Evolving Needs in Iot control and Accountability


Download 481.47 Kb.
bet21/21
Sana14.05.2023
Hajmi481.47 Kb.
#1459496
1   ...   13   14   15   16   17   18   19   20   21
Bog'liq
Evolving Needs in IoT Control and Accountability A

Comput. Support. Coop. Work CSCW 13, 2 (2004), 125–154.

  1. Volkmar Pipek. 2005. From tailoring to appropriation support: Negotiating groupware usage. University of Oulu Oulu.

Evolving Needs in IoT Control and Accountability: A Longitudinal Study on Smart Home… • 171:27



  1. Erika Shehan Poole, Marshini Chetty, Rebecca E. Grinter, and W. Keith Edwards. 2008. More than meets the eye: transforming the user experience of home network management. In Proceedings of the 7th ACM conference on Designing interactive systems, 455–464.

  2. Erika Shehan Poole, Marshini Chetty, Tom Morgan, Rebecca E. Grinter, and W. Keith Edwards. 2009. Computer help at home: methods and motivations for informal technical support. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 739–748.

  3. Dave Randall. 2006. Living inside a smart home: A case study. In Inside the smart home. Springer Science & Business Media, London, 227–246.

  4. Christian Reinisch, Wolfgang Kastner, Georg Neugschwandtner, and Wolfgang Granzer. 2007. Wireless technologies in home and building automation. In Industrial Informatics, 2007 5th IEEE International Conference on, 93–98.

  5. Markus Rohde, Peter Brödner, Gunnar Stevens, Matthias Betz, and Volker Wulf. 2016. Grounded Design–a praxeological IS research perspective. J. Inf. Technol. (2016).

  6. Anthonie B. Ruighaver, Sean B. Maynard, and Shanton Chang. 2007. Organisational security culture: Extending the end-user perspective. Comput. Secur. 26, 1 (2007), 56–62.

  7. Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, and Kent Seamons. 2017. Weighing context and trade-offs: How suburban adults selected their online security posture. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association.

  8. Martina Angela Sasse, Sacha Brostoff, and Dirk Weirich. 2001. Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT Technol. J. 19, 3 (2001), 122–131.

  9. Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015. A Design Space for Effective Privacy Notices.

Appear In (2015).

  1. Tobias Schwartz, Gunnar Stevens, Timo Jakobi, Sebastian Denef, Leonardo Ramirez, Volker Wulf, and Dave Randall. 2014. What People Do with Consumption Feedback: A Long-Term Living Lab Study of a Home Energy Management System. Interact. Comput. 26, 3 (April 2014), iwu009. DOI:https://doi.org/10.1093/iwc/iwu009

  2. Ben Shneiderman. 1996. The eyes have it: A task by data type taxonomy for information visualizations. In Visual Languages, 1996. Proceedings., IEEE Symposium on, 336–343.

  3. Jeffrey M. Stanton, Kathryn R. Stam, Paul Mastrangelo, and Jeffrey Jolton. 2005. Analysis of end user security behaviors. Comput. Secur. 24, 2 (2005), 124–133.

  4. Martin Stein, Alexander Boden, Dominik Hornung, Volker Wulf, In Markus Garschall, Theo Hamm, Claudia Müller, Katja Neureiter, Marén Schorch, and Lex van Velsen. 2016. Third Spaces in the Age of IoT: A Study on Participatory Design of Complex Systems. In Symposium on Challenges and experiences in designing for an ageing society, 12th International Conference on Designing Interactive Systems (COOP).

  5. Gunnar Stevens, Volkmar Pipek, and Volker Wulf. 2009. Appropriation infrastructure: Supporting the design of usages. In End-user development. Springer, 50–69.

  6. Gunnar Stevens and Volker Wulf. 2009. Computer-supported access control. ACM Trans. Comput.-Hum. Interact. TOCHI 16, 3 (2009), 12.

  7. Yolande Strengers. 2011. Negotiating everyday life: The role of energy and water consumption feedback. J. Consum. Cult. 11, 3 (2011), 319–338.

  8. Nagender Kumar Suryadevara, Subhas C. Mukhopadhyay, Ruili Wang, and R. K. Rayudu. 2013. Forecasting the behavior of an elderly using wireless sensors data in a smart home. Eng. Appl. Artif. Intell. 26, 10 (2013), 2641–2652.

  9. Lie Ming Tang and Judy Kay. 2017. Harnessing Long Term Physical Activity Data—How Long-term Trackers Use Data and How an Adherence-based Interface Supports New Insights. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 1, 2 (June 2017), 1–28.

DOI:https://doi.org/10.1145/3090091

  1. The European Parliament and the Council. 2016. REGULATION (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).

  2. Peter Tolmie, Andy Crabtree, Tom Rodden, James Colley, and Ewa Luger. 2016. “This has to be the cats”: Personal Data Legibility in Networked Sensing Systems. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing, 491–502.

  3. Peter Tolmie, Andy Crabtree, Tom Rodden, Chris Greenhalgh, and Steve Benford. 2007. Making the home network at home: Digital housekeeping. In ECSCW 2007. Springer, 331–350.

  4. Daphne Townsend, Frank Knoefel, and Rafik Goubran. 2011. Privacy versus autonomy: a tradeoff model for smart home monitoring technologies. In Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE, 4749–4752.

  5. Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The current state of access control for smart devices in homes. In Workshop on Home Usable Privacy and Security (HUPS).

  6. Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders Versus Intrusiveness: Teens’ and Parents’ Perspectives on Home- entryway Surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ’14), 129–139. DOI:https://doi.org/10.1145/2632048.2632107

  7. Blase Ur, Elyse McManus, Melwyn Pak Yong Ho, and Michael L. Littman. 2014. Practical trigger-action programming in the smart home. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 803–812.

  8. Blase Ur, Melwyn Pak Yong Ho, Stephen Brawner, Jiyun Lee, Sarah Mennicken, Noah Picard, Diane Schulze, and Michael L. Littman. 2016. Trigger-action programming in the wild: An analysis of 200,000 ifttt recipes. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3227–3231.

  9. Mark Weiser. 1991. The computer for the 21st century. Sci. Am. 265, 3 (1991), 94–104.

171:28. • T. Jakobi et al.



  1. Jong-bum Woo and Youn-kyung Lim. 2015. User experience in do-it-yourself-style smart homes. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 779–790.

  2. Jong-bum Woo and Youn-kyung Lim. 2015. User Experience in Do-it-yourself-style Smart Homes. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp ’15), 779–790.

DOI:https://doi.org/10.1145/2750858.2806063

  1. Volker Wulf, Claudia Müller, Volkmar Pipek, David Randall, Markus Rohde, and Gunnar Stevens. 2015. Practice-Based Computing: Empirically Grounded Conceptualizations Derived from Design Case Studies. In Designing Socially Embedded Technologies in the Real-World, Volker Wulf, Kjeld Schmidt and David Randall (eds.). Springer London, London, 111–150.

DOI:https://doi.org/10.1007/978-1-4471-6720-4_7

  1. Volker Wulf, Markus Rohde, V Pipek, and G Stevens. 2011. Engaging with practices: design case studies as a research framework in CSCW. Proc. ACM 2011 Conf. Comput. Support. Coop. Work (2011), 505–512.

  2. Rayoung Yang and MW Newman. 2013. Learning from a learning thermostat: lessons for intelligent systems for the home. Proc. 2013 ACM Int. Jt. Conf. Pervasive Ubiquitous Comput. (2013), 93–102.

  3. Daqing Zhang, Tao Gu, and Xiaohang Wang. 2005. Enabling context-aware smart home with semantic web technologies. Int. J. Hum.-Friendly Welf. Robot. Syst. 6, 4 (2005), 12–20.

  4. Smart Homes Market Size, Share| Future, Trends Estimate 2025. Retrieved September 16, 2017 from http://www.transparencymarketresearch.com/smart-homes-market.html

Received February 2018; revised June 2018; revised October 2018; accepted October 2018




Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. Vol. 2, No.4, Article 171. Publication date: December 2018.



Download 481.47 Kb.

Do'stlaringiz bilan baham:
1   ...   13   14   15   16   17   18   19   20   21




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling