Anchored conversations: chatting in the context of a document
Proceedings of the SIGCHI conference on Human Factors in Computing Systems
In the Beginning...Was the Command Line
In the Beginning...Was the Command Line
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
User experiences with sharing and access control
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Is usable security an oxymoron?
interactions - A contradiction in terms?
Making mashups with marmite: towards end-user programming for the web
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
E-mail research: targeting the enterprise
Human-Computer Interaction
Towards efficient document content sharing in social networks
Proceedings of the 2nd international workshop on Social software engineering and applications
Hi-index | 0.00 |
Documents are changing, becoming more malleable. Content operations progress, from command lines to annotation and tagging. Our studies reveal that people in practice share entire documents when portions would suffice. Readers hunt for relevant information. Authors describe laborious processes of selective sharing and redaction. Overload and loss of focus arises. We describe Keyholes, content annotations where authors or readers enter meta-data within a document to indicate what gets shared, with whom, and why. We argue that leveraging established practices (tags, social annotation, and command-line automation) clashes with CHI notions of technical contribution, but creates new social dynamism within document texts.