Author image not provided
 Nathaniel Stanley Good

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article41.74
Citation Count1,127
Publication count27
Publication years1999-2016
Available for download21
Average downloads per article1,369.33
Downloads (cumulative)28,756
Downloads (12 Months)1,209
Downloads (6 Weeks)158
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


29 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 29
Result page: 1 2

Sort by:

1 published by ACM
April 2018 CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 42,   Downloads (12 Months): 191,   Downloads (Overall): 191

Full text available: PDFPDF
Modern mobile operating systems implement an ask-on-first-use policy to regulate applications' access to private user data: the user is prompted to allow or deny access to a sensitive resource the first time an app attempts to use it. Prior research shows that this model may not adequately capture user privacy ...
Keywords: access control, mobile permission, permission systems, privacy

2
July 2017 SOUPS'17: Proceedings of the Thirteenth USENIX Conference on Usable Privacy and Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

Current mobile platforms provide privacy management interfaces to regulate how applications access sensitive data. Prior research has shown how these interfaces are insufficient from a usability standpoint: they do not account for context . In allowing for more contextual decisions, machine-learning techniques have shown great promise for designing systems that ...

3 published by ACM
May 2016 CHI EA '16: Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 17,   Downloads (12 Months): 149,   Downloads (Overall): 312

Full text available: PDFPDF
While there has been considerable academic work over the past decade on preserving and enhancing digital privacy, little of this scholarship has influenced practitioners in design or industry. By bringing together leading privacy academics and commercial stakeholders, this workshop builds on previous gatherings at ACM conferences and in the broader ...
Keywords: design practice, guidelines, heuristics, privacy, privacy by design

4 published by ACM
February 2016 CSCW '16: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 5,   Downloads (12 Months): 78,   Downloads (Overall): 272

Full text available: PDFPDF
Distributed meetings can be messy, particularly when the task requires collaboration around multimedia artifacts. Teams must not only share a variety of materials related to the work in real time, but also need to refer back to information after a meeting ends. While video tools make it relatively easy to ...
Keywords: Communication tools, Interview, Remote collaboration, Survey, Video conferencing

5 published by ACM
September 2010 MobileHCI '10: Proceedings of the 12th international conference on Human computer interaction with mobile devices and services
Publisher: ACM
Bibliometrics:
Citation Count: 35
Downloads (6 Weeks): 7,   Downloads (12 Months): 51,   Downloads (Overall): 690

Full text available: PDFPDF
In this paper we investigate effects of the content of interruptions and of the time of interruption delivery on mobile phones. We review related work and report on a naturalistic quasi-experiment using experience-sampling that showed that the receptivity to an interruption is influenced by its content rather than by its ...
Keywords: interruption, receptivity, mobile, sms, content, context, empirical study, experience-sampling, push vs. pull, quasi-experiment

6 published by ACM
July 2009 SOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security
Publisher: ACM
Bibliometrics:
Citation Count: 17
Downloads (6 Weeks): 5,   Downloads (12 Months): 33,   Downloads (Overall): 647

Full text available: PDFPDF
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requires more user effort. We want to understand what level of control users need over their data, by examining what sorts of access policies users ...
Keywords: access control, file sharing, usability

7
April 2008 UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 1

People's work days are filled with exceptions to normal routine. These exceptions affect the security and privacy of their information access and sharing. In a recent ethnographic study of ten users in the Bay Area, we identify a number of key problems not well addressed by current data sharing technologies, ...

8
January 2008
Bibliometrics:
Citation Count: 0

Continuously interconnected network devices are now a reality for the general public, from networked desktop computers, to mobile phones, to new and upcoming technologies such as RFID and Sensor Networks. In addition to the numerous benefits that these technologies provide, there is concern that computer devices continuously connected to the ...

9 published by ACM
July 2007 SIGIR '07: Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval
Publisher: ACM
Bibliometrics:
Citation Count: 200
Downloads (6 Weeks): 7,   Downloads (12 Months): 65,   Downloads (Overall): 2,964

Full text available: PDFPDF
We describe an approach for extracting semantics of tags, unstructured text-labels assigned to resources on the Web, based on each tag's usage patterns. In particular, we focus on the problem of extracting place and event semantics for tags that are assigned to photos on Flickr, a popular photo sharing website ...
Keywords: place identification, event identification, tag semantics, tagging systems, word semantics

10 published by ACM
May 2007 WWW '07: Proceedings of the 16th international conference on World Wide Web
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 2,   Downloads (12 Months): 5,   Downloads (Overall): 597

Full text available: PDFPDF
We address the problem of extracting semantics of tags -- short, unstructured text-labels assigned to resources on the Web -- based on each tag's metadata patterns. In particular, we describe an approach for extracting place and event semantics for tags that are assigned to photos on Flickr, a popular photo ...
Keywords: place identification, event identification, tagging systems, word semantics

11 published by ACM
April 2007 CHI '07: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 93
Downloads (6 Weeks): 16,   Downloads (12 Months): 157,   Downloads (Overall): 2,891

Full text available: PDFPDF
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge - especially when the persistent nature of the media and associated context reveals details about the physical and social context in which the media items were created. In a first-of-its-kind study, we use context-aware camerephone devices ...
Keywords: context-aware, location-aware, online content, photo sharing, photos, privacy, social software

12 published by ACM
April 2007 CHI '07: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 28
Downloads (6 Weeks): 2,   Downloads (12 Months): 30,   Downloads (Overall): 726

Full text available: PDFPDF
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report on a study of software installation to assess the effectiveness of different notices for helping people make better decisions on which software to install. Our ...
Keywords: end user license agreement, notice, privacy, security, spyware, timing

13
February 2007 FC'07/USEC'07: Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 9

We evaluate the usability of End User License Agreements (EULAs) of popular consumer programs. Results from an empirical evaluation of 50 popular programs show the lack of accessibility and readability of notices. Our data from a recent study with 64 users involved in installation tasks confirms the public perception that ...
Keywords: end user license agreement, notice, HCI, privacy, security, legal issues

14 published by ACM
August 2006 KDD '06: Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Publisher: ACM
Bibliometrics:
Citation Count: 55
Downloads (6 Weeks): 4,   Downloads (12 Months): 32,   Downloads (Overall): 1,251

Full text available: PDFPDF
The goal of a recommender system is to suggest items of interest to a user based on historical behavior of a community of users. Given detailed enough history, item-based collaborative filtering (CF) often performs as well or better than almost any other recommendation method. However, in cold-start situations - where ...
Keywords: collaborative filtering, hybrid content and collaborative filtering, performance analysis, naïve filterbots, recommender systems, cold start, robustness

15 published by ACM
November 2005 MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 2,   Downloads (12 Months): 9,   Downloads (Overall): 323

Full text available: PDFPDF
As cameraphones become the dominant platform for consumer multimedia capture worldwide, multimedia researchers are faced both with the challenge of how to help users manage the billions of photographs they are collectively producing and the opportunity to leverage cameraphones' ability to automatically capture temporal, spatial, and social contextual metadata to ...
Keywords: GPS, collaborative filtering, digital image management, machine learning, wireless multimedia, social networks, ubiquitous computing, contextual metadata, bluetooth, location-based services, pervasive computing, social software

16 published by ACM
November 2005 MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 21
Downloads (6 Weeks): 4,   Downloads (12 Months): 22,   Downloads (Overall): 906

Full text available: PDFPDF
In this paper, we focus on the use of context-aware, collaborative filtering, machine-learning techniques that leverage automatically sensed and inferred contextual metadata together with computer vision analysis of image content to make accurate predictions about the human subjects depicted in cameraphone photos. We apply Sparse-Factor Analysis (SFA) to both the ...
Keywords: PCA, context-aware, SFA, face recognition, cameraphone

17 published by ACM
July 2005 SOUPS '05: Proceedings of the 2005 symposium on Usable privacy and security
Publisher: ACM
Bibliometrics:
Citation Count: 38
Downloads (6 Weeks): 3,   Downloads (12 Months): 37,   Downloads (Overall): 1,392

Full text available: PDFPDF
Spyware is a significant problem for most computer users. The term "spyware" loosely describes a new class of computer software. This type of software may track user activities online and offline, provide targeted advertising and/or engage in other types of activities that users describe as invasive or undesirable.While the magnitude ...
Keywords: ToS, privacy, security and usability, terms of service, EULA, spyware, end user license agreement, notice

18 published by ACM
October 2004 WPES '04: Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 1,352

Full text available: PDFPDF
Keywords: policy, privacy, RFID, information goods, law

19 published by ACM
October 2004 MULTIMEDIA '04: Proceedings of the 12th annual ACM international conference on Multimedia
Publisher: ACM
Bibliometrics:
Citation Count: 64
Downloads (6 Weeks): 2,   Downloads (12 Months): 25,   Downloads (Overall): 1,452

Full text available: PDFPDF
The recent popularity of mobile camera phones allows for new opportunities to gather important metadata at the point of capture. This paper describes a method for generating metadata for photos using spatial, temporal, and social context. We describe a system we implemented for inferring location information for pictures taken with ...
Keywords: contextual metadata, mobile camera phones, location-based services, wireless multimedia applications, context-to-content inference, content-based image retrieval

20



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us