Sciweavers

1891 search results - page 249 / 379
» Interactive Analysis of Computer Crimes
Sort
View
CHI
2008
ACM
16 years 5 months ago
Pick me!: link selection in expertise search results
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
N. Sadat Shami, Kate Ehrlich, David R. Millen
CHI
2008
ACM
16 years 5 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
CHI
2008
ACM
16 years 5 months ago
Friends and foes: ideological social networking
Traditional online social network sites use a single monolithic "friends" relationship to link users. However, users may have more in common with strangers, suggesting t...
Gábor Szabó, Michael J. Brzozowski, ...
CHI
2008
ACM
16 years 5 months ago
Searching for expertise
It is well established that there is a need to find experts to get answers or advice. A variety of expertise locator tools have emerged to help locate the right person. But there ...
Kate Ehrlich, N. Sadat Shami
128
Voted
CHI
2007
ACM
16 years 5 months ago
Understanding videowork
In this paper we elucidate the patterns of behavior of home movie makers through a study of 12 families and a separate focus group of 7 teenagers. Analogous to a similar study of ...
David S. Kirk, Abigail Sellen, Richard H. R. Harpe...