39 Hits in 6.7 sec

Now you see me, now you don't

Alexander De Luca, Marian Harbach, Emanuel von Zezschwitz, Max-Emanuel Maurer, Bernhard Ewald Slawik, Heinrich Hussmann, Matthew Smith
2014 Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14  
In this paper, we present XSide, an authentication mechanism that uses the front and the back of smartphones to enter stroke-based passwords.  ...  Users can switch sides during input to minimize the risk of shoulder surfing.  ...  Finally, in a mixed situation, switching sides during the input increases security since no single shoulder surfer should be able to see both sides at once.  ... 
doi:10.1145/2556288.2557097 dblp:conf/chi/LucaHZMSHS14 fatcat:6ktyz236nrfk3memzll7ecqmvu

Privacy Concerns and Behaviors of People with Visual Impairments

Tousif Ahmed, Roberto Hoyle, Kay Connelly, David Crandall, Apu Kapadia
2015 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15  
' data from screens).  ...  We conducted an exploratory user study with 14 visually impaired participants to understand the techniques they currently use for protecting privacy, their remaining privacy concerns, and how new technologies  ...  We especially thank our participants, as well as Barbara Salisbury and Rita Kersh from the Bloomington and Bedford chapters of the American Council for the Blind, and Dorothy Lenard from IU Disability  ... 
doi:10.1145/2702123.2702334 dblp:conf/chi/AhmedHCCK15 fatcat:toeanqv2mrdxxm4myzjov674ja

Integrating Visual Mnemonics and Input Feedback With Passphrases to Improve the Usability and Security of Digital Authentication

Kevin Juang, Joel Greenstein
2018 Human Factors  
You constantly went far beyond what you were required to do for me, just because you are such helpful and awesome people.  ...  When a user authenticates to a system, there are different methods that may be used to hide the login input from shoulder surfers.  ... 
doi:10.1177/0018720818767683 pmid:29718722 fatcat:lndojismcfedxdzfwyr4tcxy2q

The Power Is Stronger These Days: Istanbul since 2013 [chapter]

2016 The DIY Movement in Art, Music and Publishing  
I don't think there's going to be a better philosophy of life when you don't have money and power.  ...  She has now finished her call and interjects, "You and me got together by chance". He replies, Yeah-we ran into each other at a movie but we both kind of knew each other.  ... 
doi:10.4324/9781315732664-24 fatcat:dun4ltjy5vddfm3olx2uixgnle

Shoulder Surfing: From An Experimental Study to a Comparative Framework

Leon Bošnjak, Boštjan Brumen
2019 International Journal of Human-Computer Studies  
Shoulder surfing is an attack vector widely recognized as a real threat - enough to warrant researchers dedicating a considerable effort toward designing novel authentication methods to be shoulder surfing  ...  In the largest on-site shoulder surfing experiment (n = 274) to date, we verify the model on four conceptually different authentication methods in two observation scenarios.  ...  Now You See Me, Now You Don’t: Protecting Smartphone Authentication from Shoulder Surfers.  ... 
doi:10.1016/j.ijhcs.2019.04.003 fatcat:niegkllyifdzxakyu4bjw6or2i

Opportunities of a Shared Economy in Hungary Based on Primary Research

Mónika Pónusz, Patricia Kolonics
2020 Polgári szemle  
Its sig­ni­fic­ance could best be high­lighted through re­cyc­ling waste, the pur­pose of which is to re­duce the amount of waste gen­er­ated from the goods we use, and also to re­duce the need for new  ...  Thank you.  ...  You are a dear, brilliant, bald, and spectacular gift. Thank you in all ways, always.  ... 
doi:10.24307/psz.2020.1224 fatcat:2hz3emjnyvh4teapqg2se74rce

Skill for (private) life.pdf

Camille Regnault
2018 Figshare  
Yet public libraries have protected access to information for a number of years through ethical principles recognising privacy as an important provision for the right to read and receive ideas.  ...  What happens if they don't? 10. Do you have any digital privacy initiatives planned in the future?  ...  So, to me, all those kinds of 'How do those rights apply online?'both freedom of information and freedom of expressiontherefore how you protect rights online in general.  ... 
doi:10.6084/m9.figshare.7422860.v1 fatcat:ek3brqynqrfxresihat5fmwytq

State of AI Ethics Report (Volume 6, February 2022) [article]

Abhishek Gupta
2022 arXiv   pre-print
This report from the Montreal AI Ethics Institute (MAIEI) covers the most salient progress in research and reporting over the second half of 2021 in the field of AI ethics.  ...  The report is a comprehensive overview of what the key issues in the field of AI ethics were in 2021, what trends are emergent, what gaps exist, and a peek into what to expect from the field of AI ethics  ...  I hope that you enjoy the eclectic mix of topics in this chapter and if you have other trends that you see coming down the pipe in 2022, please feel free to reach out to me at  ... 
arXiv:2202.07435v1 fatcat:wbalu3j3ynelfim7eqvxcpwu3q

To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising

Omer Tene, Jules Polonetsky
2011 Social Science Research Network  
See Protecting Mobile Privacy: Your Smartphones, Tablets, Cell Phones and Your Privacy: Hearing before the Subcomm. on Privacy, Tech. & the Law of the S.  ...  See generally Ritu Sing, Two-Factor Authentication: A Solution to Times Past or Present?  ...  Tracking may be performed for various purposes, including protecting and securing services from fraud and abuse, determining the relevancy of served content, providing accurate measurement of the impact  ... 
doi:10.2139/ssrn.1920505 fatcat:fifrwdkqbzhxtfm3ykupwecjkm

Narrative Mechanics: Strategies and Meanings in Games and Real Life [article]

Beat Suter, René Bauer, Mela Kocher, Et Al.
2021 Zenodo  
They occur as texts, recipes, stories, dramas in three acts, movies, videos, tweets, journeys of heroes, but also as rewarding stories in games and as narratives in society – such as a career from rags  ...  It is much easier to close your eyes if you don't want to see something than to close your ears if you don't want to hear something.  ...  Imagine a game where you are in a room you have to escape from. You look around and see a door. You walk up to that door and click on it. But nothing happens.  ... 
doi:10.5281/zenodo.5821920 fatcat:t3hd6qe2prc4rfstaepnrwssbi

On the adoption of end-user IT security measures [article]

Marian Harbach, University, My
You can also see that there are name tents in front of all of us. Those help me to remember your names, but they can also help you.  ...  . • IF CODE LOCK: If you think someone is able to see the screen of your phone, do you sometimes take additional measures to protect your smartphone? -Choose all that apply.  ...  How many of these messages do you consider worthy of protection? How often do you use the chat on Facebook?  ... 
doi:10.15488/8262 fatcat:dqgy22hr6zejlmsuwd2btifnji

User experience with mobile security and privacy mechanisms

Lydia Kraus, Technische Universität Berlin, Technische Universität Berlin, Sebastian Möller
However, due to their known vulnerabilities, smartphones also encompass a number of mechanisms to protect a user's security and privacy.  ...  By the help of two use cases – app permissions and screen locks with authentication – several quantitative studie [...]  ...  Protection from theft • Do you do anything to protect your smartphone from theft? • If so, -What are you doing? -Do you remember any causes that made you start doing so?  ... 
doi:10.14279/depositonce-6029 fatcat:4ss3l7be35gvdm74xw2ar36ktu

The Aesthetics and Viewing Regimes of Cinema and Television, and Their Dialectics [chapter]

Annie van den Oever, Ian Christie
2012 Audiences  
If you don't know this, then come and see our great rich Pesach program, you will recognize at once that what we advertise is the whole truth and nothing but the truth. 57 This congenial style of conversation  ...  Unlike: we had fill-in info (the interviews at the beginning) which you don't get at the event.  ... 
doi:10.1515/9789048515059-010 fatcat:zfjhae72djbqnho7zueuuc2qeq

Resort Spatiality: Reimagining Sites of Mass Tourism

Zelmarie Cantillon, University, My, Patricia Wise
And if you drive up north to the other side of the island, you will see fishermen, you will see rubber tree plantations, you will see other things that happen which are not tourist-dependent.  ...  On the Gold Coast, we often say 'locals don't go to Surfers Paradise'.  ...  What you will be asked to do If you choose to be a participant in the research, you will engage in a voice-recorded interview with Zelmarie for approximately 20 minutes.  ... 
doi:10.25904/1912/2911 fatcat:2bdyvfcesjgkbpode4z2q4sgfi

Recommended Citation Sohval, Daniel

Daniel Sohval
2013 unpublished
Where several men much larger and wider than him, sporting shoulder tattoos of Virgin Maries and the cursive names of exgirlfriends, pump iron.  ...  Because the whole human family, folk and adjunct professors of neurolinguistics alike came from the same crop of hominids in the Savannah, right? Zfdel approaches the barbell racks.  ...  I don't reply. 2.5.2. But now I see a smile. 3. "You don't like to speak much, do you?" 3.1. I don't reply. 3.2. "Quiet type?" 3.3. I don't reply. 3.3.1. Dr.  ... 
« Previous Showing results 1 — 15 out of 39 results