Sciweavers

55 search results - page 7 / 11
» Principles of intention reconsideration
Sort
View
AIS
2006
Springer
13 years 7 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 1 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
IFIP
2005
Springer
14 years 1 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
IUI
2006
ACM
14 years 1 months ago
Trust building with explanation interfaces
Based on our recent work on the development of a trust model for recommender agents and a qualitative survey, we explore the potential of building users’ trust with explanation ...
Pearl Pu, Li Chen
ICRA
2000
IEEE
93views Robotics» more  ICRA 2000»
14 years 11 hour ago
Human Augmentation in Teleoperation of Arm Manipulators in an Environment with Obstacles
This paper discusses a novel approach to combining human and machine intelligence in teleoperation of 6 degree of freedom (DOF) arm manipulators. Two algorithms are presented that...
Igor Ivanisevic, Vladimir J. Lumelsky