The importance of visibility for folk theories of sensor data
暂无分享,去创建一个
[1] Judith E. Sturges,et al. Comparing Telephone and Face-to-Face Qualitative Interviewing: a Research Note , 2004 .
[2] Mark Weiser,et al. The world is not a desktop , 1994, INTR.
[3] Mary Beth Rosson,et al. Use and Adoption Challenges of Wearable Activity Trackers , 2015 .
[4] Matthew Chalmers,et al. Seamful design: showing the seams in wearable computing , 2003 .
[5] Thomas R. Lindlof. Qualitative Communication Research Methods , 1994 .
[6] H. Russell Bernard,et al. Analyzing Qualitative Data: Systematic Approaches , 2009 .
[7] Willett Kempton,et al. Two Theories of Home Heat Control , 1986, Cogn. Sci..
[8] Vivian Genaro Motti,et al. Users' Privacy Concerns About Wearables - Impact of Form Factor, Sensors and Type of Data Collected , 2015, Financial Cryptography Workshops.
[9] Paul Dourish,et al. The value of data: considering the context of production in data economies , 2011, CSCW.
[10] Sebastian Günther. Folk Models of Home Computer Security , 2012 .
[11] S. Gosling,et al. Should we trust web-based studies? A comparative analysis of six preconceptions about internet questionnaires. , 2004, The American psychologist.
[12] L. Jean Camp,et al. Mental Models of Security Risks , 2007, Financial Cryptography.
[13] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[14] W. Batchelder,et al. Predicting Clustering From Semantic Structure , 1993 .
[15] Sean A. Munson,et al. Exploring the design space of glanceable feedback for physical activity trackers , 2016, UbiComp.
[16] A. Kimball Romney,et al. Systematic Data Collection , 1988 .
[17] Ilaria Liccardi,et al. Privacy Tipping Points in Smartphones Privacy Preferences , 2015, CHI.
[18] Philip N Johnson-Laird,et al. INAUGURAL ARTICLE by a Recently Elected Academy Member:Mental models and human reasoning , 2010 .
[19] James R. Eagan,et al. Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing , 2008, UbiComp.
[20] Mani B. Srivastava,et al. Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment , 2011, CHI.
[21] Federica Cena,et al. Personal informatics for everyday life: How users without prior self-tracking experience engage with personal data , 2016, Int. J. Hum. Comput. Stud..
[22] W. Keith Edwards,et al. More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.
[23] Rebecca Gray,et al. Understanding User Beliefs About Algorithmic Curation in the Facebook News Feed , 2015, CHI.
[24] Marsha B. Quinlan. Considerations for Collecting Freelists in the Field: Examples from Ethobotany , 2005 .
[25] Cristine H Legare,et al. Concepts and folk theories. , 2011, Annual review of anthropology.
[26] Predrag V. Klasnja,et al. Exploring Privacy Concerns about Personal Sensing , 2009, Pervasive.
[27] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[28] 可児 潤也. 「"Little Brothers Watching You:" Raising Awareness of Data Leaks on Smartphones」の報告 , 2013 .
[29] Yang Wang,et al. Folk Models of Online Behavioral Advertising , 2017, CSCW.
[30] Irina Shklovski,et al. Steps, Choices and Moral Accounting: Observations from a Step-Counting Campaign in the Workplace , 2016, CSCW.
[31] Paul P. Maglio,et al. Spatial Metaphors of Web Use , 2014, Spatial Cogn. Comput..
[32] Frank C. Keil,et al. The Feasibility of Folk Science , 2010, Cogn. Sci..
[33] Devon D. Brewer,et al. Supplementary Interviewing Techniques to Maximize Output in Free Listing Tasks , 2002 .
[34] A. Anonymous,et al. Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy , 2013, J. Priv. Confidentiality.
[35] S. Borgatti. Elicitation techniques for cultural domain analysis , 1999 .
[36] Lorrie Faith Cranor,et al. Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.
[37] Helen Nissenbaum,et al. Privacy in Context - Technology, Policy, and the Integrity of Social Life , 2009 .
[38] Tom Rodden,et al. “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems , 2016, CSCW.
[39] David W. McDonald,et al. Designing for Healthy Lifestyles: Design Considerations for Mobile Technologies to Encourage Consumer Health and Wellness , 2014, Found. Trends Hum. Comput. Interact..
[40] Karrie Karahalios,et al. First I "like" it, then I hide it: Folk Theories of Social Feeds , 2016, CHI.
[41] Richard E. Mayer,et al. Instructional Manipulation of Users' Mental Models for Electronic Calculators , 1984, Int. J. Man Mach. Stud..
[42] Panagiotis G. Ipeirotis,et al. Running Experiments on Amazon Mechanical Turk , 2010, Judgment and Decision Making.
[43] Joseph A. Maxwell,et al. Qualitative Research Design: An Interactive Approach , 1996 .
[44] Irina Shklovski,et al. Leakiness and creepiness in app space: perceptions of privacy and mobile app use , 2014, CHI.
[45] Mark W. Newman,et al. When fitness trackers don't 'fit': end-user difficulties in the assessment of personal tracking device accuracy , 2015, UbiComp.
[46] Daniel J. Solove,et al. Privacy Self-Management and the Consent Dilemma , 2012 .
[47] S. Petronio. Boundaries of Privacy: Dialectics of Disclosure , 2002 .
[48] Matthew B. Miles,et al. Qualitative Data Analysis: An Expanded Sourcebook , 1994 .
[49] Thomas A. Schwandt. Qualitative Inquiry: A Dictionary of Terms , 1997 .
[50] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[51] Laura A. Dabbish,et al. "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.
[52] Gina Novick. Is there a bias against telephone interviews in qualitative research? , 2008, Research in nursing & health.
[53] E. C. Thompson,et al. Comparative Cultural Salience: Measures Using Free-List Data , 2006 .
[54] Records, Computers and the Rights of Citizens , 1973 .
[55] Judy Kay,et al. Creating personalized systems that people can scrutinize and control: Drivers, principles and experience , 2012, TIIS.