Sciweavers

197 search results - page 19 / 40
» Social Interaction History: A Framework for Supporting Explo...
Sort
View
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
14 years 2 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
12 years 3 months ago
Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online
As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this informat...
Nathan J. Claes, Carolyn Hurley, Michael A. Stefan...
JCP
2007
105views more  JCP 2007»
13 years 7 months ago
Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks
Abstract— The convergence of the wireline telecom, wireless telecom, and internet networks and the services they provide offers tremendous opportunities in services personalizati...
Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Ku...
CSCW
2010
ACM
14 years 4 months ago
Multiple mouse text entry for single-display groupware
A recent trend in interface design for classrooms in developing regions has many students interacting on the same display using mice. Text entry has emerged as an important proble...
Saleema Amershi, Meredith Ringel Morris, Neema Mor...
AEI
2007
119views more  AEI 2007»
13 years 7 months ago
Exploring the CSCW spectrum using process mining
Process mining techniques allow for extracting information from event logs. For example, the audit trails of a workflow management system or the transaction logs of an enterprise ...
Wil M. P. van der Aalst