Evolving the Ecosystem of Personal Behavioral Data
暂无分享,去创建一个
John Zimmerman | Jason I. Hong | Jason Wiese | Sauvik Das | Jason I. Hong | J. Zimmerman | Sauvik Das | Jason Wiese
[1] Denzil Ferreira,et al. AWARE: Mobile Context Instrumentation Framework , 2015, Front. ICT.
[2] Anind K. Dey,et al. Parent-driven use of wearable cameras for autism support: a field study with families , 2012, UbiComp.
[3] John Zimmerman,et al. Challenges and opportunities in data mining contact lists for inferring relationships , 2014, UbiComp.
[4] David A. Ellis,et al. Beyond Self-Report: Tools to Compare Estimated and Real-World Smartphone Use , 2015, PloS one.
[5] Tsvi Kuflik,et al. When user modeling intersects software engineering: the info-bead user modeling approach , 2015, User Modeling and User-Adapted Interaction.
[6] Konrad Paul Kording,et al. Mobile Phone Sensor Correlates of Depressive Symptom Severity in Daily-Life Behavior: An Exploratory Study , 2015, Journal of medical Internet research.
[7] Suman Nath,et al. My OS Ought to Know Me Better: In-app Behavioural Analytics as an OS Service , 2015, HotOS.
[8] John Zimmerman,et al. Fragmentation and transition: understanding perceptions of virtual possessions among young adults in Spain, South Korea and the United States , 2013, CHI.
[9] John Zimmerman,et al. Placelessness, spacelessness, and formlessness: experiential qualities of virtual possessions , 2014, Conference on Designing Interactive Systems.
[10] Andy Hopper,et al. The active badge location system , 1992, TOIS.
[11] Alexandra Marin,et al. Simplifying the Personal Network Name Generator , 2007 .
[12] A. J. Bernheim Brush,et al. Phoneprioception: enabling mobile phones to infer where they are kept , 2013, CHI.
[13] John T. Stasko,et al. Casual Information Visualization: Depictions of Data in Everyday Life , 2007, IEEE Transactions on Visualization and Computer Graphics.
[14] Judy Kay,et al. PortMe: Personal Lifelong User Modelling Portal , 2010 .
[15] J. Gliem,et al. Calculating, Interpreting, And Reporting Cronbach’s Alpha Reliability Coefficient For Likert-Type Scales , 2003 .
[16] John Riedl,et al. Recommender systems: from algorithms to user experience , 2012, User Modeling and User-Adapted Interaction.
[17] Blase Ur,et al. Tag, you can see it!: using tags for access control in photo sharing , 2012, CHI.
[18] Fanglin Chen,et al. StudentLife: assessing mental health, academic performance and behavioral trends of college students using smartphones , 2014, UbiComp.
[19] M. Peitz,et al. The Oxford Handbook of the Digital Economy , 2012 .
[20] Victoria Bellotti,et al. E-mail as habitat: an exploration of embedded personal information management , 2001, INTR.
[21] Hamed Haddadi,et al. Personal Data: Thinking Inside the Box , 2015, Aarhus Conference on Critical Alternatives.
[22] R. Pahl,et al. Rethinking Friendship: Hidden Solidarities Today , 2006 .
[23] Richard P. Schuler,et al. TellUsWho: Guided Social Network Data Collection , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[24] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[25] David M. Pennock,et al. Categories and Subject Descriptors , 2001 .
[26] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[27] Krishna P. Gummadi,et al. Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.
[28] H. Rittel,et al. Dilemmas in a general theory of planning , 1973 .
[29] Jason I. Hong,et al. End-User Privacy in Human-Computer Interaction , 2007, Found. Trends Hum. Comput. Interact..
[30] Kôiti Hasida,et al. Inferring Long-term User Properties Based on Users' Location History , 2007, IJCAI.
[31] Deborah Estrin,et al. Personal data vaults: a locus of control for personal data streams , 2010, CoNEXT.
[32] Mor Naaman,et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.
[33] Shamsi T. Iqbal,et al. The Known Stranger: Supporting Conversations between Strangers with Personalized Topic Suggestions , 2015, CHI.
[34] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[35] Norman M. Sadeh,et al. Rethinking location sharing: exploring the implications of social-driven vs. purpose-driven location sharing , 2010, UbiComp.
[36] D. Gática-Pérez,et al. Towards rich mobile phone datasets: Lausanne data collection campaign , 2010 .
[37] Christoph Schlieder,et al. A Spatial User Similarity Measure for Geographic Recommender Systems , 2009, GeoS.
[38] J. Bobadilla,et al. Recommender systems survey , 2013, Knowl. Based Syst..
[39] Saul Greenberg,et al. Supporting social worlds with the community bar , 2005, GROUP.
[40] Elaine Rich,et al. Building and Exploiting User Models , 1979, IJCAI.
[41] Eamonn O'Neill,et al. Feasibility of structural network clustering for group-based privacy control in social networks , 2010, SOUPS.
[42] Gordon Bell,et al. MyLifeBits: fulfilling the Memex vision , 2002, MULTIMEDIA '02.
[43] Mark S. Ackerman,et al. Privacy in e-commerce: examining user scenarios and privacy preferences , 1999, EC '99.
[44] M. Lamming,et al. The Design of a Human Memory Prosthesis , 1994 .
[45] A-L Barabási,et al. Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.
[46] Jonathan Grudin,et al. A study of preferences for sharing and privacy , 2005, CHI Extended Abstracts.
[47] Mika Raento,et al. ContextContacts: re-designing SmartPhone's contact book to support mobile awareness and collaboration , 2005, Mobile HCI.
[48] Hamed Haddadi,et al. Enabling the new economic actor: data protection, the digital economy, and the Databox , 2016, Personal and Ubiquitous Computing.
[49] Alex Pentland,et al. Social fMRI: Investigating and shaping social mechanisms in the real world , 2011, Pervasive Mob. Comput..
[50] Jie Liu,et al. Mobile Apps: It's Time to Move Up to CondOS , 2011, HotOS.
[51] Susan T. Dumais,et al. Stuff I've Seen: A System for Personal Information Retrieval and Re-Use , 2003, SIGF.
[52] I HongJason,et al. Evolving the Ecosystem of Personal Behavioral Data , 2017 .
[53] Noah E. Friedkin,et al. A test of structural features of granovetter's strength of weak ties theory , 1980 .
[54] Andreas Girgensohn,et al. Beyond 'yesterday's tomorrow': towards the design of awareness technologies for the contemporary worker , 2011, Mobile HCI.
[55] Kenta Oku,et al. Geographical recommender system based on interaction between map operation and category selection , 2010, HetRec '10.
[56] Lorrie Faith Cranor,et al. The post that wasn't: exploring self-censorship on facebook , 2013, CSCW.
[57] John Zimmerman,et al. "You Never Call, You Never Write": Call and SMS Logs Do Not Always Indicate Tie Strength , 2015, CSCW.
[58] John Zimmerman,et al. Are you close with me? are you nearby?: investigating social groups, closeness, and willingness to share , 2011, UbiComp '11.
[59] Robin I. M. Dunbar,et al. Social network size in humans , 2003, Human nature.
[60] Jason I. Hong,et al. Exploring capturable everyday memory for autobiographical authentication , 2013, UbiComp.
[61] John Zimmerman,et al. Mailing Archived Emails as Postcards: Probing the Value of Virtual Collections , 2016, CHI.
[62] John Zimmerman,et al. Toss 'n' turn: smartphone as sleep and sleep quality detector , 2014, CHI.
[63] Anind K. Dey,et al. Designing mediation for context-aware applications , 2005, TCHI.
[64] Roy Want,et al. The Personal Server: Changing the Way We Think about Ubiquitous Computing , 2002, UbiComp.
[65] Loren G. Terveen,et al. Contact management: identifying contacts to support long-term communication , 2002, CSCW '02.
[66] John Zimmerman,et al. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.
[67] Donald A. Sch. The reflective practitioner: how professionals think in action , 1983 .
[68] Ramón Cáceres,et al. Virtual individual servers as privacy-preserving proxies for mobile devices , 2009, MobiHeld '09.
[69] Alex Pentl,et al. Reality Mining of Mobile Communications: Toward A New Deal On Data , 2009 .
[70] Erez Shmueli,et al. openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.
[71] Lada A. Adamic,et al. Computational Social Science , 2009, Science.
[72] James A. Landay,et al. An architecture for privacy-sensitive ubiquitous computing , 2004, MobiSys '04.
[73] John Zimmerman,et al. Virtual possessions , 2010, Conference on Designing Interactive Systems.
[74] Guy Shani,et al. Anytime Algorithms for Recommendation Service Providers , 2016, ACM Trans. Intell. Syst. Technol..
[75] John Zimmerman,et al. Mining smartphone data to classify life-facets of social relationships , 2013, CSCW.
[76] Abigail Sellen,et al. Beyond total capture , 2010, Commun. ACM.
[77] John C. Tang,et al. ConNexus to awarenex: extending awareness to mobile users , 2001, CHI.
[78] Didier Sornette,et al. Discrete hierarchical organization of social group sizes , 2004, Proceedings of the Royal Society B: Biological Sciences.
[79] James A. Landay,et al. Gestalt: integrated support for implementation and analysis in machine learning , 2010, UIST.
[80] John Zimmerman,et al. Learning patterns of pick-ups and drop-offs to support busy family coordination , 2011, CHI.
[81] Deborah Estrin,et al. ohmage: An open mobile system for activity and experience sampling , 2012, 2012 6th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.
[82] Gordon Bell,et al. A personal digital store , 2001, CACM.
[83] Ninghui Li,et al. End-User Privacy in Human–Computer Interaction , 2009 .
[84] David R. Karger,et al. Haystack: per-user information environments , 1999, CIKM '99.
[85] Deborah Estrin,et al. Small data, where n = me , 2014, Commun. ACM.
[86] Paul Dourish,et al. Seeking a Foundation for Context-Aware Computing , 2001, Hum. Comput. Interact..
[87] Tessa A. Lau. Rethinking the systems review process , 2010, Commun. ACM.
[88] Lorrie Faith Cranor,et al. A "nutrition label" for privacy , 2009, SOUPS.
[89] Shahram Izadi,et al. SenseCam: A Retrospective Memory Aid , 2006, UbiComp.
[90] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.
[91] Elaine Rich,et al. User Modeling via Stereotypes , 1998, Cogn. Sci..
[92] Lorrie Faith Cranor,et al. Why People Are (Un)willing to Share Information with Online Advertisers , 2014 .
[93] David W. McDonald,et al. Activity sensing in the wild: a field trial of ubifit garden , 2008, CHI.
[94] Elizabeth F. Churchill,et al. Faceted identity, faceted lives: social and technical issues with being yourself online , 2011, CSCW.
[95] Robin I. M. Dunbar,et al. Communication in social networks: Effects of kinship, network size, and emotional closeness , 2011 .
[96] Yuri Gurevich,et al. Biggish: A Solution For The Inverse Privacy Problem , 2017 .
[97] Alfred Kobsa,et al. Generic User Modeling Systems , 2001, User Modeling and User-Adapted Interaction.
[98] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[99] James Fogarty,et al. Toolkit support for developing and deploying sensor-based statistical models of human situations , 2007, CHI.
[100] Yuri Gurevich,et al. Inverse privacy , 2016, Commun. ACM.
[101] Miguel A. Labrador,et al. A Survey on Human Activity Recognition using Wearable Sensors , 2013, IEEE Communications Surveys & Tutorials.
[102] Dino Pedreschi,et al. Human mobility, social ties, and link prediction , 2011, KDD.
[103] Gregory D. Abowd,et al. A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications , 2001, Hum. Comput. Interact..
[104] David R. Karger,et al. Data unification in personal information management , 2006, CACM.
[105] Christopher McCarty,et al. Structure in Personal Networks , 2002, J. Soc. Struct..
[106] Mary Czerwinski,et al. Interactions with big data analytics , 2012, INTR.
[107] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[108] T. Graepel,et al. Private traits and attributes are predictable from digital records of human behavior , 2013, Proceedings of the National Academy of Sciences.
[109] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.
[110] Thad Starner,et al. Use of mobile appointment scheduling devices , 2004, CHI EA '04.
[111] William Jones. Personal Information Management , 2007, Annu. Rev. Inf. Sci. Technol..
[112] Armando Solar-Lezama,et al. A language for automatically enforcing privacy policies , 2012, POPL '12.
[113] C. Raymond Perrault,et al. Speech Acts as a Basis for Understanding Dialogue Coherence , 1978, TINLAP.
[114] David Gelernter,et al. Lifestreams: a storage model for personal data , 1996, SGMD.
[115] Lorrie Faith Cranor,et al. An Investigation into Facebook Friend Grouping , 2011, INTERACT.
[116] Norman M. Sadeh,et al. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings , 2014, SOUPS.
[117] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[118] Jason Hong,et al. Privacy patterns for online interactions , 2006, PLoP '06.
[119] Anind K. Dey,et al. Lifelogging memory appliance for people with episodic memory impairment , 2008, UbiComp.
[120] Eric Freeman,et al. Lifestreams: Organizing your Electronic Life* , 1995 .
[121] Jason I. Hong,et al. Epistenet: facilitating programmatic access & processing of semantically related mobile personal data , 2016, MobileHCI.
[122] James Fogarty,et al. Presence versus availability: the design and evaluation of a context-aware communication client , 2004, Int. J. Hum. Comput. Stud..
[123] Gustavo S. Mesch. Social context and communication channels choice among adolescents , 2009, Comput. Hum. Behav..
[124] Michael Friedmann,et al. Deploying recommender system for the masses , 2014, IUI Companion '14.
[125] Marc Langheinrich,et al. Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.
[126] Janet Vertesi,et al. To have and to hold: exploring the personal archive , 2006, CHI.
[127] John Zimmerman,et al. Detection of Behavior Change in People with Depression , 2014, AAAI Workshop: Modern Artificial Intelligence for Health Analytics.
[128] Kiyoharu Aizawa,et al. Context-based video retrieval system for the life-log applications , 2003, MIR '03.
[129] Nan Lin,et al. Social support and depression , 1984, Social psychiatry.
[130] Douglas B. Terry,et al. Using collaborative filtering to weave an information tapestry , 1992, CACM.
[131] Esteban Moro Egido,et al. Time as a limited resource: Communication Strategy in Mobile Phone Networks , 2013, Soc. Networks.
[132] John Zimmerman,et al. Teenagers and their virtual possessions: design opportunities and issues , 2011, CHI.
[133] Jodi Forlizzi,et al. A stage-based model of personal informatics systems , 2010, CHI.