Sciweavers

1139 search results - page 77 / 228
» Trust Management Survey
Sort
View
ECRIME
2007
14 years 7 days ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ESEM
2009
ACM
14 years 2 months ago
Software risk management barriers: An empirical study
This paper reports results from a survey of experienced project managers on their perception of software risk management. From a sample of 18 experienced project managers, we have...
Edzreena Edza Odzaly, Paul Sage Des Greer
CCS
2000
ACM
14 years 19 days ago
Implementing a distributed firewall
Conventional firewalls rely on topology restrictions and controlled network entry points to enforce traffic filtering. Furthermore, a firewall cannot filter traffic it does ...
Sotiris Ioannidis, Angelos D. Keromytis, Steven M....
ELPUB
1999
ACM
14 years 18 days ago
Two Large-Scale Surveys of Electronic Publication in the United Kingdom
The Department of Information Science at Loughborough University has carried out several user studies on electronic journals in recent years, including the ELVYN and Cafe Jus proj...
Fytton Rowland
ESEM
2008
ACM
13 years 10 months ago
Some lessons learned in conducting software engineering surveys in china
Component-Based Software Engineering (CBSE) with Open Source Software and Commercial-Off-the-Shelf (COTS) components, Open Source Software (OSS) based development, and Software Ou...
Junzhong Ji, Jingyue Li, Reidar Conradi, Chunnian ...