Sciweavers

1627 search results - page 241 / 326
» On context in authorization policy
Sort
View
CHI
2009
ACM
14 years 9 months ago
Social responses in mobile messaging: influence strategies, self-disclosure, and source orientation
This paper reports on a direct test of social responses to communication technologies theory (SRCT) with mobile messaging. SRCT predicts that people will mindlessly respond to com...
Attapol Thamrongrattanarit, B. J. Fogg, Claire Car...
CHI
2008
ACM
14 years 9 months ago
Understanding geocaching practices and motivations
Geocaching is a location-based activity that has been practiced for a number of years. As a sustained and established activity it represents an important opportunity for understan...
Kenton O'Hara
CHI
2008
ACM
14 years 9 months ago
FacetZoom: a continuous multi-scale widget for navigating hierarchical metadata
Faceted browsing is a promising way to incrementally refine data sets. Current approaches do not scale well in terms of screen size and have shortcomings in interacting with hiera...
Raimund Dachselt, Mathias Frisch, Markus Weiland
CHI
2008
ACM
14 years 9 months ago
Asynchronous remote medical consultation for Ghana
Computer-mediated communication systems can be used to bridge the gap between doctors in underserved regions with local shortages of medical expertise and medical specialists worl...
Rowena Luk, Melissa Ho, Paul M. Aoki
CHI
2008
ACM
14 years 9 months ago
The personal project planner: planning to organize personal information
Prototyping and evaluation combine to explore ways that an effective, integrative organization of project-related information might emerge as a by-product of a person's effor...
William Jones, Predrag V. Klasnja, Andrea Civan, M...