Sciweavers

635 search results - page 35 / 127
» Social Aspects of Information Security
Sort
View
IFIP
2001
Springer
13 years 12 months ago
Cultivating Recalcitrance in Information Systems Research
There is an ongoing debate about how to improve the quality of empirical research efforts in information systems. One of the persistent issues within the debate concerns the relat...
Carsten Sørensen, Edgar A. Whitley, Shirin ...
SP
2010
IEEE
165views Security Privacy» more  SP 2010»
13 years 11 months ago
A Practical Attack to De-anonymize Social Network Users
—Social networking sites such as Facebook, LinkedIn, and Xing have been reporting exponential growth rates. These sites have millions of registered users, and they are interestin...
Gilbert Wondracek, Thorsten Holz, Engin Kirda, Chr...
WIMOB
2008
IEEE
14 years 1 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
DAC
2010
ACM
13 years 11 months ago
Theoretical analysis of gate level information flow tracking
Understanding the flow of information is an important aspect in computer security. There has been a recent move towards tracking information in hardware and understanding the flow...
Jason Oberg, Wei Hu, Ali Irturk, Mohit Tiwari, Tim...
ACOM
2004
Springer
14 years 24 days ago
Dialogization and Implicit Information in an Agent Communicational Model
In this paper we propose a computational model for human-agent and agent-agent conversation. This model has two fundamental characteristics: (1) it takes into account the implicit ...
Karim Bouzouba, Jamal Bentahar, Bernard Moulin