Sciweavers

5254 search results - page 907 / 1051
» The Evaluation of Courses in Information Systems
Sort
View
HICSS
2009
IEEE
100views Biometrics» more  HICSS 2009»
15 years 8 months ago
A Theoretical Framework for Assessing Eavesdropping-Resistant Authentication Interfaces
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Bogdan Hoanca, Kenrick J. Mock
HICSS
2009
IEEE
143views Biometrics» more  HICSS 2009»
15 years 8 months ago
Longitudinal Analysis of the Effects of IT Characteristics on Web Site Ratings Across State Governments in the US (2001-2006)
Given the increasing investment on information technology (IT) and Web site features, it becomes crucial to measure reliably the impact of these characteristics on the overall qua...
Gabriel Puron Cid, José Ramón Gil-Ga...
IEEEARES
2009
IEEE
15 years 8 months ago
Estimating ToE Risk Level Using CVSS
—Security management is about calculated risk and requires continuous evaluation to ensure cost, time and resource effectiveness. Parts of which is to make future-oriented, costb...
Siv Hilde Houmb, Virginia N. L. Franqueira
IDTRUST
2009
ACM
15 years 8 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
15 years 8 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang