Publications

Weaving memories into handcrafted artifacts with Spyn 2008
Rosner, D. and Ryokai, K. "Weaving memories into handcrafted artifacts with Spyn". In CHI '08 Extended Abstracts on Human Factors in Computing Systems (Florence, Italy, April 05 - 10, 2008). CHI '08. ACM, New York, NY, 2331-2336. (2008)
Assessing attractiveness in online dating profiles 2008
Fiore, A.T., Taylor, L.S., Mendelsohn, G.A., and Hearst, M.A. "Assessing Attractiveness in Online Dating Profiles". Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. ACM Press, pp. 797-806 (2008)
Secure or Insure? A Game-Theoretic Analysis of Information Security Games 2008
J. Grossklags, N. Christin, J. Chuang. Secure or Insure? A Game-Theoretic Analysis of Information Security Games. Proceedings of the 17th International World Wide Web Conference (WWW2008), April 2008.
Predicted and Observed User Behavior in the Weakest-Link Security Game 2008
J. Grossklags, N. Christin, J. Chuang. Predicted and Observed User Behavior in the Weakest-Link Security Game. Proceedings of the 2008 USENIX Workshop on Usability, Psychology, and Security (UPSEC'08), April 2008.
"I have great desires to look beyond my world": trajectories of information and communication technology use among Ghanaians living abroad 2008

Burrell, J. and K. Anderson. "'I have great desires to look beyond my world': trajectories of information and communication technology use among Ghanaians living abroad". New Media and Society, 10(2):203-224. (2008)

Categorization in the Wild 2008
Robert J. Glushko, Paul Maglio, Teenie Matlock, and Lawrence Barsalou. "Categorization in the Wild". Trends in Cognitive Sciences, 12(4): 129-135, April 2008.
How to achieve (some) balance in anti-circumvention laws 2008
Samuelson, P., Reichman, J. H., and Dinwoodie, G. "How to achieve (some) balance in anti-circumvention laws". Communications of the ACM 51, 2, 21-25. (Feb. 2008)
Repatriation, Reconstruction, and Cultural Diplomacy in the Digital World 2008
Clifford A. Lynch, "Repatriation, Reconstruction, and Cultural Diplomacy in the Digital World," EDUCAUSE Review, vol. 43, no. 1 (January/February 2008).
Inquiry in the Extended Design Space 2008
Kimiko Ryokai, "Inquiry in the Extended Design Space," International Conference on Informatics Education and Research for Knowledge-Circulating Society (icks 2008), pp.18-19. (2008)
Tag Clouds: Data Analysis Tool or Social Signaller? 2008
Hearst, M.A., and Rosner, D., "Tag Clouds: Data Analysis Tool or Social Signaller?" Proceedings of the 41st Annual Hawaii International Conference on System Sciences, Computer Society Press (2008)
Hacking intellectual property law 2008
Samuelson, P. "Hacking intellectual property law". Communications of the ACM, 51, 1, 65-67. (Jan. 2008)
Privacy Decision Making in Administrative Agencies 2008
Kenneth A. Bamberger, Deirdre Mulligan. "Privacy Decision Making in Administrative Agencies". Chicago Law Review, 75(1):75 (January 2008).
Designing a Service Science Discipline with Discipline 2008
Robert J. Glushko, "Designing a Service Science Discipline with Discipline". IBM Systems Journal, 47(1): 15-27, 2008
Evidence for Showing Gene/Protein Name Suggestions in Bioscience Literature Search Interfaces 2008
Anna Divoli, Marti A. Hearst, Michael A. Wooldridge; "Evidence for Showing Gene/Protein Name Suggestions in Bioscience Literature Search Interfaces". Pacific Symposium on Biocomputing 13:568-579 (2008)
Digital Libraries, Learning Communities, and Open Education 2008
Clifford A. Lynch, "Digital Libraries, Learning Communities, and Open Education," Opening Up Education: The Collective Advancement of Education through Open Technology, Open Content, and Open Knowledge, Toru Iiyoshi, M. S. Vijay Kumar (Eds.), (Cambridge, MA: MIT Press, 2008).
Collaboration Support for Bibliographic Data 2008

Erik Wilde, Sai Anand, Thierry Bücheler, Max Jörg, Nick Nabholz and Petra Zimmermann, "Collaboration Support for Bibliographic Data", International Journal of Web Based Communities, 4(1):98–109, January 2008.

The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident 2007
Deirdre K. Mulligan, and Aaron Perzanowski, "The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident". Berkeley Technology Law Journal, Vol. 22, p. 1157 (2007)
Position auctions 2007
Hal R. Varian, "Position auctions", International Journal of Industrial Organization, Volume 25, Issue 6, Pages 1163-1178 (December 2007)
A survey of information systems reaching small producers in global agricultural value chains 2007
Parikh, T.S.; Patel, N.; Schwartzman, Y., "A survey of information systems reaching small producers in global agricultural value chains," Information and Communication Technologies and Development, 2007. ICTD 2007. International Conference on , vol., no., pp.1-11, 15-16 Dec. 2007
Modeling the Adoption of New Network Architectures 2007
D. Joseph, N. Shetty, J. Chuang, I. Stoica. Modeling the Adoption of New Network Architectures, Proceedings of ACM CoNEXT, December 2007.
Should Copyright Owners Have to Give Notice About Their Use of Technical Protection Measures? 2007
Pamela Samuelson and Jason Schultz, "Should Copyright Owners Have to Give Notice About Their Use of Technical Protection Measures?", Journal on Telecommunications and High Technology Law Volume 6, Issue 1, page 41 (2007)
Does copyright law need to be reformed? 2007
Samuelson, P. "Does copyright law need to be reformed?". Communications of the ACM, 50, 10, 19-23. (Oct. 2007)
Preliminary Thoughts on a Copyright Reform Project 2007
Pamela Samuelson, "Preliminary Thoughts on a Copyright Reform Project", Utah Law Review, Vol 2007, No 3, p 551 (2007)
Incentives in Peer-to-Peer Systems 2007
M. Babaioff, J. Chuang, M. Feldman. Incentives in Peer-to-Peer Systems. In N. Nisan, T. Roughgarden, E. Tardos, V. Vazirani, eds., Algorithmic Game Theory, Cambridge University Press, 2007.