We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
CAPTCHAs are computer-generated tests that humans can pass but current computer systems cannot. CAPTCHAs provide a method for automatically distinguishing a human from a computer ...
As the adoption of grid computing in organizations expands, the need for wise utilization of different types of resources also increases. A volatile resource, such as a desktop co...
In recent years, a growing number of studies examining how culture shapes computer-mediated communication (CMC) have appeared in the CHI and CSCW literature. Findings from these s...