@conference {2013, title = {Forgotten island: A story-driven citizen science adventure}, booktitle = {CHI {\textquoteright}13 Extended Abstracts on Human Factors in Computing Systems}, year = {2013}, month = {4/2013}, pages = {2643{\textendash}2646}, publisher = {ACM Press}, organization = {ACM Press}, address = {Paris, France}, abstract = {

Forgotten Island, a citizen science video game, is part of an NSF-funded design science research project, Citizen Sort. It is a mechanism to help life scientists classify photographs of living things and a research tool to help HCI and information science scholars explore storytelling, engagement, and the quality of citizenproduced data in the context of citizen science.

}, isbn = {9781450319522}, doi = {10.1145/2468356.2479484}, url = {http://delivery.acm.org/10.1145/2480000/2479484/p2643-prestopnik.pdf}, author = {Nathan Prestopnik and Souid, Dania} } @proceedings {Mackay:1989, title = {How do experienced Information Lens users use rules?}, year = {1989}, note = {Proceedings Reprinted as ACM SIGCHI Bulletin, Volume 20, Issue SI.}, pages = {211{\textendash}216}, address = {Austin, TX}, abstract = {The Information Lens provides electronic mail users with the ability to write rules that automatically sort, select, and filter their messages. This paper describes preliminary results from an eighteen-month investigation of the use of this system at a corporate test site. We report the experiences of 13 voluntary users who have each had at least three months experience with the most recent version of the system. We found that: 1. People without significant computer experience are able to create and use rules effectively. 2. Useful rules can be created based on the fields present in all messages (e.g., searching for distribution lists or one{\textquoteright}s own name in the address fields or for character strings in the subject field), even without any special message templates. 3. People use rules both to prioritize messages before reading them and to sort messages into folders for storage after reading them. 4. People use delete rules primarily to filter out messages from low-priority distribution lists, not to delete personal messages to themselves.}, keywords = {Computer-Mediated Communication}, doi = {10.1145/67449.67491}, attachments = {https://crowston.syr.edu/sites/crowston.syr.edu/files/sigchi89.pdf}, author = {Mackay, Wendy E. and Malone, Thomas W. and Kevin Crowston and Rao, Ramana and Rosenblitt, David and Card, Stuart K.}, editor = {Bice, Ken and Lewis, Clayton} }