Sciweavers

2648 search results - page 391 / 530
» Human Factors In Computer Security
Sort
View
GROUP
2009
ACM
15 years 9 months ago
Wikipedians are born, not made: a study of power editors on Wikipedia
Open content web sites depend on users to produce information of value. Wikipedia is the largest and most well-known such site. Previous work has shown that a small fraction of ed...
Katherine A. Panciera, Aaron Halfaker, Loren G. Te...
GROUP
2009
ACM
15 years 9 months ago
Emergent team coordination: from fire emergency response practice to a non-mimetic simulation game
We take the work practices of fire emergency responders as the basis for developing simulations to teach team coordination. We introduce non-mimetic simulation: economic operation...
Zachary O. Toups, Andruid Kerne, William A. Hamilt...
LOCWEB
2009
ACM
15 years 9 months ago
Binding privacy rules to location on the web
As a tool for mitigating the potential privacy risks of gathering and transmitting location information on the Web, we suggest in this paper a model for conveying location informa...
Alissa Cooper, John Morris
RECSYS
2009
ACM
15 years 9 months ago
Preference elicitation with subjective features
Utility or preference elicitation is a critical component in many recommender and decision support systems. However, most frameworks for elicitation assume a predefined set of fe...
Craig Boutilier, Kevin Regan, Paolo Viappiani
96
Voted
SIGUCCS
2009
ACM
15 years 9 months ago
Getting iTunes U at Ithaca College up and running!
iTunes U is a free service from Apple that allows for the easy organization and distribution of content through iTunes. In the spring of 2008, Ithaca College signed a contract wit...
Beth M. Rugg