This paper reports findings from a study of how a guidebook was used by pairs of visitors touring a historic house. We describe how the guidebook was incorporated into their visit...
Rebecca E. Grinter, Paul M. Aoki, Margaret H. Szym...
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
Presence has become a key concept in characterizing and evaluating Virtual Environments. Our contribution is to show that current measures of Presence, as a metric of users' ...