Linda Little, Elizabeth Sillence and Pam Briggs
Overall the well-being of a family is dependent on how well the members of the family communicate and interact. If we are creating products and services for families it is important to recognize that the dynamics of a different families can be very different. The project organizers sought to [...]
Archive for the 'Privacy' Category
Jeremy Goecks, W. Keith Edwards and Elizabeth D. Mynatt
Privacy and security management often talk about users engaging in boundary management, where decisions are made about what can cross the boundary. However, as the boundary often changes due to context and task, this can be very hard to automate. Social navigation is seen on Amazon, NYT, [...]
Andrew Besmer, Heather Lipford, Mohamed Shehab and Gorrell Cheek
Social applications are apps built on top of social network platforms such as Facebook or Google’s OpenSocial. They are intended to leverage the social network to provide value to users.
Typically when installing the app they are presented with a screen prompting the user to approve access to [...]