Sciweavers

2040 search results - page 160 / 408
» Understanding interaction design practices
Sort
View
CHI
2007
ACM
14 years 8 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
CHI
1999
ACM
14 years 15 days ago
The Design and Evaluation of a High-Performance Soft Keyboard
The design and evaluation of a high performance soft keyboard for mobile systems are described. Using a model to predict the upper-bound text entry rate for soft keyboards, we des...
I. Scott MacKenzie, Shawn X. Zhang
CHI
2005
ACM
14 years 8 months ago
DeDe: design and evaluation of a context-enhanced mobile messaging system
This paper presents the design, implementation and validation of an enhanced mobile phone messaging system (DeDe), allowing the sender to define the context in which the message w...
Younghee Jung, Per Persson, Jan Blom
SIGCSE
2004
ACM
168views Education» more  SIGCSE 2004»
14 years 1 months ago
Design, science, and engineering topics?: teaching HCI with a unified method
Reacting to challenges that have been observed in humancomputer interaction (HCI) education, as well as the multidisciplinary design, science, and engineering underpinnings, we in...
D. Scott McCrickard, Christa M. Chewar, Jacob P. S...
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 20 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath