Sciweavers

182 search results - page 8 / 37
» End-User Privacy in Human-Computer Interaction
Sort
View
CSCWD
2009
Springer
13 years 11 months ago
Privacy preserving on Radio Frequency Identification systems
This paper focuses on the challenges on the privacy of Radio Frequency Identification (RFID) systems. RFID systems have already widely applied in industry and have been bringing l...
Hua Wang, Lili Sun, Jianming Yong, Yongbing Zhang
CSCWD
2006
Springer
13 years 11 months ago
A Model to Incorporate Privacy in Organizational Memory Systems
People are usually concerned with the privacy of their personal information. However, the problem of privacy is also present when the information is directly linked to people, for...
Valeria Herskovic, Sergio F. Ochoa, José A....
CHI
2010
ACM
14 years 2 months ago
Where there's a will there's a way: mobile media sharing in urban india
We present the results of a qualitative study of the sharing and consumption of entertainment media on low-cost mobile phones in urban India, a practice which has evolved into a v...
Thomas N. Smyth, Satish Kumar, Indrani Medhi, Kent...
CHI
2007
ACM
14 years 8 months ago
Koala: capture, share, automate, personalize business processes on the web
We present Koala, a system that enables users to capture, share, automate, and personalize business processes on the web. Koala is a collaborative programming-bydemonstration syst...
Greg Little, Tessa A. Lau, Allen Cypher, James Lin...
CHI
2008
ACM
13 years 9 months ago
Toped: enabling end-user programmers to validate data
Existing tools require end-user programmers (EUPs) to write regular expressions ("regexps") or even scripts to validate textual inputs, which is slow and error-prone. We...
Christopher Scaffidi, Brad A. Myers, Mary Shaw