Sciweavers

7839 search results - page 18 / 1568
» What's there and what's not
Sort
View
FC
2007
Springer
122views Cryptology» more  FC 2007»
14 years 2 months ago
What Instills Trust? A Qualitative Study of Phishing
This paper reports the highlights of a user study which gauges reactions to a variety of common “trust indicators” – such as logos, third party endorsements, and padlock icon...
Markus Jakobsson, Alex Tsow, Ankur Shah, Eli Blevi...
ISWC
2000
IEEE
14 years 1 months ago
What Shall We Teach Our Pants?
If a wearable device can register what the wearer is currently doing, it can anticipate and adjust its behavior to avoid redundant interaction with the user. However, the relevanc...
Kristof Van Laerhoven, Ozan Cakmakci
CHI
2005
ACM
14 years 9 months ago
Connecting with kids: so what's new?
From pre-schools to high schools, at home and in museums, the educational community has embraced the use of computers as a teaching tool. Yet many institutions will simply install...
Lori L. Scarlatos, Amy Bruckman, Allison Druin, Mi...
ICECCS
2007
IEEE
86views Hardware» more  ICECCS 2007»
14 years 14 days ago
What Use is Verified Software?
The world at large cares little for verified software; what it cares about are trustworthy and cost-effective systems that do their jobs well. We examine the value of verified sof...
John M. Rushby
ECSCW
2001
13 years 10 months ago
Adaptability of classification schemes in cooperation: What does it mean?
The overview of a set of field studies highlights how different are the scenarios in which classification schemes (CS) play a role in cooperation. In all cases, adaptability is cla...
Carla Simone, Marcello Sarini