Sciweavers

2648 search results - page 132 / 530
» Human Factors In Computer Security
Sort
View
CHI
2011
ACM
14 years 8 months ago
Magic desk: bringing multi-touch surfaces into desktop work
Despite the prominence of multi-touch technologies, there has been little work investigating its integration into the desktop environment. Bringing multi-touch into desktop comput...
Xiaojun Bi, Tovi Grossman, Justin Matejka, George ...
141
Voted
SOUPS
2009
ACM
15 years 11 months ago
Revealing hidden context: improving mental models of personal firewall users
The Windows Vista personal firewall provides its diverse users with a basic interface that hides many operational details. However, concealing the impact of network context on th...
Fahimeh Raja, Kirstie Hawkey, Konstantin Beznosov
KES
2004
Springer
15 years 10 months ago
Towards Cortex Sized Artificial Nervous Systems
We characterize the size and complexity of the mammalian cortices of human, macaque, cat, rat, and mouse. We map the cortical structure onto a Bayesian confidence propagating neura...
Christopher Johansson, Anders Lansner
86
Voted
WWW
2004
ACM
16 years 5 months ago
An outsider's view on "topic-oriented blogging"
The number of Web blogs is growing extremely fast, thus this phenomenon cannot be ignored. This paper discusses the issue through monitoring a set of blogs for a two months period...
Judit Bar-Ilan
161
Voted
BCSHCI
2009
15 years 2 months ago
Digital parenting: designing children's safety
In this paper, I describe an ethnographic study of children and parents looking at issues of domestic privacy and security. I will provide an overview of parental rules and strate...
Jennifer A. Rode