{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T16:11:44Z","timestamp":1658506304952},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Synthesis Lectures on Human-Centered Informatics"],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.2200\/s00228ed1v01y200911hcr007","type":"journal-article","created":{"date-parts":[[2010,2,12]],"date-time":"2010-02-12T11:51:19Z","timestamp":1265975479000},"page":"1-118","source":"Crossref","is-referenced-by-count":1,"title":["Designing and Evaluating Usable Technology in Industrial Research: Three Case Studies"],"prefix":"10.1007","volume":"3","author":[{"given":"Clare-Marie","family":"Karat","sequence":"first","affiliation":[]},{"given":"John","family":"Karat","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"p_4","doi-asserted-by":"crossref","unstructured":"A. Adams, and A Sasse . (2001 )Privacy in Multimedia Communications: Protecting Users, Not Just Data. In A. Blandford, J. Vanderdonkt and P. Gray [Eds.]: People and Computers XV - Interaction without frontiers .Joint Proceedings of HCI2001 and ICM2001,Lille, Sept. 2001. pp.49 -64 . Springer. 58","DOI":"10.1007\/978-1-4471-0353-0_4"},{"key":"p_5","doi-asserted-by":"crossref","unstructured":"A. Anton, Q. He, and D Baumer . (2004 )The complexity underlying JetBlue's privacy policy violations .IEEE Security and Privacy. August\/September, 2004. DOI: 10.1109\/MSP.2004.103 6210.1109\/MSP.2004.103","DOI":"10.1109\/MSP.2004.103"},{"key":"p_6","volume-title":"Enterprise Privacy Architecture Language (EPAL 1.2). W3C Member Submission dateMonth11Day10Year200310-Nov-2003. http:\/\/www.w3.org\/Submission\/EPAL\/. 61","author":"Ashley P.","year":"2003"},{"key":"p_7","doi-asserted-by":"crossref","unstructured":"V. Anupam, R. Hull, and B Kumar . (2001 ).Personalizing e-commerce applications with online heuristic decision making .Proceedings of the tenth International World Wide Web Conference on World Wide Web. New York: ACM, 296-307. 31","DOI":"10.1145\/371920.372073"},{"key":"p_9","doi-asserted-by":"crossref","unstructured":"R. Barrett, P. Maglio, and D Kellem . (1997 ).How to personalize the Web .Proceedings of CHI'97(Atlanta, GA, March, 1997). New York: ACM, 75-82. DOI: 10.1145\/258549.258595 3110.1145\/258549.258595","DOI":"10.1145\/258549.258595"},{"key":"p_10","first-page":"1","volume":"1","author":"Berreby D.","year":"1999","journal-title":"IBM Research Magazine"},{"key":"p_11","doi-asserted-by":"crossref","DOI":"10.1147\/JRD.2009.5429045","volume":"53","author":"Bertino E.","year":"2009","journal-title":"IBM Journal of Research and Development"},{"key":"p_12","volume-title":"Contextual Design","author":"Beyer H.","year":"1998"},{"key":"p_13","unstructured":"C. Brodie, D. George, C. Karat, J. Karat, J. Lobo, M. Beigi, X. Wang, S. Calo, and D. Verma, The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment .Proceedings of the IEEE Policy Conference, 1-3. DOI: 10.1109\/POLICY.2008 .25 58, 7710.1109\/POLICY.2008.25"},{"key":"p_14","doi-asserted-by":"crossref","unstructured":"C. Brodie, C. Karat, and J Karat . (2006 ).An Empirical Study of Natural Language Parsing of Privacy Policy Rules Using the SPARCLE Policy Workbench .Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS2006. ACM Digital Library, 1-12. DOI: 10.1145\/1143120.1143123 5710.1145\/1143120.1143123","DOI":"10.1145\/1143120.1143123"},{"key":"p_15","first-page":"57","volume":"56","author":"Brodie C.","year":"2004","journal-title":"May."},{"key":"p_16","doi-asserted-by":"crossref","unstructured":"C. Brodie, C. Karat, J. Karat, and J Feng . (2005 ).Usable Security and Privacy: A Case Study of Developing Privacy Management Tools. In the Proceedings of the 2005 Symposium on Usable Privacy and Security, ACM Digital Library, July, 1-12. DOI: 10.1145\/1073001.1073005 5710.1145\/1073001.1073005","DOI":"10.1145\/1073001.1073005"},{"key":"p_17","unstructured":"R. Burke Integrating Knowledge-Based and Collaborative-Filtering. In Proceedings of AAAI 1999 Workshop on AI and Electronic Commerce.14-20. 31"},{"key":"p_18","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-61520-855-5.ch008","volume-title":"Policy Technology for Security Management in Coalition Networks","author":"Calo S.","year":"2010"},{"key":"p_19","doi-asserted-by":"crossref","unstructured":"J. Coble, J. Karat, and M Kahn . (1997 ).Maintaining a focus on on user requirements throughout the development of clinical workstation software .CHI '97 Conference Proceedings, ACM: New York, 170-179. DOI: 10.1145\/258549.258698 8210.1145\/258549.258698","DOI":"10.1145\/258549.258698"},{"key":"p_20","unstructured":", (2003).CRA Conference on \"Grand Research Challenges in Information Security and Assurance\". http:\/\/www.cra.org\/Activities\/grand.challenges\/security\/.November16-19,2003 . 58"},{"key":"p_22","volume-title":"Web Privacy with P3P","author":"Cranor L."},{"key":"p_24","doi-asserted-by":"crossref","unstructured":"C. Danis, L. Comerford, E. Janke, K. Davies, J. DeVries\u201e, and A Bertrand . (1994 ).StoryWriter: A speech oriented editor . InC. Plaisant (Ed.) Human Factors in Computing Systems - CHI'94 Conference Companion. ACM: New York, 277-278. 15","DOI":"10.1145\/259963.260490"},{"key":"p_25","first-page":"17","author":"Danis C.","year":"1995","journal-title":"ACM: New York"},{"key":"p_26","volume-title":"Pattern lassification","author":"Duda R. O.","year":"2001"},{"key":"p_27","volume-title":"Designing for the MoRAS","author":"Furnas G. W."},{"key":"p_28","first-page":"39","volume":"32","author":"Godin S.","year":"1999","journal-title":"New York: Simon and Schuster."},{"key":"p_29","doi-asserted-by":"publisher","DOI":"10.1145\/2163.358100"},{"key":"p_30","doi-asserted-by":"crossref","unstructured":"J. Grudin, The computer reaches out: The historical continuity of interface design evolution and practice in user interface engineering .Proceedings of ACM CHI'90 Conference on Human Factors in Computing Systems. 261-268.New York: ACM. DOI: 10.1145\/97243.97284 8910.1145\/97243.97284","DOI":"10.1145\/97243.97284"},{"key":"p_31","first-page":"1","volume-title":"November","author":"Hagen P.R."},{"key":"p_32","volume-title":"Sasse, M. A. and Johnson, C (Eds), Human-Computer Interaction - INTERACT '99","author":"Halverson C. A.","year":"1999"},{"key":"p_33","doi-asserted-by":"crossref","unstructured":"J. Heer, and E. H Chi . (2002 ).Separating the swarm: Categorization methods for user sessions on the web .Proceedings of CHI 2002(Minneapolis, MN, April, 2002). New York: ACM, 243-250. DOI: 10.1145\/503376.503420 3110.1145\/503376.503420","DOI":"10.1145\/503376.503420"},{"key":"p_35","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-2148-8"},{"key":"p_36","volume-title":"August. 57","author":"Karat C.","year":"2003"},{"key":"p_37","first-page":"47","author":"Karat C.","year":"2005","journal-title":"O'Reilly and Associates"},{"key":"p_38","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303160"},{"key":"p_39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.016"},{"key":"p_40","doi-asserted-by":"publisher","DOI":"10.1145\/1107458.1107491"},{"key":"p_41","volume-title":"Personal Information Management","author":"Karat C.","year":"2007"},{"key":"p_42","doi-asserted-by":"crossref","unstructured":"C. Karat, J. Karat, C. Brodie, and J Feng . (2006 ). \"Evaluating interfaces for privacy policy rule authoring ,\"Proceedings of the Conference on Human Factors in Computing Systems - CHI2006, ACMPress, pp.83 -92 . DOI: 10.1145\/1124772.1124787 56, 57, 6710.1145\/1124772.1124787","DOI":"10.1145\/1124772.1124787"},{"key":"p_43","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC143&4_06"},{"key":"p_44","volume-title":"Less Clicking","author":"Karat C.","year":"2001"},{"key":"p_45","volume-title":"Scenario-based design.","author":"Karat J."},{"key":"p_46","volume-title":"Handbook of Human-Computer Interaction","author":"Karat J.","edition":"2"},{"key":"p_47","volume-title":"The Human-Computer Interaction Handbook","author":"Karat J."},{"key":"p_48","doi-asserted-by":"publisher","DOI":"10.1177\/0894439307307681"},{"key":"p_49","volume-title":"A., and Blythe, M., (Eds.)","author":"Karat J.","year":"2003"},{"key":"p_50","volume":"57","author":"Karat J.","year":"2003","journal-title":"IBM Systems Journal"},{"key":"p_51","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1147\/JRD.2009.5429046","volume":"59","author":"Karat J.","year":"2009","journal-title":"IBM Journal of Research and Development"},{"key":"p_52","volume-title":"The Human-Computer Interaction Handbook","author":"Karat J.","year":"2008"},{"key":"p_53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.016"},{"key":"p_54","unstructured":"J. Karat, C. Karat, C. Brodie, and J Feng . (2005 ).Designing Natural Language and Structured Entry Methods for Privacy Policy Authoring. In the Proceedings for the Tenth IFIP TC13 International Conference of Human-Computer Interaction, 671-684. DOI: 10.1007\/11555261_5410.1007\/11555261_54"},{"key":"p_55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-1-4757-2980-1_1","volume-title":"Human factors and voice interactive systems","author":"Karat J.","year":"1999"},{"key":"p_56","doi-asserted-by":"crossref","unstructured":"J. Karat, D. Horn, C. Halverson, and C Karat . (2000 )Overcoming unusability: developing efficient strategies in speech recognition systems ,CHI '00 extended abstracts on Human factors in computing systems, April 01-06, 2000, The Hague, The Netherlands. DOI: 10.1145\/633292.633372 1210.1145\/633292.633372","DOI":"10.1145\/633292.633372"},{"key":"p_57","doi-asserted-by":"crossref","unstructured":"K. Karvonen, The beauty of simplicity . InConference on Universal Usability: CUU2000 , pp85 -90 .New York: ACM. DOI: 10.1145\/355460.355478 9010.1145\/355460.355478","DOI":"10.1145\/355460.355478"},{"key":"p_58","doi-asserted-by":"crossref","unstructured":"A. Kidd, The marks are on the knowledge worker , inProceedings of CHI '94 (Boston MA,April1994 ), ACM Press, 186-191. DOI: 10.1145\/259963.260346 1610.1145\/259963.260346","DOI":"10.1145\/259963.260346"},{"key":"p_59","doi-asserted-by":"publisher","DOI":"10.1145\/506218.506249"},{"key":"p_60","volume-title":"The structure of scientific revolutions","author":"Kuhn T. S."},{"key":"p_61","doi-asserted-by":"crossref","unstructured":"J. Lai, and J Vergo . (1997 ).MedSpeak: Report Creation with Continuous Speech Recognition , inProceedings of CHI '97, (Atlanta GA, March 1997), ACM Press, 431 - 438. DOI: 10.1145\/258549.258829 1410.1145\/258549.258829","DOI":"10.1145\/258549.258829"},{"key":"p_62","doi-asserted-by":"crossref","volume-title":"The trouble with computers: Usefulness, usability, and productivity","author":"Landauer T. K.","DOI":"10.7551\/mitpress\/6918.001.0001"},{"key":"p_63","volume-title":"Computers as Theatre","author":"Laurel B."},{"key":"p_64","volume-title":"The Usability Engineering Lifecycle: A Practitioner's Handbook for User Interface Design","author":"Mayhew D."},{"key":"p_65","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345169"},{"key":"p_66","doi-asserted-by":"publisher","DOI":"10.1145\/153571.255960"},{"key":"p_67","doi-asserted-by":"crossref","volume-title":"Information ecologies: Using technology with heart","author":"Nardi B.","DOI":"10.5210\/fm.v4i5.669"},{"key":"p_68","doi-asserted-by":"publisher","DOI":"10.1145\/1266840.1266848"},{"key":"p_69","doi-asserted-by":"crossref","DOI":"10.1201\/b15703","volume-title":"User-Centered system Design","author":"Norman D.","year":"1986"},{"key":"p_72","doi-asserted-by":"publisher","DOI":"10.1145\/22627.22372"},{"key":"p_73","volume-title":"Enterprise One to One: Tools for Competing in the Interactive Age","author":"Peppers D.","year":"1997"},{"key":"p_74","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345171"},{"key":"p_75","volume-title":"Can Web Entertainment be Passive? Proceedings of IWWW '01","author":"Pinhanez C.","year":"2001"},{"key":"p_77","volume-title":"Bowling alone: America's declining Social Capital","author":"Putnam R."},{"key":"p_78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74800-7_11"},{"key":"p_79","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245121"},{"key":"p_80","doi-asserted-by":"crossref","volume-title":"Beyond bowling together: SocioTechnical CapiPersonNameSametimeSmart-Tagtaltal","author":"Resnick P.","DOI":"10.1145\/358916.362079"},{"key":"p_81","volume-title":"Advances in human-computer interaction","volume":"4","author":"Rhyne J. R.","year":"1993"},{"key":"p_83","doi-asserted-by":"crossref","unstructured":"B. J. Schafer, J. Konstan, and J Riedl . (1999 ).Recommender systems in e-commerce .Proceedings of the first ACM Conference on Electronic Commerce. New York: ACM, 158-166. DOI: 10.1145\/336992.337035 3110.1145\/336992.337035","DOI":"10.1145\/336992.337035"},{"key":"p_84","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345142"},{"key":"p_85","doi-asserted-by":"crossref","unstructured":"Smith, J. (1993). Privacy policies and practices: Inside the organizational maze. Communications of the ACM, 36, 12, 105-122. DOI: 10.1145\/163298.163349 6010.1145\/163298.163349","DOI":"10.1145\/163298.163349"},{"key":"p_86","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345167"},{"key":"p_87","doi-asserted-by":"crossref","unstructured":"D. VanderMeer, K. Dutta, A Datta, K. Ramamritham, and S. B Navanthe . (2000 ).Enabling scalable online personalization on the web .Proceedings of the Second ACM Conference on Electronic Commerce. New York: ACM, 185-196. DOI: 10.1145\/352871.352892 3110.1145\/352871.352892","DOI":"10.1145\/352871.352892"},{"key":"p_88","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345155"},{"key":"p_89","volume-title":"User-Centered Design: An Integrated Approach","author":"Vredenburg K.","year":"2001"}],"container-title":["Synthesis Lectures on Human-Centered Informatics"],"original-title":[],"language":"en","deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T15:49:46Z","timestamp":1658504986000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.morganclaypool.com\/doi\/abs\/10.2200\/S00228ED1V01Y200911HCR007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":78,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,1]]}},"alternative-id":["10.2200\/S00228ED1V01Y200911HCR007"],"URL":"https:\/\/doi.org\/10.2200\/s00228ed1v01y200911hcr007","relation":{},"ISSN":["1946-7680","1946-7699"],"issn-type":[{"value":"1946-7680","type":"print"},{"value":"1946-7699","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1]]}}}