Persuasive Technology and Digital Design for Behaviour Change
暂无分享,去创建一个
[1] Sharon Poggenpohl,et al. The Laws of Simplicity: Design, Technology, Business, Life , 2007 .
[2] Gary Wolf. The Curse of Xanadu , 2009 .
[3] Dan Lockton,et al. Affordances, Constraints and Information Flows as 'Leverage Points' in Design for Sustainable Behaviour , 2012 .
[4] Daniel Freeman,et al. Paranoia: The 21st Century Fear , 2008 .
[5] Dan Lockton,et al. POSIWID and Determinism in Design for Behaviour Change , 2012 .
[6] B. J. Fogg. The Behavior Grid: 35 ways behavior can change , 2009, Persuasive '09.
[7] Eli Pariser,et al. The Filter Bubble: What the Internet Is Hiding from You , 2011 .
[8] Bruce Schneier,et al. Beyond fear - thinking sensibly about security in an uncertain world , 2003 .
[9] Richard C. Leone,et al. The Control Revolution , 1999 .
[10] Neal Kumar Katyal,et al. Digital Architecture as Crime Control , 2019 .
[11] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[12] Adam Greenfield,et al. Everyware: The Dawning Age of Ubiquitous Computing , 2006 .
[13] Dan Lockton,et al. Attitudes, Meaning, Emotion and Motivation in Design for Behaviour Change , 2012 .
[14] L. Lutzenhiser. Social and Behavioral Aspects of Energy use , 1993 .
[15] B. J. Fogg,et al. Behavior Wizard: A Method for Matching Target Behaviors with Solutions , 2010, PERSUASIVE.
[16] Malcolm McCullough. Digital Ground: Architecture, Pervasive Computing, and Environmental Knowing , 2004 .
[17] Tarleton Gillespie. Wired Shut, Copyright and the Shape of Digital Culture , 2009 .
[18] Lorrie Faith Cranor,et al. Security and Usability: Designing Secure Systems that People Can Use , 2005 .
[19] Jay Forder. Permission to hyperlink , 2000 .
[20] Elizabeth Losh,et al. Virtualpolitik: An Electronic History of Government Media-Making in a Time of War, Scandal, Disaster, Miscommunication, and Mistakes , 2009 .
[21] Nicholas Negroponte,et al. Being Digital , 1995 .
[22] Luke Tredinnick,et al. Complexity theory and the web , 2009, J. Documentation.
[23] R. Preston McAfee,et al. Competitive Solutions: The Strategist's Toolkit , 2005 .
[24] Dan Lockton,et al. Cognitive Biases, Heuristics and Decision-Making in Design for Behaviour Change , 2012 .
[25] W. Seaver,et al. Decreasing fuel-oil consumption through feedback and social commendation. , 1976, Journal of applied behavior analysis.
[26] M. Harjumaa,et al. A Systematic Framework for Designing and Evaluating Persuasive Systems , 2008, PERSUASIVE.
[27] Giles Colborne,et al. Simple and Usable Web, Mobile, and Interaction Design , 2010 .
[28] Clifford Nass,et al. The media equation - how people treat computers, television, and new media like real people and places , 1996 .
[29] Andrew Odlyzko,et al. The Evolution of Price Discrimination in Transportation and its Implications for the Internet , 2004 .
[30] Ross J. Anderson. Why information security is hard - an economic perspective , 2001, Seventeenth Annual Computer Security Applications Conference.
[31] B. J. Fogg,et al. A behavior model for persuasive design , 2009, Persuasive '09.
[32] S. Hayes,et al. Reducing residential electrical energy use: payments, information, and feedback. , 1977, Journal of applied behavior analysis.
[33] Alain Forget,et al. Persuasion for Stronger Passwords: Motivation and Pilot Study , 2008, PERSUASIVE.
[34] Tom Slee. No One Makes You Shop at Wal-Mart: The Surprising Deceptions of Individual Choice , 2006 .
[35] R. Preston McAfee,et al. Pricing Damaged Goods , 2007 .
[36] B. J. Fogg,et al. Persuasive technology: using computers to change what we think and do , 2002, UBIQ.
[37] Dan Lockton,et al. Simon's Scissors and Ecological Psychology in Design for Behaviour Change , 2012 .
[38] J. McGonigal. Reality Is Broken: Why Games Make Us Better and How They Can Change the World , 2011 .
[39] L. Ross,et al. The Person and the Situation: Perspectives of Social Psychology , 1991 .
[40] Michael Zyda,et al. From visual simulation to virtual reality to games , 2005, Computer.
[41] Diomidis Spinellis,et al. The collaborative organization of knowledge , 2008, CACM.
[42] David Clark,et al. Do appliances threaten Internet innovation? , 2001, IEEE Commun. Mag..
[43] Dan Lockton,et al. Social and Interpersonal Approaches to Design for Behaviour Change , 2012 .
[44] M. Csíkszentmihályi. Flow: The Psychology of Optimal Experience , 1990 .
[45] Greg Conti. Googling Security: How Much Does Google Know About You? , 2008 .
[46] Siva Vaidhyanathan,et al. The Anarchist in the Library: How the Clash Between Freedom and Control Is Hacking the Real World and Crashing the System , 2004 .
[47] M. Bateson,et al. Cues of being watched enhance cooperation in a real-world setting , 2006, Biology Letters.
[48] Kenton O'Hara,et al. Gamification. using game-design elements in non-gaming contexts , 2011, CHI Extended Abstracts.
[49] Lawrence Lessig,et al. Code and Other Laws of Cyberspace , 1999 .