Daniel C Howe

Daniel C Howe
City University of Hong Kong | CityU · School of Creative Media

PhD

About

22
Publications
15,175
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,704
Citations

Publications

Publications (22)
Chapter
Full-text available
Whose Book is it Anyway? is a provocative collection of essays that opens out the copyright debate to questions of open access, ethics, and creativity. It includes views – such as artist’s perspectives, writer’s perspectives, feminist, and international perspectives – that are too often marginalized or elided altogether. The diverse range of contri...
Conference Paper
Advertising Positions integrates 3D scanning, motion capture, novel image mapping algorithms and custom animation to create data portraits from the advertisements served by online trackers. Project volunteers use bespoke software to harvest the ads they receive over months of browsing. When enough ads have been collected, the volunteer is interview...
Article
Full-text available
Advertising Positions integrates 3D scanning, motion capture, novel image mapping algorithms and custom animation to create data portraits from the advertisements served by online trackers. Project volunteers use bespoke software to harvest the ads they receive over months of browsing. When enough ads have been collected, the volunteer is interview...
Conference Paper
Full-text available
The strategy of obfuscation has been broadly applied—in search, location tracking, private communication, anonymity—and has thus been recognized as an important element of the privacy engineer’s toolbox. However there remains a need for clearly articulated case studies describing not only the engineering of obfuscation mechanisms but providing a cr...
Article
Full-text available
The Readers Project is an aesthetically oriented system of software entities designed to explore the culture of human reading. These entities, or "readers," navigate texts according to specific reading strategies based upon linguistic feature analysis and real-time probability models harvested from search engines. As such, they function as autonomo...
Conference Paper
Full-text available
The RiTa toolkit for computational literature is a suite of open-source components, tutorials, and examples, providing support for a range of tasks related to the practice of creative writing in programmable media. Designed both as a toolkit for practicing writers and as an end-to-end solution for digital writing courses (the focus of this paper),...
Article
Full-text available
This paper explores a range of issues related to the pedagogy and practice of generative writing in programmable media. We begin with a brief description of the RiTa toolkit — a set of computational tools designed to facilitate the practice of generative writing. We then describe our experiences using these tools in a series of digital writing work...
Article
Full-text available
TrackMeNot (TMN) is a Firefox browser extension designed to achieve privacy in Web search by obfuscating users' queries within a stream of programmatically generated decoys. Since August 2006, when the initial version of TMN was made publicly available free of charge, there have been over 350,000 downloads. TMN protects Web users against data profi...
Article
Full-text available
INTRODUCTION: The idea that values may be embodied in technical systems and devices (artifacts) has taken root in a variety of disciplinary approaches to the study of technology, society, and humanity (Winner 1986; Latour 1992; Hughes 2004; MacKenzie and Wajcman 1985). A pragmatic turn from this largely descriptive posture sets forth values as a de...
Chapter
During the past decade, rapid developments in information and communications technology have transformed key social, commercial and political realities. Within that same time period, working at something less than internet speed, much of the academic and policy debates arising from these new and emerging technologies have been fragmented. There hav...
Conference Paper
Full-text available
Significant work in the CHI community has focused on designing systems that support human values. Designers and engineers have also become increasingly aware of ways in which the artifacts they create can embody political, social, and ethical values. Despite such an awareness, there has been little work towards producing practical methodologies tha...
Conference Paper
Full-text available
Significant work in the gaming and HCI communities has focused on systems that support human values such as privacy, trust, and community. Designers and engineers have become increasingly aware of ways in which the artifacts they create can embody political, social, and ethical values. Yet there has been little work toward producing practical metho...
Article
Full-text available
People have criticized on-line services for violating privacy by collecting too much personal information. Though web browsers must generally reveal basic network information such as a user's current IP address, web sites often collect far more, including a user's name, physical location, and email address. Service providers justify their data coll...
Conference Paper
Full-text available
This study characterizes users' conceptions of web security. Seventy-two individuals, 24 each from a rural community in Maine, a suburban professional community in New Jersey, and a high-technology community in California, participated in an extensive (2-hour) semi-structured interview (including a drawing task) about Web security. The results show...
Conference Paper
Full-text available
In this study, we analyzed Web users concerns about potential risks and harms from Web use to themselves and to society at large. In addition, we assessed how strongly users felt something should be done to address their concerns. Seventy-two individuals, 24 each from a rural community in Maine, a suburban professional community in New Jersey, and...
Article
Full-text available
Reports on one of the first efforts to apply value-sensitive design (VSD) to a large-scale real-world software system. We sought to improve informed consent in Web-based interactions through the development of new technical mechanisms for cookie management. We describe our VSD methodology, explicate criteria for informed consent in online interacti...
Article
Full-text available
The article discusses how one can design and use technologies wisely and ethically to enhance personal and social lives, through a discussion of the enduring human value of trust. Perhaps the greatest difference between trust online and in all other contexts is that when online, there is more difficulty of reasonably assessing the potential harm an...
Article
Full-text available
Children in urban and rural parts of the Brazilian Amazon were interviewed in Portuguese on how they understand and value their relationship with the natural environment. Forty-four 5th-grade children (mean age = 13 years, 8 months) participated. Children in both locations were aware of environmental problems, believed that throwing garbage in the...

Network

Cited By