Sciweavers

410 search results - page 12 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
SOUPS
2009
ACM
14 years 2 months ago
A comparative study of online privacy policies and formats
Abstract. Online privacy policies are difficult to understand. Most privacy policies require a college reading level and an ability to decode legalistic, confusing, or jargon-laden...
Aleecia M. McDonald, Robert W. Reeder, Patrick Gag...
JTAER
2010
121views more  JTAER 2010»
13 years 6 months ago
A Semantic Data Validation Service for Web Applications
An Input validation can be a critical issue. Typically, a little attention is paid to it in a web development project, because overenthusiastic validation can tend to cause failur...
Shadi Aljawarneh, Faisal Alkhateeb, Eslam Al Magha...
PET
2010
Springer
13 years 11 months ago
On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot
Web Search is one of the most rapidly growing applications on the internet today. However, the current practice followed by most search engines – of logging and analyzing usersâ€...
Sai Teja Peddinti, Nitesh Saxena
ECIS
2003
13 years 9 months ago
Evaluating the effectiveness of learning interventions: an information systems case study
Currently, there is no standard instrument for evaluating learning effectiveness. While final examinations and end-of-semester course evaluation surveys can be used to do this, th...
Daniel L. Moody, Guttorm Sindre
SAM
2004
98views Hardware» more  SAM 2004»
13 years 9 months ago
Scenario Synthesis from Imprecise Requirements
Discovering faults in requirements specifications for distributed reactive systems is a challenging problem since many issues that need to be uncovered are a result of subtle compo...
Bill Mitchell, Robert Thomson, Paul Bristow