Sciweavers

2564 search results - page 401 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
CHI
2009
ACM
14 years 8 months ago
A survey of software learnability: metrics, methodologies and guidelines
It is well-accepted that learnability is an important aspect of usability, yet there is little agreement as to how learnability should be defined, measured, and evaluated. In this...
Tovi Grossman, George W. Fitzmaurice, Ramtin Attar
CHI
2009
ACM
14 years 8 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
CHI
2009
ACM
14 years 8 months ago
Designing trustworthy situated services: an implicit and explicit assessment of locative images-effect on trust
This paper examines a visual design element unique to situated, hot-spot style, services: locativeness. This is the extent to which the media representing a service relates to its...
Vassilis Kostakos, Ian Oakley
CHI
2009
ACM
14 years 8 months ago
iBookmark: locative texts and place-based authoring
With the recent developments in ePaper technology, consumer eBook readers have display qualities and form factors that are approaching that of traditional books. These eBook reade...
Johannes Schöning, Tom Bartindale, Patrick Ol...
CHI
2008
ACM
14 years 8 months ago
Love and authentication
Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...