Sciweavers

1618 search results - page 191 / 324
» Privacy Interfaces for Information Management
Sort
View
SOUPS
2010
ACM
15 years 7 months ago
Folk models of home computer security
Home computer systems are frequently insecure because they are administered by untrained, unskilled users. The rise of botnets has amplified this problem; attackers can compromis...
Rick Wash
SOUPS
2010
ACM
15 years 4 months ago
Improving users' security choices on home wireless networks
Home networks are common but notoriously difficult to setup and maintain. The difficulty users experience in setting up and maintaining their home network is problematic because o...
Justin T. Ho, David Dearman, Khai N. Truong
SACMAT
2009
ACM
15 years 10 months ago
Automating role-based provisioning by learning from examples
Role-based provisioning has been adopted as a standard component in leading Identity Management products due to its low administration cost. However, the cost of adjusting existin...
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohat...
111
Voted
CHI
2008
ACM
16 years 4 months ago
SuperBreak: using interactivity to enhance ergonomic typing breaks
Repetitive strain injuries and ergonomics concerns have become increasingly significant health issues as a growing number of individuals frequently use computers for long periods ...
Dan Morris, A. J. Bernheim Brush, Brian Meyers
139
Voted
CHI
2005
ACM
16 years 4 months ago
Using intimacy, chronology and zooming to visualize rhythms in email experience
Experiences of intimacy and connectedness through social networks are vital to human sense of well-being. We live in an electronic habitat. Electronic mail functions as a medium o...
Mirko Mandic, Andruid Kerne