Journal Article
Ackerman, M. S., and D. W. McDonald,
"Collaborative Support for Informal Information in Collective Memory Systems",
Information Systems Frontiers, vol. 2, no. 3-4, pp. 333-347, 2000.
Penzenstadler, B., A. Raturi, D. J. Richardson, S. M. Silberman, and B. Tomlinson,
"Collapse (and other futures) software engineering",
First Monday, vol. 20, issue 8, July, 2015.
Tomlinson, W.., E.. Blevis, B. A. Nardi, D. Patterson, S.. Silberman, and Y.. Pan,
"Collapse Informatics and Practice: Theory, Method, and Design",
ACM Transactions on Computer-Human Interaction, special issue on Sustainable HCI through Everyday Practices, vol. 20, issue 4, no. 4, 09/2013.
Dourish, P., and K. Anderson,
"Collective Information Practice: Exploring Privacy and Security as Social and Cultural Phenomena",
Human-Computer Interaction, vol. 21, no. 3, pp. 319-342, 2006.
Dourish, P.,
"Commentary: Conduits and Communities",
Human–Computer Interaction, vol. 30, no. 6, pp. 540-543, November, 2015.
Dourish, P.,
"Commentary: Interactivity as Cultural",
Human–Computer InteractionHuman–Computer Interaction, vol. 32, no. 3, pp. 153-154, May 4, 2017.
Nardi, B., R. Vatrapu, and T. Clemmensen,
"Comparative informatics",
interactions, vol. 18, no. 2, pp. 28-33, March + April, 2011.
Bellamine-Ben Saoud, N., and G. Mark,
"Complexity Theory and Collaboration: An Agent-Based Simulator for a Space Mission Design Team",
Computational and Mathematical Organizational Theory, vol. 13, no. 2, pp. 113-146, June, 2007.
Egyed, A., N. Medvidović, and C. Gacek,
"Component-based perspective on software-mismatch detection and resolution",
IEE Proceedings-Software, vol. 147, no. 6, pp. 225-236, 2000.
Dashofy, E., A. van der Hoek, and R. N. Taylor,
"A Comprehensive Approach for the Development of XML-Based Software Architecture Description Languages",
ACM Transactions on Software Engineering and Methodology (TOSEM), vol. 14, no. 2, pp. 199-245, April, 2005.
Yasinsac, A., R. F. Erbacher, D. G. Marks, M. M. Pollitt, and P. M. Sommer,
"Computer forensics education",
IEEE Security & Privacy, vol. 1, no. 4, pp. 15-23, 2003.
Nardi, B., B. Tomlinson, D. Patterson, J. Chen, D. Pargman, B. Raghavan, and B. Penzenstadler,
"Computing within Limits",
Communications of the ACM, vol. 61, issue 10, 10/2018.
Grudin, J.., G. Mark, and J.. Riedl,
"Conference-Journal Hybrids",
Communications of the ACM, vol. 56, no. 1, pp. 44-49, January, 2013.
Lee, H., and A. Kobsa,
"Confident Privacy Decision-Making in IoT Environments",
ACM Transactions on Computer-Human Interaction, vol. 27, issue 1, pp. Article 6, 12/2019.
Nardi, B. A., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth,
"ContactMap: Integrating Communication and Information Through Visualizing Personal Social Networks",
Communications of the ACM, vol. 45, no. 4, pp. 89-95, 2002.
Nardi, B., S. Whittaker, E. Isaacs, M. Creech, J. Johnson, and J. Hainsworth,
"ContactMap: Integrating communication and information through visualizing personal social networks",
Communications of the Association for Computing Machinery, vol. April, pp. 89-95, 2002.
Murta, L. P. G., A. van der Hoek, and C. M. L. Werner,
"Continuous and Automated Evolution of Architecture-to-Implementation Traceability Links",
Automated Software Engineering, Special Issue on Selected Papers from the 21st International Conference on Automated Software Engineering (ASE'2006), vol. 15, no. 1, pp. 75-107, 2008.
Redmiles, D., A. van der Hoek, B. Al-Ani, T. Hildenbrand, S. Quirk, A. Sarma, R. Silva Filho, C. R. B. de Souza, and E. Trainer,
"Continuous Coordination: A New Paradigm to Support Globally Distributed Software Development Projects",
Withschaftsinformatik, vol. 49, pp. S28–S38, 2007.
Bagheri, H., A. Sadeghi, J. Garcia, and S. Malek,
"COVERT: Compositional Analysis of Android Inter-App Security Vulnerabilities",
IEEE Transactions on Software Engineering (IEEE TSE), vol. 41, issue 9, pp. 866-886, 09/2015.
Demsky, B.,
"Cross Application Data Provenance and Policy Enforcement",
ACM Transactions on Information and System Security, vol. 14, no. 1, May, 2011.
Li, Y.., A.. Kobsa, B.. Knijnenburg, and M.-H.. Carolyn Nguyen,
"Cross-Cultural Privacy Prediction",
Proceedings on Privacy Enhancing TechnologiesProceedings on Privacy Enhancing Technologies, vol. 3, no. 2, pp. 113-132, April, 2017.
LaToza, T. D., and A. van der Hoek,
"Crowdsourcing in Software Engineering: Models, Motivations, and Challenges",
IEEE Software, vol. 33, issue 1, pp. 74-80, January-February, 2016.
Richardson, D.,
"CSEdWeek Shines in 2011",
ACM SIGCSE Bulletin, vol. 44, no. 3, September, 2012.