Sciweavers

536 search results - page 23 / 108
» Embedding Information Security into the Organization
Sort
View
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 2 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 2 months ago
Distributed Privacy-Preserving Policy Reconciliation
— Organizations use security policies to regulate how they share and exchange information, e.g., under what conditions data can be exchanged, what protocols are to be used, who i...
Ulrike Meyer, Susanne Wetzel, Sotiris Ioannidis
ICWSM
2010
13 years 9 months ago
Social Intellisense: A Task-Embedded Interface to Folksonomies
We present an application for accessing and creating socially constructed sets of information. Users store and retrieve information, such as bits of text, through the use of "...
Scott Counts, Kristie Fisher, Aaron Hoff
ACSAC
1999
IEEE
14 years 15 days ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
ATAL
2005
Springer
14 years 1 months ago
Formalising trust for online communities
Provision of services within a virtual framework for resource sharing across institutional boundaries has become an active research area. Many such services encode access to compu...
Ali Shaikh Ali, Omer F. Rana