Sciweavers

2648 search results - page 302 / 530
» Human Factors In Computer Security
Sort
View
HT
2009
ACM
15 years 1 months ago
Games with a purpose for social networking platforms
The online games market has matured in recent years. It is now a multi-billion dollar business with hundreds of millions players worldwide. At the same time, social networking pla...
Walter Rafelsberger, Arno Scharl
135
Voted
ASSETS
2010
ACM
14 years 10 months ago
Utterance-based systems: organization and design of AAC interfaces
Electronic Augmented and Alternative Communication (AAC) systems provide a method for people with severe speech impairments to communicate by selecting what they desire to say, an...
Timothy J. Walsh
140
Voted
CHI
2010
ACM
14 years 10 months ago
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishin...
Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumara...
117
Voted
CHI
2011
ACM
14 years 7 months ago
Donate for credibility: how contribution incentives can improve credibility
This study explores whether certain contribution incentives for online user-generated content can undermine or enhance contributor’s credibility. Through an online experiment, w...
Gary Hsieh, Scott E. Hudson, Robert E. Kraut
166
Voted
ICCV
2011
IEEE
14 years 3 months ago
Home 3D Body Scans from Noisy Image and Range Data
The 3D shape of the human body is useful for applications in fitness, games and apparel. Accurate body scanners, however, are expensive, limiting the availability of 3D body mode...
Alex Weiss, David Hirshberg, Michael Black