Sciweavers

404 search results - page 50 / 81
» An Introduction to Evaluating Biometric Systems
Sort
View
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
14 years 3 months ago
Note Taking and Note Sharing While Browsing Campaign Information
Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private ...
Scott P. Robertson, Ravi K. Vatrapu, George Abraha...
HICSS
2007
IEEE
150views Biometrics» more  HICSS 2007»
14 years 3 months ago
Security Ontologies: Improving Quantitative Risk Analysis
— IT-security has become a much diversified field and small and medium sized enterprises (SMEs), in particular, do not have the financial ability to implement a holistic IT-se...
Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, E...
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 3 months ago
An Observational Study of Voters on the Internet
Voters in a democracy have the responsibility to learn about the candidates and issues on which they are deciding. The internet offers voters unparalleled opportunities for findin...
Scott P. Robertson, Christine E. Wania, Sang Joon ...
HICSS
2005
IEEE
126views Biometrics» more  HICSS 2005»
14 years 2 months ago
Email Chronemics: Unobtrusive Profiling of Response Times
One of the unknowns of emailing is the time it will take the receiver to form and post a reply. Response times vary considerably, and the chronemics of email are an important non-...
Yoram M. Kalman, Sheizaf Rafaeli
HICSS
2009
IEEE
213views Biometrics» more  HICSS 2009»
14 years 3 months ago
AURUM: A Framework for Information Security Risk Management
—As companies are increasingly exposed to a variety of information security threats, they are permanently forced to pay attention to security issues. Risk management provides an ...
Andreas Ekelhart, Stefan Fenz, Thomas Neubauer