Sciweavers

24 search results - page 5 / 5
» Deception and design: the impact of communication technology...
Sort
View
ICISS
2007
Springer
14 years 1 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
ESAW
2000
Springer
13 years 11 months ago
Models of Coordination
While software is becoming decomposed in more and more finegrained entities, the interactions amongst those become of major importance. While methodologies for building such compon...
Robert Tolksdorf
WWW
2011
ACM
13 years 2 months ago
Low-infrastructure methods to improve internet access for mobile users in emerging regions
As information technology supports more aspects of modern life, digital access has become an important tool for developing regions to lift themselves from poverty. Though broadban...
Sibren Isaacman, Margaret Martonosi
CIKM
2011
Springer
12 years 7 months ago
Do all birds tweet the same?: characterizing twitter around the world
Social media services have spread throughout the world in just a few years. They have become not only a new source of information, but also new mechanisms for societies world-wide...
Barbara Poblete, Ruth Garcia, Marcelo Mendoza, Ale...