Sciweavers

635 search results - page 39 / 127
» Social Aspects of Information Security
Sort
View
ICEIS
2009
IEEE
14 years 2 months ago
Towards Successful Virtual Communities
With the multiplication of communication medium, the increasing multi-partner global organizations, the remote working tendencies, dynamic teams, pervasive or ubiquitous computing ...
Julien Subercaze, Christo El-Morr, Pierre Maret, A...
ICWSM
2008
13 years 8 months ago
Thin Slices of Online Profile Attributes
People form consistent impressions of others given surprisingly little information. With the advent of social networks, impressions now may form online rather than in a face-to-fa...
Kristin Brooke Stecher, Scott Counts
SWWS
2008
13 years 8 months ago
A proposal for Ontology Security Standards
- Semantic technologies, such as RDF (Resource Description Framework) and OWL (Web Ontology Language), are being widely used to store information. Ontology is mostly used in semant...
Muhammad Reza Fatemi, Atilla Elçi, Zeki Bay...
IEEEARES
2007
IEEE
14 years 1 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
ACSAC
2010
IEEE
13 years 4 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...