Sciweavers

2179 search results - page 302 / 436
» Co-Creation System and Human-Computer Interaction
Sort
View
CHI
2008
ACM
16 years 4 months ago
Talc: using desktop graffiti to fight software vulnerability
With the proliferation of computer security threats on the Internet, especially threats such as worms that automatically exploit software flaws, it is becoming more and more impor...
Kandha Sankarpandian, Travis Little, W. Keith Edwa...
CHI
2008
ACM
16 years 4 months ago
Undercover: authentication usable in front of prying eyes
A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the des...
Hirokazu Sasamoto, Nicolas Christin, Eiji Hayashi
131
Voted
CHI
2008
ACM
16 years 4 months ago
Electronic voting machines versus traditional methods: improved preference, similar performance
In the 2006 U.S. election, it was estimated that over 66 million people would be voting on direct recording electronic (DRE) systems in 34% of the nation's counties [8]. Alth...
Sarah P. Everett, Kristen K. Greene, Michael D. By...
114
Voted
CHI
2008
ACM
16 years 4 months ago
Searching for expertise
It is well established that there is a need to find experts to get answers or advice. A variety of expertise locator tools have emerged to help locate the right person. But there ...
Kate Ehrlich, N. Sadat Shami
CHI
2008
ACM
16 years 4 months ago
From meiwaku to tokushita!: lessons for digital money design from japan
Based on ethnographically-inspired research in Japan, we report on people's experiences using digital money payment systems that use Sony's FeliCa near-field communicati...
Scott D. Mainwaring, Wendy March, Bill Maurer