Human-computer interaction: An empirical research perspective
IS MacKenzie - 2024 - books.google.com
Human-Computer Interaction: An Empirical Research Perspective is the definitive guide to
empirical research in HCI. The book begins with foundational topics including an historical …
empirical research in HCI. The book begins with foundational topics including an historical …
Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
" When I am on Wi-Fi, I am fearless" privacy concerns & practices in eeryday Wi-Fi use
P Klasnja, S Consolvo, J Jung, BM Greenstein… - Proceedings of the …, 2009 - dl.acm.org
Increasingly, users access online services such as email, e-commerce, and social
networking sites via 802.11-based wireless networks. As they do so, they expose a range of …
networking sites via 802.11-based wireless networks. As they do so, they expose a range of …
From spaces to places: emerging contexts in mobile privacy
Mobile privacy concerns are central to Ubicomp and yet remain poorly understood. We
advocate a diversified approach, enabling the cross-interpretation of data from …
advocate a diversified approach, enabling the cross-interpretation of data from …
Too much information: Questioning security in a post-digital society
L Coles-Kemp, RB Jensen, CPR Heath - … of the 2020 CHI Conference on …, 2020 - dl.acm.org
Whilst user-and people-centered design are accepted routes for digital services, they are
less commonly used in the design of technologies that control access to data and the …
less commonly used in the design of technologies that control access to data and the …
The Wi-Fi privacy ticker: improving awareness & control of personal information exposure on Wi-Fi
S Consolvo, J Jung, B Greenstein, P Powledge… - Proceedings of the 12th …, 2010 - dl.acm.org
Anyone within range of an 802.11 wireless network (" Wi-Fi") can use free software to collect
the unencrypted web traffic of others on the network. However, many Wi-Fi users are …
the unencrypted web traffic of others on the network. However, many Wi-Fi users are …
Risk taking behaviors using public Wi-fi™
HS Choi, D Carpenter, MS Ko - Information Systems Frontiers, 2022 - Springer
Dramatic increases in public Wi-Fi™(hereafter referred to as Wi-Fi) availability have
occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it …
occurred over the last decade. Although Wi-Fi provides convenient network connectivity, it …
[PDF][PDF] Determination of worst-case aggressor alignment for delay calculation
PD Gross, R Arunachalam, K Rajagopal… - Proceedings of the 1998 …, 1998 - dl.acm.org
Increases in delay due to coupling can have a dramatic impact on IC pe~ ormance for deep
submicron technologies. Toachieve marimum pe~ ormance there is a needfor analyziltg …
submicron technologies. Toachieve marimum pe~ ormance there is a needfor analyziltg …
EAP-SH: an EAP authentication protocol to integrate captive portals in the 802.1 X security architecture
N Marques, A Zúquete, JP Barraca - Wireless Personal Communications, 2020 - Springer
In a scenario where hotspot wireless networks are increasingly being used, and given the
amount of sensitive information exchanged on Internet interactions, there is the need to …
amount of sensitive information exchanged on Internet interactions, there is the need to …
The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from Japan
N Sombatruang, Y Kadobayashi… - 2018 16th annual …, 2018 - ieeexplore.ieee.org
Many people today use public Wi-Fi networks but they harbor security and privacy risks. We
investigated the extent of these risk today, and what factors influenced users to use the …
investigated the extent of these risk today, and what factors influenced users to use the …