Sciweavers

106 search results - page 10 / 22
» Human, organizational, and technological factors of IT secur...
Sort
View
WWW
2008
ACM
15 years 10 months ago
Sessionlock: securing web sessions against eavesdropping
Typical web sessions can be hijacked easily by a network eavesdropper in attacks that have come to be designated "sidejacking." The rise of ubiquitous wireless networks,...
Ben Adida
36
Voted
CHI
2009
ACM
15 years 10 months ago
Real life challenges in access-control management
In this work we ask the question: what are the challenges of managing a physical or file system access-control policy for a large organization? To answer the question, we conducte...
Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder,...
WIKIS
2009
ACM
15 years 4 months ago
Suffr: democratic control of computing infrastructure
Suffr uses Wiki to facilitate corporate governance. Suffr allows a group's members to administer a computer system and its information resources collectively. Categories and ...
Kirk Zurell
62
Voted
LOCWEB
2009
ACM
15 years 4 months ago
The case for a location metasystem
Microsoft has proposed an identity metasystem to standardize identity services and the principles behind them. A location metasystem can support interoperation between location se...
Nick Doty
WWW
2005
ACM
15 years 10 months ago
The classroom sentinel: supporting data-driven decision-making in the classroom
Whereas schools typically record mounds of data regarding student performance, attendance, and other behaviors over the course of a school year, rarely is that data consulted and ...
Mark K. Singley, Richard B. Lam