The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
Abstract. Infrastructures (persistent socio-technical systems over which services are delivered) are normally taken for granted by their users, but are powerful forces of constrain...
Scott D. Mainwaring, Michele F. Chang, Ken Anderso...
Mechanism design (MD) has recently become a very popular approach in the design of distributed systems of autonomous agents. A key assumption required for the application of MD is...
Today, commodity technologies like mobile phones—once symbols of status and wealth—have become deeply woven into social and economic participation in Western society. Despite ...
Christopher A. Le Dantec, Robert G. Farrell, Jim C...
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...