Sciweavers

563 search results - page 27 / 113
» Human-computer interaction research in the management inform...
Sort
View
CHIMIT
2008
ACM
14 years 11 months ago
Guidelines for designing IT security management tools
An important factor that impacts the effectiveness of security systems within an organization is the usability of security management tools. In this paper, we present a survey of ...
Pooya Jaferian, David Botta, Fahimeh Raja, Kirstie...
CHI
2008
ACM
15 years 10 months ago
Memorability of persuasive passwords
Text passwords are the primary authentication method used for most online services. Many online users select weak passwords. Regrettably, most proposed methods of strengthening pa...
Alain Forget, Robert Biddle
CHI
2007
ACM
15 years 10 months ago
HCI and new media arts: methodology and evaluation
Successful collaborations between New Media Arts and HCI tend to develop hybrid techniques that promote balanced contributions from both disciplines. However, since many of these ...
Piotr D. Adamczyk, Kevin Hamilton, Michael B. Twid...
CHI
2008
ACM
14 years 11 months ago
When the designer becomes the user: designing a system for therapists by becoming a therapist
In this paper, we present the design process for developing a technology to support therapists for children with autism. To learn about the domain for which we were designing, one...
Julie A. Kientz, Gregory D. Abowd
CHI
2008
ACM
15 years 10 months ago
What to do when search fails: finding information by association
Sometimes people cannot remember the names or locations of things on their computer, but they can remember what other things are associated with them. We created Feldspar, the fir...
Duen Horng Chau, Brad A. Myers, Andrew Faulring