Sciweavers

2092 search results - page 354 / 419
» A Theory of Non-Deterministic Networks
Sort
View
CSCW
2010
ACM
15 years 8 months ago
Perceptions of trustworthiness online: the role of visual and textual information
People increasingly rely on social networking websites to initiate personal and professional relationships. This requires that a considerable amount of trust be placed in stranger...
Catalina L. Toma
CSCW
2010
ACM
15 years 8 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
HICSS
2010
IEEE
227views Biometrics» more  HICSS 2010»
15 years 6 months ago
Do Online Reviews Reflect a Product's True Perceived Quality? - An Investigation of Online Movie Reviews Across Cultures
When does the reported average of online ratings match perceived average assessment? We apply behavioral theory to capture intentions in rating online movie reviews in two dissimi...
Noi Sian Koh, Nan Hu, Eric K. Clemons
CHI
2010
ACM
15 years 6 months ago
Experience in social affective applications: methodologies and case study
New forms of social affective applications are emerging, bringing with them challenges in design and evaluation. We report on one such application, conveying wellbeing for both pe...
Paul André, m. c. schraefel, Alan J. Dix, R...
EUROSEC
2010
ACM
15 years 6 months ago
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered...
Jason Reed, Adam J. Aviv, Daniel Wagner, Andreas H...