Sciweavers

1386 search results - page 215 / 278
» Challenges to information systems: time to change
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 3 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
CSCW
2004
ACM
14 years 2 months ago
Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research
In this paper, we describe the evolution and impact of computersupported cooperative work (CSCW) research through social network analysis of coauthorship data. A network of author...
Daniel B. Horn, Thomas A. Finholt, Jeremy P. Birnh...
HICSS
2010
IEEE
171views Biometrics» more  HICSS 2010»
14 years 3 months ago
Developing Reliable Measures of Privacy Management within Social Networking Sites
Social networking sites and other examples of online social spaces have greatly expanded their members’ opportunities for self expression and social interaction, while creating ...
Catherine Dwyer, Starr Roxanne Hiltz, Marshall Sco...
ACSAC
2010
IEEE
13 years 7 months ago
FIRM: capability-based inline mediation of Flash behaviors
The wide use of Flash technologies makes the security risks posed by Flash content an increasingly serious issue. Such risks cannot be effectively addressed by the Flash player, w...
Zhou Li, XiaoFeng Wang
HICSS
2008
IEEE
136views Biometrics» more  HICSS 2008»
14 years 3 months ago
Tag Clouds: Data Analysis Tool or Social Signaller?
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. ...
Marti A. Hearst, Daniela Karin Rosner