Sciweavers

196 search results - page 14 / 40
» Examining risk attitudes
Sort
View
WWW
2011
ACM
14 years 6 months ago
A middleware for securing mobile mashups
Mashups on traditional desktop devices are a well-known source of security risks. In this paper, we examine how these risks translate to mobile mashups and identify new risks caus...
Florent Batard, Karima Boudaoud, Michel Riveill
HICSS
2006
IEEE
96views Biometrics» more  HICSS 2006»
15 years 5 months ago
Employee Technology Readiness and Adoption of Wireless Technology and Services
In this paper, we examine the relationship between users’ technology readiness (specifically employees) and their adoption of wireless technology and services in a longitudinal ...
Ai-Mei Chang, P. K. Kannan
CHI
2006
ACM
15 years 5 months ago
Can a virtual cat persuade you?: the role of gender and realism in speaker persuasiveness
This study examines the roles of gender and visual realism in the persuasiveness of speakers. Participants were presented with a persuasive passage delivered by a male or female p...
Catherine A. Zanbaka, Paula Goolkasian, Larry F. H...
IIE
2006
108views more  IIE 2006»
14 years 11 months ago
Towards the Information Society - the Case of Finnnish Teacher Education
Abstract. The use of Information and Communication Technology (ICT) in education is one important competence that student teacher should develop in their academic studies. To be ca...
Johani Rautopuro, Susanna Pöntinen, Jari Kukk...
FC
2009
Springer
121views Cryptology» more  FC 2009»
15 years 6 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...