A Research Agenda for the Socio-Technical Design of Ubiquitous Computing Systems
暂无分享,去创建一个
[1] Jan Marco Leimeister,et al. Evaluating application prototypes in the automobile , 2011, IEEE Pervasive Computing.
[2] Stephan Sigg,et al. Minimising the Context Prediction Error , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[3] Paul Lukowicz,et al. Understanding, creating, and managing complex techno-socio-economic systems: Challenges and perspectives , 2011 .
[4] Holger Hoffmann,et al. Incorporating behavioral trust theory into system development for ubiquitous applications , 2012, Personal and Ubiquitous Computing.
[5] Paul Lukowicz,et al. Integrated tool chain for recording and handling large, multimodal context recognition data sets , 2010, UbiComp '10 Adjunct.
[6] Paul Lukowicz,et al. Rapid Prototyping of Activity Recognition Applications , 2008, IEEE Pervasive Computing.
[7] Enid Mumford,et al. The story of socio‐technical design: reflections on its successes, failures and potential , 2006, Inf. Syst. J..
[8] John D. Lee,et al. Trust in Automation: Designing for Appropriate Reliance , 2004 .
[9] Erik Hollnagel,et al. Joint Cognitive Systems: Foundations of Cognitive Systems Engineering , 2005 .
[10] Jan Marco Leimeister,et al. Integration rechtlicher Anforderungen an soziotechnische Systeme in frühe Phasen der Systementwicklung , 2011, MMS.
[11] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[12] Dominik Heckmann,et al. Integrating Privacy Aspects into Ubiquitous Computing: A Basic User Interface for Personalization , 2003 .
[13] J. W. DeCew. In Pursuit of Privacy: Law, Ethics, and the Rise of Technology , 1997 .
[14] Adam J. Lee,et al. Eyeing your exposure: quantifying and controlling information sharing for improved privacy , 2011, SOUPS.
[15] Cheolho Yoon,et al. Convenience and TAM in a ubiquitous computing environment: The case of wireless LAN , 2007, Electron. Commer. Res. Appl..
[16] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[17] Manuel Blum,et al. reCAPTCHA: Human-Based Character Recognition via Web Security Measures , 2008, Science.
[18] Detmar W. Straub,et al. Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..
[19] John Krumm,et al. Ubiquitous Computing Fundamentals , 2009 .
[20] Marc Langheinrich,et al. Privacy in Ubiquitous Computing , 2014 .
[21] Josep Blat,et al. Digital Footprinting: Uncovering Tourists with User-Generated Content , 2008, IEEE Pervasive Computing.
[22] Izak Benbasat,et al. A Research Agenda for Trust in Online Environments , 2008, J. Manag. Inf. Syst..
[23] Hamid Lesani,et al. Adaptive autonomy: Smart cooperative cybernetic systems for more humane automation solutions , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[24] George Roussos,et al. Consumer perceptions of privacy, security and trust in ubiquitous commerce , 2004, Personal and Ubiquitous Computing.
[26] Peter Cuyvers,et al. Social perspectives: emote control , 1999, INTR.
[27] Holger Hoffmann,et al. Towards the Use of Software Requirement Patterns for Legal Requirements , 2012 .
[28] Christos Goumopoulos,et al. A conceptual model and the supporting middleware for composing ubiquitous computing applications , 2005 .
[29] Ian Sommerville,et al. Socio-technical systems: From design methods to systems engineering , 2011, Interact. Comput..
[30] Bernd Holznagel,et al. Rechtliche Dimensionen der Radio Frequency Identification , 2007, Internet der Dinge.
[31] Stijn Christiaens,et al. Metadata Mechanisms: From Ontology to Folksonomy ... and Back , 2006, OTM Workshops.
[32] Karen Holtzblatt,et al. Contextual design , 1997, INTR.
[33] Hector Garcia-Molina,et al. Collaborative Creation of Communal Hierarchical Taxonomies in Social Tagging Systems , 2006 .
[34] Abigail Sellen,et al. Design for Privacy in Ubiquitous Computing Environments , 1993, ECSCW.
[35] Mark Klein,et al. Programming the global brain , 2012, Commun. ACM.
[36] Jean-Marie Lehn,et al. Toward complex matter: Supramolecular chemistry and self-organization , 2002, Proceedings of the National Academy of Sciences of the United States of America.
[37] Kay Connelly. On Developing a Technology Acceptance Model for Pervasive Computing , 2008 .
[38] Martin R. Gibbs,et al. Mediating intimacy: designing technologies to support strong-tie relationships , 2005, CHI.
[39] James A. Larson,et al. Guidelines for multimodal user interface design , 2004, CACM.
[40] Vittorio Loreto,et al. Emergent Community Structure in Social Tagging Systems , 2008, Adv. Complex Syst..
[41] Enid Mumford,et al. Effective Systems Design and Requirements Analysis , 1995 .
[42] Peter Mika. Ontologies Are Us: A Unified Model of Social Networks and Semantics , 2005, International Semantic Web Conference.
[43] Laura A. Dabbish,et al. Labeling images with a computer game , 2004, AAAI Spring Symposium: Knowledge Collection from Volunteer Contributors.
[44] Enid Mumford,et al. A Socio-Technical Approach to Systems Design , 2000, Requirements Engineering.
[45] Jan Marco Leimeister,et al. How to use behavioral research insights on trust for HCI system design , 2012, CHI Extended Abstracts.
[46] Kurt Geihs,et al. Selbst-adaptive Software , 2008, Informatik-Spektrum.
[47] Adrian Friday,et al. Ubiquitous Computing Systems , 2009, Ubicomp 2009.
[48] John Langford,et al. Telling humans and computers apart automatically , 2004, CACM.
[49] Robert P. Bostrom,et al. MIS Problems and failures: a sociotechnical perspective part I: the cause , 1977 .
[50] Roy Want,et al. An Introduction to Ubiquitous Computing , 2010, Ubicomp 2010.
[51] E. Trist,et al. Some Social and Psychological Consequences of the Longwall Method of Coal-Getting , 1951 .
[52] D. M. Hoedemaeker,et al. Adaptive in-car user interfaces based on personalized workload estimation , 2006 .
[53] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[54] Enid Mumford,et al. Effective systems design and requirements analysis : the ETHICS approach , 1995 .
[55] Alexander Roßnagel,et al. Datenschutzfragen mobiler kontextbezogener Systeme , 2006 .
[56] Erik Hollnagel,et al. Cognitive Systems Engineering: New Wine in New Bottles , 1983, Int. J. Man Mach. Stud..
[57] Robert P. Bostrom,et al. Mis problems and failures: a socio-technical perspective , 1977 .
[58] Fred D. Davis. User Acceptance of Information Technology: System Characteristics, User Perceptions and Behavioral Impacts , 1993, Int. J. Man Mach. Stud..
[59] Paul A. Pavlou,et al. Understanding and Mitigating Uncertainty in Online Exchange Relationships: A Principal-Agent Perspective , 2007, MIS Q..
[60] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[61] Jan Marco Leimeister,et al. The Emergence of Mutual and Shared Understanding in the System Development Process , 2013, REFSQ.
[62] Prakriti Trivedi,et al. Emerging Trends of Ubiquitous Computing , 2010 .
[63] Paul Dourish,et al. What we talk about when we talk about context , 2004, Personal and Ubiquitous Computing.
[64] Seyed Masoud Sadjadi,et al. Composing adaptive software , 2004, Computer.