Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Human values, ethics, and design
The human-computer interaction handbook
Communication functions and the adaptation of design representations in interdisciplinary teams
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Personal privacy through understanding and action: five pitfalls for designers
Personal and Ubiquitous Computing
Values at play: design tradeoffs in socially-oriented game design
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Gathering evidence: use of visual security cues in web browsers
GI '05 Proceedings of Graphics Interface 2005
Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility
A first analysis of the UsersAward programme from a value sensitive design perspective
Proceedings of the 4th decennial conference on Critical computing: between sense and sensibility
Sharing everyday places I go while preserving privacy
CHI '06 Extended Abstracts on Human Factors in Computing Systems
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
Noticing notice: a large-scale experiment on the timing of software license agreements
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Capturing, sharing, and using local place information
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
ECSCW'05 Proceedings of the ninth conference on European Conference on Computer Supported Cooperative Work
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Free software and the political philosophy of the cyborg world
ACM SIGCAS Computers and Society - Selected papers from CEPE 2007: The Seventh International Conference on Computer Ethics -- philosophical enquiry
Privacy patterns for online interactions
Proceedings of the 2006 conference on Pattern languages of programs
Under Watch and Ward at Night: Design and Evaluation of a Remote Monitoring System for Dementia Care
USAB '08 Proceedings of the 4th Symposium of the Workgroup Human-Computer Interaction and Usability Engineering of the Austrian Computer Society on HCI and Usability for Education and Work
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Design methods for ethical persuasive computing
Proceedings of the 4th International Conference on Persuasive Technology
Challenges in supporting end-user privacy and security management with social navigation
Proceedings of the 5th Symposium on Usable Privacy and Security
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi
Proceedings of the 12th ACM international conference on Ubiquitous computing
The security cost of cheap user interaction
Proceedings of the 2011 workshop on New security paradigms workshop
The ethical (re)design of the Google Books project
Proceedings of the 2012 iConference
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Development of a privacy addendum for open source licenses: value sensitive design in industry
UbiComp'06 Proceedings of the 8th international conference on Ubiquitous Computing
My profile is my password, verify me!: the privacy/convenience tradeoff of facebook connect
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Examining interdisciplinary prototyping in the context of cultural communication
DUXU'13 Proceedings of the Second international conference on Design, User Experience, and Usability: health, learning, playing, cultural, and cross-cultural user experience - Volume Part II
Hi-index | 0.00 |