Sharing your assets: A holistic review of sharing economy

M Akbari, P Foroudi, M Khodayari, RZ Fashami… - Journal of Business …, 2022 - Elsevier
Even though academics and practitioners extensively apply the notion of the sharing
economy (SE), the conceptualization and the literature construction remained disjointed and …

User experience research in the work context: Maps, gaps and agenda

P Simsek Caglar, V Roto, T Vainio - Proceedings of the ACM on Human …, 2022 - dl.acm.org
User experience (UX) research has been criticized for focusing on leisure contexts and
overlooking the work contexts. Moreover, researchers have been drawing attention to how …

Regroup: Interactive machine learning for on-demand group creation in social networks

S Amershi, J Fogarty, D Weld - … of the SIGCHI conference on human …, 2012 - dl.acm.org
We present ReGroup, a novel end-user interactive machine learning system for hel**
people create custom, on demand groups in online social networks. As a person adds …

Guidelines for usable cybersecurity: Past and present

JRC Nurse, S Creese, M Goldsmith… - … on cyberspace safety …, 2011 - ieeexplore.ieee.org
Usability is arguably one of the most significant social topics and issues within the field of
cybersecurity today. Supported by the need for confidentiality, integrity, availability and other …

Designing for effective end-user interaction with machine learning

S Amershi - Proceedings of the 24th annual ACM symposium …, 2011 - dl.acm.org
End-user interactive machine learning is a promising tool for enhancing human capabilities
with large data. Recent work has shown that we can create end-user interactive machine …

How users use access control

DK Smetters, N Good - Proceedings of the 5th Symposium on Usable …, 2009 - dl.acm.org
Existing technologies for file sharing differ widely in the granularity of control they give users
over who can access their data; achieving finer-grained control generally requires more user …

[PDF][PDF] A new evaluation criteria for effective security awareness in computer risk management based on AHP

N Badie, AH Lashkari - Journal of Basic and Applied Scientific …, 2012 - academia.edu
Any security system, no matter how well designed and implemented, will have to rely on
people. The fact that human factors play a crucial part in the majority of accidents is a …

Pragmatic security: modelling it security management responsibilities for SME archetypes

S Parkin, A Fielder, A Ashby - Proceedings of the 8th ACM CCS …, 2016 - dl.acm.org
Here we model the indirect costs of deploying security controls in small-to-medium
enterprises (SMEs) to manage cyber threats. SMEs may not have the in-house skills and …

A user study of policy creation in a flexible access-control system

L Bauer, LF Cranor, RW Reeder, MK Reiter… - Proceedings of the …, 2008 - dl.acm.org
Significant effort has been invested in develo** expressive and flexible access-control
languages and systems. However, little has been done to evaluate these systems in …

More than skin deep: measuring effects of the underlying model on access-control system usability

RW Reeder, L Bauer, LF Cranor, MK Reiter… - Proceedings of the …, 2011 - dl.acm.org
In access-control systems, policy rules conflict when they prescribe different decisions (allow
or deny) for the same access. We present the results of a user study that demonstrates the …