Technological frames: making sense of information technology in organizations
ACM Transactions on Information Systems (TOIS) - Special issue on social science perspectives on IS
interactions
Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Designing for Ubiquity: The Perception of Privacy
IEEE Pervasive Computing
Empirical research in on-line trust: a review and critical assessment
International Journal of Human-Computer Studies - Special issue: Trust and technology
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Listening in: practices surrounding iTunes music sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
RFID and the perception of control: the consumer's view
Communications of the ACM - Special issue: RFID
Secrecy, flagging, and paranoia: adoption criteria in encrypted email
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Sketching with Conceptual Metaphors to Explain Computational Processes
VLHCC '06 Proceedings of the Visual Languages and Human-Centric Computing
Mobile interaction with visual and RFID tags: a field study on user perceptions
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Between Extreme Rejection and Cautious Acceptance
Social Science Computer Review
Envisioning systemic effects on persons and society throughout interactive system design
Proceedings of the 7th ACM conference on Designing interactive systems
More than meets the eye: transforming the user experience of home network management
Proceedings of the 7th ACM conference on Designing interactive systems
On "Technomethodologyn";: foundational relationships between ethnomethodology and system design
Human-Computer Interaction
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Values as lived experience: evolving value sensitive design in support of value discovery
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Ubiquitous systems and the family: thoughts about the networked home
Proceedings of the 5th Symposium on Usable Privacy and Security
Pervasive healthcare: the elderly perspective
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Proceedings of the 11th international conference on Ubiquitous computing
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Visible and controllable RFID tags
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
GridOrbit: an infrastructure awareness system for increasing contribution in volunteer computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Empowerment through seamfulness: smart phones in everyday life
Personal and Ubiquitous Computing
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
Checkpoints, hotspots and standalones: placing smart services over time and place
Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design
How to see values in social computing: methods for studying values dimensions
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Hi-index | 0.00 |
How can designers of ubiquitous computing technologies ensure that they understand the non-functional needs, values, and expectations of end-users? In this paper, we use a qualitative method from public policy to elicit reflective feedback from end-users about technologies that they may not yet have used nor fully comprehend. Our study uncovers information about end-user perceptions of RFID, including a range of "folk theories" held by the public about this technology, and their associations of it with certain social groups and values. We argue that these perceptions can limit technological adoption, and conclude with a discussion of challenges for the design and deployment of ubiquitous computing systems.