Sciweavers

3193 search results - page 45 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ATAL
2009
Springer
14 years 2 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...
ICEIS
2002
IEEE
14 years 20 days ago
The AEX Method and Its Instrumentation
: We aim at elaborating a decision support system to manage concrete experience, using Artificial Intelligence methods, such as Case-Based Reasoning. We target any organization tha...
Sabine Delaître, Alain Giboin, Sabine Moisan
CCS
2009
ACM
14 years 2 months ago
Finding "hidden" connections on linkedIn an argument for more pragmatic social network privacy
Social networking services well know that some users are unwilling to freely share the information they store with the service (e.g. profile information). To address this, servic...
Jessica Staddon
ENASE
2010
109views Hardware» more  ENASE 2010»
13 years 2 months ago
A New Application of Domain Specific Modeling Towards Implementing an Early Warning Service
Domain Specific Modeling (DSM) has been used for a while in many scenarios, case studies, and applications successfully. This paper intends to present a new application of DSM for ...
Syed Imran, Ioannis M. Dokas, John Feehan, Francli...
TRUST
2010
Springer
13 years 6 months ago
The Role of Soft Information in Trust Building: Evidence from Online Social Lending
We analyze empirical data of Germany’s largest online social lending platform Smava.de to exemplarily study the contribution of unstructured, ambiguous, or unverified informatio...
Stefanie Pötzsch, Rainer Böhme