This paper reports a longitudinal study of a non-speech input-controlled continuous cursor control system: Whistling User Interface (U3I). This study combines quantitative (target...
Adam J. Sporka, Sri Hastuti Kurniawan, Murni Mahmu...
This paper describes the coming-of-age of an analytical application that was built using agile development processes, tightly interlinked with an iterative user experience methodo...
We are investigating how to empower nonprofit community organizations to develop the information technology management practices required to carry out their civic goals. We highli...
Cecelia Merkel, Umer Farooq, Lu Xiao, Craig H. Gan...
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
The email communication system is threatened by unsolicited commercial email aka spam. In response, spam filters have been deployed widely to help reduce the amount of spam users ...