Sciweavers

2648 search results - page 323 / 530
» Human Factors In Computer Security
Sort
View
CHI
2010
ACM
15 years 10 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield
CHI
2010
ACM
15 years 10 months ago
Rethinking RFID: awareness and control for interaction with RFID systems
People now routinely carry radio frequency identification (RFID) tags – in passports, driver’s licenses, credit cards, and other identifying cards – where nearby RFID reader...
Nicolai Marquardt, Alex S. Taylor, Nicolas Villar,...
CASSIS
2005
Springer
15 years 9 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
149
Voted
CHI
2008
ACM
15 years 4 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
IJVR
2007
123views more  IJVR 2007»
15 years 3 months ago
There-Reality: Selective Rendering in High Fidelity Virtual Environments
—There-reality environments are those virtual environments which evoke the same perceptual response from a viewer as if they were actually present, or there, in the real scene be...
Alan Chalmers, Kurt Debattista, Georgia Mastoropou...