Sciweavers

316 search results - page 3 / 64
» Where do security policies come from
Sort
View
WWW
2005
ACM
14 years 6 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
13 years 11 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
COLING
2010
13 years 8 days ago
Multiword Expressions in the wild? The mwetoolkit comes in handy
The mwetoolkit is a tool for automatic extraction of Multiword Expressions (MWEs) from monolingual corpora. It both generates and validates MWE candidates. The generation is based...
Carlos Ramisch, Aline Villavicencio, Christian Boi...
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
13 years 5 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
CHIMIT
2007
ACM
13 years 9 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson