Publications

Publication date: 2010

Web-based access to services increasingly moves to location-oriented scenarios, with either the client being mobile and requesting relevant information for the current location, or with a mobile or stationary client accessing a service which provides access to location-based information. The Web currently has no specific support for this kind of service pattern, and many scenarios use...

Publication date: 2010

In this study, we investigate the relationship between uncertainty and trust in exogenous shifts in modes of social exchange (i.e., those that are not initiated by the individuals in a given exchange system). We explore how transitions from a high uncertainty environment (reciprocal exchange) to lower-uncertainty environments (nonbinding or binding negotiated exchange) affect the level of...

Publication date: 2010

The use of social and technological intermediaries to seek intimate partners has a long history. Yet the affordances and limitations of modern computer-mediated communication (CMC) systems built for this purpose — specifically, online dating sites — present new challenges and opportunities for those who use them to initiate intimate relationships. The sheer number of potential mates available...

Publication date: 2010

RESTful services on the Web expose information through retrievable resource representations that represent self-describing descriptions of resources, and through the way how these resources are interlinked through the hyperlinks that can be found in those representations. This basic design of RESTful services means that for extracting the most useful information from a service, it is necessary...

Publication date: 2010

The field of intelligent tutoring systems has been using the well known knowledge tracing model, popularized by Corbett and Anderson (1995), to track student knowledge for over a decade. Surprisingly, models currently in use do not allow for individual learning rates nor individualized estimates of student initial knowledge. Corbett and Anderson, in their original articles, were interested in...

Publication date: 2010
Information about federal spending can affect national priorities and government processes, having impacts on society that few other data sources can rival. However, building effective open government and transparency mechanisms holds a host of technical, conceptual, and organizational challenges. To help guide development and deployment of future federal spending transparency systems, this paper...
Publication date: 2010
The W3C's Geolocation API may rapidly standardize the transmission of location information on the Web, but, in dealing with such sensitive information, it also raises serious privacy concerns. We analyze the manner and extent to which the current W3C Geolocation API provides mechanisms to support privacy. We propose a privacy framework for the consideration of location information and use it...
Publication date: 2010
Current and upcoming demand-response systems provide increasingly detailed power-consumption data to utilities and a growing array of players angling to assist consumers in understanding and managing their energy use. The granularity of this data, as well as new players' entry into the energy market, creates new privacy concerns. The detailed per-household consumption data that advanced metering...
Publication date: 2010

This article examines forms of shared access to technology where some privileges of ownership are retained. Sharing is defined as informal, non-remunerative resource distributing activities where multiple individuals have a relationship to a single device as purchaser, owner, possessor, operator and/or user. In the specific case of mobile phones in rural Uganda, dynamics of social policing and...

Publication date: 2010

A lot of people have blamed short-term thinking for causing our current economic troubles, which has set off a debate about what time window we should use to assess a CEO’s performance. Today boards of directors, senior managers, and investors intensely want to know how CEOs handle the ups and downs of running businesses over an extended period. Many executive compensation plans define the “...

Publication date: 2009

What is the future of digital imaging? Mobile imaging technologies have been changing rapidly and will continue to do so. We explore new developments in cameraphone photography with the goal of improving the design of the next generation of mobile imaging devices. We equipped 26 diverse participants with cameraphones, photo uploading and sharing software, and access to online photo-accounts...

Publication date: 2009

Conventional wisdom about young people's use of digital technology often equates generational identity with technology identity: today's teens seem constantly plugged in to video games, social networks sites, and text messaging. Yet there is little actual research that investigates the intricate dynamics of youth's social and recreational use of digital media. Hanging Out, Messing Around,...

Publication date: 2009

There has been much recent interest in the development of tools to foster remote collaboration and shared creative work. An open question is: what are the guidelines for this process? What are the key socio-technical preconditions required for a geographically distributed group to collaborate effectively on creative work, and are they different from the conditions of a decade or two ago? In an...

Publication date: 2009
This book focuses on the human users of search engines and the tool they use to interact with them: the search user interface. The truly worldwide reach of the Web has brought with it a new realization among computer scientists and laypeople of the enormous importance of usability and user interface design. In the last ten years, much has become understood about what works in search interfaces...
Publication date: 2009

This nationally representative telephone (wire-line and cell phone) survey explores Americans' opinions about behavioral targeting by marketers, a controversial issue currently before government policymakers. Behavioral targeting involves two types of activities: following users' actions and then tailoring advertisements for the users based on those actions. While privacy advocates have...

Publication date: 2009

Service management and design has largely focused on the interactions between employees and customers. This perspective holds that the quality of the “service experience” is primarily determined during this final “service encounter” that takes place in the “front stage.” This emphasis discounts the contribution of the activities in the “back stage” of the service value chain where materials or...

Pages