Sciweavers

381 search results - page 60 / 77
» Private Relationships in Social Networks
Sort
View
WWW
2008
ACM
14 years 9 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
HICSS
2003
IEEE
144views Biometrics» more  HICSS 2003»
14 years 2 months ago
Democracy Functions of Information Technology
Information Technology, IT, may play an important part in any community as a supporting tool in the democratic process. The conditions for that to happen are primarily a genuine w...
Gunnar Lidén, Anders Avdic
NDSS
2002
IEEE
14 years 2 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
JTAER
2010
120views more  JTAER 2010»
13 years 7 months ago
Trust and Distrust in Adaptive Inter-enterprise Collaboration Management
The success and competitive edge of enterprises has become increasingly dependent on the enterprises’ agility to become members in business networks that support their own busin...
Sini Ruohomaa, Lea Kutvonen
ECSCW
1993
13 years 10 months ago
Culture and Control in a Media Space
: Media spaces integrate audio, video and computer networking technology in order to provide a rich communicative environment for collaboration. The connectivity which they provide...
Paul Dourish