Sciweavers

402 search results - page 51 / 81
» Interactive Visit of a Website
Sort
View
CHI
2006
ACM
14 years 9 months ago
Why phishing works
To build systems shielding users from fraudulent (or phishing) websites, designers need to know which attack strategies work and why. This paper provides the first empirical evide...
Rachna Dhamija, J. D. Tygar, Marti A. Hearst
CHI
2006
ACM
14 years 9 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
CHI
2005
ACM
14 years 9 months ago
How oversight improves member-maintained communities
Online communities need regular maintenance activities such as moderation and data input, tasks that typically fall to community owners. Communities that allow all members to part...
Dan Cosley, Dan Frankowski, Sara B. Kiesler, Loren...
CHI
2004
ACM
14 years 8 months ago
Privacy policies as decision-making tools: an evaluation of online privacy notices
Studies have repeatedly shown that users are increasingly concerned about their privacy when they go online. In response to both public interest and regulatory pressures, privacy ...
Carlos Jensen, Colin Potts
CHI
2002
ACM
14 years 8 months ago
Usability inspections by groups of specialists: perceived agreement in spite of disparate observations
Evaluators who examine the same system using the same usability evaluation method tend to report substantially different sets of problems. This so-called evaluator effect means th...
Morten Hertzum, Niels Ebbe Jacobsen, Rolf Molich