Many have enthusiastically greeted the ability to search and view public records online as a great advance for transparency and accountability. Such ability, however, also creates...
Sean A. Munson, Daniel Avrahami, Sunny Consolvo, J...
Wireless mesh networks (WMNs) that are being increasingly deployed in communities and public places provide a relatively stable routing infrastructure and can be used for diverse c...
Educational materials designed to teach users not to fall for phishing attacks are widely available but are often ignored by users. In this paper, we extend an embedded training m...
Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sh...
It is a kind of privacy infraction in personalized web service if the user profile submitted to one web site transferred to another site without user permission. That can cause th...
This paper presents a descriptive account of the social practices surrounding the iTunes music sharing of 13 participants in one organizational setting. Specifically, we character...
Amy Voida, Rebecca E. Grinter, Nicolas Ducheneaut,...