-
1
-
-
0034459145
-
The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility
-
Ackerman, M. 2000. The Intellectual Challenge of CSCW: The Gap Between Social Requirements and Technical Feasibility. Human-Computer Interaction Journal, vol. 15, pp. 179-203.
-
(2000)
Human-Computer Interaction Journal
, vol.15
, pp. 179-203
-
-
Ackerman, M.1
-
3
-
-
0001163097
-
Ironies of automation
-
ed. J. Rasmussen, K. Duncan, & J. Leplat, New York: Wiley
-
Bainbridge, L. 1987 Ironies of automation. In New Technology and Human Error (ed. J. Rasmussen, K. Duncan, & J. Leplat). New York: Wiley.
-
(1987)
New Technology and Human Error
-
-
Bainbridge, L.1
-
4
-
-
0035569004
-
Intelligibility and Accountability: Human Considerations in Context Aware Systems
-
ed, Lawrence Erlbaum Associates, NJ. pp
-
Bellotti, V., and Edwards, W.K., "Intelligibility and Accountability: Human Considerations in Context Aware Systems," Journal of Human-Computer Interaction, 16:2-4, 2001. Thomas Moran, ed., Lawrence Erlbaum Associates, NJ. pp. 193-212.
-
(2001)
Journal of Human-Computer Interaction
, vol.16
-
-
Bellotti, V.1
Edwards, W.K.2
-
5
-
-
70450229325
-
-
Yale University Press
-
Benkler, Y. Wealth of Nations. Yale University Press, 2006, pp. 133-175.
-
(2006)
Wealth of Nations
, pp. 133-175
-
-
Benkler, Y.1
-
6
-
-
70450250873
-
How to Save the Internet
-
March 15
-
Berinato, S. How to Save the Internet, March 15, 2005, CIO Magazine.
-
(2005)
CIO Magazine
-
-
Berinato, S.1
-
8
-
-
0029700344
-
Decentralized Trust Management
-
Oakland, CA. May
-
Blaze, M., Feigenbaum, J., and Lacy, J. "Decentralized Trust Management." In Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA. May, 1996. pp. 164-173.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
38049149416
-
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
-
PA
-
Brodie, C. A., Karat, C., and Karat, J. An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In Proceedings of the Second Symposium on Usable Privacy and Security, PA, 2006.
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security
-
-
Brodie, C.A.1
Karat, C.2
Karat, J.3
-
10
-
-
33746063031
-
Social Navigation and Seamful Design
-
Chalmers, M. Dieberger, A., Höök, K., Rudström, A. "Social Navigation and Seamful Design." Cognitive Studies: Bulletin of the Japanese Cognitive Science Society 11(3), pp. 171-181, 2004.
-
(2004)
Cognitive Studies: Bulletin of the Japanese Cognitive Science Society
, vol.11
, Issue.3
, pp. 171-181
-
-
Chalmers, M.1
Dieberger, A.2
Höök, K.3
Rudström, A.4
-
11
-
-
70450244097
-
-
Consul: http://www.consul.com/Content.asp?id=58
-
Consul
-
-
-
12
-
-
0030107190
-
A Taxonomy for Key Escrow Encryption Systems
-
March
-
Denning, D.E., and Branstad, D.K. "A Taxonomy for Key Escrow Encryption Systems," Communications of the ACM, 39:3, March 1996.
-
(1996)
Communications of the ACM
, vol.39
, pp. 3
-
-
Denning, D.E.1
Branstad, D.K.2
-
15
-
-
0032284173
-
Technomethodology: Foundational Relationships between Ethno-methodology and System Design
-
Dourish, P. and Button, G. On "Technomethodology": Foundational Relationships between Ethno-methodology and System Design. Human-Computer Interaction, 13(4), 1998, pp. 395-432
-
(1998)
Human-Computer Interaction
, vol.13
, Issue.4
, pp. 395-432
-
-
Dourish, P.1
Button, G.O.2
-
16
-
-
84900482702
-
Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem
-
Springer Verlag
-
Dourish, P. Grinter, R.E., Delgado de la Flor, J., and Joseph, M. "Security in the Wild: User Strategies for Managing Security as an Everyday, Practical Problem." Personal and Ubiquitous Computing 8, pp. 391-401. Springer Verlag, 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, pp. 391-401
-
-
Dourish, P.1
Grinter, R.E.2
Delgado de la Flor, J.3
Joseph, M.4
-
18
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
August
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R. and Chandramouli, R. "Proposed NIST Standard for Role-Based Access Control," ACM Transactions on Information and System Security, vol. 4, no. 3, pp. 222-274, August 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 222-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
19
-
-
70450286027
-
Internet about to collapse says Finnish scientist
-
Oct. 18, Also
-
Fisher, K. "Internet about to collapse says Finnish scientist". ars technica, Oct. 18, 2004. Also: www.arstechnica.com/news.ars/post/ 20041018-4318.html
-
(2004)
ars technica
-
-
Fisher, K.1
-
21
-
-
85139651074
-
Value Sensitive Design and information systems
-
P. Zhang & D. Galletta eds, Armonk, New York; London, England: M.E. Sharpe
-
Friedman, B., Kahn, P. H., Jr., & Borning, A. (2006). Value Sensitive Design and information systems. In P. Zhang & D. Galletta (eds.), Human-computer interaction in management information systems: Foundations (pp. 348-372). Armonk, New York; London, England: M.E. Sharpe.
-
(2006)
Human-computer interaction in management information systems: Foundations
, pp. 348-372
-
-
Friedman, B.1
Kahn Jr., P.H.2
Borning, A.3
-
22
-
-
20444478398
-
Human Values, Ethics, and Design
-
Lawrence Erlbaum Associates, Mahwah, NJ. pp
-
Friedman, B., and Kahn, P.H. Human Values, Ethics, and Design. The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications. Lawrence Erlbaum Associates, Mahwah, NJ. pp. 1177-1201.
-
The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications
, pp. 1177-1201
-
-
Friedman, B.1
Kahn, P.H.2
-
24
-
-
33745812088
-
Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted EMail
-
Gaw, S., Felten, E. W., Fernandez-Kelly, P. Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted EMail. Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), 2006.
-
(2006)
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI)
-
-
Gaw, S.1
Felten, E.W.2
Fernandez-Kelly, P.3
-
26
-
-
70450264162
-
-
IBM: http://www.iss.net/products/Proventia-Management-SiteProtector/ product-main-page.html
-
-
-
-
28
-
-
33745116854
-
Access Control Model for Groupware Applications
-
Huddersfield University, UK. August
-
Kanawati, R., and Riveill, M. "Access Control Model for Groupware Applications." In Proceedings of Human-Computer Interaction. Huddersfield University, UK. August, 1995. pp. 66-71.
-
(1995)
Proceedings of Human-Computer Interaction
, pp. 66-71
-
-
Kanawati, R.1
Riveill, M.2
-
29
-
-
70450252845
-
-
Marimba: www.bmc.com/products/attachments/ MarimbaClientManagementSecurity.pdf
-
Marimba
-
-
-
31
-
-
85029740685
-
Issues in the desigin of computer support for co-authoring and commenting
-
CA, pp
-
Neuwirth, C., Kaufer, D.S., Chandhok, R., and Morris, J. 1990. "Issues in the desigin of computer support for co-authoring and commenting," in Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW). CA, pp. 183-195
-
(1990)
Proceedings of the ACM Conference on Computer Supported Cooperative Work (CSCW)
, pp. 183-195
-
-
Neuwirth, C.1
Kaufer, D.S.2
Chandhok, R.3
Morris, J.4
-
32
-
-
70450247803
-
-
is not the Answer to Security Problems, 2004
-
Nielsen, Jakob. User Education is not the Answer to Security Problems. http://www.useit.com/alertbox/20041025.html (2004).
-
User Education
-
-
Nielsen, J.1
-
34
-
-
0025705911
-
The "problem" of automation: Inappropriate feedback and interaction, not "over-automation
-
D. E. Broadbent, A. Baddeley & J. T. Reason Eds, Oxford: Oxford University Press
-
Norman, D. A. (1990). The "problem" of automation: Inappropriate feedback and interaction, not "over-automation". In D. E. Broadbent, A. Baddeley & J. T. Reason (Eds.), Human factors in hazardous situations (pp. 585-593). Oxford: Oxford University Press.
-
(1990)
Human factors in hazardous situations
, pp. 585-593
-
-
Norman, D.A.1
-
35
-
-
0038037379
-
-
Palen and Dourish Unpacking Privacy for a Networked World, Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Ft. Lauderdale, FL, 2003.
-
Palen and Dourish "Unpacking Privacy for a Networked World", Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Ft. Lauderdale, FL, 2003.
-
-
-
-
36
-
-
36549056853
-
Designing systems that people will trust
-
L. Cranor & S. Garfinkel Eds, O'Reilly & Associates
-
Patrick, A.S., Briggs, P. & Marsh, S. Designing systems that people will trust. In L. Cranor & S. Garfinkel (Eds.), Security and Usability: Designing Secure Systems That People Can Use, O'Reilly & Associates, 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
-
-
Patrick, A.S.1
Briggs, P.2
Marsh, S.3
-
38
-
-
70450235930
-
-
Sasse, M. A., Has Johnny Learnt to Encrypt by Now? Examining the Troubled Relationship Between a Security Solution and Its Users. 5th Annual PKI R&D Workshop (2006). middleware. Internet2.edu/pki06/proceedings/ sassejohnny-usability.ppt
-
Sasse, M. A., Has Johnny Learnt to Encrypt by Now? Examining the Troubled Relationship Between a Security Solution and Its Users. 5th Annual PKI R&D Workshop (2006). middleware. Internet2.edu/pki06/proceedings/ sassejohnny-usability.ppt
-
-
-
-
39
-
-
0035387175
-
Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
-
July
-
Sasse, M. A., Brostoff, S., Weirich, D. Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security. BT Technol J Vol. 19 No. 3, July 2001.
-
(2001)
BT Technol J
, vol.19
, Issue.3
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
42
-
-
0003803719
-
-
Lawrence Erlbaum Associates, Inc, Mahwah, NJ
-
Schuler, D., Namioka, A., Participatory Design: Principles and Practices, Lawrence Erlbaum Associates, Inc., Mahwah, NJ, 1993
-
(1993)
Participatory Design: Principles and Practices
-
-
Schuler, D.1
Namioka, A.2
-
43
-
-
0009304541
-
A Bayesian Approach to Filtering Junk Email
-
Sehami, M., Dumais, S., Heckerman, D., Horvitz, E. "A Bayesian Approach to Filtering Junk Email." AAAI Workshop on Learning for Text Categorization, 1998.
-
(1998)
AAAI Workshop on Learning for Text Categorization
-
-
Sehami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
46
-
-
0033236359
-
The Ethnography of Infrastructure
-
Star, S.L., The Ethnography of Infrastructure. American Behavioral Scientist 43:3, pp. 377-391, 1999.
-
(1999)
American Behavioral Scientist
, vol.43
, Issue.3
, pp. 377-391
-
-
Star, S.L.1
-
49
-
-
0030708187
-
A Data Model and Semantics of Objects With Dynamic Roles
-
Birmingham, UK, April, IEEE Computer Society, pp
-
th International Conference on Data Engineering (ICDE). Birmingham, UK, April 1997. IEEE Computer Society, pp. 402-411.
-
(1997)
th International Conference on Data Engineering (ICDE)
, pp. 402-411
-
-
Wong, R.K.1
Chau, H.L.2
Lochovsky, F.H.3
-
51
-
-
40349106306
-
A Stateful Approach to Spyware Detection and Removal
-
December 18-20, PRDC. IEEE Computer Society, Washington, DC
-
Wu, M., Huang, Y., Wang, Y., and Kuo, S. 2006. A Stateful Approach to Spyware Detection and Removal. In Proceedings of the 12th Pacific Rim international Symposium on Dependable Computing (December 18-20, 2006). PRDC. IEEE Computer Society, Washington, DC, 173-182.
-
(2006)
Proceedings of the 12th Pacific Rim international Symposium on Dependable Computing
, pp. 173-182
-
-
Wu, M.1
Huang, Y.2
Wang, Y.3
Kuo, S.4
-
52
-
-
34547355863
-
Guidelines and Strategies for Secure Interaction Design
-
L. Cranor & S. Garfinkel Eds, O'Reilly & Associates
-
Yee, K. Guidelines and Strategies for Secure Interaction Design. In L. Cranor & S. Garfinkel (Eds.), Security and Usability: Designing Secure Systems That People Can Use, O'Reilly & Associates, 2005.
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
-
-
Yee, K.1
|