-
1
-
-
84995590301
-
What Can Behavioural Economics Teach Us about Privacy?
-
Acquisti A., Vimercati S.C., Gritzalis S., Lambrinoudakis C. (eds) Auerbach Publications (Taylor and Francis Group), 2007
-
Acquisti, A. and Grossklags J. 2007. What Can Behavioural Economics Teach Us About Privacy?. In Acquisti A., Vimercati S.C., Gritzalis S., Lambrinoudakis C. (eds), Digital Privacy: Theory, Technologies and Practices, Auerbach Publications (Taylor and Francis Group), 363-377, 2007.
-
(2007)
Digital Privacy: Theory, Technologies and Practices
, pp. 363-377
-
-
Acquisti, A.1
Grossklags, J.2
-
3
-
-
4544246990
-
Applying Attention Investment to End-User Programming
-
HCC. IEEE Computer Society, Washington, DC
-
Blackwell, A. and Burnett, M. 2002. Applying Attention Investment to End-User Programming. In Proceedings of the IEEE 2002 Symposia on Human Centric Computing Languages and Environments (Hcc'02) (September 03 - 06, 2002). HCC. IEEE Computer Society, Washington, DC, 28.
-
(2002)
Proceedings of the IEEE 2002 Symposia on Human Centric Computing Languages and Environments (Hcc'02) (September 03 - 06, 2002)
, pp. 28
-
-
Blackwell, A.1
Burnett, M.2
-
4
-
-
77950882247
-
The abstract is 'an enemy': Alternative perspectives to computational thinking
-
Blackwell, A.F., Church, L. and Green, T.R.G. 2008. The abstract is 'an enemy': Alternative perspectives to computational thinking. In Proceedings PPIG'08, 20th annual workshop of the Psychology of Programming Interest Group, 34-43.
-
(2008)
Proceedings PPIG'08, 20th Annual Workshop of the Psychology of Programming Interest Group
, pp. 34-43
-
-
Blackwell, A.F.1
Church, L.2
Green, T.R.G.3
-
6
-
-
77950884937
-
Refactored Cognitive Dimensions and Secure Development
-
Presented at Available at
-
Church, L. 2006. Refactored Cognitive Dimensions and Secure Development. Presented at WIP-PPIG'06. Work in Progress Psychology of Programming Interest Group. Available at: http://www.lukechurch.net/Professional/Publications/PPIG- 2006-01-RCDsAndSD-Paper.pdf
-
(2006)
WIP-PPIG'06. Work in Progress Psychology of Programming Interest Group
-
-
Church, L.1
-
7
-
-
77950915220
-
Tradeoffs in Future Proofing Notations
-
Presented at Available at
-
Church, L. 2007. Tradeoffs in Future Proofing Notations. Presented at WIP-PPIG'07. Work in Progress Psychology of Programming Interest Group. Available at: http://www.lukechurch.net/Professional/Publications/PPIG-2007-01- TradeoffsinFutureProofingNotations-Paper.pdf
-
(2007)
WIP-PPIG'07. Work in Progress Psychology of Programming Interest Group
-
-
Church, L.1
-
8
-
-
77952404110
-
End User Security: The democratisation of security usability
-
Presented at the Draft available at
-
Church, L. 2008. End User Security: The democratisation of security usability. Presented at the first international workshop on Security and Human Behavior, SHB'08. Draft available at: http://www.lukechurch.net/Professional/ Publications/SHB-2008.pdf
-
(2008)
First International Workshop on Security and Human Behavior, SHB'08
-
-
Church, L.1
-
10
-
-
20444474164
-
Meta-design: A manifesto for end-user development
-
(Sep. 2004), DOI= http://doi.acm.org/10.1145/1015864.1015884
-
Fischer, G., Giaccardi, E., Ye, Y., Sutcliffe, A. G., and Mehandjiev, N. 2004. Meta-design: a manifesto for end-user development. Commun. ACM 47, 9 (Sep. 2004), 33-37. DOI= http://doi.acm.org/10.1145/1015864.1015884
-
(2004)
Commun. ACM
, vol.47
, Issue.9
, pp. 33-37
-
-
Fischer, G.1
Giaccardi, E.2
Ye, Y.3
Sutcliffe, A.G.4
Mehandjiev, N.5
-
12
-
-
0022038089
-
Designing for usability: Key principles and what designers think
-
(Mar. 1985), DOI= http://doi.acm.org/10.1145/3166.3170
-
Gould, J. D. and Lewis, C. 1985. Designing for usability: key principles and what designers think. Commun. ACM 28, 3 (Mar. 1985), 300-311. DOI= http://doi.acm.org/10.1145/3166.3170
-
(1985)
Commun. ACM
, vol.28
, Issue.3
, pp. 300-311
-
-
Gould, J.D.1
Lewis, C.2
-
14
-
-
0030167097
-
Usability analysis of visual programming environments: A "cognitive dimensions" framework
-
Green, T.R.G and Petre, M. 1996. Usability analysis of visual programming environments: a "cognitive dimensions" framework. Journal of Visual Languages and Computing, 7:131-174.
-
(1996)
Journal of Visual Languages and Computing
, vol.7
, pp. 131-174
-
-
Green, T.R.G.1
Petre, M.2
-
18
-
-
57349156958
-
Debugging reinvented: Asking and answering why and why not questions about program behavior
-
(Leipzig, Germany, May 10 - 18, 2008). ICSE '08. ACM, New York, NY, DOI= http://doi.acm.org/10.1145/1368088.1368130
-
Ko, A. J. and Myers, B. A. 2008. Debugging reinvented: asking and answering why and why not questions about program behavior. In Proceedings of the 30th international Conference on Software Engineering (Leipzig, Germany, May 10 - 18, 2008). ICSE '08. ACM, New York, NY, 301-310. DOI= http://doi.acm.org/ 10.1145/1368088.1368130
-
(2008)
Proceedings of the 30th International Conference on Software Engineering
, pp. 301-310
-
-
Ko, A.J.1
Myers, B.A.2
-
19
-
-
77950882493
-
-
in press Accepted for publication in ACM Computing Surveys
-
Ko, A. J. Abraham, R. Beckwith, L. Blackwell, A. Burnett, M, Erwig, M. Lawrence, J. Lieberman, H. Myers, B. Beth Rosson, M. Rothermel, G. Scaffidi, C. Shaw, M. and Wiedenbeck S. (in press). The State of the Art in End-User Software Engineering. Accepted for publication in ACM Computing Surveys.
-
The State of the Art in End-User Software Engineering
-
-
Ko, A.J.1
Abraham, R.2
Beckwith, L.3
Blackwell, A.4
Burnett, M.5
Erwig, M.6
Lawrence, J.7
Lieberman, H.8
Myers, B.9
Rosson, B.10
Rothermel, M.11
Scaffidi, G.12
Shaw M, C.13
Wiedenbeck, S.14
-
22
-
-
0012868125
-
-
1st. John Wiley & Sons, Inc
-
Preece, J., Rogers, Y., and Sharp, H. 2002 Interaction Design. 1st. John Wiley & Sons, Inc.
-
(2002)
Interaction Design
-
-
Preece, J.1
Rogers, Y.2
Sharp, H.3
-
25
-
-
0002658307
-
Direct manipulation: A step beyond programming languages
-
R. M. Baecker, Ed. Morgan Kaufmann Publishers, San Francisco, CA
-
Shneiderman, B. 1987. Direct manipulation: A step beyond programming languages. In Human-Computer interaction: A Multidisciplinary Approach, R. M. Baecker, Ed. Morgan Kaufmann Publishers, San Francisco, CA, 461-467.
-
(1987)
Human-Computer Interaction: A Multidisciplinary Approach
, pp. 461-467
-
-
Shneiderman, B.1
-
26
-
-
57649221703
-
Testing vs. code inspection vs. what else?: Male and female end users' debugging strategies
-
(Florence, Italy, April 05 - 10, 2008). CHI '08. ACM, New York, NY, DOI= http://doi.acm.org/10.1145/1357054.1357153
-
Subrahmaniyan, N., Beckwith, L., Grigoreanu, V., Burnett, M., Wiedenbeck, S., Narayanan, V., Bucht, K., Drummond, R., and Fern, X. 2008. Testing vs. code inspection vs. what else?: male and female end users' debugging strategies. In Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems (Florence, Italy, April 05 - 10, 2008). CHI '08. ACM, New York, NY, 617-626. DOI= http://doi.acm.org/10.1145/1357054.1357153
-
(2008)
Proceeding of the Twenty-Sixth Annual SIGCHI Conference on Human Factors in Computing Systems
, pp. 617-626
-
-
Subrahmaniyan, N.1
Beckwith, L.2
Grigoreanu, V.3
Burnett, M.4
Wiedenbeck, S.5
Narayanan, V.6
Bucht, K.7
Drummond, R.8
Fern, X.9
-
27
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
(Washington, D.C., August 23 - 26, 1999). USENIX Security Symposium. USENIX Association, Berkeley, CA
-
Whitten, A. and Tygar, J. D. 1999. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In Proceedings of the 8th Conference on USENIX Security Symposium - Volume8 (Washington, D.C., August 23 - 26, 1999). USENIX Security Symposium. USENIX Association, Berkeley, CA, 14-14
-
(1999)
Proceedings of the 8th Conference on USENIX Security Symposium
, vol.8
, pp. 14-14
-
-
Whitten, A.1
Tygar, J.D.2
|