Sciweavers

2648 search results - page 130 / 530
» Human Factors In Computer Security
Sort
View
121
Voted
HUC
2009
Springer
15 years 9 months ago
The commodification of location: dynamics of power in location-based systems
Location-based ubiquitous computing systems are entering mainstream society and becoming familiar parts of everyday life. However, the settings in which they are deployed are alre...
Irina Shklovski, Janet Vertesi, Emily Troshynski, ...
SIGUCCS
2005
ACM
15 years 10 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
149
Voted
CHI
2010
ACM
15 years 12 months ago
Detecting professional versus personal closeness using an enterprise social network site
In this work we analyze the behavior on a company-internal social network site to determine which interaction patterns signal closeness between colleagues. Regression analysis sug...
Anna Wu, Joan Morris DiMicco, David R. Millen
MHCI
2009
Springer
15 years 11 months ago
Gestures all around us: user differences in social acceptability perceptions of gesture based interfaces
Gesture based interfaces provide a new way for us to interact with mobile devices, but also require us to make new decisions about how we feel about this new technology and which ...
Julie Rico, Stephen A. Brewster
CG
2010
Springer
15 years 1 days ago
Extraversion in Games
The behavior of a human player in a game expresses the personality of that player. Personality is an important characteristic for modeling the player's profile. In our researc...
Giel van Lankveld, Sonny Schreurs, Pieter Spronck,...