We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
With the ubiquity of camera phones, it is now possible to capture digital still and moving images anywhere, raising a legitimate concern for many organizations and individuals. Alt...
Khai N. Truong, Shwetak N. Patel, Jay Summet, Greg...
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer g...
The literature in the field of knowledge management shows a certain preoccupation with information technology (IT) and technical solutions while it reflects a limited view of orga...
This paper examines how the use of mobile phones influences the temporal boundaries that people enact in order to regulate and coordinate their work and non-work activities. We in...