— RFID (Radio frequency identification) technology raises many privacy concerns among which the potential tracking of an RFID tag bearer and the eventuality of an illegitimate r...
An in-depth understanding of human factors in web-based interaction requires a methodology which enables researchers to chart online actions, understand the cognitive processes gu...
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
This work addresses a particular kind of cross domain personalization task consisting of selecting simultaneously two items in two different domains and recommending them togethe...
Authorship entails the constrained selection or generation of media and the organization and layout of that media in a larger structure. But authorship is more than just selection...
Nicholas Diakopoulos, Kurt Luther, Yevgeniy Eugene...