Information Technology Reference
In-Depth Information
Gemmell, J., Williams, L., Wood, K., Lueder, R., &
Bell, G. (2004). Passive capture and ensuing issues for
a personal lifetime store. In Proceeding of ACM CARPE
2004 (pp. 48-55).
Glaser, B. (1965). The constant comparative method
of qualitative analysis. Society for the Study of Social
Problems, 12 (4), 436-445. University of California Press.
Hagen, P., Robertson, T., Kan, M., & Sadler, K. (2005).
Emerging research methods for understanding mobile
technology use. In Proceedings from the 19th conference
of the computer-human interaction special interest group
(CHISIG) of Australia (pp. 1-10). ACM.
Glascock, A., & Kutzik, D. (2006). The impact of behav-
ioral monitoring technology on the provision of health
care in the home. The Journal of Universal Computer
Sciences , 12 (1), 59-80.
Goffman, E. (1959). The presentation of self in everyday
life . New York: Anchor Books.
Glascock, A. P., & Kutzik, D. (2009). A care informatics
approach to telehomecare applications. In Dwivedi, A.
(Ed.), The Handbook of Research on IT Management and
Clinical Data Administration in Healthcare (pp. 368-382).
Hershey, PA: IGI Publishing.
Goldberg, D., & Richardson, C. (1993). Touch-typing with
a stylus. Paper presented at the INTERCHI93.
Gong, J., & Tarasewich, P. (2005). Alphabetically con-
strained keypad designs for text entry on mobile devices.
Paper presented at the CHI '05: SIGCHI Conference on
Human Factors in Computing Systems Portland, USA.
Glascock, A., & Kutzik, D. (2004). Moving telematics
from the laboratory to a truly enabling technology within
the community. In Zhang, D., & Mokhtari, M. (Eds.), To-
ward a Human-Friendly Assistive ` Environment,Assistive
Technology Research Series, 14 (pp. 145-154). Amster-
dam: IOS Press.
Goodwin, M. H. (1980). He-Said-She-Said: Formal
cultural Procedures for the Construction of a Gossip
Dispute Activity. American Ethnologist , 7 (4), 674-695.
doi:10.1525/ae.1980.7.4.02a00050
Glascock, A., & Kutzik, D. (2007a). An evidentiary study
of the uses of automated behavioral monitoring. Confer-
ence Proceedings of the 21 st International Conference
on Advanced Information Networking and Applications,
Niagara Falls, Ontario, Canada, 2 (1), 858-862.
Gould, J. D., & Lewis, C. H. (1985). Designing for usabil-
ity: key principles and what designers think. Communica-
tions of the ACM , 28 (3), 300-311. doi:10.1145/3166.3170
Gourville, J., & Dilip Soman, D. (2002). Pricing and the
Psychology of Consumption. Business Review September
2002 R0209G www.hbr.org.
Glascock, A., & Kutzik, D. (2007b). From sensors to
informatics: Creating communication protocols for
caregiving. Proceedings of the 3 rd IET Conference on
Intelligent Environments , 325-332.
Graham, C. Rouncefield, M Cheverst, K., Gibbs, M. and
Vetere., F. (2007) How Probes Work. In Proceedings of
OzCHI 2007 (pp. 29-37). ACM Press.
Glascock, A., & Kutzik, D. (2008). It's all about the
information: The role of informatics in telecare. In Wil-
liam C. Mann (ed) Aging Disability and Independence:
Selected Papers from the 4 th International Conference on
Aging, Disability and Independence , pp. 71-85.University
of Florida.
Grant, L., Daanen, H., Benford, S., Hampshire, A., Drozd,
A., & Greenhalgh, C. (2007). MobiMissions: the game
of missions for mobile phones. In Swanson, J. (Ed.),
SIGGRAPH 2007 Educators Program . San Diego: ACM.
Glaser, B. G., & Strauss, A. L. (1967). The discovery of
grounded theory: Strategies for qualitative research . New
Brunswick: Aldine Transaction.
Green, P. (1999). The 15 second rule for driver information
systems. Proceedings of the ITS America ninth annual
meeting, Washington, D.C.
Search WWH ::




Custom Search