Sciweavers

448 search results - page 55 / 90
» Who is in Control
Sort
View
CHI
2007
ACM
16 years 4 months ago
Constructing my online self: avatars that increase self-focused attention
Three studies investigated whether users' strategies for customising online avatars increase their self-focused attention, also known as private self-awareness. Study 1 showe...
Asimina Vasalou, Adam N. Joinson, Jeremy Pitt
CHI
2005
ACM
16 years 4 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
CHI
2005
ACM
16 years 4 months ago
Giving the caller the finger: collaborative responsibility for cellphone interruptions
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
Stefan Marti, Chris Schmandt
PERCOM
2007
ACM
16 years 3 months ago
Good Manners for Pervasive Computing--An Approach Based on the Ambient Calculus
When people interact, they follow distinct rules that coordinate the order of speech, who opens doors, whom and how to greet, and many things more. Such a social codex depends on ...
Gregor Schiele, Marcus Handte, Christian Becker
HICSS
2010
IEEE
172views Biometrics» more  HICSS 2010»
15 years 10 months ago
Privacy Calculus on Social Networking Sites: Explorative Evidence from Germany and USA
Worldwide social networks, like Facebook, face fierce competition from local platforms when expanding globally. To remain attractive social network providers need to encourage use...
Hanna Krasnova, Natasha F. Veltri