Sciweavers

2648 search results - page 321 / 530
» Human Factors In Computer Security
Sort
View
111
Voted
CSCW
2004
ACM
15 years 9 months ago
Behind the help desk: evolution of a knowledge management system in a large organization
This paper examines the way in which a knowledge management system (KMS)—by which we mean the people, processes and software—came into being and evolved in response to a varie...
Christine Halverson, Thomas Erickson, Mark S. Acke...
132
Voted
AVI
2006
15 years 4 months ago
Evaluating the effects of fluid interface components on tabletop collaboration
Tabletop displays provide exciting opportunities to support individual and collaborative activities such as planning, organizing, and storyboarding. It has been previously suggest...
Uta Hinrichs, M. Sheelagh T. Carpendale, Stacey D....
135
Voted
ICONFERENCE
2011
14 years 10 months ago
Loose strands: searching for evidence of public access ICT impact on development
Telecenters, libraries and internet cafés are often credited as being important venues for making information and communication technologies (ICTs) more widely available for peop...
Araba Sey, Michelle Fellows
136
Voted
NDSS
2000
IEEE
15 years 7 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
DAC
2005
ACM
16 years 4 months ago
Efficient fingerprint-based user authentication for embedded systems
User authentication, which refers to the process of verifying the identity of a user, is becoming an important security requirement in various embedded systems. While conventional...
Pallav Gupta, Srivaths Ravi, Anand Raghunathan, Ni...