Sciweavers

635 search results - page 55 / 127
» Social Aspects of Information Security
Sort
View
CSCW
2006
ACM
15 years 5 months ago
Designing task visualizations to support the coordination of work in software development
Software development tools primarily focus on supporting the technical work. Yet no matter the tools employed, the process followed, or the size of the team, important aspects of ...
Christine A. Halverson, Jason B. Ellis, Catalina D...
ETRICS
2006
15 years 3 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
JASIS
2000
262views more  JASIS 2000»
14 years 11 months ago
The conduit metaphor and the nature and politics of information studies
: This article examines information theory from the aspect of its "conduit metaphor." A historical approach and a close reading of certain texts by Warren Weaver and Nor...
Ronald E. Day
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
15 years 5 months ago
A Self-Disclosure Model for Personal Health Information
The use of information technologies (IT) to collect personal health information is growing in popularity via computer-assisted interviewing and a wide variety of healthcare Web si...
Lotus E. Kam, William G. Chismar
ENTCS
2006
145views more  ENTCS 2006»
14 years 12 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...