Sciweavers

446 search results - page 73 / 90
» Interactive Multi-View Visual Contents Authoring System
Sort
View
CHI
2008
ACM
14 years 11 months ago
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods
We present a large-scale analysis of the content of weblogs dating back to the release of the Blogger program in 1999. Over one million blogs were analyzed from their conception t...
Adam D. I. Kramer, Kerry Rodden
SOUPS
2005
ACM
15 years 3 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
CHI
2006
ACM
15 years 10 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
HUC
2010
Springer
14 years 11 months ago
Serendipitous family stories: using findings from a study on family communication to share family history
Storytelling and sharing family histories are important parts of what it means to "be" a family. Based on results from a study on intergenerational communication over a ...
Frank R. Bentley, Sujoy Kumar Chowduhry
SEKE
2007
Springer
15 years 3 months ago
A Model-driven Approach to Architecting Secure Software
A software architecture provides a high-level description of a software solution in terms of the structure, topology, and interactions between its principal components. While a nu...
Ebenezer A. Oladimeji, Sam Supakkul, Lawrence Chun...