Sciweavers

2648 search results - page 64 / 530
» Human Factors In Computer Security
Sort
View
CHI
2005
ACM
15 years 10 months ago
Information search: the intersection of visual and semantic space
In the context of an information search task, does the visual salience of items interact with information scent? That is, do things like bold headlines or highlighted phrases inte...
Franklin P. Tamborello II, Michael D. Byrne
MHCI
2009
Springer
15 years 2 months ago
Glancephone: an exploration of human expression
In this paper, we describe the design and ethnographic study of a phone developed so as to allow people to glance at each other, rather than simply message or voice call. Glanceph...
Richard H. R. Harper, Stuart Taylor
DIM
2009
ACM
15 years 4 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
CHI
2003
ACM
15 years 10 months ago
Who wants to know what when? privacy preference determinants in ubiquitous computing
We conducted a questionnaire-based study of the relative importance of two factors, inquirer and situation, in determining the preferred accuracy of personal information disclosed...
Scott Lederer, Jennifer Mankoff, Anind K. Dey
SIGCSE
2006
ACM
355views Education» more  SIGCSE 2006»
15 years 3 months ago
Why students with an apparent aptitude for computer science don't choose to major in computer science
The statistics show that the number of Computer Science majors is dropping across the United States. Possible reasons include a reduced number of jobs in the field, an incorrect p...
Lori Carter