Sciweavers

11 search results - page 2 / 3
» Misuse and abuse of interactive technologies
Sort
View
SIGECOM
2004
ACM
104views ECommerce» more  SIGECOM 2004»
14 years 1 months ago
An economic answer to unsolicited communication
We explore an alternative approach to spam based on economic rather than technological or regulatory screening mechanisms. We employ a model of email value which supports two intu...
Thede Loder, Marshall W. van Alstyne, Rick Wash
CHI
1995
ACM
14 years 2 days ago
Ethics, Lies and Videotape..
Videotape has become one of the CHI community's most useful technologies: it allows us to analyze users' interactions with computers, prototype new interfaces, and prese...
Wendy E. Mackay
WWW
2006
ACM
14 years 9 months ago
Detecting nepotistic links by language model disagreement
In this short note we demonstrate the applicability of hyperlink downweighting by means of language model disagreement. The method filters out hyperlinks with no relevance to the ...
András A. Benczúr, István B&i...
OZCHI
2009
ACM
14 years 3 months ago
Towards an ethical interaction design: the issue of including stakeholders in law-enforcement software development
In the public sector (particularly in the UK in light of recent reforms i.e. the Local Government Act 2000, etc.) a greater degree of accountability and public involvement or inte...
Patrick G. Watson, Penny Duquenoy, Margaret Brenna...
WWW
2011
ACM
13 years 3 months ago
Truthy: mapping the spread of astroturf in microblog streams
Online social media are complementing and in some cases replacing person-to-person social interaction and redefining the diffusion of information. In particular, microblogs have ...
Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bru...