Sciweavers

106 search results - page 7 / 22
» Human, organizational, and technological factors of IT secur...
Sort
View
SOUPS
2009
ACM
15 years 4 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
SIGUCCS
2004
ACM
15 years 3 months ago
Communities of practice: dare to share the knowledge
Communities of practice are not a new idea, but they are being looked at more closely as an important tool for learning and mastering knowledge challenges. Communities of practice...
Debbie Mojta
CHI
2010
ACM
15 years 4 months ago
Newport: enabling sharing during mobile calls
Newport is a collaborative application for sharing context (e.g. location) and content (e.g. photos and notes) during mobile phone calls. People can share during a phone call and ...
Junius Gunaratne, A. J. Bernheim Brush
WIS
2004
14 years 11 months ago
AuthenLink: A User-Centred Authentication System for a Secure Mobile Commerce
We envision an environment where humans communicate directly with computers without additional authentication inputs like passwords, passphrases, PINs (Personal Identification Num...
Christina Braz, Esma Aïmeur
WWW
2006
ACM
15 years 10 months ago
Invasive browser sniffing and countermeasures
We describe the detrimental effects of browser cache/history sniffing in the context of phishing attacks, and detail an approach that neutralizes the threat by means of URL person...
Markus Jakobsson, Sid Stamm