This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
With the ubiquity of typed text, the style and much of the personality of handwriting has been lost from general communication. To counter this we introduce an artistic real-time ...
Petra Neumann, Annie Tat, Torre Zuk, M. Sheelagh T...
This paper presents an approach to automatic course generation and student modeling. The method has been developed during the European funded projects Diogene and Intraserv, focuse...
In various types of interactions, individuals may attempt to determine whether their communication partners are being honest or deceptive. Judgments of honesty rely, in part, on a...
We describe the detrimental effects of browser cache/history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL person...