Sciweavers

3272 search results - page 598 / 655
» Privacy in Data Publishing
Sort
View
CHIMIT
2007
ACM
14 years 1 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
ECAI
2006
Springer
14 years 23 days ago
A Client/Server User-Based Collaborative Filtering Algorithm: Model and Implementation
Abstract. This paper describes a new way of implementing an intelligent web caching service, based on an analysis of usage. Since the cache size in software is limited, and the sea...
Sylvain Castagnos, Anne Boyer
CSCW
2008
ACM
13 years 11 months ago
Changes in use and perception of facebook
As social computing systems persist over time, the user experiences and interactions they support may change. One type of social computing system, Social Network Sites (SNSs), are...
Cliff Lampe, Nicole Ellison, Charles Steinfield
EUC
2008
Springer
13 years 11 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...
MEDINFO
2007
131views Healthcare» more  MEDINFO 2007»
13 years 10 months ago
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records
Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure ...
Peter R. Croll, Matthew Henricksen, William J. Cae...