Sciweavers

96 search results - page 19 / 20
» Exploring Privacy Concerns about Personal Sensing
Sort
View
SOUPS
2006
ACM
14 years 6 hour ago
Password management strategies for online accounts
Given the widespread use of password authentication in online correspondence, subscription services, and shopping, there is growing concern about identity theft. When people reuse...
Shirley Gaw, Edward W. Felten
JUCS
2006
225views more  JUCS 2006»
13 years 6 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
CSCW
2002
ACM
13 years 5 months ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...
MICRO
2007
IEEE
113views Hardware» more  MICRO 2007»
13 years 5 months ago
The High Cost of a Cheap Lesson
y abstract, it is grounded in the experience of many markets. As I will illustrate, it explains much strategic behavior. Information spreads With a bit of effort, any technically s...
Shane Greenstein
JCDL
2011
ACM
228views Education» more  JCDL 2011»
12 years 9 months ago
The ownership and reuse of visual media
This paper presents the results of a study of the ownership and reuse of visual media. A survey was administered to 250 social media-savvy respondents to investigate their attitud...
Catherine C. Marshall, Frank M. Shipman III