The design and long-term use of a personal electronic notebook: a reflective analysis
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Essential PHP Security
Crowdsourcing user studies with Mechanical Turk
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Designing games with a purpose
Communications of the ACM - Designing games with a purpose
Zync: the design of synchronized video sharing
Proceedings of the 2007 conference on Designing for User eXperiences
Why We Buy: The Science of Shopping--Updated and Revised for the Internet, the Global Consumer, and Beyond
A novel way to conduct human studies and do some good
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Hi-index | 0.00 |
The rebirth of mobile application stores has energized the markets of mobile ecology in both commercial and research communities alike. However, the effort involved in public application deployment via a commercial store is a trade-off of design, features, and functionality; free applications are no exception. This article discusses some features, design considerations, and strategies to lessen the associated trade-off in the commercial deployment of mobile research prototypes. In particular, the security principle of Defense in Depth can be applied to mobile research to ensure the integrity and validity of collected real-world data.