In previous studies, the technology acceptance model (TAM) [1] has been widely used by information technology researchers to gain a better understanding of information technology ...
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) has resulted in the presence of very descriptive privacy policies on healthcare websites. These policies ar...
Julia Brande Earp, Matthew W. Vail, Annie I. Ant&o...
In order to support increased consumer awareness regarding energy consumption, we have been developing new ways of representing and interacting with energy in electric products in...