Sciweavers

792 search results - page 75 / 159
» Interview
Sort
View
CHI
2008
ACM
14 years 10 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...
CHI
2008
ACM
14 years 10 months ago
The associative pda 2.0
In this paper I describe the Associative PDA 2.0, a mobile system for Personal Information Management (PIM), based on an associative information network. In addition to associate ...
Eileen Falke
CHI
2007
ACM
14 years 10 months ago
Transfer scenarios: grounding innovation with marginal practices
Transfer scenarios is a method developed to support the design of innovative interactive technology. Such a method should help the designer to come up with inventive ideas, and at...
Sara Ljungblad, Lars Erik Holmquist
CHI
2007
ACM
14 years 10 months ago
Implicit coordination in firefighting practice: design implications for teaching fire emergency responders
Fire emergency response requires rapidly processing and communicating information to coordinate teams that protect lives and property. Students studying to become fire emergency r...
Zachary O. Toups, Andruid Kerne
CHI
2007
ACM
14 years 10 months ago
An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC
IBM Enhanced Audio Conferencing (IEAC) is a VoIPbased audio conferencing system that, like several other systems, provides a visualization showing who is present and their states ...
Xianghua Ding, Thomas Erickson, Wendy A. Kellogg, ...