Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
This paper addresses design agendas in Human-Computer Interaction and neighbouring fields motivated by the mixing of areas that were mostly kept separate until recently, such as m...
Carlo Jacucci, Giulio Jacucci, Ina Wagner, Thomas ...
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Communication of one’s location as part of a social discourse is common practice, and we use a variety of technologies to satisfy this need. This practice suggests a potentially ...
Ian E. Smith, Sunny Consolvo, Anthony LaMarca, Jef...