Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...
Applications that provide location-based experiences are an increasingly viable design space given the proliferation of GPS-enabled mobile devices. However, these applications are...
Carman Neustaedter, Anthony Tang, Tejinder K. Judg...
This study aims at understanding the patient’s experience in the waiting room of the emergency department. The research explores and unveils the context and interactions in the ...