Sciweavers

263 search results - page 16 / 53
» Reports and Surveys
Sort
View
ECRIME
2007
14 years 2 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ICSE
2009
IEEE-ACM
14 years 11 months ago
The secret life of bugs: Going past the errors and omissions in software repositories
Every bug has a story behind it. The people that discover and resolve it need to coordinate, to get information from documents, tools, or other people, and to navigate through iss...
Jorge Aranda, Gina Venolia
HICSS
1999
IEEE
87views Biometrics» more  HICSS 1999»
14 years 3 months ago
Telecommuting: Does it Work in the Long Term?
While there is considerable literature reporting the results of studies of benefits and problems associated with telecommuting, there is little longitudinal research available add...
Geoffrey Dick, Ian Duncanson
MKWI
2008
168views Business» more  MKWI 2008»
14 years 12 days ago
Towards Automated Risk Identification in Service-Oriented Architectures
: IT risk management is an important challenge for businesses and software vulnerabilities are a major source of IT risks, as the 2006 CSI/FBI Computer Crime and Security Survey [G...
Lutz Lowis
FAC
2007
170views more  FAC 2007»
13 years 11 months ago
Are the Logical Foundations of Verifying Compiler Prototypes Matching user Expectations?
Abstract. The Verifying Compiler (VC) project proposals suggest that mainstream software developers are its targeted end-users. Like other software engineering efforts, the VC proj...
Patrice Chalin