Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
This paper describes the design and interprets the results of a survey of 435 undergraduate students concerning the attitudes of this mainly millennial population towards sustaina...
Kristin Hanks, William Odom, David Roedl, Eli Blev...
Massively multiplayer online games (MMOGs) currently represent the most widely used type of social 3D virtual worlds with millions of users worldwide. Although MMOGs take face-to-...
Robert J. Moore, E. Cabell Hankinson Gathman, Nico...
In this paper we elucidate the patterns of behavior of home movie makers through a study of 12 families and a separate focus group of 7 teenagers. Analogous to a similar study of ...
David S. Kirk, Abigail Sellen, Richard H. R. Harpe...
As part of an ongoing effort to understand ease of use of digital home technologies, we undertook an exploratory study of people who use their home networks for more than just bro...
Sara A. Bly, Bill N. Schilit, David W. McDonald, B...