Zobrazeno 1 - 10
of 258
pro vyhledávání: '"Tara Matthews"'
Autor:
Munzir Hamid, Michelle Hannan, Nay Myo Oo, Paula Lynch, Darren J. Walsh, Tara Matthews, Stephen Madden, Miriam O’Connor, Paula Calvert, Anne M. Horgan
Publikováno v:
Current Oncology, Vol 29, Iss 9, Pp 6167-6176 (2022)
The Comprehensive Geriatric Assessment (CGA) is recommended to guide treatment choices in older patients with cancer. Patients ≥ 70 years referred to our oncology service with a new cancer diagnosis are screened using the G-8. Patients with a score
Externí odkaz:
https://doaj.org/article/f7d3ec10c61b4685a1e698f062b4a12d
Autor:
Sunny Consolvo, Elie Bursztein, Nova Ahmed, Amna Batool, Tara Matthews, Laura S. Gaytán-Lugo, David Nemar, Kurt Thomas, Elizabeth F. Churchill, Nithya Sambasivan
Publikováno v:
IEEE Security & Privacy. 17:71-77
South Asia has one of the world's largest populationsmIndia, Pakistan, and Bangladesh alone are home to more than 20% of all people. The region is also one of the fastest-growing technology markets as a result of its increased infrastructure and grow
Publikováno v:
Encyclopedia of Autism Spectrum Disorders ISBN: 9783319912790
Encyclopedia of Autism Spectrum Disorders ISBN: 9781461464358
Encyclopedia of Autism Spectrum Disorders ISBN: 9781461464358
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b6389ea8b75a072ffe550c40220249df
https://doi.org/10.1007/978-3-319-91280-6_102037
https://doi.org/10.1007/978-3-319-91280-6_102037
Autor:
Kathleen O'Leary, Jill Palzkill Woelfer, Elizabeth F. Churchill, Manya Sleeper, Anna Turner, Tara Matthews, Martin Shelton, Sunny Consolvo, Cori Manthorne
Publikováno v:
IEEE Security & Privacy. 15:76-81
Recognizing how intimate partner abuse’s three phases—physical control, escape from abuser, and life apart—affect survivors’ technology use can help technology creators better understand and support this population’s digital security and pr
Autor:
Martin Shelton, Jill Palzkill Woelfer, Manya Sleeper, Andreas Schou, Kathleen O'Leary, Sunny Consolvo, Anna Turner, Andrew Oplinger, Tara Matthews
Publikováno v:
CHI
Addressing digital security and privacy issues can be particularly difficult for users who face challenging circumstances. We performed semi-structured interviews with residents and staff at 4 transitional homeless shelters in the U.S. San Francisco
Autor:
Sunny Consolvo, Kurt Thomas, Elie Bursztein, Nova Ahmed, Elizabeth F. Churchill, Amna Batool, Laura S. Gaytán-Lugo, Tara Matthews, Nithya Sambasivan, David Nemer
Publikováno v:
CHI
South Asia faces one of the largest gender gaps online globally, and online safety is one of the main barriers to gender-equitable Internet access [GSMA, 2015]. To better understand the gendered risks and coping practices online in South Asia, we pre
Autor:
Cori Manthorne, Tara Matthews, Sunny Consolvo, Martin Shelton, Kathleen O'Leary, Jill Palzkill Woelfer, Anna Turner, Manya Sleeper, Elizabeth F. Churchill
Publikováno v:
CHI
We present a qualitative study of the digital privacy and security motivations, practices, and challenges of survivors of intimate partner abuse (IPA). This paper provides a framework for organizing survivors' technology practices and challenges into
Autor:
Marianne Berkovich, Kerwell Liao, Robert W. Reeder, Tara Matthews, Sunny Consolvo, Anna Turner
Publikováno v:
CHI
Many technologies assume a single user will use an account or device. But account and device sharing situations (when 2+ people use a single device or account) may arise during everyday life. We present results from a multiple-methods study of device
Publikováno v:
Computer Supported Cooperative Work (CSCW). 21:371-396
Work organization and team membership is highly complex for modern workers. Teams are often dynamic as personnel change during a project. Dynamic team members have to be actively recruited and personnel changes make it harder for participants to reta
Publikováno v:
Human–Computer Interaction. 23:47-99
Over the past decade and a half, corporations and academies have invested considerable time and money in the realization of ubiquitous computing. Yet design approaches that yield ecologically valid understandings of ubiquitous computing systems, whic