Sciweavers

11 search results - page 2 / 3
» Modeling IT Ethics: A Study in Situational Ethics
Sort
View
HICSS
2007
IEEE
115views Biometrics» more  HICSS 2007»
14 years 1 months ago
Multiplex conversations afforded by technology
This article presents results from a small-scale pilot study investigating linguistic production and structural patterns while multitasking and interrelating these findings with c...
Therese Ornberg Berglund
PRIMA
2007
Springer
14 years 1 months ago
An Asymmetric Protocol for Argumentation Games in Defeasible Logic
Agent interactions where the agents hold conflicting goals could be modelled as adversarial argumentation games. In many real-life situations (e.g., criminal litigation, consumer ...
Jenny Eriksson Lundström, Guido Governatori, ...
PERVASIVE
2007
Springer
14 years 1 months ago
Evaluating a Wearable Display Jersey for Augmenting Team Sports Awareness
This paper introduces a user-centered design process and case study evaluation of a novel wearable visualization system for team sports, coined TeamAwear. TeamAwear consists of thr...
Mitchell Page, Andrew Vande Moere
NSPW
2006
ACM
14 years 1 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
ACSAC
2009
IEEE
14 years 2 months ago
How to Securely Break into RBAC: The BTG-RBAC Model
—Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on ...
Ana Ferreira, David W. Chadwick, Pedro Farinha, Ri...