Sciweavers

274 search results - page 8 / 55
» Security user studies: methodologies and best practices
Sort
View
EDUTAINMENT
2006
Springer
13 years 11 months ago
Designing Social Navigation for a Virtual Community of Practice
Abstract. Social navigation in a community of practice (CoP) is an approach of locating information through increased social awareness. Designing support for social navigation requ...
Wen Xu, Karel Kreijns, Jun Hu
CCS
2008
ACM
13 years 9 months ago
Towards practical biometric key generation with randomized biometric templates
Although biometrics have garnered significant interest as a source of entropy for cryptographic key generation, recent studies indicate that many biometric modalities may not actu...
Lucas Ballard, Seny Kamara, Fabian Monrose, Michae...
HICSS
2011
IEEE
164views Biometrics» more  HICSS 2011»
12 years 11 months ago
Trace Ethnography: Following Coordination through Documentary Practices
We detail the methodology of ‘trace ethnography’, which combines the richness of participant-observation with the wealth of data in logs so as to reconstruct patterns and prac...
R. Stuart Geiger, David Ribes
IS
2007
13 years 7 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
PET
2010
Springer
13 years 11 months ago
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing usersâ€...
Sai Teja Peddinti, Nitesh Saxena