Sciweavers

1644 search results - page 48 / 329
» Finding Dominators in Practice
Sort
View
CHI
2007
ACM
14 years 9 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
HICSS
2008
IEEE
126views Biometrics» more  HICSS 2008»
14 years 3 months ago
An Empirical Investigation of Knowledge Creation in Electronic Networks of Practice: Social Capital and Theory of Planned Behavi
How to achieve knowledge creation effectively remains a problem, this becomes even more difficult in a loosely knitted community such as networks of practice. This is because know...
Shih-Wei Chou, Yu-Chieh Chang
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 3 months ago
Managing Benefits from IS/IT Investments: An Empirical Investigation into Current Practice
In 1996 Ward et al reported the results of their UK study into the state of practice in evaluating and realizing benefits from IS/IT investments. This paper presents new empirical...
John Ward, Steven De Hertogh, Stijn Viaene
CSCW
2012
ACM
12 years 4 months ago
Practices of information and secrecy in a punk rock subculture
By examining the information practices of a punk-rock subculture, we investigate the limits of social media systems, particularly limits exposed by practices of secrecy. Looking a...
Jessica Lingel, Aaron Trammell, Joe Sanchez, Mor N...

Book
2911views
15 years 7 months ago
Shape Analysis and Classification: Theory and Practice
"Advances in shape analysis impact a wide range of disciplines, from mathematics and engineering to medicine, archeology, and art. Anyone just entering the field, however, may...
Roberto M. Cesar Jr