Sciweavers

1545 search results - page 237 / 309
» Information Systems Success Revisited
Sort
View
CHI
2010
ACM
15 years 6 months ago
ColorPIN: securing PIN entry through indirect input
Automated teller machine (ATM) frauds are increasing drastically these days. When analyzing the most common attacks and the reasons for successful frauds, it becomes apparent that...
Alexander De Luca, Katja Hertzschuch, Heinrich Hus...
CHI
2010
ACM
15 years 6 months ago
Video playdate: toward free play across distance
We present an empirical investigation of video-mediated free play between 13 pairs of friends (ages 7 and 8). The pairs spent 10 minutes playing with each of four different protot...
Svetlana Yarosh, Kori M. Inkpen, A. J. Bernheim Br...
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 6 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
HICSS
2009
IEEE
115views Biometrics» more  HICSS 2009»
15 years 6 months ago
The Effect of Using a Semantic Wiki for Metadata Management: A Controlled Experiment
A coherent and consistent understanding of corporate data is an important factor for effective management of diversified companies and implies a need for companywide unambiguous d...
Kai M. Hüner, Boris Otto
IEEEARES
2009
IEEE
15 years 6 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira