Sciweavers

7 search results - page 1 / 2
» Password sharing: implications for security design based on ...
Sort
View
CHI
2007
ACM
14 years 5 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
HICSS
2002
IEEE
124views Biometrics» more  HICSS 2002»
13 years 10 months ago
Designing Information Technology Governance Processes: Diagnosing Contemporary Practices and Competing Theories
Whereas previous studies have been primarily focused on the structural features of Information Technology governance, this paper describes an exploratory study of IT governance pr...
Pieter M. A. Ribbers, Ryan Peterson, Marylin M. Pa...
CHI
2008
ACM
14 years 5 months ago
Location and activity sharing in everyday mobile communication
Frank Bentley We present a study on current, real-world communication of location and activity information based on analyzing context-sharing practices in recorded mobile phone cal...
Frank Bentley, Crysta J. Metcalf
TCOS
2010
13 years 2 days ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
CSCW
2006
ACM
13 years 11 months ago
A grounded theory of information sharing behavior in a personal learning space
This paper presents a grounded theory of information sharing behavior of the users of a personal learning space. A personal learning space is an environment consisted of weblog, e...
Maryam Najafian Razavi, Lee Iverson