Sciweavers

7839 search results - page 18 / 1568
» What's there and what's not
Sort
View
74
Voted
FC
2007
Springer
122views Cryptology» more  FC 2007»
15 years 6 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
ISWC
2000
IEEE
15 years 5 months ago
What Shall We Teach Our Pants?
If a wearable device can register what the wearer is currently doing, it can anticipate and adjust its behavior to avoid redundant interaction with the user. However, the relevanc...
Kristof Van Laerhoven, Ozan Cakmakci
116
Voted
CHI
2005
ACM
16 years 1 months ago
Connecting with kids: so what's new?
From pre-schools to high schools, at home and in museums, the educational community has embraced the use of computers as a teaching tool. Yet many institutions will simply install...
Lori L. Scarlatos, Amy Bruckman, Allison Druin, Mi...
83
Voted
ICECCS
2007
IEEE
86views Hardware» more  ICECCS 2007»
15 years 4 months ago
What Use is Verified Software?
The world at large cares little for verified software; what it cares about are trustworthy and cost-effective systems that do their jobs well. We examine the value of verified sof...
John M. Rushby
93
Voted
ECSCW
2001
15 years 2 months ago
Adaptability of classification schemes in cooperation: What does it mean?
The overview of a set of field studies highlights how different are the scenarios in which classification schemes (CS) play a role in cooperation. In all cases, adaptability is cla...
Carla Simone, Marcello Sarini