Skip to main content
Security mechanisms may require users to deal with the tradeoff between risky and efficient or safer yet less efficient use of a production system. We present an experimental system (microworld), based on the Tetris game, that can serve... more
    • by  and +3
Technological developments and the addition of new features to existing applications or services require the inclusion of security mechanisms to protect the user. When using these mechanisms the user faces a tradeoff between more risky... more
    • by  and +3
    •   7  
      Human Computer InteractionUsabilityUsable Security (Computer Security)Technological Development
Security mechanisms may require users to deal with the tradeoff between risky and efficient or safer yet less efficient use of a production system. We present an experimental system (microworld), based on the Tetris game, that can serve... more
    • by  and +3
Background: Over the years, PTWs' number of accidents have increased dramatically and have accounted for a high percentage of the total traffic fatalities. The majority of those accidents occur in daylight, clear weather, and at light to... more
    • by 
    •   13  
      PsychologyVisual perceptionAttentionMotorcycles
Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers.... more
    • by 
    •   10  
      Human Computer InteractionUsable Security (Computer Security)Biometrics And IdentityAuthentication
We analyze the dynamics of repeated interaction of two players in the Prisoner's Dilemma (PD) under various levels of interdependency information and propose an instance-based learning cognitive model (IBL-PD) to explain how cooperation... more
    • by 
    •   12  
      PsychologyCognitive ScienceGame TheoryInformation Theory
We describe a design project of a future electronic news device and service. The project employs about 20 researchers, designers and developers. It uses advances in product technologies and in social computing to deal with the challenges... more
    • by  and +2
    •   7  
      DesignResearch DesignAdaptationPersonalization