Human-computer interaction: An empirical research perspective

IS MacKenzie - 2024 - books.google.com
Human-Computer Interaction: An Empirical Research Perspective is the definitive guide to
empirical research in HCI. The book begins with foundational topics including an historical …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

" When I am on Wi-Fi, I am fearless" privacy concerns & practices in eeryday Wi-Fi use

P Klasnja, S Consolvo, J Jung, BM Greenstein… - Proceedings of the …, 2009 - dl.acm.org
Increasingly, users access online services such as email, e-commerce, and social
networking sites via 802.11-based wireless networks. As they do so, they expose a range of …

From spaces to places: emerging contexts in mobile privacy

C Mancini, K Thomas, Y Rogers, BA Price… - Proceedings of the 11th …, 2009 - dl.acm.org
Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We
advocate a diversified approach, enabling the cross-interpretation of data from …

Too much information: Questioning security in a post-digital society

L Coles-Kemp, RB Jensen, CPR Heath - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
Whilst user-and people-centered design are accepted routes for digital services, they are
less commonly used in the design of technologies that control access to data and the …

The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi

S Consolvo, J Jung, B Greenstein, P Powledge… - Proceedings of the 12th …, 2010 - dl.acm.org
Anyone within range of an 802.11 wireless network (" Wi-Fi") can use free software to collect
the unencrypted web traffic of others on the network. However, many Wi-Fi users are …

Risk taking behaviors using public Wi-fi™

HS Choi, D Carpenter, MS Ko - Information Systems Frontiers, 2022 - Springer
Dramatic increases in public Wi-Fi™(hereafter referred to as Wi-Fi) availability have
occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it …

[PDF][PDF] Determination of worst-case aggressor alignment for delay calculation

PD Gross, R Arunachalam, K Rajagopal… - Proceedings of the 1998 …, 1998 - dl.acm.org
Increases in delay due to coupling can have a dramatic impact on IC pe~ ormance for deep
submicron technologies. Toachieve marimum pe~ ormance there is a needfor analyziltg …

EAP-SH: an EAP authentication protocol to integrate captive portals in the 802.1 X security architecture

N Marques, A Zúquete, JP Barraca - Wireless Personal Communications, 2020 - Springer
In a scenario where hotspot wireless networks are increasingly being used, and given the
amount of sensitive information exchanged on Internet interactions, there is the need to …

The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan

N Sombatruang, Y Kadobayashi… - 2018 16th annual …, 2018 - ieeexplore.ieee.org
Many people today use public Wi-Fi networks but they harbor security and privacy risks. We
investigated the extent of these risk today, and what factors influenced users to use the …