interactions
Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Five Reasons for Scenario-Based Design
HICSS '99 Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences-Volume 3 - Volume 3
Value scenarios: a technique for envisioning systemic effects of new technologies
CHI '07 Extended Abstracts on Human Factors in Computing Systems
Proceedings of the 2007 international ACM conference on Supporting group work
dg.o '08 Proceedings of the 2008 international conference on Digital government research
Proceedings of the 5th Nordic conference on Human-computer interaction: building bridges
The watcher and the watched: social judgments about privacy in a public place
Human-Computer Interaction
Stabilizing homeless young people with information and place
Journal of the American Society for Information Science and Technology
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the Sixth Symposium on Usable Privacy and Security
A tale of two publics: democratizing design at the margins
Proceedings of the 8th ACM Conference on Designing Interactive Systems
Homeless young people and living with personal digital artifacts
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Personal and Ubiquitous Computing
Proceedings of the 2012 iConference
Next steps for value sensitive design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Participation and publics: supporting community engagement
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Examining technology that supports community policing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The role of music in the lives of homeless young people in Seattle WA and Vancouver BC
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 6th International Conference on Communities and Technologies
Civic action brokering platforms: facilitating local engagement with ACTion Alexandria
Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing
Hi-index | 0.01 |
By their pervasiveness and by being worn on our bodies, mobile phones seem to have become intrinsic to safety. To examine this proposition, 43 participants, from four stakeholder groups (homeless young people, service providers, police officers, and community members), were asked to consider how homeless young people could use mobile phones to keep safe. Participants were asked to express their knowledge for place-based safety and to envision how mobile phones might be used to improve safety. Detailed analysis of the resulting data, which included value sketches, written value scenarios, and semi-structured discussion, led to specific design opportunities, related to values (e.g., supporting trust and desire to help others), function (e.g., documenting harms for future purposes), and form (e.g., leveraging social expectations for how mobile phones can be used to influence behavior). Together, these findings bound a design space for how mobile phones can be used to manage unsafe situations.