A Systematic Review of Ability-diverse Collaboration through Ability-based Lens in HCI
In a world where diversity is increasingly recognised and celebrated, it is important for HCI to
embrace the evolving methods and theories for technologies to reflect the diversity of its …
embrace the evolving methods and theories for technologies to reflect the diversity of its …
Privacy at home: an inquiry into sensors and robots for the stay at home elderly
The elderly in the future will use smart house technology, sensors, and robots to stay at
home longer. Privacy at home for these elderly is important. In this exploratory paper, we …
home longer. Privacy at home for these elderly is important. In this exploratory paper, we …
Occupying Another's Digital Space: Privacy of Smartphone Users as a Situated Practice
A smartphone's screen is commonly regarded as a private space, and the action of looking
at it is usually considered a violation of one's privacy both by researchers and designers …
at it is usually considered a violation of one's privacy both by researchers and designers …
Walking away from the robot: negotiating privacy with a robot
Privacy is often applied as an abstract concept in law and regulations. In everyday life,
negotiating what information to share with whom, where, and at what times, and in what …
negotiating what information to share with whom, where, and at what times, and in what …
Unlocking physical world accessibility through ICT: a SWOT analysis
C Ponsard, V Snoeck - International Conference on Computers for …, 2014 - Springer
Despite progress in awareness and increasing electronic availability of accessibility
information, getting a clear picture of physical accessibility of an infrastructure or journey …
information, getting a clear picture of physical accessibility of an infrastructure or journey …
While working around security
The title of this paper describes our work at two levels. First of all the paper discusses how
users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the …
users of IT deal with issues of IT security in their everyday life. Secondly, we discuss how the …
[PDF][PDF] Final report–Fall 2015
E BERNTSEN, E LILLEJORDET, T MATHIESSEN… - mathiessen.no
This paper is a report of an exploratory research project conducted during the course
“INF5261-‐ Development of mobile information systems and services” at the University of …
“INF5261-‐ Development of mobile information systems and services” at the University of …