Sciweavers

340 search results - page 6 / 68
» With Gaming Technology towards Secure User Interfaces
Sort
View
ASSETS
2008
ACM
13 years 9 months ago
Sudoku access: a sudoku game for people with motor disabilities
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer g...
Stéphane Norte, Fernando G. Lobo
CHI
2009
ACM
14 years 8 months ago
Lessons from brain age on persuasion for computer security
Users generally have difficulty understanding and managing computer security tasks. We examined Nintendo's Brain Age games for ways to help users remember more secure passwor...
Alain Forget, Sonia Chiasson, Robert Biddle
FPLAY
2008
13 years 9 months ago
Lessons from Brain Age on password memorability
User authentication involves establishing a user's right to access a system. Most user authentication is done with text passwords, which have advantages over other approaches...
Alain Forget, Sonia Chiasson, Robert Biddle
CHI
1994
ACM
13 years 12 months ago
What HCI designers can learn from video game designers
Computer users have tasks they need to perform, and are therefore motivated to overcome poorly designed interfaces. With video games, there is no external motivation for the task ...
Randy Pausch, Rich Gold, Tim Skelly, David Thiel
CHI
2008
ACM
14 years 8 months ago
User interface history
User Interfaces have been around as long as computers have existed, even well before the field of HumanComputer Interaction was established. Over the years, some papers on the his...
Anker Helms Jørgensen, Brad A. Myers