Sciweavers

471 search results - page 61 / 95
» An information systems auditor's profile
Sort
View
WWW
2009
ACM
14 years 8 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
LREC
2010
132views Education» more  LREC 2010»
13 years 9 months ago
Development and Use of an Evaluation Collection for Personalisation of Digital Newspapers
This paper presents the process of development and the characteristics of an evaluation collection for a personalisation system for digital newspapers. This system selects, adapts...
Alberto Díaz, Pablo Gervás, Antonio ...
CSCW
2008
ACM
13 years 9 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
ICDE
2007
IEEE
163views Database» more  ICDE 2007»
14 years 9 months ago
Adding Context to Preferences
To handle the overwhelming amount of information currently available, personalization systems allow users to specify the information that interests them through preferences. Most ...
Kostas Stefanidis, Evaggelia Pitoura, Panos Vassil...
EDBT
2002
ACM
112views Database» more  EDBT 2002»
14 years 7 months ago
Querying with Intrinsic Preferences
The handling of user preferences is becoming an increasingly important issue in present-day information systems. Among others, preferences are used for information filtering and ex...
Jan Chomicki