Search concepts
|
Selected filters
|
- 4,750 - 4,800 out of 5,752 results
Search results
-
Conference contribution
Trust and reputation policy-based mechanisms for self-protection in autonomic communications
Serrano, M., van der Meer, S., Strassner, J., De Paoli, S., Kerr, A. & Storni, C., 30 Jun 2009, Autonomic and trusted computing: 6th international conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 : proceedings. Nieto, J. G., Reif, W., Wang, G. & Indulska, J. (eds.). Berlin: Springer-Verlag, p. 249-267 19 p. (Lecture Notes in Computer Science (LNCS); vol. 5586).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
6 Citations (Scopus) -
Twist and learn: interface learning in 3DOF exploration of 3D scatterplots
Shovman, M., Szymkowiak, A., Bown, J. L. & Scott-Brown, K. C., 18 Apr 2015, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), p. 313-316 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Undermining: social engineering using open source intelligence gathering
Ball, L., Ewan, G. & Coull, N., 2012, Proceedings of the International Conference on Knowledge Discovery and Information Retrieval. Fred, A. & Filipe, J. (eds.). Scitepress Digital Library, Vol. 1: KDIR. p. 275-280 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile11 Citations (Scopus)596 Downloads (Pure) -
Usability and biometric verification at the ATM interface
Coventry, L., De Angeli, A. & Johnson, G., 28 Jul 2003, CHI '03 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery (ACM), p. 153-160 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
79 Citations (Scopus) -
Usability challenges in emerging markets
Aziz, M., Riley, C. & Johnson, G., 2008, ICEIS 2008: Proceedings of the Tenth International conference on Enterprise Information Systems Vol HCI. Cordeiro, J. & Filipe, J. (eds.). Scitepress Digital Library, Vol. 5. p. 160-165 6 p. (ICEIS - International Conference on Enterprise Information Systems).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access2 Citations (Scopus) -
Usability engineering at NCR (Scotland) Ltd
Coventry, L., Johnson, G. & Westwater, M., 1996, People and computers XI: proceedings of HCI’96. Sasse, M. A., Cunningham, R. J. & Winder, R. L. (eds.). London: Springer-Verlag, Vol. 2. 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Use of an agile bridge in the development of assistive technology
Prior, S., Waller, A., Black, R. & Kroll, T., 27 Apr 2013, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), p. 1579-1588 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile5 Citations (Scopus)116 Downloads (Pure) -
Use of a vision model to quantify the significance of factors effecting target conspicuity
Gilmore, M. A., Jones, C. K., Haynes, A. W., Tolhurst, D. J., To, M., Troscianko, T., Lovell, P. G., Parraga, C. A. & Pickavance, K., 23 Aug 2006, Targets and Backgrounds XII: Characterization and Representation. 62390R. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 6239).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
User experience at NCR: an organisational overview
Day, P. N., Johnson, G. I., Rohan, C., Riley, C. & Carlisle, M., 6 Sep 2010, People and computers XXIV Games are a serious business: proceedings of HCI 2010 the 24th BCS Interaction Specialist Group conference, University of Abertay, Dundee, UK 6-10 September 2010. McEwan, T. & McKinnon, L. M. (eds.). Swindon: BCS Learning & Development Ltd., p. 195-203 9 p. (Electronic Workshops in Computing (eWiC)).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile1 Citation (Scopus)31 Downloads (Pure) -
User research in a scientific software development project
Sloan, D., MacAulay, C., Forbes, P., Loynton, S. & Gregor, P., 1 Sep 2009, People and Computers XXIII Celebrating People and Technology - Proceedings of HCI 2009. Blackwell, A. (ed.). BCS, The Chartered Institute for IT, p. 423-429 7 p. (People and Computers XXIII Celebrating People and Technology - Proceedings of HCI 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access5 Citations (Scopus) -
Users’ mental models of automated teller machines: an exploratory study
Henneman, R. L., Knutson, M. & Johnson, G. I., 1993, Proceedings of the Annual AT&T Human Factors and Behavioral Sciences Symposium ’93. Holmdel, NJ: AT&T Bell Laboratories, p. 53-57 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Uses of peer assessment in database teaching and learning
Paterson, J., Wilson, J. N. & Leimich, P., 2012, Data security and security data: 27th British National Conference on Databases, BNCOD 27 Dundee, UK, June 29 – July 1, 2010 Revised Selected Papers. MacKinnon, L. M. (ed.). Berlin: Springer, p. 135-146 12 p. (Lecture Notes in Computer Science; vol. 6121).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile2 Citations (Scopus)176 Downloads (Pure) -
Using a dashboard-based statistical information system to support online learning: the Tourism Monitor project
MacKinnon, L. M., Velvin, J., Graven, O. H. & Bacon, L., 19 Oct 2015, Proceedings of E-Learn: : World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education. Ho, C. & Lin, G. (eds.). Association for the Advancement of Computing in Education, Vol. 2015. p. 1126-1135 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Using a fuzzy inference system to control a pumped storage hydro plant
King, D. J., Bradley, D. A., Mansoor, S. P., Jones, D. I., Aris, F. C. & Jones, G. R., 2001, Proceedings of the 10th IEEE International Conference on Fuzzy Systems. Piscataway, NJ: IEEE , Vol. 3. p. 1008-1011 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile7 Citations (Scopus)120 Downloads (Pure) -
Using gamification to improve information security behavior: a password strength experiment
Ophoff, J. & Dietz, F., 19 Jun 2019, Information security education: education in proactive information security: 12th IFIP WG 11.8 world conference WISE 12, Lisbon, Portugal, June 25–27, 2019, proceedings. Drevin, L. & Theocharidou, M. (eds.). Cham: Springer, p. 157-169 13 p. (IFIP Advances in Information and Communication Technology (IFIPAICT); vol. 557).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile5 Citations (Scopus)156 Downloads (Pure) -
Using generative adversarial networks to create graphical user Interfaces for video games
Acornley, C., 18 Oct 2021, ICMI'21: proceedings 23rd ACM International Conference on Multimodal Interaction. New York: Association for Computing Machinery (ACM), p. 802–806 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile64 Downloads (Pure) -
Using motion-sensing remote controls with older adults
von Bruhn Hinné, T. & Keates, S., 2011, Universal access in Human-Computer Interaction: users diversity. London: Springer-Verlag, Vol. 2. p. 166-175 10 p. (Lecture Notes in Computer Science; vol. 6766).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Using multiple GPUs to accelerate string searching for digital forensic analysis
Bayne, E., Ferguson, R. I., Sampson, A. & Isaacs, J., 22 Sep 2016, SADFE Proceedings 2016. Association of Digital Forensics, Security and Law (ADFSL), p. 67-78 12 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile130 Downloads (Pure) -
Using virtual agents to cue observer attention: assessment of the impact of agent animation
Martinez, S., Sloan, R. J. S., Szymkowiak, A. & Scott-Brown, K. C., 21 Nov 2010, CONTENT 2010: the Second International Conference on Creative Content Technologies November 21-26, 2010 - Lisbon, Portugal. Beklen, A., Ejarque, J., Gentzsch, W., Kanstren, T., Koschel, A., Lee, Y. W., Li, L. & Zemlicka, M. (eds.). International Academy, Research, and Industry Association (IARIA), p. 7-12 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Using web-enabled mobile phones for audience participation in database lectures
McCreath, C. & Leimich, P., 2011, Proceedings of the HEA Teaching, Learning and Assessment of Databases (TLAD 11) . Newtownabbey: The Higher Education Academy, p. 37-43 7 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile41 Downloads (Pure) -
Using whole utterance prediction rate to increase conversational rate
Archibald, J. & File, P., 7 Aug 2008, Proceedings of 13th Biennial Conference of the International Society of Augmentative and Alternative Communication, Montreal, Canada, 4-7 August, 2008. ISAACResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Utilizing cone penetration tests for landslide evaluation
Jorat, M. E., Kreiter, S., Mörz, T., Moon, V. & De Lange, W., 2014, Submarine mass movements and their consequences: 6th International Symposium. Krastel, S., Behrmann, J-H., Völker, D., Stipp, M., Berndt, C., Urgeles, R., Chaytor, J., Huhn, K., Strasser, M. & Harbitz, C. B. (eds.). Cham: Springer, p. 55-71 17 p. (Advances in Natural and Technological Hazards Research; vol. 37).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
VIP: a visual approach to user authentication
De Angeli, A., Coutts, M., Coventry, L., Johnson, G. I., Cameron, D. & Fischer, M. H., 22 May 2002, Proceedings of the Working Conference on Advanced Visual Interfaces, AVI 2002. De Marsico, M., Levialdi, S. & Panizzi, E. (eds.). New York: Association for Computing Machinery (ACM), p. 316-323 8 p. (Proceedings of the Workshop on Advanced Visual Interfaces AVI).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access68 Citations (Scopus) -
Virtual scaffolding: constructivism in online learning
MacKinnon, L. M. & Bacon, L., 2016, Proceedings of the International Conference e-Learning 2016: Part of the Multi Conference on Computer Science and Information Systems 2016. Nunes, M. B. & McPherson, M. (eds.). International Association for Development of the Information Society, p. 231-235 5 p. (Computer Science and Information Systems Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Virtua Walker '87: technostalgia for a walking sim from an alternative past
Sloan, R. J. S. & Robertson, P., 26 Feb 2017, Proceedings of the International Conference on Game Jams, Hackathons, and Game Creation Events: ICGJ '17 . New York: Association for Computing Machinery (ACM), p. 44-45 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile1 Citation (Scopus)148 Downloads (Pure) -
Visualisation of device datasets to assist digital forensic investigation
Hales, G., 19 Oct 2017, Proceedings of the International Conference On Cyber Situational Awareness, Data Analytics And Assessment- CyberSA. IEEE , 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile2 Citations (Scopus)207 Downloads (Pure) -
Visualization of African knowledge to embody the spirit of African storytelling: principles, practices and evaluation
Van Biljon, J., Renaud, K. & Chimbo, B., 3 Dec 2018, Proceedings of the 2nd African Conference for Human Computer Interaction: Thriving Communities, AfriCHI 2018. Winschiers-Theophilus, H., van Zyl, I., Goagoses, N., Singh Jat, D., Belay, E. G., Orji, R. & Peters, A. (eds.). Association for Computing Machinery (ACM), p. 271-272 2 p. 48Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
Vocational training and knowledge development: a deeper understanding
Gilmour, D. J., Simpson, E., Blackwood, D. J., McCallum, C. & Logan, G., 5 Sep 2016, Proceedings of the 32nd Annual ARCOM Conference. Chan, P. W. & Neilson, C. J. N. (eds.). Vol. 1. p. 393-402 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile68 Downloads (Pure) -
Vulnerability anti-patterns: a timeless way to capture poor software practices (Vulnerabilities)
Nafees, T., Coull, N., Ferguson, I. & Sampson, A., 29 Nov 2018, PLoP 17 conference proceedings: 24th conference on pattern languages of programs, October 23-25 October, 2017, Vancouver, Canada. Iba, T., Yoder, J., Burgoyne, A. & Nozaki, K. (eds.). The Hillside Group, 16 p. 23Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile561 Downloads (Pure) -
Watch this! Recent developments and future challenges
Jola, C., 1 Sep 2016, Proceedings IAE 2016: XXIV. Conference of the International Association of Empirical Aesthetics. Leder, H., Forster, M., Gerger, G., Nadal, M., Pelowski, M. & Rosenberg, R. (eds.). International Association of Empirical Aesthetics, p. 39-39 1 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Water for Walami: a strategy game
Simpson, E. & Ogwuda, O. I., 2006, Simulations and games for risk, crisis and security management. Borodzicz, E. (ed.). The Society for the Advancement of Games and Simulations in Education and Training (SAGSET), Vol. 14. p. 91-101 11 p. (International Simulation and Gaming Research Yearbook; vol. 14).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile48 Downloads (Pure) -
WeChat as a remote research tool using WeChat to understand banking with Chinese consumers
Sie, J., Eng, K. W., Zainuddin, S. & Johnson, G. I., 20 Feb 2017, Proceedings 2016 4th International Conference on User Science and Engineering (iUSEr). IEEE , p. 17-22 6 p. (2016 4th International Conference on User Science and Engineering (i-USEr)).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
1 Citation (Scopus) -
What can the 'ash cloud' tell us about older adults' technology adoption?
Gibson, L., Forbes, P. & Hanson, V., 31 Dec 2010, ASSETS'10 - Proceedings of the 12th International ACM SIGACCESS Conference on Computers and Accessibility. Barreto, A. (ed.). Association for Computing Machinery (ACM), p. 301-302 2 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
3 Citations (Scopus) -
What did I really vote for? On the usability of verifiable e-voting schemes
Marky, K., Kulyk, O., Renaud, K. & Volkamer, M., 21 Apr 2018, Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. New York: Association for Computing Machinery (ACM), 13 p. 176Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile9 Citations (Scopus)495 Downloads (Pure) -
When eHealth meets the internet of things: pervasive security and privacy challenges
Omoogun, M., Seeam, P., Ramsurrun, V., Bellekens, X. & Seeam, A., 19 Oct 2017, Proceedings of the International Conference on Cyber Security and Protection of Digital Services. IEEE , 7 p. 13Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
7 Citations (Scopus) -
Whole life costs and benefits of sustainable urban drainage systems in Dunfermline, Scotland
Wolf, D., Duffy, A. & Heal, K. V., 15 Jan 2015, Proceedings of the 2015 International Low Impact Development conference. Barrett, M. (ed.). Reston: American Society of Civil Engineers (ASCE), p. 419-427 9 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
4 Citations (Scopus) -
Why doesn't Jane protect her privacy?
Renaud, K., Volkamer, M. & Renkema-Padmos, A., 20 Jun 2014, Privacy enhancing technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, proceedings. De Cristofaro, E. & Murdoch, S. J. (eds.). Cham: Springer, p. 244-262 19 p. (Lecture Notes in Computer Science (LNCS); vol. 8555).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access49 Citations (Scopus) -
Why do people adopt, or reject, smartphone password managers?
Alkaldi, N. & Renaud, K., Jul 2016, EuroUSEC '16: the 1st European Workshop on Usable Security. Darmstadt: Internet Society, 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Why do people adopt, or reject, smartphone security tools?
Alkaldi, N. & Renaud, K., 12 Jul 2016, Proceedings of the 10th International Symposium on Human Aspects of Information Security and Assurance, HAISA 2016. Clarke, N. L. & Furnell, S. M. (eds.). Plymouth: Univerisity of Plymouth, p. 135-144 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile2 Citations (Scopus)48 Downloads (Pure) -
WikiRate.org - leveraging collective awareness to understand companies' environmental, social and governance performance
Mills, R., De Paoli, S., Diplaris, S., Gkatziaki, V., Papadopoulos, S., Prasad, S. R., McCutchen, E., Kapadia, V. & Hirche, P., 25 Aug 2016, Internet Science, INSCI2016. Bagnoli, F., Satsiou, A., Stavrakakis, I., Nesi, P., Pacini, G., Welp, Y., Tiropan, T. & DiFranzo, D. (eds.). Chambray: Springer, p. 74-88 15 p. (Lecture Notes in Computer Science; vol. 9934).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile6 Citations (Scopus)148 Downloads (Pure) -
Women and work-life balance: a case of austerity and authenticity
Moir, J., 2014, Proceedings of MAC-EMMT 2014: The 3rd Multidisciplinary Academic Conference in Prague: Economics, Management and Marketing. 1st ed. Prague: MAC Prague consulting s.r.o., 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
X.509 certificate error testing
McLuskie, D. & Bellekens, X., 27 Aug 2018, Proceedings of the 13th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM), 8 p. 42Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile153 Downloads (Pure) -
X-Secure: protecting users from big bad wolves
Binnie, R., McLean, C., Seeam, A. & Bellekens, X., 10 Nov 2016, 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech). IEEE , p. 158-161 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile1 Citation (Scopus)135 Downloads (Pure) -
Yeast fermentation performance influenced by magnesium availability
Walker, G. M., Chandrasena, G., Birch, R. M. & Maynard, A. I., 1995, Proceedings of the Fourth Aviemore Conference on Malting Brewing and Distilling. Campbell, I. & Priest, F. G. (eds.). London: Institute of Brewing and Distilling, p. 193-197 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Yeast vitality and stress responses: novel investigative approaches
Walker, G. M., 2012, Yeast flocculation, vitality and viability: proceedings of the 2nd International Brewers Symposium. Speers, A. (ed.). Saint Paul, Minnesota: The American Society of Brewing Chemists, p. 85-96 12 p. (International Brewers Symposia series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Zaytoun, visualising human made disaster through interactive illustration
Mehrpouya, H., Barker, C. & Braun, M., 1 Jul 2015, Proceedings of EVA London 2015. Ng, K., Bowen, J. P. & Lambert, N. (eds.). Swindon: BCS Learning & Development Ltd., p. 7-8 2 p. (Electronic Workshops in Computing).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile39 Downloads (Pure) -
ZeTA-Zero-Trust Authentication: relying on innate human ability, not technology
Gutmann, A., Renaud, K., Maguire, J., Mayer, P., Volkamer, M., Matsuura, K. & Muller-Quade, J., 9 May 2016, Proceedings of 2016 IEEE European Symposium on Security and Privacy, EURO S & P 2016. Los Alamitos, CA: IEEE Computer Society, p. 357-371 15 p. 7467365Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
2 Citations (Scopus) -
Zimbabwean non-uptake of protective point-of-sale behaviours: is this a risk homeostasis response?
Musarurwa, A., Renaud, K. & Schürmann, T., 21 Sep 2020, 2020 35th IEEE/ACM International Conference on Automated Software Engineering Workshops: ASEW 2020: proceedings. New York: Association for Computing Machinery (ACM), p. 1-6 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
‘Probing with the prototype’: using a prototype e-participation platform as a digital cultural probe to investigate youth engagement with the environment
Forbes, P. & De Paoli, S., 30 Sep 2016, Electronic Government and Electronic Participation: Joint Proceedings of ongoing research, PhD papers, posters and workshops of IFIP EGOV and ePart 2016. Hans Jochen, S., Glassey, O., Janssen, M., Klievink, B., Lindgren, I., Parycek, P., Tambouris, E., Wimmer, M., Janowski, T. & Sá Soares, D. (eds.). Amsterdam: IOS Press, p. 11-22 12 p. (Innovation and the Public Sector; vol. 23).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile80 Downloads (Pure) -
“I do it because they do it”: social-neutralisation in information security practices of Saudi medical interns
Altamimi, S., Renaud, K. & Storer, T., 16 Feb 2020, Risks and security of internet and systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, proceedings. Kallel, S., Cuppens, F., Cuppens-Boulahia, N. & Hadj Kacem, A. (eds.). Cham: Springer, p. 227-243 17 p. (Lecture Notes in Computer Science; vol. 12026).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile176 Downloads (Pure)