Sciweavers

274 search results - page 21 / 55
» Security user studies: methodologies and best practices
Sort
View
MLMI
2005
Springer
15 years 3 months ago
Can Chimeric Persons Be Used in Multimodal Biometric Authentication Experiments?
Combining multiple information sources, typically from several data streams is a very promising approach, both in experiments and to some extents in various real-life applications....
Norman Poh, Samy Bengio
SOUPS
2009
ACM
15 years 4 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
ERCIMDL
2004
Springer
194views Education» more  ERCIMDL 2004»
15 years 3 months ago
Fiction Electronic Books: A Usability Study
This paper focuses on fiction electronic books and their usability. Two complementary studies were drawn together in order to investigate whether fiction e-books can successfully b...
Chrysanthi Malama, Monica Landoni, Ruth Wilson
W4A
2010
ACM
14 years 7 months ago
Web not for all: a large scale study of web accessibility
The Web accessibility discipline strives for the study and improvement of front-end Web design towards people with disabilities. Best practices such as WCAG dictate how Web pages ...
Rui Lopes, Daniel Gomes, Luís Carriç...
WMCSA
2008
IEEE
15 years 4 months ago
Making CAPTCHAs clickable
We show how to convert regular keyboard-entry CAPTCHAs into clickable CAPTCHAs. The goal of this conversion is to simplify and speed-up the entry of the CAPTCHA solution, to minim...
Richard Chow, Philippe Golle, Markus Jakobsson, Lu...