Sciweavers

1906 search results - page 363 / 382
» Data Privacy
Sort
View
CHIMIT
2007
ACM
14 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
CSCW
2008
ACM
13 years 11 months ago
Changes in use and perception of facebook
As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are...
Cliff Lampe, Nicole Ellison, Charles Steinfield
EUC
2008
Springer
13 years 11 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
ACCV
2009
Springer
13 years 10 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
ATAL
2009
Springer
13 years 10 months ago
Directing Status Messages to Their Audience in Online Communities
In this paper we present the results of our user study about status message sharing on the Social Web. The study revealed the privacy and information noise (sometimes originating f...
Milan Stankovic, Alexandre Passant, Philippe Laubl...