Sciweavers

2648 search results - page 405 / 530
» Human Factors In Computer Security
Sort
View
EICS
2010
ACM
15 years 1 months ago
WebWOZ: a wizard of oz prototyping framework
Language Technology (LT) based applications become more popular as technology improves. Prototyping early in the design process is critical for the development of high quality app...
Stephan Schlögl, Gavin Doherty, Nikiforos Kar...
CANDT
2009
15 years 1 months ago
Active artifacts as bridges between context and community knowledge sources
The aim of the paper is twofold: i) understanding how to provide additional information that is reflective of current organizational context in knowledge production and use; ii) p...
Federico Cabitza, Carla Simone
PETRA
2010
ACM
15 years 1 months ago
Opportunistic strategies for lightweight signal processing for body sensor networks
We present a mobile platform for body sensor networking based on a smartphone for lightweight signal processing of sensor mote data. The platform allows for local processing of da...
Edmund Y. W. Seto, Eladio Martin, Allen Y. Yang, P...
GROUP
2007
ACM
15 years 1 months ago
Community, consensus, coercion, control: cs*w or how policy mediates mass participation
When large groups cooperate, issues of conflict and control surface because of differences in perspective. Managing such diverse views is a persistent problem in cooperative group...
Travis Kriplean, Ivan Beschastnikh, David W. McDon...
82
Voted
GROUP
2007
ACM
15 years 1 months ago
Identity management: multiple presentations of self in facebook
As the use of social networking websites becomes increasingly common, the types of social relationships managed on these sites are becoming more numerous and diverse. This researc...
Joan Morris DiMicco, David R. Millen