Sciweavers

335 search results - page 38 / 67
» Biometrics and Security
Sort
View
FGR
2004
IEEE
97views Biometrics» more  FGR 2004»
15 years 5 months ago
Recognizing Song-Based Blink Patterns: Applications for Restricted and Universal Access
We introduce a novel system for recognizing patterns of eye blinks for use in assistive technology interfaces and security systems. First, we present a blink-based interface for c...
Tracy L. Westeyn, Thad Starner
HICSS
2009
IEEE
128views Biometrics» more  HICSS 2009»
15 years 5 months ago
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This...
Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
HICSS
2008
IEEE
88views Biometrics» more  HICSS 2008»
15 years 8 months ago
The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence
Abstract: We adapt the event study methodology from research in financial economics to study the impact of government enforcement and economic opportunities on information security...
Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang
HICSS
2011
IEEE
247views Biometrics» more  HICSS 2011»
14 years 5 months ago
Model-Driven Development Meets Security: An Evaluation of Current Approaches
Although our society is critically dependent on software systems, these systems are mainly secured by protection mechanisms during operation instead of considering security issues...
Kresimir Kasal, Johannes Heurix, Thomas Neubauer
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 8 months ago
The Role of External Influences on Organizational Information Security Practices: An Institutional Perspective
This paper describes the initial findings of a case study intended to identify important organizational catalysts and impediments to implementing and using security technologies a...
Qing Hu, Paul Hart, Donna Cooke