Sciweavers

2648 search results - page 281 / 530
» Human Factors In Computer Security
Sort
View
114
Voted
FLAIRS
2000
15 years 5 months ago
A Parallel Approach to Modeling Language Learning and Understanding in Young Children
To reduce the complexity of studying a parallel mechanism for natural language learning and understanding which supports both utterance and discourse processing, we propose a comp...
Charles Hannon, Diane J. Cook
153
Voted
ECRIME
2007
15 years 7 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
127
Voted
CHI
2008
ACM
16 years 4 months ago
Grounded evaluation of information visualizations
We introduce grounded evaluation as a process that attempts to ensure that the evaluation of an information visualization tool is situated within the context of its intended use. ...
Petra Isenberg, Torre Zuk, Christopher Collins, M....
116
Voted
CHI
2008
ACM
16 years 4 months ago
Interactional empowerment
We propose that an interactional perspective on how emotion is constructed, shared and experienced, may be a good basis for designing affective interactional systems that do not i...
Anna Ståhl, Jarmo Laaksolahti, Kristina H&ou...
152
Voted
CHI
2007
ACM
16 years 4 months ago
The life and death of online gaming communities: a look at guilds in world of warcraft
Massively multiplayer online games (MMOGs) can be fascinating laboratories to observe group dynamics online. In particular, players must form persistent associations or "guil...
Nicolas Ducheneaut, Nicholas Yee, Eric Nickell, Ro...