Sciweavers

1597 search results - page 9 / 320
» Mental Models of Computer Security
Sort
View
CHI
2008
ACM
16 years 1 days ago
You've been warned: an empirical study of the effectiveness of web browser phishing warnings
Many popular web browsers now include active phishing warnings since research has shown that passive warnings are often ignored. In this laboratory study we examine the effectiven...
Serge Egelman, Lorrie Faith Cranor, Jason I. Hong
IUI
2003
ACM
15 years 4 months ago
Lessons learned in modeling schizophrenic and depressed responsive virtual humans for training
This paper describes lessons learned in developing the linguistic, cognitive, emotional, and gestural models underlying virtual human behavior in a training application designed t...
Robert C. Hubal, Geoffrey A. Frank, Curry I. Guinn
HASE
2008
IEEE
15 years 6 months ago
Low Cost Secure Computation for the General Client-Server Computation Model
Due to the large number of attacks on open networks, information theft becomes a more and more severe problem. Secure computation can offer highly assured confidentiality protecti...
Liangliang Xiao, I-Ling Yen, Farokh B. Bastani
CHI
2006
ACM
16 years 1 days ago
Comparisons of keystroke-level model predictions to observed data
Comparison of model prediction against observed data is an investigative step used in cognitive modeling research for human-computer interaction. In this paper we describe compari...
Leonghwee Teo, Bonnie E. John
CHI
2009
ACM
16 years 6 days ago
Timing is everything?: the effects of timing and placement of online privacy indicators
Many commerce websites post privacy policies to address Internet shoppers' privacy concerns. However, few users read or understand them. Iconic privacy indicators may make pr...
Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor...