Novia Nurain
Applied Filters
- Novia Nurain
- AuthorRemove filter
People
Colleagues
- Novia Nurain (23)
- Kay Hane Connelly (8)
- Chia-Fang (Christina) Chung (7)
- Clara Marques Caldeira (7)
- Zaidat Ibrahim (4)
- A B M Alim Al Islam (3)
- Anika Binte M Alim Islam (3)
- Suraiya Tairin (3)
- Aswati Panicker (2)
- Chun Han (Ariel) Wang (2)
- James Clawson (2)
- Katie A. Siek (2)
- Moin Mostakim (2)
- Seung-wan Ha (2)
- Taslim Arefin Khan (2)
- Egemen Tanin (1)
- George Demiris (1)
- Mahmuda Naznin (1)
- Mohammad Kaykobad (1)
- Vijay Raghunathan (1)
Publication
Proceedings/Book Names
- CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (4)
- ACM DEV '16: Proceedings of the 7th Annual Symposium on Computing for Development (2)
- ACSAT '12: Proceedings of the 2012 International Conference on Advanced Computer Science Applications and Technologies (1)
- CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (1)
- CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (1)
- CHI EA '21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems (1)
- CHI EA '24: Extended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems (1)
- COMPASS '24: Proceedings of the 7th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies (1)
- DIS '23 Companion: Companion Publication of the 2023 ACM Designing Interactive Systems Conference (1)
- DIS '23: Proceedings of the 2023 ACM Designing Interactive Systems Conference (1)
- GeoRich'15: Second International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data (1)
- MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (1)
- MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOpen AccessPublished By ACMPublished By ACM
“We are blessed to live in the countryside”: Unpacking Rural and Small-Town Older Adults’ Resilient Nature in Times of the COVID-19 Pandemic
- Novia Nurain
Indiana University, USA
, - Chia-Fang Chung
University of California Santa Cruz, USA
, - Clara Caldeira
Google São Paulo, Brazil, Brazil
, - Kay Connelly
Indiana University, USA
COMPASS '24: Proceedings of the 7th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies•July 2024, pp 193-200• https://doi.org/10.1145/3674829.3675074The COVID-19 pandemic has threatened disproportionately rural older adults’ health and well-being as they suffer from unique social exclusion due to a lack of services, such as transportation, communication infrastructure, healthcare, and social ...
- 0Citation
- 38
- Downloads
MetricsTotal Citations0Total Downloads38Last 12 Months38Last 6 weeks36
- Novia Nurain
- extended-abstractPublished By ACMPublished By ACM
Forms of Fraudulence in Human-Centered Design: Collective Strategies and Future Agenda for Qualitative HCI Research
- Aswati Panicker
Informatics, Indiana University Bloomington, United States
, - Novia Nurain
School of Information, University of Michigan, United States
, - Zaidat Ibrahim
Luddy School of Informatics, Computing, & Engineering, Indiana University, United States
, - Chun-Han (Ariel) Wang
University of California, Santa Cruz, United States
, - Seung Wan Ha
Department of Computational Media, University of California, Santa Cruz, United States
, - Elizabeth Kaziunas
Department of Informatics, Indiana University Bloomington, United States
, - Maria K Wolters
School of Informatics, University of Edinburgh, United Kingdom
, - Chia-Fang Chung
Computational Media, University of California, Santa Cruz, United States
CHI EA '24: Extended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems•May 2024, Article No.: 469, pp 1-5• https://doi.org/10.1145/3613905.3636309New technical forms of deception–including AI deepfakes and unethical uses of ChatGTP–have gained attention in the wider research community and media. There has also been an increase in the coordinated social activities of bad actors posing as legitimate ...
- 0Citation
- 147
- Downloads
MetricsTotal Citations0Total Downloads147Last 12 Months147Last 6 weeks62
- Aswati Panicker
- research-articlePublished By ACMPublished By ACM
Understanding fraudulence in online qualitative studies: From the researcher's perspective
- Aswati Panicker
Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, United States
, - Novia Nurain
Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, United States
, - Zaidat Ibrahim
Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, United States
, - Chun-Han (Ariel) Wang
Computational Media, University of California, Santa Cruz, United States
, - Seung Wan Ha
Computational Media, University of California, Santa Cruz, United States
, - Yuxing Wu
Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, United States
, - Kay Connelly
Office of the Vice President for Research and Innovation, Michigan State University, United States
, - Katie A. Siek
Luddy School of Informatics, Computing, and Engineering, Indiana University Bloomington, United States
, - Chia-Fang Chung
Computational Media, University of California, Santa Cruz, United States
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems•May 2024, Article No.: 824, pp 1-17• https://doi.org/10.1145/3613904.3642732Researchers are increasingly facilitating qualitative research studies online. While this has made research more accessible for participation, there have been notable encounters with “fraudulent” participants. By fraudulent, we refer to individuals who ...
- 0Citation
- 641
- Downloads
MetricsTotal Citations0Total Downloads641Last 12 Months641Last 6 weeks126- 2
- Aswati Panicker
- research-articlePublished By ACMPublished By ACM
Designing a Card-Based Design Tool to Bridge Academic Research & Design Practice For Societal Resilience
- Novia Nurain
The Luddy School of Informatics, Computing, and Engineering, Indiana University, United States
, - Chia-Fang Chung
Computational Media, University of California, Santa Cruz, United States
, - Clara Caldeira
Luddy School of Informatics, Computing, and Engineering, Indiana University, United States and Google, Brazil
, - Kay Connelly
The Luddy School of Informatics, Computing and Engineering, Indiana University, United States
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems•May 2024, Article No.: 817, pp 1-20• https://doi.org/10.1145/3613904.3642686Professional designers often struggle to apply insights from HCI research in their work. To make academic knowledge more accessible to practitioners, HCI researchers have created translational design tools, such as design cards, that support the ...
- 2Citation
- 1,294
- Downloads
MetricsTotal Citations2Total Downloads1,294Last 12 Months1,294Last 6 weeks264
- Novia Nurain
- research-articlePublished By ACMPublished By ACM
Tracking During Ramadan: Examining the Intersection of Menstrual and Religious Tracking Practices Among Muslim Women in the United States
- Zaidat Ibrahim
Luddy School of Informatics, Computing, & Engineering, Indiana University, United States
, - Novia Nurain
The Luddy School of Informatics, Computing, and Engineering, Indiana University, United States
, - James Clawson
Luddy School of Informatics, Computing, & Engineering, Indiana University, United States
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems•May 2024, Article No.: 689, pp 1-19• https://doi.org/10.1145/3613904.3642374Personal Informatics (PI) tools are crucial in helping individuals monitor their physical health, mental health, and overall well-being. Many Muslim women use multiple PI tools to support their religious and spiritual well-being alongside their health. ...
- 1Citation
- 465
- Downloads
MetricsTotal Citations1Total Downloads465Last 12 Months465Last 6 weeks111
- Zaidat Ibrahim
- research-articlePublished By ACMPublished By ACM
"Islamically, I am not on my period": A Study of Menstrual Tracking in Muslim Women in the US
- Zaidat Ibrahim
Luddy School of Informatics, Computing, & Engineering, Indiana University, United States
, - Pallavi Panchpor
Indiana University, United States
, - Novia Nurain
The Luddy School of Informatics, Computing, and Engineering, Indiana University, United States
, - James Clawson
Luddy School of Informatics, Computing, & Engineering, Indiana University, United States
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems•May 2024, Article No.: 686, pp 1-16• https://doi.org/10.1145/3613904.3642006The widespread adoption of menstrual tracking applications has garnered much attention with recent research focusing on inclusive design. However, existing literature has yet to explore the impact of religious practices on menstrual tracking behavior. We ...
- 3Citation
- 637
- Downloads
MetricsTotal Citations3Total Downloads637Last 12 Months637Last 6 weeks165
- Zaidat Ibrahim
- research-articlePublic AccessPublished By ACMPublished By ACM
How do I compare to the other people?": Older Adults' Perspectives on Personal Smart Home Data for Self-Management"
- Clara Caldeira
Indiana University, Bloomington, IN, USA
, - Novia Nurain
Indiana University, Bloomington, IN, USA
, - Anna A. Heintzman
Indiana University, Bloomington, IN, USA
, - Haley Molchan
Indiana University, Bloomington, IN, USA
, - Kelly Caine
Clemson University, Clemson, SC, USA
, - George Demiris
University of Pennsylvania, Philadelphia, PA, USA
, - Katie A. Siek
Indiana University, Bloomington, IN, USA
, - Blaine Reeder
University of Missouri, Columbia, MO, USA
, - Kay Connelly
Indiana University, Bloomington, IN, USA
Proceedings of the ACM on Human-Computer Interaction, Volume 7, Issue CSCW2•October 2023, Article No.: 238, pp 1-32 • https://doi.org/10.1145/3610029Research on smart home monitoring for older adults has predominantly focused on systems whose data and alerts are directed towards family members, caregivers, or healthcare providers. Older adults have expressed interest in engaging with these systems by ...
- 3Citation
- 340
- Downloads
MetricsTotal Citations3Total Downloads340Last 12 Months340Last 6 weeks33
- Clara Caldeira
- research-articlePublished By ACMPublished By ACM
A Rapid, Iterative, and Remote (RIR) Method for Designing Translational Tools: Study Experience and Lessons Learned
- Novia Nurain
The Luddy School of Informatics, Computing, and Engineering, Indiana University, United States
, - Chia-Fang Chung
Informatics, Indiana University Bloomington, United States
, - Clara Caldeira
Luddy School of Informatics, Computing, and Engineering, Indiana University, United States and Google, Brazil
, - Kay Connelly
The Luddy School of Informatics, Computing and Engineering, Indiana University, United States
DIS '23 Companion: Companion Publication of the 2023 ACM Designing Interactive Systems Conference•July 2023, pp 222-227• https://doi.org/10.1145/3563703.3596630We present a rapid, iterative, and remote (RIR) approach as a collaborative method for combining designers’ feedback in creating translational tools by HCI researchers to make academic knowledge accessible to designers. RIR allows refining and ...
- 1Citation
- 106
- Downloads
MetricsTotal Citations1Total Downloads106Last 12 Months66Last 6 weeks2
- Novia Nurain
- research-articlePublished By ACMPublished By ACM
“I left my legacy, told my story”: Understanding Older Adults’ Tracking Practices to Promote Active Aging
- Novia Nurain
The Luddy School of Informatics, Computing, and Engineering, Indiana University, United States
, - Chia-Fang Chung
Informatics, Indiana University Bloomington, United States
DIS '23: Proceedings of the 2023 ACM Designing Interactive Systems Conference•July 2023, pp 459-475• https://doi.org/10.1145/3563657.3596083Research on aging technologies typically has explored health condition management and physical activity, while other aspects of active aging (e.g., psychological and social well-being) receive less attention. To better support active aging, we focus on ...
- 2Citation
- 516
- Downloads
MetricsTotal Citations2Total Downloads516Last 12 Months328Last 6 weeks23- 2
- Novia Nurain
- research-articlePublished By ACMPublished By ACM
“I hope I never need one”: Unpacking Stigma in Aging in Place Technology
- Clara Caldeira
Luddy School of Informatics, Computing, and Engineering, Indiana University, United States
, - Novia Nurain
School of Informatics, Computing, and Engineering, Indiana University, United States
, - Kay Connelly
The Luddy School of Informatics, Computing and Engineering, Indiana University, United States
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems•April 2022, Article No.: 264, pp 1-12• https://doi.org/10.1145/3491102.3517586Aging in place technologies are designed to extend independence and autonomy in older adults, promoting quality of life and peace of mind. Prior work has described how adoption and continued use of these technologies are low when they are perceived as ...
- 9Citation
- 815
- Downloads
MetricsTotal Citations9Total Downloads815Last 12 Months274Last 6 weeks37
- Clara Caldeira
- research-articlePublished By ACMPublished By ACM
Hugging with a Shower Curtain: Older Adults' Social Support Realities During the COVID-19 Pandemic
- Novia Nurain
Indiana University, Bloomington, IN, USA
, - Chia-Fang Chung
Indiana University Bloomington, Bloomington, IN, USA
, - Clara Caldeira
Indiana University, Bloomington, Bloomington, IN, USA
, - Kay Connelly
Indiana University Blooming, Bloomington, IN, USA
Proceedings of the ACM on Human-Computer Interaction, Volume 5, Issue CSCW2•October 2021, Article No.: 463, pp 1-31 • https://doi.org/10.1145/3479607The COVID-19 pandemic led to dire consequences globally, and it has been particularly challenging for older adults. They are at a higher risk of adverse outcomes of the disease \citecdc_covid. Older adults also use less technology than other age groups \...
- 22Citation
- 422
- Downloads
MetricsTotal Citations22Total Downloads422Last 12 Months105Last 6 weeks13
- Novia Nurain
- posterPublished By ACMPublished By ACM
Older Adults’ Experiences of Autonomy During COVID-19 Pandemic
- Novia Nurain
School of Informatics, Computing, and Engineering Indiana University, United States
, - Clara Caldeira
Informatics UC Irvine, United States
, - Kay Connelly
School of Informatics, Computing and Engineering Indiana University Blooming, United States
CHI EA '21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems•May 2021, Article No.: 250, pp 1-6• https://doi.org/10.1145/3411763.3451674A sense of autonomy is important to ensure a good quality of life for older adults. However, the recent COVID-19 pandemic challenged older adults’ autonomy. The government has imposed rules and regulations to slow down the spread of the virus that ...
- 6Citation
- 385
- Downloads
MetricsTotal Citations6Total Downloads385Last 12 Months58Last 6 weeks4
- Novia Nurain
- research-articlePublished By ACMPublished By ACM
HEliOS: huffman coding based lightweight encryption scheme for data transmission
- Mazharul Islam
Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Novia Nurain
Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Mohammad Kaykobad
Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Sriram Chellappan
University of South Florida
, - A. B. M. Alim Al Islam
Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
MobiQuitous '19: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services•November 2019, pp 70-79• https://doi.org/10.1145/3360774.3360829Demand for fast data sharing among smart devices is rapidly increasing. This trend creates challenges towards ensuring essential security for online shared data while maintaining the resource usage at a reasonable level. Existing research studies ...
- 4Citation
- 118
- Downloads
MetricsTotal Citations4Total Downloads118Last 12 Months10Last 6 weeks3
- Mazharul Islam
- research-article
Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries
- Novia Nurain
Department of CSE, United International University, Dhaka, Bangladesh
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Suraiya Tairin
Department of CE, University of Virginia, USA
, - Taslim Arefin Khan
Department of CSE, University of British Columbia, Canada
, - Shahad Ishraq
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - A. B. M. Alim Al Islam
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
Computers and Security, Volume 84, Issue C•Jul 2019, pp 35-52 • https://doi.org/10.1016/j.cose.2019.03.012AbstractExploration of potential security threats and vulnerabilities of a real-time system specifically designed for detecting missing rail blocks in the context of developing countries is yet to be explored. Therefore, in this paper, we ...
- 1Citation
MetricsTotal Citations1
- Novia Nurain
- research-article
Exploring network-level performances of wireless nanonetworks utilizing gains of different types of nano-antennas with different materials
- Novia Nurain
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Bashir M. Sabquat Bahar Talukder
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Tanzila Choudhury
Department of CSE, Prairie View A&M University, Prairie View, USA
, - Suraiya Tairin
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Marjan Ferdousi
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Mahmuda Naznin
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - A. B. M. Alim Al Islam
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
Wireless Networks, Volume 25, Issue 5•Jul 2019, pp 2651-2664 • https://doi.org/10.1007/s11276-019-01977-wAbstractWireless nanonetworks are not a simple extension of traditional communication networks at the nano-scale. Owing to being a completely new communication paradigm, existing research in this field is still at an embryonic stage. Furthermore, most of ...
- 0Citation
MetricsTotal Citations0
- Novia Nurain
- research-articlePublished By ACMPublished By ACM
Local Standards for Anonymization Practices in Health, Wellness, Accessibility, and Aging Research at CHI
- Jacob Abbott
Indiana University Bloomington, Bloomington, IN, USA
, - Haley MacLeod
Indiana University Bloomington, Bloomington, IN, USA
, - Novia Nurain
Indiana University Bloomington, Bloomington, IN, USA
, - Gustave Ekobe
Indiana University Bloomington, Bloomington, IN, USA
, - Sameer Patil
Indiana University Bloomington, Bloomington, IN, USA
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems•May 2019, Paper No.: 462, pp 1-14• https://doi.org/10.1145/3290605.3300692When studying technologies pertaining to health, wellness, accessibility, and aging, researchers are often required to perform a balancing act between controlling and sharing sensitive data of the people in their studies and protecting the privacy of ...
- 32Citation
- 638
- Downloads
MetricsTotal Citations32Total Downloads638Last 12 Months61Last 6 weeks13- 1
Supplementary Materialpn5313.zip
- Jacob Abbott
- research-article
A new network paradigm for low-cost and lightweight real-time communication between train and rail track to detect missing and faulty rail blocks
- Tusher Chakraborty
Microsoft Research, India
, - Novia Nurain
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Suraiya Tairin
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Taslim Arefin Khan
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Jannatun Noor
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - Md. Rezwanul Islam
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
, - A.B.M. Alim Al Islam
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
Journal of Network and Computer Applications, Volume 131, Issue C•Apr 2019, pp 40-54 • https://doi.org/10.1016/j.jnca.2019.01.018AbstractDerailment due to uprooted or faulty rail blocks is an epoch-making problem in many developing countries such as Bangladesh, India, Kenya, etc. Such derailments result in both death tolls and loss of property. Low-resource settings and ...
- 1Citation
MetricsTotal Citations1
- Tusher Chakraborty
- posterPublished By ACMPublished By ACM
Prottasha: An Attempt to Help the Women Fighting Ovarian Cancer in Rural Areas of Bangladesh
- Novia Nurain
Department of CSE, United International University, Dhaka
, - Roksana Jahan
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka
, - Subarna Chowdhury Soma
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka
, - Moin Mostakim
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka
ACM DEV '16: Proceedings of the 7th Annual Symposium on Computing for Development•November 2016, Article No.: 38, pp 1-4• https://doi.org/10.1145/3001913.3006647The rise in the number of deaths in Bangladesh owing to different female genital cancer, specifically ovarian cancer, emphasizes the need of having effective measures to aware women, specially the rural women about the prevention of ovarian cancer. ...
- 0Citation
- 56
- Downloads
MetricsTotal Citations0Total Downloads56Last 12 Months2
- Novia Nurain
- posterPublished By ACMPublished By ACM
Power Attack: An Emerging Threat in Health-care Applications Using Medical Body Area Networks
- Novia Nurain
Department of CSE, United International University, Dhaka
, - A. B. M. Alim Al Islam
Department of CSE, Bangladesh University of Engineering and Technology, Dhaka
ACM DEV '16: Proceedings of the 7th Annual Symposium on Computing for Development•November 2016, Article No.: 33, pp 1-4• https://doi.org/10.1145/3001913.3006642Recent rise in aged population and chronic diseases, is placing increasing pressure on health care expenditure. Ubiquitous health care is regarded as a potential driver in reducing such health expenditure. Advancement in wireless communication and ...
- 0Citation
- 82
- Downloads
MetricsTotal Citations0Total Downloads82Last 12 Months1
- Novia Nurain
- posterPublished By ACMPublished By ACM
Poster: Power Attack in Body Area Networks: Dream or Reality?
- Novia Nurain
United International University, Dhaka, Bangladesh
, - A.B.M. Alim Al Islam
Bangladesh University of Engineering and Technology, Dhaka, Bangladesh
MobiSys '16 Companion: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion•June 2016, pp 66-66• https://doi.org/10.1145/2938559.2948815Entering the era of remote health monitoring and wearable devices, wireless body area networks (BSNs) are growing at a fast pace. However, energy restriction of micro-battery of a bio-sensor makes BANs vulnerable to malicious attacks. In this paper, we ...
- 1Citation
- 90
- Downloads
MetricsTotal Citations1Total Downloads90Last 12 Months1
- Novia Nurain
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner