Sciweavers

182 search results - page 17 / 37
» End-User Privacy in Human-Computer Interaction
Sort
View
CHI
2005
ACM
14 years 8 months ago
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing
We argue that an analytic proportionality assessment balancing usefulness and burden on individual or group privacy must be conducted throughout the design process to create accep...
Giovanni Iachello, Gregory D. Abowd
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 1 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
CSCWD
2007
Springer
14 years 1 months ago
Digital Identity Design and Privacy Preservation for e-Learning
More and more learners tend to utilise e-learning as their learning platform. The privacy of the users’ digital identities of e-learning has become a big concern. This paper pro...
Jianming Yong
CHI
2008
ACM
14 years 8 months ago
Interactional empowerment
We propose that an interactional perspective on how emotion is constructed, shared and experienced, may be a good basis for designing affective interactional systems that do not i...
Anna Ståhl, Jarmo Laaksolahti, Kristina H&ou...
LAWEB
2009
IEEE
14 years 2 months ago
A Model-Based Approach for Developing Vectorial User Interfaces
—This paper presents a model-based approach for developing vectorial user interfaces to an interactive applications, whether it is a web or a stand-alone applications. A vectoria...
Jean Vanderdonckt, Josefina Guerrero García...