Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work 2002
DOI: 10.1145/587078.587082
|View full text |Cite
|
Sign up to set email alerts
|

Instant messaging in teen life

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
176
0
2

Year Published

2005
2005
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 269 publications
(181 citation statements)
references
References 20 publications
3
176
0
2
Order By: Relevance
“…With respect to ensuring privacy [9] and security, the user should be able to delete internal contacts of the application. However, this is not always possible, for example, because the application accesses the internal agenda of the device.…”
Section: Step 3: Identify the Primary Operating Functions And Excludementioning
confidence: 99%
See 1 more Smart Citation
“…With respect to ensuring privacy [9] and security, the user should be able to delete internal contacts of the application. However, this is not always possible, for example, because the application accesses the internal agenda of the device.…”
Section: Step 3: Identify the Primary Operating Functions And Excludementioning
confidence: 99%
“…IM apps are the newest and most popular evolution of near-synchronous text technologies [9][10][11]; thus, they are used to facilitate social relationships [12] and are one of the most widely used apps, since this type of app has become an alternative (usually free or cheaper) to the traditional SMS messages [8,10,13]. Since there are so many apps for the same purpose in the mobile markets, users have too many alternatives to choose and therefore they are quite critical about how an app works.…”
Section: Introductionmentioning
confidence: 99%
“…As Herbsleb et al [Herbsleb, Atkins et al 2002] discovered, the lack of such mechanisms increases setup time. Grinter and Palen [2002] illustrate (albeit with teenagers) that users adapt system capabilities to their own ends. Teens in their study made enterprising use of access permissions, profiles, status messages and screen names to manage privacy.…”
Section: User Studiesmentioning
confidence: 99%
“…This is surprising since conferences with five or more participants have become increasingly popular both in private and business settings 1 . An experiment with a medium sized group has been conducted by Valacich et al [27].…”
Section: Media Choice and Group Sizementioning
confidence: 99%
“…Chat-based instant messaging programs have become an integral part of the communication in private life [1,2]. These clients are also used in commercial settings [3].…”
Section: Introductionmentioning
confidence: 99%