Sciweavers

2648 search results - page 118 / 530
» Human Factors In Computer Security
Sort
View
CSCW
2010
ACM
16 years 1 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
WWW
2011
ACM
15 years 1 days ago
Analysis and tracking of emotions in english and bengali texts: a computational approach
The present discussion highlights the aspects of an ongoing doctoral thesis grounded on the analysis and tracking of emotions from English and Bengali texts. Development of lexica...
Dipankar Das
ACSAC
1999
IEEE
15 years 9 months ago
A Resource Access Decision Service for CORBA-Based Distributed Systems
Decoupling authorization logic from application logic allows applications with fine-grain access control requirements to be independent from a particular access control policy and...
Konstantin Beznosov, Yi Deng, Bob Blakley, C. Burt...
HCI
2009
15 years 2 months ago
Emergent Design: Serendipity in Digital Educational Games
Using computer games for educational purposes is a fascinating idea that is getting increasingly popular amongst educators, researchers, and developers. From a technical as well as...
Michael D. Kickmeier-Rust, Dietrich Albert
MOBIHOC
2003
ACM
16 years 4 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...