Sciweavers

703 search results - page 124 / 141
» Influencers and their barriers to technology
Sort
View
WWW
2009
ACM
15 years 10 months ago
Blog credibility ranking by exploiting verified content
People use weblogs to express thoughts, present ideas and share knowledge. However, weblogs can also be misused to influence and manipulate the readers. Therefore the credibility ...
Andreas Juffinger, Michael Granitzer, Elisabeth Le...
WWW
2009
ACM
15 years 10 months ago
Analyzing seller practices in a Brazilian marketplace
E-commerce is growing at an exponential rate. In the last decade, there has been an explosion of online commercial activity enabled by World Wide Web (WWW). These days, many consu...
Adriano M. Pereira, Diego Duarte, Paulo Góe...
WWW
2008
ACM
15 years 10 months ago
Value-driven design for "infosuasive" web applications
An infosuasive web application is mainly intended to be at the same time informative and persuasive, i.e., it aims at supporting knowledge needs and it has also the (declared or n...
Davide Bolchini, Franca Garzotto, Paolo Paolini
CHI
2005
ACM
15 years 10 months ago
Location disclosure to social relations: why, when, & what people want to share
Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's...
Sunny Consolvo, Ian E. Smith, Tara Matthews, Antho...
ACSAC
2009
IEEE
15 years 4 months ago
The Good, the Bad, And the Ugly: Stepping on the Security Scale
: Metrics are both fashionable and timely: many regulations that affect cybersecurity rely upon metrics – albeit, of the checklist variety in many cases – to ascertain complian...
Mary Ann Davidson