Sciweavers

PERSUASIVE
2009
Springer
14 years 6 months ago
Meeting people where they are
Brenda Laurel
PERSUASIVE
2009
Springer
14 years 6 months ago
The Behavior Grid: 35 ways behavior can change
This paper presents a new way of categorizing behavior change in a framework called the Behavior Grid. This preliminary work shows 35 types of behavior along two categorical dimen...
B. J. Fogg
PERSUASIVE
2009
Springer
14 years 6 months ago
Designing empathic computers: the effect of multimodal empathic feedback using animated agent
Experiencing emotional distress is the number one reason why people who are undergoing behaviour modification (e.g. quitting smoking, dieting) suffer from relapses. Providing emot...
Hien Nguyen, Judith Masthoff
PERSUASIVE
2009
Springer
14 years 6 months ago
Designing games to motivate physical activity
Engagement with computer games causes children and adolescent users to spend a substantial amount of time at sedentary game playing activity. We hypothesise that this engagement c...
Shlomo Berkovsky, Dipak Bhandari, Stephen Kimani, ...
PERSUASIVE
2009
Springer
14 years 6 months ago
A behavior model for persuasive design
This paper presents a new model for understanding human behavior. In this model (FBM), behavior is a product of three factors: motivation, ability, and triggers, each of which has...
B. J. Fogg
PERSUASIVE
2009
Springer
14 years 6 months ago
Goal-setting considerations for persuasive technologies that encourage physical activity
Goal-setting has been shown to be an effective strategy for changing behavior; therefore employing goal-setting in persuasive technologies could be an effective way to encourage b...
Sunny Consolvo, Predrag V. Klasnja, David W. McDon...
PERSUASIVE
2009
Springer
14 years 6 months ago
The community health index
Michael Wu
MCETECH
2009
Springer
14 years 6 months ago
A Non-technical User-Oriented Display Notation for XACML Conditions
Access control rules are currently administered by highly qualified personnel. Thus, the technical barrier that specialized access control languages represent naturally prevents th...
Bernard Stepien, Amy P. Felty, Stan Matwin
MCETECH
2009
Springer
14 years 6 months ago
TwoStep: An Authentication Method Combining Text and Graphical Passwords
Text-based passwords alone are subject to dictionary attacks as users tend to choose weak passwords in favor of memorability, as well as phishing attacks. Many recognition-based gr...
Paul C. van Oorschot, Tao Wan
ICETET
2009
IEEE
14 years 6 months ago
Low Energy Tree Based Network on Chip Architectures Using Homogeneous Routers for Bandwidth and Latency Constrained Multimedia A
Abstract— Design of Network on chip architectures for multimedia applications is being widely studied. This involves design decisions at various levels of hierarchy. Topology des...
Deepak Majeti, Aditya Pasalapudi, Kishore Yalamanc...