Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
Increasingly, learning environments are opening the learner model to the user it represents. This paper describes a study in which students were able to create their own presentati...
: The paper analyses broadband diffusion from a multitude of angles. The main objective of the analysis is thus to investigate the reasons behind an adoption delay present in certa...
A general link service for the WWW has been used within an Electronic Libraries’ project. Experience using it shows that as the links become increasingly interesting to the user...
Increased flexibility and modularisation in higher education complicates the process of learners finding their way through the offerings of higher education institutions. In lifel...