Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- extended-abstractMay 2024
Consensus of Nonlinear Multi-Agent Systems with Semi-Markov Switching Under DoS Attacks
AAMAS '24: Proceedings of the 23rd International Conference on Autonomous Agents and Multiagent SystemsPages 2516–2518Denial of Service (DoS) attacks will destroy the communication channels between agents. How to reduce the impact of DoS attacks onsystem consensus of nonlinear multi-agent systems (MASs) with semi-Markov switching (SMS) is an important problem that has ...
- research-articleMay 2022
SMS OTP Security (SOS): Hardening SMS-Based Two Factor Authentication
- Christian Peeters,
- Christopher Patton,
- Imani N. S. Munyaka,
- Daniel Olszewski,
- Thomas Shrimpton,
- Patrick Traynor
ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications SecurityPages 2–16https://doi.org/10.1145/3488932.3497756SMS-based two-factor authentication (2FA) is the most widely deployed 2FA mechanism, despite the fact that SMS messages are known to be vulnerable to rerouting attacks, and despite the availability of alternatives that may be more secure. This is for ...
- research-articleApril 2022
Group Chat Ecology in Enterprise Instant Messaging: How Employees Collaborate Through Multi-User Chat Channels on Slack
Proceedings of the ACM on Human-Computer Interaction (PACMHCI), Volume 6, Issue CSCW1Article No.: 94, Pages 1–14https://doi.org/10.1145/3512941Despite the long history of studying instant messaging usage, we know very little about how today's people participate in group chat channels and interact with others inside a real-world organization. In this short paper, we aim to update the existing ...
- research-articleMay 2019
The "Comadre" Project: An Asset-Based Design Approach to Connecting Low-Income Latinx Families to Out-of-School Learning Opportunities
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsPaper No.: 607, Pages 1–14https://doi.org/10.1145/3290605.3300837Participation in out-of-school learning programs has been shown to generate significant academic, social/emotional, and institutional benefits for young learners, and today's wealthy families are disproportionately reaping these benefits. This paper ...
- research-articleMay 2019
Engaging High School Students in Cameroon with Exam Practice Quizzes via SMS and WhatsApp
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing SystemsPaper No.: 482, Pages 1–13https://doi.org/10.1145/3290605.3300712We created a quiz-based intervention to help secondary school students in Cameroon with exam practice. We sent regularly-spaced, multiple-choice questions to students' own mobile devices and examined factors which influenced quiz participation. These ...
-
- research-articleJuly 2018
Towards a More Reliable Store-and-forward Protocol for Mobile Text Messages
ApPLIED '18: Proceedings of the 2018 Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating Algorithms for Distributed systemsPages 13–19https://doi.org/10.1145/3231104.3231108Businesses often use mobile text messages (SMS) as a cost effective and universal way of communicating concise information to their customers. Today, these messages are usually sent via SMS brokers, which forward them further to the next stakeholder, ...
- research-articleMay 2017
Money, God, and SMS: Explorations in Supporting Social Action Through a Bangladeshi Mosque
CHI '17: Proceedings of the 2017 CHI Conference on Human Factors in Computing SystemsPages 5941–5953https://doi.org/10.1145/3025453.3025960Religious institutions hold a significant place in daily life for the vast majority of people in the world, especially in developing countries. Yet despite their social prominence, and despite HCI's emphasis on the social context of technology, ...
- short-paperJuly 2016
Detecting SMS Spam in the Age of Legitimate Bulk Messaging
WiSec '16: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile NetworksPages 165–170https://doi.org/10.1145/2939918.2939937Text messaging is used by more people around the world than any other communications technology. As such, it presents a desirable medium for spammers. While this problem has been studied by many researchers over the years, the recent increase in ...
- research-articleDecember 2015
USSD: The Third Universal App
DEV '15: Proceedings of the 2015 Annual Symposium on Computing for DevelopmentPages 13–21https://doi.org/10.1145/2830629.2830645In this paper we argue for the use of Unstructured Supplementary Service Data (USSD) as a platform for universal cell phone applications. We examine over a decade of ICT4D research, analyzing how USSD can extend and complement current uses of IVR and ...
- abstractDecember 2015
Towards a 2-Way Communication and Analytics Platform for Emergency Response and Post-Emergency Recovery Efforts in Sierra Leone
DEV '15: Proceedings of the 2015 Annual Symposium on Computing for DevelopmentPage 31https://doi.org/10.1145/2830629.2830634At the peak of the West African Ebola outbreak in December 2014, the only prospect for containing the Ebola Virus Disease (EVD) was through behavior change to reduce transmission pathways. However, deeply ingrained beliefs, social systems, and cultural ...
- research-articleApril 2015
Engaging Pregnant Women in Kenya with a Hybrid Computer-Human SMS Communication System
- Trevor Perrier,
- Nicola Dell,
- Brian DeRenzi,
- Richard Anderson,
- John Kinuthia,
- Jennifer Unger,
- Grace John-Stewart
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsPages 1429–1438https://doi.org/10.1145/2702123.2702124A growing body of HCI4D research studies the use of SMS communication to deliver health and information services to underserved populations. This paper contributes a novel dimension to this field of study by examining if a hybrid computer-human SMS ...
- research-articleJuly 2014
Leveraging knowledge across media for spammer detection in microblogging
SIGIR '14: Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrievalPages 547–556https://doi.org/10.1145/2600428.2609632While microblogging has emerged as an important information sharing and communication platform, it has also become a convenient venue for spammers to overwhelm other users with unwanted content. Currently, spammer detection in microblogging focuses on ...
- research-articleApril 2014
MinEMail: SMS alert system for managing critical emails
CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsPages 783–792https://doi.org/10.1145/2556288.2557182Email is the primary method of digital communication for most people, but the overwhelming quantity has led to a poverty of attention. Existing manual and automatic solutions that aim to save important emails from falling through the cracks have begun ...
- research-articleFebruary 2014
Everyday dwelling with WhatsApp
CSCW '14: Proceedings of the 17th ACM conference on Computer supported cooperative work & social computingPages 1131–1143https://doi.org/10.1145/2531602.2531679In this paper, we present a study of WhatsApp, an instant messaging smartphone application. Through our interviews with participants, we develop anthopologist Tim Ingold's notion of dwelling, and discuss how use of WhatsApp is constitutive of a felt-...
- research-articleAugust 2013
What's up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS
MobileHCI '13: Proceedings of the 15th international conference on Human-computer interaction with mobile devices and servicesPages 352–361https://doi.org/10.1145/2493190.2493225With the advent of instant mobile messaging applications, traditional SMS is in danger of loosing it's reign as the king of mobile messaging. Applications like WhatsApp allow mobile users to send real-time text messages to individuals or groups of ...
- research-articleApril 2013
A text message a day keeps the pulmonologist away
CHI '13: Proceedings of the SIGCHI Conference on Human Factors in Computing SystemsPages 1769–1778https://doi.org/10.1145/2470654.2466233The goal of this study was to extend and replicate an SMS health intervention for pediatric asthma patients. This intervention was designed using the Health Belief Model (HBM). Thirty patients were randomly assigned to one of three conditions. In the ...
- research-articleFebruary 2013
Butler lies from both sides: actions and perceptions of unavailability management in texting
CSCW '13: Proceedings of the 2013 conference on Computer supported cooperative workPages 769–778https://doi.org/10.1145/2441776.2441862In an always-connected world, managing one's unavailability for interaction with others can be as important and difficult as coordinating mutual availability. Prior studies have identified the butler lie, a linguistic strategy commonly used to manage ...
- research-articleOctober 2012
Qualitative assessment of contemporary media sharing practices and their relationship to the sMS platform
SAM '12: Proceedings of the 2012 international workshop on Socially-aware multimediaPages 31–36https://doi.org/10.1145/2390876.2390887Being a social species, humans sometimes desire to share information and to consume content as part of a group. A myriad of practical issues might however prevent people from physically congregating. The synchronous MediaSharing (sMS) framework attempts ...
- short-paperOctober 2012
Android SMS botnet: a new perspective
MobiWac '12: Proceedings of the 10th ACM international symposium on Mobility management and wireless accessPages 125–130https://doi.org/10.1145/2386995.2387016In this paper, we present an SMS-based Android botnet. Since all mobile phones have SMS services as a feature, we will use SMS as the medium of propagation of Command and Control messages between the botnet controller and the victim devices. The ...
- posterAugust 2012
$100,000 prize jackpot. call now!: identifying the pertinent features of SMS spam
SIGIR '12: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrievalPages 1175–1176https://doi.org/10.1145/2348283.2348526Mobile SMS spam is on the rise and is a prevalent problem. While recent work has shown that simple machine learning techniques can distinguish between ham and spam with high accuracy, this paper explores the individual contributions of various textual ...