Due to the increasing penetration of mobile phones even into poor communities, mobile payment schemes could bring formal financial services to the "unbanked". However, b...
Indrani Medhi, S. N. Nagasena Gautama, Kentaro Toy...
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Usability testing typically focuses on methodology and metrics, while the specific interactions being tested are chosen in an ad hoc way. This paper demonstrates a framework for o...
V. Katie Emery, Julie A. Jacko, Thitima Kongnakorn...
Video game players often learn to map their physical actions (e.g., pressing buttons) onto their on-screen avatars' actions (e.g., wielding swords) in order to play. We explo...
Although technology for communication has evolved tremendously over the past decades, mobility impaired individuals still face many difficulties interacting with communication serv...
Carlos Galinho Pires, Fernando Miguel Pinto, Eduar...