Sciweavers

2940 search results - page 532 / 588
» Towards Social Information Systems
Sort
View
CCS
2007
ACM
15 years 6 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
110
Voted
HUC
2005
Springer
15 years 6 months ago
Preventing Camera Recording by Designing a Capture-Resistant Environment
With the ubiquity of camera phones, it is now possible to capture digital still and moving images anywhere, raising a legitimate concern for many organizations and individuals. Alt...
Khai N. Truong, Shwetak N. Patel, Jay Summet, Greg...
90
Voted
ASSETS
2008
ACM
15 years 2 months ago
Sudoku access: a sudoku game for people with motor disabilities
Educational games are a beneficial activity motivating a large number of students in our society. Unfortunately, disabled people have reduced opportunities when using a computer g...
Stéphane Norte, Fernando G. Lobo
102
Voted
ECIS
2001
15 years 1 months ago
Knowledge, learning and IT support in a small software company
The literature in the field of knowledge management shows a certain preoccupation with information technology (IT) and technical solutions while it reflects a limited view of orga...
Karlheinz Kautz, Kim Thaysen
101
Voted
EJIS
2006
132views more  EJIS 2006»
15 years 16 days ago
Enacting new temporal boundaries: the role of mobile phones
This paper examines how the use of mobile phones influences the temporal boundaries that people enact in order to regulate and coordinate their work and non-work activities. We in...
Elpida Prasopoulou, Athanasia Pouloudi, Niki Pante...