Sciweavers

355 search results - page 21 / 71
» Exploring Usability Needs by Human-Computer Interaction Patt...
Sort
View
CHI
2006
ACM
14 years 8 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CHI
2005
ACM
14 years 8 months ago
Blind learners programming through audio
The development of programming skills is a motivating issue in computer science. Programming languages have been increasingly used to map end-users needs and mental models. The nu...
Jaime Sánchez, Fernando Aguayo
CHI
2004
ACM
14 years 8 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass
CHI
2007
ACM
14 years 8 months ago
Home networking and HCI: what hath god wrought?
For much of the industrialized world, network connectivity in the home is commonplace. Despite the large number of networked homes, even the most technically savvy people can have...
Erika Shehan, W. Keith Edwards
HCI
2009
13 years 5 months ago
A Multiple-Aspects Visualization Tool for Exploring Social Networks
Social network analysis (SNA) has been used to study the relationships between actors in social networks, revealing their features and patterns. In most cases, nodes and edges in g...
Jie Gao, Kazuo Misue, Jiro Tanaka