Sciweavers

524 search results - page 22 / 105
» Why phishing works
Sort
View
120
Voted
CHI
2005
ACM
16 years 2 months ago
Location disclosure to social relations: why, when, & what people want to share
Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's...
Sunny Consolvo, Ian E. Smith, Tara Matthews, Antho...
97
Voted
WWW
2008
ACM
16 years 2 months ago
Why web 2.0 is good for learning and for research: principles and prototypes
The term "Web 2.0" is used to describe applications that distinguish themselves from previous generations of software by a number of principles. Existing work shows that...
Carsten Ullrich, Kerstin Borau, Heng Luo, Xiaohong...
111
Voted
MOZ
2004
Springer
15 years 7 months ago
The Structure of Authority: Why Security Is Not a Separable Concern
Common programming practice grants excess authority for the sake of functionality; programming principles require least authority for the sake of security. If we practice our princ...
Mark S. Miller, Bill Tulloh, Jonathan S. Shapiro
118
Voted
ICRE
2000
IEEE
15 years 6 months ago
Requirements Documentation: Why a Formal Basis is Essential
Unless you have a complete and precise description of your product’s requirements, it is very unlikely that you will satisfy those requirements. A requirements document that is ...
David Lorge Parnas
SIGCSE
2000
ACM
453views Education» more  SIGCSE 2000»
15 years 6 months ago
Aristotle and object-oriented programming: why modern students need traditional logic
Classifying is a central activity in object-oriented programming and distinguishes it from procedural programming. Traditional logic, initiated by Aristotle, assigns classificatio...
Derek Rayside, Gerard T. Campbell