Non-contractual trust, design, and human and computer interactions
Conference Proceeding
Marsh, S., Davenport, E., Dibben, M., Friedman, B., March, S., Rosenbaum, H., & Thimbleby, H. (2000)
Non-contractual trust, design, and human and computer interactions. In CHI 2000 Proceedings (239-240). https://doi.org/10.1145/633292.633432
How might trust be a component of human-computer based interaction? There are a number of dimensions involving different combinations of humans, systems and computer agents. R...
Tracing innovation: an activity theoretical approach.
Conference Proceeding
Wiegel, V. (2011)
Tracing innovation: an activity theoretical approach. In ECIS 2011 Proceedings
This paper argues that tracing the diffusion of innovation is a challenging endeavour. The difficulty is that an innovation comes into existence as a cognitive and inter-perso...
Technology for supporting care staff in residential homes.
Journal Article
Webster, G., & Hanson, V. L. (2014)
Technology for supporting care staff in residential homes. ACM transactions on accessible computing, 5, 8. https://doi.org/10.1145/2543577
Care staff, those who attend to the day-to-day needs of people in residential facilities, represent an important segment of the health-care provision of those entrusted to the...
Social intelligence in the age of networks
Journal Article
Davenport, E. (2000)
Social intelligence in the age of networks. Journal of Information Science, 26(3), (145-152). doi:10.1177/016555150002600304. ISSN 0165-5515
The author explores the concept of ‘social intelligence’. She
suggests that, in the world of digital commerce, it may be
defined as ‘insight which is based on collective under...
A lightweight treatment of Inexact dates
Conference Proceeding
Nguyen, H. H., Taylor, S., Webster, G., Jekjantuk, N., Mellish, C., Pan, J. Z., …Byrne, K. (2015)
A lightweight treatment of Inexact dates. In V. Wuwongse, M. Buranarach, T. Supnithi, T. Yamaguchi, & J. Z. Pan (Eds.), Semantic Technology : 4th Joint International Conference, JIST 2014 Chiang Mai, Thailand, November 9–11, 2014 Revised Selected Papers. , (187-193). https://doi.org/10.1007/978-3-319-15615-6_14
This paper presents a lightweight approach to representing inexact dates on the semantic web, in that it imposes minimal ontological commitments on the ontology author and pro...
Two phenomenological studies of place.
Presentation / Conference
Turner, P., & Turner, S. (2003, January)
Two phenomenological studies of place. Paper presented at BCS- HCI Conference 2003
We introduce our initial investigations into the phenomenology of place
as part of the BENOGO project. BENOGO is concerned with giving
people the experience of ‘being there wi...
Monitoring information security risks within health care
Journal Article
van Deursen, N., Buchanan, W. J., & Duff, A. (2013)
Monitoring information security risks within health care. Computers and Security, 37, 31-45. https://doi.org/10.1016/j.cose.2013.04.005
This paper presents an overview of possible risks to the security of health care data. These
risks were detected with a novel approach to information security. It is based on ...
Initiating e-Participation Through a Knowledge Working Network
Conference Proceeding
Rasmussen, L., Davenport, E., & Horton, K. (2006)
Initiating e-Participation Through a Knowledge Working Network. In R. Suomi, R. Cabral, J. F. Hampe, A. Heikkila, & J. Jarvelainen (Eds.), Project E-Society: Building Bricks. IFIP International Federation for Information Processing, 96-108. https://doi.org/10.1007/978-0-387-39229-5_9
The authors present a study of e-participation within a public sector agency (PSA), where a number of knowledge management initiatives have been introduced since the inception...
Understanding sociotechnical action: an introduction to the special issue.
Journal Article
Horton, K., Davenport, E., & Wood-Harper, T. (2004)
Understanding sociotechnical action: an introduction to the special issue. International Journal of Technology and Human Interaction, 1, 1-6
No abstract available. Item is Editorial preface to special issue.
Contextual grounding in CVE design.
Journal Article
Turner, P., & Turner, S. (2001)
Contextual grounding in CVE design. Presence: Teleoperators and Virtual Environments, 14, (30-38). ISSN 1054-7460
A proper respect for eventual context of use is crucially important for the success of virtual
environments destined for real-world organisations, yet is frequently absent fro...