Sciweavers

3149 search results - page 16 / 630
» IT security risk management
Sort
View
SIGIR
2006
ACM
14 years 1 months ago
You are what you say: privacy risks of public mentions
In today’s data-rich networked world, people express many aspects of their lives online. It is common to segregate different aspects in different places: you might write opinion...
Dan Frankowski, Dan Cosley, Shilad Sen, Loren G. T...
COMCOM
2007
100views more  COMCOM 2007»
13 years 7 months ago
Using the vulnerability information of computer systems to improve the network security
In these years, the security problem becomes more important to everyone using computers. However, vulnerabilities on computers are found so frequently that system managers can not...
Yeu-Pong Lai, Po-Lun Hsia
HICSS
2002
IEEE
107views Biometrics» more  HICSS 2002»
14 years 17 days ago
Insurability of Electronic Commerce Risks
New kinds of risks increasingly threaten electronic commerce. The traditional instrument for risk transfer is insurance. Research is needed to determine whether new Internet risks...
Torsten Grzebiela
ACMICEC
2006
ACM
112views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
Persistent information security: beyond the e-commerce threat model
This paper introduces a new class of information security solution. The core technology, to authorize and track the use of digital files, was originally developed in eCommerce app...
Merv Matson, Mihaela Ulieru
WM
2003
13 years 9 months ago
Managing Organizational Risk Knowledge
: Risk planning requires an organization global view, as it is strongly centered in the experience and knowledge acquired in former projects. The larger the experience of the proje...
Luciana Landa Farias, Guilherme Horta Travassos, A...