People are usually concerned with the privacy of their personal information. However, the problem of privacy is also present when the information is directly linked to people, for...
We conducted a 2.5 week longitudinal study with five motor impaired (MI) and four non-impaired (NMI) participants, in which they learned to use the Vocal Joystick, a voice-based u...
Susumu Harada, Jacob O. Wobbrock, Jonathan Malkin,...
This paper focuses on an investigation of Collaborative Virtual Environment (CVE) technology for people with autism, paying particular attention to the use of avatar representatio...
Yufang Cheng, David J. Moore, Paul McGrath, Yulei ...
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
The L4All system allows learners to record and share learning pathways through educational offerings, with the aim of facilitating progression from Secondary Education through to F...
Nicolas van Labeke, George D. Magoulas, Alexandra ...