Sciweavers

2321 search results - page 420 / 465
» Social interaction in 'there'
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
WECWIS
2005
IEEE
86views ECommerce» more  WECWIS 2005»
15 years 3 months ago
The Evolution of Cooperation under Cheap Pseudonyms
A wide variety of interactions on the Internet are characterized by the availability of cheap pseudonyms, where users can obtain new identities freely or at a low cost. Due to the...
Michal Feldman, John Chuang
GROUP
2005
ACM
15 years 3 months ago
Design decisions in the RideNow project
The RideNow Project is designed to help individuals within a group or organization coordinate ad hoc shared rides. This paper describes three design decisions the RideNow team mad...
Rick Wash, Libby Hemphill, Paul Resnick
HUC
2005
Springer
15 years 3 months ago
Preventing Camera Recording by Designing a Capture-Resistant Environment
With the ubiquity of camera phones, it is now possible to capture digital still and moving images anywhere, raising a legitimate concern for many organizations and individuals. Alt...
Khai N. Truong, Shwetak N. Patel, Jay Summet, Greg...
IUI
2004
ACM
15 years 3 months ago
Contextual contact retrieval
People routinely rely on physical and electronic systems to remind themselves of details regarding personal and organizational contacts. These systems include rolodexes, directori...
Jonathan Trevor, David M. Hilbert, Daniel Billsus,...