Sciweavers

536 search results - page 18 / 108
» Embedding Information Security into the Organization
Sort
View
ICONFERENCE
2011
13 years 3 months ago
Coordinating the ordinary: social information uses of Facebook by adults
Social network sites (SNSs) are bundles of information and communication tools that can be used to support collaboration, among other uses. In a qualitative study of adult Faceboo...
Donghee Yvette Wohn, Cliff Lampe, Jessica Vitak, N...
SOUPS
2005
ACM
14 years 1 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 5 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 1 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
CCS
2009
ACM
14 years 3 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh