Publications
Home Research Publications Students Teaching

 

My research publications span a number of sub-areas within computer-supported cooperative work (CSCW) and social informatics. Articles are listed in reverse chronological order clustered by topics as follows:

 

bullet

Reuse, expertise management, and organizational memory

bullet

Social computing, online communities, and computer-mediated communication

bullet

Privacy and security

bullet

Mobile computing

bullet

Design for special populations

bullet

Pedagogy

 

REUSE, EXPERTISE MANAGEMENT & ORGANIZATIONAL MEMORY

 

CO: White, Kevin F., David Gurzick and Wayne G. Lutters. “Wiki Anxiety: Impediments to Implementing Wikis for IT Support Groups Proceedings of the ACM Symposium on Computer-Human Interaction for the Management of Information Technology (CHIMIT), ACM Press, 2009, article 10, pp. 1-4.

 

JA: Komlodi, Anita and Wayne G. Lutters, “Collaborative Use of Individual Search Histories,” Interacting with Computers, Elsevier, (20), 2008, pp. 184-198.

 

CM: White, Kevin F., Wayne G. Lutters, and Anita H. Komlodi. “Towards Virtualizing the Helpdesk: Assessing the Relevance of Knowledge Across DistanceProceedings of the ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT), ACM Press, 2008, article 3, pp. 1-10.

 

JA: Lutters, Wayne G. and Mark S. Ackerman, “Beyond Boundary Objects: Collaborative Reuse in Aircraft Technical Support Computer Supported Cooperative Work, Springer, (16:3), 2007, pp. 341-372.

 

JA: Lutters, Wayne G. and Carolyn B. Seaman, “Revealing Actual Documentation Usage in Software Maintenance Through War Stories Information and Software Technology, Elsevier, (49), 2007, pp. 576-587.

 

BC: Lutters, Wayne G., Mark S. Ackerman, and Xiaomu Zhou, “Group Information Management,” in William Jones and Jaime Teevan (Eds.), Personal Information Management, Seattle: University of Washington Press, 2007, pp. 236-248.

 

CM: White, Kevin F. and Wayne G. Lutters. “Structuring Cross-Organizational Knowledge Sharing Proceedings of the ACM International Conference on Supporting Group Work, ACM Press, 2007, pp. 187-196.

 

CO: White, Kevin F. and Wayne G. Lutters. “Mid-weight Collaborative Remembering: Wikis in the Workplace,” ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT), ACM Press, 2007, CD-ROM, A-5.

 

CO: Das, Sumita, Wayne G. Lutters, and Carolyn B. Seaman. “Understanding Documentation Value in Software Maintenance,” ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT), ACM Press, 2007, CD-ROM, A-2.

 

CO: White, Kevin F. and Wayne G. Lutters, “Insightful Illusions: Requirements Gathering for Large-Scale Groupware Systems,” Proceedings of the ACM International Conference on Supporting Group Work, ACM Press, 2005, pp. 348-349.

 

JA: Lutters, Wayne G., “Identifying Expertise Markers in Routine Work Artifacts: Exploring Micronote Taking Behavior Computers in Human Behavior, Elsevier, (20:2), 2004, pp. 185-199.

 

CM: Goodall, John R., Wayne G. Lutters, and Anita Komlodi, “I Know My Network: Collaboration and Expertise in Intrusion Detection,” Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW), CHI Letters, 6(3), ACM Press, 2004, pp. 342-345.

 

WS: Lutters, Wayne G., “Following the Fingerprints: Identifying Expert Assistance for RecontextualizationWorkshop: Conversations with the Past: Community, Technology and Interpretation in Long-Term Knowledge Management, ACM Conference on Computer-Supported Cooperative Work (CSCW), 2004. [www.wmstubblefield.com/cscw.html]

 

WS: Lutters, Wayne G. and Carolyn Seaman, “Software Maintenance and Support: Identifying Routine Work Artifacts as Boundary Objects Across Time,” Workshop: Identifying Gaps between HCI, Software Engineering and Design, and Boundary Objects to Bridge Them, ACM Conference on Human Factors in Computing Systems (CHI), 2004. [IFIP 7.2 www.se-hci.org/bridging/chi2004/]

 

PA: White, Kevin F. and Wayne G. Lutters, “Behind the Curtain: Lessons Learned from A Wizard of Oz Field Experiment,” ACM SIG-GROUP Bulletin, ACM Press, (24:3), 2004, pp. 129-136.

 

BC: Ackerman, Mark S., James S. Boster, Wayne G. Lutters, and David W. McDonald, “Who’s There? The Knowledge Mapping Approximation Project,” in Mark Ackerman, Volkmar Pipek and Volker Wulf, Sharing Expertise: Beyond Knowledge Management, MIT Press, 2003, pp. 159-175.

 

CM: Lutters, Wayne G. and Mark S. Ackerman, “Achieving Safety: A Field Study of Boundary Objects in Aircraft Technical Support Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW), CHI Letters, 4(3), ACM Press, 2002, pp. 266-275.

 

PA: Lutters, Wayne G., “Storytelling in Collaborative Work: The Challenge of Preserving Sensitive Interactions ACM SIG-GROUP Bulletin, ACM Press, (23:2), 2002, pp. 22-23.

 

WS: Lutters, Wayne G., “Storytelling in Collaborative Work: Design Challenges for Capturing and Representing Sensitive InteractionsWorkshop: Storytelling and Collaborative Activities, ACM Conference on Computer-Supported Cooperative Work (CSCW), 2002.

 

OA: Lutters, Wayne G., “Supporting Reuse: IT and the Role of Archival Boundary Objects in Collaborative Problem Solving Dissertation, University of California-Irvine, 2001.

 

WS: Lutters, Wayne G., “Boundary Objects, Information Flows, and Organizational Memory: Supporting Knowledge Reuse in a High-Reliability OrganizationResearch Boaster, Human-Computer Interaction Consortium (HCIC), 2001.

 

CM: Lutters, Wayne G., Mark S. Ackerman, James Boster and David W. McDonald, “Mapping Knowledge Networks in Organizations: Creating a Knowledge Mapping InstrumentProceedings of the Americas Conference on Information Systems (AMCIS), AIS Press, 2000, pp. 2014-2018.

 

CO: Lutters, Wayne G., “Supporting Knowledge Reuse: A Field Study of Service Engineers in a High-Reliability Organization,” Proceedings of the Americas Conference on Information Systems (AMCIS), AIS Press, 2000, pp. 2129-2131.

 

WS: Lutters, Wayne G., “Supporting Knowledge Reuse: A Field Study of Service Engineers in a High-Reliability Organization Doctoral Consortium, ACM Conference on Computer-Supported Cooperative Work (CSCW), 2000. [www.sigchi.org/cscw2000/progdoctoral.html]

 

WS: Ackerman, Mark S., David McDonald, Wayne G. Lutters, and Jack Muramatsu, “Recommenders for Expertise Management,” Workshop, ACM Conference on Research and Development in Information Retrieval (SIGIR), 1999.

 

TR: Lutters, Wayne G., Mark S. Ackerman, James Boster and David W. McDonald, “Creating a Knowledge Mapping Instrument: Approximation Techniques for Mapping Knowledge Networks in Organizations,” NSF-UCI Center for Research on Information Technology and Organizations (also UCI-ICS #99-32), 1999.

 

 

SOCIAL COMPUTING, ONLINE COMMUNITIES & COMPUTER-MEDIATED COMMUNICATION

 

CM: Gurzick, David, Kevin F. White, Wayne G. Lutters and Lee Boot. “A View from Mount Olympus: The Impact of Activity Tracking Tools on the Character and Practice of Moderation,” Proceedings of the ACM International Conference on Supporting Group Work (Group), ACM Press, 2009, 361-369.

 

CM: Gurzick, David, and Wayne G. Lutters. “Towards a Design Theory for Online CommunitiesProceedings of the International Conference on Design Science Research in Information Systems and Technology (DESRIST), 2009, article 11, pp. 1-20. [Best student-lead paper award]

 

CO: Gurzick, David, Wayne G. Lutters, and Lee Boot. “Rethinking Recruitment for Adolescent Online CommunitiesProceedings of the Ninth Annual Internet Research Conference (AoIR 9.0), 2008.

 

CO: Hou, Weimin, Anita Komlodi, Wayne G. Lutters, and Jennifer Preece. Does Instant Messaging Form a New Online Culture? Key Similarities and Differences in the Everyday Experience of Chinese and North American Users. Proceedings of the 12th International Conference on Human-Computer Interaction (HCII), July 22-27, 2007, Beijing, China, pp. 297-301.

 

CO: Gurzick, David and Wayne G. Lutters, “From the Personal to the Profound: Understanding the Blog Life Cycle,” Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI), ACM Press, 2006, pp. 827-832.

 

CM: Lutters, Wayne G. and Weimin Hou, “Recapturing What Was Lost: Re-emphasizing Locality in Social Interactions on the Net,” Proceedings of the International Conference on Human-Computer Interaction (HCII), Online Communities and Social Computing Conference, Lawrence Erlbaum Associates, 2005, CD-ROM.

 

JA: Lutters, Wayne G. and Mark S. Ackerman, “Joining the Backstage: Locality and Centrality in an Online Community Information Technology and People, Emerald, (16:2), 2003, pp. 157-182.

 

WS: Lutters, Wayne G., “The Castle: Locality and Centrality in an Electronic Social Space,” Research Boaster, Human-Computer Interaction Consortium (HCIC), 1999.

 

PA: Lutters, Wayne G., “Virtual Culture: Identity and Community in Cyberspace (Steven G. Jones, Ed., Thousand Oaks, CA: Sage Publications, 1997),” Library and Information Science Research, (20:1), 1998, pp. 106-107.

 

TR: Lutters, Wayne G. and Mark S. Ackerman, “The Castle: Locality and Centrality in an Electronic Social Space,” UCI-ICS Social Worlds Lab #98-4, 1998.

 

PA: Lutters, Wayne G. and Mark S. Ackerman, “A Collectivity in an Electronic Social Space: Examining Mouse World,” ACM SIG-GROUP Bulletin, ACM Press, (18:1), 1997, pp. 41-43.

 

PA: Whittaker, Steve, Wayne G. Lutters, et al. “Widening the Net: the Theory and Practice of Physical and Network Communities ACM SIG-GROUP Bulletin, ACM Press, (18:1), 1997, pp. 27-32.

 

TR: Lutters, Wayne G., “Looking Forward Through the Past: The Lessons of the Radio Newspaper,” UCI-ICS Social Worlds Lab #97-3, 1997.

 

TR: Lutters, Wayne G. and Mark S. Ackerman, “Social Relations in Complex Environments: An Introduction to the Chicago School of SociologyUCI-ICS Social Worlds Lab #96-1, 1996.

 

 

PRIVACY & SECURITY

 

JA: Goodall, John R., Wayne G. Lutters and Anita Komlodi, “Supporting Intrusion Detection Work Practice,” Journal of Information System Security, The Information Institute, 5(2), 2009, 42-73.

 

JA: Goodall, John R., Wayne G. Lutters and Anita Komlodi, “Developing Expertise for Network Intrusion DetectionInformation Technology and People, Emerald, (22:2), 2009, pp. 92-108.

 

CM: Heckle, Rosa, Wayne G. Lutters, and David Gurzick. “Network Authentication using Single Sign-On: The Challenge of Aligning Mental ModelsProceedings of the ACM Symposium on Computer Human Interaction for Management of Information Technology (CHIMIT), ACM Press, 2008, article 6, pp. 1-10.

 

CO: Heckle, Rosa and Wayne G. Lutters. “Privacy Implications for Single Sign-on Authentication in a Hospital Environment,” Proceedings of the Symposium on Usable Privacy and Security (SOUPS), 2007, 173-174.

 

WS: Heckle, Rosa and Wayne G. Lutters. “Realities of Authentication Management In a Hospital Environment,” Workshop:  Usable IT Security Management (USM), Symposium on Usable Privacy and Security (SOUPS), 2007, CD-ROM. [http://cups.cs.cmu.edu/soups/2007/workshop/Authentication_Management_Hospital.pdf]

 

JA: Goodall, John R., Wayne G. Lutters, Penny Rheingans, and Anita Komlodi, “Focusing on Context in Network Traffic AnalysisIEEE Computer Graphics and Applications, IEEE Press, (26:2), 2006, pp. 72-80.

 

CO: Goodall, John R., Wayne G. Lutters, Penny Rheingans, and Anita Komlodi, “Preserving the Big Picture: Visual Network Traffic Analysis with TNVProceedings of the IEEE Workshop on Visualization for Computer Security (VizSec), IEEE Press, 2005, pp. 47-54.

 

CO: Heckle, Rosa and Wayne G. Lutters, “Re-examining User Perceptions of Online Privacy Notices: The Value of Real-Time ObservationProceedings of the Symposium on Usable Privacy and Security (SOUPS), 2005, CD-ROM. [http://cups.cs.cmu.edu/soups/2005/2005posters/17-heckle.pdf]

 

CO: Goodall, John R., A. Ant Ozok, Wayne G. Lutters, Penny Rheingans, and Anita Komlodi, “A User-Centered Approach to Visualizing Network Traffic for Intrusion DetectionExtended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI), ACM Press, 2005, pp. 1403-1406.

 

CO: Goodall, John R., Wayne G. Lutters, and Anita Komlodi, “The Work of Intrusion Detection: Rethinking the Role of Security Analysts Proceedings of the Americas Conference on Information Systems (AMCIS), AIS Press, 2004, pp. 1421-1427.

 

CO: Komlodi, Anita, John R. Goodall, and Wayne G. Lutters, “An Information Visualization Framework for Intrusion Detection,” Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI), ACM Press, 2004, pp. 1743-1746.

 

 

MOBILE COMPUTING

 

CO: L Dai, Liwei, Wayne G. Lutters, and Carlie Bower, “Why Use Memo for All? Restructuring Mobile Applications to Support Informal Note TakingExtended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI), ACM Press, 2005, pp. 1320-1323.

 

CM: Lin, Min, Wayne G. Lutters, and Tina S. Kim, “Understanding the Micronote Lifecycle: Improving Mobile Support for Informal Note Taking,” ACM Conference on Human Factors in Computing Systems (CHI), CHI Letters, 6(1), ACM Press, 2004, pp. 687- 694.

 

 

DESIGN FOR SPECIAL POPULATIONS

 

CO: Kaur, Manpreet, Weimin Hou, Wayne G. Lutters, Anita Komlodi, Lee Boot, Claudia Morrell, Shelia R. Cotten, A. Ant Ozok, and Zeynep Tufekci, “‘My Mom is a Cell-Phone Illiterate’ – The Influence of Parental Perceptions on Pre-Adolescent Attitudes Towards ICT,” Proceedings of the 6th ACM Grace Hopper Celebration of Women in Computing, ACM Press, 2006, 216.

 

CO: Hou, Weimin, Manpreet Kaur, Anita Komlodi, Wayne G. Lutters, Lee Boot, Claudia Morrell, Shelia R. Cotten, A. Ant Ozok, and Zeynep Tufekci, “‘Girls don’t waste time’: Pre-Adolescent Attitudes toward ICT,” Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI), ACM Press, 2006, pp. 875-880.

 

 

PEDAGOGY

 

PA: Mitchell, Susan M. and Wayne G. Lutters, “Assessing the Value of Computer Science Course Material Repositories: a Work in Progress,” Journal of Computing Sciences in Colleges, (22:3), 2007, p. 53.

 

CO: Mitchell, Susan M. and Wayne G. Lutters, “Assessing the Value of Computer Science Course Material RepositoriesProceedings of the IEEE Conference on Software Engineering Education and Training, IEEE Press, 2006, section 2.2.

 

 

LEGEND

JA:       Journal article (peer reviewed)

PA:      Professional article (peer or editor reviewed)

BC:      Book chapter (editorially reviewed)

CM:     Major article in highly competitive conference proceedings (peer reviewed)

CO:      Other conference publication (peer reviewed)

WS:      Workshop (peer or editor reviewed)

TR:      Technical report (not reviewed)

OA:      Other article (not reviewed)