Sciweavers

6696 search results - page 41 / 1340
» Securing social networks
Sort
View
BIS
2009
146views Business» more  BIS 2009»
13 years 6 months ago
Computer Support for Agile Human-to-Human Interactions with Social Protocols
Despite many works in CSCW, groupware, workflow systems and social networks, computer support for human-to-human interactions is still insufficient, especially support for agility,...
Willy Picard
BPM
2008
Springer
188views Business» more  BPM 2008»
13 years 11 months ago
Social Software for Modeling Business Processes
Abstract. The aim of this paper is to show how the use of social networks may help users to behave as modelers they trust. Users are guided in this respect within the context of an...
Agnes Koschmider, Minseok Song, Hajo A. Reijers
UIST
2009
ACM
14 years 3 months ago
Collabio: a game for annotating people within social networks
We present Collabio, a social tagging game within an online social network that encourages friends to tag one another. Collabio’s approach of incentivizing members of the social...
Michael Bernstein, Desney S. Tan, Greg Smith, Mary...
SOUPS
2009
ACM
14 years 3 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
ISSA
2008
13 years 10 months ago
Social Aspects of Information Security
Social Engineering (SE) threats have constituted a reality for Information Technology (IT) systems for many years. Yet, even the latest editions of the generally accepted Informat...
Evangelos Frangopoulos, Mariki M. Eloff, Lucas M. ...