Sciweavers

659 search results - page 121 / 132
» Designing social presence of social actors in human computer...
Sort
View
CHI
2010
ACM
14 years 2 months ago
Homeless young people's experiences with information systems: life and work in a community technology center
This paper explores how homeless young people, aged 1325, make use of information systems in daily life. Observed in a community technology center, four different examples of uses...
Jill Palzkill Woelfer, David G. Hendry
CHI
2010
ACM
14 years 29 days ago
Trained to accept?: a field experiment on consent dialogs
A typical consent dialog was shown in 2×2×3 experimental variations to 80,000 users of an online privacy tool. We find that polite requests and button texts pointing to a volun...
Rainer Böhme, Stefan Köpsell
APCHI
1998
IEEE
13 years 12 months ago
Tickertape: Notification and Communication in a Single Line
This paper outlines an awareness application called Tickertape. Tickertape is a tool that displays event notifications in the form of scrolling messages across a single-line windo...
Sara Parsowith, Geraldine Fitzpatrick, Simon M. Ka...
CHI
2008
ACM
13 years 9 months ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
CHI
2006
ACM
14 years 8 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...