Date | Presenter | Topic |
8/20 | Organizational Meeting | |
8/27 | Russell Kennington | Havron et al. Clinical Computer Security for Victims of Intimate Partner Violence. USENIX Security Symposium 2019. |
9/3 | Di | Bruns and Burgess. The use of Twitter hashtags in the formation of ad hoc publics. 6th European Consortium for Political Research General Conference, 2011. |
9/10 | Derya Akbaba | Ellison and boyd. Sociality through social network sites. The Oxford handbook of internet studies, 2013. |
9/17 | Jason Hansen | Nagappan et al. The Influence of Organizational Structure on Software Quality: An Empirical Case Study. Proceedings of the 30th international conference on Software engineering (ICSE), 2008. |
9/24 | Shaurya (Shay) Sahai | Fingerman. Consequential strangers and peripheral ties: The importance of unimportant relationships. Journal of Family Theory & Review 1(2), 2009. |
10/1 | Marina Kogan | Suchman. Office Procedures as Practical Action: Models of Work and Systems Design. ACM Transactions of Information Systems 1(4), 1983. |
10/8 | FALL BREAK | |
10/15 | Bikalpa Neupane | NOTE! This seminar meeting will be in MEB 3167, not MEB 3446 as usual. Talk title: HCI of AI. Talk abstract and related readings sent out via email. |
10/22 | Tamara Denning | (Back in MEB 3446 as usual.) Darzentas et al. Card Mapper: Enabling Data-Driven Reflections on Ideation Cards. CHI 2019. |
10/29 | Connie | Burke et al. Social capital on Facebook: Differentiating uses and users. CHI 2011. |
11/5 | Daniel Willeitner | Note change from discussed plan. Türpe et al. Penetration Tests a Turning Point in Security Practices? Organizational Challenges and Implications in a Software Development Team. 2nd Workshop on Security Information Workers (WSIW), 2016. |
11/12 | Chat with Prof. Suresh Venkatasubramanian | Selbst et al. Fairness and Abstraction in Sociotechnical Systems. ACM Conference on Fairness, Accountability, and Transparency (FAT*), 2019. |
11/19 | Max Marno | Louise Barkhuus. The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI. CHI 2012. |
11/26 | Jason Hansen | Voronkov et al. System Administrators Prefer Command Line Interfaces, Don’t They? An Exploratory Study of Firewall Interfaces. SOUPS 2019. |
12/3 | Derya Akbaba | Kale et al. Decision-Making Under Uncertainty in Research Synthesis: Designing for the Garden of Forking Paths. CHI 2019. |
All communications for the seminar go through the hcc-seminar mailing list. You can sign yourself up at http://mailman.cs.utah.edu/mailman/listinfo/hcc-seminar.
Students may enroll for one (1) credit. Although the University lists the course as “variable credit,” the two- and three-credit options are not currently available.
Students enrolled in the seminar are expected to read the papers prior to the seminar. Additionally, students are expected to sign up to lead the discussion on one or more seminar meeting. Leading the discussion means:
Some papers are free to access, while others are behind paywalls. The university has a paid subscription to most of the libraries where those papers can be found. There are several ways to access those papers: