"This will cause a lot of work.": Coping with Transferring Files and Passwords as Part of a Personal Digital Legacy
暂无分享,去创建一个
[1] Gerhard Schwabe,et al. Electronic Data Safes as an Infrastructure for Transformational Government? A Case Study , 2015, EGOV.
[2] Stacey Pitsillides. The future of looking back , 2012 .
[3] Abigail Sellen,et al. Technology heirlooms?: considerations for passing down and inheriting digital materials , 2012, CHI.
[4] D. Hildebrand. E-invoicing as the Principal Driver of Change in B2X Letter Market Definitions , 2015 .
[5] Victor Kaptelinin,et al. Making the Case for an Existential Perspective in HCI Research on Mortality and Death , 2016, CHI Extended Abstracts.
[6] Jason Hong,et al. "It’s Hidden in My Computer": Exploring Account Management Tools and Behaviors (CMU-CyLab-13-007) , 2013 .
[7] Richard Banks,et al. The Future of Looking Back (Microsoft Research) , 2011 .
[8] Joseph Kaye. Self-reported password sharing strategies , 2011, CHI.
[9] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[10] Richard Banks,et al. Matters of life and death: locating the end of life in lifespan-oriented hci research , 2011, CHI.
[11] Jed R. Brubaker,et al. Death, Memorialization, and Social Media: A Platform Perspective for Personal Archives , 2014 .
[12] Matthias Schweizer,et al. Passing and Passing on in the Digital World : Issues and Solutions for the Digital Estate , 2013 .
[13] N. Hoffart. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory , 2000 .
[14] Thomas W. Malone,et al. How do people organize their desks?: Implications for the design of office information systems , 1983, TOIS.
[15] Catherine C. Marshall,et al. Rethinking Personal Digital Archiving, Part 2: Implications for Services, Applications, and Institutions , 2008, D Lib Mag..
[16] Siân E. Lindley,et al. Things We Own Together: Sharing Possessions at Home , 2016, CHI.
[17] Sven Laumer,et al. Giving too much social support: social overload on social networking sites , 2015, Eur. J. Inf. Syst..
[18] Janet Vertesi,et al. To have and to hold: exploring the personal archive , 2006, CHI.
[19] Wendy Moncur,et al. An emergent framework for digital memorials , 2014, Conference on Designing Interactive Systems.
[20] Elisa Giaccardi,et al. Things we value , 2011, INTR.
[21] J. Hopkins,et al. Afterlife in the Cloud: Managing a Digital Estate , 2013 .
[22] Mary Beth Rosson,et al. Making Decisions About Digital Legacy with Google's Inactive Account Manager , 2015, INTERACT.
[23] S. Fredette. Breast cancer survivors: concerns and coping , 1995, Cancer nursing.
[24] Michael Massimi,et al. Dying, death, and mortality: towards thanatosensitivity in HCI , 2009, CHI Extended Abstracts.
[25] Gunela Astbrink,et al. Password sharing: implications for security design based on social practice , 2007, CHI.
[26] Christian Maier,et al. Technostress: Theoretical foundation and empirical evidence , 2014 .
[27] A. Strauss,et al. The discovery of grounded theory: strategies for qualitative research aldine de gruyter , 1968 .
[28] Catherine C. Marshall,et al. The Long Term Fate of Our Digital Belongings: Toward a Service Model for Personal Archives , 2006, Archiving Conference.
[29] Kori Inkpen Quinn,et al. Family accounts: a new paradigm for user accounts within the home environment , 2008, CSCW.
[30] Jed R. Brubaker,et al. Death and the Social Network , 2010 .
[31] Chang Liu,et al. Exploring the factors associated with Web site success in the context of electronic commerce , 2000, Inf. Manag..
[32] Ann Blandford,et al. Integration of human factors and ergonomics during medical device design and development: it's all about communication. , 2014, Applied ergonomics.
[33] Elizabeth Stobert,et al. Expert Password Management , 2015, PASSWORDS.
[34] Catherine C. Marshall,et al. Rethinking Personal Digital Archiving, Part 1: Four Challenges from the Field , 2008, D Lib Mag..
[35] Wendy Moncur,et al. The Role of Digital Technologies During Relationship Breakdowns , 2016, CSCW.
[36] Jed R. Brubaker,et al. Legacy Contact: Designing and Implementing Post-mortem Stewardship at Facebook , 2016, CHI.
[37] Gerhard Schwabe,et al. The Landscape of Electronic Data Safes and Their Adoption in E-Government and E-Business , 2013, 2013 46th Hawaii International Conference on System Sciences.
[38] Helena Karasti,et al. Reflections on 25 Years of Ethnography in CSCW , 2012, Computer Supported Cooperative Work (CSCW).
[39] Michael D. Myers,et al. A Set of Principles for Conducting and Evaluating Interpretive Field Studies in Information Systems , 1999, MIS Q..
[40] Aisling Kelliher,et al. Engaging with Death Online: An Analysis of Systems that Support Legacy-Making, Bereavement, and Remembrance , 2016, Conference on Designing Interactive Systems.
[41] Cristiano Maciel,et al. Post-mortem Digital Legacy: Possibilities in HCI , 2015, HCI.
[42] Viswanath Venkatesh,et al. Bridging the Qualitative-Quantitative Divide: Guidelines for Conducting Mixed Methods Research in Information Systems , 2013, MIS Q..
[43] Jed R. Brubaker,et al. "We will never forget you [online]": an empirical investigation of post-mortem myspace comments , 2011, CSCW.
[44] Christopher A. Le Dantec,et al. Finding a new normal: the role of technology in life disruptions , 2012, CSCW.
[45] Jacek Gwizdka,et al. Email task management styles: the cleaners and the keepers , 2004, CHI EA '04.
[46] T. Trabasso,et al. Appraisal and goal processes as predictors of psychological well-being in bereaved caregivers. , 1997, Journal of personality and social psychology.
[47] Jodi Forlizzi,et al. Digital artifacts as legacy: exploring the lifespan and value of digital data , 2013, CHI.
[48] Anne Beaudry,et al. Understanding User Responses to Information Technology: A Coping Model of User Adaption , 2005, MIS Q..
[49] John Romano,et al. Your Digital Afterlife: When Facebook, Flickr and Twitter Are Your Estate, What's Your Legacy? , 2010 .
[50] Mary Lewis,et al. The human remains , 2011 .
[51] Monideepa Tarafdar,et al. The Consequences of Technostress for End Users in Organizations: Conceptual Development and Empirical Validation , 2008, Inf. Syst. Res..
[52] Judith S. Olson,et al. Remote and alone: coping with being the remote member on the team , 2012, CSCW.
[53] Michael Mönnich,et al. Adding Value to the Library Catalog by Implementing a Recommendation System , 2008, D Lib Mag..
[54] Kori Inkpen Quinn,et al. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments , 2007, UbiComp.
[55] Sonia Chiasson,et al. Survey on the Fate of Digital Footprints after Death , 2014 .
[56] Christine Reid,et al. The Myth of the Paperless Office , 2003, J. Documentation.
[57] Elizabeth Stobert,et al. The Password Life Cycle: User Behaviour in Managing Passwords , 2014, SOUPS.
[58] Abigail Sellen,et al. A Design Perspective on Three Technology Heirlooms , 2012, Hum. Comput. Interact..
[59] Abigail Sellen,et al. On human remains: Values and practice in the home archiving of cherished objects , 2010, TCHI.
[60] Jed R. Brubaker. The afterlife of identity , 2013, CSCW '13.
[61] Markus Makkonen,et al. "I just cursed and opened a beer": Explaining Mobile Users' Non-Complaining Behavior Through Coping , 2015, ICIS.
[62] S. Folkman,et al. Stress, appraisal, and coping , 1974 .
[63] S. Folkman,et al. Stress, Appraisal, and Coping. New York, NY: Springer; , 1984 .
[64] Tara Matthews,et al. "She'll just grab any device that's closer": A Study of Everyday Device & Account Sharing in Households , 2016, CHI.
[65] M. Hetherington,et al. The cloud afterlife: Managing your digital legacy , 2015, 2015 IEEE International Symposium on Technology and Society (ISTAS).
[66] Mark Ciampa,et al. Online Versus Local Password Management Applications: An Analysis of User Training and Reactions , 2011 .
[67] Richard S. Lazarus,et al. Transactional theory and research on emotions and coping , 1987 .
[68] B. Berg. Qualitative Research Methods for the Social Sciences , 1989 .
[69] Gerhard Schwabe,et al. Going Paperless with Electronic Data Safes: Information Ecology Fit and Challenges , 2016, ICIS.
[70] J. B. Berger. Mandatory e-government has arrived: The silent protest from staff calls for the committed scholar – resistance must never be futile! , 2014 .
[71] Mark S. Ackerman,et al. Group information management , 2007 .
[72] Elise van den Hoven,et al. Introduction to this Special Issue on Designing for Personal Memories: Past, Present, and Future , 2012, Hum. Comput. Interact..
[73] T. D. Wilson,et al. Review of: Berg, Bruce L. Qualitative research methods for the social sciences, 6th ed. Boston, MA: Allyn and Bacon, 2007 , 2008, Inf. Res..
[74] Sven Laumer,et al. Online Social Networks as a Source and Symbol of Stress: An Empirical Analysis , 2012, ICIS.
[75] Rafi Nachmias,et al. The project fragmentation problem in personal information management , 2006, CHI.