Sciweavers

48 search results - page 6 / 10
» Implementing Social Norms Using Policies
Sort
View
81
Voted
HICSS
2009
IEEE
124views Biometrics» more  HICSS 2009»
15 years 5 months ago
Case Studies of an Insider Framework
Many groups are interested in the insider threat problem, but the model generally used by all of these groups is implicitly binary—one is either within a perimeter or not. There...
Matt Bishop, Sophie Engle, Sean Peisert, Sean Whal...
WSC
2008
15 years 18 days ago
Simulating culture: An experiment using a multi-user virtual environment
With increased levels of global trade, foreign policy making, foreign travel, and distance collaboration using the Internet, the issue of culture takes center stage. One needs to ...
Paul A. Fishwick, Julie Henderson, Elinore Fresh, ...
75
Voted
CSE
2009
IEEE
15 years 5 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
CHI
2010
ACM
15 years 5 months ago
Factors impeding Wiki use in the enterprise: a case study
Our research explored factors that impacted the use of wikis as a tool to support the dissemination of knowledge within an enterprise. Although we primarily talked to a population...
Lester J. Holtzblatt, Laurie E. Damianos, Daniel W...
95
Voted
MHCI
2007
Springer
15 years 4 months ago
Co-present photo sharing on mobile devices
The paper reports a mobile application that allows users to share photos with other co-present users by synchronizing the display on multiple mobile devices. Various floor control...
Leonard Martin Ah Kun, Gary Marsden