Sciweavers

474 search results - page 59 / 95
» Privacy suites: shared privacy for social networks
Sort
View
KDD
2003
ACM
114views Data Mining» more  KDD 2003»
16 years 8 days ago
Information awareness: a prospective technical assessment
Recent proposals to apply data mining systems to problems in law enforcement, national security, and fraud detection have attracted both media attention and technical critiques of...
David Jensen, Matthew J. Rattigan, Hannah Blau
ECSCW
1993
15 years 1 months ago
Culture and Control in a Media Space
: Media spaces integrate audio, video and computer networking technology in order to provide a rich communicative environment for collaboration. The connectivity which they provide...
Paul Dourish
ISI
2004
Springer
15 years 5 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
CCS
1994
ACM
15 years 4 months ago
Application Access Control at Network Level
This paper describes an access control mechanism that enforces at the network level an access control decision that is taken at the application level. The mechanism is based on th...
Refik Molva, Erich Rütsche
CHI
2009
ACM
16 years 13 days ago
Predicting tie strength with social media
Social media treats all users the same: trusted friend or total stranger, with little or nothing in between. In reality, relationships fall everywhere along this spectrum, a topic...
Eric Gilbert, Karrie Karahalios