Sciweavers

12568 search results - page 345 / 2514
» Selective user interaction
Sort
View
HICSS
2009
IEEE
117views Biometrics» more  HICSS 2009»
15 years 12 months ago
Information Security: User Precautions, Attacker Efforts, and Enforcement
We analyze the strategic interactions among endusers and between end-users and attackers in mass and targeted attacks. In mass attacks, precautions by endusers are strategic subst...
Ivan P. L. Png, Qiu-Hong Wang
PERVASIVE
2009
Springer
15 years 12 months ago
Situvis: A Visual Tool for Modeling a User's Behaviour Patterns in a Pervasive Environment
Abstract. One of the key challenges faced when developing contextaware pervasive systems is to capture the set of inputs that we want a system to adapt to. Arbitrarily specifying r...
Adrian K. Clear, Ross Shannon, Thomas Holland, Aar...
ISEUD
2009
Springer
15 years 11 months ago
End-User Development of Enterprise Widgets
Companies are operating in a dynamic environment, resulting in a continuous need of adapting used information systems to changing business processes and associated information need...
Michael Spahn, Volker Wulf
IUI
2006
ACM
15 years 11 months ago
The delivery of multimedia presentations in a graphical user interface environment
A major issue in many domains is to present information to people that is tailored to their need, in such a way that it supports them in their tasks. In this paper, we present the...
Nathalie Colineau, Julien Phalip, Andrew Lampert
139
Voted
NORDICHI
2006
ACM
15 years 11 months ago
How ordinary internet users can have a chance to influence privacy policies
By ‘Obligation Management’ we refer to the definition, automated enforcement, and monitoring of privacy obligation policies. Privacy policies are nowadays found on most organi...
John Sören Pettersson, Simone Fischer-Hü...