Sciweavers

3193 search results - page 41 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
HICSS
2003
IEEE
221views Biometrics» more  HICSS 2003»
14 years 1 months ago
"Applying TAM to E-Services Adoption: The Moderating Role of Perceived Risk"
Consumer adoption of e-services is an important goal for many service providers, however little is known about how different consumer segments perceive and evaluate them for adopt...
Mauricio Featherman, Mark A. Fuller
CSE
2009
IEEE
14 years 2 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
HICSS
2007
IEEE
97views Biometrics» more  HICSS 2007»
14 years 2 months ago
Interdependent Risk in Interacting Infrastructure Systems
Critical infrastructures display many of the characteristic properties of complex systems. They exhibit infrequent large failures events that often obey a power law distribution i...
Benjamin A. Carreras, David E. Newman, Paul Gradne...
ICTAI
2003
IEEE
14 years 1 months ago
An Intelligent Early Warning System for Software Quality Improvement and Project Management
One of the main reasons behind unfruitful software development projects is that it is often too late to correct the problems by the time they are detected. It clearly indicates th...
Xiaoqing Frank Liu, Gautam Kane, Monu Bambroo
CHI
2008
ACM
14 years 8 months ago
Security practitioners in context: their activities and interactions
This study investigates the context of interactions of IT security practitioners, based on a qualitative analysis of 30 interviews and participatory observation. We identify nine ...
Rodrigo Werlinger, Kirstie Hawkey, Konstantin Bezn...