<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Maher, Molly</style></author><author><style face="normal" font="default" size="100%">Kaziunas, Elizabeth</style></author><author><style face="normal" font="default" size="100%">Ackerman, Mark</style></author><author><style face="normal" font="default" size="100%">Derry, Holly</style></author><author><style face="normal" font="default" size="100%">Forringer, Rachel</style></author><author><style face="normal" font="default" size="100%">Miller, Kristen</style></author><author><style face="normal" font="default" size="100%">O&#039;Reilly, Dennis</style></author><author><style face="normal" font="default" size="100%">An, Larry C</style></author><author><style face="normal" font="default" size="100%">Tewari, Muneesh</style></author><author><style face="normal" font="default" size="100%">Hanauer, David A</style></author><author><style face="normal" font="default" size="100%">Choi, Sung Won</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">User-Centered Design Groups to Engage Patients and Caregivers with a Personalized Health Information Technology Tool</style></title><secondary-title><style face="normal" font="default" size="100%">Biology of Blood and Marrow Transplantation</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">bone marrow transplant</style></keyword><keyword><style  face="normal" font="default" size="100%">caregivers</style></keyword><keyword><style  face="normal" font="default" size="100%">design group</style></keyword><keyword><style  face="normal" font="default" size="100%">engagement</style></keyword><keyword><style  face="normal" font="default" size="100%">health IT</style></keyword><keyword><style  face="normal" font="default" size="100%">patient activation</style></keyword><keyword><style  face="normal" font="default" size="100%">pediatric; hematopoietic cell transplantation</style></keyword><keyword><style  face="normal" font="default" size="100%">user-centered design</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-OnlyDOI</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">349–358</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Health information technology (IT) has opened exciting avenues for capturing, delivering and sharing data, and offers the potential to develop cost-effective, patient-focused applications. In recent years, there has been a proliferation of health IT applications such as outpatient portals. Rigorous evaluation is fundamental to ensure effectiveness and sustainability, as resistance to more widespread adoption of outpatient portals may be due to lack of user friendliness. Health IT applications that integrate with the existing electronic health record and present information in a condensed, user-friendly format could improve coordination of&amp;nbsp;care and communication. Importantly, these applications should be developed systematically with appropriate methodological design and testing to ensure usefulness, adoption, and sustainability. Based on our prior work that identified numerous information needs and challenges of HCT, we developed an experimental prototype of a health IT tool, the BMT Roadmap. Our goal was to develop a tool that could be used in the real-world, daily practice of HCT patients and caregivers (users) in the inpatient setting. Herein, we examined the views, needs, and wants of users in the design and development process of the BMT Roadmap through user-centered Design Groups. Three important themes emerged: 1) perception of core features as beneficial (views), 2)&amp;nbsp;alerting the design team to potential issues with the user interface (needs); and 3) providing a deeper understanding of the user experience in terms of wider psychosocial requirements (wants). These findings resulted in changes that led to an improved, functional BMT Roadmap product, which will be tested as an intervention in the pediatric HCT population in the fall of 2015 (&lt;a data-itrprs=&quot;Y&quot; data-url=&quot;/science/RedirectURL?_method=externObjLink&amp;amp;_locator=url&amp;amp;_cdi=272926&amp;amp;_issn=10838791&amp;amp;_origin=article&amp;amp;_zone=art_page&amp;amp;_targetURL=http%253A%252F%252FClinicalTrials.gov&quot; href=&quot;http://clinicaltrials.gov/&quot; onclick=&quot;var newWidth=((window.screen.availWidth*90)/100);var newHeight=((window.screen.availHeight*90)/100);var parms = &#039;status=yes,location=yes,&#039; + &#039;scrollbars=yes,resizable=yes,directories=yes,&#039; + &#039;toolbar=yes,menubar=yes,&#039; + &#039;width=&#039; + newWidth + &#039;,height=&#039; + newHeight + &#039;,screenX=10,screenY=10&#039;;var externalWin; externalWin=window.open(&#039;&#039;,&#039;externObjLink&#039;,parms); externalWin.focus()&quot; target=&quot;externObjLink&quot;&gt;ClinicalTrials.gov&lt;/a&gt;&lt;a data-itrprs=&quot;Y&quot; data-url=&quot;/science/RedirectURL?_method=externObjLink&amp;amp;_locator=ctgov&amp;amp;_cdi=272926&amp;amp;_issn=10838791&amp;amp;_origin=article&amp;amp;_zone=art_page&amp;amp;_targetURL=http%253A%252F%252Fclinicaltrials.gov%252Fshow%252FNCT02409121&quot; href=&quot;http://clinicaltrials.gov/show/NCT02409121&quot; onclick=&quot;var newWidth=((window.screen.availWidth*90)/100);var newHeight=((window.screen.availHeight*90)/100);var parms = &#039;status=yes,location=yes,&#039; + &#039;scrollbars=yes,resizable=yes,directories=yes,&#039; + &#039;toolbar=yes,menubar=yes,&#039; + &#039;width=&#039; + newWidth + &#039;,height=&#039; + newHeight + &#039;,screenX=10,screenY=10&#039;;var externalWin; externalWin=window.open(&#039;&#039;,&#039;externObjLink&#039;,parms); externalWin.focus()&quot; target=&quot;externObjLink&quot;&gt;NCT02409121&lt;/a&gt;).&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Dong, Tao</style></author><author><style face="normal" font="default" size="100%">Newman, Mark W.</style></author><author><style face="normal" font="default" size="100%">Ackerman, Mark S.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">House Memory: On Activity Traces As a Form of Cultural Heritage</style></title><secondary-title><style face="normal" font="default" size="100%">ACM interactions</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">activity traces</style></keyword><keyword><style  face="normal" font="default" size="100%">cultural heritage</style></keyword><keyword><style  face="normal" font="default" size="100%">houses</style></keyword><keyword><style  face="normal" font="default" size="100%">memory</style></keyword><keyword><style  face="normal" font="default" size="100%">memory applications</style></keyword><keyword><style  face="normal" font="default" size="100%">memory traces</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive environments</style></keyword><keyword><style  face="normal" font="default" size="100%">ubicomp environments</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-OnlyDOI</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">21</style></volume><pages><style face="normal" font="default" size="100%">70–73</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;In the past few years, we have seen a wave of new &quot;smart&quot; consumer products that make everyday places aware of our activities. There are thermostats that adjust temperatures based on occupancy [&lt;a href=&quot;http://delivery.acm.org/10.1145/2660000/2654824/p70-dong.html?ip=141.213.172.39&amp;amp;id=2654824&amp;amp;acc=ACTIVE%20SERVICE&amp;amp;key=93447E3B54F7D979%2E0A17827594E6F2C8%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&amp;amp;CFID=902897302&amp;amp;CFTOKEN=71890697&amp;amp;__acm__=1487695092_bc8e3a42f4fb18e76d58a39d2c535b5d#R1&quot;&gt;1&lt;/a&gt;], doors that alert us when we forget to close them, and &quot;beacons&quot; that track our indoor locations [&lt;a href=&quot;http://delivery.acm.org/10.1145/2660000/2654824/p70-dong.html?ip=141.213.172.39&amp;amp;id=2654824&amp;amp;acc=ACTIVE%20SERVICE&amp;amp;key=93447E3B54F7D979%2E0A17827594E6F2C8%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&amp;amp;CFID=902897302&amp;amp;CFTOKEN=71890697&amp;amp;__acm__=1487695092_bc8e3a42f4fb18e76d58a39d2c535b5d#R2&quot;&gt;2&lt;/a&gt;]. With recent advances in sensor technologies and the Internet of Things, every corner of our world is slated to gain some capability of capturing our activity traces.&lt;/p&gt;&lt;p&gt;As everyday places become more aware of what we do, an enormous volume of activity traces can be captured and potentially amassed over the long run. Yet the narratives surrounding those technologies mostly focus on short-term gains in efficiency and comfort; few have considered the long-term value of those captured traces. We are concerned that traces will be discarded prematurely, since the perceived risk to privacy easily outweighs the as yet unclear benefits. Thus, it is important to ask: How might we, or rather our future generations, find digital footprints left in a place useful in the long term?&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">&quot;If These Walls Could Talk&quot;: Designing with Memories of Places</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 2014 Conference on Designing Interactive Systems</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">activity traces</style></keyword><keyword><style  face="normal" font="default" size="100%">family memory</style></keyword><keyword><style  face="normal" font="default" size="100%">memory</style></keyword><keyword><style  face="normal" font="default" size="100%">memory artifacts</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive environments</style></keyword><keyword><style  face="normal" font="default" size="100%">ubicomp environments</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2014</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2014</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-NoFile</style></url></web-urls></urls><publisher><style face="normal" font="default" size="100%">ACM</style></publisher><pub-location><style face="normal" font="default" size="100%">New York, NY, USA</style></pub-location><isbn><style face="normal" font="default" size="100%">978-1-4503-2902-6</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;p&gt;This work explores the potential value of using the enormous amount of activity traces latest ubicomp environments have started to capture. We sought to understand potential practices of using these traces in the long term through a field-based study in the USA that examines how today&#039;s people use traces left by their predecessors in the houses where they live.&lt;/p&gt;&lt;p&gt;We found that our participants received, discovered, and made use of many small traces held by artifacts, people, and building materials. Those traces were used to provide practical assistance to participants&#039; appropriation of their houses as well as to connect participants with the past in an evocative manner. Our analysis highlights the roles played by the social context and the mutability of the house in the experience of remembering the house as well as in shaping participants&#039; attitudes of passing on traces of prior appropriation of the place. To illustrate the design implications of those findings, we offer three design concepts to characterize potential ways of using traces captured by ubicomp environments in the long term.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Juri Dachtera</style></author><author><style face="normal" font="default" size="100%">Pipek, Volkmar</style></author><author><style face="normal" font="default" size="100%">Wulf, Volker</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Sharing Knowledge and Expertise: The CSCW View of Knowledge Management</style></title><secondary-title><style face="normal" font="default" size="100%">Computer Supported Cooperative Work (CSCW) Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">collective intelligence</style></keyword><keyword><style  face="normal" font="default" size="100%">cscw</style></keyword><keyword><style  face="normal" font="default" size="100%">expertise finding</style></keyword><keyword><style  face="normal" font="default" size="100%">expertise sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">information access</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">QA</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">01/2013</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">22</style></volume><pages><style face="normal" font="default" size="100%">531-573</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Knowledge Management (KM) is a diffuse and controversial term, which has been used by a large number of research disciplines. CSCW, over the last 20 years, has taken a critical stance towards most of these approaches, and instead, CSCW shifted the focus towards a practice-based perspective. This paper surveys CSCW researchers’ viewpoints on what has become called ‘knowledge sharing’ and ‘expertise sharing’. These are based in an understanding of the social contexts of knowledge work and practices, as well as in an emphasis on communication among knowledgeable humans. The paper provides a summary and overview of the two strands of knowledge and expertise sharing in CSCW, which, from an analytical standpoint, roughly represent ’generations’ of research: an ’object-centric’ and a ’people-centric’ view. We also survey the challenges and opportunities ahead.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Social Overlays: Collectively Making Websites More Usable</style></title><secondary-title><style face="normal" font="default" size="100%">14th IFIP Conference on Human-Computer Interaction (Interact 2013)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">crowdsourcing</style></keyword><keyword><style  face="normal" font="default" size="100%">social computing</style></keyword><keyword><style  face="normal" font="default" size="100%">web</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2013</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2013</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Many small organizations lack the expertise and resources to conduct usability evaluations of their websites. Social Overlays, presented here, is a new system that allows a community of users to collectively improve their website. Social Overlays enables end–users to identify and repair common user interface problems through creating “overlays” on web pages as part of their regular use, thereby improving usability while reducing the need for professional services. In short, Social Overlays harnesses the diversity of experience and ideas within a community to &quot;crowd source&quot; usability. To evaluate Social Overlays, we examined whether a group of community members without any usability training could use Social Overlays to identify and repair UI problems on their medium–sized community’s website. We found that they could. Community users were able to uncover a large number of UI problems and formulate reasonable solutions to the problems they identified. In addition, we compared Social Overlays to two standard ways of assessing web-site usability: expert inspection and usability testing. We found that Social Overlays users identified more problems, and their reported problems differed in useful ways from those found by the experts and the usability testing team.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Mira Dontcheva</style></author><author><style face="normal" font="default" size="100%">Diana Joseph</style></author><author><style face="normal" font="default" size="100%">Karrie Karahalios</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Discovery-based Games for Learning Software</style></title></titles><keywords><keyword><style  face="normal" font="default" size="100%">help</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;We propose using discovery-based learning games to teach people how to use complex software. Specifically, we developed Jigsaw, a learning game that asks players to solve virtual jigsaw puzzles using tools in Adobe Photoshop. We conducted an eleven-person lab study of the prototype, and found the game to be an effective learning medium that can complement demonstration-based tutorials. Not only did the participants learn about new tools and techniques while actively solving the puzzles in Jigsaw, but they also recalled techniques that they had learned previously but had forgotten.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Huh, Jina</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Supporting Re-Use in DIY Software Projects: A Gray-Box Approach</style></title><secondary-title><style face="normal" font="default" size="100%">Workshop on Hacking, Tinkering, Crafts &amp; Inventive Leisure Practices, ACM Conference on Computer-Supported Cooperative Work</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">collaborative help</style></keyword><keyword><style  face="normal" font="default" size="100%">configuration</style></keyword><keyword><style  face="normal" font="default" size="100%">hacking communities</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">recommender systems</style></keyword><keyword><style  face="normal" font="default" size="100%">Software customization</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2011</style></year><pub-dates><date><style  face="normal" font="default" size="100%">11/2011</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;DIYers who work with software often attempt to reuse others’ work wherever they can as they seek to assemble, modify, and extend their systems. In this paper, we briefly discuss the challenges faced by software DIYers in the process of reusing others’ software configurations through our study of the MythTV community. We also discuss the benefits of enabling users to engage with others’ configurations as “gray-boxes,” allowing them to pay attention to just the parts that must be opened up and modified and ignore the rest. We propose a new technical facility called Tailor Wear to give users guidance and hints about where and how to modify configuration artifacts by visually presenting the tailoring traces left by similar or selected peers.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Jungwoo Kim</style></author><author><style face="normal" font="default" size="100%">Atul Prakash</style></author><author><style face="normal" font="default" size="100%">Zhenan Hong</style></author><author><style face="normal" font="default" size="100%">Jacob Mandel</style></author><author><style face="normal" font="default" size="100%">Tao Dong</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Bringing the field into the lab: supporting capture and replay of contextual data for the design of context-aware applications</style></title><secondary-title><style face="normal" font="default" size="100%">Proceedings of the 23nd annual ACM symposium on User interface software and technology (UIST ’10)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">context-aware</style></keyword><keyword><style  face="normal" font="default" size="100%">data capture</style></keyword><keyword><style  face="normal" font="default" size="100%">design tools</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive environments</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2010</style></year><pub-dates><date><style  face="normal" font="default" size="100%">10/2010</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete-NoFile</style></url></web-urls></urls><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;When designing context-aware applications, it is difficult to for designers in the studio or lab to envision the contextual conditions that will be encountered at runtime. Designers need a tool that can create/re-create naturalistic contextual states and transitions, so that they can evaluate an application under expected contexts. We have designed and developed RePlay: a system for capturing and playing back sensor traces representing scenarios of use. RePlay contributes to research on ubicomp design tools by embodying a structured approach to the capture and playback of contextual data. In particular, RePlay supports: capturing naturalistic data through Capture Probes, encapsulating scenarios of use through Episodes, and supporting exploratory manipulation of scenarios through Transforms. Our experiences using RePlay in internal design projects illustrate its potential benefits for ubicomp design.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Tao Dong</style></author><author><style face="normal" font="default" size="100%">Gifford, Scott</style></author><author><style face="normal" font="default" size="100%">Kim, Jungwoo</style></author><author><style face="normal" font="default" size="100%">Mark W. Newman</style></author><author><style face="normal" font="default" size="100%">Atul Prakash</style></author><author><style face="normal" font="default" size="100%">Qidwai, Sarah</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Simplifying User-Controlled Privacy Policies</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Pervasive Computing</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">location-aware computing</style></keyword><keyword><style  face="normal" font="default" size="100%">location-based computing</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-enhancing architectures</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy-protective applications</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2009</style></year><pub-dates><date><style  face="normal" font="default" size="100%">09/2009</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">8</style></volume><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Location-aware computing infrastructures are becoming widely available.&lt;/p&gt;&lt;p&gt;However, a key problem remains: letting users manage their privacy while&lt;/p&gt;&lt;p&gt;also giving them interesting applications that take advantage of location&lt;/p&gt;&lt;p&gt;information.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">4</style></issue><section><style face="normal" font="default" size="100%">2</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Mark S. Ackerman</style></author><author><style face="normal" font="default" size="100%">Swenson, Anne</style></author><author><style face="normal" font="default" size="100%">Cotterill, Stephen</style></author><author><style face="normal" font="default" size="100%">DeMaagd, Kurtis</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">I-DIAG: from community discussion to knowledge distillation</style></title><secondary-title><style face="normal" font="default" size="100%">Communities and Technologies (C&amp;T 2003)</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">distillation</style></keyword><keyword><style  face="normal" font="default" size="100%">expertise sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">forums</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge artifact</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge management</style></keyword><keyword><style  face="normal" font="default" size="100%">knowledge sharing</style></keyword><keyword><style  face="normal" font="default" size="100%">online communities</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year><pub-dates><date><style  face="normal" font="default" size="100%">06/2003</style></date></pub-dates></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><pages><style face="normal" font="default" size="100%">307–325</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;I-DIAG is an attempt to understand how to take the collective discussions of a large group of people and distill the messages and documents into more succinct, durable knowledge. I-DIAG is a distributed environment that includes two separate applications, CyberForum and Consolidate. The goals of the project, the architecture of IDIAG, and the two applications are described. We focus on technical mechanisms to augment social maintenance and social regulation in the system.&lt;/p&gt;</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ackerman, Mark</style></author><author><style face="normal" font="default" size="100%">Darrell, Trevor</style></author><author><style face="normal" font="default" size="100%">Weitzner, Daniel J</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Privacy in context</style></title><secondary-title><style face="normal" font="default" size="100%">Human–Computer Interaction</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">IoT privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">organizational context</style></keyword><keyword><style  face="normal" font="default" size="100%">pervasive</style></keyword><keyword><style  face="normal" font="default" size="100%">privacy</style></keyword><keyword><style  face="normal" font="default" size="100%">social context</style></keyword><keyword><style  face="normal" font="default" size="100%">ubicomp</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2001</style></year></dates><urls><web-urls><url><style face="normal" font="default" size="100%">Complete</style></url></web-urls></urls><volume><style face="normal" font="default" size="100%">16</style></volume><pages><style face="normal" font="default" size="100%">167–176</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Context-aware computing offers the promise of significant user gains-the ability for systems to adapt more readily to user needs, models, and goals. Dey, Abowd, and Salber (2001) present a masterful step toward understanding context-aware applications. We examine Dey et al. in the light of privacy issues-that is, individuals&#039; control over their personal data-to highlight some of the thorny issues in context-aware computing that will be upon us soon. We argue that privacy in context-aware computing, especially those with perceptually aware environments, will be quite complex. Indeed, privacy forms a co-design space between the social, the technical, and the regulatory. We recognize that Dey et al. is a necessary first step in examining important software engineering concerns, but future research will need to consider how regulatory and technical solutions might be co-designed to form a public good.</style></abstract></record></records></xml>