Sciweavers

24 search results - page 5 / 5
» Crowdsourcing user studies with Mechanical Turk
Sort
View
ICDE
2008
IEEE
167views Database» more  ICDE 2008»
14 years 8 months ago
Automatic Extraction of Useful Facet Hierarchies from Text Databases
Databases of text and text-annotated data constitute a significant fraction of the information available in electronic form. Searching and browsing are the typical ways that users ...
Wisam Dakka, Panagiotis G. Ipeirotis
SP
2010
IEEE
192views Security Privacy» more  SP 2010»
13 years 11 months ago
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation
—Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them hard for machines. In this paper, we present wha...
Elie Bursztein, Steven Bethard, Celine Fabry, John...
CHI
2010
ACM
13 years 2 months ago
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions
In this paper we present the results of a roleplay survey instrument administered to 1001 online survey respondents to study both the relationship between demographics and phishin...
Steve Sheng, Mandy B. Holbrook, Ponnurangam Kumara...
WSDM
2009
ACM
117views Data Mining» more  WSDM 2009»
14 years 2 months ago
Query by document
We are experiencing an unprecedented increase of content contributed by users in forums such as blogs, social networking sites and microblogging services. Such abundance of conten...
Yin Yang, Nilesh Bansal, Wisam Dakka, Panagiotis G...