Non-expert users face a dilemma when making security decisions. Their security often cannot be fully automated for them, yet they generally lack both the motivation and technical ...
Jennifer Stoll, Craig S. Tashman, W. Keith Edwards...
Many mobile devices have touch-sensitive screens that people interact with using fingers or thumbs. However, such interaction is difficult because targets become occluded, and bec...
Koji Yatani, Kurt Partridge, Marshall W. Bern, Mar...
This paper presents an overview of the User Experience (UX) team at Google. We focus on four aspects of working within Google's product development organization: (1) a bottom...
Irene Au, Richard Boardman, Robin Jeffries, Patric...
Little is known about the strategies end-user programmers use in debugging their programs, and even less is known about gender differences that may exist in these strategies. With...
Neeraja Subrahmaniyan, Laura Beckwith, Valentina G...
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs