Filters








881 Hits in 6.0 sec

The psychological impact of digital signatures: A multistudy replication

Kallie Tzelios, Lisa A. Williams
2020 Technology, Mind, and Behavior  
Further, the indirect effect of signature type on perceived likelihood of contract breach via social presence was nonzero in all samples.  ...  These studies add to the growing literature on the psychological impact of digital signatures and carry both practical and theoretical implications.  ...  Input effect sizes and the meta-analyzed effect size estimates are presented in Table 1 .  ... 
doi:10.1037/tmb0000019 fatcat:m7waleuo3nb5fea6g6cjz2oi5y

Aspects of Presence in Telerelating

CARRIE HEETER
1999 CyberPsychology & Behavior  
The way we sign our name is a limited form of embodiment, as is our signature line in email. Big curly cute letters suggest a curly cute signer.  ...  The likely impact of avatar choice works in two directions --your avatar affects the impressions others have of you. But it also affects your behavior.  ... 
doi:10.1089/cpb.1999.2.325 pmid:19178229 fatcat:6cjw7ca6f5em5dxqou5qaxso7m

Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications [article]

Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo and Fangren Xu
2018 arXiv   pre-print
Finally, we analyze the impact of them to users (i.e., victims) and estimate the overall revenue.  ...  , and the distribution network that is responsible for distributing apps to end users.  ...  Second, what is the business model of the FD apps, and what parties are involved in the ecosystem? Third, how are the FD apps distributed? Fourth, what is the impact of these FD apps to mobile users?  ... 
arXiv:1807.04901v1 fatcat:rj6tfu3vrjc6lm3byadwojkhza

Growing Virtual Communities in 3D Meeting Spaces [chapter]

Frédéric Kaplan, Angus McIntyre, Chisato Numaoka, Silvère Tajan
1998 Lecture Notes in Computer Science  
For each, we discuss how the requirements are met in existing text-based and 3D environments, and then show how they might be met in future 3D virtual world systems.  ...  We look at some alternative models of virtual communities, and explore the issue of promoting community formation in a 3D meeting space.  ...  Building in other channels Building is not a feature of email, news or IRC.  ... 
doi:10.1007/3-540-68686-x_27 fatcat:luqhsxqchbawdgpfabkhad7ev4

Defending Against Device Theft with Human Notarization

Alana Libonati, Kelly Caine, Apu Kapadia, Michael Reiter
2014 Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing  
Because these devices are vulnerable to theft, security of this data is put at higher risk-once the attacker is in physical possession of the device, recovering these credentials and impersonating the  ...  We describe the design and implementation of a system that leverages notarization to protect cryptographic keys that the device uses to decrypt device data (e.g., website passwords) or perform signatures  ...  ACKNOWLEDGMENTS This work was supported in part by NSF grants 1228364 and 1228471.  ... 
doi:10.4108/icst.collaboratecom.2014.257706 dblp:conf/colcom/LibonatiCKR14 fatcat:ygv7zoawardczb3u3f6s6rtdfm

Dating with Scambots: Understanding the Ecosystem of Fraudulent Dating Applications

Yangyu Hu, Haoyu Wang, Yajin Zhou, Yao Guo, Li Li, Bingxuan Luo, Fangren Xu
2019 IEEE Transactions on Dependable and Secure Computing  
Finally, we analyze the impact of them to users (i.e., victims) and estimate the overall revenue.  ...  , and the distribution network that is responsible for distributing apps to end users.  ...  Second, what is the business model of the FD apps, and what parties are involved in the ecosystem? Third, how are the FD apps distributed? Fourth, what is the impact of these FD apps to mobile users?  ... 
doi:10.1109/tdsc.2019.2908939 fatcat:5xl2i72kubfszowbkbazyhgy64

A REDCap-based model for electronic consent (eConsent): Moving towards a more personalized consent

Colleen E. Lawrence, Leah Dunkel, Mark McEver, Tiffany Israel, Robert Taylor, Germán Chiriboga, Karin Valentine Goins, Elizabeth J. Rahn, Amy S. Mudano, Erik D. Roberson, Carol Chambless, Virginia G. Wadley (+7 others)
2020 Journal of Clinical and Translational Science  
The updated common rule, for human subjects research, requires that consents "begin with a 'concise and focused' presentation of the key information that will most likely help someone make a decision about  ...  facilitating remote consent and (2) cultural and literacy barriers by including optional explanatory material (e.g., defining terms by hovering over them with the cursor) or the choice of displaying different  ...  Its contents are solely the responsibility of the authors and do not necessarily represent official views of the National Center for Advancing Translational Sciences or the National Institutes of Health  ... 
doi:10.1017/cts.2020.30 pmid:33244416 pmcid:PMC7681162 fatcat:elhrfxkeyrcntgueplzxfr6bwy

The Neurological Traces of Look-Alike Avatars

Mar Gonzalez-Franco, Anna I. Bellido, Kristopher J. Blom, Mel Slater, Antoni Rodriguez-Fornells
2016 Frontiers in Human Neuroscience  
This study is put into context within the literature of self-recognition and face recognition in the visual cortex.  ...  A less positive component was found for self-recognized pictures (P200) than pictures of others, showing similar effects in both real faces and look-alike avatars.  ...  These results suggest that while a self-recognition effect is mostly present in the right hemisphere where the self-avatar was classified in a similar way to the self-real, a Virtuality effect is found  ... 
doi:10.3389/fnhum.2016.00392 pmid:27536228 pmcid:PMC4971066 fatcat:sexsv6ofirbnvbhyuul3kccepm

Strategies to Enhance Research Visibility, Impact & Citations [article]

Nader Ale Ebrahim
2017 Figshare  
This workshop will provide various techniques on how you can increase the visibility and hence the impact of your research work.  ...  Publishing a high quality paper in scientific journals is only halfway towards receiving citation in the future.  ...  (1) Where F is the number of twitter followers and C is the number of citations.  ... 
doi:10.6084/m9.figshare.5472847.v1 fatcat:a6bs7hgtgvha3pajjoxsoij2zm

THE ETHICS AND IMPACT OF DIGITAL IMMORTALITY

2017 Knowledge Cultures  
The final section of the paper questions whether digital immortality is really a concern and reflects on the assumptions about it in relation to neoliberal capitalism.  ...  It suggests that digital immortality may in fact merely be a clever ruse which in fact is likely to have little, if any legal impact despite media assumptions and hyperbole.  ...  The capacity to creatively distribute labor across biology and the designed environment is the very signature of our species, and it implies no real loss of control on our part.  ... 
doi:10.22381/kc52201711 fatcat:vrtbezl3rngzxispbkb3kgndte

Understanding emotional bond between the creator and the avatar: Change in behavioral intentions to engage in alcohol-related traffic risk behaviors

Ho-Kyung Kim, Sei-Hill Kim
2016 Computers in Human Behavior  
With all the warm support and encouragement, I finally achieved my goal and I will continue my learning journey. v ABSTRACT The present study examines the joint impact of relationship with one's avatar  ...  One hundred eleven participants volunteered to participate in several experimental conditions where the degree of choice of avatar features and the degree of active control of the avatar were manipulated  ...  The Proteus Effect The notion of Proteus Effect is based on the Greek myth in which Proteus is the first-born son of Olympus and has the ability both to change shape and to foretell the future.  ... 
doi:10.1016/j.chb.2016.03.092 fatcat:i4hqo6mqxfatzephylsotygyh4

An Exploratory Study of Jungian Personality Traits in Residents [chapter]

Nancy Tavares-Jones
2013 Riding the Hype Cycle  
Does the avatar have a different persona than the resident, if so, how is that represented?  ...  Avatar Age Along with actual age, I asked the respondent to indicate how old their main avatar was, in days.  ...  The approval for the study "as presented" is valid for a period of one year from the date of this memo.  ... 
doi:10.1163/9781848882348_002 fatcat:oiv6stikfrelxmwdkxjtgisbd4

Applying Biometric Principles to Avatar Recognition [chapter]

Marina L. Gavrilova, Roman Yampolskiy
2011 Lecture Notes in Computer Science  
This paper presents current state of the art in virtual reality security, focusing specifically on emerging methodologies for avatar authentication.  ...  Just like it is necessary to be able to accurately authenticate identity of human beings, it is becoming essential to be able to determine identities of the non-biological entities.  ...  Alexei Sourin for his valuable help in manuscript preparation. The authors also would like to acknowledge the support of NSERC Funding Agency, Canada.  ... 
doi:10.1007/978-3-642-22336-5_8 fatcat:nk33miifcrblxpeoki2agwc3gu

Conducting Empirical Research in 3D Virtual Worlds: Experiences from two projects in Second Life

Shailey Minocha, Minh Tran, Ahmad John Reeves
2010 Journal of Virtual Worlds Research  
The first project is in the education domain in which we are investigating the designs of learning spaces in Second Life, while the second project is related to shopping and consumer behaviour of users  ...  of the participants, communication modalities (voice, text and use of gestures), logistics of conducting user-based studies, and skills and training needs of researchers.  ...  Acknowledgements The research presented in this paper has been supported by the JISC's Learning and Teaching Innovation Grant, Centre for Open Learning of Mathematics, Science, Computing and Technology  ... 
doi:10.4101/jvwr.v3i1.811 fatcat:al3ob6jihjh6lksjgh7rb2tizq

Applying Biometric Principles to Avatar Recognition

Marina L. Gavrilova, Roman V. Yampolskiy
2010 2010 International Conference on Cyberworlds  
This paper presents current state of the art in virtual reality security, focusing specifically on emerging methodologies for avatar authentication.  ...  Just like it is necessary to be able to accurately authenticate identity of human beings, it is becoming essential to be able to determine identities of the non-biological entities.  ...  Alexei Sourin for his valuable help in manuscript preparation. The authors also would like to acknowledge the support of NSERC Funding Agency, Canada.  ... 
doi:10.1109/cw.2010.36 dblp:conf/cw/GavrilovaY10 fatcat:e7lcau355zcvbps5wvra2gznsm
« Previous Showing results 1 — 15 out of 881 results