Publications

Publication date:
We aim to advance the understanding of individual security decision-making, by combining formal and behavioral analysis. We sketch a game-theoretic model of security decision-making that generalizes the
Publication date:
Using an ethnographic approach, this study sought to understand how the personal aspirations and social landscapes of Ghanaians living in London shaped their use of a constellation of new information and communication technologies (ICTs) such as camcorders, digital cameras, the internet and mobile phones. Two trajectories of ICT use were discovered among the individuals interviewed. One…
Publication date:
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remains highly variable across the Internet population, allowing attacks such as distributed denialof- service (DDoS) and spam distribution to continue unabated. By modeling security investment decision-making in established (e.g…
Publication date:
In studying categorization, cognitive science has focused primarily on cultural categorization, ignoring individual and institutional categorization. Because recent technological developments have made individual and institutional classification systems much more available and powerful, our understanding of the cognitive and social mechanisms that produce these systems is increasingly important.…
Publication date:
Should users of technically protected content be able to give notice and require content owners to take down the technical measure to enable fair uses?
Publication date:
In this talk, I will describe the design of new expressive tools that take advantage of people's familiarity with the physical world, and studies of how these new tools expand the interaction space and the change that could be brought out in the way people perceive this extended interaction space. I will present two example systems: I/O Brush and Spyn, and discuss the role technology could play…
Publication date:
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. Using qualitative methods, we find evidence that those who use tag clouds do so primarily because they are perceived as having an inherently social or personal component, in that they suggest what a person or a group of…
Publication date:

Purpose - To look at blogs from a more context-oriented view, and so deconstruct them into structures which are more contextual than just focused on the content, facilitating flexible reuse of these structures.

Design/methodology/approach - Looks at the underlying structures of blogs and blog posts, representing them as multi-ended links. This…

Publication date:

In many collaborative research settings, electronic bibliographic repositories (bibliographies) are used to aggregate information about related work among researchers. These bibliographies allow for group bibliography collection, individual tracking of each user’s library, and personal annotation capabilities within each user’s library. However, most tools used for managing bibliographic data…

Publication date:
Considering how intellectual property law has evolved in response to advances in computing technologies.
Publication date:
Administrative agencies increasingly rely on technology to promote the substantive goals they are charged to pursue. The U.S. Department of Health and Human Services has prioritized digitized personal health data as a means for improving patient safety and reducing bureaucratic costs. The Department of Justice hosts electronic databases that pool information between agencies to facilitate…
Publication date:
This paper relates our experiences at the University of California, Berkeley (UC Berkeley), designing a service science discipline. We wanted to design a discipline of service science in a principled and theoretically motivated way. We began our work by asking, ''What questions would a service science have to answer?'' and from that we developed a new framework for understanding service science.…
Publication date:
This paper reports on the results of two questionnaires asking biologists about the incorporation of text-extracted entity information, specifically gene and protein names, into bioscience literature search user interfaces. Among the findings are that study participants want to see gene/protein metadata in combination with organism information; that a significant proportion would like to see gene…
Publication date:
Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect…
Publication date:
Smallholder farmers face many challenges competing in the global marketplace. One major constraint is the lack of access to information and communications, which could be used to make decisions and reach new markets. In this paper, drawing from our experiences designing agricultural information systems in India and Central America, we provide a framework for understanding inter-stakeholder…
Publication date:
We propose an economic model based on user utility to study the adoption of new network architectures such as IPv6. We use mathematical analysis and simulation studies to understand the role of various factors such as user and network bene ts, switching costs, and the impact of converters on the adoption of new network architectures. In addition to corroborating various commonly held beliefs…
Publication date:
I analyze the equilibria of a game based on the ad auction used by Google and Yahoo. This auction is closely related to the assignment game studied by Shapley
Publication date:
Consumers expect to be able to do at least as much with digital content as they have been able to do with analog content, and more. Yet, some copyright owners are using technical protection measures to thwart certain consumer uses of digital content, and rarely do they give effective notice to consumers about these technical restrictions. This article identifies six types of consumer harms that…