Sciweavers

145 search results - page 8 / 29
» How do users think about ubiquitous computing
Sort
View
130
Voted
CHI
2006
ACM
16 years 4 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
113
Voted
CHI
2008
ACM
16 years 4 months ago
Where no interface has gone before: what can the phaser teach us about label usage in hci?
Most research on how people represent procedures suggests that control labels are central. However, our data suggest that even moderately-experienced users do not rely on labels t...
Franklin P. Tamborello II, Phillip H. Chung, Micha...
119
Voted
SAINT
2002
IEEE
15 years 8 months ago
Ubiquitous Commerce - Always On, Always Aware, Always Pro-active
The development of the infrastructure for ubiquitous computing is progressing rapidly, yet the applications that will be built on this new infrastructure remain largely ill define...
Anatole Gershman
118
Voted
NORDICHI
2004
ACM
15 years 9 months ago
Two psychology-based usability inspection techniques studied in a diary experiment
Inspection techniques are widely used during systems design as a supplement to empirical evaluations of usability. Psychology-based inspection techniques could give important insi...
Kasper Hornbæk, Erik Frøkjær
118
Voted
EUC
2008
Springer
15 years 5 months ago
Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation
The first challenge that we tackle in this paper is how to conduct access control in ubiquitous environments where sites have to handle access requests from their own users as wel...
Omar Hasan, Jean-Marc Pierson, Lionel Brunie