Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
In this paper we introduce the notion of "photowork" as the activities people perform with their digital photos after capture but prior to end use such as sharing. Surpr...
David S. Kirk, Abigail Sellen, Carsten Rother, Ken...
People display adaptive language behaviors in face-to-face conversations, but will computer users do the same during HCI? We report an experiment (N=20) demonstrating that users...
Jamie Pearson, Jiang Hu, Holly P. Branigan, Martin...
We study generalization for preserving privacy in publication of sensitive data. The existing methods focus on a universal approach that exerts the same amount of preservation for...
Recognizing the alternative ways people use to reference an entity, is important for many Web applications that query structured data. In such applications, there is often a mismat...