Sciweavers

6696 search results - page 51 / 1340
» Securing social networks
Sort
View
SOUPS
2005
ACM
14 years 2 months ago
Social navigation as a model for usable security
As interest in usable security spreads, the use of visual approaches in which the functioning of a distributed system is made visually available to end users is an approach that a...
Paul DiGioia, Paul Dourish
DASFAA
2010
IEEE
168views Database» more  DASFAA 2010»
14 years 2 months ago
Temporal Top-k Search in Social Tagging Sites Using Multiple Social Networks
In social tagging sites, users are provided easy ways to create social networks, to post and share items like bookmarks, videos, photos and articles, along with comments and tags. ...
Wenyu Huo, Vassilis J. Tsotras
NETGAMES
2006
ACM
14 years 2 months ago
Network game design: hints and implications of player interaction
While psychologists analyze network game-playing behavior in terms of players’ social interaction and experience, understanding user behavior is equally important to network res...
Kuan-Ta Chen, Chin-Laung Lei
CHI
2007
ACM
14 years 9 months ago
SocialBrowsing: integrating social networks and web browsing
In this paper we introduce SocialBrowsing, a Firefox extension that adds social context to the web browsing experience. The extension is paired with services provided by social ne...
Jennifer Golbeck, Michael M. Wasser
ASUNAM
2009
IEEE
14 years 3 months ago
An Analytical Way to Find Influencers on Social Networks and Validate their Effects in Disseminating Social Games
As the weight of online social networks (OSNs) which provide powerful means of sharing common interests and communicating has gradually grown up, influencers are also given the gr...
Erica Suyeon Kim, Steve SangKi Han