Sciweavers

410 search results - page 12 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
SOUPS
2009
ACM
15 years 11 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
JTAER
2010
121views more  JTAER 2010»
15 years 3 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
PET
2010
Springer
15 years 8 months ago
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing usersâ€...
Sai Teja Peddinti, Nitesh Saxena
ECIS
2003
15 years 5 months ago
Evaluating the effectiveness of learning interventions: an information systems case study
Currently, there is no standard instrument for evaluating learning effectiveness. While final examinations and end-of-semester course evaluation surveys can be used to do this, th...
Daniel L. Moody, Guttorm Sindre
SAM
2004
98views Hardware» more  SAM 2004»
15 years 5 months ago
Scenario Synthesis from Imprecise Requirements
Discovering faults in requirements specifications for distributed reactive systems is a challenging problem since many issues that need to be uncovered are a result of subtle compo...
Bill Mitchell, Robert Thomson, Paul Bristow