Secure email has struggled with signifcant obstacles to adoption, among them the low usability of encryption software and the cost and overhead of obtaining public key certificat...
When implementing a multilevel security policy for Object-Oriented Databases (OODBs), several aspects have to be investigated. One of these aspect is the design of multilevel OODB...
We present Vote-O-Graph, an experimental touchscreen voting system designed to simulate reported interface issues in existing electronic voting systems. Touchscreen miscalibration...
Andrea L. Mascher, Paul T. Cotton, Douglas W. Jone...
Trust emerges from interaction. If trust in information systems is to be promoted, then attention must be directed, at least in part, to interaction design. This presentation will ...
Increasingly, systems are composed from independently developed parts, and mechanisms that allow those parts to interact (connectors). In many situations, specialized forms of int...