Sciweavers

635 search results - page 73 / 127
» Social Aspects of Information Security
Sort
View
HICSS
2006
IEEE
100views Biometrics» more  HICSS 2006»
15 years 5 months ago
Profiles as Conversation: Networked Identity Performance on Friendster
Profiles have become a common mechanism for presenting one’s identity online. With the popularity of online social networking services such as Friendster.com, Profiles have been...
Danah Boyd, Jeffrey Heer
EUROSEC
2008
ACM
15 years 1 months ago
A methodology for the repeatable forensic analysis of encrypted drives
In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the app...
Cory Altheide, Claudio Merloni, Stefano Zanero
CHI
2007
ACM
16 years 7 days ago
Citizen communications in crisis: anticipating a future of ICT-supported public participation
Recent world-wide crisis events have drawn new attention to the role information communication technology (ICT) can play in warning and response activities. Drawing on disaster so...
Leysia Palen, Sophia B. Liu
CSCW
2004
ACM
15 years 5 months ago
Instant messages: a framework for reading between the lines
A framework is described for analyzing keystroke level data from instant messages (IM). This is unlike other analyses of IM which employ server-based logs of messages. This framew...
Jeffrey D. Campbell
CCS
2007
ACM
15 years 6 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida