Information Technology Reference
In-Depth Information
Gemmell, J., Williams, L., Wood, K., Lueder, R., &
Bell, G. (2004). Passive capture and ensuing issues for
a personal lifetime store. In
Proceeding of ACM CARPE
2004
(pp. 48-55).
Glaser, B. (1965). The constant comparative method
of qualitative analysis.
Society for the Study of Social
Problems, 12
(4), 436-445. University of California Press.
Hagen, P., Robertson, T., Kan, M., & Sadler, K. (2005).
Emerging research methods for understanding mobile
technology use. In
Proceedings from the 19th conference
of the computer-human interaction special interest group
(CHISIG) of Australia
(pp. 1-10). ACM.
Glascock, A., & Kutzik, D. (2006). The impact of behav-
ioral monitoring technology on the provision of health
care in the home.
The Journal of Universal Computer
Sciences
,
12
(1), 59-80.
Goffman, E. (1959).
The presentation of self in everyday
life
. New York: Anchor Books.
Glascock, A. P., & Kutzik, D. (2009). A care informatics
approach to telehomecare applications. In Dwivedi, A.
(Ed.),
The Handbook of Research on IT Management and
Clinical Data Administration in Healthcare
(pp. 368-382).
Hershey, PA: IGI Publishing.
Goldberg, D., & Richardson, C. (1993).
Touch-typing with
a stylus.
Paper presented at the INTERCHI93.
Gong, J., & Tarasewich, P. (2005).
Alphabetically con-
strained keypad designs for text entry on mobile devices.
Paper presented at the CHI '05: SIGCHI Conference on
Human Factors in Computing Systems Portland, USA.
Glascock, A., & Kutzik, D. (2004). Moving telematics
from the laboratory to a truly enabling technology within
the community. In Zhang, D., & Mokhtari, M. (Eds.),
To-
ward a Human-Friendly Assistive ` Environment,Assistive
Technology Research Series, 14
(pp. 145-154). Amster-
dam: IOS Press.
Goodwin, M. H. (1980). He-Said-She-Said: Formal
cultural Procedures for the Construction of a Gossip
Dispute Activity.
American Ethnologist
,
7
(4), 674-695.
doi:10.1525/ae.1980.7.4.02a00050
Glascock, A., & Kutzik, D. (2007a). An evidentiary study
of the uses of automated behavioral monitoring.
Confer-
ence Proceedings of the 21
st
International Conference
on Advanced Information Networking and Applications,
Niagara Falls, Ontario, Canada, 2
(1), 858-862.
Gould, J. D., & Lewis, C. H. (1985). Designing for usabil-
ity: key principles and what designers think.
Communica-
tions of the ACM
,
28
(3), 300-311. doi:10.1145/3166.3170
Gourville, J., & Dilip Soman, D. (2002).
Pricing and the
Psychology of Consumption. Business Review September
2002 R0209G
www.hbr.org.
Glascock, A., & Kutzik, D. (2007b). From sensors to
informatics: Creating communication protocols for
caregiving.
Proceedings of the 3
rd
IET Conference on
Intelligent Environments
, 325-332.
Graham, C. Rouncefield, M Cheverst, K., Gibbs, M. and
Vetere., F. (2007) How Probes Work. In
Proceedings of
OzCHI 2007
(pp. 29-37). ACM Press.
Glascock, A., & Kutzik, D. (2008). It's all about the
information: The role of informatics in telecare. In Wil-
liam C. Mann (ed)
Aging Disability and Independence:
Selected Papers from the 4
th
International Conference on
Aging, Disability and Independence
, pp. 71-85.University
of Florida.
Grant, L., Daanen, H., Benford, S., Hampshire, A., Drozd,
A., & Greenhalgh, C. (2007). MobiMissions: the game
of missions for mobile phones. In Swanson, J. (Ed.),
SIGGRAPH 2007 Educators Program
. San Diego: ACM.
Glaser, B. G., & Strauss, A. L. (1967).
The discovery of
grounded theory: Strategies for qualitative research
. New
Brunswick: Aldine Transaction.
Green, P. (1999). The 15 second rule for driver information
systems. Proceedings of the ITS America ninth annual
meeting, Washington, D.C.
Search WWH ::
Custom Search