Sciweavers

23 search results - page 2 / 5
» soups 2010
Sort
View
SYNTHESE
2010
101views more  SYNTHESE 2010»
13 years 2 months ago
Actual causation: a stone soup essay
We argue that current discussions of criteria for actual causation are ill-posed in several respects. (1) The methodology of current discussions is by induction from intuitions ab...
Clark Glymour, David Danks, Bruce Glymour, Frederi...
SOUPS
2010
ACM
13 years 3 months ago
The impact of social navigation on privacy policy configuration
Social navigation is a promising approach to help users make better privacy and security decisions using community knowledge and expertise. Social navigation has recently been app...
Andrew Besmer, Jason Watson, Heather Richter Lipfo...
SOUPS
2010
ACM
13 years 7 months ago
Optimizing a policy authoring framework for security and privacy policies
Policies which address security and privacy are pervasive parts of both technical and social systems, and technology to enable both organizations and individuals to create and man...
Maritza Johnson, John Karat, Clare-Marie Karat, Ke...
SOUPS
2010
ACM
13 years 7 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
SOUPS
2010
ACM
13 years 7 months ago
Encountering stronger password requirements: user attitudes and behaviors
Text-based passwords are still the most commonly used authentication mechanism in information systems. We took advantage of a unique opportunity presented by a significant change...
Richard Shay, Saranga Komanduri, Patrick Gage Kell...