Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Four text entry techniques for visually impaired users are presented. LetterScroll uses a mouse wheel to maneuver a cursor across a sequence of characters, and a button for charac...
This paper presents a quantitative human performance model of making single-stroke pen gestures within certain error constraints in terms of production time. Computed from the pro...
Today many workers spend too much of their time translating their co-workers' requests into structures that information systems can understand. This paper presents the novel ...
John Zimmerman, Anthony Tomasic, Isaac Simmons, Ia...