supported Cooperative Work (CSCW). It extends the notion of technological support for …
Previous efforts in end-user development have focused on facilitating the mechanics of learning programming, leaving aside social and cultural factors equally important in getting …
CD Cera, T Kim, JH Han, WC Regli - Computer-Aided Design, 2004 - Elsevier
Information security and assurance are new frontiers for collaborative design. In this context, information assurance (IA) refers to methodologies to protect engineering information by …