Sciweavers

2564 search results - page 347 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
CHI
2008
ACM
14 years 8 months ago
Ubipay: conducting everyday payments with minimum user involvement
As services embedded into public spaces become increasingly transparent, one peripheral aspect of use continues to demand explicit user attention: payment. UbiPay is a system that...
Vili Lehdonvirta, Hayuru Soma, Hitoshi Ito, Hiroak...
CHI
2005
ACM
14 years 8 months ago
Understanding email use: predicting action on a message
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...
CHI
2005
ACM
14 years 8 months ago
How to make secure email easier to use
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
CHI
2010
ACM
14 years 2 months ago
Generating default privacy policies for online social networks
Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this wor...
Eran Toch, Norman M. Sadeh, Jason I. Hong
CHI
2007
ACM
14 years 8 months ago
Exploring and reducing the effects of orientation on text readability in volumetric displays
Volumetric displays, which provide a 360? view of imagery illuminated in true 3D space, are a promising platform for interactive 3D applications. However, presenting text in volum...
Tovi Grossman, Daniel Wigdor, Ravin Balakrishnan