Sciweavers

106 search results - page 17 / 22
» Human, organizational, and technological factors of IT secur...
Sort
View
74
Voted
WWW
2007
ACM
15 years 10 months ago
Cantina: a content-based approach to detecting phishing web sites
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, ...
Jason I. Hong, Lorrie Faith Cranor, Yue Zhang 0002
SOUPS
2005
ACM
15 years 3 months ago
Making PRIME usable
Privacy-enhanced Identity Management can enable users to retain and maintain informational self-determination in our networked society. This paper describes the usability research...
John Sören Pettersson, Simone Fischer-Hü...
SIGCSE
2004
ACM
112views Education» more  SIGCSE 2004»
15 years 3 months ago
Great principles in computing curricula
The nearly three dozen core technologies of computing sit in a simple framework defined by great principles and by computing practices. The great principles are of two kinds, mech...
Peter J. Denning
GROUP
2009
ACM
15 years 4 months ago
Effects of feedback and peer pressure on contributions to enterprise social media
Increasingly, large organizations are experimenting with internal social media (e.g., blogs, forums) as a platform for widespread distributed collaboration. Contributions to their...
Michael J. Brzozowski, Thomas Sandholm, Tad Hogg
ICMI
2005
Springer
104views Biometrics» more  ICMI 2005»
15 years 3 months ago
Analyzing and predicting focus of attention in remote collaborative tasks
To overcome the limitations of current technologies for remote collaboration, we propose a system that changes a video feed based on task properties, people’s actions, and messa...
Jiazhi Ou, Lui Min Oh, Susan R. Fussell, Tal Blum,...