|8/27||Russell Kennington||Havron et al. Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019.|
|9/3||Di||Bruns and Burgess. The use of Twitter hashtags in the formation of ad hoc publics. 6th European Consortium for Political Research General Conference, 2011.|
|9/10||Derya Akbaba||Ellison and boyd. Sociality through social network sites. The Oxford handbook of internet studies, 2013.|
|9/17||Jason Hansen||Nagappan et al. The Influence of Organizational Structure on Software Quality: An Empirical Case Study. Proceedings of the 30th international conference on Software engineering (ICSE), 2008.|
|9/24||Shaurya (Shay) Sahai||Fingerman. Consequential strangers and peripheral ties: The importance of unimportant relationships. Journal of Family Theory & Review 1(2), 2009.|
|10/1||Marina Kogan||Suchman. Office Procedures as Practical Action: Models of Work and Systems Design. ACM Transactions of Information Systems 1(4), 1983.|
|10/15||Bikalpa Neupane||NOTE! This seminar meeting will be in MEB 3167, not MEB 3446 as usual. Talk title: HCI of AI. Talk abstract and related readings sent out via email.|
|10/22||Tamara Denning||(Back in MEB 3446 as usual.) Darzentas et al. Card Mapper: Enabling Data-Driven Reflections on Ideation Cards. CHI 2019.|
|10/29||Connie||Burke et al. Social capital on Facebook: Differentiating uses and users. CHI 2011.|
All communications for the seminar go through the hcc-seminar mailing list. You can sign yourself up at http://mailman.cs.utah.edu/mailman/listinfo/hcc-seminar.
Students may enroll for one (1) credit. Although the University lists the course as “variable credit,” the two- and three-credit options are not currently available.
Students enrolled in the seminar are expected to read the papers prior to the seminar. Additionally, students are expected to sign up to lead the discussion on one or more seminar meeting. Leading the discussion means:
Some papers are free to access, while others are behind paywalls. The university has a paid subscription to most of the libraries where those papers can be found. There are several ways to access those papers: