A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Now you see me, now you don't
2014
Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14
In this paper, we present XSide, an authentication mechanism that uses the front and the back of smartphones to enter stroke-based passwords. ...
Users can switch sides during input to minimize the risk of shoulder surfing. ...
Finally, in a mixed situation, switching sides during the input increases security since no single shoulder surfer should be able to see both sides at once. ...
doi:10.1145/2556288.2557097
dblp:conf/chi/LucaHZMSHS14
fatcat:6ktyz236nrfk3memzll7ecqmvu
Privacy Concerns and Behaviors of People with Visual Impairments
2015
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15
' data from screens). ...
We conducted an exploratory user study with 14 visually impaired participants to understand the techniques they currently use for protecting privacy, their remaining privacy concerns, and how new technologies ...
We especially thank our participants, as well as Barbara Salisbury and Rita Kersh from the Bloomington and Bedford chapters of the American Council for the Blind, and Dorothy Lenard from IU Disability ...
doi:10.1145/2702123.2702334
dblp:conf/chi/AhmedHCCK15
fatcat:toeanqv2mrdxxm4myzjov674ja
Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication
2018
Human Factors
You constantly went far beyond what you were required to do for me, just because you are such helpful and awesome people. ...
When a user authenticates to a system, there are different methods that may be used to hide the login input from shoulder surfers. ...
doi:10.1177/0018720818767683
pmid:29718722
fatcat:lndojismcfedxdzfwyr4tcxy2q
The Power Is Stronger These Days: Istanbul since 2013
[chapter]
2016
The DIY Movement in Art, Music and Publishing
I don't think there's going to be a better philosophy of life when you don't have money and power. ...
She has now finished her call and interjects, "You and me got together by chance". He replies, Yeah-we ran into each other at a movie but we both kind of knew each other. ...
doi:10.4324/9781315732664-24
fatcat:dun4ltjy5vddfm3olx2uixgnle
Shoulder Surfing: From An Experimental Study to a Comparative Framework
2019
International Journal of Human-Computer Studies
Shoulder surfing is an attack vector widely recognized as a real threat - enough to warrant researchers dedicating a considerable effort toward designing novel authentication methods to be shoulder surfing ...
In the largest on-site shoulder surfing experiment (n = 274) to date, we verify the model on four conceptually different authentication methods in two observation scenarios. ...
Now You See Me, Now You Don’t: Protecting
Smartphone Authentication from Shoulder Surfers. ...
doi:10.1016/j.ijhcs.2019.04.003
fatcat:niegkllyifdzxakyu4bjw6or2i
Opportunities of a Shared Economy in Hungary Based on Primary Research
2020
Polgári szemle
Its significance could best be highlighted through recycling waste, the purpose of which is to reduce the amount of waste generated from the goods we use, and also to reduce the need for new ...
Thank you. ...
You are a dear, brilliant, bald, and spectacular gift. Thank you in all ways, always. ...
doi:10.24307/psz.2020.1224
fatcat:2hz3emjnyvh4teapqg2se74rce
Skill for (private) life.pdf
2018
Figshare
Yet public libraries have protected access to information for a number of years through ethical principles recognising privacy as an important provision for the right to read and receive ideas. ...
What happens if they don't? 10. Do you have any digital privacy initiatives planned in the future? ...
So, to me, all those kinds of 'How do those rights apply online?'both freedom of information and freedom of expressiontherefore how you protect rights online in general. ...
doi:10.6084/m9.figshare.7422860.v1
fatcat:ek3brqynqrfxresihat5fmwytq
State of AI Ethics Report (Volume 6, February 2022)
[article]
2022
arXiv
pre-print
This report from the Montreal AI Ethics Institute (MAIEI) covers the most salient progress in research and reporting over the second half of 2021 in the field of AI ethics. ...
The report is a comprehensive overview of what the key issues in the field of AI ethics were in 2021, what trends are emergent, what gaps exist, and a peek into what to expect from the field of AI ethics ...
I hope that you enjoy the eclectic mix of topics in this chapter and if you have other trends that you see coming down the pipe in 2022, please feel free to reach out to me at abhishek@montrealethics.ai ...
arXiv:2202.07435v1
fatcat:wbalu3j3ynelfim7eqvxcpwu3q
To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising
2011
Social Science Research Network
See Protecting Mobile Privacy: Your Smartphones, Tablets, Cell Phones and Your Privacy: Hearing before the Subcomm. on Privacy, Tech. & the Law of the S. ...
See generally Ritu Sing, Two-Factor Authentication: A Solution to Times Past or Present? ...
Tracking may be performed for various purposes, including protecting and securing services from fraud and abuse, determining the relevancy of served content, providing accurate measurement of the impact ...
doi:10.2139/ssrn.1920505
fatcat:fifrwdkqbzhxtfm3ykupwecjkm
Narrative Mechanics: Strategies and Meanings in Games and Real Life
[article]
2021
Zenodo
They occur as texts, recipes, stories, dramas in three acts, movies, videos, tweets, journeys of heroes, but also as rewarding stories in games and as narratives in society – such as a career from rags ...
It is much easier to close your eyes if you don't want to see something than to close your ears if you don't want to hear something. ...
Imagine a game where you are in a room you have to escape from. You look around and see a door. You walk up to that door and click on it. But nothing happens. ...
doi:10.5281/zenodo.5821920
fatcat:t3hd6qe2prc4rfstaepnrwssbi
On the adoption of end-user IT security measures
[article]
2019
You can also see that there are name tents in front of all of us. Those help me to remember your names, but they can also help you. ...
. • IF CODE LOCK: If you think someone is able to see the screen of your phone, do you sometimes take additional measures to protect your smartphone? -Choose all that apply. ...
How many of these messages do you consider worthy of protection? How often do you use the chat on Facebook? ...
doi:10.15488/8262
fatcat:dqgy22hr6zejlmsuwd2btifnji
User experience with mobile security and privacy mechanisms
2017
However, due to their known vulnerabilities, smartphones also encompass a number of mechanisms to protect a user's security and privacy. ...
By the help of two use cases – app permissions and screen locks with authentication – several quantitative studie [...] ...
Protection from theft • Do you do anything to protect your smartphone from theft? • If so, -What are you doing? -Do you remember any causes that made you start doing so? ...
doi:10.14279/depositonce-6029
fatcat:4ss3l7be35gvdm74xw2ar36ktu
The Aesthetics and Viewing Regimes of Cinema and Television, and Their Dialectics
[chapter]
2012
Audiences
If you don't know this, then come and see our great rich Pesach program, you will recognize at once that what we advertise is the whole truth and nothing but the truth. 57 This congenial style of conversation ...
Unlike: we had fill-in info (the interviews at the beginning) which you don't get at the event. ...
doi:10.1515/9789048515059-010
fatcat:zfjhae72djbqnho7zueuuc2qeq
Resort Spatiality: Reimagining Sites of Mass Tourism
2018
And if you drive up north to the other side of the island, you will see fishermen, you will see rubber tree plantations, you will see other things that happen which are not tourist-dependent. ...
On the Gold Coast, we often say 'locals don't go to Surfers Paradise'. ...
What you will be asked to do If you choose to be a participant in the research, you will engage in a voice-recorded interview with Zelmarie for approximately 20 minutes. ...
doi:10.25904/1912/2911
fatcat:2bdyvfcesjgkbpode4z2q4sgfi
Recommended Citation Sohval, Daniel
2013
unpublished
Where several men much larger and wider than him, sporting shoulder tattoos of Virgin Maries and the cursive names of exgirlfriends, pump iron. ...
Because the whole human family, folk and adjunct professors of neurolinguistics alike came from the same crop of hominids in the Savannah, right? Zfdel approaches the barbell racks. ...
I don't reply.
2.5.2.
But now I see a smile.
3. "You don't like to speak much, do you?"
3.1. I don't reply.
3.2. "Quiet type?"
3.3. I don't reply.
3.3.1.
Dr. ...
fatcat:hqctrgrexfga7gbde277mlw6fy
« Previous
Showing results 1 — 15 out of 39 results