Sciweavers

118 search results - page 9 / 24
» Aligning usability and security: a usability study of Polari...
Sort
View
RECSYS
2010
ACM
13 years 8 months ago
Workshop on user-centric evaluation of recommender systems and their interfaces
In this paper, we aim to analyse the current level of usability on ten popular online websites utilising some kind of reputation system. The conducted heuristic and expert evaluat...
Bart P. Knijnenburg, Lars Schmidt-Thieme, Dirk G. ...
VIZSEC
2005
Springer
14 years 1 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...
BDIM
2008
IEEE
185views Business» more  BDIM 2008»
14 years 2 months ago
Addressing the impact of business process changes on software user interfaces
—This paper defines an approach to maintain the work of business process analysts aligned with the work of UI designers. With this approach, models are derived from each other an...
Kênia Soares Sousa, Hildeberto Mendonç...
DSS
2006
170views more  DSS 2006»
13 years 7 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...
CHI
2009
ACM
14 years 8 months ago
A comprehensive study of frequency, interference, and training of multiple graphical passwords
Graphical password systems have received significant attention as one potential solution to the need for more usable authentication, but nearly all prior work makes the unrealisti...
Katherine Everitt, Tanya Bragin, James Fogarty, Ta...