Sciweavers

2648 search results - page 88 / 530
» Human Factors In Computer Security
Sort
View
76
Voted
WWW
2010
ACM
15 years 4 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
ITICSE
2006
ACM
15 years 3 months ago
One step further the ACM K-12 final report: a proposal for level 1: computer organization for K-8
Teaching computer science to children is a major priority in most countries in the world. Nevertheless, Computer Science curricula do not seem to address the children’s world, c...
Giovanni M. Bianco, Simonetta Tinazzi
HUC
2004
Springer
15 years 3 months ago
Some Assembly Required: Supporting End-User Sensor Installation in Domestic Ubiquitous Computing Environments
This paper explores end-user sensor installation for domestic ubiquitous computing applications and proposes five design principles to support this task. End-user sensor installati...
Chris Beckmann, Sunny Consolvo, Anthony LaMarca
IWCMC
2009
ACM
15 years 4 months ago
WMNSec: security for wireless mesh networks
Wireless Mesh Networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructure. However, WMN security has not been covered adequ...
Georg Lukas, Christian Fackroth
ASSETS
2009
ACM
15 years 4 months ago
Including accessibility within and beyond undergraduate computing courses
This paper presents a unique approach to undergraduate teaching in which accessibility topics are completely integrated throughout the curriculum, treating accessibility not as a ...
Annalu Waller, Vicki L. Hanson, David Sloan