Sciweavers

730 search results - page 125 / 146
» Modeling trust in collaborative information systems
Sort
View
150
Voted
WWW
2009
ACM
16 years 4 months ago
Collective privacy management in social networks
Social Networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of people participating. Social networks enable a form of self expression f...
Anna Cinzia Squicciarini, Mohamed Shehab, Federica...
CIKM
2009
Springer
15 years 10 months ago
Learning to rank from Bayesian decision inference
Ranking is a key problem in many information retrieval (IR) applications, such as document retrieval and collaborative filtering. In this paper, we address the issue of learning ...
Jen-Wei Kuo, Pu-Jen Cheng, Hsin-Min Wang
161
Voted
ISI
2004
Springer
15 years 9 months ago
Composite Role-Based Monitoring (CRBM) for Countering Insider Threats
Through their misuse of authorized privileges, insiders have caused great damage and loss to corporate internal information assets, especially within the Intelligence Community (IC...
Joon S. Park, Shuyuan Mary Ho
144
Voted
WM
2003
15 years 5 months ago
The differentia principle as a cornerstone of ontology
The Information Society relies more and more on the co-operation and collaboration of multidisciplinary people who need to communicate and share information. Communication and kno...
Christophe Spies
147
Voted
HICSS
1999
IEEE
183views Biometrics» more  HICSS 1999»
15 years 8 months ago
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation
The Technology Acceptance Model (TAM) represents an important theoretical contribution toward understanding IS usage and IS acceptance behaviors [6, 19]. However, as noted by seve...
Yogesh Malhotra, Dennis F. Galletta