Purpose Online social networks can bridge the gap between distant individuals by simulating online experiences that closely resemble physical interactions. While people …
DA Epstein, BH Jacobson, E Bales… - Proceedings of the 18th …, 2015 - dl.acm.org
Many research applications and popular commercial applications include features for sharing personally collected data with others in social awareness streams. Prior work has …
Entrepreneurship has long been used to create self-employment opportunities to guard against career uncertainty. Yet, little is known about how social technologies impact the day …
In this paper we examine the notion of privacy as promoted in the digital economy and how it has been taken up as a design challenge in the fields of CSCW, HCI and Ubiquitous …
In this paper, we study online privacy lies: lies primarily aimed at protecting privacy. Going beyond privacy lenses that focus on privacy concerns or cost/benefit analyses, we explore …
DA Epstein, A Borning, J Fogarty - … of the 2013 ACM international joint …, 2013 - dl.acm.org
Personal informatics applications in a variety of domains are increasingly enabled by low cost personal sensing. Although applications capture fine-grained activity for self reflection …
M Posti, J Schöning, J Häkkilä - Proceedings of the 2014 conference on …, 2014 - dl.acm.org
In the age of mobile communications and social media, users are connected to interact with other people, and often obliged to be socially active as technology drives to connect us. In …
As an increasingly important part of our social, professional and financial lives happens online, the frequency with which we have to deal with privacy problems is ever on the rise. In …
P Das Chowdhury, A Domínguez Hernández… - Proceedings of the …, 2022 - dl.acm.org
The wider adoption of Privacy Enhancing Technologies (PETs) has relied on usability studies–which focus mainly on an assessment of how a specified group of users interface, in …