Sciweavers

2648 search results - page 49 / 530
» Human Factors In Computer Security
Sort
View
CSCW
2012
ACM
13 years 5 months ago
Designing a social network to support the independence of young adults with autism
Independence is key to a successful transition to adulthood for individuals with autism. Social support is a crucial factor for achieving adaptive self-help life skills. In this p...
Hwajung Hong, Jennifer G. Kim, Gregory D. Abowd, R...
BMCBI
2006
169views more  BMCBI 2006»
14 years 9 months ago
Beyond microarrays: Finding key transcription factors controlling signal transduction pathways
Background: Massive gene expression changes in different cellular states measured by microarrays, in fact, reflect just an "echo" of real molecular processes in the cell...
Alexander E. Kel, Nico Voss, Ruy Jauregui, Olga V....
BCSHCI
2007
14 years 11 months ago
Mental health issues and pervasive computing
This poster describes work being undertaken in the use of pervasive computing for the treatment of mental health problems. The use of technology to help patients with psychologica...
David J. Haniff
CHIMIT
2007
ACM
15 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
15 years 10 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...