Mobile Phone Usage by Low Literate Users
暂无分享,去创建一个
[1] Anirudha N. Joshi,et al. Supporting treatment of people living with HIV / AIDS in resource limited settings with IVRs , 2014, CHI.
[2] Paul Dourish,et al. How HCI interprets the probes , 2007, CHI.
[3] Alan S. Brown,et al. Generating and remembering passwords , 2004 .
[4] Sebastian Möller,et al. On the need for different security methods on mobile phones , 2011, Mobile HCI.
[5] Randall Craig Reid,et al. Using the Parkerian Hexad to introduce security in an information literacy class , 2010, InfoSecCD.
[6] Joseph Bonneau,et al. Linguistic Properties of Multi-word Passphrases , 2012, Financial Cryptography Workshops.
[7] Antonella De Angeli,et al. Introducing ATMs in India: a contextual inquiry , 2004, Interact. Comput..
[8] Joyojeet Pal,et al. Computing security in the developing world: a case for multidisciplinary research , 2011, NSDR '11.
[9] Gabriel White. FEATUREDesigning for the last billion , 2008, INTR.
[10] Karen Renaud,et al. Predicting technology acceptance and adoption by the elderly: a qualitative study , 2008, SAICSIT '08.
[11] M. Six Silberman,et al. When the implication is not to design (technology) , 2011, CHI.
[12] Sead Muftic,et al. Mobile ATM for developing countries , 2008, MobiArch '08.
[13] Charmain Cilliers,et al. Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology , 2008 .
[14] BlomJan,et al. Contextual and cultural challenges for user mobility research , 2005 .
[15] Ming Yang,et al. Learning mobile security with android security labware , 2013, SIGCSE '13.
[16] Pascal Junod,et al. Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables , 2008, TSEC.
[17] Edward Cutrell. Technology for emerging markets at MSR india , 2011, CSCW '11.
[18] Kentaro Toyama,et al. Intermediated technology use in developing communities , 2010, CHI.
[19] R. Abraham. Mobile Phones and Economic Development: Evidence from the Fishing Industry in India , 2006 .
[20] Reuben Abraham,et al. Mobile Phones and Economic Development: Evidence from the Fishing Industry in India , 2006, 2006 International Conference on Information and Communication Technologies and Development.
[21] Kentaro Toyama. Reflections on HCI for development , 2013, INTR.
[22] Lorrie Faith Cranor,et al. Human selection of mnemonic phrase-based passwords , 2006, SOUPS '06.
[23] Jon A. Geater. Security composition in the real world: squaring the circle of mobile security with contemporary device economics , 2013, SPSM '13.
[24] Cormac Herley,et al. A large-scale study of web password habits , 2007, WWW '07.
[25] Jan Chipchase. How do you manage your contacts if you can't read or write? , 2006, INTR.
[26] Robert Schaefer,et al. The epistemology of computer security , 2009, SOEN.
[27] Melissa Densmore,et al. Real mobiles: Kenyan and Zambian smallholder farmers' current attitudes towards mobile phones , 2015, ICTD.
[28] Matthew Kam,et al. An exploratory study of unsupervised mobile learning in rural India , 2010, CHI.
[29] Soon Ae Chun,et al. Smart SecureGov: mobile government security framework , 2014, DG.O.
[30] Tapan S. Parikh,et al. Understanding and designing for intermediated information tasks in India , 2006, IEEE Pervasive Computing.
[31] Jacki O'Neill,et al. The times they are a-changin': mobile payments in india , 2011, CHI.
[32] Edward Cutrell,et al. Usably secure, low-cost authentication for mobile banking , 2010, SOUPS.
[33] Nikhil Welankar,et al. Rangoli: a visual phonebook for low-literate users , 2008, Mobile HCI.
[34] Anirudha Joshi,et al. Keylekh: a keyboard for text entry in indic scripts , 2004, CHI EA '04.
[35] Gunnar Harboe,et al. Real-World Affinity Diagramming Practices: Bridging the Paper-Digital Gap , 2015, CHI.
[36] Adrian David Cheok,et al. 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services , 2007, Lecture Notes in Computer Science.
[37] Kentaro Toyama,et al. Designing mobile interfaces for novice and low-literacy users , 2011, TCHI.
[38] Ponnurangam Kumaraguru,et al. The paper slip should be there!: perceptions of transaction receipts in branchless banking , 2013, MobileHCI '13.
[39] Kentaro Toyama,et al. Where there's a will there's a way: mobile media sharing in urban india , 2010, CHI.
[40] Karen Holtzblatt. Designing for the Mobile Device: Experiences, Challenges, and Methods , 2005 .
[41] Nithya Sambasivan,et al. Cutting Chai, Jugaad, and Here Pheri: towards UbiComp for a global community , 2011, Personal and Ubiquitous Computing.
[42] Ali Ndiwalana,et al. ICT usage and its impact on profitability of SMEs in 13 African Countries , 2006, 2006 International Conference on Information and Communication Technologies and Development.
[43] Claire Heffernan,et al. The livestock guru: The design and testing of a tool for knowledge transfer among the poor , 2007 .
[44] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[45] Jeffrey Huang,et al. Text is not the enemy: How illiterates' use their mobile phones , 2012 .
[46] Gary Marsden,et al. After access: challenges facing mobile-only internet users in the developing world , 2010, CHI.
[47] Charles Steinfield,et al. The mobile divide revisited: mobile phone use by smallholder farmers in Malawi , 2015, ICTD.
[48] Janice Redish,et al. User and task analysis for interface design , 1998 .
[49] Jan Blom,et al. Contextual and cultural challenges for user mobility research , 2005, CACM.
[50] Kentaro Toyama,et al. A comparison of mobile money-transfer UIs for non-literate and semi-literate users , 2009, CHI.