Sciweavers

490 search results - page 72 / 98
» Enabling User Control with Personal Identity Management
Sort
View
102
Voted
DRM
2006
Springer
15 years 4 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver
112
Voted
IEEEARES
2008
IEEE
15 years 6 months ago
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps
Trust and its role in e-commerce is a major topic for researchers, clients, and service providers alike. However, questions of origin and practical usage of trust in e-commerce ar...
Christian Schläger, Günther Pernul
109
Voted
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
15 years 7 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...
ICDM
2008
IEEE
222views Data Mining» more  ICDM 2008»
15 years 7 months ago
GRAPHITE: A Visual Query System for Large Graphs
We present Graphite, a system that allows the user to visually construct a query pattern, finds both its exact and approximate matching subgraphs in large attributed graphs, and ...
Duen Horng Chau, Christos Faloutsos, Hanghang Tong...
102
Voted
FBIT
2007
IEEE
15 years 6 months ago
Evaluation of a Dominance-Based Rough Set Approach to Interface Design
This paper explores refinements to methods used in a procedure being developed by the authors to personalize user interfaces for online shopping support tools. In the authors’ ...
Timothy Maciag, Daryl H. Hepting, Robert J. Hilder...