Sciweavers

694 search results - page 20 / 139
» Security and Usability: Analysis and Evaluation
Sort
View
ACHI
2009
IEEE
15 years 4 months ago
Knowledge Reuse through Categorical Breakdown Analysis: A Method for Collaborative Systems Evaluation
Designing CSCW systems that support the widely varying needs of targeted users is difficult. There is no silver bullet technology that enables users to effectively collaborate wit...
Will Humphries, D. Scott McCrickard, Dennis C. Nea...
ACMDIS
2006
ACM
15 years 3 months ago
How do design and evaluation interrelate in HCI research?
Human-Computer Interaction (HCI) is defined by the Association for Computing Machinery (ACM) Special Interest Group on Computer-Human Interaction (SIGCHI) as “a discipline conce...
Christine E. Wania, Michael E. Atwood, Katherine W...
75
Voted
CMG
2006
14 years 11 months ago
Evaluation and comparison of search engines using the LSP method
We present a comprehensive model for quantitative evaluation and comparison of search engines. The model is based on the LSP method for system evaluation. The basic contribution of...
Jozo J. Dujmovic, Haishi Bai
FC
2007
Springer
111views Cryptology» more  FC 2007»
15 years 3 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
85
Voted
ANSS
2005
IEEE
15 years 3 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...