Sciweavers

842 search results - page 62 / 169
» About the authors
Sort
View
CHI
2007
ACM
14 years 10 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
CHI
2006
ACM
14 years 10 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CHI
2005
ACM
14 years 10 months ago
Understanding email use: predicting action on a message
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...
CHI
2010
ACM
14 years 4 months ago
The role of community and groupware in geocache creation and maintenance
Applications that provide location-based experiences are an increasingly viable design space given the proliferation of GPS-enabled mobile devices. However, these applications are...
Carman Neustaedter, Anthony Tang, Tejinder K. Judg...
TEI
2010
ACM
960views Hardware» more  TEI 2010»
14 years 4 months ago
Anxiety of patients in the waiting room of the emergency department
This study aims at understanding the patient’s experience in the waiting room of the emergency department. The research explores and unveils the context and interactions in the ...
JungKyoon Yoon, Marieke Sonneveld