Sciweavers

19 search results - page 4 / 4
» Information sources and perceived success in corporate finan...
Sort
View
SOUPS
2006
ACM
13 years 10 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
SIGUCCS
2009
ACM
13 years 11 months ago
The many benefits of cultivating a community among IT staff
Conference Abstracts October 11-14, 2009 t provides the abstracts and the author(s)’ name(s) for the technical program. The actual presenter(s) may vary. Updated September 20, 20...
Ken Layng
SIGCPR
2000
ACM
173views Hardware» more  SIGCPR 2000»
13 years 9 months ago
Hollywood: a business model for the future?
This paper elucidates an emergent theory of organizational structure, process and leadership which the author believes will characterize the Internet based workplace of the future...
Charles E. Grantham
CVPR
2008
IEEE
14 years 7 months ago
Constrained spectral clustering through affinity propagation
Pairwise constraints specify whether or not two samples should be in one cluster. Although it has been successful to incorporate them into traditional clustering methods, such as ...
Miguel Á. Carreira-Perpiñán, ...