Sciweavers

524 search results - page 27 / 105
» Why phishing works
Sort
View
ETS
2002
IEEE
105views Hardware» more  ETS 2002»
13 years 8 months ago
Academics in Academia: the Forgotten Resource in the Rush to New Technologies
Suffice to say that I'm leaving in large part because it's not much fun any more, and the directions of the university are not mine. I'm not the first, and I won�...
Tim S. Roberts
PVLDB
2008
120views more  PVLDB 2008»
13 years 8 months ago
On the provenance of non-answers to queries over extracted data
In information extraction, uncertainty is ubiquitous. For this reason, it is useful to provide users querying extracted data with explanations for the answers they receive. Provid...
Jiansheng Huang, Ting Chen, AnHai Doan, Jeffrey F....
CSCW
2010
ACM
14 years 5 months ago
Invisible emotion: information and interaction in an emergency room
Emotions are an often overlooked aspect of work since they are not included in formal work models. However, they continue provide critical information as well as be part of a rich...
Helena M. Mentis, Madhu Reddy, Mary Beth Rosson
SP
2007
IEEE
14 years 2 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
ATAL
2003
Springer
14 years 1 months ago
Argumentation-Based Communication between Agents
One approach to agent communication is to insist that agents not only send messages, but support them with reasons why those messages are appropriate. This is argumentation-based c...
Simon Parsons, Peter McBurney