<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maher, Molly</style></author><author><style face="normal" font="default" size="100%">Kaziunas, Elizabeth</style></author><author><style face="normal" font="default" size="100%">Ackerman, Mark</style></author><author><style face="normal" font="default" size="100%">Derry, Holly</style></author><author><style face="normal" font="default" size="100%">Forringer, Rachel</style></author><author><style face="normal" font="default" size="100%">Miller, Kristen</style></author><author><style face="normal" font="default" size="100%">O&#039;Reilly, Dennis</style></author><author><style face="normal" font="default" size="100%">An, Larry C</style></author><author><style face="normal" font="default" size="100%">Tewari, Muneesh</style></author><author><style face="normal" font="default" size="100%">Hanauer, David A</style></author><author><style face="normal" font="default" size="100%">Choi, Sung Won</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">User-Centered Design Groups to Engage Patients and Caregivers with a Personalized Health Information Technology Tool</style></title><secondary-title><style face="normal" font="default" size="100%">Biology of Blood and Marrow Transplantation</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bone marrow transplant</style></keyword><keyword><style  face="normal" font="default" size="100%">caregivers</style></keyword><keyword><style  face="normal" font="default" size="100%">design group</style></keyword><keyword><style  face="normal" font="default" size="100%">engagement</style></keyword><keyword><style  face="normal" font="default" size="100%">health IT</style></keyword><keyword><style  face="normal" font="default" size="100%">patient activation</style></keyword><keyword><style  face="normal" font="default" size="100%">pediatric; hematopoietic cell transplantation</style></keyword><keyword><style  face="normal" font="default" size="100%">user-centered design</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-OnlyDOI</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">349–358</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Health information technology (IT) has opened exciting avenues for capturing, delivering and sharing data, and offers the potential to develop cost-effective, patient-focused applications. In recent years, there has been a proliferation of health IT applications such as outpatient portals. Rigorous evaluation is fundamental to ensure effectiveness and sustainability, as resistance to more widespread adoption of outpatient portals may be due to lack of user friendliness. Health IT applications that integrate with the existing electronic health record and present information in a condensed, user-friendly format could improve coordination of&amp;nbsp;care and communication. Importantly, these applications should be developed systematically with appropriate methodological design and testing to ensure usefulness, adoption, and sustainability. Based on our prior work that identified numerous information needs and challenges of HCT, we developed an experimental prototype of a health IT tool, the BMT Roadmap. Our goal was to develop a tool that could be used in the real-world, daily practice of HCT patients and caregivers (users) in the inpatient setting. Herein, we examined the views, needs, and wants of users in the design and development process of the BMT Roadmap through user-centered Design Groups. Three important themes emerged: 1) perception of core features as beneficial (views), 2)&amp;nbsp;alerting the design team to potential issues with the user interface (needs); and 3) providing a deeper understanding of the user experience in terms of wider psychosocial requirements (wants). These findings resulted in changes that led to an improved, functional BMT Roadmap product, which will be tested as an intervention in the pediatric HCT population in the fall of 2015 (&lt;a data-itrprs=&quot;Y&quot; data-url=&quot;/science/RedirectURL?_method=externObjLink&amp;amp;_locator=url&amp;amp;_cdi=272926&amp;amp;_issn=10838791&amp;amp;_origin=article&amp;amp;_zone=art_page&amp;amp;_targetURL=http%253A%252F%252FClinicalTrials.gov&quot; href=&quot;http://clinicaltrials.gov/&quot; onclick=&quot;var newWidth=((window.screen.availWidth*90)/100);var newHeight=((window.screen.availHeight*90)/100);var parms = &#039;status=yes,location=yes,&#039; + &#039;scrollbars=yes,resizable=yes,directories=yes,&#039; + &#039;toolbar=yes,menubar=yes,&#039; + &#039;width=&#039; + newWidth + &#039;,height=&#039; + newHeight + &#039;,screenX=10,screenY=10&#039;;var externalWin; externalWin=window.open(&#039;&#039;,&#039;externObjLink&#039;,parms); externalWin.focus()&quot; target=&quot;externObjLink&quot;&gt;ClinicalTrials.gov&lt;/a&gt;&lt;a data-itrprs=&quot;Y&quot; data-url=&quot;/science/RedirectURL?_method=externObjLink&amp;amp;_locator=ctgov&amp;amp;_cdi=272926&amp;amp;_issn=10838791&amp;amp;_origin=article&amp;amp;_zone=art_page&amp;amp;_targetURL=http%253A%252F%252Fclinicaltrials.gov%252Fshow%252FNCT02409121&quot; href=&quot;http://clinicaltrials.gov/show/NCT02409121&quot; onclick=&quot;var newWidth=((window.screen.availWidth*90)/100);var newHeight=((window.screen.availHeight*90)/100);var parms = &#039;status=yes,location=yes,&#039; + &#039;scrollbars=yes,resizable=yes,directories=yes,&#039; + &#039;toolbar=yes,menubar=yes,&#039; + &#039;width=&#039; + newWidth + &#039;,height=&#039; + newHeight + &#039;,screenX=10,screenY=10&#039;;var externalWin; externalWin=window.open(&#039;&#039;,&#039;externObjLink&#039;,parms); externalWin.focus()&quot; target=&quot;externObjLink&quot;&gt;NCT02409121&lt;/a&gt;).&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Kaziunas, Elizabeth</style></author><author><style face="normal" font="default" size="100%">Hanauer, David A</style></author><author><style face="normal" font="default" size="100%">Ackerman, Mark S</style></author><author><style face="normal" font="default" size="100%">Choi, Sung Won</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Identifying unmet informational needs in the inpatient setting to increase patient and caregiver engagement in the context of pediatric hematopoietic stem cell transplantation</style></title><secondary-title><style face="normal" font="default" size="100%">Journal of the American Medical Informatics Association</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bone marrow transplantation</style></keyword><keyword><style  face="normal" font="default" size="100%">electronic health records</style></keyword><keyword><style  face="normal" font="default" size="100%">inpatients</style></keyword><keyword><style  face="normal" font="default" size="100%">patient participation</style></keyword><keyword><style  face="normal" font="default" size="100%">patient-centered care</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-OnlyDOI</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">23</style></volume><pages><style face="normal" font="default" size="100%">94-104</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&lt;strong&gt;Background&lt;/strong&gt;&amp;nbsp;Patient-centered care has been shown to improve patient outcomes, satisfaction, and engagement. However, there is a paucity of research on patient-centered care in the inpatient setting, including an understanding of unmet informational needs that may be limiting patient engagement. Pediatric hematopoietic stem cell transplantation (HSCT) represents an ideal patient population for elucidating unmet informational needs, due to the procedure’s complexity and its requirement for caregiver involvement.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Methods&lt;/strong&gt;&amp;nbsp;We conducted field observations and semi-structured interviews of pediatric HSCT caregivers and patients to identify informational challenges in the inpatient hospital setting. Data were analyzed using a thematic grounded theory approach.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Results&lt;/strong&gt;&amp;nbsp;Three stages of the caregiving experience that could potentially be supported by a health information technology system, with the goal of enhancing patient/caregiver engagement, were identified: (1) navigating the health system and learning to communicate effectively with the healthcare team, (2) managing daily challenges of caregiving, and (3) transitioning from inpatient care to long-term outpatient management.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Discussion&lt;/strong&gt;&amp;nbsp;We provide four practical recommendations to meet the informational needs of pediatric HSCT patients and caregivers: (1) provide patients/caregivers with real-time access to electronic health record data, (2) provide information about the clinical trials in which the patient is enrolled, (3) provide information about the patient’s care team, and (4) properly prepare patients and caregivers for hospital discharge.&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&amp;nbsp;Pediatric HSCT caregivers and patients have multiple informational needs that could be met with a health information technology system that integrates data from several sources, including electronic health records. Meeting these needs could reduce patients’ and caregivers’ anxiety surrounding the care process; reduce information asymmetry between caregivers/patients and providers; empower patients/caregivers to participate in the care process; and, ultimately, increase patient/caregiver engagement in the care process.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">1</style></issue></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael S. Bernstein</style></author><author><style face="normal" font="default" size="100%">Little, Greg</style></author><author><style face="normal" font="default" size="100%">Miller, Robert C.</style></author><author><style face="normal" font="default" size="100%">Hartmann, Björn</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">David R. Karger</style></author><author><style face="normal" font="default" size="100%">Crowell, David</style></author><author><style face="normal" font="default" size="100%">Panovich, Katrina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Soylent: A Word Processor with a Crowd Inside</style></title><secondary-title><style face="normal" font="default" size="100%">Commun. ACM</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">crowdsourcing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-OnlyDOI</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">58</style></volume><pages><style face="normal" font="default" size="100%">85–94</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper introduces architectural and interaction patterns for integrating crowdsourced human contributions directly into user interfaces. We focus on writing and editing, complex endeavors that span many levels of conceptual and pragmatic activity. Authoring tools offer help with pragmatics, but for higher-level help, writers commonly turn to other people. We thus present Soylent, a word processing interface that enables writers to call on Mechanical Turk workers to shorten, proofread, and otherwise edit parts of their documents on demand. To improve worker quality, we introduce the Find-Fix-Verify crowd programming pattern, which splits tasks into a series of generation and review stages. Evaluation studies demonstrate the feasibility of crowdsourced editing and investigate questions of reliability, cost, wait time, and work time for edits.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Elizabeth Kaziunas</style></author><author><style face="normal" font="default" size="100%">Ayse G Büyüktür</style></author><author><style face="normal" font="default" size="100%">Jones, Jasmine</style></author><author><style face="normal" font="default" size="100%">Choi, Sung W</style></author><author><style face="normal" font="default" size="100%">David A Hanauer</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work &amp; Social Computing (CSCW&#039;15)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">caregiver</style></keyword><keyword><style  face="normal" font="default" size="100%">caregiving</style></keyword><keyword><style  face="normal" font="default" size="100%">emotional work</style></keyword><keyword><style  face="normal" font="default" size="100%">health and wellness</style></keyword><keyword><style  face="normal" font="default" size="100%">health informatics</style></keyword><keyword><style  face="normal" font="default" size="100%">health information</style></keyword><keyword><style  face="normal" font="default" size="100%">healthcare technology</style></keyword><keyword><style  face="normal" font="default" size="100%">interactional work</style></keyword><keyword><style  face="normal" font="default" size="100%">medication informatics</style></keyword><keyword><style  face="normal" font="default" size="100%">patient information</style></keyword><keyword><style  face="normal" font="default" size="100%">patients</style></keyword><keyword><style  face="normal" font="default" size="100%">pediatric</style></keyword><keyword><style  face="normal" font="default" size="100%">reflection</style></keyword><keyword><style  face="normal" font="default" size="100%">reflecton work</style></keyword><keyword><style  face="normal" font="default" size="100%">social worlds</style></keyword><keyword><style  face="normal" font="default" size="100%">work</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2015</style></year><pub-dates><date><style  face="normal" font="default" size="100%">02/2015</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pages><style face="normal" font="default" size="100%">1763-1774</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The impact of health information on caregivers is of increasing interest to HCI/CSCW in designing systems to support the social and emotional dimensions of managing health. Drawing on an interview study, as well as corroborating data including a multi-year ethnography, we detail the practices of caregivers (particularly parents) in a bone marrow transplant (BMT) center. We examine the interconnections between information and emotion work performed by caregivers through a liminal lens, highlighting the BMT experience as a time of transition and reflection in which caregivers must quickly adapt to the new social world of the hospital and learn to manage a wide range of patient needs. The transition from parent to &#039;caregiver&#039; is challenging, placing additional emotional burdens on the intensive information work for managing BMT. As a time of reflection, the BMT experience also provides an occasion for generative thinking and alternative approaches to health management. Our study findings call for health systems that reflect a design paradigm focused on &#039;transforming lives&#039; rather than &#039;transferring information.&#039;&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ying-yu Chen</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Family Memory in a Taiwanese Context</style></title><secondary-title><style face="normal" font="default" size="100%">CHI’12 Workshop on &quot;Heritage Matters: Designing for Current and Future Values Through Digital and Social Technologies&quot;</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">memory</style></keyword><keyword><style  face="normal" font="default" size="100%">memory artifacts</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">04/2012</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In this paper, we explore how Taiwanese practices of family memory and memory artifacts show significant differences from those in the US, suggesting important memory practices are cultural and collective. For example, Taiwanese do not keep pictures of deceased ancestors in the same way as Americans might, they do not have family heirlooms, nor do they keep extensive childhood memorabilia. We studied this through 20 interviews and household inventories conducted in Taiwan.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Michael S. Bernstein</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Ed H. Chi</style></author><author><style face="normal" font="default" size="100%">Robert C. Miller</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The trouble with social computing systems research</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 2011 annual conference on Human factors in computing systems, extended abstracts  (CHI EA ’11)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">evaluation</style></keyword><keyword><style  face="normal" font="default" size="100%">social computing</style></keyword><keyword><style  face="normal" font="default" size="100%">systems research</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">5/2011</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-OnlyDOI</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Social computing has led to an explosion of research in understanding users, and it has the potential to similarly revolutionize systems research. However, the number of papers designing and building new sociotechnical systems has not kept pace. We analyze challenges facing social computing systems research, ranging from misaligned methodological incentives, evaluation expectations, double standards, and relevance compared to industry. We suggest improvements for the community to consider so that we can chart the future of our field.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Eric Cook</style></author><author><style face="normal" font="default" size="100%">Stephanie D. Teasley</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Contribution, Commercialization &amp; Audience: Understanding Participation in an Online Creative Community</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Group 2009</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">amateurs</style></keyword><keyword><style  face="normal" font="default" size="100%">audiences</style></keyword><keyword><style  face="normal" font="default" size="100%">commercialization</style></keyword><keyword><style  face="normal" font="default" size="100%">community of practice</style></keyword><keyword><style  face="normal" font="default" size="100%">creativity</style></keyword><keyword><style  face="normal" font="default" size="100%">learning</style></keyword><keyword><style  face="normal" font="default" size="100%">online communities</style></keyword><keyword><style  face="normal" font="default" size="100%">online community</style></keyword><keyword><style  face="normal" font="default" size="100%">professionals</style></keyword><keyword><style  face="normal" font="default" size="100%">social computing</style></keyword><keyword><style  face="normal" font="default" size="100%">user-generated content</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper presents a qualitative study of attitudes towards participation and contribution in an online creative community. The setting of the work is an online community of practice focused on the use and development of a user-customizable music software package called Reaktor. Findings from the study highlight four emergent topics in the discourse related to user contributions to the community: contribution assessment, support for learning, perceptions of audience and tensions about commercialization. Our analysis of these topics frames discussion about the value and challenges of attending to amateur and professional users in online creative communities.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Congleton, Ben</style></author><author><style face="normal" font="default" size="100%">Frank, Jackie Cerretani</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Sharing Map Annotations in Small Groups: X Marks the Spot</style></title><secondary-title><style face="normal" font="default" size="100%">Interact 2009</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">expertise sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">location-based computing</style></keyword><keyword><style  face="normal" font="default" size="100%">map annotation</style></keyword><keyword><style  face="normal" font="default" size="100%">peer production</style></keyword><keyword><style  face="normal" font="default" size="100%">requirements analysis</style></keyword><keyword><style  face="normal" font="default" size="100%">sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">social media</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">08/2009</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Advances in location-sensing technology, coupled with an increasingly pervasive wireless Internet, have made it possible (and increasingly easy) to access and share information with context of one’s geospatial location. We conducted a four-phase study, with 27 students, to explore the practices surrounding the creation, interpretation and sharing of map annotations in specific social contexts. We found that annotation authors consider multiple factors when deciding how to annotate maps, including the perceived utility to the audience and how their contributions will reflect on the image they project to others. Consumers of annotations value the novelty of information, but must be convinced of the author’s credibility. In this paper we describe our study, present the results, and discuss implications for the design of software for sharing map annotations.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Congleton, Ben</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The ProD Framework for Proactive Displays</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 21st Annual ACM Symposium on User Interface Software and Technology (UIST&#039;08)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">audience-awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">awareness</style></keyword><keyword><style  face="normal" font="default" size="100%">collaborative systems</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive computing</style></keyword><keyword><style  face="normal" font="default" size="100%">proactive displays</style></keyword><keyword><style  face="normal" font="default" size="100%">public displays</style></keyword><keyword><style  face="normal" font="default" size="100%">software framework</style></keyword><keyword><style  face="normal" font="default" size="100%">ubiquitous computing</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2008</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2008</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">221-230</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;A proactive display is an application that selects content to display based on the set of users who have been detected nearby. For example, the Ticket2Talk [17] proactive display application presented content for users so that other people would know something about them. It is our view that promising patterns for proactive display applications have been discovered, and now we face the need for frameworks to support the range of applications&lt;/p&gt;&lt;p&gt;that are possible in this design space.&lt;/p&gt;&lt;p&gt;In this paper, we present the Proactive Display (ProD)&lt;/p&gt;&lt;p&gt;Framework, which allows for the easy construction of proactive&lt;/p&gt;&lt;p&gt;display applications. It allows a range of proactive&lt;/p&gt;&lt;p&gt;display applications, including ones already in the literature.&lt;/p&gt;&lt;p&gt;ProD also enlarges the design space of proactive display&lt;/p&gt;&lt;p&gt;systems by allowing a variety of new applications that&lt;/p&gt;&lt;p&gt;incorporate different views of social life and community.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>5</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Scott D. Mainwaring</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Garfinkel, Simson</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy Issues and Human-Computer Interaction</style></title><secondary-title><style face="normal" font="default" size="100%">Security and usability: designing secure systems that people can use</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><publisher><style face="normal" font="default" size="100%">O&#039;Reilly Media</style></publisher><pub-location><style face="normal" font="default" size="100%">Cambridge, MA</style></pub-location><pages><style face="normal" font="default" size="100%">19--26</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;&amp;nbsp;This chapter will largely view HCI in its broader context. HCI is not just about user interfaces but also about the user experience&amp;nbsp; of systems: how people perceive and understand, reason and learn about, and react and adapt to digital technologies. To borrow the terminology Sasse and Flechais2&amp;nbsp; use in discussing security, HCI has come to deal not only with process&amp;nbsp; (how systems are used, designed, and developed) and product &amp;nbsp;(the systems themselves and their interfaces), but also panorama&amp;nbsp; (cultural and organizational contexts that support, discourage, or otherwise shape the systems they envelope). Privacy, like security, implicates all of these levels. It is by its nature both a question of the user and his or her data but also the user and others’ use of that data. Our interests, therefore, will be those of HCI-writ-large.&lt;/p&gt;&lt;p&gt;While HCI has gone through several generations of computational technologies, it has carried a number of research themes forward. As mentioned, this chapter will consider the various HCI themes and their research findings that may be important when designing, constructing, or evaluating privacy mechanisms. Before exploring these HCI research streams, however, we first need a working definition of privacy, and to compare and contrast privacy concerns with HCI concerns.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Swenson, Anne</style></author><author><style face="normal" font="default" size="100%">Cotterill, Stephen</style></author><author><style face="normal" font="default" size="100%">DeMaagd, Kurtis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">I-DIAG: from community discussion to knowledge distillation</style></title><secondary-title><style face="normal" font="default" size="100%">Communities and Technologies (C&amp;T 2003)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">distillation</style></keyword><keyword><style  face="normal" font="default" size="100%">expertise sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">forums</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge artifact</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge management</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">online communities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2003</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">307–325</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;I-DIAG is an attempt to understand how to take the collective discussions of a large group of people and distill the messages and documents into more succinct, durable knowledge. I-DIAG is a distributed environment that includes two separate applications, CyberForum and Consolidate. The goals of the project, the architecture of IDIAG, and the two applications are described. We focus on technical mechanisms to augment social maintenance and social regulation in the system.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Reagle, Joseph</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Beyond concern: Understanding net users&#039; attitudes about online privacy</style></title><secondary-title><style face="normal" font="default" size="100%">The Internet upheaval: raising questions, seeking answers in communications policy</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">net users</style></keyword><keyword><style  face="normal" font="default" size="100%">online environment</style></keyword><keyword><style  face="normal" font="default" size="100%">online privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">personal information</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">survey</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2000</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-New</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">47–70</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Over the past decade, numerous surveys conducted around the world have found consistently high levels of concern about privacy. The more recent studies have found that this concern is as prevalent in the online environment as it is for physical-world interactions. For example, Westin (Harris 1998) found 81% of Net users are concerned about threats to their privacy while online. While many studies have measured the magnitude of privacy concerns, it is still critical to study the concern in detail, especially for the online environment. As Hine and Eve (1998) point out: Despite this wide range of interests in privacy as a topic, we have little idea of the ways in which people in their ordinary lives conceive of privacy and their reactions to the collection and use of personal information (Hine and Eve 1998, 253) With this study, we have tried to better understand the nature of online privacy concerns.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Cranor, Lorrie</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy Critics: UI Components to Safeguard Users&#039; Privacy</style></title><secondary-title><style face="normal" font="default" size="100%">ACM Conference on Human Factors in Computing Systems (CHI&#039;99</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">agent architectures</style></keyword><keyword><style  face="normal" font="default" size="100%">collaboration</style></keyword><keyword><style  face="normal" font="default" size="100%">critics</style></keyword><keyword><style  face="normal" font="default" size="100%">critics architecture</style></keyword><keyword><style  face="normal" font="default" size="100%">P3P</style></keyword><keyword><style  face="normal" font="default" size="100%">platform for privacy preferences</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">World Wide Web</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">258–259</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Creating usable systems to protect online privacy is an inherently difficult problem. Privacy critics are semiautonomous agents that help people protect their online privacy by offering suggestions and warnings. Two sample critics are presented.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Cranor, Lorrie Faith</style></author><author><style face="normal" font="default" size="100%">Reagle, Joseph</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy in e-Commerce: Examining User Scenarios and Privacy Preferences</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 1st ACM Conference on Electronic Commerce (EC&#039;99)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">electronic commerce</style></keyword><keyword><style  face="normal" font="default" size="100%">platform for privacy preferences</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy protocols</style></keyword><keyword><style  face="normal" font="default" size="100%">user survey</style></keyword><keyword><style  face="normal" font="default" size="100%">World Wide Web</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">1999</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">1–8</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Privacy is a necessary concern in electronic commerce. It is difficult, if not impossible, to complete a transaction without revealing some personal data – a shipping address, billing information, or product preference. Users may be unwilling to provide this necessary information or even to browse online if they believe their privacy is invaded or threatened. Fortunately, there are technologies to help users protect their privacy. P3P (Platform for Privacy Preferences Project) from the World Wide Web Consortium is one such technology. However, there is a need to know more about the range of user concerns and preferences about privacy in order to build usable and effective interface mechanisms for P3P and other privacy technologies. Accordingly, we conducted a survey of 381 U.S. Net users, detailing a range of commerce scenarios and examining the participants&#039; concerns and preferences about privacy. This paper presents both the findings from that study as well as their design implications&lt;/p&gt;</style></abstract></record></records></xml>