Sciweavers

73 search results - page 10 / 15
» Computing a rodent's diary
Sort
View
CHI
2010
ACM
15 years 3 months ago
The true cost of unusable password policies: password use in the wild
HCI research published 10 years ago pointed out that many users cannot cope with the number and complexity of passwords, and resort to insecure workarounds as a consequence. We pr...
Philip Inglesant, Martina Angela Sasse
PERVASIVE
2011
Springer
14 years 20 days ago
Planning, Apps, and the High-End Smartphone: Exploring the Landscape of Modern Cross-Device Reaccess
The rapid growth of mobile devices has made it challenging for users to maintain a consistent digital history among all their personal devices. Even with a variety of cloud computi...
Elizabeth Bales, Timothy Sohn, Vidya Setlur
CHI
2008
ACM
15 years 10 months ago
Understanding geocaching practices and motivations
Geocaching is a location-based activity that has been practiced for a number of years. As a sustained and established activity it represents an important opportunity for understan...
Kenton O'Hara
CHI
2008
ACM
15 years 10 months ago
Designs on dignity: perceptions of technology among the homeless
Technology, it is argued, has the potential to improve everyone's life: from the workplace, to entertainment, to easing chores around the home. But what of people who have ne...
Christopher A. Le Dantec, W. Keith Edwards
CHI
2005
ACM
15 years 10 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...