Sciweavers

86 search results - page 5 / 18
» Overcoming organizational challenges to secure knowledge man...
Sort
View
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
14 years 1 months ago
The Future of Work: What Does Online Community Have to Do with It?
Amidst constant innovation in information and communication technologies, a new pattern of work is emerging. Hierarchical authority structures are giving way to greater decision-m...
Dejin Zhao, Mary Beth Rosson, Sandeep Purao
SPRINGSIM
2007
13 years 8 months ago
Bringing knowledge to network defense
Security managers must scan through multiple continuous data streams issuing from diverse sources in an effort to defend computer networks from attack. However, manual aggregation...
Leigh Flagg, Gordon Streeter, Andrew Potter
ECIS
2004
13 years 8 months ago
Implementing Information Systems to support knowledge work: an exploration of work motifs
The research presented in this paper is part of a larger study of the organizational impacts of information systems on knowledge work. The phase of the research reported in the pa...
Christopher J. Davis, Ellen M. Hunagel
AICT
2006
IEEE
135views Communications» more  AICT 2006»
14 years 1 months ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo