Sciweavers

621 search results - page 83 / 125
» chi 2008
Sort
View
CHI
2008
ACM
13 years 12 months ago
Sesame: informing user security decisions with system visualization
Non-expert users face a dilemma when making security decisions. Their security often cannot be fully automated for them, yet they generally lack both the motivation and technical ...
Jennifer Stoll, Craig S. Tashman, W. Keith Edwards...
CHI
2008
ACM
13 years 12 months ago
Escape: a target selection technique using visually-cued gestures
Many mobile devices have touch-sensitive screens that people interact with using fingers or thumbs. However, such interaction is difficult because targets become occluded, and bec...
Koji Yatani, Kurt Partridge, Marshall W. Bern, Mar...
CHI
2008
ACM
13 years 12 months ago
User experience at google: focus on the user and all else will follow
This paper presents an overview of the User Experience (UX) team at Google. We focus on four aspects of working within Google's product development organization: (1) a bottom...
Irene Au, Richard Boardman, Robin Jeffries, Patric...
CHI
2008
ACM
13 years 11 months ago
Testing vs. code inspection vs. what else?: male and female end users' debugging strategies
Little is known about the strategies end-user programmers use in debugging their programs, and even less is known about gender differences that may exist in these strategies. With...
Neeraja Subrahmaniyan, Laura Beckwith, Valentina G...
CHI
2008
ACM
13 years 11 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs