End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Search engine researchers typically depict search as the solitary activity of an individual searcher. In contrast, results from our critical-incident survey of 150 users on Amazon...
As data sources become larger and more complex, the ability to effectively explore and analyze patterns amongst varying sources becomes a critical bottleneck in analytic reasoning...
Ross Maciejewski, Stephen Rudolph, Ryan Hafen, Ahm...
This ethnographic study of 22 diverse families in the San Francisco Bay Area explores parents’ attitudes about their children’s use of technology. We found that parents from d...
Morgan G. Ames, Janet Go, Joseph Kaye, Mirjana Spa...
A key challenge of data-driven social science is the gathering of high quality multi-dimensional datasets. A second challenge relates to design and execution of structured experim...