Sciweavers

948 search results - page 75 / 190
» Making a Game of Network Security
Sort
View
HICSS
2002
IEEE
82views Biometrics» more  HICSS 2002»
15 years 2 months ago
Customer Role Ambiguity in Community Management
This paper examines challenges involved in managing product-centered communities. Using the notion of customer role ambiguity, the paper explores the ambiguity involved in balanci...
Helena Holmström, Ola Henfridsson
CHI
2010
ACM
15 years 3 months ago
O job can you return my mojo: improving human engagement and enjoyment in routine activities
Unlike machines, we humans are prone to boredom when we perform routine activities for long periods of time. Workers’ mental engagement in boring tasks diminishes, which eventua...
Dvijesh Shastri, Yuichi Fujiki, Ross Buffington, P...
WWW
2009
ACM
15 years 10 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
CCS
2006
ACM
15 years 1 months ago
Time series modeling for IDS alert management
Intrusion detection systems create large amounts of alerts. Significant part of these alerts can be seen as background noise of an operational information system, and its quantity...
Jouni Viinikka, Hervé Debar, Ludovic M&eacu...
AICCSA
2005
IEEE
138views Hardware» more  AICCSA 2005»
15 years 3 months ago
Design, implementation and testing of mobile agent protection mechanism for MANETS
—In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depen...
K. E. A. Negm