How do Members of Congress manage the opportunities that the Internet offers? Here we present the initial results from interviews with 100 Congressional offices about their decisi...
David Lazer, Ines Mergel, Curt Ziniel, Kevin Ester...
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
We outline a methodological classification for evaluation approaches of software in general. This classification was initiated partly owing to involvement in a biennial European c...
Muriel Amar, Sophie David, Rachel Panckhurst, Lisa...
This paper describes the evaluation methodology used to evaluate the TC-STAR speech-to-speech translation (SST) system and their results from the third year of the project. It fol...
We investigate legal and philosophical notions of privacy in the context of artificial agents. Our analysis utilizes a normative account of privacy that defends its value and the ...