Sciweavers

106 search results - page 10 / 22
» Human, organizational, and technological factors of IT secur...
Sort
View
WWW
2008
ACM
16 years 2 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
56
Voted
CHI
2009
ACM
16 years 2 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
114
Voted
WIKIS
2009
ACM
15 years 8 months ago
Suffr: democratic control of computing infrastructure
Suffr uses Wiki to facilitate corporate governance. Suffr allows a group's members to administer a computer system and its information resources collectively. Categories and ...
Kirk Zurell
LOCWEB
2009
ACM
15 years 8 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
WWW
2005
ACM
16 years 2 months ago
The classroom sentinel: supporting data-driven decision-making in the classroom
Whereas schools typically record mounds of data regarding student performance, attendance, and other behaviors over the course of a school year, rarely is that data consulted and ...
Mark K. Singley, Richard B. Lam