researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2007
2008
2009
2010
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
access control
case study
context-aware
data-flow
database
deployment
design
design complexity
e-science
graph-rewriting
human-computer interaction
maintenance
meta-model
object-role modeling
rewriting
rule-based
security
wiki
Filter by Author
[+]
OR
AND
NOT
1
C. Travis Bowles
David Botta
David Gurzick
Eben M. Haber
Eser Kandogan
Ismail Ari
Jhilmil Jain
Jie Cui
John Bailey
Jun Li
Kenya Freeman Oduor
Kevin F. White
Kirstie Hawkey
Konstantin Beznosov
Lance Bloom
Mary Beth Rosson
Min Wu
Nicole F. Velasquez
Paul P. Maglio
Wayne G. Lutters
Filter by Top terms
[+]
OR
AND
NOT
1
acm
chimit
collaborative
computer
design
guidelines
human
information
interaction
management
managing
network
proceedings
security
symposium
system
technology
understanding
user
using
CHIMIT (chimit)
Editions
Publications
Viewing Publication 1 - 57 from 57
2010
Transparent collaboration: letting users simulate another user s world
C. Travis Bowles
,
Min Wu
.
chimit 2010
:
7
[doi]
People frames: the social construction of information systems
Daniel B. le Roux
,
G. P. le Roux
.
chimit 2010
:
1
[doi]
A collaborative ontology development tool for information security managers
John C. Mace
,
Simon Edward Parkin
,
Aad P. A. van Moorsel
.
chimit 2010
:
5
[doi]
Proceedings of the 4th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2010, San Jose, CA, USA, November 12-13, 2010
Adam Moskowitz
,
Nicole Forsgren
,
Tamara Babaian
,
Konstantin Beznosov
, editors,
ACM,
2010.
Towards a task oriented method for accessing network based services
Nils Pedersen
,
Paul Clark
,
Martine Freiberger
.
chimit 2010
:
6
[doi]
Filter-based access control model: exploring a more usable database management
Nachi Ueno
,
Ryota Hashimoto
,
Hisaharu Ishii
,
Hiroyuki Makino
,
Yuzuru Kitayama
.
chimit 2010
:
3
[doi]
Johnny can drag and drop: determining user intent through traditional interactions to improve desktop security
Patrick F. Wilbur
,
Todd Deshane
.
chimit 2010
:
4
[doi]
Principles for applying social navigation to collaborative systems
Min Wu
,
C. Travis Bowles
.
chimit 2010
:
2
[doi]
2009
Storage administration: field findings and software design guidelines
Lance Bloom
,
Nancy Clark
.
chimit 2009
:
[doi]
Proceedings of the 3rd ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2009, Baltimore, Maryland, USA, November 7-8, 2009
Eben M. Haber
,
Wayne G. Lutters
,
Wendy T. Lucas
,
Jhilmil Jain
,
Kirstie Hawkey
, editors,
ACM,
2009.
A case study of enterprise identity management system adoption in an insurance organization
Pooya Jaferian
,
David Botta
,
Kirstie Hawkey
,
Konstantin Beznosov
.
chimit 2009
:
[doi]
Scripting practices in complex systems management
Eser Kandogan
,
Paul P. Maglio
,
Eben M. Haber
,
John H. Bailey
.
chimit 2009
:
[doi]
Visual support for analyzing network traffic and intrusion detection events using TreeMap and graph representations
Florian Mansmann
,
Fabian Fischer
,
Daniel A. Keim
,
Stephen C. North
.
chimit 2009
:
[doi]
An intelligent contextual support system for intrusion detection tasks
Balaji Rajendran
,
Dnyanesh Pawar
.
chimit 2009
:
[doi]
Self service technologies: eliminating pain points of traditional call centers
Jakita O. Thomas
,
Yolanda A. Rankin
,
Neil Boyette
.
chimit 2009
:
[doi]
Soramame: what you see is what you control access control user interface
Nachi Ueno
,
Ryota Hashimoto
,
Michio Shimomura
,
Kenji Takahashi
.
chimit 2009
:
[doi]
System administrators as broker technicians
Nicole F. Velasquez
,
Suzanne P. Weisband
.
chimit 2009
:
[doi]
Wiki anxiety: impediments to implementing wikis for IT support groups
Kevin F. White
,
David Gurzick
,
Wayne G. Lutters
.
chimit 2009
:
[doi]
Network stack diagnosis and visualization tool
Krist Wongsuphasawat
,
Pornpat Artornsombudh
,
Bao Nguyen
,
Justin McCann
.
chimit 2009
:
[doi]
2008
IT-management software deployment: field findings and design guidelines
Lance Bloom
,
Nancy Clark
.
chimit 2008
:
8
[doi]
Multiple people and components: considerations for designing multi-user middleware
Jeffrey A. Calcaterra
,
John Bailey
,
Kenya Freeman Oduor
.
chimit 2008
:
10
[doi]
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2008, San Diego, California, USA, November 14-15, 2008
AEleen Frisch
,
Eser Kandogan
,
Wayne G. Lutters
,
James D. Thornton
,
Mustapha Mouloua
, editors,
ACM,
2008.
Understanding and supporting personal activity management by IT service workers
VÃctor M. González
,
Leonardo Galicia
,
Jesús Favela
.
chimit 2008
:
2
[doi]
Analysing a workflow management system: three levels of failure
Tom Gross
,
Samuli Pekkola
.
chimit 2008
:
13
[doi]
System administrator teamwork: evidence from the SAGE salary survey
Eben M. Haber
.
chimit 2008
:
14
[doi]
Network authentication using single sign-on: the challenge of aligning mental models
Rosa R. Heckle
,
Wayne G. Lutters
,
David Gurzick
.
chimit 2008
:
6
[doi]
Guidelines for designing IT security management tools
Pooya Jaferian
,
David Botta
,
Fahimeh Raja
,
Kirstie Hawkey
,
Konstantin Beznosov
.
chimit 2008
:
7
[doi]
Understanding the challenges faced during the management of data mining models
Jhilmil Jain
,
Ismail Ari
,
Jun Li
.
chimit 2008
:
11
[doi]
Designing dashboards for managing model lifecycle
Jhilmil Jain
,
Ismail Ari
,
Jun Li
.
chimit 2008
:
12
[doi]
Policy-based IT automation: the role of human judgment
Eser Kandogan
,
John Bailey
,
Paul P. Maglio
,
Eben M. Haber
.
chimit 2008
:
9
[doi]
Work practices of system administrators: implications for tool design
Nicole F. Velasquez
,
Suzanne P. Weisband
.
chimit 2008
:
1
[doi]
Sysadmins and the need for verification information
Nicole F. Velasquez
,
Alexandra Durcikova
.
chimit 2008
:
4
[doi]
Information displays for managing shared files
Tara Whalen
,
Elaine G. Toms
,
James Blustein
.
chimit 2008
:
5
[doi]
Towards virtualizing the helpdesk: assessing the relevance of knowledge across distance
Kevin F. White
,
Wayne G. Lutters
,
Anita Komlodi
.
chimit 2008
:
3
[doi]
2007
Network-centricity: hindered by hierarchical anchors
Steve Abrams
,
Gloria Mark
.
chimit 2007
:
7
[doi]
Using a process graph to improve system-user knowledge sharing
Tamara Babaian
,
Wendy T. Lucas
,
Heikki Topi
.
chimit 2007
:
9
[doi]
Activity-based management of IT service delivery
John Bailey
,
Eser Kandogan
,
Eben M. Haber
,
Paul P. Maglio
.
chimit 2007
:
5
[doi]
Understanding complex IT environments using information analytics and visualization
Amit Behal
,
Ying Chen
,
Cheryl A. Kieliszewski
,
Ana Lelescu
,
Bin He
,
Jie Cui
,
Jeffrey T. Kreulen
,
E. Michael Maximilien
,
James Rhodes
,
W. Scott Spangler
.
chimit 2007
:
8
[doi]
Transcending organizational boundaries: virtual team approach in UI guideline development
Richard E. Cordes
,
Thomas M. Spine
.
chimit 2007
:
7
[doi]
Understanding documentation value in software maintenance
Sumita Das
,
Wayne G. Lutters
,
Carolyn B. Seaman
.
chimit 2007
:
2
[doi]
Integration and organization of information for display
Asaf Degani
,
Michael G. Shafto
,
Leonard Olson
.
chimit 2007
:
1
[doi]
Supporting expertise awareness: finding out what others know
Christian Dörner
,
Volkmar Pipek
,
Markus Won
.
chimit 2007
:
9
[doi]
Looking for trouble: understanding end-user security management
Joshua B. Gross
,
Mary Beth Rosson
.
chimit 2007
:
10
[doi]
Design guidelines for system administration tools developed through ethnographic field studies
Eben M. Haber
,
John Bailey
.
chimit 2007
:
1
[doi]
User help techniques for usable security
Almut Herzog
,
Nahid Shahmehri
.
chimit 2007
:
11
[doi]
Telling the user s story
Virginia Hill
,
Velda Bartek
.
chimit 2007
:
6
[doi]
Cube management system: a tangible interface for monitoring large scale systems
Elliot Jaffe
,
Aviva Dayan
,
Amnon Dekel
.
chimit 2007
:
4
[doi]
Bridging artifacts and actors: supporting knowledge and expertise sharing work practices through technology
Aditya Johri
,
Volkmar Pipek
,
Volker Wulf
,
Michael Veith
.
chimit 2007
:
4
[doi]
Proceedings of the 1st ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT 2007, Cambridge, Massachusetts, USA, March 30-31, 2007
Eser Kandogan
,
Patricia M. Jones
, editors,
ACM,
2007.
IT ecosystems: evolved complexity and unintelligent design
James L. Lentz
,
Terry M. Bleizeffer
.
chimit 2007
:
6
[doi]
Towards an understanding of decision complexity in IT configuration
Bin Lin
,
Aaron B. Brown
,
Joseph L. Hellerstein
.
chimit 2007
:
3
[doi]
Managing technology use and learning in nonprofit community organizations: methodological challenges and opportunities
Cecelia Merkel
,
Umer Farooq
,
Lu Xiao
,
Craig H. Ganoe
,
Mary Beth Rosson
,
John M. Carroll
.
chimit 2007
:
8
[doi]
Deciding when to trust automation in a policy-based city management game: policity
Kenya Freeman Oduor
,
Christopher S. Campbell
.
chimit 2007
:
2
[doi]
Using SITDRM for privacy rights management
Farzad Salim
,
Nicholas Paul Sheppard
,
Reihaneh Safavi-Naini
.
chimit 2007
:
11
[doi]
Midweight collaborative remembering: wikis in the workplace
Kevin F. White
,
Wayne G. Lutters
.
chimit 2007
:
5
[doi]
The small world and scale-free structure of an internet technical community
Jie Yan
,
Dimitris Assimakopoulos
.
chimit 2007
:
10
[doi]
Managing collaborative activities in project management
Shaoke Zhang
,
Chen Zhao
,
Qiang Zhang
,
Hui Su
,
Haiyan Guo
,
Jie Cui
,
Yingxin Pan
,
Paul Moody
.
chimit 2007
:
3
[doi]
Sign in
or
sign up
to see more results.