Publications

Publication date: 2008
By 2000, over one-third of Silicon Valley's high-skilled workers were foreign-born, and overwhelmingly from Asia. These US-educated engineers are transforming developmental opportunities for formerly peripheral regions as they build professional and business connections to their home countries. In a process more akin to 'brain circulation' than 'brain drain', these engineers and entrepreneurs,...
Publication date: 2008

A growing number of systems on the Internet create what we call information pools, or collections of online information goods for public, club or private consumption. Examples of information pools include collaborative editing websites (e.g. Wikipedia), peer-to-peer file sharing networks (e.g., Napster), multimedia contribution sites (e.g. YouTube), and amorphous collections of commentary (e.g...

Publication date: 2008
Handcrafted objects, such as knit scarves or sweaters, subtly signify the time and skill involved in their creation. Yet a handcraft artifact itself cannot convey the experience of its creation. We present the design, implementation, and preliminary evaluation of Spyn, a system for knitters to virtually weave stories into their creations. Using Spyn, a knitter can record, playback and share...
Publication date: 2008
Online dating systems play a prominent role in the social lives of millions of their users, but little research has considered how users perceive one another through their personal profiles. We examined how users perceive attractiveness in online dating profiles, which provide their first exposure to a potential partner. Participants rated whole profiles and profile components on such qualities...
Publication date: 2008
This paper introduces design guidelines for new technology that leverage our understanding of traditional interactions with bound paper in the form of books and notebooks. Existing, physical interactions with books have evolved over hundreds of years, providing a rich history that we can use to inform our design of new computing technologies. In this paper, we initially survey existing paper...
Publication date: 2008
Every year almost 10 million children die before reaching the age of five despite the fact that two-thirds of these deaths could be prevented by effective low-cost interventions. To combat this, the World Health Organization (WHO) and UNICEF developed the Integrated Management of Childhood Illness (IMCI) treatment algorithms.

In Tanzania, IMCI is the national policy for the treatment...
Publication date: 2008
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-making that generalizes the
Publication date: 2008
Using an ethnographic approach, this study sought to understand how the personal aspirations and social landscapes of Ghanaians living in London shaped their use of a constellation of new information and communication technologies (ICTs) such as camcorders, digital cameras, the internet and mobile phones. Two trajectories of ICT use were discovered among the individuals interviewed. One...
Publication date: 2008
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remains highly variable across the Internet population, allowing attacks such as distributed denialof- service (DDoS) and spam distribution to continue unabated. By modeling security investment decision-making in established (e.g...
Publication date: 2008
In studying categorization, cognitive science has focused primarily on cultural categorization, ignoring individual and institutional categorization. Because recent technological developments have made individual and institutional classification systems much more available and powerful, our understanding of the cognitive and social mechanisms that produce these systems is increasingly important....
Publication date: 2008
Should users of technically protected content be able to give notice and require content owners to take down the technical measure to enable fair uses?
Publication date: 2008
In this talk, I will describe the design of new expressive tools that take advantage of people's familiarity with the physical world, and studies of how these new tools expand the interaction space and the change that could be brought out in the way people perceive this extended interaction space. I will present two example systems: I/O Brush and Spyn, and discuss the role technology could play...
Publication date: 2008
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. Using qualitative methods, we find evidence that those who use tag clouds do so primarily because they are perceived as having an inherently social or personal component, in that they suggest what a person or a group of...
Publication date: 2008

In many collaborative research settings, electronic bibliographic repositories (bibliographies) are used to aggregate information about related work among researchers. These bibliographies allow for group bibliography collection, individual tracking of each user’s library, and personal annotation capabilities within each user’s library. However, most tools used for managing bibliographic data...

Publication date: 2008
This paper relates our experiences at the University of California, Berkeley (UC Berkeley), designing a service science discipline. We wanted to design a discipline of service science in a principled and theoretically motivated way. We began our work by asking, ''What questions would a service science have to answer?'' and from that we developed a new framework for understanding service...
Publication date: 2008
Considering how intellectual property law has evolved in response to advances in computing technologies.
Publication date: 2008
This paper reports on the results of two questionnaires asking biologists about the incorporation of text-extracted entity information, specifically gene and protein names, into bioscience literature search user interfaces. Among the findings are that study participants want to see gene/protein metadata in combination with organism information; that a significant proportion would like to see gene...
Publication date: 2008
Administrative agencies increasingly rely on technology to promote the substantive goals they are charged to pursue. The U.S. Department of Health and Human Services has prioritized digitized personal health data as a means for improving patient safety and reducing bureaucratic costs. The Department of Justice hosts electronic databases that pool information between agencies to facilitate...

Pages