Sciweavers

1407 search results - page 107 / 282
» Systems Theory Model for Information Security
Sort
View
MKWI
2008
133views Business» more  MKWI 2008»
13 years 9 months ago
Reference Modelling of the Financial Reporting Supply Chain Architecture
: The domain of business reporting and especially financial reporting plays an important role when discussing internal and external information flows among organizational units. Th...
Maciej Piechocki, Carsten Felden
ESSOS
2009
Springer
14 years 3 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
CHI
2011
ACM
12 years 11 months ago
Collaborative creativity: a complex systems model with distributed affect
The study of creativity has received significant attention over the past century, with a recent increase in interest in collaborative, distributed creativity. We posit that creati...
Cecilia R. Aragon, Alison Williams
ENTCS
2000
112views more  ENTCS 2000»
13 years 8 months ago
Typed Multiset Rewriting Specifications of Security Protocols
The language MSR has successfully been used in the past to prove undecidability about security protocols modeled according to the Dolev-Yao abstraction. In this paper, we revise t...
Iliano Cervesato
CHI
2010
ACM
14 years 3 months ago
Friends only: examining a privacy-enhancing behavior in facebook
Privacy practices in social network sites often appear paradoxical, as content-sharing behavior stands in conflict with the need to reduce disclosure-related harms. In this study ...
Fred Stutzman, Jacob Kramer-Duffield