The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
This paper describes the evolution of a concept, Contact Point, the research process through which it evolved, and the work context and practices which drove its evolution. Contac...
In this paper we investigate how consistency can be ensured for replicated continuous interactive media, i.e., replicated media which change their state in reaction to user initia...
A proliferation of mobile devices in everyday life has increased the likelihood of technologically mediated interruptions. We examine ethnographic data from an SMSbased pervasive ...
Peter Tolmie, Andy Crabtree, Tom Rodden, Steve Ben...
This paper analyzes Internet diffusion among organizations, based on daily observation of the registration of second level domain names under the ".it" ccTLD. In particu...