Sciweavers

635 search results - page 34 / 127
» Social Aspects of Information Security
Sort
View
CHI
2005
ACM
14 years 7 months ago
I saw this and thought of you: some social uses of camera phones
This paper presents aspects of a study into how and why people use camera phones. The study examined people's intentions at the time of image capture and subsequent patterns ...
Tim Kindberg, Mirjana Spasojevic, Rowanne Fleck, A...
ACSAC
2003
IEEE
14 years 21 days ago
Protecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidel...
Giovanni Iachello
INTR
2007
98views more  INTR 2007»
13 years 7 months ago
User-centered evaluation of information: a research challenge
Purpose – This paper sets out to present the concept of the value of information, review the descriptive, rational, social and behavioral approaches for assessing the value of i...
Daphne R. Raban
TSE
2010
120views more  TSE 2010»
13 years 5 months ago
Time and Probability-Based Information Flow Analysis
Abstract—In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial stud...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
ICONFERENCE
2012
12 years 3 months ago
Online social networks in a post-Soviet state: how Hungarians protect and share on Facebook
As Facebook has become global, users from different cultural and socio-political contexts have joined the site. We present a case study investigating how both current and historic...
Blase Ur, Yang Wang