Sciweavers

575 search results - page 37 / 115
» A model for evaluating IT security investments
Sort
View
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 2 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 7 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
IUI
2009
ACM
15 years 10 months ago
Context-based page unit recommendation for web-based sensemaking tasks
Sensemaking tasks require users to perform complex research behaviors to gather and comprehend information from many sources. Such tasks are common and include, for example, resea...
Wen-Huang Cheng, David Gotz
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 8 months ago
Longitudinal Analysis of the Effects of IT Characteristics on Web Site Ratings Across State Governments in the US (2001-2006)
Given the increasing investment on information technology (IT) and Web site features, it becomes crucial to measure reliably the impact of these characteristics on the overall qua...
Gabriel Puron Cid, José Ramón Gil-Ga...
HICSS
2006
IEEE
92views Biometrics» more  HICSS 2006»
15 years 8 months ago
An Integrative Framework for Contextual Factors Affecting IT Implementation
While previous research has provided a great deal of information on individual factors that play a role in IT implementation success, a gap in the research exists when it comes to...
Barbara Edington, Namchul Shin